JP2005323070A - Authentication method for home information appliance by portable telephone - Google Patents

Authentication method for home information appliance by portable telephone Download PDF

Info

Publication number
JP2005323070A
JP2005323070A JP2004138698A JP2004138698A JP2005323070A JP 2005323070 A JP2005323070 A JP 2005323070A JP 2004138698 A JP2004138698 A JP 2004138698A JP 2004138698 A JP2004138698 A JP 2004138698A JP 2005323070 A JP2005323070 A JP 2005323070A
Authority
JP
Japan
Prior art keywords
authentication
home appliance
user
information home
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2004138698A
Other languages
Japanese (ja)
Other versions
JP4301997B2 (en
Inventor
Nobuaki Mochizuki
Shinichi Nakagawa
Hiroshi Saito
Shigemichi Watanabe
真一 中川
洋 斎藤
伸晃 望月
茂道 渡邉
Original Assignee
Nippon Telegr & Teleph Corp <Ntt>
日本電信電話株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegr & Teleph Corp <Ntt>, 日本電信電話株式会社 filed Critical Nippon Telegr & Teleph Corp <Ntt>
Priority to JP2004138698A priority Critical patent/JP4301997B2/en
Publication of JP2005323070A publication Critical patent/JP2005323070A/en
Application granted granted Critical
Publication of JP4301997B2 publication Critical patent/JP4301997B2/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To provide a new authentication system which can specify a person with the same user-friendliness as a conventional home information appliance terminal while removing complicatedness for the authentication in a home information appliance terminal. <P>SOLUTION: The acquisition demand of a device ID is given from a portable telephone terminal to the home information appliance terminal. The device ID is transferred from the home information appliance terminal to the portable telephone terminal. A registered user ID and the device ID are transmitted from the portable telephone terminal to an authentication server. The authentication server performs a user authentication and a device authentication. When the authentication is succeeded, an address for specifying a relating device as the authentication information and a remote control program for the home information appliance terminal are transmitted. This address is transferred from the portable telephone terminal to the home information appliance terminal. The home information appliance terminal is connected to the relating device based on this address. The portable telephone terminal is used as the remote controller of the home information appliance terminal by using the remote control program. <P>COPYRIGHT: (C)2006,JPO&NCIPI

Description

  The present invention is used for information home appliance terminals. In particular, the present invention relates to an authentication technique using a mobile phone terminal.

  Authentication methods for using a conventional service or system include user authentication for specifying a user, device authentication for authenticating a device, and authentication that combines them.

  User authentication is a method in which a user authenticates using an ID and password, a method that substitutes an IC card for simplifying user input, and a biometric authentication method that uses biometric information of the user There is.

  Device authentication includes a device authentication method for authenticating whether a service request is received from a legitimate device by registering device-specific information in advance. Also, in device authentication, there is a case where authentication with a user is substituted by device authentication by making a person who owns the device and the device correspond one-to-one.

Further, there is a method for performing authentication by combining these methods.
JP 2002-354557 A JP 2003-44443 A "Basics of Authentication Technology", [online], [Search April 21, 2004], Internet <URL: http://www5d.biglobe.ne.jp/~engineer/doc/security/security_ch3_02.htm> "Survey report on the current state of personal authentication description", [online], March 2003, Information processing promotion business association security center, [April 21, 2004 search], Internet <URL: http: //www.ipa .go.jp / security / fy14 / reports / authentication / authentication2002.pdf>

  When applying an authentication method when using a conventional service or system to an information home appliance terminal, when using an ID and password for user authentication, the user cannot authenticate because the user forgets the ID and password There is a problem that the service provider suffers a disadvantage by intentionally spreading the ID and password by the user.

  In addition, since there is no device itself for inputting an ID and password necessary for identification, it cannot be used, and there is a problem of generating troublesome use at the time of use of a conventional information home appliance terminal, and further troublesomeness. Therefore, there is a problem that some individuals cannot use the device itself.

  In order to reduce the complexity of authentication, information home appliance terminals such as those represented by digital broadcasting partially implement user authentication and device authentication using an IC card. In this method, the IC card is dropped. In addition to the risk of the case, each device requires an IC card reader, which increases the price of the device, and if the card is not a standard card, a card is required for each device. There is a problem that the risk of having more than one increases.

  As another method to reduce the complexity of authentication, there are devices that use biometric authentication using biometric information. However, when biometric authentication is installed in each information home appliance terminal, When the price is high or biometric information is registered in individual terminals, information related to personal privacy is stored in many devices, which increases the possibility of diffusion of privacy information. A new problem is generated.

  On the other hand, if only device authentication is provided to avoid complications, the user cannot be specified when receiving services using that device, so when using it at home, it is registered as a service user. Information that you do not want to see even if you are a family member or information that you do not want to see (unfavorable video for minors, etc.) may be seen due to the difference between the person who uses it and the person who actually uses it (for example, a parental contract) Inconsistency at the time of billing due to different payers and users for the use of information home appliance terminals when judging whether or not to receive new service provision) Charges unintended by the user, such as the occurrence of a child, etc. (VOD service contracted by the parent is used and the child is provided with services outside the contract without the parent's knowledge) There is a kind of challenge.

  When device authentication is used on devices used outside the home, not only is it subject to unauthorized use if dropped, but it is also not possible to specify a user by device authentication alone, so providing information according to user preferences, etc. There is a problem that it cannot be done.

  As mentioned earlier, even when device authentication and user authentication are used together and biometrics authentication is used in user authentication so that the above-mentioned problems of user authentication and device authentication can be overcome. When the price of individual home information appliances is high or when biometric information is registered in individual devices, information related to personal privacy will be stored in many devices, which is a diffusion of privacy information. The problem of increasing the possibility of

  The present invention solves the above-described problems and provides a new authentication method that enables individual identification with the same usability as a conventional information home appliance terminal while eliminating the complexity of authentication in the information home appliance terminal. This contributes to the provision of a safe and convenient information home appliance terminal.

  The present invention provides an information home appliance terminal provided with communication means, a mobile phone terminal provided with means for communicating with the information home appliance terminal, and an access permission for the user of the mobile phone terminal to the information home appliance terminal or a related device. It is the authentication method applied to the information household appliance system provided with the authentication server provided with the means to authenticate.

  Here, a feature of the present invention is that the mobile phone terminal makes an acquisition request for a device-specific ID number (hereinafter, device ID) to the information home appliance terminal, and the device ID is received from the information home appliance terminal. When the user ID and the device ID registered from the mobile phone terminal are transmitted to the authentication server, the user authentication and the device authentication are performed by the authentication server, and the authentication is successful. An address for identifying the related device and a remote control program for information home appliance terminal are transmitted as authentication information from the authentication server to the mobile phone terminal, the address is transferred from the mobile phone terminal to the information home appliance terminal, and the address is Originally, the information home appliance terminal is connected to the related device, and the mobile phone terminal is connected to the information home appliance terminal using the remote control program. There is to be used as a remote control (claim 1). This authentication method has an advantage that the user only needs to perform the first acquisition request operation during the authentication and connection operations.

  Alternatively, the authentication method of the present invention transmits a registered user ID and an address of the authentication server to be accessed from the mobile phone terminal to the information home appliance terminal, and also sends a device ID to the authentication server to the information home appliance terminal. When the user ID is transmitted, the device ID and the user ID are transmitted from the information home appliance terminal to the authentication server, and user authentication and device authentication are performed by the authentication server, and the authentication is successful. The authentication server notifies the information home appliance terminal of successful authentication, and an address for identifying the related device and a remote control program for the information home appliance terminal are transmitted to the mobile phone terminal, and the address is sent from the mobile phone terminal. Transfer to the information home appliance terminal, connect the information home appliance terminal to the related device based on the address, the remote controller Characterized by using the mobile phone terminal as a remote control of the home-electronics information terminal using the program (claim 2).

  This authentication method has an advantage that the user only needs to perform the first acquisition request operation during the authentication and connection operations. In this authentication method, the mobile phone terminal only needs to receive information from the authentication server, and the communication procedure between the mobile phone terminal and the authentication server can be simplified.

  In this authentication method, information is transmitted from the information home appliance terminal up to the authentication server, and information is transmitted from the authentication server to the mobile phone terminal via the mobile phone network. There is an advantage that security can be further strengthened as compared with the case where transmission and reception are performed using the same network.

