WO2004086294A1 - 認証カードおよび該認証カードにより相互認証を行うワイヤレス認証システム - Google Patents
認証カードおよび該認証カードにより相互認証を行うワイヤレス認証システム Download PDFInfo
- Publication number
- WO2004086294A1 WO2004086294A1 PCT/JP2003/003574 JP0303574W WO2004086294A1 WO 2004086294 A1 WO2004086294 A1 WO 2004086294A1 JP 0303574 W JP0303574 W JP 0303574W WO 2004086294 A1 WO2004086294 A1 WO 2004086294A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- unit
- authentication
- identification code
- level
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1427—Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0205—Specific application combined with child monitoring using a transmitter-receiver system
- G08B21/0213—System disabling if a separation threshold is exceeded
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/675—Preventing unauthorised calls from a telephone set by electronic means the user being required to insert a coded card, e.g. a smart card carrying an integrated circuit chip
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- Wireless authentication system that performs mutual authentication based on the authentication power
- the present invention relates to an authentication card that is attached to a portable device carried by an owner and performs wireless authentication of a device-side authentication card attached to another device. Also, the present invention provides an authentication card for wireless authentication of a portable authentication card attached to a device including an information device, a house electronic lock, and an automobile electronic lock, and attached to a portable device carried by the owner. About. Further, the present invention relates to a wireless authentication system in which a first authentication card attached to a portable device carried by an owner and a second authentication card attached to a device perform mutual authentication. Background art
- PDAs personal digital assistants
- notebook computers have become widespread. These portable information devices store a great deal of information on the individual who uses it, and information on the company to which the individual belongs.
- the user when locking or unlocking a door lock wirelessly using radio waves without using a key as in a keyless entry of a car, the user carries a portable device corresponding to the key of the car and carries the portable device.
- the device is used to remotely control the locking and unlocking of vehicle door locks by radio signals.
- the present invention provides an authentication device that is attached to a portable device carried by the owner and performs wireless authentication of a device-side authentication device attached to another device. Further, the present invention performs wireless authentication of a portable-side authentication card attached to a device including an information device, an electronic lock of a house, and an electronic lock of an automobile and attached to a portable device carried by an owner. Provide authentication skills.
- the authentication card is an authentication card that is attached to a portable device carried by the owner and performs wireless authentication of a device-side authentication power attached to another device.
- a receiving unit for receiving the identification code, and determining whether a reception level of the identification code received by the receiving unit is equal to or greater than a predetermined value.
- a determination unit that determines whether the identification code received by the unit matches the identification code of the device-side authentication card stored in the storage unit; If the reception level of the identification code received by the receiving unit is smaller than the predetermined value, or the identification code received by the receiving unit and the device-side authentication card stored in the storage unit And an alarm unit for outputting an alarm signal to the portable device when the identification code does not match.
- the reception level of the identification code received by the receiving unit of the authentication code is lower than a predetermined value, or when the identification code received by the receiving unit and the storage unit are stored. If the stored identification code of the device-side authentication card does not match, an alarm signal is transmitted to the portable device. That is, when the device-side authentication card (and the device to which it is attached) is far away from the authentication card card and the reception level is weakened, or when the authentication card cannot authenticate the device-side authentication card, an alarm signal is issued. Provided to the device. As a result, the owner of the portable device can immediately know that the device has been lost or stolen.
- the authentication card forms an electrical connection with the mobile device by being attached to the mobile device, and forms a first signal level of the mobile device by forming the electrical connection.
- Level and further comprising a connection unit for setting the level of the predetermined signal to a second level by disconnecting from the mobile device and disconnecting the electrical connection, wherein the level of the predetermined signal is The second level disables the portable device.
- the authentication card according to the second aspect of the present invention is attached to a device including an information device, an electronic lock of a house, and an electronic lock of a vehicle, and is attached to a portable device carried by the owner.
- a storage unit that stores data of a call signal, an identification code of the authentication card, and an identification code of the mobile-side authentication card;
- a receiving unit that receives a wireless signal from the authentication unit; and within a predetermined time, a first determination whether the receiving unit receives a wireless signal, and the receiving unit performs the first determination within the predetermined time.
- a first determination unit which performs the third determination of whether the first determination unit result of the determination by, when the from the first at least one third determination not satisfied, A signal output unit that outputs a signal for disabling the device to the device.
- the storage is performed.
- a signal that matches the interrogation signal stored in the unit is not included in the radio signal or when the reception level of the radio signal is lower than a predetermined level, a signal that disables the device is transmitted to the device. Is output.
- the device will be immediately disabled and the information stored in the device will be disabled. Outflow to third parties is prevented.
- the authentication card forms an electrical connection with the device by being attached to the device, and sets the level of a predetermined signal of the device to an i-th level by forming the electrical connection;
- a connection unit that removes the electrical connection and disconnects the electrical connection to change the level of the predetermined signal to a second level, wherein the level of the predetermined signal is the second level.
- the level reaches 2
- the device is disabled.
- a wireless authentication system includes a first authentication card attached to a portable device carried by an owner, and a second authentication force attached to another device.
- a wireless authentication system in which a first authentication code and a second authentication code perform mutual authentication, wherein the first authentication card includes data of an interrogation signal, and a first identification code of the first authentication code.
- a first storage unit for storing a second identification code of the second authentication force, and a call signal stored in the first storage unit, or stored in the storage unit.
- a first transmitting unit that transmits the specified interrogation signal and the first identification code as a wireless signal of a predetermined transmission level, and wirelessly transmits the second authentication force as a response to the transmission of the first transmitting unit.
- the identification code of the second authentication power transmitted by a signal.
- a first receiving unit for transmitting the identification code, and determining whether a reception level of the identification code received by the first receiving unit is equal to or higher than a predetermined value, and an identification code received by the first receiving unit.
- a first determination unit that determines whether the second identification code stored in the storage unit matches the first identification code; When the reception level of the identification code received by the first reception unit is smaller than the predetermined value, or when the reception level of the identification code received by the first reception unit is stored in the storage unit, An alarm unit that outputs an alarm signal to the portable device when the stored second identification code does not match, and wherein the second authentication card includes data of an interrogation signal; A second storage unit for storing a second identification code of a second authentication card, and a first identification code of the first authentication card; and a radio signal from the first authentication card.
- a second receiving unit for receiving, during a predetermined time, a first determination whether the second receiving unit receives a radio signal, and the second receiving unit When a wireless signal is received in the second storage unit, A second determination as to whether a signal that matches the received interrogation signal is included in the wireless signal and a third determination as to whether the reception level of the wireless signal is equal to or higher than a predetermined level.
- FIG. 1 shows an example of using an authentication card according to an embodiment of the present invention.
- FIG. 2 is a block diagram showing a detailed configuration of the transmission unit.
- FIG. 3 is a block diagram showing a configuration example of the release unit 20. As shown in FIG. 3
- FIG. 4 shows an example of the detailed configuration of the coincidence addition circuit.
- FIG. 5 is an explanatory diagram of the identification signal and the transmission timing.
- FIG. 6 is an explanatory diagram of the configuration of the identification number.
- FIG. 7 is an explanatory diagram of the pulse compression signal and the pulse compression processing.
- FIG. 8 is an explanatory diagram of the relationship between the detection waveform of the received signal and the confirmation signal.
- FIG. 9 is an explanatory diagram of a reception signal level and a signal level determination section.
- FIGS. 10 (A) and 10 (B) are block diagrams showing the configuration of a circuit for turning off the power of a device provided with a use restriction release unit.
- FIG. 11 is a block diagram showing a schematic configuration of an authentication card transmission unit and an authentication card release unit according to the second embodiment of the present invention.
- FIG. 12 is a block diagram illustrating a more specific configuration example of the arithmetic processing unit and the wireless processing unit.
- FIG. 13 is a block diagram illustrating a more specific configuration example of the arithmetic processing unit and the wireless processing unit.
- FIG. 14 is a flowchart showing the flow of processing of the transmission unit.
- FIG. 15 is a flowchart showing the flow of the processing of the release unit.
- FIG. 16 is a time chart showing data and communication timing transmitted between the transmission unit and the release unit.
- Figure 17 shows an example of using an authentication card for home security.
- Figure 18 shows an example in which an authentication card is attached to a car key carried by a car driver (owner), a car lock is recognized in a door lock of car C, and a certification card is inserted.
- FIG. 1 shows an example of using an authentication card according to an embodiment of the present invention.
- the authentication card includes a parent authentication card 1 and a child authentication card 2.
- the parent authentication card 1 is attached (loaded) to the mobile phone 30.
- An example is shown in which the child-side authentication card 2 is attached (loaded) to a PDA (Personal Digital Assistant) 40 as an example of a portable information device.
- PDA Personal Digital Assistant
- the mobile phone 30 and the PDA 40 are provided with slots for inserting authentication cards 1 and 2, respectively.
- the owners of the mobile phone 30 and the PDA 40 are generally the same.
