WO2007061006A1 - Information readout apparatus, authentication-information generating apparatus, information readout method, authentication-information generating method, information readout program, authentication-information generating program, and recording medium - Google Patents

Information readout apparatus, authentication-information generating apparatus, information readout method, authentication-information generating method, information readout program, authentication-information generating program, and recording medium Download PDF

Info

Publication number
WO2007061006A1
WO2007061006A1 PCT/JP2006/323351 JP2006323351W WO2007061006A1 WO 2007061006 A1 WO2007061006 A1 WO 2007061006A1 JP 2006323351 W JP2006323351 W JP 2006323351W WO 2007061006 A1 WO2007061006 A1 WO 2007061006A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
reading
authentication
recorded
recording medium
Prior art date
Application number
PCT/JP2006/323351
Other languages
French (fr)
Japanese (ja)
Inventor
Tadayasu Kaneko
Koji Koga
Takeshi Sato
Goro Kobayashi
Original Assignee
Pioneer Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pioneer Corporation filed Critical Pioneer Corporation
Publication of WO2007061006A1 publication Critical patent/WO2007061006A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • Information reading device authentication information generating device, information reading method, authentication information generating method, information reading program, authentication information generating program, and recording medium
  • the present invention relates to an information reading device used when reading information used by a mobile object
  • the present invention relates to an authentication information generating device, an information reading method, an authentication information generating method, an information reading program, an authentication information generating program, and a recording medium.
  • the use of the present invention is not limited to the above-described information reading device, authentication information generating device, information reading method, authentication information generating method, information reading program, authentication information generating program, and recording medium.
  • data used in in-vehicle devices such as navigation devices, such as map data and application data
  • Such data update is, for example, whether the data type of the road data, the route search data, or the route guidance data is a deviation data type, or the background data type is updated! Let the user specify And when updating any of road data, route search data, route guidance data, update all data of the corresponding data type stored in the hard disk, and if it is the data type of background data, This is done by updating data in units of blocks that fall within the specified range (for example, see Patent Document 1 below).
  • Patent Document 1 Japanese Unexamined Patent Application Publication No. 2005-148004
  • the update disk may be lent out or copied by the user when updating is performed using the update disk in which the update data is recorded.
  • Lending update disk If illegal data updates are made by borrowing or copying, it is not possible to obtain revenue from sales of update disks or update data. For this reason, for example, there is a problem that it is difficult to provide the latest information, such as map data reflecting the road conditions that change every moment.
  • an information reading apparatus is an identification for acquiring medium identification information uniquely given to a recording medium on which predetermined information is recorded.
  • the authentication information generating apparatus reads the medium identification information uniquely given to the recording medium on which the predetermined information is recorded, and the information recorded on the recording medium. Using the receiving means for receiving the device identification information inherently given to the information reading device to be taken from the information reading device, and the medium identification information and the device identification information received by the receiving means. Generating means for generating authentication information for reading the predetermined information recorded on the information processing apparatus, and transmitting means for transmitting the authentication information generated by the generating means to the information reading device. .
  • the information reading method includes an identification information acquisition step of acquiring medium identification information uniquely given to a recording medium on which predetermined information is recorded, and the identification information acquisition.
  • An authentication information acquisition step for acquiring authentication information generated based on the identification information, and reading the predetermined information recorded on the recording medium based on the authentication information acquired by the authentication information acquisition step And a reading process.
  • the authentication information generating method reads the medium identification information uniquely given to the recording medium on which the predetermined information is recorded, and the information recorded on the recording medium.
  • the device identification information uniquely assigned to the information reading device to be read is received from the information reading device, and the medium identification information and device identification information received by the receiving step are used to record the recording information.
  • An information reading program according to the invention of claim 7 causes a computer to execute the information reading method according to claim 5.
  • an authentication information generation program according to the invention of claim 8 causes a computer to execute the authentication information generation method of claim 6.
  • a recording medium according to the invention of claim 9 is readable by a computer in which the information reading program according to claim 7 is recorded.
  • a recording medium according to the invention of claim 10 is readable by a computer recording the authentication information generation program according to claim 8.
  • FIG. 1 is a block diagram showing a functional configuration of an information reading system according to an embodiment.
  • FIG. 2 is a flowchart showing a procedure of information reading processing by the information reading device.
  • FIG. 3 is a flowchart showing a procedure of authentication information generation processing by the authentication information generation device.
  • FIG. 4 is a block diagram showing a hardware configuration of the navigation device.
  • FIG. 5 is a flowchart showing a procedure of map data update processing of the navigation device.
  • FIG. 6 is a flowchart showing the procedure of the map data update process of the navigation device.
  • FIG. 7 is a flowchart showing a procedure of password generation processing by the management server.
  • FIG. 1 is a block diagram showing a functional configuration of an information reading system according to an embodiment.
  • the information reading system 100 includes an information reading device 110 that reads information recorded on the recording medium 101, and an authentication information generating device 120 that generates authentication information for reading predetermined information recorded on the recording medium 101.
  • the information reading system 100 includes an information reading device 110 that reads information recorded on the recording medium 101, and an authentication information generating device 120 that generates authentication information for reading predetermined information recorded on the recording medium 101.
  • the information reading apparatus 110 includes an identification information acquisition unit 111, an authentication information acquisition unit 112, a reading unit 113, and a reading control unit 114.
  • the identification information acquisition unit 111 is unique to the recording medium 101.
  • the medium identification information given to is acquired.
  • the identification information acquisition unit 111 acquires the medium identification information by reading the medium identification information recorded on the recording medium 101, for example. Also, the identification information acquisition unit 111 acquires the medium identification information by, for example, user input.
  • the authentication information acquisition unit 112 acquires authentication information generated based on the medium identification information acquired by the identification information acquisition unit 111 and the device identification information uniquely assigned to the own device. For example, the authentication information acquisition unit 112 acquires the authentication information by transmitting the medium identification information and the device identification information to the authentication information generation device 120 and receiving the authentication information generated by the authentication information generation device 120. To do.
  • the reading unit 113 reads predetermined information recorded on the recording medium 101.
  • the reading control unit 114 controls the reading unit 113 based on the authentication information acquired by the authentication information acquiring unit 112. For example, the reading control unit 114 inputs authentication information as a password for reading predetermined information recorded on the recording medium 101, and reads the predetermined information when authenticated.
  • the information recorded on the recording medium 101 is encrypted using the authentication information, and the read control unit 114 decrypts the information recorded on the recording medium 101 using the authentication information. It is also possible to hesitate. In this case, the authentication information is used as an encryption key for predetermined information recorded on the recording medium 101.
  • the authentication information generation device 120 includes a reception unit 121, a generation unit 122, and a transmission unit 123.
  • the receiving unit 121 receives the medium identification information uniquely assigned to the recording medium 101 and the device identification information uniquely assigned to the information reading apparatus 110 that reads the information recorded on the recording medium 101. Receive from 110.
  • the reception unit 121 receives the medium identification information and the device identification information transmitted by the authentication information acquisition unit 112 of the information reading device 110 via the network.
  • the generating unit 122 generates authentication information for reading predetermined information recorded on the recording medium 101 using the medium identification information and the device identification information received by the receiving unit 121. For example, the generation unit 122 performs medium identification information and device identification information with a specific function. The calculated value is calculated, and authentication information unique to the combination of the recording medium 101 and the information reading device 110 is generated.
  • the transmission unit 123 transmits the authentication information generated by the generation unit 122 to the information reading device 110.
  • the transmission unit 123 transmits the authentication information to the authentication information acquisition unit 112 of the information reading device 110 that has transmitted the medium identification information and the device identification information via the network.
  • the exchange of medium identification information, device identification information, and authentication information between the information reading device 110 and the authentication information generating device 120 is not limited to transmission / reception via a network, and for example, the information is recorded. This may be done by transporting the recorded medium (separate from the recording medium 101).
  • the information reading system 100 reads predetermined information recorded on the recording medium 101. At this time, an information reading process by the information reading apparatus 110 and an authentication information generating process by the authentication information generating apparatus 120 are performed.
  • FIG. 2 is a flowchart showing a procedure of information reading processing by the information reading device.
  • the information reading device 110 first acquires medium identification information by the identification information acquisition unit 111 (step S201). Specifically, for example, the medium identification information recorded on the recording medium 101 is read.
  • the authentication information acquisition unit 112 transmits the medium identification information and the device identification information to the authentication information generation device 120 (step S202), and waits until the authentication information is received (step S203: No Loop). At this time, the authentication information generation device 120 performs authentication information generation processing and generates authentication information.
  • the reading control unit 114 controls the reading unit 113 based on the authentication information to read predetermined information recorded on the recording medium 101 (Ste S204), the process according to this flowchart is terminated.
  • the predetermined information recorded on the recording medium 101 is encrypted using the authentication information
  • the reading control unit 114 decrypts the predetermined information recorded on the recording medium 101 using the authentication information. I'll do it.
  • the information reading apparatus 110 performs predetermined information recorded on the recording medium 101. Read the information.
  • FIG. 3 is a flowchart showing a procedure of authentication information generation processing by the authentication information generation apparatus.
  • the authentication information generating apparatus 120 first waits until the receiving unit 121 receives the medium identification information and the apparatus identification information from the information reading apparatus 110 (Step S 301: No Norep). ).
  • step S301 When the medium identification information and the device identification information are received (step S301: Yes), the authentication information generating device 120 generates authentication information by the generation unit 122 (step S302). Then, the authentication information generated at step S302 is transmitted by the transmission unit 123 (step S303), and the processing according to this flowchart is terminated.
  • the information reading system 100 from the medium identification information uniquely given to the recording medium and the device identification information uniquely given to the own apparatus. Based on the generated authentication information, the information recorded on the recording medium is read. As a result, it is possible to prevent the predetermined information recorded on the recording medium from being read indefinitely. In particular, when the prescribed information is confidential information or when the information itself is distributed as a product, it is possible to prevent unauthorized persons from reading the information illegally.
  • the information recorded on the recording medium can be read immediately. Furthermore, by encrypting predetermined information using authentication information, the information recorded on the recording medium can be more securely protected.
  • the information reading system 100 is applied to update of map data of the navigation device 400 mounted on a vehicle.
  • the recording medium 101 is a DVD-ROM on which map data is recorded
  • the information reading device 110 is a navigation device 400
  • the authentication information generating device 120 is a management server (not shown).
  • FIG. 4 is a block diagram showing the hardware configuration of the navigation device.
  • a navigation device 400 includes a CPU 401, a ROM 402, a RAM (memory) 403, a magnetic disk drive 404, a magnetic disk 405, an optical disk drive 406, an optical disk 407, and an audio 1 / F (interface). 408, a microphone 409, a speaker 410, an input device 411, an image IZF 412, a camera 413, a display 414, a communication IZF 415, a GPS unit 416, and various sensors 417.
  • Each component 401 to 417 is connected by a bus 420.
  • the CPU 401 governs overall control of the navigation device 400.
  • the ROM 402 records programs such as a boot program, a communication program, a database creation program, and a data analysis program. Furthermore, the ROM 402 records device identification information (hereinafter referred to as a hard ID) that uniquely identifies each navigation device 400.