  Further, in this authentication method, the device ID and the user ID are transmitted from the information home appliance terminal to the authentication server, and the user ID registered from the mobile phone terminal is transmitted to the authentication server. And user authentication and device authentication can be performed by the authentication server.

  According to this, the user ID is sent to the authentication server from both the information home appliance terminal and the mobile phone terminal. Thereby, user authentication can be performed reliably and promptly. In general, if user authentication is not successful, it is meaningless to succeed in device authentication, so it is effective to perform user authentication prior to device authentication.

  In the authentication method of the present invention, the authentication server includes, for each user of the mobile phone terminal, an access restriction indicating a range of access permitted to the user in the information home appliance terminal or the related device. When information is stored in advance and user authentication and device authentication are performed by the authentication server, address permission can be authenticated except for the information home appliance terminal or the related device whose access is restricted (claim). 4).

  According to this, the access permitted range can be variably set among a plurality of users who use the same information home appliance terminal. Therefore, information that the family does not want to see or information that they do not want to see (such as unfavorable video for minors) can be seen (for example, the child sees the R-designated content that the parent has contracted). And billing unintended by the user, such as inconsistency at the time of billing due to the difference between the payer and the user for the use of the information home appliance terminal when judging whether to receive a new service It is possible to solve the conventional problem that the child receives a service outside the contract without the parent's knowledge using the VOD service contracted by the parent.

  Furthermore, in this authentication method, the authentication server allows the owner of the right to use the device registered by the authentication server when a connection to the device is requested by a user who does not have access rights to the device. When the application for use of the device is made and the owner of the usage right permits the connection of the user without the access right to the device, the authentication server informs the user without the access right as authentication information. An address specifying the device can be transmitted (claim 5).

  According to this, even a user who does not have the access right can access the desired device with the permission of the user who has the access right, thereby improving the flexibility in providing the service. it can.

  Further, in the authentication method of the present invention, the request for acquiring the device ID of the information home appliance terminal or the request for transmitting the device ID and the user ID in the mobile phone terminal is an action for a normal user to operate the information home appliance terminal. It is desirable to be performed in conjunction with an action equivalent to (Claim 6).

  In other words, it is indispensable to execute such an authentication procedure, but it is not necessary for the user to involve troublesome operations. Therefore, for example, it is usually performed in conjunction with an action equivalent to an action for a user to operate the information home appliance terminal, such as a switch for turning on the information home appliance terminal or a switch for determining execution of processing. It is desirable that

  Further, the authentication method of the present invention specifies a user using biometric information in the mobile phone terminal, and if the user is a valid user, the mobile phone terminal transfers the information home appliance terminal and the authentication server. A user ID can also be transmitted (claim 7). For example, by specifying the user by fingerprint recognition or the like, it is possible to avoid a situation where the information home appliance terminal is used illegally.

  Further, in the authentication method of the present invention, instead of transmitting an address for specifying the related device from the authentication server after successful authentication, the IP address of the information home appliance terminal is transmitted from the information home appliance terminal together with the device ID to the mobile phone terminal. And the IP address together with the device ID and the user ID is transferred from the mobile phone terminal to the authentication server, or the IP address is directly transmitted from the information home appliance terminal to the authentication server, and authentication is performed. If successful, the IP address is transferred to the related device, and the related device can connect to the information home appliance terminal (claim 8).

  According to this, it is not necessary to perform connection from the information home appliance terminal side to the related device, and connection processing in the information home appliance terminal can be reduced. Eliminating complicated processing in the information home appliance terminal is effective when considering the situation where the information home appliance terminal is placed in a general household where maintenance is difficult.

  By using the present invention, it is possible to provide an information home appliance terminal that is safer and more convenient than ever by enabling the identification of an individual with the same ease of use as in conventional home appliance terminals.

  Specifically, the user has been using the conventional user-friendliness while specifying the user, and has been a traditional issue by unauthorized use by a third party or service provider side by an unauthorized user. It is possible to receive the provision of services using the terminal at the destination.

  In addition, since the present invention makes it possible to specify the user and the device, by managing access based on the specified information, copyright management and each user or specified user preference information can be obtained. It is also possible to provide a platform that can be applied to a service that provides information according to the user's preference by registering in advance.

  An embodiment of information home appliance terminal and user authentication using a cellular phone of the present invention will be described with reference to FIGS. In the block configuration diagram of the present embodiment, functional blocks necessary for the description of the present embodiment are shown. For example, functional blocks related to mobile phone communication in a mobile phone terminal are not shown.

(First Example)
A first embodiment will be described with reference to FIGS. FIG. 1 is a configuration example of an authentication method for information appliances using a mobile phone according to the first embodiment. FIG. 2 is a block diagram of the information home appliance terminal of the first embodiment. FIG. 3 is a block diagram of the mobile phone terminal of the first embodiment. FIG. 4 is a block diagram of the authentication server of the first embodiment. FIG. 5 is a sequence diagram showing the authentication procedure of the first embodiment.

  In the first embodiment, as shown in FIG. 2, the information home appliance terminal 101 including the NW storage communication unit 1 and the mobile phone terminal communication unit 2 and the information communicating with the information home appliance terminal 101 as shown in FIG. As shown in FIG. 4, the mobile phone terminal 102 provided with the home appliance terminal communication unit 11 and an authentication execution unit 30 that authenticates access permission to the information home appliance terminal 101 or the NW storage 104 for the user of the mobile phone terminal 102. It is an authentication method applied to the information home appliance system provided with the authentication server 103 provided with.

  Here, the feature of the first embodiment is that, as shown in FIG. 5, a request for acquiring a device ID, which is a device-specific ID number, is sent from the mobile phone terminal 102 to the information home appliance terminal 101. The device ID is transferred from the mobile phone terminal 102 to the mobile phone terminal 102, the registered user ID and the device ID are transmitted from the mobile phone terminal 102 to the authentication server 103, and the authentication server 103 performs user authentication and device authentication. If the authentication is successful, the authentication server 103 transmits to the mobile phone terminal 102 an address for specifying the related device and the remote control program for the information home appliance terminal as authentication information, and the mobile phone terminal 102 sends the address to the information home appliance terminal 101. The information home appliance terminal 101 is connected to the NW storage 104 based on the address, and the remote control program is connected. In place of using the mobile phone terminal 102 as a remote control of the home-electronics information terminal 101 using the ram (claim 1). The device control unit 5 receives a remote control operation signal from the mobile phone terminal 102 and controls the home appliance.

  Next, the authentication procedure of the first embodiment will be described with reference to FIG. In the authentication information holding unit 32 of the authentication server 103, information on information home appliance terminals that can be connected to an authorized user of the NW storage 104 is registered in advance. Used for device authentication by infrared communication (IrDA) with respect to the information home appliance terminal 101, triggered by a user pressing a button for requesting acquisition of device information of the information home appliance terminal 101 using the mobile phone terminal 102 An acquisition request for a terminal ID (hereinafter, device ID) is made (1).

  On the other hand, the device ID held in the device ID holding unit 4 is transmitted from the information home appliance terminal 101 to the mobile phone terminal 102 by infrared communication (2). The act of acquiring the device ID is linked to an action equivalent to the act of pressing a power button that a normal user performs to operate the information home appliance terminal 101, such as pressing a specific button of the mobile phone terminal 102. It may be performed (Claim 6).

  The communication method used for transmitting the device ID between the information home appliance terminal 101 and the mobile phone terminal 102 here may be Bluetooth, Zigbee, etc. in addition to infrared communication. An ID used for user authentication (hereinafter referred to as a user ID) is registered in the user ID holding unit 12 of the mobile phone terminal 102 using a SIM card or the like.

  After acquiring the device ID in the device ID storage unit 13, the user ID and the device ID are transmitted from the mobile phone terminal 102 to the authentication server 103 by the authentication server communication unit 10 (3). However, in this case, in order to specify whether or not the actual user is a registered user, the user is authenticated using biometric information (such as a fingerprint), and if the user is a valid user, the user ID is transmitted. (Claim 7).

  The authentication execution unit 30 of the authentication server 103 searches the authentication information holding unit 32 from each ID to perform user authentication and device authentication. If the authentication is successful, an authentication ticket and NW storage address information indicating that the authentication is successful. The IP address of the NW storage 104 stored in the holding unit 33 is returned to the mobile phone terminal 102 by the mobile phone terminal communication unit 31 (4), and if the authentication fails, the fact that the authentication has failed is notified (illustrated). (Omitted). If the authentication is successful, the remote control program that allows the mobile phone terminal 102 to operate as the remote control of the authenticated information home appliance terminal 101 is selected from the remote control program holding unit 34 and transmitted to the mobile phone terminal 102. (4) The mobile phone terminal 102 acquires the program and stores it in the remote control / program storage unit 15 so that the user can operate as a remote control (6). In this case, OK or NG may be displayed on the mobile phone terminal 102.