- the authentication card 1 has a memory card (for example, a memory stick, a multimedia card, an SD memory card (registered trademark), etc.) 100 on which an identification signal transmitting unit (key module) 10 having a wireless communication function is attached. Or, it is built-in.
- the authentication card 2 is a memory card 200 in which a use restriction release unit (base module) 20 having a wireless / wireless communication function is attached or built in.
- the authentication cards 1 and 2 are provided with an identification signal transmission unit (hereinafter simply referred to as “transmission unit”) 10 having the wireless communication function and a use restriction release unit (hereinafter simply referred to as “unit”). It is called “release unit”. According to 20, mutual identification information is exchanged wirelessly at fixed time intervals (for example, 1 second interval, 2 second interval, etc.), and mutual authentication is performed.
- transmission unit an identification signal transmission unit
- unit a use restriction release unit
- the two authentication cards 1 and 2 can perform mutual authentication.
- Force unit 2 release unit 20 releases the use restriction of PDA40 and makes PDA40 usable. This allows the owner to use the PDA40.
- the PDA 40 with the authentication code 2 has been separated from the authentication card 1 by more than the above-mentioned predetermined distance due to, for example, loss, misplacement, theft, or the like, or the If the mutual authentication cannot be performed because the identification information exchanged between the devices does not match, the release unit 20 of the authentication capability 2 restricts the use of the PDA 40 and disables the PDA 40.
- the unusable state includes, for example, erasing the contents of the memory of the PDA 40, turning off the power of the PDA 40 so that it cannot be turned on, or disabling the input. This prevents the information stored in the PDA 40 from leaking to a third party.
- the authentication card 1 If the authentication card 1 is farther than the above-mentioned predetermined distance or the mutual authentication cannot be performed because the identification information does not match, an alarm is issued via the mobile phone 30 and the mobile phone 30 Notify the owner of 30 that PDA 40 is more than a predetermined distance from the power of mobile phone 30 (authentication card 2). Thus, the owner can immediately know that the PDA 40 is not at hand due to loss, misplacement, theft, or the like.
- the unusable state includes a state in which the power of the mobile phone 30 is turned off so that it cannot be turned on, a state in which an input is not accepted, and the like.
- the PDA 40 makes itself unnecessary.
- the unusable state includes, for example, erasing the contents of the memory of the PDA 40, turning off the power of the PDA 40 so that it cannot be turned on, or setting the PDA 40 to a state in which input cannot be accepted.
- the authentication card 2 is an additional memory which is the original function of the memory card. It also functions as a PDA 40 use restriction release device (or use restriction device).
- the authentication code 1 functions as an additional memory card for the mobile phone 30, while a notification device for notifying the loss of the PDA 40, a use restriction device for the mobile phone 30 (or a use restriction device). Release device).
- FIG. 2 is a block diagram showing a detailed configuration of the transmission unit 10.
- the transmission unit 10 When the authentication card 1 is attached to the mobile phone 30, the transmission unit 10 is connected to the mobile phone 30, the power supply and the unit (battery pack and power regulator) 18 (or the memory card 1). If 00 has a power supply, it is supplied with power from that power supply and operates.
- the transmission unit 10 is sent back from the transmitter 15b, which transmits an identification signal including a preset unique code signal from the transmission antenna 10T, and from the transmitter of the release unit 20, which will be described later. And a receiver 11a for receiving the confirmation signal via the receiving antenna 1OR.
- the transmission system that transmits the identification signal sends out the identification signal set in the identification code memory 13b by the command of the transmission / reception control timer 13a, and the FSK modulation circuit 15a modulates the FSK with a carrier wave (250 MH z), and transmits a transmission signal of the identification signal from the transmitter 15b.
- the power supply control circuit 14 turns on and off the switch 18a according to the command of the transmission / reception control timer 13a, and the power from the power supply section 18 of the mobile phone 30 is transmitted only when the signal is transmitted.
- the transmission / reception control timer 13a is constantly supplied with power from the power supply unit 18). By doing so, the power consumption of the power supply section 18 of the mobile phone 30 or the memory card 100 can be reduced.
- the receiving system that receives the confirmation signal from the release unit 20 is Are connected.
- the received confirmation signal 250 MHz
- the FSK demodulation circuit 11b is FSK-demodulated by the FSK demodulation circuit 11b and sent to the coincidence / addition circuit 11c.
- the match / addition circuit 11c reads the identification signal stored in advance in the identification code memory 13b, and determines whether or not the confirmation signal matches this identification signal. Is added to the coincidence point for each bit.
- the added output signal (pulse compression signal, which will also be described later) is output to the threshold direct processing section 11d.
- Threshold # The processing unit 1 1 d compares this output signal with a threshold value (threshold Horno red value) preset in the threshold value direct setting unit lid ′, and if the output signal exceeds the threshold value The timing signal is sent to the signal presence / absence determination unit 12b.
- the confirmation signal received by the receiver 11a is also sent to the signal level detection circuit 12a, and the signal indicating the signal level detected by the detection circuit 12a is sent to the signal presence / absence determination unit 1 Sent to 2b.
- a confirmation signal from the FSK demodulation circuit 11b and an identification code signal from the identification code memory 13b are also input to the signal presence / absence determination section 12b.
- the signal presence / absence determination section 12b determines whether the confirmation signal and the identification code signal match, and receives the timing signal from the threshold processing section 11d to receive the confirmation signal within a predetermined time t after receiving the timing signal. It is determined whether the signal level is equal to or higher than a certain value. The signal presence / absence determination unit 12b does not emit an output signal as long as these two determinations are both satisfied. If the above-mentioned coincidence determination is satisfied, but the signal level is determined to be below a certain value, an alarm signal is output. The alarm signal is given to the mobile phone 30 from the connection between the authentication card 1 and the mobile phone 30. The mobile phone 30 issues an alarm upon receiving the alarm signal. This warning is issued by, for example, a warning sound from a speaker or a display of a warning on a display device.
- FIG. 3 is a block diagram showing a configuration example of the release unit 20.
- the release unit 20 is connected to the power supply unit (battery pack and power supply regulator) 28 of the PDA 40 (or when the memory card 200 has a power supply unit). Is supplied with power from its power supply and operates.
- the power supply unit battery pack and power supply regulator
- This release unit 20 is basically the same as the transmission unit 10 of FIG. 2, but is slightly different in part, and the different parts will be mainly described below.
- the signal presence / absence determination unit 22b determines the presence or absence of a signal based on the identification signal sent from the transmission unit 10, and does not output any signal as long as the identification signal is received. This is the same as the transmission unit 10.
- the use restriction release signal generator 26 always generates a use restriction release signal if there is no output signal from the signal presence / absence determiner 22b, and the signal presence / absence determiner 22 when the identification signal is no longer received. The difference is that the transmission of the release signal from the signal generator 26 is stopped by the output signal from b.
- the power of the power supply unit 28 is not controlled by the transmission / reception control timer 23a and is always sent to each component. This is because, as will be described later, no matter when the transmitting unit 10 transmits the identification signal, the release unit 20 can always receive the identification signal, and after determining whether or not there is an identification signal based on the signal, the transmission / reception control is performed. This is to ensure that the confirmation signal can always be sent back at regular intervals from the transmission system in response to a timer command.
- the other components are basically the same as the transmission cut 10 in FIG. 2, and the same components are denoted by the same reference numerals in the 20's and will not be described.
- the identification signal from the transmission unit 10 is a signal including a preset unique code signal, but as shown in FIG. 6, this identification signal is an M sequence (Maximum length null sequence). ) It consists of a signal (M-sequence data) followed by a unique code signal and power of the telephone number of the mobile phone 30 (hereinafter simply referred to as “telephone number”).
- M-sequence data a signal followed by a unique code signal and power of the telephone number of the mobile phone 30 (hereinafter simply referred to as “telephone number”).
- phone number The reason that the M-sequence signal is included in addition to the telephone number as the identification number is that, as described later, when the identification number is received, it is recognized whether the received signal is that of the own mobile phone. This is to make the signal convenient at the time of the circuit processing.
- this identification signal is transmitted as an intermittent signal that repeats at an arbitrary time interval S seconds (for example, 1 second, 2 seconds, etc.) in units of the M-sequence signal and the telephone number signal. This is to save power, to prevent battery consumption and to enable stable long-term transmission.
- the M-sequence signal may be a CZA code, a P-code, a linear FM signal, or the like.
- the telephone number as the unique code signal may be another ID number for a device other than a mobile phone, or a signal indicating information of another owner or manager.
- a pulse compression signal indicated by reference sign B in FIG. 7 is obtained. In this pulse compression, the M-sequence signal as the input signal is subjected to 1Z31 signal compression.
- the number of unique code signals is required for the number of mobile phones sold, but if the code length is m bits, two types are possible.
- a unique code signal is possible.
- the unique code signal is a telephone number, but may be another ID number. If the M-sequence signal and the unique code signal are stored in advance in the identification code memory as identification signals, unauthorized use in case of misplacement or theft can be effectively prevented.