  • RAM403 is used as a work area for CPU401.
  • the magnetic disk drive 404 controls reading and writing of data to the magnetic disk 405 according to the control of the CPU 401.
  • the magnetic disk 405 records data written under the control of the magnetic disk drive 404.
  • the magnetic disk 405 for example, HD (node disk) or FD (flexible disk) can be used.
  • the optical disk drive 406 controls data reading / writing to the optical disk 407 in accordance with the control of the CPU 401.
  • the optical disk 407 is a detachable recording medium from which data is read according to the control of the optical disk drive 406.
  • a writable recording medium can be used as the optical disc 407.
  • the removable recording medium may be a power MO of the optical disc 407, a memory card, or the like.
  • map data used for route guidance includes background data that represents features (features) such as buildings, rivers, and the ground surface, and road shape data that represents the shape of the road.
  • Two-dimensional or three-dimensional data is displayed on the display screen of the display 414. Is drawn to.
  • the navigation device 400 is guiding a route, the map data and The current position of the vehicle acquired by the GPS unit 416 is displayed in an overlapping manner.
  • the road shape data further includes traffic condition data.
  • the traffic condition data includes, for example, the presence / absence of traffic lights and pedestrian crossings, the presence / absence of highway doorways and junctions, the length (distance) of each link, road width, direction of travel, road type (high speed). Road, toll road, general road, etc.).
  • the traffic condition data is stored with past traffic information obtained by statistically processing the past traffic information based on the time of the season and the day of the week.
  • the navigation device 400 obtains information on traffic jams currently occurring based on road traffic information received by communication IZF415, which will be described later. .
  • the above-described map data is periodically updated.
  • the map data will gradually become old due to the opening of new roads and changes in surrounding facilities. Therefore, the latest information is kept by updating the map data regularly.
  • Force of Map Data Recording In the case of HD, which is an example of the magnetic disk 405, the update data is read from the optical disk 407 on which the update data is recorded, and the map data is updated.
  • the map data is recorded on a portable medium (mainly a disk) such as the optical disk 407, it is updated by exchanging the disk with the latest data.
  • the map data recorded on the HD is updated with the update data recorded on a disk such as a DVD-ROM or CD-ROM.
  • the audio IZF 408 is connected to an audio input microphone 409 and an audio output speaker 410. Audio received by the microphone 409 is AZD converted in the audio IZF408. In addition, sound is output from the speaker 410. Note that the voice input from the microphone 409 can be recorded on the magnetic disk 405 or the optical disk 407 as voice data.
  • examples of the input device 411 include a remote controller, a keyboard, a mouse, and a touch panel that are provided with a plurality of keys for inputting characters, numerical values, various instructions, and the like. Furthermore, the input device 411 connects other information processing terminals such as a digital camera and a mobile phone terminal. Data input / output can be performed.
  • the video IZF 412 is connected to a video input camera 413 and a video output display 414.
  • the video I / F 412 includes, for example, a graphic controller that controls the entire display 414, a buffer memory such as VRAM (Video RAM) that temporarily records image information that can be displayed immediately, and a graphic controller. Based on the output image data, it is configured by a control IC that controls display of the display 414.
  • VRAM Video RAM
  • the camera 413 captures images inside and outside the vehicle and outputs them as image data.
  • An image captured by the camera 413 can be recorded on the magnetic disk 405 or the optical disk 407 as image data.
  • the display 414 displays icons, cursors, menus, windows, or various data such as characters and images.
  • a CRT, a TFT liquid crystal display, a plasma display, or the like can be adopted.
  • the communication IZF 415 is connected to a network via radio and functions as an interface between the navigation device 400 and the CPU 401.
  • the communication IZF 415 is further connected to a communication network such as the Internet via radio and functions as an interface between the communication network and the CPU 401.
  • Communication networks include LANs, WANs, public line networks and mobile phone networks.
  • the communication IZF415 is composed of, for example, an FM tuner, VICS (Vehicle Information and Communication System) Z beacon resino, a wireless navigation device, and other navigation devices. Get road traffic information such as traffic regulations. VICS is a registered trademark.
  • the GPS unit 416 calculates information indicating the current position of the vehicle (the current position of the navigation device 400) using received waves from GPS satellites and output values from various sensors 417 described later.
  • the information indicating the current location is information specifying one point on the map data, for example, latitude / longitude and altitude.
  • the GPS unit 416 outputs an odometer, a speed change amount, and an azimuth change amount using output values from the various sensors 417. This makes it possible to analyze dynamics such as sudden braking and sudden handle.
  • the various sensors 417 are a vehicle speed sensor, an acceleration sensor, an angular velocity sensor, and the like.
  • the output value is used for the calculation of the current point by the GPS unit 416, the measurement of the change in speed and direction, the determination of whether or not to operate the drive recorder function, and the like. Further, the various sensors 417 may detect whether a user operates a vehicle handle or a brake. Furthermore, the output values of various sensors 417 can be used as data to be recorded with the drive recorder function.
  • the identification information acquisition unit 111 and the reading unit 113 are controlled by the optical disk drive 406, and the authentication information acquisition unit 112 is controlled by the communication IZF415.
  • the units 114 realizes its function by the CPU 401.
  • the navigation device 400 updates the map data recorded on the HD with the update data recorded on the disc such as DVD-ROM or CD-ROM.
  • the identification information hereinafter referred to as disk ID
  • the node ID and force uniquely assigned to the navigation device 400 are also generated. Is required.
  • the disk ID is managed by a management server that monitors the information in the disk so that it can be used properly.
  • the management server accepts a password transmission request from the user of each disk, and generates and transmits a password if it is determined that the transmission request is authorized.
  • the management server and the navigation device 400 exchange information (disk ID, hard ID, password, etc.) via the network, for example. Further, for example, information may be exchanged by transporting a recording medium on which such information is recorded.
  • FIG. 5 and FIG. 6 are flowcharts showing the procedure of the map data update process of the navigation device.
  • the navigation apparatus 400 first waits until a disk is inserted into the optical disk drive 406 (step S 501: No loop).
  • step S501: Yes it is determined from the header information of the inserted disc whether or not the map data is recorded on the disc (step S502).
  • step S502: Yes the recorded map data is compared with the currently recorded map data to determine whether or not the version has a newer version (step S502: Yes). S503).
  • the disk ID is also read out from the disk force (step S504).
  • each disk is given a disk ID as unique identification information at the time of shipment from the factory.
  • the disk ID is managed by the management server described later.
  • step S502 when no map data is recorded on the disc (step S502: No), the recorded map data is compared with the currently recorded map data. If not (Step S503: No), the process according to this chart is terminated. It should be noted that the recorded map data is now recorded! If it is not a version, it may be updated if the user wishes.
  • step S504 When the disk ID is read in step S504, the navigation device 400 reads the hard ID recorded in the ROM 402 (step S505) and transmits the disk ID and hard ID to the management server (step S506). . That is, a password transmission request is made to the management server, and the process proceeds to step S507 in FIG.
  • step S507 After transmitting the disk ID and hard ID in step S506, the navigation device 400 waits until the password is returned from the management server (step S507: No loop). For example, the management server calculates a password by calculating a disk ID and a hard ID using a predetermined password generation function. When the password is returned (step S507: Yes), the navigation device 400 verifies the password (step S508).
  • step S509 the same password generation function as that of the management server is saved in advance on the navigation device 400 side, and the disk ID and hard ID are calculated using the password generation function. Calculate the password. The determination is made based on whether or not the password returned from the management server matches the verification password calculated by the navigation device 400.
  • step S509: Yes If the verification is successful (step S509: Yes), the map data recorded on the disk is read (step S510), and the map data recorded on the HD is updated (step S511). The process ends. On the other hand, if collation cannot be performed (step S509: No), an error message is displayed on the display 414 or the like (step S512), and the processing according to this flowchart is terminated.
  • the fact that unauthorized access to the map data has occurred may be transmitted to the management server. If an error message appears, the user may have inserted the wrong disc or entered the wrong node ID. The user will take measures according to the situation.
  • FIG. 7 is a flowchart showing the procedure of the nosword generation process by the management server.
  • the management server issues a disk ID for uniquely identifying each disk to each disk on which map data is recorded (step S701).
  • the management server writes the disk ID corresponding to each disk in the disk management database.
  • the disk management database in addition to the disk ID, for example, whether or not there is a request to send a user password for the disk corresponding to the disk ID, and if there is a transmission request, the navigation that uses that disk.
  • the hard ID of device 400 is written. It is also possible to record the date and time when there was a transmission request and the presence or absence of an unauthorized transmission request.
  • the system waits until it receives a transmission request for a password used to access map data recorded on the disc from navigation device 400 (step S702: No loop).
  • the password transmission request transmitted from the navigation device 400 includes a disk ID and a node ID.
  • the management server extracts the disk ID and the hard ID (step S703), and determines whether or not the transmission request has a legitimate authority (step S704). .
  • Whether or not the transmission power of the authorized authority is required is determined by, for example, using a disk management database. Refer to and determine whether a password has been issued for the corresponding disk ID. If no word is issued yet, it is determined that the transmission request is from a legitimate disk purchaser (legitimate authority). Also, if a password has already been issued, refer to the hard ID corresponding to the issued password, and if it matches the hard ID included in the current transmission request, it is a re-transmission request with a legitimate authority. Judge. On the management server side, it is possible to authenticate only with the navigation device 400 without determining whether or not the transmission request is from a legitimate authorized person! /.
  • Step S704 In the case of a transmission request with a legitimate authority (Step S704: Yes), the management server generates a map data reading password (Step S705), and returns the generated password to the navigation device 400 ( Step S706). Then, the disk management database is updated (step S707), and the processing according to this flowchart is terminated.
  • the disk management database is updated, for example, by writing in the disk management database the presence / absence of a password transmission request for the disk ID and the hard ID of the navigation device 400 that made the transmission request.
  • step S704 if it is not a transmission request from a legitimate authorized person (step S704: No), an error message is returned to the navigation device 400 (step S708), and the processing according to this flowchart is terminated. At this time, the fact that such an unauthorized transmission request has been made may be written in the disk management database.
  • the hard ID is written in the disk management database together with the disk ID.
  • a password transmission request it is determined by a legitimate authorized person depending on whether the hard ID included in the transmission request matches the hard ID recorded in the disk management database. It is determined whether or not the transmission request is possible.
  • the password can be generated by the management server prior to shipping the disk.
  • the map data encrypted using the password (or a value generated separately from the password using the disk ID and hard ID) as the encryption key may be written to the disk.
  • the map data recorded on the disc can be more securely protected.
  • a disk is created based on a password generated from a disk ID uniquely assigned to the disk and a hard ID uniquely assigned to the own device. Read the recorded information. This can prevent the information recorded on the disc from being read indefinitely. In particular, when the information recorded on the disc is confidential information or when the information itself is distributed as a product, it is possible to prevent unauthorized persons from reading the information illegally.
  • information recorded on the disc can be immediately read out by transmitting and receiving the disc ID, the hard ID, and the password via the network. Furthermore, if the hardware ID of the navigation device 400 that uses the map data can be identified with certainty, the map data encrypted with the password as the encryption key is recorded on the disk. It is possible to protect map data recorded on the map more firmly.
  • the information reading method and authentication information generating method described in the present embodiment can be realized by executing a program prepared in advance on a computer such as a personal computer or a workstation. it can.
  • This program is recorded on a computer-readable recording medium such as a hard disk, a flexible disk, a CD-ROM, an MO, and a DVD, and is executed by being read by the computer.
  • This program may also be a transmission medium that can be distributed over a network such as the Internet! /.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Navigation (AREA)

Abstract

An information readout system (100) is provided with an information readout apparatus (110) and an authentication-information generating apparatus (120). An identification-information acquiring section (111) acquires medium-identification information individually assigned to a recording medium (101) on which predetermined information is recorded. An authentication-information acquiring section (112) acquires authentication information generated on bases of medium-identification information and apparatus-identification information individually assigned to itself. A readout section (113) reads out information recorded on the recording medium (101). A readout control section (114) controls the readout section (113) in accordance with the authentication information. A receiving section (121) receives the medium-identification information and the apparatus-identification information from the information readout section (110). A generating section (122) generates authentication information by using the medium-identification information and the apparatus-identification information. A transmitting section (123) transmits the authentication information generated to the information readout apparatus (110).