  Furthermore, the mobile phone terminal 102 transfers the returned IP address of the accessible NW storage 104 to the information home appliance terminal 101 by infrared communication by the information home appliance terminal communication unit 11, and the information home appliance terminal 101 uses the IP address. Then, the NW storage communication unit 1 connects to the NW storage 104 via the router 105 (7) (8).

  This sequence of device authentication, user authentication, and connection to the NW storage 104 is such that the user first performs an action of pressing a button for requesting acquisition of device information, and then the user performs some operation. Even if not, it will proceed automatically. However, the user may be prompted to perform an operation such as obtaining sequence authentication (this is not the same for the second and subsequent embodiments, but is the same).

  The user can use the information home appliance terminal 101 by using the mobile phone terminal 102 as a remote controller, and the user can specify the access to the NW storage 104 in the channel information that can be used by the remote controller. Selection of the NW storage 104 (browsing grandchildren, browsing city news information, etc.) is realized.

  Further, when the connectable NW storage 104 is divided into a plurality of parts, the IP address transmitted from the authentication server 103, that is, the access destination from the information home appliance terminal 101 is a storage server that controls the NW storage 104, or instead It may be a thing.

(Second embodiment)
A second embodiment will be described with reference to FIGS. FIG. 6 is a configuration example of an authentication method for information home appliances using a mobile phone according to the second embodiment. FIG. 7 is a block diagram of the information home appliance terminal of the second embodiment. FIG. 8 is a block diagram of the mobile phone terminal of the second embodiment. FIG. 9 is a block diagram of the authentication server of the second embodiment. FIG. 10 is a sequence diagram showing the authentication procedure of the second embodiment.

  As shown in FIG. 7, the second embodiment includes an information home appliance terminal 101 including a mobile phone terminal communication unit 2, an authentication server communication unit 6 and an NW storage communication unit 1, and an information home appliance as shown in FIG. A mobile phone terminal 102 including an information home appliance terminal communication unit 11 that communicates with the terminal 101, and an authentication execution unit 30 that authenticates access permission to the information home appliance terminal 101 or the NW storage 104 for a user of the mobile phone terminal 102. This is an authentication method applied to an information home appliance system including an authentication server 103 provided.

  Here, the feature of the second embodiment is that the registered user ID held in the user ID holding unit 12 from the information home appliance terminal communication unit 11 of the mobile phone terminal 102 to the information home appliance terminal 101 and the authentication server The address of the authentication server 103 to be accessed held in the address holding unit 18 is transmitted, the information home appliance terminal 101 is requested to send the device ID and the user ID to the authentication server 103, and the information home appliance terminal 101 authentication server The device ID and the user ID are transmitted from the communication unit 6 to the authentication server 103, and the authentication execution unit 30 of the authentication server 103 searches the authentication information holding unit 32 to perform user authentication and device authentication. If successful, the information home appliance terminal communication unit 35 of the authentication server 103 notifies the information home appliance terminal 101 of the authentication success, and the mobile phone terminal 102 The telephone terminal communication unit 31 transmits the address for identifying the NW storage 104 held in the NW storage address information holding unit 33 and the remote control program for information home appliance terminal held in the remote control program holding unit 34, and carries the address The information home appliance terminal communication unit 11 of the telephone terminal 102 is transferred to the information home appliance terminal 101, and the NW storage communication unit 1 of the information home appliance terminal 101 is connected to the NW storage 104 based on the address, and the remote control / program storage unit 15 The mobile phone terminal 102 is used as a remote controller of the information home appliance terminal 101 by the remote control control unit 16 using the remote control program held in the (Claim 2).

  Next, the configuration example of FIG. 6 will be described. The difference from the configuration of FIG. 1 is held in the user ID holding unit 12 and the authentication server / address holding unit 18 from the information home appliance terminal communication unit 11 of the mobile phone terminal 102 to the information home appliance terminal 101. The authentication server address is transmitted, and the authentication server communication unit 6 of the information home appliance terminal 101 transmits the device ID and the user ID held in the user ID storage unit 7 and the device ID holding unit 4 to the authentication server. It is a point which transmits to 103.

  Next, the authentication procedure of the second embodiment will be described with reference to FIG. In the authentication information holding unit 32 of the authentication server 103, information on the information home appliance terminal 101 that can be connected to an authorized user of the NW storage 104 is registered in advance. Triggered by a user pressing a button for requesting acquisition of device information of the information home appliance terminal 101 using the mobile phone terminal 102, the authentication server and the information home appliance terminal 101 via infrared communication (IrDA) A transmission request for an address, a user ID and a device ID is made (1). Thereby, the information home appliance terminal 101 acquires the access destination of the authentication server 103, and transmits the user ID and the device ID to the authentication server 103 by the authentication server communication unit 6 (2) (3).

  The authentication execution unit 30 of the authentication server 103 performs personal authentication and device authentication from each ID, and if the authentication is successful, the information home appliance terminal communication unit 35 returns an authentication ticket indicating that the authentication is successful to the information home appliance terminal 101 ( 4) (5) In the case of authentication failure, the fact that authentication has failed is notified (not shown). If the authentication is successful, at the same time, the remote control program that allows the mobile phone terminal 102 held in the remote control / program holding unit 34 to operate as the remote control of the authenticated information home appliance terminal 101, and NW The IP address of the NW storage 104 held in the storage address information holding unit 33 is transmitted to the mobile phone terminal 102 (6), and the mobile phone terminal 102 acquires the program by the authentication information receiving unit 17 to The program is stored in the program storage unit 15, and the remote control unit 16 enables the user to operate as a remote control.

  In this case, the mobile phone terminal 102 may also display authentication success or failure. At this time, it is assumed that the information (address, etc.) of the mobile phone terminal 102 can be acquired from the user ID as registered user information in the authentication server 103. However, if the information of the mobile phone terminal 102 is not registered at the time of user information registration, it may be transmitted to the authentication server 103 via the information home appliance terminal 101 together with the user ID.

  The mobile phone terminal 102 transmits the acquired IP address of the NW storage 104 to the information home appliance terminal 101 (7). The information home appliance terminal 101 connects to the NW storage 104 via the router 105 using the IP address of the NW storage 104. By using the mobile phone terminal 102 as a remote controller, the user can use the normal information home appliance terminal 101 (8), and clearly indicate access to the NW storage 104 in channel information that can be used with the remote controller. Thus, the user can select the NW storage 104.

(Third embodiment)
A third embodiment will be described with reference to FIGS. FIG. 11 is a configuration example of an authentication method for information home appliances using a mobile phone according to the third embodiment. FIG. 12 is a block diagram of the mobile phone terminal 102 of the third embodiment. FIG. 13 is a sequence diagram showing the authentication procedure of the third embodiment. The block configurations of the information home appliance terminal 101 and the authentication server 103 in the third embodiment are the same as those in the second embodiment (FIGS. 7 and 9).

  In the third embodiment, as shown in FIG. 12, the authentication server communication unit 6 of the information home appliance terminal 101 transmits the device ID and the user ID to the authentication server 103, and the authentication server of the mobile phone terminal 102 The user ID registered in the user ID holding unit 12 is transmitted from the communication unit 10 to the authentication server 103, and user authentication and device authentication are performed by the authentication execution unit 30 of the authentication server 103 (Claim 3).

  FIG. 13 shows the authentication procedure of the third embodiment. In FIG. 13, a procedure for transmitting the user ID from the mobile phone terminal 102 to the authentication server 103 is added as compared with FIG. According to this, the user ID is sent to the authentication server 103 from both the information home appliance terminal 101 and the mobile phone terminal 102. Thereby, user authentication can be performed reliably and promptly. In general, if user authentication is not successful, it is meaningless to succeed in device authentication, so it is effective to perform user authentication prior to device authentication.

(Fourth embodiment)
A fourth embodiment will be described with reference to FIGS. FIG. 14 is a configuration example of an authentication method for information appliances using a mobile phone according to the fourth embodiment. FIG. 15 is a diagram illustrating a table of the authentication information holding unit 32 according to the fourth embodiment. FIG. 16 is a sequence diagram showing an authentication procedure according to the fourth embodiment.