- Fig. 4 shows that after the identification signal is transmitted from the transmission unit 10 and received by the release unit 20, the same signal is sent back as a confirmation signal after a certain period of time from the release unit 20 based on this.
- the details of the configuration in which the signal received by the transmission unit 10 is matched by the transmission unit 10 and the pulse compression processing is performed by the addition circuit 11c will be described.
- the FSK demodulation circuit 11b demodulates the confirmation signal
- the leading M-sequence signal of the confirmation signal is temporarily stored in a shift register 11s not shown in FIG.
- the M-sequence signal written in the shift register 11 s is sent to the coincidence / addition circuit 11 c.
- the match 'addition circuit 11c reads the M-sequence signal from the data stored in advance in the identification code memory 13b, and compares whether both M-sequence signals match for each bit. Add the number of matching bits.
- the signal subjected to the coincidence addition processing is output from the coincidence addition circuit 11c as a pulse compression signal.
- the shift register 11s has a storage capacity of 31 bits, while the identification code memory 13b stores both the M-sequence signal (31 bits) and the unique code signal (29 bits). Therefore, it has a storage capacity of 60 bits. Therefore, when processing both M-sequence signals, 31 bits, which are the data part of the M-sequence signal, of the 60 bits of the identification code memory 13b are called.
- the transmission unit 10 and the operation of the release unit 20 will be described.
- the power of the power supply unit of the mobile phone 30 is supplied, and the transmission / reception control timer 13a is immediately set. And In response to a signal from the transmission / reception control timer 13a, the power supply control circuit 14 closes the switch 18a. Thus, power is supplied from the power supply unit 18 to each unit.
- the identification signal is read from the identification code memory 13b by the instruction of the control timer 13a when 2 ms elapses after the power supply is turned on.
- transmission is performed from the transmitter 15b via the transmission antenna 10T.
- the identification signal is transmitted by performing FSK modulation on a 31-bit M-sequence signal and a 29-bit unique code signal indicating a unique telephone number.
- the transmission signal of the identification signal from the transmission unit 10 is received by the release unit 20 at a predetermined level or more, and the identification signal is recognized as the own unit, the same transmission signal as the identification signal is output from the release unit 20. It is sent back and received by transmission unit 10 as a confirmation signal.
- the transmission and reception timings are as shown in Figs. 5 (a) to 5 (c).
- the transmission timing is controlled by the control timer 13a so that the power supply becomes ⁇ N at a constant time of, for example, 2000 ms from the first power supply ⁇ N after a predetermined time has elapsed.
- the alarm circuit 16 is transmitted based on the received signal. It does not work as the original received signal, such as when an alarm signal is not sent, and is distinguished from a confirmation signal.
- the receiver 11a receives the confirmation signal sent back from the release unit 20 at a predetermined timing, it is demodulated by the demodulation circuit 11b, and then by the matching 'addition circuit 11c.
- the pulse compression processing has already been described with reference to FIG.
- the M signal of symbol A shown in Fig. 7 (a) of the confirmation signal is subjected to pulse compression power S, and the signal to be matched and added is denoted by symbol B, as shown in symbol B.
- the data for each bit partially matches the corresponding bit value of the M-sequence signal storage data in the identification code memory. Pulse compression signal Its value constantly fluctuates.
- the match-addition circuit 11c When data matching the M-sequence signal stored in its own identification code memory 13b is written to the shift register 11s, the match-addition circuit 11c performs the match-addition processing. If the number is satisfied for all the bits 3 1 of the shift register 13 3 s, the pulse compression signal becomes 3 1 and the M-sequence signal is a perfect match, or at least matches. ⁇ If the number of bits to be added is 24 or more, If so, both M-sequence signals can be regarded as coincident.
- the threshold processing unit 11d determines whether the pulse compression processing signal is equal to or greater than a threshold (threshold value) preset by the threshold setting unit 1Id ', for example, 24 (FIG. 7 (b)). If it is determined that the threshold value is exceeded, a timing signal as shown in FIG.
- the signal level of the received signal received by the receiver 11a is detected by the signal level detection circuit 12a, and the signal presence / absence determination unit determines whether the signal level is equal to or greater than a predetermined value.
- Judge with 1 2 b This signal level is determined by setting a certain voltage threshold for the received signal having the detection waveform shown in Fig. 8 (a), and if the signal level is higher than that, it is determined that a signal of a certain level or higher has been received.
- Fig. 9 (a) when the signal transmitted at a constant strength is received, the above judgment is made when the distance R between the transmission unit 10 and the release unit 20 increases, the distance 2 This is based on the fact that the received signal level decreases in inverse proportion to the power, and one of the determination methods is to set the above-mentioned threshold value corresponding to a predetermined distance (for example, lm) so that the received signal level can be less than the threshold value. For example, it is possible to detect that both are separated by a predetermined distance or more.
- Fig. 9 (a) is shown on a logarithmic scale.
- the level of the received signal may be known by AZD converting the detection waveform of the received signal and measuring the voltage level of the received signal.
- the determination of the signal level is performed by a fixed time t (corresponding to the unique code signal received after the timing signal after the threshold processing for the M-sequence signal is transmitted from the threshold processing unit 11d) (in the illustrated example, Only 2.9 ms) is symmetric. The reason is to prevent noise from detecting the signal level from other telephones. Accurate judgment can be made by using the certain time specified by the timing signal as the judgment section. Because it can be performed.
- the determination by the signal presence / absence determination unit 12b is performed in addition to the determination of the signal level described above.
- the unique code signal received after the timing signal is input and FSK-modulated is stored in the identification code memory. It is also performed on whether they match. Therefore, the signal presence / absence determining section 12b receives a timing signal, receives a received signal at a predetermined level for a certain period of time thereafter, and receives the received unique code signal as its own unique code. If it is determined that the signal matches the signal, the transmission unit 10 to the release unit 20 are within a certain distance, and the signal presence / absence determination unit 12b does not output any signal.
- the release unit 20 Even if there is a timing signal input and the unique code signal matches its own, if the signal level is below a certain level, the release unit 20 will be more than a certain distance from the transmission unit 10 In this case, the signal presence / absence determination unit 12b outputs an alarm signal to the mobile phone 30.
- a voice message “Don't leave it” is generated with a speed (not shown) to give a warning, so that the PDA 40 (cancellation unit 20) is misplaced, Warn the owner about leaving.
- a warning beep or a method of giving a warning by some means such as displaying a "Do not leave” message on the display together with the warning message Any method may be used.
- a signal other than the confirmation signal of the own identification code signal is received, any or some of the above three conditions are not satisfied. Needless to say, it has no effect on the receiving operation of the transmission unit 10.
- the operation of the release unit 20 is as follows. As described above, the release unit 20 is inserted into the PDA 40, so that each component is always connected to the power supply unit 28 regardless of whether the power switch of the mobile phone 30 is ON or OFF. Power is being supplied to the element. Therefore, almost simultaneously with the transmission of the identification signal from the transmission unit 10, the identification signal is received by the receiver 21 a of the release unit 20. The received identification signal is demodulated by the FSK demodulation circuit 21b, sent to the match / addition circuit 21c, and the timing signal based on the M-sequence signal is sent from the threshold processing unit 21d to the signal presence / absence determination unit 22b. The same goes for the point sent to.
- the signal level of the received signal is detected by a signal level detection circuit 22a, and when the signal level exceeds a predetermined level within a predetermined determination time t when the timing signal is sent to the signal presence / absence determination section 22b. It is the same to determine a certain force.
- the signal presence / absence determination unit 22b during the determination time also transmits a point that determines whether the transmitted signal matches its own unique code signal stored in advance in the identification code memory 23b.
- Unit 10 is the same.
- the signal presence / absence determination section 2 2b of the release unit 20 can be used when the above-mentioned timing signal and the two determinations satisfy both the three conditions that the signal level is equal to or more than a certain value and the unique code signal matches. Output signal is not output.
- the release unit 20 and therefore the PDA 40 will stay at the owner's hand without leaving the transmission unit 10 and will always output the use restriction release signal from the use restriction release signal generator 26. Have been. Therefore, the mobile phone 30 is always ready for use.
- the signal presence / absence determination section 22b After a certain period of time (2 ms in this example) elapses in the signal presence / absence determination section 22b after the identification signal is received, the signal presence / absence determination section 22b transmits and receives the signal from the signal presence / absence determination section 22b immediately
- the control timer 23a is set, and a signal exactly the same as the received identification signal is read from the identification code memory 23b and transmitted via the FSK modulation circuit 25a and the transmitter 25b. This signal is received by the transmission unit 10 as a confirmation signal as described above.
- the release unit 20 If the release unit 20 is separated from the transmitting unit 10 by more than a certain distance together with the PDA 40 due to misplacement or theft, the signal level will be lower than a certain level in the above signal level detection, and the signal presence / absence determination unit 2 2b determines that the identification signal has not been received. When this determination is made, an output signal is output from signal presence / absence determination section 22b, and the release signal generation section 26 stops outputting the release signal applied to PDA 40. As a result, the PDA 40 is disabled.
- this unusable state includes erasing the internal memory of the PDA 40, And turning off the power source.