Description

明 細 書  Specification
情報読取装置、認証情報生成装置、情報読取方法、認証情報生成方法 、情報読取プログラム、認証情報生成プログラムおよび記録媒体  Information reading device, authentication information generating device, information reading method, authentication information generating method, information reading program, authentication information generating program, and recording medium
技術分野  Technical field
[0001] この発明は、移動体によって利用される情報を読み取る際に用いる情報読取装置 The present invention relates to an information reading device used when reading information used by a mobile object
、認証情報生成装置、情報読取方法、認証情報生成方法、情報読取プログラム、認 証情報生成プログラムおよび記録媒体に関する。ただし、この発明の利用は、上述し た情報読取装置、認証情報生成装置、情報読取方法、認証情報生成方法、情報読 取プログラム、認証情報生成プログラムおよび記録媒体に限られな 、。 The present invention relates to an authentication information generating device, an information reading method, an authentication information generating method, an information reading program, an authentication information generating program, and a recording medium. However, the use of the present invention is not limited to the above-described information reading device, authentication information generating device, information reading method, authentication information generating method, information reading program, authentication information generating program, and recording medium.
背景技術  Background art
[0002] 従来、ナビゲーシヨン装置などの車載器で用いるデータ、たとえば、地図データや アプリケーションデータなどの更新は、これらのデータが記録された DVD— ROM、 CD— ROMなどのディスクの交換や、 HD (ノヽードディスク)などに記録されたデータ を更新データによって更新することによっておこなわれている。  [0002] Conventionally, data used in in-vehicle devices such as navigation devices, such as map data and application data, can be updated by exchanging disks such as DVD-ROM, CD-ROM, etc. This is done by updating the data recorded on the (node disk) with updated data.
[0003] このようなデータの更新は、たとえば、道路データ、経路探索データ、経路誘導デ ータのうちの 、ずれのデータ種別か、あるいは背景データのデータ種別の!/、ずれを 更新するかをユーザに指定させる。そして、道路データ、経路探索データ、経路誘導 データのうちのいずれかを更新する場合は、ハードディスクに格納された該当データ 種別の全データを対象に更新し、背景データのデータ種別である場合は、指定され た範囲に該当するブロック単位でデータを更新することによっておこなう(たとえば、 下記特許文献 1参照。)。  [0003] Such data update is, for example, whether the data type of the road data, the route search data, or the route guidance data is a deviation data type, or the background data type is updated! Let the user specify And when updating any of road data, route search data, route guidance data, update all data of the corresponding data type stored in the hard disk, and if it is the data type of background data, This is done by updating data in units of blocks that fall within the specified range (for example, see Patent Document 1 below).
[0004] 特許文献 1:特開 2005— 148004号公報  [0004] Patent Document 1: Japanese Unexamined Patent Application Publication No. 2005-148004
発明の開示  Disclosure of the invention
発明が解決しょうとする課題  Problems to be solved by the invention
[0005] し力しながら、上述した従来技術によれば、更新データの記録された更新ディスク によって更新をおこなう場合、ユーザによって更新ディスクが貸し借りされたり、コピー されたりする可能性があるという問題点が一例として挙げられる。更新ディスクの貸し 借りやコピーによって、不正なデータ更新がおこなわれると、更新ディスクや更新デ ータの販売による収益を得ることができない。このため、たとえば、刻々と変化する道 路状況を反映した地図データのように、最新の情報を提供することが困難になるとい う問題点が一例として挙げられる。 However, according to the above-described conventional technique, there is a possibility that the update disk may be lent out or copied by the user when updating is performed using the update disk in which the update data is recorded. Is given as an example. Lending update disk If illegal data updates are made by borrowing or copying, it is not possible to obtain revenue from sales of update disks or update data. For this reason, for example, there is a problem that it is difficult to provide the latest information, such as map data reflecting the road conditions that change every moment.
[0006] また、更新ディスクに記録されたデータにパスワードや鍵を設定する場合、パスヮー ドゃ鍵を他の媒体に記録して配布しなければならな ヽと 、う問題点が一例として挙げ られる。さらに、ハードディスクをメーカーに送付して、格納されたデータを更新する 場合、更新データのコピーなどは防止できるものの、更新を依頼してから更新が完了 するまでに時間および手間を要し、ユーザの負担となるという問題点が一例として挙 げられる。  [0006] In addition, when setting a password or key for data recorded on an update disk, the problem is that the password must be recorded and distributed on another medium. . In addition, when the stored data is updated by sending the hard disk to the manufacturer, copying of the updated data can be prevented, but it takes time and effort to complete the update after requesting the update. One problem is the burden.
課題を解決するための手段  Means for solving the problem
[0007] 上述した課題を解決し、目的を達成するため、請求項 1の発明にかかる情報読取 装置は、所定の情報が記録された記録媒体に固有に付与された媒体識別情報を取 得する識別情報取得手段と、前記識別情報取得手段によって取得された媒体識別 情報と、自装置に固有に付与された装置識別情報とに基づいて生成された認証情 報を取得する認証情報取得手段と、前記記録媒体に記録された前記所定の情報を 読み取る読取手段と、前記認証情報取得手段によって取得された認証情報に基づ V、て前記読取手段を制御する読取制御手段と、を備えることを特徴とする。  In order to solve the above-described problems and achieve the object, an information reading apparatus according to the invention of claim 1 is an identification for acquiring medium identification information uniquely given to a recording medium on which predetermined information is recorded. An information acquisition means, authentication information acquisition means for acquiring authentication information generated based on the medium identification information acquired by the identification information acquisition means, and device identification information uniquely assigned to the own device; and A reading unit that reads the predetermined information recorded on the recording medium; and a reading control unit that controls the reading unit based on the authentication information acquired by the authentication information acquiring unit. To do.
[0008] また、請求項 4の発明にかかる認証情報生成装置は、所定の情報が記録された記 録媒体に固有に付与された媒体識別情報と、前記記録媒体に記録された情報を読 み取る情報読取装置に固有に付与された装置識別情報とを、当該情報読取装置か ら受信する受信手段と、前記受信手段によって受信された媒体識別情報と装置識別 情報とを用いて、前記記録媒体に記録された前記所定の情報を読み取るための認 証情報を生成する生成手段と、前記生成手段によって生成された認証情報を前記 情報読取装置に送信する送信手段と、を備えることを特徴とする。  [0008] Further, the authentication information generating apparatus according to the invention of claim 4 reads the medium identification information uniquely given to the recording medium on which the predetermined information is recorded, and the information recorded on the recording medium. Using the receiving means for receiving the device identification information inherently given to the information reading device to be taken from the information reading device, and the medium identification information and the device identification information received by the receiving means. Generating means for generating authentication information for reading the predetermined information recorded on the information processing apparatus, and transmitting means for transmitting the authentication information generated by the generating means to the information reading device. .
[0009] また、請求項 5の発明にかかる情報読取方法は、所定の情報が記録された記録媒 体に固有に付与された媒体識別情報を取得する識別情報取得工程と、前記識別情 報取得工程によって取得された媒体識別情報と、自装置に固有に付与された装置 識別情報とに基づいて生成された認証情報を取得する認証情報取得工程と、前記 認証情報取得工程によって取得された認証情報に基づ 、て、前記記録媒体に記録 された前記所定の情報を読み取る読取工程と、を含んだことを特徴とする。 [0009] Further, the information reading method according to the invention of claim 5 includes an identification information acquisition step of acquiring medium identification information uniquely given to a recording medium on which predetermined information is recorded, and the identification information acquisition. Media identification information acquired by the process and device uniquely assigned to the device itself An authentication information acquisition step for acquiring authentication information generated based on the identification information, and reading the predetermined information recorded on the recording medium based on the authentication information acquired by the authentication information acquisition step And a reading process.
[0010] また、請求項 6の発明に力かる認証情報生成方法は、所定の情報が記録された記 録媒体に固有に付与された媒体識別情報と、前記記録媒体に記録された情報を読 み取る情報読取装置に固有に付与された装置識別情報とを、当該情報読取装置か ら受信する受信工程と、前記受信工程によって受信された媒体識別情報と装置識別 情報とを用いて、前記記録媒体に記録された前記所定の情報を読み取るための認 証情報を生成する生成工程と、前記生成工程によって生成された認証情報を前記 情報読取装置に送信する送信工程と、を含んだことを特徴とする。  [0010] Further, the authentication information generating method according to the invention of claim 6 reads the medium identification information uniquely given to the recording medium on which the predetermined information is recorded, and the information recorded on the recording medium. The device identification information uniquely assigned to the information reading device to be read is received from the information reading device, and the medium identification information and device identification information received by the receiving step are used to record the recording information. A generating step for generating authentication information for reading the predetermined information recorded on the medium; and a transmitting step for transmitting the authentication information generated by the generating step to the information reading device. And
[0011] また、請求項 7の発明にかかる情報読取プログラムは、請求項 5に記載の情報読取 方法をコンピュータに実行させることを特徴とする。  [0011] An information reading program according to the invention of claim 7 causes a computer to execute the information reading method according to claim 5.
[0012] また、請求項 8の発明に力かる認証情報生成プログラムは、請求項 6に記載の認証 情報生成方法をコンピュータに実行させることを特徴とする。  [0012] Further, an authentication information generation program according to the invention of claim 8 causes a computer to execute the authentication information generation method of claim 6.
[0013] また、請求項 9の発明に力かる記録媒体は、請求項 7に記載の情報読取プログラム を記録したコンピュータに読み取り可能なことを特徴とする。  [0013] Further, a recording medium according to the invention of claim 9 is readable by a computer in which the information reading program according to claim 7 is recorded.
[0014] また、請求項 10の発明に力かる記録媒体は、請求項 8に記載の認証情報生成プロ グラムを記録したコンピュータに読み取り可能なことを特徴とする。  [0014] Further, a recording medium according to the invention of claim 10 is readable by a computer recording the authentication information generation program according to claim 8.
図面の簡単な説明  Brief Description of Drawings
[0015] [図 1]図 1は、実施の形態に力かる情報読取システムの機能的構成を示すブロック図 である。  [0015] FIG. 1 is a block diagram showing a functional configuration of an information reading system according to an embodiment.
[図 2]図 2は、情報読取装置による情報読取処理の手順を示すフローチャートである  FIG. 2 is a flowchart showing a procedure of information reading processing by the information reading device.
[図 3]図 3は、認証情報生成装置による認証情報生成処理の手順を示すフローチヤ ートである。 FIG. 3 is a flowchart showing a procedure of authentication information generation processing by the authentication information generation device.
[図 4]図 4は、ナビゲーシヨン装置のハードウェア構成を示すブロック図である。  FIG. 4 is a block diagram showing a hardware configuration of the navigation device.