  The block configuration of the information home appliance terminal 201, the mobile phone terminals 202 and 203, and the authentication servers 204 and 205 of the fourth embodiment is the same as the block configuration (FIGS. 2 to 4) described in the first embodiment. However, a local storage 209 is externally attached to the information home appliance terminal 201.

  In the fourth embodiment, in the authentication information holding unit 32 of the authentication server 204 or 205, as shown in FIG. 15, for each user of the mobile phone terminals 202 and 203, the information home appliance terminal 201 or the local storage 209 or NW In the storages 206 and 207, access restriction information indicating a range of access permitted to the user is held in advance, and the access restriction is performed when the authentication server 204 or 205 performs user authentication and device authentication. Authentication of address permission is performed except for the information home appliance terminal 201, the local storage 209, or the NW storages 206 and 207 (claim 4).

  Next, the configuration example of FIG. 14 will be described. In the information home appliance terminal 201 with the local storage 209, users who can use the storage are registered in advance, and in the authentication information holding unit 32 of the authentication servers 204 and 205, as shown in FIG. Information of the information home appliance terminal 201 that can be connected to authorized users 206 and 207 and the local storage 209 is registered.

  Next, the authentication procedure of the fourth embodiment will be described with reference to FIG. A user who is registered for permission to use the local storage 209 is assumed to be Mr. A. Information from the home information terminal communication unit 11 of the mobile phone terminals 202 and 203 is triggered by a user pressing a button for requesting acquisition of device information of the home information terminal 201 using the mobile phone terminals 202 and 203. An appliance ID acquisition request is made to the home appliance terminal 201 by infrared communication (IrDA) (1). On the other hand, the device ID is transmitted by infrared communication from the mobile phone terminal communication unit 2 of the information home appliance terminal 201 to the mobile phone terminals 202 and 203 (2).

  Users are registered in the user ID holding unit 12 of the mobile phone terminals 202 and 203 by a SIM card or the like. The registered user ID and the device ID stored in the device ID storage unit 13 are transmitted from the authentication server communication unit 10 of the mobile phone terminals 202 and 203 to the authentication servers 204 and 205 (3). However, at this time, in order to specify whether or not the actual user is a registered user, the user is authenticated using biometric information (such as a fingerprint), and if the user is a valid user, the user ID is transmitted. (Claim 7).

  The authentication execution unit 30 of the authentication servers 204 and 205 performs identity authentication and device authentication from each ID. When performing authentication, access rights to the information home appliance terminal 201, the local storage 209, and the NW storages 206 and 207 vary depending on the user. When Mr. A authenticates from the mobile phone terminal 202, as shown in FIG. 15, only Mr. A is allowed to use the local storage 209. Therefore, Mr. A has the NW storage 206 and the local storage 209. And the right to use the information home appliance terminal 201 are permitted. That is, an authentication ticket indicating permission to use the NW storage 206 and the local storage 209 and an IP address of the NW storage 206 are returned from the authentication server 204 to the mobile phone terminal 202 (4). On the other hand, when Mr. B authenticates from the mobile phone terminal 203, as shown in FIG. 15, Mr. B is only permitted to use the NW storage 207 and the information home appliance terminal 201. An authentication ticket indicating permission to use the NW storage 207 and an IP address of the NW storage 207 are returned from the mobile phone terminal 202 (205). Further, when a user other than Mr. A and Mr. B accesses, the authentication fails, and the mobile phone terminal at that time is notified of the authentication failure (not shown). Further, in the case of successful authentication, the mobile phone terminals 202 and 203 transmit a remote control program that can operate as a remote controller of the authenticated information home appliance terminal 201 to the mobile phone terminals 202 and 203 (4). The terminals 202 and 203 acquire the program and store it in the remote control / program storage unit 15, and the remote control control unit 16 enables the user to operate as a remote control (6).

Further, the information home appliance terminal communication unit 11 of the mobile phone terminals 202 and 203 transfers the returned IP addresses of the accessible NW storages 206 and 207 to the information home appliance terminal 201 by infrared communication (5). The NW storage communication unit 1 of the terminal 201 uses the IP address to connect to the NW storages 206 and 207 via the router 208 (7) (8). The user can use the information home appliance terminal 201 by using the mobile phone terminals 202 and 203 which are remote controllers (6).
In addition, in the case of Mr. A, the access to the NW storage 206 and the local storage 209 is indicated in the channel information that can be used by the remote controller, and in the case of Mr. B, the access to the NW storage 207 is clearly indicated. The selection of the NW storages 206 and 207 and the local storage 209 is realized.

(Fifth embodiment)
A fifth embodiment will be described with reference to FIGS. FIG. 17 is a configuration example of an authentication method for information appliances using a mobile phone according to the fifth embodiment. FIG. 18 is a block diagram of the cellular phone terminal of the fifth embodiment. FIG. 19 is a block diagram of the authentication server of the fifth embodiment. FIG. 20 is a sequence diagram showing an authentication procedure of the fifth embodiment. The block configuration of the information home appliance terminal 101 in the fifth embodiment is the same as that in the first embodiment (FIG. 2).

  In the fifth embodiment, the access application processing unit 36 of the authentication server 205 is registered by the authentication information holding unit 32 of the authentication server 205 when a user who does not have access to the device is requested to connect to the device. An authentication server 205 when an application for use of the device is made to the owner of the right of use of the device and the owner of the right of use permits connection of the user without access right to the device. The mobile phone terminal communication unit 31 transmits an address identifying the device as authentication information to a user who does not have access rights (claim 5).

  That is, as shown in FIG. 17, normally, Mr. B's access right to the local storage 209 is not permitted. However, when Mr. B requests connection, the authentication server 205 transfers to the local storage 209. The access application processing unit 19 of the mobile phone terminal 202 of Mr. A who is permitted to access is notified that B has requested connection, and the access application processing unit 19 searches the other user information holding unit 20. If it is recognized that Mr. B is a user who may use the local storage 209, the connection to the local storage 209 of Mr. B may be permitted. At this time, if the mobile phone terminal 202 does not have the other user information holding unit 20, it may be displayed on the screen that Mr. B has requested connection, and Mr. A himself may perform an authentication act. .

  The mobile phone terminal 203 authenticates the registered authorized user ID transmitted from the information home appliance terminal 201 and the current user using a fingerprint or the like, and authenticates the authorized user. It is also possible to prevent access to the authentication server 205 when the server 205 is accessed and the user is not a valid user.

  Next, the authentication procedure of the fifth embodiment will be described with reference to FIG. When Mr. B turns on the power of the mobile phone terminal 203, the information home appliance terminal communication unit 11 makes a device ID acquisition request to the information home appliance terminal 201 (1). The mobile phone terminal communication unit 2 of the information home appliance terminal 201 transmits the device ID held in the device ID holding unit 4 to the mobile phone terminal 203 (2). The mobile phone terminal 203 having the device ID stored in the device ID storage unit 13 transmits the device ID and the user ID of Mr. B held in the user ID holding unit 12 to the authentication server 205 by the authentication server communication unit 10. (3).

  The authentication execution unit 30 of the authentication server 205 searches the authentication information holding unit 32 and executes Mr. B's authentication. At this time, Mr. B is not permitted to access the local storage 209. . Further, it is assumed that Mr. B can access the information home appliance terminal 201, the local storage 209, and the NW storage 207 after the access permission is given.

  To obtain Mr. B's access permission, the access application processing unit 36 applies Mr. B's access application to Mr. A's mobile phone terminal 202 (4). The access application processing unit 19 of Mr. A's mobile phone terminal 202 searches the other user information holding unit 20 and identifies whether Mr. B can access the local storage 209. As a result, if it is found that Mr. B can access, an access permission is transmitted to the authentication server 205 (5). Upon receiving the access permission from Mr. A, the access application processing unit 19 of the authentication server 205 notifies Mr. B that the authentication is successful, and at the same time, the remote control program for operating the IP address of the NW storage 207 and the information home appliance terminal 201 Is transmitted to Mr. B's mobile phone terminal 203 (6).

  In the mobile phone terminal 203 of Mr. B, the received IP address of the NW storage 207 is stored in the NW storage address storage unit 14, and this IP address is transmitted to the information home appliance terminal 201 by the information home appliance communication unit 11 and received. The remote control program is stored in the remote control program storage unit 15, and the mobile phone terminal 203 is operated by the remote control control unit 16 using this remote control program (8).