- an interrupt signal is input to the CPU of the PDA40 when the release signal is stopped (for example, the signal level becomes low), and the memory erase program is executed by this interrupt signal. This is performed by being executed by the CPU of the PD A40.
- This memory erasing program may be stored in advance in the memory card 200 of the authentication card 2 and downloaded from the memory card 200 to the PDA 40 when the authentication card 2 is attached, or may be stored in the internal memory of the PDA 40 in advance. You can.
- the power supply of the PDA 40 when the power supply of the PDA 40 is turned off, it can be performed by controlling the regulator 29 of the PDA 40, for example, as shown in FIG. 10 (A) or (B).
- FIG. 10 (A) if the enable terminal for controlling the enable / disable of the regulator 29 is present in the regulator 29 of the PDA 40, the stop of the use release signal causes the PDA to stop.
- Numeral 40 sets the signal input to the Enable terminal to a low level (a level at which the signal is separated). As a result, the power output from the regulator 29 stops, and the PDA 40 is turned off.
- stopping the use restriction release signal is an operation of changing the use restriction release signal from a high level to a low level
- the use restriction release signal can be directly input to the regulator 29 as a control signal as it is.
- the configuration can be such that the owner can select whether the memory erasing power of the PDA 40 is in the power-off state as the unusable state, or the memory erasing can be set in advance as the selection of the default.
- the authentication card 1 having the transmission unit 10 is inserted into the mobile phone 30 and the owner or user inserts the mobile phone 30 into a pocket or the like, and releases the mobile phone 30 into the PDA 40. Since the authentication card 2 having the credit card 20 is installed and both authentication cards are used as one, the PDA 40 and the release unit 20 are separated from the sending unit 10 by a certain distance or more, and the PDA 40 Control use It is possible to prevent accidental unauthorized use and leakage of information. In addition, the owner or the user is notified by voice or the like via the mobile phone 30, and can immediately recognize that the PDA 40 has left his / her hand.
- the unusable state includes a state in which the power of the mobile phone 30 is turned off so that it cannot be turned on, a state in which an input is not accepted, and the like.
- the PDA 40 sets itself to a useless state.
- the unusable state includes, for example, erasing the contents of the memory of the PDA 40, turning off the power of the PDA 40 so that the PDA 40 cannot be turned on, or setting the PDA 40 to a state in which input is not accepted.
- a terminal that goes to high level when an authentication card is attached and goes to low level (ground level) when removed.
- a memory erase program can be started or the power can be turned off. Turning off the power can be achieved by using the enable terminal of the regulator or the MO switch as described in FIG. 10 (A) or (B).
- the PDA 40 has been described as an example of a device whose use is restricted in the above embodiment, other devices such as a word processor, a personal computer, various game machines, a car, a safe, etc. Also, the case where radio waves are used as the signal transmission medium has been described, but other than that, ultrasonic waves, light, or the like may be used.
- FIG. 11 is a block diagram showing a schematic configuration of the transmission unit 10 of the authentication card 1 and the release unit 20 of the authentication card 2 according to the second embodiment of the present invention.
- the transmission unit 10 includes an arithmetic processing unit 110, a wireless processing unit 120, and an interface unit 130.
- An antenna 15 for wireless communication is attached to the wireless processing unit 120.
- the release unit 20 also has a configuration similar to that of the transmission unit 10, and includes an arithmetic processing unit 210, a non-fountain processing unit 220, and an interface unit 230,
- the wireless processing unit 220 is provided with an antenna 25 for wireless communication.
- the interface section 130 constitutes a connection section (for example, a connector) with the mobile phone 30, and the connection section of the memory card 100 with the mobile phone 30 may also be used.
- a connection section for example, a connector
- the memory card 100 is an SD memory card (registered trademark)
- a serial interface (RS232C or the like) with the mobile phone 30 may be used also as the interface unit 130.
- FIG. 12 is a block diagram illustrating a more specific configuration example of the arithmetic processing unit 110 and the wireless processing unit 120.
- the arithmetic processing unit 110 corresponds to a CPU (microprocessor) 110a and a memory 110b
- the wireless processing unit 120 includes, for example, an RF IC 120a configured by an IC chip, a preamplifier 120b, Also, it corresponds to the band finolater 120c.
- the memory 110 b a part of the memory (for example, flash memory) of the memory card 100 may be used, or a memory (for example, EEPROM, etc.) dedicated to the arithmetic processing unit 110 (microprocessor 110 a) May be provided separately.
- the mounted controller can also serve as the arithmetic processing unit 110.
- an arithmetic processing unit 110 can be provided separately.
- FIG. 13 is a block diagram illustrating a more specific configuration example of the arithmetic processing unit 210 and the wireless processing unit 220.
- the arithmetic processing unit 210 corresponds to the CPU (microprocessor) 210a and the memory 210b
- the wireless processing unit 220 includes the RF IC 220a, the preamplifier 220b, and the bandpass filter 220c.
- the memory 210b may be a part of the memory card 200, or may be separately provided as a memory (EEPROM) dedicated to the arithmetic processing unit 210 (microprocessor 210a).
- the microprocessor 110a has a crystal oscillator 110c, and the microprocessor 210a has a crystal oscillator 210c attached to it, and the RFIC 120a has a crystal oscillator 210c.
- a crystal oscillator 220 d is attached to the RF IC 220 a, respectively.
- the authentication card 1 is attached to the mobile phone 30 in the arithmetic processing unit 110 (terminal Vcc of the microprocessor 110a), the wireless processing unit 120 (terminal Vcc of the RF IC 120a), and the like. Power is supplied from a power supply device (battery pack and power regulator) (not shown) of the telephone 30.
- the processing unit 210 (terminal V c c microprocessor 210 a), the like (terminal V cc of RF IC 22 O a) radio processing section 220, the authentication card 2 is ⁇ to PDA40
- power is supplied from a power supply device (battery pack and power supply regulator) (not shown) of the PDA 40.
- These powers may be supplied from a power supply device (for example, a button battery or the like and a power supply regulator) provided in the memory cards 100 and 200.
- a power supply device for example, a button battery or the like and a power supply regulator
- the memory 110b includes a program executed by the arithmetic processing unit 110 (microprocessor 110a), M-sequence data (M-sequence signal), an identification code for the authentication code 1, an authentication code, and the like.
- the identification code of code 2 etc. is already memorized.
- the arithmetic processing section 110 executes this program to execute the authentication process of the authentication card 2 on the child side.
- the programs and data stored in the memory 110b are read out, for example, as 16-bit data and input from the terminals D0 to D15 of the microprocessor 110a.
- Radio processing section 120 performs FSK modulation on the M-sequence data, the identification code, and the like provided from operation processing section 110, and outputs the modulated signal.
- the signal after this modulation is the terminal Tx of the RF IC 120a.
- the signal is output from ut and transmitted from the antenna 15 via the bandpass filter 120c as a non-inverted signal (RF signal).
- the radio processing unit 120 inputs the M-sequence data, the identification code, and the like received as a radio signal by the antenna 15 from the terminal RX in via the bandpass filter ⁇ 20c and the preamplifier 120b.
- Radio processing section 120 performs FSK demodulation on the received signal, and provides the demodulated signal as digital data to arithmetic processing section 110 (microprocessor 110a).
- Data such as the M-sequence data and the identification code are transmitted and received between the terminal DI04 of the microprocessor 110a and the terminal DIO of the RF IC 120a, for example.
- Program data (data defining control parameters) is supplied to the terminal PDATA of the wireless processing unit 120 (RF IC 120a) from the terminal DIO1 of the arithmetic processing unit 110 (microprocessor 110a).
- the program data is, for example, data such as the transmission frequency of the radio processing unit 120 (RF IC 120a), transmission signal level '(transmission power), reception sensitivity, modulation frequency, and bit rate.
- the program data is sent to the arithmetic processing unit 11 when the identification transmitting unit 1 is started up (boot processing).
- the signal is supplied from the (microprocessor 110a) to the wireless processing unit 120 (RFIC 120a), and is set in the no-flush processing unit 120 (RFIC 120a).
- a clock signal is input to the terminal PCLK of the wireless processing unit 120 (RFIC 120a) from the terminal DIO2 of the arithmetic processing unit 110 (microprocessor 110a).
- a latch enable signal is input to the terminal PALE of the wireless processing unit 120 (RFIC 120a) from the terminal DI3 of the arithmetic processing unit 110 (microprocessor 110a). This latch enable signal is used when specifying an address to which a parameter for wireless control of the arithmetic processing unit 110 (microprocessor 110a) is to be written.
- Radio processing unit 1 20 (RF IC 120a) terminal RSSI to arithmetic processing unit 1 10 (microprocessor 110a) terminal CMP or ADC (Pin CMP is a terminal for inputting a signal to be compared for signal level
- the terminal ADC is a terminal for inputting the analog signal to be subjected to AZD conversion.
- the terminal CMP (abbreviated as “.CMP”) is a signal that represents the level of the received signal (reception level). Can be This reception level indicates the strength (ie, signal power) of the signal received from the wireless processing unit 120 (RF IC 120a) power release unit 20, and is detected by the wireless processing unit 120 (RF IC 120a). .
- a program executed by the arithmetic processing unit 210 (microprocessor 210a), M-sequence data, an identification code of the authentication card 2, an identification code of the authentication card 1, and the like are stored in advance. ing.
- the arithmetic processing unit 210 executes the program stored in the memory 210b to execute the authentication processing of the authentication card 1. These professionals
- the gram data is read out as, for example, 16-bit data, and is input from the terminals DO to D15 of the arithmetic processing unit 210 (microprocessor 210a).
- Arithmetic processing unit 2 10 microprocessor 210a
- wireless processing unit 220 RF
- the data communicated with 1C 220a) is transmitted between the arithmetic processing section 110 (microprocessor 110a) of the authentication card 1 and the radio processing section 120 (RF IC 120a). Since it is the same as the data to be communicated, the description is omitted here.
- the transmitting unit 10 first uses the M-sequence signal as a call signal to the cancellation unit 20 to release the unit.
- FIG. 14 is a flowchart showing the flow of the process of the transmission unit 10.
- FIG. 15 is a flowchart showing the flow of the process of the release unit 20.
- FIG. 16 is a time chart showing data and communication timing between the transmission unit 10 and the release unit 20.
- a predetermined time interval S for example, 1 second interval, 2 second interval, etc.
- Y in S1 To enter search mode (Y in S1), and transfer the M-sequence data stored in memory 110b from terminal DI04 of arithmetic processing unit 110 (microprocessor 110a) to wireless processing unit 1 Immediately apply to terminal DIO of 20 (RF IC 1 20a).
- the wireless processing unit 120 (RF IC 120a) performs FSK modulation on the M-sequence signal provided from the arithmetic processing unit 110 (microphone processor 110a) to a predetermined level (transmission power).
- the signal is transmitted from the antenna 15 by the wireless signal (S2).
- the transmission time t TM of this M-sequence signal is, for example, several milliseconds.
- the transmission unit 10 waits for reception of the M-sequence data transmitted from the canceling unit 20 for a predetermined standby time t RM (S3).
- the standby time t RM is set to the same value as the transmission time t TM of the M-sequence data transmitted from the release unit 20, and is several milliseconds.
- arithmetic processing unit 110 microprocessor 110a
- the replacement signal is output from, for example, terminal DIO 7 or DIO 8 and applied to a processing unit (eg, CPU) of mobile phone 30 via interface unit 130. Thereby, the mobile phone 30 outputs an alarm sound from the speaker, or displays an alarm notification on the display device, and gives a warning to the owner.
- the arithmetic processing unit 210 (microprocessor 210 a) and the wireless processing unit 220 (RF IC 220 a) of the release unit 20 receive power supply from the PDA 40 to receive M-sequence data at all times. It is in the waiting state (standby mode) (S21).
- radio processing section 220 When radio processing section 220 (RFIC 220a) receives the M-sequence data, radio processing section 220 (RFIC 220a) transmits the received M-sequence data to arithmetic processing section 210 (microprocessor Terminal 210a) is supplied to the arithmetic processing unit 210 (microprocessor 210a) via the DIO 4 and the reception level of the M-sequence data is transmitted from the terminal RS SI to the terminal CMP of the arithmetic processing unit 210 (microprocessor 210a). To the arithmetic processing unit 210 (microprocessor 210a).
- the arithmetic processing unit 210 compares the M-sequence data input from the terminal DI04 with the M-sequence data stored in the memory 210b, and finds that the number of matching bits of both M-sequence data is It is determined whether the value is equal to or more than a predetermined threshold (predetermined reception level).
- the predetermined threshold predetermined reception level is set to, for example, 24 when the M-sequence data is 31 bits.
- the arithmetic processing unit 210 compares the value of the reception level input from the terminal CMP with a predetermined threshold (predetermined reception level).
- the predetermined threshold (predetermined reception level) is set to a value of the reception level corresponding to a predetermined distance (for example, several meters) between the transmission unit 10 and the release unit 20.
- the relationship between the reception level and the distance is obtained from the fact that the reception level is inversely proportional to the square of the distance, as described in the first embodiment.
- the arithmetic processing unit 210 determines whether the number of matching bits of both M-sequence data is equal to or greater than a threshold (predetermined reception level) and the reception level is equal to or greater than the threshold (predetermined reception level). Determines that the M-sequence data has been received (Y in S21), and shifts from the standby mode to the authentication mode.
- the arithmetic processing unit 210 transmits the M-sequence data stored in the memory 210b (that is, the M-sequence data of the release unit 20) wirelessly via the radio processing unit 220 (RF IC 220a).
- the identification code of the release unit 20 is transmitted via the radio processing unit 220 (RF IC 220a). And transmit it by a radio signal (S23).
- the arithmetic processing unit 210 determines whether the number of matching bits of both M-sequence data is less than the threshold (predetermined reception level) or the reception level is less than the threshold (predetermined reception level). If so, it is determined that the M-sequence data has not been received (N in S21).
- the arithmetic processing unit 210 determines whether or not the above-described time S has elapsed by using a built-in timer (not shown) or the like ( If the time S has not elapsed (S28), the standby mode is continued and the M-sequence data reception wait state is set (S21). On the other hand, if the M-sequence data is not received within the time S (Y in S28), the arithmetic processing unit 210 (microphone processor 210a) sends the signal from the terminal DI 07 or DI 08 to the PDA 40 via the interface unit 230. A signal is output (the signal level is changed from the mouth level to the high level or from the high level to the low level), and the PDA 40 is disabled (S29).
- the contents of the memory of the PDA 40 are erased, the power is turned off, and no input is accepted.
- the memory erasure program stored in the memory card 200 of the authentication force 20 is downloaded to the PDA 40 together with the insertion, and The signal of terminal DI ⁇ 7 or DI08 is given as an interrupt signal to the CPU of PDA 40, and this interrupt signal When the CPU executes the memory erasure program, the memory contents are erased.
- the power supplied to the PDA 40 can be turned off, for example, by giving the signal of the DI # 7 or DI # 8 terminal as a control signal and setting this control signal to low level.
- the radio processing unit 120 (RFIC 120a) of the transmission unit 10 receives the M-sequence data from the release unit 20 during the standby time t RM , and receives the data.
- the M-sequence data is supplied from the terminal DIO to the arithmetic processing unit 110 (microprocessor 110a) via the terminal DIO 4 of the arithmetic processing unit 110 (microprocessor 110a). Also, the radio processing unit 120 (RF IC 120a) calculates the reception level of the M-sequence data from the terminal RS SI via the terminal CMP of the arithmetic processing unit 110 (microprocessor 110a). Give to the microprocessor 210 a).
- the arithmetic processing unit 110 compares the M-sequence data input from the terminal DI 04 with the M-sequence data stored in the memory 110b, and determines whether the bits of the two M-sequence data match. It is determined whether the number is equal to or greater than a predetermined threshold (predetermined reception level).
- the predetermined threshold value (predetermined reception level) is the same as that of the release unit 20 described above.
- the arithmetic processing unit 110 compares the reception level input from the terminal CMP with a predetermined threshold (predetermined reception level).
- the predetermined threshold predetermined reception level is the same as that of the release unit 20 described above.
- the arithmetic processing unit 110 determines that the number of matching bits of both M-sequence data is equal to or greater than a predetermined threshold (predetermined reception level), and that the reception level is a predetermined threshold (predetermined reception level). If it is above, it is determined that the M-sequence data has been received (at 33), and the mode shifts from the search mode to the authentication mode.
- the arithmetic processing unit 110 transmits the identification code of the release unit 20 received after the M-sequence data and the reception level thereof to the radio processing unit 120 (RF IC 120 a) (Y in S6), the received identification code and The identification code of the release unit 20 stored in the memory 110b is collated with the identification code, and it is determined whether the reception level of the identification code is equal to or higher than a predetermined threshold (predetermined reception level) (S5).
- This predetermined threshold predetermined reception level
- This predetermined reception level is the same as the threshold of the reception level of M-sequence data (predetermined reception level).
- the arithmetic processing unit 110 (microprocessor 110a) authenticates the release unit 20. Then, the arithmetic processing unit 110 (microprocessor 110a) transmits the identification code of the transmission unit 10 stored in the memory 110b to the release unit 20 via the wireless processing unit 120 (RF IC 120a). (S9).
- step S3 the arithmetic processing unit 110 (microprocessor 110a) determines whether the number of matching bits of both M-sequence data is less than a predetermined threshold (predetermined reception level), or If the level is lower than a predetermined threshold (predetermined reception level), it is determined that M-sequence data has not been received (N in S3), and an alarm signal is output to mobile phone 30.
- the arithmetic processing unit 110 (microprocessor 110a) does not receive the identification code signal of the release unit 20 (N in S4), or in step S6, the two identification codes are equal. If not, or if the reception level of the identification code is lower than the threshold (predetermined reception level), an alarm signal is output to the mobile phone 30 (at 36).
- the wireless processing unit 220 (RF IC 220a) of the release unit 20 After transmitting the identification code and the signal (S23), the wireless processing unit 220 (RF IC 220a) of the release unit 20 receives the identification code signal transmitted from the transmission unit 10 (Y in S24). The received identification code signal and its reception level are given to arithmetic processing section 210 (microprocessor 210a).
- the arithmetic processing unit 210 collates the identification code given from the wireless processing unit 220 (RFIC 220a) with the identification code of the transmission unit 10 stored in the memory 210b, and performs identification. It is determined whether the reception level of the code is equal to or higher than a predetermined threshold (predetermined reception level) (the same as the threshold of the reception level of M-sequence data (predetermined reception level)) (S25).
- predetermined reception level the same as the threshold of the reception level of M-sequence data (predetermined reception level)
- the arithmetic processing unit 210 (microprocessor The sender 210 a) authenticates the sending unit 10. When this authentication is established, the use restriction of the PDA 40 is released (the release state is maintained), and the PDA 40 becomes usable. On the other hand, if the identification codes do not match or the reception level is smaller than the predetermined threshold, the arithmetic processing unit 210 (microprocessor 210a) disables the PDA 40 (S29) ).
- N 1
- N 2
- N 3
- the transmission unit 10 and the cancellation unit 20 can authenticate each other more reliably (mutual authentication), and can increase the level of security.
- the identification code of the transmission unit 10 transmitted from the transmission unit 10 in each time may be the same or different.
- the identification code of the release unit 20 transmitted from the release unit 20 each time may be the same or different.
- the transmission unit 10 and the release unit 20 each transmit their own identification code, and Authenticate to.
- the release unit 20 releases the decryption key Ks, which is predetermined with the transmission unit 10 and is stored in the memory 210 b.
- Send as The transmission unit 10 compares the decryption key Ks with the decryption key stored in the memory 110b of the transmission unit 10 and cancels if both decryption keys match. Certify unit 20.
- the transmission unit 10 After authentication, the transmission unit 10 encrypts its own identification code with the decryption key Ks, and transmits the encrypted identification code as its own identification code to the release unit 20.
- the decryption unit 20 decrypts the encrypted identification code transmitted from the transmission unit 10 with the decryption key K s to obtain the identification code of the transmission unit 10, and the identification code and the memory 21 b
- the user 20 checks the identification code of the transmission unit 10 stored in the transmission unit 10 and transmits if the two identification codes match and the reception level from the transmission unit 10 is higher than a predetermined level. Unit 10 is authenticated and usage restrictions are released. If the identification code does not match, or if the reception level is lower than the specified level, use of the device is restricted.
- the level of security can be increased, and by changing the authentication code each time, the authentication code can be given to a third party. It can be prevented from being easily known.
- the arithmetic processing unit 110 (microprocessor 110a) of the transmitting unit 10 returns to step SI, and after the lapse of time S, repeats the processing from step S2 again.
- the arithmetic processing unit 210 (microprocessor 210a) of the release unit 20 returns to step S21 after the authentication mode, and enters the standby mode.
- full-time authentication in which the authentication process is repeatedly performed at the time interval S is performed, and when mutual authentication is established, the PDA 40 maintains a usable state, and when mutual authentication is not established, the PDA 40 is disabled. Become.
- the time S is preferably about several seconds to several tens of seconds as described above, from the viewpoint of effectively preventing information leakage from the PDA 40.
- Figure 17 shows an example of using an authentication card for home security.
- the owner P has a mobile phone 30, and the authentication power of the parent side is inserted into the mobile phone 30.
- the child-side authentication card 2 is attached to the door lock (electronic lock) of the entrance door of the owner P's house H.
- the transmission unit 10 of the authentication card 1 and the release unit 20 of the authentication power card 2 may both be those of the first embodiment or those of the second embodiment.
- the authentication card 2 is located inside the entrance door to prevent third parties from removing it. It is preferable to be inserted in.
- the transmission unit 10 can transmit the operation command to the release unit 20. For example, it requests the status of the door lock (locking force) and the status of these devices if the door lock is connected to a gas stove, lighting equipment, air conditioner, or other device via a home network.
- the send unit 10 can send commands. It can also send commands to remotely control these devices.
- the release unit 20 can also transmit the operation command transmitted from the transmission unit 10 to the device connected to the doorway @ home network, and can return the execution result of the command to the transmission unit 10. it can. For example, if the operation command is a door lock status request command, the locked or unlocked status of the door lock is returned to the transmission unit 10.
- the operation command is first input to the mobile phone 30 by the owner P operating the input key of the mobile phone 30, and is given from the mobile phone 30 to the transmission module 10.
- the command execution result is received by the transmission unit 10
- it is given from the transmission unit 10 to the mobile phone 30 and displayed on the display device of the mobile phone 30.
- the owner P can remotely control the equipment in the house by using the mobile phone 30, and can confirm the result of the remote operation via the mobile phone 30.
- the transmission of these operation commands and the command execution results must be mutually authenticated. Then, it can be performed using the time until the next mutual authentication is performed.
- Fig. 18 shows that the authentication card 1 (not shown in Fig. 18) is attached to the car key 50 carried by the driver (owner) D of the car C, and the authentication card 2 ( (Not shown in FIG. 18).
- the release unit 20 of the authentication card 2 becomes Set the car door lock to the unlocked state (locked state).
- the driver D approaches within a predetermined distance, mutual authentication between the transmission unit 10 and the release unit 20 becomes possible, and the release unit 20 enables the door lock to be locked and unlocked.
- the dismantling unit 20 when the dismantling unit 20 is connected to the equipment installed in the car C (car air conditioner, car stereo, etc.) in addition to the door lock, the door lock and the equipment The status is transmitted to the transmission unit 10, and the transmission unit 10 can also display the status on the display device of the car key 50.
- the authentication cards 1 and 2 can be used for various security.
- the present invention can be used for a memory card that can be inserted into a mobile phone, a PDA, a notebook computer, a camera, a car key, a door lock, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Child & Adolescent Psychology (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03712886A EP1607906A4 (en) | 2003-03-25 | 2003-03-25 | AUTHENTICATION CARD AND RADIO AUTHENTICATION SYSTEM FOR MUTUAL AUTHENTICATION WITH THE AUTHENTICATION CARD |
AU2003221069A AU2003221069A1 (en) | 2003-03-25 | 2003-03-25 | Authentication card and wireless authentication system for mutual authentication using the authentication card |
JP2004569922A JPWO2004086294A1 (ja) | 2003-03-25 | 2003-03-25 | 認証カードおよび該認証カードにより相互認証を行うワイヤレス認証システム |
PCT/JP2003/003574 WO2004086294A1 (ja) | 2003-03-25 | 2003-03-25 | 認証カードおよび該認証カードにより相互認証を行うワイヤレス認証システム |
CNB038262215A CN100380402C (zh) | 2003-03-25 | 2003-03-25 | 认证卡以及借助于该认证卡执行相互认证的无线认证系统 |
US11/224,068 US7555286B2 (en) | 2003-03-25 | 2005-09-13 | Authentication card and wireless authentication system performing mutual authentication by means of the authentication card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2003/003574 WO2004086294A1 (ja) | 2003-03-25 | 2003-03-25 | 認証カードおよび該認証カードにより相互認証を行うワイヤレス認証システム |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/224,068 Continuation US7555286B2 (en) | 2003-03-25 | 2005-09-13 | Authentication card and wireless authentication system performing mutual authentication by means of the authentication card |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004086294A1 true WO2004086294A1 (ja) | 2004-10-07 |
Family
ID=33045125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/003574 WO2004086294A1 (ja) | 2003-03-25 | 2003-03-25 | 認証カードおよび該認証カードにより相互認証を行うワイヤレス認証システム |
Country Status (6)
Country | Link |
---|---|
US (1) | US7555286B2 (ja) |
EP (1) | EP1607906A4 (ja) |
JP (1) | JPWO2004086294A1 (ja) |
CN (1) | CN100380402C (ja) |
AU (1) | AU2003221069A1 (ja) |
WO (1) | WO2004086294A1 (ja) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060085588A (ko) * | 2005-01-24 | 2006-07-27 | 톰슨 라이센싱 | 존재-기반 액세스 제어 |
JP2006228129A (ja) * | 2005-02-21 | 2006-08-31 | Canon Inc | 非接触icカードシステム |
WO2007060888A1 (ja) * | 2005-11-25 | 2007-05-31 | Matsushita Electric Industrial Co., Ltd. | 携帯端末装置 |
JP2007184877A (ja) * | 2006-01-10 | 2007-07-19 | Matsushita Electric Ind Co Ltd | 無線通信装置、無線認証システム及び無線認証方法 |
JP2007195157A (ja) * | 2005-12-22 | 2007-08-02 | Matsushita Electric Ind Co Ltd | 認証システムおよびそのプログラム |
JP2007235308A (ja) * | 2006-02-28 | 2007-09-13 | Matsushita Electric Ind Co Ltd | 無線装置及びプログラム |
JP2007265321A (ja) * | 2006-03-30 | 2007-10-11 | Toppan Printing Co Ltd | 個人認証システム及び個人認証方法 |
JP2008217497A (ja) * | 2007-03-05 | 2008-09-18 | Fuji Electric Holdings Co Ltd | 無線通信システム通信装置および無線通信方法 |
JP2008233965A (ja) * | 2007-03-16 | 2008-10-02 | Nec Corp | 携帯端末装置とそのプログラム、及び、改竄防止システムと改竄防止方法 |
JP2008280833A (ja) * | 2007-04-11 | 2008-11-20 | Epson Toyocom Corp | 電子式セキュリティシステムおよびそれに用いられる遠隔操作用携帯電子鍵 |
JP2009194712A (ja) * | 2008-02-15 | 2009-08-27 | Nec Infrontia Corp | 携帯端末装置 |
JP2010506292A (ja) * | 2006-10-04 | 2010-02-25 | トレック・2000・インターナショナル・リミテッド | 外部記憶装置の認証の方法、装置およびシステム |
US8219118B2 (en) | 2006-02-07 | 2012-07-10 | Samsung Electronics Co., Ltd. | Method and apparatus for decoding paging message in wireless communication system |
JP2012156317A (ja) * | 2011-01-26 | 2012-08-16 | Icom Inc | 太陽電池発電装置 |
JP2013149022A (ja) * | 2012-01-18 | 2013-08-01 | Yasuo Shionoya | アクセス権限制御を行うコンピュータシステム |
WO2013114971A1 (ja) * | 2012-01-31 | 2013-08-08 | 株式会社東海理化電機製作所 | 無線通信システム |
JP2015148892A (ja) * | 2014-02-05 | 2015-08-20 | 株式会社三菱東京Ufj銀行 | 携帯端末、プログラム及びダウンロードデータ消去方法 |
WO2020202945A1 (ja) * | 2019-03-29 | 2020-10-08 | シャープ株式会社 | 収納装置 |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7672794B2 (en) * | 2003-06-24 | 2010-03-02 | Expro Meters, Inc. | System and method for operating a flow process |
EP1946259A2 (en) * | 2005-10-24 | 2008-07-23 | Petratec International Ltd. | System and method for authorizing purchases associated with a vehicle |
JP2007156986A (ja) * | 2005-12-07 | 2007-06-21 | Toshiba Corp | 端末装置及びそのデータ管理方法 |
US7411548B2 (en) * | 2006-04-12 | 2008-08-12 | The Boeing Company | Reference beacon identification using transmission sequence characteristics |
JP2008011416A (ja) * | 2006-06-30 | 2008-01-17 | Toshiba Corp | 情報処理装置および制御方法 |
ES2421924T3 (es) | 2006-09-29 | 2013-09-06 | Telecom Italia Spa | Servicios para usuarios móviles a través de distintos aparatos electrónicos |
US20080083982A1 (en) * | 2006-10-10 | 2008-04-10 | International Business Machines Corporation | Method and system for initiating proximity warning alarm for electronic devices and prohibiting operation thereof |
WO2008090539A2 (en) * | 2007-01-25 | 2008-07-31 | Petratec International Ltd. | Devices and methods useful for authorizing purchases associated with a vehicle |
FR2913296B1 (fr) * | 2007-03-02 | 2009-09-04 | Ingenico Sa | Procede de securisation et dispositif mobile ainsi securise |
US8364094B2 (en) * | 2007-03-13 | 2013-01-29 | Petratec International Ltd. | Antenna assembly for service station |
ES2384803T3 (es) * | 2007-05-04 | 2012-07-12 | Vodafone Holding Gmbh | Tarjeta de circuitos integrados, lector de tarjetas de circuitos integrados y método de funcionamiento de un lector de tarjetas integrados sin contacto |
US20080284561A1 (en) * | 2007-05-14 | 2008-11-20 | Inventec Corporation | Method for protecting data |
ES2390526T3 (es) * | 2007-10-19 | 2012-11-13 | Petratec International Ltd. | Etiqueta de RFIDA especial para su uso cerca de objetos conductivos |
US20100033379A1 (en) * | 2008-08-11 | 2010-02-11 | Lommen Layne D | Reference beacon identification using transmission sequence characteristics |
FR2947362A1 (fr) | 2009-06-25 | 2010-12-31 | St Microelectronics Sas | Authentification d'un terminal par un transpondeur electromagnetique |
JP5413189B2 (ja) * | 2009-12-28 | 2014-02-12 | ソニー株式会社 | カード型装置 |
WO2012006833A1 (zh) * | 2010-07-14 | 2012-01-19 | 中兴通讯股份有限公司 | 一种移动终端解锁装置及方法 |
JP5755961B2 (ja) | 2011-07-14 | 2015-07-29 | 株式会社東芝 | カード装置、機器および制御方法 |
CN103139767B (zh) * | 2011-11-28 | 2016-06-22 | 中兴通讯股份有限公司 | 手机及其通信方法 |
JP5685211B2 (ja) * | 2012-01-31 | 2015-03-18 | 株式会社東海理化電機製作所 | 携帯機登録システム及び携帯機登録方法 |
US8410898B1 (en) | 2012-08-16 | 2013-04-02 | Google Inc. | Near field communication based key sharing techniques |
US9384613B2 (en) | 2012-08-16 | 2016-07-05 | Google Inc. | Near field communication based key sharing techniques |
CN103825871B (zh) * | 2013-07-31 | 2015-05-27 | 深圳光启创新技术有限公司 | 一种鉴权系统及其发射终端、接收终端和权限认证方法 |
WO2017018829A1 (ko) * | 2015-07-28 | 2017-02-02 | 이태원 | 인증장치 및 방법, 그리고 이에 적용되는 컴퓨터 프로그램 및 기록매체 |
EP3471334B1 (en) * | 2017-10-10 | 2023-07-26 | Nxp B.V. | Method for configuring a transponder, transponder and base station |
CN108833652A (zh) * | 2018-08-09 | 2018-11-16 | 深圳市鼎元智能科技有限公司 | 一种手机防盗报警器 |
CN114846832A (zh) * | 2019-10-25 | 2022-08-02 | 三星电子株式会社 | 用于与外部电子装置进行通信的方法及其电子装置 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4871997A (en) * | 1987-06-30 | 1989-10-03 | Tech-Age International Corporation | Proximity sensor apparatus |
JPH0221389A (ja) * | 1988-07-11 | 1990-01-24 | Minolta Camera Co Ltd | 記憶媒体用入力装置 |
US5757271A (en) * | 1996-11-12 | 1998-05-26 | International Business Machines Corporation | Portable computer and method of providing security for an electronic device |
US5796338A (en) * | 1997-02-03 | 1998-08-18 | Aris Mardirossian, Inc. | System for preventing loss of cellular phone or the like |
JPH1188499A (ja) * | 1997-09-04 | 1999-03-30 | Toyoki Sasakura | 機器の使用制限装置 |
JP2001266098A (ja) * | 2000-03-15 | 2001-09-28 | Hitachi Ltd | Icカード及び携帯端末装置 |
JP2002032141A (ja) * | 2000-05-15 | 2002-01-31 | Siemens Ag | ソフトウェア構成要素の無許可利用の防止方法 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5396218A (en) * | 1993-07-23 | 1995-03-07 | Olah; George | Portable security system using communicating cards |
US5715518A (en) * | 1996-03-06 | 1998-02-03 | Cellular Technical Services Company, Inc. | Adaptive waveform matching for use in transmitter identification |
GB2318672B (en) * | 1996-10-23 | 2001-03-21 | Nokia Mobile Phones Ltd | Radiotelephone proximity detector |
JP3768325B2 (ja) * | 1997-04-15 | 2006-04-19 | 三菱電機株式会社 | 通信端末装置 |
JP3223871B2 (ja) * | 1997-12-25 | 2001-10-29 | 株式会社デンソー | 電話装置 |
GB2363504A (en) * | 2000-06-16 | 2001-12-19 | Nokia Mobile Phones Ltd | A mobile phone including a device for preventing loss or theft |
FI20002466A (fi) * | 2000-11-10 | 2002-05-11 | Nokia Corp | Tunnistusmenetelmä |
GB2375261B (en) * | 2001-04-30 | 2004-10-13 | Nokia Corp | Radiotelephone system |
CN100347667C (zh) | 2001-06-27 | 2007-11-07 | 索尼公司 | 集成电路器件、信息处理设备、信息存储器件的存储管理方法、移动终端设备、半导体集成电路器件、以及使用移动终端设备的通信方法 |
JP4207404B2 (ja) * | 2001-06-27 | 2009-01-14 | ソニー株式会社 | 携帯端末及びその制御方法、並びに、icカード |
US6868282B2 (en) * | 2002-03-26 | 2005-03-15 | Ericsson, Inc. | Method and apparatus for accessing a network using remote subscriber identity information |
US8060139B2 (en) * | 2002-06-24 | 2011-11-15 | Toshiba American Research Inc. (Tari) | Authenticating multiple devices simultaneously over a wireless link using a single subscriber identity module |
-
2003
- 2003-03-25 AU AU2003221069A patent/AU2003221069A1/en not_active Abandoned
- 2003-03-25 CN CNB038262215A patent/CN100380402C/zh not_active Expired - Fee Related
- 2003-03-25 EP EP03712886A patent/EP1607906A4/en not_active Withdrawn
- 2003-03-25 JP JP2004569922A patent/JPWO2004086294A1/ja active Pending
- 2003-03-25 WO PCT/JP2003/003574 patent/WO2004086294A1/ja active Application Filing
-
2005
- 2005-09-13 US US11/224,068 patent/US7555286B2/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4871997A (en) * | 1987-06-30 | 1989-10-03 | Tech-Age International Corporation | Proximity sensor apparatus |
JPH0221389A (ja) * | 1988-07-11 | 1990-01-24 | Minolta Camera Co Ltd | 記憶媒体用入力装置 |
US5757271A (en) * | 1996-11-12 | 1998-05-26 | International Business Machines Corporation | Portable computer and method of providing security for an electronic device |
US5796338A (en) * | 1997-02-03 | 1998-08-18 | Aris Mardirossian, Inc. | System for preventing loss of cellular phone or the like |
JPH1188499A (ja) * | 1997-09-04 | 1999-03-30 | Toyoki Sasakura | 機器の使用制限装置 |
JP2001266098A (ja) * | 2000-03-15 | 2001-09-28 | Hitachi Ltd | Icカード及び携帯端末装置 |
JP2002032141A (ja) * | 2000-05-15 | 2002-01-31 | Siemens Ag | ソフトウェア構成要素の無許可利用の防止方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1607906A4 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006209762A (ja) * | 2005-01-24 | 2006-08-10 | Thomson Licensing | プレゼンスベースのアクセスコントロール |
KR20060085588A (ko) * | 2005-01-24 | 2006-07-27 | 톰슨 라이센싱 | 존재-기반 액세스 제어 |
JP2006228129A (ja) * | 2005-02-21 | 2006-08-31 | Canon Inc | 非接触icカードシステム |
EP1953682A4 (en) * | 2005-11-25 | 2010-06-02 | Panasonic Corp | PORTABLE DEVICE |
WO2007060888A1 (ja) * | 2005-11-25 | 2007-05-31 | Matsushita Electric Industrial Co., Ltd. | 携帯端末装置 |
EP1953682A1 (en) * | 2005-11-25 | 2008-08-06 | Matsushita Electric Industrial Co., Ltd. | Portable terminal |
JP2007195157A (ja) * | 2005-12-22 | 2007-08-02 | Matsushita Electric Ind Co Ltd | 認証システムおよびそのプログラム |
JP2007184877A (ja) * | 2006-01-10 | 2007-07-19 | Matsushita Electric Ind Co Ltd | 無線通信装置、無線認証システム及び無線認証方法 |
JP4664210B2 (ja) * | 2006-01-10 | 2011-04-06 | パナソニック株式会社 | 無線通信装置、無線認証システム及び無線認証方法 |
US8219118B2 (en) | 2006-02-07 | 2012-07-10 | Samsung Electronics Co., Ltd. | Method and apparatus for decoding paging message in wireless communication system |
JP2007235308A (ja) * | 2006-02-28 | 2007-09-13 | Matsushita Electric Ind Co Ltd | 無線装置及びプログラム |
JP4645479B2 (ja) * | 2006-02-28 | 2011-03-09 | パナソニック株式会社 | 無線装置及びプログラム |
JP2007265321A (ja) * | 2006-03-30 | 2007-10-11 | Toppan Printing Co Ltd | 個人認証システム及び個人認証方法 |
JP2010506292A (ja) * | 2006-10-04 | 2010-02-25 | トレック・2000・インターナショナル・リミテッド | 外部記憶装置の認証の方法、装置およびシステム |
US8412865B2 (en) | 2006-10-04 | 2013-04-02 | Trek 2000 International Ltd. | Method, apparatus and system for authentication of external storage devices |
JP2008217497A (ja) * | 2007-03-05 | 2008-09-18 | Fuji Electric Holdings Co Ltd | 無線通信システム通信装置および無線通信方法 |
JP2008233965A (ja) * | 2007-03-16 | 2008-10-02 | Nec Corp | 携帯端末装置とそのプログラム、及び、改竄防止システムと改竄防止方法 |
JP2008280833A (ja) * | 2007-04-11 | 2008-11-20 | Epson Toyocom Corp | 電子式セキュリティシステムおよびそれに用いられる遠隔操作用携帯電子鍵 |
JP2009194712A (ja) * | 2008-02-15 | 2009-08-27 | Nec Infrontia Corp | 携帯端末装置 |
JP4654422B2 (ja) * | 2008-02-15 | 2011-03-23 | Necインフロンティア株式会社 | 携帯端末装置 |
JP2012156317A (ja) * | 2011-01-26 | 2012-08-16 | Icom Inc | 太陽電池発電装置 |
JP2013149022A (ja) * | 2012-01-18 | 2013-08-01 | Yasuo Shionoya | アクセス権限制御を行うコンピュータシステム |
WO2013114971A1 (ja) * | 2012-01-31 | 2013-08-08 | 株式会社東海理化電機製作所 | 無線通信システム |
JP2013157900A (ja) * | 2012-01-31 | 2013-08-15 | Tokai Rika Co Ltd | 無線通信システム |
US9392448B2 (en) | 2012-01-31 | 2016-07-12 | Kabushiki Kaisha Toki Rika Denki Seisakusho | Wireless communications system |
JP2015148892A (ja) * | 2014-02-05 | 2015-08-20 | 株式会社三菱東京Ufj銀行 | 携帯端末、プログラム及びダウンロードデータ消去方法 |
WO2020202945A1 (ja) * | 2019-03-29 | 2020-10-08 | シャープ株式会社 | 収納装置 |
JPWO2020202945A1 (ja) * | 2019-03-29 | 2020-10-08 | ||
CN113597495A (zh) * | 2019-03-29 | 2021-11-02 | 夏普株式会社 | 收纳装置 |
JP7397854B2 (ja) | 2019-03-29 | 2023-12-13 | シャープ株式会社 | 収納装置 |
Also Published As
Publication number | Publication date |
---|---|
US20060003739A1 (en) | 2006-01-05 |
JPWO2004086294A1 (ja) | 2006-06-29 |
US7555286B2 (en) | 2009-06-30 |
AU2003221069A1 (en) | 2004-10-18 |
EP1607906A1 (en) | 2005-12-21 |
EP1607906A4 (en) | 2006-04-12 |
CN100380402C (zh) | 2008-04-09 |
CN1759409A (zh) | 2006-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004086294A1 (ja) | 認証カードおよび該認証カードにより相互認証を行うワイヤレス認証システム | |
KR101202580B1 (ko) | 전자 거래에서 사용자를 확인하기 위한 시스템 | |
JP2931276B2 (ja) | 機器の使用制限装置 | |
US8019322B2 (en) | Use limiting apparatus, key, and use limiting system for electronic equipment | |
US20100090831A1 (en) | Electronic device with radio frequency identification (RFID) technology | |
US20150171928A1 (en) | Usb memory device connected with smart phone | |
US20060145836A1 (en) | Antitheft system | |
US20080122649A1 (en) | Automatic alarm system and method for portable electronic apparatus | |
US20100062743A1 (en) | Wireless lock | |
JP2007019719A (ja) | 携帯端末装置、無線通信ユニット、および使用制限システム | |
JP2000276247A (ja) | 携帯端末セキュリティ方式及び携帯端末 | |
JP2006319649A (ja) | 携帯端末装置及びその使用制限方法 | |
US20060148449A1 (en) | Anti-theft system for mobile electronic devices | |
JPH10105663A (ja) | Icカードの不正使用防止装置 | |
JPWO2006038290A1 (ja) | ワイヤレス認証方法及びワイヤレス認証システム | |
JP2003289352A (ja) | 携帯端末及び充電器 | |
US20080162942A1 (en) | Wireless authorization mechanism for mobile devices and data thereon | |
JPH09233542A (ja) | 機器の使用制限装置及び携帯電話機 | |
JP2006050643A (ja) | 携帯型電子装置の保全システム | |
JP4091611B2 (ja) | 認証登録処理装置及び認証登録処理方法 | |
JP2004324227A (ja) | 遠隔操作用の携帯機 | |
JPH0998480A (ja) | 携帯通信装置 | |
WO2004023836A1 (ja) | ワイヤレス認証方法およびワイヤレス認証システム | |
RU2225302C1 (ru) | Информационно-охранный комплекс для мониторинга и защиты транспортных средств и объектов недвижимости от несанкционированного использования | |
JPH11213112A (ja) | 衝撃検出機能付カード |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004569922 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11224068 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003712886 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038262215 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2003712886 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11224068 Country of ref document: US |