[図 5]図 5は、ナビゲーシヨン装置の地図データ更新処理の手順を示すフローチヤ一 トである。 o [FIG. 5] FIG. 5 is a flowchart showing a procedure of map data update processing of the navigation device. o
[図 6]図 6は、ナビゲーシヨン装置の地図データ更新処理の手順を示すフローチヤ一 トである。  [FIG. 6] FIG. 6 is a flowchart showing the procedure of the map data update process of the navigation device.
 Yes
[図 7]図 7は、管理サーバによるパスワード生成処理の手順を示すフローチャートであ る。  [FIG. 7] FIG. 7 is a flowchart showing a procedure of password generation processing by the management server.
符号の説明  Explanation of symbols
情報読取システム  Information reading system
101 記録媒体  101 recording media
110 情報読取装置  110 Information reader
111 識別情報取得部  111 Identification information acquisition unit
112 認証情報取得部  112 Authentication information acquisition unit
113 読取部  113 Scanning unit
114 読取制御部  114 Reading control unit
120 認証情報生成装置  120 Authentication information generator
121 受信部  121 Receiver
122 生成部  122 generator
123 送信部  123 Transmitter
発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION
[0017] 以下に添付図面を参照して、この発明にかかる情報読取装置、認証情報生成装置 、情報読取方法、認証情報生成方法、情報読取プログラム、認証情報生成プロダラ ムおよび記録媒体の好適な実施の形態を詳細に説明する。  [0017] Hereinafter, referring to the accompanying drawings, preferred embodiments of an information reading device, an authentication information generating device, an information reading method, an authentication information generating method, an information reading program, an authentication information generating program, and a recording medium according to the present invention Will be described in detail.
[0018] (実施の形態)  [0018] (Embodiment)
まず、実施の形態に力かる情報読取システムの機能的構成について説明する。図 1は、実施の形態に力かる情報読取システムの機能的構成を示すブロック図である。 情報読取システム 100は、記録媒体 101に記録された情報を読み取る情報読取装 置 110と、記録媒体 101に記録された所定の情報を読み取るための認証情報を生成 する認証情報生成装置 120によって構成される。  First, a functional configuration of an information reading system that is useful in the embodiment will be described. FIG. 1 is a block diagram showing a functional configuration of an information reading system according to an embodiment. The information reading system 100 includes an information reading device 110 that reads information recorded on the recording medium 101, and an authentication information generating device 120 that generates authentication information for reading predetermined information recorded on the recording medium 101. The
[0019] 情報読取装置 110は、識別情報取得部 111、認証情報取得部 112、読取部 113、 読取制御部 114によって構成される。識別情報取得部 111は、記録媒体 101に固有 に付与された媒体識別情報を取得する。識別情報取得部 111は、たとえば、記録媒 体 101に記録された媒体識別情報を読み出すことによって、媒体識別情報を取得す る。また、識別情報取得部 111は、たとえば、ユーザ力もの入力によって媒体識別情 報を取得することとしてもょ 、。 The information reading apparatus 110 includes an identification information acquisition unit 111, an authentication information acquisition unit 112, a reading unit 113, and a reading control unit 114. The identification information acquisition unit 111 is unique to the recording medium 101. The medium identification information given to is acquired. The identification information acquisition unit 111 acquires the medium identification information by reading the medium identification information recorded on the recording medium 101, for example. Also, the identification information acquisition unit 111 acquires the medium identification information by, for example, user input.
[0020] 認証情報取得部 112は、識別情報取得部 111によって取得された媒体識別情報と 、自装置に固有に付与された装置識別情報とに基づいて生成された認証情報を取 得する。認証情報取得部 112は、たとえば、認証情報生成装置 120に、媒体識別情 報と装置識別情報とを送信し、認証情報生成装置 120によって生成された認証情報 を受信することによって、認証情報を取得する。  The authentication information acquisition unit 112 acquires authentication information generated based on the medium identification information acquired by the identification information acquisition unit 111 and the device identification information uniquely assigned to the own device. For example, the authentication information acquisition unit 112 acquires the authentication information by transmitting the medium identification information and the device identification information to the authentication information generation device 120 and receiving the authentication information generated by the authentication information generation device 120. To do.
[0021] 読取部 113は、記録媒体 101に記録された所定の情報を読み取る。読取制御部 1 14は、認証情報取得部 112によって取得された認証情報に基づ 、て読取部 113を 制御する。読取制御部 114は、たとえば、記録媒体 101に記録された所定の情報を 読み出すためのパスワードとして認証情報を入力し、認証された場合には所定の情 報を読み出す。  The reading unit 113 reads predetermined information recorded on the recording medium 101. The reading control unit 114 controls the reading unit 113 based on the authentication information acquired by the authentication information acquiring unit 112. For example, the reading control unit 114 inputs authentication information as a password for reading predetermined information recorded on the recording medium 101, and reads the predetermined information when authenticated.
[0022] また、記録媒体 101に記録された情報は、認証情報を用いて暗号ィ匕されており、読 取制御部 114は、記録媒体 101に記録された情報を認証情報を用いて復号ィ匕する こととしてもよい。この場合、認証情報は、記録媒体 101に記録された所定の情報の 暗号ィ匕鍵として用いられる。  [0022] The information recorded on the recording medium 101 is encrypted using the authentication information, and the read control unit 114 decrypts the information recorded on the recording medium 101 using the authentication information. It is also possible to hesitate. In this case, the authentication information is used as an encryption key for predetermined information recorded on the recording medium 101.
[0023] つぎに、認証情報生成装置 120の機能的構成について説明する。認証情報生成 装置 120は、受信部 121、生成部 122、送信部 123によって構成される。受信部 121 は、記録媒体 101に固有に付与された媒体識別情報と、記録媒体 101に記録された 情報を読み取る情報読取装置 110に固有に付与された装置識別情報とを、当該情 報読取装置 110から受信する。受信部 121は、たとえば、情報読取装置 110の認証 情報取得部 112によって送信された媒体識別情報および装置識別情報をネットヮー クを介して受信する。  Next, a functional configuration of the authentication information generation device 120 will be described. The authentication information generation device 120 includes a reception unit 121, a generation unit 122, and a transmission unit 123. The receiving unit 121 receives the medium identification information uniquely assigned to the recording medium 101 and the device identification information uniquely assigned to the information reading apparatus 110 that reads the information recorded on the recording medium 101. Receive from 110. For example, the reception unit 121 receives the medium identification information and the device identification information transmitted by the authentication information acquisition unit 112 of the information reading device 110 via the network.
[0024] 生成部 122は、受信部 121によって受信された媒体識別情報と装置識別情報とを 用いて、記録媒体 101に記録された所定の情報を読み取るための認証情報を生成 する。生成部 122は、たとえば、媒体識別情報と装置識別情報とを特定の関数で演 算した値を算出して、記録媒体 101と情報読取装置 110の組合せに固有の認証情 報を生成する。 The generating unit 122 generates authentication information for reading predetermined information recorded on the recording medium 101 using the medium identification information and the device identification information received by the receiving unit 121. For example, the generation unit 122 performs medium identification information and device identification information with a specific function. The calculated value is calculated, and authentication information unique to the combination of the recording medium 101 and the information reading device 110 is generated.
[0025] 送信部 123は、生成部 122によって生成された認証情報を情報読取装置 110に送 信する。送信部 123は、たとえば、媒体識別情報および装置識別情報を送信した情 報読取装置 110の認証情報取得部 112に認証情報をネットワークを介して送信する  The transmission unit 123 transmits the authentication information generated by the generation unit 122 to the information reading device 110. For example, the transmission unit 123 transmits the authentication information to the authentication information acquisition unit 112 of the information reading device 110 that has transmitted the medium identification information and the device identification information via the network.
[0026] なお、情報読取装置 110と認証情報生成装置 120との間の媒体識別情報、装置識 別情報および認証情報のやり取りは、ネットワークを介した送受信に限らず、たとえば 、これらの情報を記録した記録媒体 (記録媒体 101とは別のもの)を運搬することによ つておこなってもよい。 [0026] Note that the exchange of medium identification information, device identification information, and authentication information between the information reading device 110 and the authentication information generating device 120 is not limited to transmission / reception via a network, and for example, the information is recorded. This may be done by transporting the recorded medium (separate from the recording medium 101).
[0027] つぎに、情報読取システム 100による情報読取処理について説明する。情報読取 システム 100は、記録媒体 101に記録された所定の情報を読み取る。このとき、情報 読取装置 110による情報読取処理、および、認証情報生成装置 120による認証情報 生成処理がおこなわれる。  Next, an information reading process by the information reading system 100 will be described. The information reading system 100 reads predetermined information recorded on the recording medium 101. At this time, an information reading process by the information reading apparatus 110 and an authentication information generating process by the authentication information generating apparatus 120 are performed.
[0028] 図 2は、情報読取装置による情報読取処理の手順を示すフローチャートである。図 2のフローチャートにおいて、情報読取装置 110は、まず、識別情報取得部 111によ つて、媒体識別情報を取得する (ステップ S201)。具体的には、たとえば、記録媒体 101に記録された媒体識別情報を読み取る。  FIG. 2 is a flowchart showing a procedure of information reading processing by the information reading device. In the flowchart of FIG. 2, the information reading device 110 first acquires medium identification information by the identification information acquisition unit 111 (step S201). Specifically, for example, the medium identification information recorded on the recording medium 101 is read.
[0029] つぎに、認証情報取得部 112によって、認証情報生成装置 120に、媒体識別情報 と装置識別情報とを送信し (ステップ S202)、認証情報を受信するまで待機する (ス テツプ S203 :Noのループ)。このとき、認証情報生成装置 120は、認証情報生成処 理をおこない、認証情報を生成している。  Next, the authentication information acquisition unit 112 transmits the medium identification information and the device identification information to the authentication information generation device 120 (step S202), and waits until the authentication information is received (step S203: No Loop). At this time, the authentication information generation device 120 performs authentication information generation processing and generates authentication information.