  The information home appliance terminal 201 that has received the IP address of the NW storage 207 by the mobile phone terminal communication unit 2 stores the IP address in the NW storage address storage unit 3 and uses the IP address to execute the router by the NW storage communication unit 1. Connect to the NW storage 207 via 208 (9) (10).

  As a result, Mr. B's mobile phone terminal 203 can access the local storage 209 and the NW storage 207.

(Sixth embodiment)
A sixth embodiment will be described with reference to FIGS. FIG. 21 is a configuration example of an authentication method for information appliances using a mobile phone according to the sixth embodiment. FIG. 22 is a block diagram of the cellular phone terminal of the fifth embodiment. FIG. 23 is a block diagram of the authentication server of the fifth embodiment. FIG. 24 is a sequence diagram showing the authentication procedure of the sixth embodiment. The block configuration of the information home appliance terminal 101 in the sixth embodiment is the same as that in the first embodiment (FIG. 2).

  As described in the first to fifth embodiments, instead of transmitting the IP address of the NW storage 104 from the authentication server 103 after successful authentication, in the sixth embodiment, the information home appliance terminal 101 together with the device ID from the information home appliance terminal 101 is used. Is transmitted to the mobile phone terminal 102 by the mobile phone terminal communication unit 2, and the mobile phone terminal 102 stores this IP address in the terminal address information storage unit 21, and this IP address is stored together with the device ID and the user ID. The data is transferred from the mobile phone terminal 102 to the authentication server 103 by the authentication server communication unit 10. In the authentication server 103, the mobile phone terminal communication unit 31 receives this IP address and stores it in the terminal address information storage unit 38.

  If the mobile phone terminal 102 is successfully authenticated by the authentication execution unit 30 of the authentication server 103, the IP address is transferred to the NW storage 104 by the NW storage communication unit 37, and the NW storage 104 connects to the information home appliance terminal 101. (Claim 8).

  A configuration example of FIG. 21 will be described. The difference from the first to fifth embodiments is that the IP address of the information home appliance terminal 101 is transferred in advance to the NW storage 104 through the mobile phone terminal 102, and if the authentication is successful, the information home appliance terminal 101 is accessed from the NW storage 104. Is a point.

  Next, the authentication procedure of the sixth embodiment will be described with reference to FIG. When the power of the mobile phone terminal 102 is turned on, a device ID acquisition request of the information home appliance terminal 101 is transmitted to the information home appliance terminal 101 by the information home appliance terminal communication unit 11 (1). In response, the device ID and the IP address of the information home appliance terminal 101 are transmitted from the mobile phone terminal communication unit 2 of the information home appliance terminal 101 to the mobile phone terminal 102 by infrared communication (2).

  In response, the authentication server communication unit 10 of the mobile phone terminal 102 transmits the device authentication ID, the identity authentication ID, and the IP address of the information home appliance terminal 101 to the authentication server 103 (3). This IP address is stored in the terminal address information storage unit 38. The authentication execution unit 30 of the authentication server 103 searches the authentication information holding unit 32 from each ID to perform personal authentication and device authentication. If the authentication is successful, the IP address of the information home appliance terminal 101 transmitted is the terminal address. The information is transferred from the information storage unit 38 to the NW storage 104 by the NW storage communication unit 37 (4), and in the case of failure, the mobile phone terminal 102 is notified that the authentication has failed (not shown). The NW storage 104 is connected to the information home appliance terminal 101 having the IP address transferred via the router 105 (6) (7).

  Further, the authentication server 103 transmits a remote control program together with a notification of successful authentication to the mobile phone terminal 102 by the mobile phone terminal communication unit 31 (5). Receiving this, the mobile phone terminal 102 stores the remote control program in the remote control program storage unit 15 and accesses it as a remote control of the information home appliance terminal 101 using the remote control control unit 16 (8).

(Seventh embodiment)
A seventh embodiment will be described with reference to FIGS. FIG. 25 is a configuration example of an authentication method for information appliances using a mobile phone according to the seventh embodiment. FIG. 26 is a block diagram of the authentication server of the seventh embodiment. FIG. 27 is a sequence diagram showing the authentication procedure of the seventh embodiment. Further, the block configuration of the information home appliance terminal 101 in the seventh embodiment is the same as that of the second embodiment (FIG. 7), and the block configuration of the mobile phone terminal 102 is the same as that of the sixth embodiment (FIG. 22).

  As described in the first to fifth embodiments, instead of transmitting the IP address of the NW storage 104 from the authentication server 103 after successful authentication, in the seventh embodiment, the device ID is sent from the information home appliance terminal 101 to the authentication server communication unit. 6, and the IP address of the information home appliance terminal 101 is transmitted directly from the authentication server communication unit 6 of the information home appliance terminal 101 to the authentication server 103. In the authentication server 103, the information home appliance terminal communication unit 35 receives this IP address and stores it in the terminal address information storage unit 38.

  If the mobile phone terminal 102 is successfully authenticated by the authentication execution unit 30 of the authentication server 103, the IP address is transferred to the NW storage 104 by the NW storage communication unit 37 of the authentication server 103, and the NW storage 104 is connected to the information home appliance terminal. 101 is connected (claim 8).

  A configuration example of FIG. 25 will be described. The difference from the first to fifth embodiments is that the IP address of the information home appliance terminal 101 is transferred to the NW storage 104 in advance by the information home appliance terminal 101 itself, and if the authentication is successful, the information home appliance terminal 101 is accessed from the NW storage 104 It is a point to do.

  Next, the authentication procedure of the seventh embodiment will be described with reference to FIG. When the mobile phone terminal 102 is turned on, the information home appliance terminal communication unit 11 uses the user ID held in the user ID holding unit 12 and the authentication server / authentication server 18 to hold the authentication server. An IP address is transmitted (1). In response, the device ID, the user ID, and the terminal IP address are transmitted from the authentication server communication unit 6 of the information home appliance terminal 101 to the router 105 (2). The router 105 transfers these to the authentication server 103 (3). This IP address is stored in the terminal address information storage unit 38 of the authentication server 103. Note that the terminal IP address of the information home appliance 101 itself is held in advance by the authentication server communication unit 6 and other communication units, and various communications are performed using this, so the own IP address information is held. The function block is not shown because it is assumed that each communication unit has a built-in function. The authentication execution unit 30 of the authentication server 103 searches the authentication information holding unit 32 and performs personal authentication and device authentication from each ID. If the authentication is successful, the authentication success is confirmed via the router 105 to the information home appliance terminal 101. (4) (5). Also, the authentication server 103 transfers the IP address of the information home appliance terminal 101 to the NW storage 104 by the NW storage communication unit 37 (6). In the case of authentication failure, the authentication server 103 notifies the information home appliance terminal 101 and the mobile phone terminal 102 that the authentication has failed (not shown). The NW storage 104 is connected to the information home appliance terminal 101 having the IP address transferred via the router 105 (8) (9).

  Also, the authentication server 103 transmits a remote control program together with a notification of successful authentication to the mobile phone terminal 102 (7). Receiving this, the mobile phone terminal 102 stores the remote control program in the remote control program storage unit 15 and accesses it as a remote control of the information home appliance terminal 101 using the remote control control unit 16 (10).

(Eighth Example)
An eighth embodiment will be described with reference to FIG. FIG. 28 is a circuit diagram for explaining the eighth embodiment. The request for acquiring the device ID of the information home appliance terminal or the request for transmitting the device ID and the user ID in the mobile phone terminal is performed in conjunction with an action equivalent to an action for a normal user to operate the information home appliance terminal (billing) Item 6).

  That is, as shown in FIG. 28, when a mobile phone terminal works as a remote controller for an information home appliance terminal by the remote control basic control unit 40, authentication processing control is performed in conjunction with a power switch of the information home appliance terminal or a switch that determines execution of processing. The unit 41 is activated.

  In this embodiment, the remote control program is transmitted from the authentication server to the mobile phone terminal as the final stage after successful authentication. However, the information home appliance terminal is turned on or execution of the process is determined. Such a basic remote control program is always held by the mobile phone terminal.

(Ninth Example)
A ninth embodiment will be described with reference to FIG. FIG. 29 is an external view of a mobile phone terminal of the ninth embodiment. The user is identified using the biological information in the mobile phone terminal, and if the user is a valid user, the user ID is transmitted from the mobile phone terminal to the information home appliance terminal and the authentication server (claim 7).