[0030] 認証情報を受信すると (ステップ S 203: Yes)、読取制御部 114は、認証情報に基 づいて読取部 113を制御して、記録媒体 101に記録された所定の情報を読み取って (ステップ S204)、本フローチャートによる処理を終了する。なお、記録媒体 101に記 録された所定の情報が、認証情報を用いて暗号化されている場合、読取制御部 114 は、記録媒体 101に記録された所定の情報を認証情報を用いて復号ィ匕する。以上 のような手順によって、情報読取装置 110は、記録媒体 101に記録された所定の情 報を読み取る。 [0030] Upon receiving the authentication information (step S203: Yes), the reading control unit 114 controls the reading unit 113 based on the authentication information to read predetermined information recorded on the recording medium 101 ( Step S204), the process according to this flowchart is terminated. When the predetermined information recorded on the recording medium 101 is encrypted using the authentication information, the reading control unit 114 decrypts the predetermined information recorded on the recording medium 101 using the authentication information. I'll do it. Through the above procedure, the information reading apparatus 110 performs predetermined information recorded on the recording medium 101. Read the information.
[0031] つぎに、認証情報生成装置 120による認証情報生成処理について説明する。図 3 は、認証情報生成装置による認証情報生成処理の手順を示すフローチャートである 。図 3のフローチャートにおいて、認証情報生成装置 120は、まず、受信部 121によ つて、情報読取装置 110から媒体識別情報と装置識別情報とを受信するまで待機す る(ステップ S 301 : Noのノレープ)。  Next, an authentication information generation process by the authentication information generation device 120 will be described. FIG. 3 is a flowchart showing a procedure of authentication information generation processing by the authentication information generation apparatus. In the flowchart of FIG. 3, the authentication information generating apparatus 120 first waits until the receiving unit 121 receives the medium identification information and the apparatus identification information from the information reading apparatus 110 (Step S 301: No Norep). ).
[0032] 媒体識別情報と装置識別情報とを受信すると (ステップ S301: Yes)、認証情報生 成装置 120は、生成部 122によって、認証情報を生成する (ステップ S302)。そして 、送信部 123によって、ステップ S302で生成した認証情報を送信して (ステップ S30 3)、本フローチャートによる処理を終了する。  When the medium identification information and the device identification information are received (step S301: Yes), the authentication information generating device 120 generates authentication information by the generation unit 122 (step S302). Then, the authentication information generated at step S302 is transmitted by the transmission unit 123 (step S303), and the processing according to this flowchart is terminated.
[0033] 以上説明したように、実施の形態に力かる情報読取システム 100によれば、記録媒 体に固有に付与された媒体識別情報と、自装置に固有に付与された装置識別情報 とから生成された認証情報に基づいて、記録媒体に記録された情報を読み取る。こ れにより、記録媒体に記録された所定の情報が無制限に読み取られるのを防止する ことができる。特に、所定の情報が機密情報である場合や、情報自体を商品として流 通させる場合などは、正当な権限のない者が不正に情報を読み取るのを防止するこ とがでさる。  [0033] As described above, according to the information reading system 100 according to the embodiment, from the medium identification information uniquely given to the recording medium and the device identification information uniquely given to the own apparatus. Based on the generated authentication information, the information recorded on the recording medium is read. As a result, it is possible to prevent the predetermined information recorded on the recording medium from being read indefinitely. In particular, when the prescribed information is confidential information or when the information itself is distributed as a product, it is possible to prevent unauthorized persons from reading the information illegally.
[0034] また、媒体識別情報や装置識別情報、認証情報をネットワークを介して送受信する ことによって、記録媒体に記録された情報を即座に読み出すことができる。さらに、所 定の情報を認証情報を用いて暗号ィ匕することによって、記録媒体に記録された情報 をより強固に保護することができる。  [0034] Further, by transmitting / receiving medium identification information, apparatus identification information, and authentication information via a network, the information recorded on the recording medium can be read immediately. Furthermore, by encrypting predetermined information using authentication information, the information recorded on the recording medium can be more securely protected.
実施例  Example
[0035] つぎに、上述した実施の形態に力かる情報読取システム 100の実施例について説 明する。以下の実施例においては、情報読取システム 100を、車両に搭載されたナ ピゲーシヨン装置 400の地図データの更新に適用した場合について説明する。情報 読取システム 100の構成のうち、記録媒体 101は地図データが記録された DVD—R OM、情報読取装置 110はナビゲーシヨン装置 400、認証情報生成装置 120は図示 しない管理サーバである。 [0036] (ナビゲーシヨン装置 400のハードウェア構成) Next, an example of the information reading system 100 that works on the above-described embodiment will be described. In the following embodiment, a case will be described in which the information reading system 100 is applied to update of map data of the navigation device 400 mounted on a vehicle. In the configuration of the information reading system 100, the recording medium 101 is a DVD-ROM on which map data is recorded, the information reading device 110 is a navigation device 400, and the authentication information generating device 120 is a management server (not shown). [0036] (Hardware configuration of navigation device 400)
まず、ナビゲーシヨン装置 400のハードウェア構成について説明する。図 4は、ナビ ゲーシヨン装置のハードウェア構成を示すブロック図である。図 4において、ナビゲー シヨン装置 400は、 CPU401と、 ROM402と、 RAM (メモリ) 403と、磁気ディスクドラ イブ 404と、磁気ディスク 405と、光ディスクドライブ 406と、光ディスク 407と、音声 1/ F (インターフェース) 408と、マイク 409と、スピーカ 410と、入力デバイス 411と、映 像 IZF412と、カメラ 413と、ディスプレイ 414と、通信 IZF415と、 GPSユニット 416 と、各種センサ 417とを備えている。また、各構成部 401〜417はバス 420によってそ れぞれ接続されている。  First, the hardware configuration of the navigation device 400 will be described. FIG. 4 is a block diagram showing the hardware configuration of the navigation device. In FIG. 4, a navigation device 400 includes a CPU 401, a ROM 402, a RAM (memory) 403, a magnetic disk drive 404, a magnetic disk 405, an optical disk drive 406, an optical disk 407, and an audio 1 / F (interface). 408, a microphone 409, a speaker 410, an input device 411, an image IZF 412, a camera 413, a display 414, a communication IZF 415, a GPS unit 416, and various sensors 417. Each component 401 to 417 is connected by a bus 420.
[0037] まず、 CPU401は、ナビゲーシヨン装置 400の全体の制御を司る。 ROM402は、 ブートプログラム、通信プログラム、データベース作成プログラム、データ解析プログ ラムなどのプログラムを記録している。さらに、 ROM402は、各ナビゲーシヨン装置 4 00を一意に識別する装置識別情報(以下、ハード IDという)を記録している。 RAM4 03は、 CPU401のワークエリアとして使用される。  First, the CPU 401 governs overall control of the navigation device 400. The ROM 402 records programs such as a boot program, a communication program, a database creation program, and a data analysis program. Furthermore, the ROM 402 records device identification information (hereinafter referred to as a hard ID) that uniquely identifies each navigation device 400. RAM403 is used as a work area for CPU401.
[0038] 磁気ディスクドライブ 404は、 CPU401の制御に従って磁気ディスク 405に対する データの読み取り Z書き込みを制御する。磁気ディスク 405は、磁気ディスクドライブ 404の制御で書き込まれたデータを記録する。磁気ディスク 405としては、たとえば、 HD (ノヽードディスク)や FD (フレキシブルディスク)を用いることができる。  The magnetic disk drive 404 controls reading and writing of data to the magnetic disk 405 according to the control of the CPU 401. The magnetic disk 405 records data written under the control of the magnetic disk drive 404. As the magnetic disk 405, for example, HD (node disk) or FD (flexible disk) can be used.
[0039] また、光ディスクドライブ 406は、 CPU401の制御に従って光ディスク 407に対する データの読み取り Z書き込みを制御する。光ディスク 407は、光ディスクドライブ 406 の制御に従ってデータが読み出される着脱自在な記録媒体である。光ディスク 407 は、書き込み可能な記録媒体を利用することもできる。また、この着脱可能な記録媒 体として、光ディスク 407のほ力 MO、メモリカードなどであってもよい。  In addition, the optical disk drive 406 controls data reading / writing to the optical disk 407 in accordance with the control of the CPU 401. The optical disk 407 is a detachable recording medium from which data is read according to the control of the optical disk drive 406. As the optical disc 407, a writable recording medium can be used. Further, the removable recording medium may be a power MO of the optical disc 407, a memory card, or the like.
[0040] 磁気ディスク 405、光ディスク 407に記録される情報の他の一例として、経路探索' 経路誘導などに用いる地図データが挙げられる。地図データは、建物、河川、地表 面などの地物 (フィーチャ)をあらわす背景データと、道路の形状をあらわす道路形 状データとを有しており、ディスプレイ 414の表示画面において 2次元または 3次元に 描画される。ナビゲーシヨン装置 400が経路誘導中の場合は、地図データと後述す る GPSユニット 416によって取得された自車の現在地点とが重ねて表示されることと なる。 [0040] Another example of information recorded on the magnetic disk 405 and the optical disk 407 is route search, map data used for route guidance, and the like. The map data includes background data that represents features (features) such as buildings, rivers, and the ground surface, and road shape data that represents the shape of the road. Two-dimensional or three-dimensional data is displayed on the display screen of the display 414. Is drawn to. When the navigation device 400 is guiding a route, the map data and The current position of the vehicle acquired by the GPS unit 416 is displayed in an overlapping manner.
[0041] 道路形状データは、さらに交通条件データを有する。交通条件データには、たとえ ば、各ノードについて、信号や横断歩道などの有無、高速道路の出入り口やジャンク シヨンの有無、各リンクについての長さ(距離)、道幅、進行方向、道路種別(高速道 路、有料道路、一般道路など)などの情報が含まれている。  [0041] The road shape data further includes traffic condition data. The traffic condition data includes, for example, the presence / absence of traffic lights and pedestrian crossings, the presence / absence of highway doorways and junctions, the length (distance) of each link, road width, direction of travel, road type (high speed). Road, toll road, general road, etc.).
[0042] また、交通条件データには、過去の渋滞情報を、季節 ·曜日'大型連休 '時刻など を基準に統計処理した過去渋滞情報を記憶して 、る。ナビゲーシヨン装置 400は、 後述する通信 IZF415によって受信される道路交通情報によって現在発生している 渋滞の情報を得るが、過去渋滞情報により、指定した時刻における渋滞状況の予想 をおこなうことが可能となる。  [0042] In addition, the traffic condition data is stored with past traffic information obtained by statistically processing the past traffic information based on the time of the season and the day of the week. The navigation device 400 obtains information on traffic jams currently occurring based on road traffic information received by communication IZF415, which will be described later. .
[0043] ここで、上述した地図データは、定期的に更新される。地図データは、あたらしい道 路の開通や、周辺施設の変更などによって、次第に古くなり実用に支障が生じる。こ のため、地図データを定期的に更新することによって、最新の情報を保つようにして いる。地図データが記録されているの力 磁気ディスク 405の一例である HDの場合 は、更新データが記録された光ディスク 407から更新データを読み出して、地図デー タを更新する。また、地図データが記録されているのが光ディスク 407をはじめとする 可搬性を有するメディア(主にディスク)の場合は、最新のデータが記録されたデイス クに交換することによって更新をおこなう。以下、本実施例では、 HDに記録された地 図データを、 DVD— ROMや CD— ROMなどのディスクに記録された更新データに よって更新するものとする。  [0043] Here, the above-described map data is periodically updated. The map data will gradually become old due to the opening of new roads and changes in surrounding facilities. Therefore, the latest information is kept by updating the map data regularly. Force of Map Data Recording In the case of HD, which is an example of the magnetic disk 405, the update data is read from the optical disk 407 on which the update data is recorded, and the map data is updated. In addition, if the map data is recorded on a portable medium (mainly a disk) such as the optical disk 407, it is updated by exchanging the disk with the latest data. Hereinafter, in this embodiment, the map data recorded on the HD is updated with the update data recorded on a disk such as a DVD-ROM or CD-ROM.
[0044] また、音声 IZF408は、音声入力用のマイク 409および音声出力用のスピーカ 41 0に接続される。マイク 409に受音された音声は、音声 IZF408内で AZD変換され る。また、スピーカ 410からは音声が出力される。なお、マイク 409から入力された音 声は、音声データとして磁気ディスク 405あるいは光ディスク 407に記録可能である。  The audio IZF 408 is connected to an audio input microphone 409 and an audio output speaker 410. Audio received by the microphone 409 is AZD converted in the audio IZF408. In addition, sound is output from the speaker 410. Note that the voice input from the microphone 409 can be recorded on the magnetic disk 405 or the optical disk 407 as voice data.
[0045] また、入力デバイス 411は、文字、数値、各種指示などの入力のための複数のキー を備えたリモコン、キーボード、マウス、タツチパネルなどが挙げられる。さらに、入力 デバイス 411は、デジタルカメラや携帯電話端末などの他の情報処理端末を接続し 、データの入出力をおこなうことができる。 [0045] In addition, examples of the input device 411 include a remote controller, a keyboard, a mouse, and a touch panel that are provided with a plurality of keys for inputting characters, numerical values, various instructions, and the like. Furthermore, the input device 411 connects other information processing terminals such as a digital camera and a mobile phone terminal. Data input / output can be performed.
[0046] また、映像 IZF412は、映像入力用のカメラ 413および映像出力用のディスプレイ 414と接続される。映像 I/F412は、具体的には、たとえば、ディスプレイ 414全体の 制御をおこなうグラフィックコントローラと、即時表示可能な画像情報を一時的に記録 する VRAM (Video RAM)などのバッファメモリと、グラフィックコントローラから出力 される画像データに基づ 、て、ディスプレイ 414を表示制御する制御 ICなどによって 構成される。  The video IZF 412 is connected to a video input camera 413 and a video output display 414. Specifically, the video I / F 412 includes, for example, a graphic controller that controls the entire display 414, a buffer memory such as VRAM (Video RAM) that temporarily records image information that can be displayed immediately, and a graphic controller. Based on the output image data, it is configured by a control IC that controls display of the display 414.
[0047] カメラ 413は、車両内外の映像を撮像し、画像データとして出力する。カメラ 413で 撮像された画像は、画像データとして磁気ディスク 405あるいは光ディスク 407に記 録可能である。ディスプレイ 414には、アイコン、カーソル、メニュー、ウィンドウ、ある いは文字や画像などの各種データが表示される。このディスプレイ 414は、たとえば、 CRT, TFT液晶ディスプレイ、プラズマディスプレイなどを採用することができる。  [0047] The camera 413 captures images inside and outside the vehicle and outputs them as image data. An image captured by the camera 413 can be recorded on the magnetic disk 405 or the optical disk 407 as image data. The display 414 displays icons, cursors, menus, windows, or various data such as characters and images. As this display 414, for example, a CRT, a TFT liquid crystal display, a plasma display, or the like can be adopted.
[0048] また、通信 IZF415は、無線を介してネットワークに接続され、ナビゲーシヨン装置 400と CPU401とのインターフェースとして機能する。通信 IZF415は、さらに、無線 を介してインターネットなどの通信網に接続され、この通信網と CPU401とのインター フェースとしても機能する。  In addition, the communication IZF 415 is connected to a network via radio and functions as an interface between the navigation device 400 and the CPU 401. The communication IZF 415 is further connected to a communication network such as the Internet via radio and functions as an interface between the communication network and the CPU 401.
[0049] 通信網には、 LAN, WAN,公衆回線網や携帯電話網などがある。具体的には、 通信 IZF415は、たとえば、 FMチューナー、 VICS (Vehicle Information and Communication System) Zビーコンレシーノ 、無線ナビゲーシヨン装置、および その他のナビゲーシヨン装置によって構成され、 VICSセンター力も配信される渋滞 や交通規制などの道路交通情報を取得する。なお、 VICSは登録商標である。  [0049] Communication networks include LANs, WANs, public line networks and mobile phone networks. Specifically, the communication IZF415 is composed of, for example, an FM tuner, VICS (Vehicle Information and Communication System) Z beacon resino, a wireless navigation device, and other navigation devices. Get road traffic information such as traffic regulations. VICS is a registered trademark.
[0050] また、 GPSユニット 416は、 GPS衛星からの受信波や後述する各種センサ 417から の出力値を用いて、車両の現在地点(ナビゲーシヨン装置 400の現在地点)を示す 情報を算出する。現在地点を示す情報は、たとえば緯度'経度、高度などの、地図デ ータ上の 1点を特定する情報である。また、 GPSユニット 416は、各種センサ 417から の出力値を用いて、オドメーター、速度変化量、方位変化量を出力する。これにより、 急ブレーキ、急ノヽンドルなどの動態を解析することができる。  [0050] In addition, the GPS unit 416 calculates information indicating the current position of the vehicle (the current position of the navigation device 400) using received waves from GPS satellites and output values from various sensors 417 described later. The information indicating the current location is information specifying one point on the map data, for example, latitude / longitude and altitude. Further, the GPS unit 416 outputs an odometer, a speed change amount, and an azimuth change amount using output values from the various sensors 417. This makes it possible to analyze dynamics such as sudden braking and sudden handle.
[0051] また、各種センサ 417は、車速センサや加速度センサ、角速度センサなどであり、 その出力値は、 GPSユニット 416による現在地点の算出や、速度や方位の変化量の 測定、ドライブレコーダ機能を動作させるか否かの判断などに用いられる。また、各種 センサ 417は、ユーザによる車両のハンドルやブレーキなどの操作の緩急を検知す るものであってもよい。さらに、各種センサ 417の出力値を、ドライブレコーダ機能で 記録するデータとしてもよ 、。 [0051] The various sensors 417 are a vehicle speed sensor, an acceleration sensor, an angular velocity sensor, and the like. The output value is used for the calculation of the current point by the GPS unit 416, the measurement of the change in speed and direction, the determination of whether or not to operate the drive recorder function, and the like. Further, the various sensors 417 may detect whether a user operates a vehicle handle or a brake. Furthermore, the output values of various sensors 417 can be used as data to be recorded with the drive recorder function.
[0052] なお、実施の形態に力かる情報読取装置 110の機能的構成のうち、識別情報取得 部 111および読取部 113は、光ディスクドライブ 406によって、認証情報取得部 112 は通信 IZF415によって、読取制御部 114は CPU401によって、それぞれその機能 を実現する。 Of the functional configuration of the information reading apparatus 110 according to the embodiment, the identification information acquisition unit 111 and the reading unit 113 are controlled by the optical disk drive 406, and the authentication information acquisition unit 112 is controlled by the communication IZF415. Each of the units 114 realizes its function by the CPU 401.
[0053] (ナビゲーシヨン装置 400の地図データ更新処理)  [0053] (Map data update process of navigation device 400)
つぎに、ナビゲーシヨン装置 400の地図データ更新処理について説明する。前述 のように、ナビゲーシヨン装置 400は、 HDに記録された地図データを、 DVD— RO Mや CD— ROMなどのディスクに記録された更新データによって更新する。ディスク に記録された更新データを読み出すには、ディスクに固有に付与された識別情報( 以下、ディスク IDという)と、ナビゲーシヨン装置 400に固有に付与されたノヽード IDと 力も生成されたパスワードが必要となる。  Next, the map data update process of the navigation device 400 will be described. As described above, the navigation device 400 updates the map data recorded on the HD with the update data recorded on the disc such as DVD-ROM or CD-ROM. To read the update data recorded on the disk, the identification information (hereinafter referred to as disk ID) uniquely assigned to the disk and the node ID and force uniquely assigned to the navigation device 400 are also generated. Is required.
[0054] ディスク IDは、ディスク内の情報が正当に利用されるよう監視する管理サーバによ つて管理されている。管理サーバは、各ディスクのユーザからパスワードの送信要求 を受け付け、正当な権限者力もの送信要求と判断した場合には、パスワードを生成 · 送信する。管理サーバとナビゲーシヨン装置 400とは、たとえば、ネットワークを介して 情報(ディスク ID、ハード ID、パスワードなど)のやり取りをおこなう。また、たとえば、 これらの情報が記録された記録媒体を運搬することによって、情報のやり取りをおこ なってもよい。  [0054] The disk ID is managed by a management server that monitors the information in the disk so that it can be used properly. The management server accepts a password transmission request from the user of each disk, and generates and transmits a password if it is determined that the transmission request is authorized. The management server and the navigation device 400 exchange information (disk ID, hard ID, password, etc.) via the network, for example. Further, for example, information may be exchanged by transporting a recording medium on which such information is recorded.
[0055] 図 5および図 6は、ナビゲーシヨン装置の地図データ更新処理の手順を示すフロー チャートである。図 5のフローチャートにおいて、ナビゲーシヨン装置 400は、まず、光 ディスクドライブ 406にディスクが挿入されるまで待機する(ステップ S 501: Noのルー プ)。ディスクが挿入されると (ステップ S501 : Yes)、挿入されたディスクのヘッダ情報 などから、ディスクに地図データが記録されている力否かを判断する (ステップ S502) [0056] 地図データが記録されている場合は (ステップ S502 : Yes)、記録されている地図 データが、現在記録されている地図データと比較して、よりあたらしいバージョン力否 かを判断する(ステップ S503)。よりあたらしいバージョンの場合は (ステップ S503 :Y es)、ディスク力もディスク IDを読み出す (ステップ S504)。ここで、各ディスクには、ェ 場出荷時に固有の識別情報としてディスク IDが付与されている。ディスク IDは、後述 する管理サーバによって管理されている。 FIG. 5 and FIG. 6 are flowcharts showing the procedure of the map data update process of the navigation device. In the flowchart of FIG. 5, the navigation apparatus 400 first waits until a disk is inserted into the optical disk drive 406 (step S 501: No loop). When the disc is inserted (step S501: Yes), it is determined from the header information of the inserted disc whether or not the map data is recorded on the disc (step S502). [0056] When the map data is recorded (step S502: Yes), the recorded map data is compared with the currently recorded map data to determine whether or not the version has a newer version (step S502: Yes). S503). In the case of a newer version (step S503: Yes), the disk ID is also read out from the disk force (step S504). Here, each disk is given a disk ID as unique identification information at the time of shipment from the factory. The disk ID is managed by the management server described later.
[0057] 一方、ステップ S502において、ディスクに地図データが記録されていない場合や( ステップ S502 :No)、記録されている地図データが現在記録されている地図データ と比較して、よりあたらしいバージョンではない場合は(ステップ S503 : No)、本フ口 一チャートによる処理を終了する。なお、記録されている地図データが現在記録され て!、る地図データよりあたらし 、バージョンではな 、場合であっても、ユーザが希望 する場合には更新処理をおこなってもよい。  [0057] On the other hand, in step S502, when no map data is recorded on the disc (step S502: No), the recorded map data is compared with the currently recorded map data. If not (Step S503: No), the process according to this chart is terminated. It should be noted that the recorded map data is now recorded! If it is not a version, it may be updated if the user wishes.
[0058] ステップ S504でディスク IDを読み出した場合、ナビゲーシヨン装置 400は、 ROM4 02に記録されたハード IDを読み出し (ステップ S505)、管理サーバにディスク IDお よびハード IDを送信する(ステップ S506)。すなわち、管理サーバにパスワードの送 信要求をおこない、図 6のステップ S507〖こ移行する。  When the disk ID is read in step S504, the navigation device 400 reads the hard ID recorded in the ROM 402 (step S505) and transmits the disk ID and hard ID to the management server (step S506). . That is, a password transmission request is made to the management server, and the process proceeds to step S507 in FIG.
[0059] 図 6の説明に移り、ステップ S506でディスク IDおよびハード IDを送信した後、ナビ ゲーシヨン装置 400は、管理サーノ からパスワードが返送されるまで待機する(ステツ プ S507 :Noのループ)。管理サーバは、たとえば、ディスク IDとハード IDとを所定の ノ スワード生成用関数で演算してパスワードを算出する。パスワードが返送されると( ステップ S507 : Yes)、ナビゲーシヨン装置 400は、パスワードの照合をおこなう(ステ ップ S 508)。  [0059] Turning to FIG. 6, after transmitting the disk ID and hard ID in step S506, the navigation device 400 waits until the password is returned from the management server (step S507: No loop). For example, the management server calculates a password by calculating a disk ID and a hard ID using a predetermined password generation function. When the password is returned (step S507: Yes), the navigation device 400 verifies the password (step S508).