  That is, as shown in FIG. 29, the authentication procedure described in the present embodiment is accepted only when a mobile phone terminal provided with the fingerprint determination unit 42 is used and the user is a legitimate user who conforms to the fingerprint determination.

  According to the present invention, in an information home appliance terminal, by providing a new authentication method that enables the identification of an individual with the same usability as a conventional information home appliance terminal while eliminating the complexity for authentication, It can contribute to the provision of convenient information appliances. Therefore, it can contribute to the spread of information home appliance terminals.

The figure which shows the structural example of the authentication method for information household appliances by the mobile telephone of a 1st Example. The block block diagram of the information household appliance terminal of a 1st Example. The block block diagram of the mobile telephone terminal of a 1st Example. The block block diagram of the authentication server of a 1st Example. The sequence diagram which shows the authentication procedure of a 1st Example. The figure which shows the structural example of the authentication method for information household appliances by the mobile telephone of a 2nd Example. The block block diagram of the information household appliance terminal of a 2nd Example. The block block diagram of the mobile telephone terminal of a 2nd Example. The block block diagram of the authentication server of a 2nd Example. The sequence diagram which shows the authentication procedure of 2nd Example. The figure which shows the structural example of the authentication method for information household appliances by the mobile telephone of 3rd Example. The block block diagram of the mobile telephone terminal of a 3rd Example. The sequence diagram which shows the authentication procedure of 3rd Example. The figure which shows the structural example of the authentication method for information household appliances by the mobile telephone of 4th Example. The figure which shows the table of the authentication information holding part of 4th Example. The sequence diagram which shows the authentication procedure of 4th Example. The structural example of the authentication method for information household appliances by the mobile telephone of 5th Example. The block block diagram of the mobile telephone terminal of 5th Example. The block block diagram of the authentication server of 5th Example. The sequence diagram which shows the authentication procedure of 5th Example. The figure which shows the structural example of the authentication method for information household appliances by the mobile telephone of 6th Example. The block block diagram of the mobile telephone terminal of 5th Example. The block block diagram of the authentication server of 5th Example. The sequence diagram which shows the authentication procedure of 6th Example. The figure which shows the structural example of the authentication method for information household appliances by the mobile telephone of 7th Example. The block block diagram of the authentication server of 7th Example. The sequence diagram which shows the authentication procedure of 7th Example. The circuit diagram for demonstrating an 8th Example. The external view of the mobile telephone terminal of 9th Example.

Explanation of symbols

1, 37 NW storage communication unit 2, 31 Mobile phone terminal communication unit 3, 14 NW storage address storage unit 4 Device ID holding unit 5 Device control unit 6, 10 Authentication server communication unit 7 User ID storage unit 11, 35 Information Home appliance terminal communication unit 12 User ID holding unit 13 Device ID storage unit 15 Remote control / program storage unit 16 Remote control unit 17 Authentication information receiving unit 18 Authentication server / address holding unit 19, 36 Access application processing unit 20 Other user information holding Units 21, 38 Terminal address information storage unit 30 Authentication execution unit 32 Authentication information holding unit 33 NW storage address information holding unit 34 Remote control / program holding unit 40 Remote control basic control unit 41 Authentication processing control unit 42 Fingerprint determination unit 101, 201 Information Home appliance terminal 102, 202, 203 Mobile phone terminal 103, 204, 205 Authentication service Bas 104,206,207 NW storage 105,208 router 209 local storage

Claims (8)

  1. Information home appliance terminal equipped with communication means,
    A mobile phone terminal having means for communicating with the information home appliance terminal;
    In an authentication method applied to an information home appliance system comprising: an authentication server comprising means for authenticating access permission to the information home appliance terminal or its related device for a user of this mobile phone terminal;
    An acquisition request for a device-specific ID number (hereinafter, device ID) is made from the mobile phone terminal to the information home appliance terminal,
    Transfer the device ID from the information home appliance terminal to the mobile phone terminal,
    Send the registered user ID and the device ID from the mobile phone terminal to the authentication server,
    User authentication and device authentication are performed in the authentication server,
    If the authentication is successful, the authentication server sends an address for identifying the related device as authentication information to the mobile phone terminal and a remote control program for the information home appliance terminal,
    Transfer the address from the mobile phone terminal to the information home appliance terminal,
    Perform connection from the information home appliance terminal to the related device based on the address,
    An authentication method using the mobile phone terminal as a remote controller of the information home appliance terminal using the remote control program.
  2. Information home appliance terminal equipped with communication means,
    A mobile phone terminal having means for communicating with the information home appliance terminal;
    In an authentication method applied to an information home appliance system comprising: an authentication server comprising means for authenticating access permission to the information home appliance terminal or its related device for a user of this mobile phone terminal;
    While transmitting the registered user ID and the address of the authentication server to be accessed from the mobile phone terminal to the information home appliance terminal,
    A request for transmitting the device ID and the user ID to the authentication server is sent to the information home appliance terminal,
    Transmitting the device ID and the user ID from the information home appliance terminal to the authentication server;
    User authentication and device authentication are performed in the authentication server,
    When authentication is successful, the authentication server notifies the information home appliance terminal of successful authentication, and an address for identifying the related device and a remote control program for information home appliance terminal are transmitted to the mobile phone terminal,
    Transfer the address from the mobile phone terminal to the information home appliance terminal,
    Perform connection from the information home appliance terminal to the related device based on the address,
    An authentication method using the mobile phone terminal as a remote controller of the information home appliance terminal using the remote control program.
  3. In addition to transmitting the device ID and the user ID from the information home appliance terminal to the authentication server,
    Transmitting the user ID registered from the mobile phone terminal to the authentication server;
    The authentication method according to claim 2, wherein user authentication and device authentication are performed by the authentication server.
  4. In the authentication server, for each user of the mobile phone terminal, access restriction information indicating a range in which the user is permitted to access within the information home appliance terminal or the related device is held in advance.
    The authentication according to any one of claims 1 to 3, wherein when the user authentication and the device authentication are performed by the authentication server, an address permission is authenticated except for the information home appliance terminal or the related device whose access is restricted. Method.
  5. When the authentication server is requested to connect to the device by a user who does not have access to the device,
    Apply to the owner of the right to use the device registered from the authentication server,
    When the owner of the usage right permits the connection of the user without the access right to the device,
    The authentication method according to claim 4, wherein an address for identifying the device is transmitted as authentication information to a user who does not have an access right from the authentication server.
  6. In the mobile phone terminal, the acquisition request for the device ID of the information home appliance terminal or the transmission request for the device ID and the user ID is performed in conjunction with an action equivalent to an action for a normal user to operate the information home appliance terminal. The authentication method according to any one of claims 1 to 5.
  7. Identify the user using biometric information in the mobile phone terminal,
    The authentication method according to any one of claims 1 to 6, wherein if the user is a valid user, a user ID is transmitted from the mobile phone terminal to the information home appliance terminal and the authentication server.
  8. Instead of sending an address identifying the related device from the authentication server after successful authentication,
    The IP address of the information home appliance terminal is transmitted from the information home appliance terminal together with the device ID to the mobile phone terminal,
    The IP address together with the device ID and the user ID is transferred from the mobile phone terminal to the authentication server,
    Alternatively, the IP address is transmitted directly from the information home appliance terminal to the authentication server,
    If authentication is successful, the IP address is forwarded to the associated device;
    The authentication method according to claim 1, wherein the related device connects to the information home appliance terminal.
JP2004138698A 2004-05-07 2004-05-07 Authentication method for information appliances using mobile phones Expired - Fee Related JP4301997B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2004138698A JP4301997B2 (en) 2004-05-07 2004-05-07 Authentication method for information appliances using mobile phones

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004138698A JP4301997B2 (en) 2004-05-07 2004-05-07 Authentication method for information appliances using mobile phones

Publications (2)

Publication Number Publication Date
JP2005323070A true JP2005323070A (en) 2005-11-17
JP4301997B2 JP4301997B2 (en) 2009-07-22

Family

ID=35470016

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2004138698A Expired - Fee Related JP4301997B2 (en) 2004-05-07 2004-05-07 Authentication method for information appliances using mobile phones

Country Status (1)

Country Link
JP (1) JP4301997B2 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007142806A (en) * 2005-11-18 2007-06-07 Access Co Ltd Remote control system and apparatus
JP2007243344A (en) * 2006-03-06 2007-09-20 Ntt Docomo Inc Communication method, connection management server, and portable telephone
JP2007305136A (en) * 2006-05-12 2007-11-22 Palo Alto Research Center Inc Personal domain controller
JP2008003743A (en) * 2006-06-21 2008-01-10 Sharp Corp Authentication system and authentication method
JP2008124579A (en) * 2006-11-08 2008-05-29 Nippon Telegr & Teleph Corp <Ntt> Communication system and communication method
JP2008131054A (en) * 2006-11-16 2008-06-05 Sanyo Electric Co Ltd Command processing unit
JP2008172614A (en) * 2007-01-12 2008-07-24 Sharp Corp Remote control system, and server device
WO2008093868A1 (en) * 2007-02-02 2008-08-07 Nec Corporation Control system and control method for controlling controllable device such as peripheral device, and computer program for control
JP2008258666A (en) * 2007-03-30 2008-10-23 Kddi Corp Radio access system and radio access method
JP2009519515A (en) * 2005-12-13 2009-05-14 ▲ホア▼▲ウェイ▼技術有限公司 Method, system, and apparatus for protecting a service account
JP2009110494A (en) * 2007-10-09 2009-05-21 Yahoo Japan Corp Household electric appliance log-in system
JP2009230685A (en) * 2008-03-25 2009-10-08 Seiko Epson Corp Usb host, control method therefor, computer program, usb hub, and usb device
JP2009237687A (en) * 2008-03-26 2009-10-15 Yahoo Japan Corp Picture sharing server, picture sharing system and picture sharing method
JP2010506312A (en) * 2006-10-06 2010-02-25 エフエムアール エルエルシー Reliable multi-channel authentication
WO2009148746A3 (en) * 2008-06-02 2010-04-22 Microsoft Corporation Trusted device-specific authentication
JP2011029919A (en) * 2009-07-24 2011-02-10 Sharp Corp Information terminal, household appliance control method using information terminal, control program
JP2011086232A (en) * 2009-10-19 2011-04-28 Sharp Corp Network system, communication method, communication device, and communication program
JP2011146773A (en) * 2010-01-12 2011-07-28 Nec Casio Mobile Communications Ltd Terminal device and program
JP2011525306A (en) * 2008-04-02 2011-09-15 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Service distribution to consumer electronics devices using mobile communication units for access control and service control
JP2011227882A (en) * 2010-03-30 2011-11-10 Panasonic Corp Device registration method and device registration system
EP2393266A1 (en) * 2010-06-02 2011-12-07 Deutsche Telekom AG Method and system for providing a user equipment with acces control to a remotely controllable device
JP2012023413A (en) * 2010-07-12 2012-02-02 Funai Electric Co Ltd Mobile terminal and system associating mobile terminal with electronic device
JP2012080444A (en) * 2010-10-05 2012-04-19 Pc Depot Corp Remote control system, set-top box, management server, and tablet computer
US8209394B2 (en) 2008-06-02 2012-06-26 Microsoft Corporation Device-specific identity
ITTV20110021A1 (en) * 2011-02-09 2012-08-10 M31 Italia S R L computerized system for the generation of a control interface of an apparatus on a mobile computerized device and method thereof.
ITTV20110020A1 (en) * 2011-02-09 2012-08-10 M31 Italia S R L The computerized system for the generation of user-interface toward an object on a mobile computerized device and method thereof.
JP5173088B1 (en) * 2012-02-28 2013-03-27 パナソニック株式会社 Communication system, electric device, and portable terminal device
WO2013128501A1 (en) * 2012-02-28 2013-09-06 パナソニック株式会社 Communication system, electric apparatus, and portable terminal device
JP2013190956A (en) * 2012-03-13 2013-09-26 Toshiba Corp Access device, system and program
JP2013239020A (en) * 2012-05-15 2013-11-28 Shunji Sugaya Operator authentication server including operator authentication function, operator system, and operator authentication method and program
WO2013189533A1 (en) * 2012-06-20 2013-12-27 Nokia Siemens Networks Oy Device to machine communications
WO2014050857A1 (en) * 2012-09-28 2014-04-03 株式会社クボタ Data communication system for work machine
JP2014072741A (en) * 2012-09-28 2014-04-21 Kubota Corp Data communication system of work machine
JP2014116841A (en) * 2012-12-11 2014-06-26 Fujitsu Ltd Mobile station device, communication system, server device, communication method and computer program
JP2014127729A (en) * 2012-12-25 2014-07-07 Hitachi Ltd Gateway device and pairing method
JP2014153741A (en) * 2013-02-05 2014-08-25 Casio Comput Co Ltd Information management device, portable terminal device and program
JP2014178845A (en) * 2013-03-14 2014-09-25 Casio Comput Co Ltd Portable terminal device and program
JP2014207535A (en) * 2013-04-11 2014-10-30 株式会社オプティム System and method for setting electronic apparatus, and program for electronic apparatus setting system
JP2015082782A (en) * 2013-10-23 2015-04-27 三菱電機株式会社 Apparatus control system
JP2015153027A (en) * 2014-02-12 2015-08-24 キヤノン株式会社 Communication device, communication system, control method for communication device, and program
JP2016192803A (en) * 2016-07-19 2016-11-10 パナソニックIpマネジメント株式会社 Meter system, mobile terminal, program for mobile terminal and server
JP2017084394A (en) * 2016-12-26 2017-05-18 カシオ計算機株式会社 Information processing apparatus, terminal device, and program
JP2017525165A (en) * 2015-07-13 2017-08-31 小米科技有限責任公司Xiaomi Inc. Intelligent device control method, terminal and server
JP2017538977A (en) * 2015-08-28 2017-12-28 小米科技有限責任公司Xiaomi Inc. Method, apparatus and terminal device for determining control authority of user device
US9888060B2 (en) 2013-11-28 2018-02-06 Panasonic Intellectual Property Corporation Of America Control method, communications terminal, and control system
WO2018096772A1 (en) * 2016-11-22 2018-05-31 ソニー株式会社 Information processing terminal, information processing device, information processing method, information processing system, and program
US10277592B2 (en) 2013-08-19 2019-04-30 Ricoh Company, Ltd. Apparatus management system, information terminal, apparatus management apparatus, and apparatus management method

Cited By (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007142806A (en) * 2005-11-18 2007-06-07 Access Co Ltd Remote control system and apparatus
JP4880699B2 (en) * 2005-12-13 2012-02-22 ▲ホア▼▲ウェイ▼技術有限公司 Method, system, and apparatus for protecting a service account
US8732852B2 (en) 2005-12-13 2014-05-20 Huawei Technologies Co., Ltd. Method, system and apparatus for protecting service account
JP2009519515A (en) * 2005-12-13 2009-05-14 ▲ホア▼▲ウェイ▼技術有限公司 Method, system, and apparatus for protecting a service account
JP2007243344A (en) * 2006-03-06 2007-09-20 Ntt Docomo Inc Communication method, connection management server, and portable telephone
JP4643472B2 (en) * 2006-03-06 2011-03-02 株式会社エヌ・ティ・ティ・ドコモ Communication method, connection management server, and mobile phone
KR101482534B1 (en) * 2006-05-12 2015-01-15 삼성전자주식회사 Personal Domain Controller
JP2007305136A (en) * 2006-05-12 2007-11-22 Palo Alto Research Center Inc Personal domain controller
JP2008003743A (en) * 2006-06-21 2008-01-10 Sharp Corp Authentication system and authentication method
JP2010506312A (en) * 2006-10-06 2010-02-25 エフエムアール エルエルシー Reliable multi-channel authentication
JP2008124579A (en) * 2006-11-08 2008-05-29 Nippon Telegr & Teleph Corp <Ntt> Communication system and communication method
JP2008131054A (en) * 2006-11-16 2008-06-05 Sanyo Electric Co Ltd Command processing unit
JP2008172614A (en) * 2007-01-12 2008-07-24 Sharp Corp Remote control system, and server device
WO2008093868A1 (en) * 2007-02-02 2008-08-07 Nec Corporation Control system and control method for controlling controllable device such as peripheral device, and computer program for control
JP2008258666A (en) * 2007-03-30 2008-10-23 Kddi Corp Radio access system and radio access method
JP2009110494A (en) * 2007-10-09 2009-05-21 Yahoo Japan Corp Household electric appliance log-in system
JP4651690B2 (en) * 2007-10-09 2011-03-16 ヤフー株式会社 Home appliance login system
JP2009230685A (en) * 2008-03-25 2009-10-08 Seiko Epson Corp Usb host, control method therefor, computer program, usb hub, and usb device
JP2009237687A (en) * 2008-03-26 2009-10-15 Yahoo Japan Corp Picture sharing server, picture sharing system and picture sharing method
JP2011525306A (en) * 2008-04-02 2011-09-15 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Service distribution to consumer electronics devices using mobile communication units for access control and service control
JP2011522327A (en) * 2008-06-02 2011-07-28 マイクロソフト コーポレーション Authentication limited to trusted equipment
US8209394B2 (en) 2008-06-02 2012-06-26 Microsoft Corporation Device-specific identity
WO2009148746A3 (en) * 2008-06-02 2010-04-22 Microsoft Corporation Trusted device-specific authentication
US7979899B2 (en) 2008-06-02 2011-07-12 Microsoft Corporation Trusted device-specific authentication
US8800003B2 (en) 2008-06-02 2014-08-05 Microsoft Corporation Trusted device-specific authentication
JP2011029919A (en) * 2009-07-24 2011-02-10 Sharp Corp Information terminal, household appliance control method using information terminal, control program
JP2011086232A (en) * 2009-10-19 2011-04-28 Sharp Corp Network system, communication method, communication device, and communication program
JP2011146773A (en) * 2010-01-12 2011-07-28 Nec Casio Mobile Communications Ltd Terminal device and program
JP2011227882A (en) * 2010-03-30 2011-11-10 Panasonic Corp Device registration method and device registration system
EP2393266A1 (en) * 2010-06-02 2011-12-07 Deutsche Telekom AG Method and system for providing a user equipment with acces control to a remotely controllable device
JP2012023413A (en) * 2010-07-12 2012-02-02 Funai Electric Co Ltd Mobile terminal and system associating mobile terminal with electronic device
JP2012080444A (en) * 2010-10-05 2012-04-19 Pc Depot Corp Remote control system, set-top box, management server, and tablet computer
ITTV20110021A1 (en) * 2011-02-09 2012-08-10 M31 Italia S R L computerized system for the generation of a control interface of an apparatus on a mobile computerized device and method thereof.
ITTV20110020A1 (en) * 2011-02-09 2012-08-10 M31 Italia S R L The computerized system for the generation of user-interface toward an object on a mobile computerized device and method thereof.
WO2013128501A1 (en) * 2012-02-28 2013-09-06 パナソニック株式会社 Communication system, electric apparatus, and portable terminal device
US10455017B2 (en) 2012-02-28 2019-10-22 Panasonic Intellectual Property Management Co., Ltd. Communication system, electric appliance, and portable terminal device
JP5173088B1 (en) * 2012-02-28 2013-03-27 パナソニック株式会社 Communication system, electric device, and portable terminal device
JP2013190956A (en) * 2012-03-13 2013-09-26 Toshiba Corp Access device, system and program
CN103428193A (en) * 2012-05-15 2013-12-04 株式会社OPTiM Operator authentication server with operator authentication function, operator system, operator authentication method and procedure
CN103428193B (en) * 2012-05-15 2017-03-01 株式会社OPTiM Possess operator's certificate server, operator's system, operator's authentication method and the program of operator's authentication function
JP2013239020A (en) * 2012-05-15 2013-11-28 Shunji Sugaya Operator authentication server including operator authentication function, operator system, and operator authentication method and program
US9749856B2 (en) 2012-06-20 2017-08-29 Nokia Solutions And Networks Oy Device to machine communications
WO2013189533A1 (en) * 2012-06-20 2013-12-27 Nokia Siemens Networks Oy Device to machine communications
US9386449B2 (en) 2012-09-28 2016-07-05 Kubota Corporation Data communication system for working machine
WO2014050857A1 (en) * 2012-09-28 2014-04-03 株式会社クボタ Data communication system for work machine
CN104205792A (en) * 2012-09-28 2014-12-10 株式会社久保田 Data communication system for work machine
JP2014072741A (en) * 2012-09-28 2014-04-21 Kubota Corp Data communication system of work machine
JP2014116841A (en) * 2012-12-11 2014-06-26 Fujitsu Ltd Mobile station device, communication system, server device, communication method and computer program
JP2014127729A (en) * 2012-12-25 2014-07-07 Hitachi Ltd Gateway device and pairing method
JP2014153741A (en) * 2013-02-05 2014-08-25 Casio Comput Co Ltd Information management device, portable terminal device and program
JP2014178845A (en) * 2013-03-14 2014-09-25 Casio Comput Co Ltd Portable terminal device and program
JP2014207535A (en) * 2013-04-11 2014-10-30 株式会社オプティム System and method for setting electronic apparatus, and program for electronic apparatus setting system
US10277592B2 (en) 2013-08-19 2019-04-30 Ricoh Company, Ltd. Apparatus management system, information terminal, apparatus management apparatus, and apparatus management method
JP2015082782A (en) * 2013-10-23 2015-04-27 三菱電機株式会社 Apparatus control system
US9888060B2 (en) 2013-11-28 2018-02-06 Panasonic Intellectual Property Corporation Of America Control method, communications terminal, and control system
JP2015153027A (en) * 2014-02-12 2015-08-24 キヤノン株式会社 Communication device, communication system, control method for communication device, and program
JP2017525165A (en) * 2015-07-13 2017-08-31 小米科技有限責任公司Xiaomi Inc. Intelligent device control method, terminal and server
JP2017538977A (en) * 2015-08-28 2017-12-28 小米科技有限責任公司Xiaomi Inc. Method, apparatus and terminal device for determining control authority of user device
JP2016192803A (en) * 2016-07-19 2016-11-10 パナソニックIpマネジメント株式会社 Meter system, mobile terminal, program for mobile terminal and server
WO2018096772A1 (en) * 2016-11-22 2018-05-31 ソニー株式会社 Information processing terminal, information processing device, information processing method, information processing system, and program
JP2017084394A (en) * 2016-12-26 2017-05-18 カシオ計算機株式会社 Information processing apparatus, terminal device, and program

Also Published As

Publication number Publication date
JP4301997B2 (en) 2009-07-22

Similar Documents

Publication Publication Date Title
US9059995B2 (en) Delegating or transferring of access to resources between multiple devices
EP2854433B1 (en) Method, system and related device for realizing virtual sim card
US10116448B2 (en) Transaction authorization method and system
US9027085B2 (en) Method, system and program product for secure authentication
US9419969B2 (en) Method and system for granting access to a secured website
KR101419984B1 (en) System and method for sharing content suing nfc in cloud circumstance
KR101819556B1 (en) Apparatus and method for supporting family cloud in cloud computing system
TW595184B (en) Wide area network, access authentication system using the network, connection device for bridging, terminal equipment in connection with connector and access authentication method
CN103023917B (en) The mthods, systems and devices of authorizing are carried out for intelligent appliance
JP4551369B2 (en) Service system and service system control method
US9391961B2 (en) Information operating device, information output device, and information processing method
US8056122B2 (en) User authentication method and system using user&#39;s e-mail address and hardware information
JP4992283B2 (en) Dynamic authentication method, dynamic authentication system, control program, and physical key
KR100412510B1 (en) An instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof
JP4742903B2 (en) Distributed authentication system and distributed authentication method
CN100533440C (en) Providing a service based on an access right to a shared data
JP5494816B2 (en) Communication control device, system, method, and program
RU2409853C2 (en) Management of access control in wireless networks
CN101682439B (en) Method for using contents, method for sharing contents and device based on security level
KR101031168B1 (en) Information processing device, and access control processing method
US9548975B2 (en) Authentication method, authentication system, and service delivery server
JP4235102B2 (en) Authentication method between portable article for telecommunication and public access terminal
KR100591495B1 (en) Service verification system, authorization requesting terminal, service using terminal and service providing method
DE602004001384T2 (en) Automatic authentication selection server
WO2015070732A1 (en) Access control system, authorization method and device thereof, and storage medium

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20060718

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20081028

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20081111

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20081226

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20090421

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20090421

FPAY Renewal fee payment (prs date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120501

Year of fee payment: 3

R150 Certificate of patent (=grant) or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (prs date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130501

Year of fee payment: 4

FPAY Renewal fee payment (prs date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140501

Year of fee payment: 5

LAPS Cancellation because of no payment of annual fees