[0060] ノ スワードの照合は、たとえば、あらかじめナビゲーシヨン装置 400側で、管理サー ノ と同じパスワード生成用関数を保存しておき、ディスク IDとハード IDとをパスワード 生成用関数で演算して照合用パスワードを算出する。そして、管理サーバから返送さ れたパスワードと、ナビゲーシヨン装置 400で算出した照合用パスワードが一致する か否かによって判断する。 [0061] 照合できた場合は (ステップ S509: Yes)、ディスクに記録された地図データを読み 出して (ステップ S510)、 HDに記録された地図データを更新して (ステップ S511)、 本フローチャートによる処理を終了する。一方、照合できない場合は (ステップ S509 : No)、ディスプレイ 414などにエラーメッセージを表示させ (ステップ S512)、本フロ 一チャートによる処理を終了する。 [0060] For password verification, for example, the same password generation function as that of the management server is saved in advance on the navigation device 400 side, and the disk ID and hard ID are calculated using the password generation function. Calculate the password. The determination is made based on whether or not the password returned from the management server matches the verification password calculated by the navigation device 400. [0061] If the verification is successful (step S509: Yes), the map data recorded on the disk is read (step S510), and the map data recorded on the HD is updated (step S511). The process ends. On the other hand, if collation cannot be performed (step S509: No), an error message is displayed on the display 414 or the like (step S512), and the processing according to this flowchart is terminated.
[0062] また、このとき、地図データへの不正なアクセスが発生した旨を管理サーバに送信 することとしてもよい。エラーメッセージが表示された場合、ユーザは誤ったディスクを 挿入したり、誤ったノヽード IDを入力した可能性がある。ユーザは、それぞれの状況に 応じた対策を講じることとなる。  [0062] At this time, the fact that unauthorized access to the map data has occurred may be transmitted to the management server. If an error message appears, the user may have inserted the wrong disc or entered the wrong node ID. The user will take measures according to the situation.
[0063] つぎに、管理サーバによるパスワード生成処理について説明する。図 7は、管理サ ーバによるノ スワード生成処理の手順を示すフローチャートである。以下の説明では 、ディスク出荷時には、地図データを利用するナビゲーシヨン装置 400が特定されて いない場合の処理について説明する。図 7のフローチャートにおいて、管理サーバは 、地図データが記録された各ディスクに対して、それぞれのディスクを一意に識別す るディスク IDを発行する(ステップ S701)。  Next, password generation processing by the management server will be described. FIG. 7 is a flowchart showing the procedure of the nosword generation process by the management server. In the following description, processing when the navigation device 400 that uses map data is not specified at the time of disk shipment will be described. In the flowchart of FIG. 7, the management server issues a disk ID for uniquely identifying each disk to each disk on which map data is recorded (step S701).
[0064] このとき、管理サーバは、ディスク管理用データベースに各ディスクに対応するディ スク IDを書き込む。ディスク管理用データベースには、ディスク IDの他、たとえば、デ イスク IDに対応したディスクのユーザ力 パスワードの送信要求があつたか否力、送 信要求があった場合は、そのディスクを利用するナビゲーシヨン装置 400のハード ID が書き込まれる。また、送信要求があった日時や不正な送信要求の有無などを記録 してちよい。  At this time, the management server writes the disk ID corresponding to each disk in the disk management database. In the disk management database, in addition to the disk ID, for example, whether or not there is a request to send a user password for the disk corresponding to the disk ID, and if there is a transmission request, the navigation that uses that disk. The hard ID of device 400 is written. It is also possible to record the date and time when there was a transmission request and the presence or absence of an unauthorized transmission request.
[0065] つぎに、ナビゲーシヨン装置 400からディスクに記録された地図データへのアクセス に用いるパスワードの送信要求を受信するまで待機する (ステップ S702 : Noのルー プ)。ナビゲーシヨン装置 400から送信されるパスワードの送信要求には、ディスク ID およびノヽード IDが含まれて 、る。パスワードの送信要求を受信すると (ステップ S702 : Yes)、管理サーバは、ディスク IDおよびハード IDを抽出し (ステップ S 703)、正当 な権限者力もの送信要求力否かを判断する (ステップ S704)。  Next, the system waits until it receives a transmission request for a password used to access map data recorded on the disc from navigation device 400 (step S702: No loop). The password transmission request transmitted from the navigation device 400 includes a disk ID and a node ID. When the password transmission request is received (step S702: Yes), the management server extracts the disk ID and the hard ID (step S703), and determines whether or not the transmission request has a legitimate authority (step S704). .
[0066] 正当な権限者力 の送信要求力否かは、たとえば、ディスク管理用データベースを 参照し、該当するディスク IDに対してパスワードが発行されているかを判断する。まだ ノ スワードが発行されて 、な 、場合は、正規のディスク購入者 (正当な権限者)から の送信要求と判断する。また、すでにパスワードが発行されている場合、発行された パスワードに対応するハード IDを参照し、今回の送信要求に含まれるハード IDと一 致すれば、正当な権限者力もの再送信要求であると判断する。なお、管理サーバ側 では、正当な権限者からの送信要求か否かの判断をおこなわず、ナビゲーシヨン装 置 400のみで認証してもよ!/、。 [0066] Whether or not the transmission power of the authorized authority is required is determined by, for example, using a disk management database. Refer to and determine whether a password has been issued for the corresponding disk ID. If no word is issued yet, it is determined that the transmission request is from a legitimate disk purchaser (legitimate authority). Also, if a password has already been issued, refer to the hard ID corresponding to the issued password, and if it matches the hard ID included in the current transmission request, it is a re-transmission request with a legitimate authority. Judge. On the management server side, it is possible to authenticate only with the navigation device 400 without determining whether or not the transmission request is from a legitimate authorized person! /.
[0067] 正当な権限者力もの送信要求の場合 (ステップ S704 : Yes)、管理サーバは、地図 データ読取用のパスワードを生成し (ステップ S705)、生成したパスワードをナビゲー シヨン装置 400に返送する(ステップ S706)。そして、ディスク管理用データベースを 更新して (ステップ S707)、本フローチャートによる処理を終了する。ディスク管理用 データベースの更新は、たとえば、ディスク IDに対するパスワードの送信要求の有無 や送信要求をおこなったナビゲーシヨン装置 400のハード IDを、ディスク管理用デー タベースに書き込むことによっておこなう。  [0067] In the case of a transmission request with a legitimate authority (Step S704: Yes), the management server generates a map data reading password (Step S705), and returns the generated password to the navigation device 400 ( Step S706). Then, the disk management database is updated (step S707), and the processing according to this flowchart is terminated. The disk management database is updated, for example, by writing in the disk management database the presence / absence of a password transmission request for the disk ID and the hard ID of the navigation device 400 that made the transmission request.
[0068] 一方、正当な権限者からの送信要求ではない場合は (ステップ S704 :No)、ナビゲ ーシヨン装置 400にエラーメッセージを返送して(ステップ S708)、本フローチャート による処理を終了する。このとき、このような不正な送信要求がおこなわれた旨をディ スク管理用データベースに書き込むこととしてもょ 、。  On the other hand, if it is not a transmission request from a legitimate authorized person (step S704: No), an error message is returned to the navigation device 400 (step S708), and the processing according to this flowchart is terminated. At this time, the fact that such an unauthorized transmission request has been made may be written in the disk management database.
[0069] なお、ディスク出荷前に、地図データを利用するナビゲーシヨン装置 400が特定さ れている場合は、ディスク管理用データベースにディスク IDとともにハード IDを書き 込んでおく。そして、パスワードの送信要求があった際には、送信要求に含まれるハ ード IDとディスク管理用データベースに記録されたハード IDとが一致するか否かによ つて、正当な権限者力もの送信要求力否かを判断する。  [0069] If the navigation device 400 that uses the map data is specified before shipping the disk, the hard ID is written in the disk management database together with the disk ID. When a password transmission request is made, it is determined by a legitimate authorized person depending on whether the hard ID included in the transmission request matches the hard ID recorded in the disk management database. It is determined whether or not the transmission request is possible.
[0070] また、この場合、ディスク出荷前にあら力じめ管理サーバでパスワードを生成するこ とができる。このため、パスワード (もしくは、ディスク IDおよびハード IDを用いて、パス ワードとは別に生成した値)を暗号ィ匕鍵として暗号ィ匕した地図データを、ディスクに書 き込むこととしてもよい。これにより、ディスクに記録された地図データをより強固に保 護することができる。 [0071] 以上説明したように、ナビゲーシヨン装置 400によれば、ディスクに固有に付与され たディスク IDと、自装置に固有に付与されたハード IDとから生成されたパスワードに 基づいて、ディスクに記録された情報を読み取る。これにより、ディスクに記録された 情報が無制限に読み取られるのを防止することができる。特に、ディスクに記録され た情報が機密情報である場合や、情報自体を商品として流通させる場合などは、正 当な権限のない者が不正に情報を読み取るのを防止することができる。 [0070] In this case, the password can be generated by the management server prior to shipping the disk. For this reason, the map data encrypted using the password (or a value generated separately from the password using the disk ID and hard ID) as the encryption key may be written to the disk. As a result, the map data recorded on the disc can be more securely protected. [0071] As described above, according to the navigation device 400, a disk is created based on a password generated from a disk ID uniquely assigned to the disk and a hard ID uniquely assigned to the own device. Read the recorded information. This can prevent the information recorded on the disc from being read indefinitely. In particular, when the information recorded on the disc is confidential information or when the information itself is distributed as a product, it is possible to prevent unauthorized persons from reading the information illegally.
[0072] また、ディスク IDやハード ID、パスワードをネットワークを介して送受信することによ つて、ディスクに記録された情報を即座に読み出すことができる。さらに、地図データ を利用するナビゲーシヨン装置 400のハード IDがあら力じめ特定できている場合に は、パスワードを暗号鍵として暗号ィ匕した地図データをディスクに記録することによつ て、ディスクに記録された地図データをより強固に保護することができる。  [0072] In addition, information recorded on the disc can be immediately read out by transmitting and receiving the disc ID, the hard ID, and the password via the network. Furthermore, if the hardware ID of the navigation device 400 that uses the map data can be identified with certainty, the map data encrypted with the password as the encryption key is recorded on the disk. It is possible to protect map data recorded on the map more firmly.
[0073] なお、本実施の形態で説明した情報読取方法および認証情報生成方法は、あらか じめ用意されたプログラムをパーソナル 'コンピュータやワークステーションなどのコン ピュータで実行することにより実現することができる。このプログラムは、ハードディスク 、フレキシブルディスク、 CD— ROM、 MO、 DVDなどのコンピュータで読み取り可 能な記録媒体に記録され、コンピュータによって記録媒体力 読み出されることによ つて実行される。またこのプログラムは、インターネットなどのネットワークを介して配布 することが可能な伝送媒体であってもよ!/、。  Note that the information reading method and authentication information generating method described in the present embodiment can be realized by executing a program prepared in advance on a computer such as a personal computer or a workstation. it can. This program is recorded on a computer-readable recording medium such as a hard disk, a flexible disk, a CD-ROM, an MO, and a DVD, and is executed by being read by the computer. This program may also be a transmission medium that can be distributed over a network such as the Internet! /.

Claims

請求の範囲 The scope of the claims
[1] 所定の情報が記録された記録媒体に固有に付与された媒体識別情報を取得する 識別情報取得手段と、  [1] Identification information acquisition means for acquiring medium identification information uniquely assigned to a recording medium on which predetermined information is recorded;
前記識別情報取得手段によって取得された媒体識別情報と、自装置に固有に付 与された装置識別情報とに基づいて生成された認証情報を取得する認証情報取得 手段と、  Authentication information acquisition means for acquiring authentication information generated based on the medium identification information acquired by the identification information acquisition means and the device identification information uniquely given to the own device;
前記記録媒体に記録された前記所定の情報を読み取る読取手段と、 前記認証情報取得手段によって取得された認証情報に基づいて前記読取手段を 制御する読取制御手段と、  Reading means for reading the predetermined information recorded on the recording medium; reading control means for controlling the reading means based on authentication information acquired by the authentication information acquisition means;
を備えることを特徴とする情報読取装置。  An information reading apparatus comprising:
[2] 前記認証情報取得手段は、  [2] The authentication information acquisition means includes:
前記記録媒体に記録された前記所定の情報を読み取るための認証情報を生成す る認証情報生成装置に前記媒体識別情報と前記装置識別情報とを送信し、前記認 証情報生成装置から前記認証情報を受信することを特徴とする請求項 1に記載の情 報読取装置。  The medium identification information and the device identification information are transmitted to an authentication information generation device that generates authentication information for reading the predetermined information recorded on the recording medium, and the authentication information generation device transmits the authentication information. The information reading apparatus according to claim 1, wherein the information reading apparatus receives the information.
[3] 前記記録媒体に記録された前記所定の情報は前記認証情報を用いて暗号化され ており、  [3] The predetermined information recorded on the recording medium is encrypted using the authentication information,
前記読取制御手段は、  The reading control means includes
前記記録媒体に記録された前記所定の情報を前記認証情報を用いて復号化する ことを特徴とする請求項 1または 2に記載の情報読取装置。  3. The information reading apparatus according to claim 1, wherein the predetermined information recorded on the recording medium is decrypted using the authentication information.
[4] 所定の情報が記録された記録媒体に固有に付与された媒体識別情報と、前記記 録媒体に記録された情報を読み取る情報読取装置に固有に付与された装置識別情 報とを、当該情報読取装置から受信する受信手段と、 [4] Medium identification information uniquely assigned to a recording medium on which predetermined information is recorded, and apparatus identification information uniquely assigned to an information reading apparatus that reads information recorded on the recording medium. Receiving means for receiving from the information reading device;
前記受信手段によって受信された媒体識別情報と装置識別情報とを用いて、前記 記録媒体に記録された前記所定の情報を読み取るための認証情報を生成する生成 手段と、  Generating means for generating authentication information for reading the predetermined information recorded on the recording medium, using the medium identification information and the apparatus identification information received by the receiving means;
前記生成手段によって生成された認証情報を前記情報読取装置に送信する送信 手段と、 を備えることを特徴とする認証情報生成装置。 Transmitting means for transmitting the authentication information generated by the generating means to the information reading device; An authentication information generating apparatus comprising:
[5] 所定の情報が記録された記録媒体に固有に付与された媒体識別情報を取得する 識別情報取得工程と、 [5] An identification information acquisition step of acquiring medium identification information uniquely given to a recording medium on which predetermined information is recorded;
前記識別情報取得工程によって取得された媒体識別情報と、自装置に固有に付 与された装置識別情報とに基づいて生成された認証情報を取得する認証情報取得 工程と、  An authentication information acquisition step of acquiring authentication information generated based on the medium identification information acquired by the identification information acquisition step and the device identification information uniquely given to the own device;
前記認証情報取得工程によって取得された認証情報に基づ 、て、前記記録媒体 に記録された前記所定の情報を読み取る読取工程と、  Based on the authentication information acquired by the authentication information acquisition step, the reading step of reading the predetermined information recorded on the recording medium;
を含んだことを特徴とする情報読取方法。  An information reading method comprising:
[6] 所定の情報が記録された記録媒体に固有に付与された媒体識別情報と、前記記 録媒体に記録された情報を読み取る情報読取装置に固有に付与された装置識別情 報とを、当該情報読取装置から受信する受信工程と、 [6] Medium identification information uniquely assigned to a recording medium on which predetermined information is recorded, and apparatus identification information uniquely assigned to an information reading apparatus that reads information recorded on the recording medium. A receiving step for receiving from the information reading device;
前記受信工程によって受信された媒体識別情報と装置識別情報とを用いて、前記 記録媒体に記録された前記所定の情報を読み取るための認証情報を生成する生成 工程と、  A generating step of generating authentication information for reading the predetermined information recorded on the recording medium, using the medium identification information and the device identification information received by the receiving step;
前記生成工程によって生成された認証情報を前記情報読取装置に送信する送信 工程と、  A transmitting step of transmitting the authentication information generated by the generating step to the information reading device;
を含んだことを特徴とする認証情報生成方法。  An authentication information generation method characterized by comprising:
[7] 請求項 5に記載の情報読取方法をコンピュータに実行させることを特徴とする情報 読取プログラム。 7. An information reading program causing a computer to execute the information reading method according to claim 5.
[8] 請求項 6に記載の認証情報生成方法をコンピュータに実行させることを特徴とする 認証情報生成プログラム。  [8] An authentication information generation program causing a computer to execute the authentication information generation method according to claim 6.
[9] 請求項 7に記載の情報読取プログラムを記録したコンピュータに読み取り可能な記 録媒体。 [9] A computer-readable recording medium in which the information reading program according to claim 7 is recorded.
[10] 請求項 8に記載の認証情報生成プログラムを記録したコンピュータに読み取り可能 な記録媒体。  [10] A computer-readable recording medium on which the authentication information generating program according to claim 8 is recorded.
PCT/JP2006/323351 2005-11-24 2006-11-22 Information readout apparatus, authentication-information generating apparatus, information readout method, authentication-information generating method, information readout program, authentication-information generating program, and recording medium WO2007061006A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2005338640 2005-11-24
JP2005-338640 2005-11-24

Publications (1)

Publication Number Publication Date
WO2007061006A1 true WO2007061006A1 (en) 2007-05-31

Family

ID=38067231

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/323351 WO2007061006A1 (en) 2005-11-24 2006-11-22 Information readout apparatus, authentication-information generating apparatus, information readout method, authentication-information generating method, information readout program, authentication-information generating program, and recording medium

Country Status (1)

Country Link
WO (1) WO2007061006A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009289267A (en) * 2008-05-28 2009-12-10 Sony Dadc Austria Ag Method for controlling access to content on data carrier

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003323348A (en) * 2002-05-07 2003-11-14 Matsushita Electric Ind Co Ltd Apparatus adaptable to electronic data distribution system for prevending illicit use
JP2004139473A (en) * 2002-10-18 2004-05-13 Toshiba Corp Content recording device, reproduction device, record reproduction device, and storage medium
JP2005284506A (en) * 2004-03-29 2005-10-13 Matsushita Electric Ind Co Ltd Download system, apparatus constituting download system, management station, and removable medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003323348A (en) * 2002-05-07 2003-11-14 Matsushita Electric Ind Co Ltd Apparatus adaptable to electronic data distribution system for prevending illicit use
JP2004139473A (en) * 2002-10-18 2004-05-13 Toshiba Corp Content recording device, reproduction device, record reproduction device, and storage medium
JP2005284506A (en) * 2004-03-29 2005-10-13 Matsushita Electric Ind Co Ltd Download system, apparatus constituting download system, management station, and removable medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009289267A (en) * 2008-05-28 2009-12-10 Sony Dadc Austria Ag Method for controlling access to content on data carrier

Similar Documents

Publication Publication Date Title
JP4633747B2 (en) Information distribution system and information distribution method
JP5118793B2 (en) Service provision system
JP6498304B2 (en) Map information management system, map information management device, map company dedicated application data management device, and vehicle data management device
WO2014045699A1 (en) Sensor share control device, method, and computer program
JP2009038586A (en) Location authentication system
JP6997557B2 (en) Valet parking system, program
JPWO2011099076A1 (en) Map display device
CN113678182A (en) System for traffic signal authentication and password hardening method
US7991862B2 (en) Content purchasing and distributing method
US8683606B2 (en) Navigation system
US9317665B2 (en) Service management apparatus, program, and service management method
CN115803796A (en) System and method for detecting a pole attack for a vehicle
WO2007061006A1 (en) Information readout apparatus, authentication-information generating apparatus, information readout method, authentication-information generating method, information readout program, authentication-information generating program, and recording medium
JP5348502B2 (en) Navigation system
JP2002109593A (en) Radiocommunication equipment and method of information change
JP6360854B2 (en) Beacon device authentication system, portable terminal device, beacon device, beacon device installation system, beacon device authentication method, beacon device installation method, beacon device authentication program, and beacon device installation program
JP2006276932A (en) On-vehicle equipment setup system, on-vehicle equipment setup method, setup device and its control method, and on-vehicle equipment, its control method, control program and recording medium
JP2007164306A (en) Location certification system, certification center device, location certification method, certification device and terminal
JP4969700B2 (en) Map display device
US20220414267A1 (en) Method, apparatus, and computer program product for confidential computing
JP4814672B2 (en) Electronic device theft prevention device, method and program
WO2008050401A1 (en) Communication management apparatus, communication terminal apparatus, communication management method, communication method, communication management program, communication program and recording medium
WO2008053564A1 (en) Communication terminal apparatus, communication management apparatus, communication method, communication management method, communication program, communication management program and recording medium
JP2002095050A (en) Information transmitting system, radio communications equipment, and moving object
WO2007061007A1 (en) Information processor, vehicle mounted device, information processing method, information processing program and recording medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06833173

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP