WO2007049410A1 - Authentication test method for mutual authentication device - Google Patents

Authentication test method for mutual authentication device Download PDF

Info

Publication number
WO2007049410A1
WO2007049410A1 PCT/JP2006/318336 JP2006318336W WO2007049410A1 WO 2007049410 A1 WO2007049410 A1 WO 2007049410A1 JP 2006318336 W JP2006318336 W JP 2006318336W WO 2007049410 A1 WO2007049410 A1 WO 2007049410A1
Authority
WO
WIPO (PCT)
Prior art keywords
unique
identification code
unique identification
memory unit
base device
Prior art date
Application number
PCT/JP2006/318336
Other languages
French (fr)
Japanese (ja)
Inventor
Tomoya Bando
Sadayuki Matsumura
Koji Shiroki
Original Assignee
Murata Manufacturing Co., Ltd.
Super Wave Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Murata Manufacturing Co., Ltd., Super Wave Corporation filed Critical Murata Manufacturing Co., Ltd.
Publication of WO2007049410A1 publication Critical patent/WO2007049410A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method

Definitions

  • the present invention relates to a method for conducting a mutual authentication test between a key device and a base device.
  • a keyless entry system in a system for performing personal authentication using a communication device having a unique identification code (hereinafter referred to as a unique ID), a key device carried by the individual, With the base device built into the device! / Consists of a pair of devices. The key device has a unique ID. By registering this unique ID in the base device, the base device can accept only the registered key device! / ⁇ .
  • a unique ID a unique identification code
  • Patent Document 1 in a keyless entry system having a portable device having a wireless communication function, an in-vehicle locking / unlocking control means, and a manual key, the unique ID of the portable device is assigned to the vehicle's unique ID on the vehicle assembly line. Techniques have been proposed to prevent mis-registration in other nearby vehicles when registering to the control unit.
  • the portable device corresponds to the key device
  • the in-vehicle locking / unlocking control means corresponds to the base device. By registering the unique ID of the key device in the base device, these devices can be mutually authenticated.
  • a master ID is set so that any device can be authenticated, and this is used for authentication. There is a way to do a test, but in the unlikely event that the master ID leaks, it becomes a credit problem, and the existence of the master ID itself is desirable for security! /.
  • Patent Document 1 Japanese Patent Laid-Open No. 2004-84210
  • an object of a preferred embodiment of the present invention is to perform a mutual authentication test between a key device and a base device without actually registering the unique ID of the key device in the base device. Also, it is intended to provide an authentication test method for a mutual authentication device that can be in a state where nothing is associated with the devices used for the authentication test at the time of shipment.
  • An authentication test method for a mutual authentication device is a step of preparing a key device and a base device, wherein one device receives a unique identification code and this unique identification code.
  • the unique identification code written in the memory part of the other device and the reception step It compares the chromatic identification code, comprising the steps of carrying out the mutual authentication, a step of erasing the unique identification code written in the memory of the other device, the.
  • an authentication test method for a mutual authentication device is a step of preparing a key device and a base device, both devices having a unique identification code and a unique identification code.
  • a function for transmitting a code and both devices have a function for receiving the unique identification code and a memory unit for storing the unique identification code.
  • the step of reading the unique identification codes of both devices using a reading means, the step of writing both of the read unique identification codes into the memory part of the other device, and the unique identification codes of both devices The step of sending to the other device and receiving it by both devices is compared with the unique identification code written in the memory part of both devices and the unique identification code received in the receiving step. Performing mutual authentication and erasing the unique identification code written in the memory part of both devices.
  • a feature of an embodiment of the present invention is that, in a mutual authentication test between a key device and a base device, a unique ID (unique identification code) of an arbitrarily selected key device is read by a reading means, and this is read. Is written in the memory portion of the base device.
  • writing to the memory section means only writing temporarily, not actually registering.
  • the key device and the base device communicate with each other, and mutual authentication is performed by comparing whether the unique ID written in the memory part of the base device and the unique ID obtained by communication are the same or relevant. Do. After mutual authentication, the unique ID written in the memory part of the base device is deleted.
  • the key device and base device authentication test can be performed without actually registering the key device ID in the base device, and malfunctioning devices may be shipped accidentally. Absent. However, since the devices used for the certification test are associated with each other at the time of shipment, they can be put into a state, so the user must newly register using any key device and base device. Can do.
  • the unique ID written in the memory unit of the base device may be the same as the unique ID provided in the key device, or the unique ID is encrypted by an arithmetic process or the like. It may be tricky or converted to another code. Any device that can be authenticated by collating with a unique ID obtained later through communication is acceptable.
  • the key device has a unique ID and a function for transmitting the unique ID
  • the base device has a function for receiving the unique ID and a memory unit for storing the unique ID.
  • the base device has a unique ID and a function for transmitting the unique ID
  • the key device has a function for receiving the unique ID and a memory unit for storing the unique ID.
  • a preferred second embodiment of the present invention is a case where both devices have their own unique IDs. By exchanging mutual unique IDs and authenticating in both directions, more reliable is achieved. High certification tests can be performed.
  • the unique IDs of the key device and the base device may be different from each other. Since the key device and the base device have basically the same functions, either can be used as the key device or the base device.
  • the step of writing the read unique ID into the memory unit includes a step of writing into the volatile memory, and the step of erasing the unique ID is performed on the device having the volatile memory. It is better to stop the power supply. In other words, by writing to the volatile memory during the authentication test, simply turning off the power supply to the device during the authentication test automatically erases the unique ID of the key device written during the authentication test. Therefore, the certification test can be performed more efficiently.
  • the volatile memory for example, a RAM area of a memory unit provided in the base device can be used.
  • the unique ID of an arbitrarily selected key device is read and written to the memory unit of the base device, and the key device and the base device are communicated to each other. After mutual authentication using the unique ID written in the memory part of the device and the unique ID obtained by communication, the unique ID written in the memory part is erased. Even without registering to the base device, the key device and base device authentication test can be performed, and only normal devices can always be shipped. In addition, since the devices used in the certification test can be kept unconnected at the time of shipment, the user can perform new registration work. Also, there is no security problem because there is no need to use a master ID.
  • FIG. 1 is a configuration diagram of a first embodiment of a mutual authentication device according to the present invention.
  • FIG. 2 is a block diagram showing an authentication test method for the mutual authentication device shown in FIG.
  • FIG. 3 is a flowchart of the mutual authentication device authentication test method shown in FIG. 1.
  • FIG. 4 is a block diagram showing an authentication test method of a second embodiment of the mutual authentication device according to the present invention.
  • FIG. 5 is a configuration diagram of a third embodiment of a mutual authentication device according to the present invention.
  • FIG. 6 is a block diagram showing an authentication test method for the mutual authentication device shown in FIG.
  • FIG. 1 shows a first embodiment of a mutual authentication device used for a keyless entry system or the like.
  • This mutual authentication device includes a key device 1 having a wireless communication function and a base device 10.
  • the key device 1 includes a memory unit 2 in which a unique identification code (unique ID) is registered, and a transmitter 3 that transmits the unique ID using a radio signal.
  • the unique ID registered in the memory unit 2 is an ID unique to the key device and is not changed or erased once registered, and can be electrically read by an appropriate reading device.
  • the base device 10 is stored in the receiver 11 that receives the radio signal of the unique ID transmitted from the key device 1, the memory unit 12 that stores the unique ID, and the received data and the memory unit 12. And an authenticating unit 13 that performs authentication by comparing with the data stored.
  • the memory unit 12 includes a volatile memory 12a such as a volatile RAM that disappears when the power is turned off, and a nonvolatile memory 12b that does not disappear even when the power is turned off.
  • the volatile memory 12a is a memory for temporarily writing a unique ID in an authentication test described later
  • the non-volatile memory 12b is a memory for a user to register a unique ID. Note that the volatile memory 12a can be used not only for temporarily writing the unique ID in the certification test, but also for other purposes.
  • a personal computer 20 which is an example of a reading device is prepared, and the unique ID of the key device 1 is read by the personal computer 20 (step Sl).
  • a reading method use a reader or the like for the unique ID. It may be read without contact, or the unique ID may be read by connecting the key device 1 to the personal computer 20.
  • the base device 10 is connected to the personal computer 20, and the read unique ID is written to the memory unit 12, particularly the volatile memory 12a of the base device 10 (step S2).
  • the key device 1 is brought close to the base device 10, and the unique ID of the key device 1 is transmitted and received by the base device 10 (step S3).
  • the unique ID is sent to the base device 10 without going through the personal computer 20.
  • the base device 10 compares the unique ID written in the volatile memory 12a with the received unique ID and performs mutual authentication (step S4). If the two unique IDs match, an authentication OK signal is sent to the PC 20 and the authentication OK is displayed on the PC 20 display (step S5).
  • the authentication result is not limited to being displayed on the display of the personal computer 20, but may be displayed by any method, for example, the base device 10 itself may display it! /.
  • step S6 After the authentication test, by turning off the power of the base device 10, the unique ID written in the volatile memory 12a of the base device 10 is automatically erased (step S6), and the key device 1 and the base device 10 Can be in an unlinked state.
  • the power described for the example in which the unique ID written in the volatile memory 12a is automatically deleted at the same time when the power of the base device 10 is turned off is not limited to this.
  • the base device If 10 is equipped with a non-volatile memory 12b such as EAROM, EEPROM, or non-volatile RAM, a unique ID may be written to the non-volatile memory 12b during an authentication test.
  • a unique ID may be written to the non-volatile memory 12b during an authentication test.
  • FIG. 4 shows a second embodiment of the mutual authentication device.
  • the base device 10A has a function of transmitting a unique ID and its unique ID
  • the key device 1A receives a unique ID and a memory for storing the unique ID. It is what has.
  • the personal computer 20 first reads the unique ID of the base device 1 OA and writes the read unique ID in the memory unit of the key device 1A.
  • key One device 1 A and base device 1 OA are brought close to each other, and a unique ID is transmitted from base device 1 OA and received by key device 1 A.
  • the key device 1A compares the unique ID written in the memory unit with the received unique ID and performs mutual authentication.
  • the key device 1A and the base device 10A can be associated with each other and put into a state.
  • FIG. 5 shows a third embodiment of the mutual authentication device.
  • the key device 1B includes a memory unit 2 in which a unique ID is registered and a transmitter 3 that transmits the unique ID.
  • Receiver 4 that receives the unique ID transmitted by the device 10B and for writing the unique ID
  • Receiver 4 is a unique ID sent by base device 10B
  • the base device 10B has the same configuration as the key device 1B.
  • the receiver 11 receives a unique ID transmitted from the key device 1B and a memory for writing the unique ID.
  • the memory unit 14 in which the unique ID is registered and the unique ID are transmitted.
  • Receiver 11 can only receive a unique ID from key device 1B
  • the key device 1B and the base device 10B are connected to the personal computer 20 which is an example of the reading device, and the unique ID of the key device 1B is read and the base device 10B
  • the unique ID of the key device 1B read by the personal computer 20 is assigned to the base device 10B.
  • the key device 1B and the base device 10B are brought closer to each other, and the unique ID ⁇ of the key device 1B is transmitted and received by the base device 10B. Send D and have key device IB receive it.
  • the unique ID is transmitted and received by the base device 10B. Send D and have key device IB receive it.
  • One device IB and base device 10B can be unlinked
  • the key device and the base device authenticate each other.
  • a more reliable certification test can be performed.
  • the mutual authentication device of the present invention can be applied to authentication of various devices such as a keyless entry system for a vehicle, in order to restrict operation of electronic devices such as a personal computer and a mobile phone.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

[PROBLEMS] To provide an authentication test method capable of performing mutual authentication test between a key device and a base device without actually registering a key device unique ID in a base device and making the devices used for the authentication test, in a non-laced state upon shipment. [MEANS FOR SOLVING PROBLEMS] It is necessary to prepare a key device (1) having a unique ID and a function (3) for transmitting the unique ID, and a base device (10) having a function (11) for receiving the unique ID and a memory unit (12) for storing the unique ID. The unique ID of the key device (1) is read by read means (20) and the read unique ID is written into a memory unit (12) of the base device (10). Next, the unique ID of the key device (1) is transmitted and received by the base device (10). The unique ID written in the memory unit (12) of the base device (10) is compared to the unique ID received so as to perform mutual authentication. After this, the unique ID written into the memory unit (12) of the base device (10) is deleted.

Description

明 細 書  Specification
相互認証デバイスの認証試験方法  Authentication test method for mutual authentication devices
技術分野  Technical field
[0001] 本発明は、 1組となるキーデバイスとベースデバイスの相互認証試験を実施する方法 に関する。  [0001] The present invention relates to a method for conducting a mutual authentication test between a key device and a base device.
背景技術  Background art
[0002] 従来、キーレスエントリーシステムに代表されるように、固有識別コード (以下、固有 I Dと呼ぶ)を有する通信機器を用いて個人認証を行うシステムにおいては、個人が携 帯するキーデバイスと、装置に組み込まれたベースデバイスと!/、う一対のデバイスで 構成されている。キーデバイスが固有 IDを有しており、ベースデバイスにこの固有 ID を登録しておくことで、ベースデバイスは登録されたキーデバイスしか受け入れな!/ヽ ようにすることができる。  [0002] Conventionally, as represented by a keyless entry system, in a system for performing personal authentication using a communication device having a unique identification code (hereinafter referred to as a unique ID), a key device carried by the individual, With the base device built into the device! / Consists of a pair of devices. The key device has a unique ID. By registering this unique ID in the base device, the base device can accept only the registered key device! / ヽ.
[0003] 特許文献 1には、無線通信機能を有する携帯機と車載の施解錠制御手段と手動キ 一とを備えたキーレスエントリーシステムにおいて、車両の組立ラインで携帯機の固 有 IDを車両の制御ユニットに登録する際に、周辺の他車への誤登録を防止する技 術が提案されている。この場合には、携帯機がキーデバイスに相当し、車載の施解 錠制御手段がベースデバイスに相当する。キーデバイスが有する固有 IDをベースデ バイスに登録することで、これらのデバイスを相互に認証させることができる。  [0003] In Patent Document 1, in a keyless entry system having a portable device having a wireless communication function, an in-vehicle locking / unlocking control means, and a manual key, the unique ID of the portable device is assigned to the vehicle's unique ID on the vehicle assembly line. Techniques have been proposed to prevent mis-registration in other nearby vehicles when registering to the control unit. In this case, the portable device corresponds to the key device, and the in-vehicle locking / unlocking control means corresponds to the base device. By registering the unique ID of the key device in the base device, these devices can be mutually authenticated.
[0004] 固有 IDの登録作業をユーザーで行うためには、当然ながらキーデバイスとベースデ バイスとを何も関連付けて 、な 、状態 (紐付けされて 、な 、状態)で準備する必要が ある。一方、部品メーカーでこれらのデバイスを製造したとき、正しく相手を認証でき るかどうかという認証試験は、実際にペアを決めて登録しないと行えない。そうなると、 部品メーカーは既に登録されたデバイスをペアで出荷する必要があり、ユーザーが 任意の組み合わせで登録作業ができなくなる。さもなければ、部品メーカーは認証試 験を行わずに出荷することになり、動作不良のデバイスを誤って出荷してしまう恐れ がある。  [0004] In order for the user to register the unique ID, it is naturally necessary to prepare a state (associated with the state) by associating anything with the key device and the base device. On the other hand, when these parts are manufactured by a parts manufacturer, the verification test of whether or not the other party can be correctly authenticated cannot be performed unless the pair is actually determined and registered. If this happens, the parts manufacturer will need to ship the registered devices in pairs, and the user will not be able to register in any combination. Otherwise, the component manufacturer will ship without a certification test, and there is a risk of shipping a malfunctioning device.
[0005] 一方、如何なるデバイスでも認証できるようにマスター IDを設定し、これを用いて認証 試験を行う方法もあるが、万一マスター IDが流出すると信用問題となり、マスター ID の存在自体がセキュリティー上望ましくな!/、。 [0005] On the other hand, a master ID is set so that any device can be authenticated, and this is used for authentication. There is a way to do a test, but in the unlikely event that the master ID leaks, it becomes a credit problem, and the existence of the master ID itself is desirable for security! /.
特許文献 1:特開 2004— 84210号公報  Patent Document 1: Japanese Patent Laid-Open No. 2004-84210
発明の開示  Disclosure of the invention
発明が解決しょうとする課題  Problems to be solved by the invention
[0006] そこで、本発明の好ましい実施形態の目的は、実際にキーデバイスの固有 IDをべ一 スデバイスに登録しなくても、キーデバイスとベースデバイスとの相互認証試験を行う ことができ、かつ出荷時には認証試験に用いたデバイス同士は何も関連付けされて V、な 、状態にすることができる相互認証デバイスの認証試験方法を提供することにあ る。 [0006] Therefore, an object of a preferred embodiment of the present invention is to perform a mutual authentication test between a key device and a base device without actually registering the unique ID of the key device in the base device. Also, it is intended to provide an authentication test method for a mutual authentication device that can be in a state where nothing is associated with the devices used for the authentication test at the time of shipment.
課題を解決するための手段  Means for solving the problem
[0007] 上記目的は本発明の好ま Uヽ実施形態による相互認証デバイスの認証試験方法に より達成される。 [0007] The above object is achieved by an authentication test method for a mutual authentication device according to a preferred embodiment of the present invention.
[0008] 本発明の好ましい第 1の実施形態による相互認証デバイスの認証試験方法は、キー デバイスとベースデバイスとを準備するステップであって、一方のデバイスが固有識 別コードとこの固有識別コードを発信する機能とを有し、他方のデバイスが上記固有 識別コードを受信する機能と固有識別コードを記憶するメモリ部とを有するステップと 、一方のデバイスの固有識別コードを読み取り手段を用いて読み取るステップと、読 み取った固有識別コードを他方のデバイスのメモリ部に書き込むステップと、一方の デバイスの固有識別コードを発信し、上記メモリ部に固有識別コードが書き込まれた 他方のデバイスでこれを受信するステップと、他方のデバイスのメモリ部に書き込まれ た固有識別コードと、上記受信ステップで受信した固有識別コードとを比較し、相互 認証を実施するステップと、他方のデバイスのメモリ部に書き込まれた固有識別コー ドを消去するステップと、を備える。  [0008] An authentication test method for a mutual authentication device according to a first preferred embodiment of the present invention is a step of preparing a key device and a base device, wherein one device receives a unique identification code and this unique identification code. A step of having a function of transmitting, the other device having a function of receiving the unique identification code and a memory unit storing the unique identification code, and a step of reading the unique identification code of one device using a reading means And writing the read unique identification code into the memory part of the other device, transmitting the unique identification code of one device, and receiving it by the other device with the unique identification code written in the memory part. And the unique identification code written in the memory part of the other device and the reception step It compares the chromatic identification code, comprising the steps of carrying out the mutual authentication, a step of erasing the unique identification code written in the memory of the other device, the.
[0009] また、本発明の好ましい第 2の実施形態による相互認証デバイスの認証試験方法は 、キーデバイスとベースデバイスとを準備するステップであって、双方のデバイスが固 有識別コードとこの固有識別コードを発信する機能とを有し、かつ双方のデバイスが 上記固有識別コードを受信する機能と固有識別コードを記憶するメモリ部とを有する ステップと、双方のデバイスの固有識別コードを読み取り手段を用いて読み取るステ ップと、読み取った双方の固有識別コードを相手側のデバイスのメモリ部に書き込む ステップと、双方のデバイスの固有識別コードを相手側のデバイスに発信し、双方の デバイスでこれを受信するステップと、双方のデバイスにおいて、そのメモリ部に書き 込まれた固有識別コードと、上記受信ステップで受信した固有識別コードとを比較し 、相互認証を実施するステップと、双方のデバイスのメモリ部に書き込まれた固有識 別コードを消去するステップと、を備える。 [0009] Further, an authentication test method for a mutual authentication device according to a second preferred embodiment of the present invention is a step of preparing a key device and a base device, both devices having a unique identification code and a unique identification code. A function for transmitting a code, and both devices have a function for receiving the unique identification code and a memory unit for storing the unique identification code. The step of reading the unique identification codes of both devices using a reading means, the step of writing both of the read unique identification codes into the memory part of the other device, and the unique identification codes of both devices The step of sending to the other device and receiving it by both devices is compared with the unique identification code written in the memory part of both devices and the unique identification code received in the receiving step. Performing mutual authentication and erasing the unique identification code written in the memory part of both devices.
[0010] 本発明の一実施形態の特徴は、キーデバイスとベースデバイスとの相互認証試験に おいて、任意に選んだキーデバイスの固有 ID (固有識別コード)を読み出し手段によ つて読み出し、これをベースデバイスのメモリ部に書き込む点にある。ここで、メモリ部 に書き込むとは、一時的に書き込むだけで、実際に登録する訳ではない。この状態 でキーデバイスとベースデバイスとを通信させ、ベースデバイスのメモリ部に書き込ん だ固有 IDと通信によって得られた固有 IDとが同じあるいは関連性があるかどうかを 比較することで、相互認証を行う。相互認証後、ベースデバイスのメモリ部に書き込ま れた固有 IDを消去する。このようにすることで、実際にキーデバイスの IDをベースデ バイスに登録しなくても、キーデバイスおよびベースデバイスの認証試験を行うことが でき、動作不良のデバイスを誤って出荷してしまう恐れがない。し力も、出荷時には認 証試験に用いたデバイス同士は何も関連付けされて 、な 、状態にすることができる ため、ユーザーは任意のキーデバイスとベースデバイスとを用いて新たに登録作業 を行うことができる。  [0010] A feature of an embodiment of the present invention is that, in a mutual authentication test between a key device and a base device, a unique ID (unique identification code) of an arbitrarily selected key device is read by a reading means, and this is read. Is written in the memory portion of the base device. Here, writing to the memory section means only writing temporarily, not actually registering. In this state, the key device and the base device communicate with each other, and mutual authentication is performed by comparing whether the unique ID written in the memory part of the base device and the unique ID obtained by communication are the same or relevant. Do. After mutual authentication, the unique ID written in the memory part of the base device is deleted. In this way, the key device and base device authentication test can be performed without actually registering the key device ID in the base device, and malfunctioning devices may be shipped accidentally. Absent. However, since the devices used for the certification test are associated with each other at the time of shipment, they can be put into a state, so the user must newly register using any key device and base device. Can do.
[0011] 本発明において、ベースデバイスのメモリ部に書き込まれる固有 IDとは、キーデバイ スに設けられている固有 IDと同一であってもよいし、その固有 IDを演算処理などによ つて暗号ィ匕したり、別のコードに変換したものでもよい。後で通信によって得られる固 有 IDと照合して認証できるものであればよい。なお、キーデバイスが固有 IDとこの固 有 IDを発信する機能とを有し、ベースデバイスが固有 IDを受信する機能と固有 IDを 記憶するメモリ部とを有する場合に限らず、これとは逆に、ベースデバイスが固有 ID とこの固有 IDを発信する機能とを有し、キーデバイスが固有 IDを受信する機能と固 有 IDを記憶するメモリ部とを有して 、てもよ 、。 [0012] 本発明の好ましい第 2の実施形態は、双方のデバイスがお互い固有の IDを有する場 合であり、相互の固有 IDを交換し、双方向で認証し合うことで、より信頼性の高い認 証試験を実施することができる。この場合、キーデバイスとベースデバイスの持つ固 有 IDは互いに異なるものである力 何らかの関連性を有するものでもよい。キーデバ イスとベースデバイスとが基本的に同じ機能を有するので、どちらをキーデバイスまた はベースデバイスとしてもよ 、。 In the present invention, the unique ID written in the memory unit of the base device may be the same as the unique ID provided in the key device, or the unique ID is encrypted by an arithmetic process or the like. It may be tricky or converted to another code. Any device that can be authenticated by collating with a unique ID obtained later through communication is acceptable. The key device has a unique ID and a function for transmitting the unique ID, and the base device has a function for receiving the unique ID and a memory unit for storing the unique ID. Further, the base device has a unique ID and a function for transmitting the unique ID, and the key device has a function for receiving the unique ID and a memory unit for storing the unique ID. [0012] A preferred second embodiment of the present invention is a case where both devices have their own unique IDs. By exchanging mutual unique IDs and authenticating in both directions, more reliable is achieved. High certification tests can be performed. In this case, the unique IDs of the key device and the base device may be different from each other. Since the key device and the base device have basically the same functions, either can be used as the key device or the base device.
[0013] 好ましい実施形態によれば、上記読み取った固有 IDをメモリ部に書き込むステップ は、揮発性メモリに書き込むステップを含み、上記固有 IDを消去するステップは、上 記揮発性メモリを有するデバイスへの電源供給を停止することであるのがよ ヽ。つまり 、認証試験時の書き込みを揮発性メモリに対して行うことで、認証試験におけるデバ イスへの電源供給を止めるだけで、自動的に認証試験にぉ 、て書き込んだキーデバ イスの固有 IDが消去されるため、より効率的に認証試験を実施することができる。ここ で、揮発性メモリとは例えばベースデバイスに設けられるメモリ部の RAM領域を利用 することができる。 [0013] According to a preferred embodiment, the step of writing the read unique ID into the memory unit includes a step of writing into the volatile memory, and the step of erasing the unique ID is performed on the device having the volatile memory. It is better to stop the power supply. In other words, by writing to the volatile memory during the authentication test, simply turning off the power supply to the device during the authentication test automatically erases the unique ID of the key device written during the authentication test. Therefore, the certification test can be performed more efficiently. Here, as the volatile memory, for example, a RAM area of a memory unit provided in the base device can be used.
発明の好ましい実施形態の効果  Effects of preferred embodiments of the invention
[0014] 以上のように、本発明の好ましい実施形態によれば、任意に選んだキーデバイスの 固有 IDを読み出し、これをベースデバイスのメモリ部に書き込み、キーデバイスとべ ースデバイスとを通信させ、ベースデバイスのメモリ部に書き込んだ固有 IDと通信に よって得られた固有 IDとを用いて相互認証した後、メモリ部に書き込まれた固有 IDを 消去するようにしたので、実際にキーデバイスの IDをベースデバイスに登録しなくて も、キーデバイスおよびベースデバイスの認証試験を行うことができ、常に正常なデ バイスのみを出荷できる。し力も、出荷時には認証試験に用いたデバイス同士は紐 付けされていない状態にすることができるため、ユーザーは新たに登録作業を行うこ とができる。また、マスター IDを用いる必要がないので、セキュリティー上の問題もな い。 [0014] As described above, according to a preferred embodiment of the present invention, the unique ID of an arbitrarily selected key device is read and written to the memory unit of the base device, and the key device and the base device are communicated to each other. After mutual authentication using the unique ID written in the memory part of the device and the unique ID obtained by communication, the unique ID written in the memory part is erased. Even without registering to the base device, the key device and base device authentication test can be performed, and only normal devices can always be shipped. In addition, since the devices used in the certification test can be kept unconnected at the time of shipment, the user can perform new registration work. Also, there is no security problem because there is no need to use a master ID.
図面の簡単な説明  Brief Description of Drawings
[0015] [図 1]本発明にかかる相互認証デバイスの第 1実施例の構成図である。 FIG. 1 is a configuration diagram of a first embodiment of a mutual authentication device according to the present invention.
[図 2]図 1に示す相互認証デバイスの認証試験方法を示すブロック図である。 [図 3]図 1に示す相互認証デバイスの認証試験方法のフローチャート図である。 FIG. 2 is a block diagram showing an authentication test method for the mutual authentication device shown in FIG. FIG. 3 is a flowchart of the mutual authentication device authentication test method shown in FIG. 1.
[図 4]本発明にかかる相互認証デバイスの第 2実施例の認証試験方法を示すブロック 図である。  FIG. 4 is a block diagram showing an authentication test method of a second embodiment of the mutual authentication device according to the present invention.
[図 5]本発明にかかる相互認証デバイスの第 3実施例の構成図である。  FIG. 5 is a configuration diagram of a third embodiment of a mutual authentication device according to the present invention.
[図 6]図 5に示す相互認証デバイスの認証試験方法を示すブロック図である。  6 is a block diagram showing an authentication test method for the mutual authentication device shown in FIG.
発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION
[0016] 以下に、本発明の実施の形態を、実施例を参照して説明する。 Hereinafter, embodiments of the present invention will be described with reference to examples.
実施例 1  Example 1
[0017] 図 1は、キーレスエントリーシステムなどに用いられる相互認証デバイスの第 1実施例 を示す。この相互認証デバイスは、無線通信機能を有するキーデバイス 1とベースデ バイス 10とで構成されている。キーデバイス 1は、固有識別コード(固有 ID)が登録さ れたメモリ部 2と、その固有 IDを電波信号で発信する発信器 3とを備えている。メモリ 部 2に登録された固有 IDは、そのキーデバイス固有の IDであり、一度登録された後 は変更や消去がされないものであり、適宜の読み取り装置により電気的に読み取り可 能である。  FIG. 1 shows a first embodiment of a mutual authentication device used for a keyless entry system or the like. This mutual authentication device includes a key device 1 having a wireless communication function and a base device 10. The key device 1 includes a memory unit 2 in which a unique identification code (unique ID) is registered, and a transmitter 3 that transmits the unique ID using a radio signal. The unique ID registered in the memory unit 2 is an ID unique to the key device and is not changed or erased once registered, and can be electrically read by an appropriate reading device.
[0018] 一方、ベースデバイス 10は、キーデバイス 1が発信する固有 IDの電波信号を受信す る受信器 11と、固有 IDを記憶するメモリ部 12と、受信したデータとメモリ部 12に記憶 されているデータとを比較し認証を行う認証部 13とを備えている。このメモリ部 12は、 電源 OFFにより消失する揮発性 RAMなどの揮発性メモリ 12aと、電源 OFFしても消 失しない不揮発性メモリ 12bとを備えている。揮発性メモリ 12aは、後述する認証試験 において固有 IDを一時的に書き込むためのメモリであり、不揮発性メモリ 12bはユー ザ一が固有 IDを登録するためのメモリである。なお、揮発性メモリ 12aは認証試験に おいて固有 IDを一時的に書き込むためだけでなぐ他の用途にも使用できる。  On the other hand, the base device 10 is stored in the receiver 11 that receives the radio signal of the unique ID transmitted from the key device 1, the memory unit 12 that stores the unique ID, and the received data and the memory unit 12. And an authenticating unit 13 that performs authentication by comparing with the data stored. The memory unit 12 includes a volatile memory 12a such as a volatile RAM that disappears when the power is turned off, and a nonvolatile memory 12b that does not disappear even when the power is turned off. The volatile memory 12a is a memory for temporarily writing a unique ID in an authentication test described later, and the non-volatile memory 12b is a memory for a user to register a unique ID. Note that the volatile memory 12a can be used not only for temporarily writing the unique ID in the certification test, but also for other purposes.
[0019] 次に、上記キーデバイス 1およびベースデバイス 10を用いて認証試験を行う方法に ついて、図 2,図 3を参照して説明する。なお、図 2の丸付き数字は処理の順番を示し ている。  Next, a method for performing an authentication test using the key device 1 and the base device 10 will be described with reference to FIGS. The circled numbers in Fig. 2 indicate the order of processing.
[0020] まず、読み取り装置の一例であるパソコン 20を準備し、パソコン 20でキーデバイス 1 の固有 IDを読み取る (ステップ Sl)。読み取り方法としては、固有 IDをリーダ等を用 、て非接触で読み取つてもよいし、キーデバイス 1をパソコン 20に接続して固有 IDを 読み取ってもよい。 [0020] First, a personal computer 20 which is an example of a reading device is prepared, and the unique ID of the key device 1 is read by the personal computer 20 (step Sl). As a reading method, use a reader or the like for the unique ID. It may be read without contact, or the unique ID may be read by connecting the key device 1 to the personal computer 20.
[0021] 次に、パソコン 20にベースデバイス 10を接続し、読み取った固有 IDをベースデバィ ス 10のメモリ部 12、特に揮発性メモリ 12aに書き込む (ステップ S 2)。  Next, the base device 10 is connected to the personal computer 20, and the read unique ID is written to the memory unit 12, particularly the volatile memory 12a of the base device 10 (step S2).
[0022] 次に、キーデバイス 1をベースデバイス 10に近づけ、キーデバイス 1の固有 IDを発信 してベースデバイス 10で受信させる(ステップ S3)。つまり、パソコン 20を介さずに固 有 IDをベースデバイス 10に送る。ベースデバイス 10では、その揮発性メモリ 12aに 書き込まれた固有 IDと受信した固有 IDとを比較し、相互認証を実施する (ステップ S 4)。両固有 IDがー致すれば、認証 OKの信号をパソコン 20に送り、パソコン 20のデ イスプレイに認証 OKを表示する(ステップ S 5)。なお、認証結果は、パソコン 20のデ イスプレイに表示する場合に限らず、任意の方法で表示すればよぐ例えばベースデ バイス 10自身が表示してもよ!/、。  Next, the key device 1 is brought close to the base device 10, and the unique ID of the key device 1 is transmitted and received by the base device 10 (step S3). In other words, the unique ID is sent to the base device 10 without going through the personal computer 20. The base device 10 compares the unique ID written in the volatile memory 12a with the received unique ID and performs mutual authentication (step S4). If the two unique IDs match, an authentication OK signal is sent to the PC 20 and the authentication OK is displayed on the PC 20 display (step S5). The authentication result is not limited to being displayed on the display of the personal computer 20, but may be displayed by any method, for example, the base device 10 itself may display it! /.
[0023] 認証試験後、ベースデバイス 10の電源を OFFすることにより、ベースデバイス 10の 揮発性メモリ 12aに書き込まれた固有 IDが自動的に消去され (ステップ S6)、キーデ バイス 1とベースデバイス 10とを紐付けされていない状態にすることができる。  [0023] After the authentication test, by turning off the power of the base device 10, the unique ID written in the volatile memory 12a of the base device 10 is automatically erased (step S6), and the key device 1 and the base device 10 Can be in an unlinked state.
[0024] 上記説明では、ベースデバイス 10の電源を OFFすると同時に揮発性メモリ 12aに書 き込まれた固有 IDが自動的に消去される例について説明した力 これに限るもので はなぐ例えばベースデバイス 10が EAROM、 EEPROM、不揮発性 RAMのような 不揮発性メモリ 12bを搭載して ヽる場合には、認証試験時に不揮発性メモリ 12bに固 有 IDを書き込んでもよい。この場合には、認証試験後、パソコン 20によってベースデ バイス 10に書き込まれた固有 IDを消去することにより、上記と同様の紐付けされてい ない状態にすることができる。  [0024] In the above description, the power described for the example in which the unique ID written in the volatile memory 12a is automatically deleted at the same time when the power of the base device 10 is turned off is not limited to this. For example, the base device If 10 is equipped with a non-volatile memory 12b such as EAROM, EEPROM, or non-volatile RAM, a unique ID may be written to the non-volatile memory 12b during an authentication test. In this case, after the authentication test, by deleting the unique ID written in the base device 10 by the personal computer 20, it is possible to make the same unlinked state as described above.
実施例 2  Example 2
[0025] 図 4は相互認証デバイスの第 2実施例を示す。この実施例では、第 1実施例とは逆に 、ベースデバイス 10Aが固有 IDとその固有 IDを発信する機能を備え、キーデバイス 1 Aが固有 IDを受信する機能と固有 IDを記憶するメモリとを有するものである。  FIG. 4 shows a second embodiment of the mutual authentication device. In this embodiment, contrary to the first embodiment, the base device 10A has a function of transmitting a unique ID and its unique ID, and the key device 1A receives a unique ID and a memory for storing the unique ID. It is what has.
[0026] この実施例の認証試験の場合には、まずパソコン 20がベースデバイス 1 OAの固有 I Dを読み取り、読み取った固有 IDをキーデバイス 1Aのメモリ部に書き込む。次に、キ 一デバイス 1 Aとベースデバイス 1 OAとを近づけ、ベースデバイス 1 OAから固有 IDを 発信してキーデバイス 1 Aで受信させる。キーデバイス 1Aでは、メモリ部に書き込まれ た固有 IDと受信した固有 IDとを比較し、相互認証を実施する。認証試験後、キーデ バイス 1Aのメモリ部に書き込まれた固有 IDを消去することで、キーデバイス 1Aとべ ースデバイス 10Aとを紐付けされて 、な 、状態にすることができる。 In the authentication test of this embodiment, the personal computer 20 first reads the unique ID of the base device 1 OA and writes the read unique ID in the memory unit of the key device 1A. Next, key One device 1 A and base device 1 OA are brought close to each other, and a unique ID is transmitted from base device 1 OA and received by key device 1 A. The key device 1A compares the unique ID written in the memory unit with the received unique ID and performs mutual authentication. After the authentication test, by deleting the unique ID written in the memory part of the key device 1A, the key device 1A and the base device 10A can be associated with each other and put into a state.
実施例 3  Example 3
[0027] 図 5は相互認証デバイスの第 3実施例を示す。この実施例では、キーデバイス 1Bは、 固有 ID が登録されたメモリ部 2と、その固有 ID を発信する発信器 3との他に、ベー FIG. 5 shows a third embodiment of the mutual authentication device. In this embodiment, the key device 1B includes a memory unit 2 in which a unique ID is registered and a transmitter 3 that transmits the unique ID.
K K K K
スデバイス 10Bが発信する固有 ID を受信する受信器 4と、固有 ID を書き込むため  Receiver 4 that receives the unique ID transmitted by the device 10B and for writing the unique ID
B B  B B
のメモリ部 5と、受信したデータとメモリ部 5に記憶されているデータとを比較し認証を 行う認証部 6とを備えている。受信器 4は、ベースデバイス 10Bが発信する固有 ID  And an authentication unit 6 that compares the received data with the data stored in the memory unit 5 to perform authentication. Receiver 4 is a unique ID sent by base device 10B
B  B
のみを受信することができ、 自身の発信器 3が発信する固有 ID を受信することはな κ  Can only receive the unique ID transmitted by its own transmitter 3.
い。  Yes.
[0028] ベースデバイス 10Bもキーデバイス 1Bと同様の構成を有するものであり、キーデバイ ス 1Bが発信する固有 ID を受信する受信器 11と、固有 ID を書き込むためのメモリ  [0028] The base device 10B has the same configuration as the key device 1B. The receiver 11 receives a unique ID transmitted from the key device 1B and a memory for writing the unique ID.
K K  K K
部 12と、受信したデータとメモリ部 12に記憶されているデータとを比較し認証を行う 認証部 13との他に、固有 ID が登録されたメモリ部 14と、その固有 ID を発信する  In addition to the authentication unit 13 that performs authentication by comparing the received data with the data stored in the memory unit 12, the memory unit 14 in which the unique ID is registered and the unique ID are transmitted.
B B  B B
発信器 15とを備えている。受信器 11は、キーデバイス 1Bが発信する固有 ID のみ  Transmitter 15 is provided. Receiver 11 can only receive a unique ID from key device 1B
K  K
を受信することができ、自身の発信器 15が発信する固有 ID を受信することはない。  And the unique ID transmitted by its own transmitter 15 is not received.
B  B
[0029] 上記構成の相互認証デバイスにおける認証試験方法を図 6を参照して説明する。ま ず、読み取り装置の一例であるパソコン 20にキーデバイス 1Bおよびベースデバイス 10Bを接続し、キーデバイス 1Bの固有 ID を読み取るとともに、ベースデバイス 10B  An authentication test method in the mutual authentication device having the above configuration will be described with reference to FIG. First, the key device 1B and the base device 10B are connected to the personal computer 20 which is an example of the reading device, and the unique ID of the key device 1B is read and the base device 10B
K  K
の固有 ID を読み取る。  Read the unique ID of the.
B  B
[0030] 次に、パソコン 20で読み取ったキーデバイス 1Bの固有 ID をベースデバイス 10Bの  [0030] Next, the unique ID of the key device 1B read by the personal computer 20 is assigned to the base device 10B.
K  K
メモリ部 12に書き込み、ベースデバイス 10Bの固有 ID をキーデバイス IBのメモリ部  Write to the memory part 12 and assign the unique ID of the base device 10B to the memory part of the key device IB
B  B
5に書き込む。つまり、相互の固有 IDを交換しあう。  Write to 5. In other words, mutual unique IDs are exchanged.
[0031] 次に、キーデバイス 1Bとベースデバイス 10Bとを近づけ、キーデバイス 1Bの固有 ID κ を発信してベースデバイス 10Bで受信させると同時に、ベースデバイス 10Bの固有 I D を発信してキーデバイス IBで受信させる。つまり、ノ ソコン 20を介さずに固有 ID[0031] Next, the key device 1B and the base device 10B are brought closer to each other, and the unique ID κ of the key device 1B is transmitted and received by the base device 10B. Send D and have key device IB receive it. In other words, the unique ID
B B
を相互に送信しあう。  Send each other.
[0032] キーデバイス 1Bでは、そのメモリ部 5に書き込まれたベースデバイス 10Bの固有 ID  [0032] In the key device 1B, the unique ID of the base device 10B written in the memory unit 5
B  B
と受信した固有 ID とを比較し、認証を行うと同時に、ベースデバイス 10Bでも、その  Is compared with the received unique ID and authentication is performed.
B  B
メモリ部 12に書き込まれたキーデバイス 1Bの固有 ID と受信した固有 ID とを比較  Compare the unique ID of key device 1B written in memory unit 12 with the received unique ID
K K  K K
し、認証を行う。  And authenticate.
[0033] 認証試験後、キーデバイス 1Bのメモリ部 5に書き込まれた固有 ID を消去するととも  [0033] After the authentication test, the unique ID written in the memory unit 5 of the key device 1B is deleted.
B  B
に、ベースデバイス 10Bのメモリ部 12に書き込まれた固有 ID を消去することで、キ  In addition, by deleting the unique ID written in the memory unit 12 of the base device 10B,
K  K
一デバイス IBとベースデバイス 10Bとを紐付けされていない状態にすることができる  One device IB and base device 10B can be unlinked
[0034] この実施例の場合には、キーデバイスとベースデバイスの双方向で認証し合うことで[0034] In this embodiment, the key device and the base device authenticate each other.
、より信頼性の高い認証試験を実施することができる。 A more reliable certification test can be performed.
[0035] 本発明の相互認証デバイスは、車両のキーレスエントリーシステムのほかに、バソコ ン、携帯電話などの電子機器の動作制限を力けるためなど、種々の機器の認証に適 用できる。 [0035] The mutual authentication device of the present invention can be applied to authentication of various devices such as a keyless entry system for a vehicle, in order to restrict operation of electronic devices such as a personal computer and a mobile phone.

Claims

請求の範囲 The scope of the claims
[1] キーデバイスとベースデバイスとを準備するステップであって、一方のデバイスが固 有識別コードとこの固有識別コードを発信する機能とを有し、他方のデバイスが上記 固有識別コードを受信する機能と固有識別コードを記憶するメモリ部とを有するステ ップと、  [1] A step of preparing a key device and a base device, wherein one device has a unique identification code and a function of transmitting the unique identification code, and the other device receives the unique identification code. A step having a function and a memory unit for storing a unique identification code;
一方のデバイスの固有識別コードを読み取り手段を用いて読み取るステップと、 読み取った固有識別コードを他方のデバイスのメモリ部に書き込むステップと、 一方のデバイスの固有識別コードを発信し、上記メモリ部に固有識別コードが書き込 まれた他方のデバイスでこれを受信するステップと、  The step of reading the unique identification code of one device using a reading means, the step of writing the read unique identification code in the memory unit of the other device, and transmitting the unique identification code of one device to the memory unit Receiving it on the other device with the identification code written on it;
他方のデバイスのメモリ部に書き込まれた固有識別コードと、上記受信ステップで受 信した固有識別コードとを比較し、相互認証を実施するステップと、  Comparing the unique identification code written in the memory part of the other device with the unique identification code received in the receiving step, and performing mutual authentication;
他方のデバイスのメモリ部に書き込まれた固有識別コードを消去するステップと、を備 える相互認証デバイスの認証試験方法。  And a step of erasing the unique identification code written in the memory unit of the other device.
[2] キーデバイスとベースデバイスとを準備するステップであって、双方のデバイスが固 有識別コードとこの固有識別コードを発信する機能とを有し、かつ双方のデバイスが 上記固有識別コードを受信する機能と固有識別コードを記憶するメモリ部とを有する ステップと、  [2] Step of preparing a key device and a base device, both devices having a unique identification code and a function of transmitting this unique identification code, and both devices receiving the unique identification code And a step having a memory unit for storing a unique identification code,
双方のデバイスの固有識別コードを読み取り手段を用いて読み取るステップと、 読み取った双方の固有識別コードを相手側のデバイスのメモリ部に書き込むステップ と、  A step of reading the unique identification codes of both devices using a reading means, a step of writing both of the read unique identification codes in the memory portion of the partner device, and
双方のデバイスの固有識別コードを相手側のデバイスに発信し、双方のデバイスでこ れを受信するステップと、  Sending a unique identification code of both devices to the other device and receiving it on both devices;
双方のデバイスにおいて、そのメモリ部に書き込まれた固有識別コードと、上記受信 ステップで受信した固有識別コードとを比較し、相互認証を実施するステップと、 双方のデバイスのメモリ部に書き込まれた固有識別コードを消去するステップと、を備 える相互認証デバイスの認証試験方法。  In both devices, the step of comparing the unique identification code written in the memory unit with the unique identification code received in the receiving step and performing mutual authentication, and the unique identification code written in the memory unit of both devices And a step of erasing the identification code.
[3] 上記読み取った固有識別コードをメモリ部に書き込むステップは、揮発性メモリに書 き込むステップを含み、 上記固有識別コードを消去するステップは、上記揮発性メモリを有するデバイスへの 電源供給を停止することである、請求項 1または 2に記載の相互認証デバイスの認証 試験方法。 [3] The step of writing the read unique identification code into the memory unit includes a step of writing into the volatile memory, The mutual authentication device authentication test method according to claim 1, wherein the step of deleting the unique identification code is to stop power supply to the device having the volatile memory.
PCT/JP2006/318336 2005-10-26 2006-09-15 Authentication test method for mutual authentication device WO2007049410A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2005311120A JP3935183B2 (en) 2005-10-26 2005-10-26 Authentication test method for mutual authentication devices
JP2005-311120 2005-10-26

Publications (1)

Publication Number Publication Date
WO2007049410A1 true WO2007049410A1 (en) 2007-05-03

Family

ID=37967532

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/318336 WO2007049410A1 (en) 2005-10-26 2006-09-15 Authentication test method for mutual authentication device

Country Status (2)

Country Link
JP (1) JP3935183B2 (en)
WO (1) WO2007049410A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02171478A (en) * 1988-12-23 1990-07-03 Matsushita Electric Works Ltd Electric lock control system using multiplex transmission
JPH07194823A (en) * 1993-12-28 1995-08-01 Hainetsuto:Kk Game machine control device and game machine management system using the same
JPH0833056A (en) * 1994-07-20 1996-02-02 Tokai Rika Co Ltd Remote manipulator for vehicle
JP2000038864A (en) * 1998-07-23 2000-02-08 Mazda Motor Corp Keyless entry system
JP2001115696A (en) * 1999-10-13 2001-04-24 Alps Electric Co Ltd Communication device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02171478A (en) * 1988-12-23 1990-07-03 Matsushita Electric Works Ltd Electric lock control system using multiplex transmission
JPH07194823A (en) * 1993-12-28 1995-08-01 Hainetsuto:Kk Game machine control device and game machine management system using the same
JPH0833056A (en) * 1994-07-20 1996-02-02 Tokai Rika Co Ltd Remote manipulator for vehicle
JP2000038864A (en) * 1998-07-23 2000-02-08 Mazda Motor Corp Keyless entry system
JP2001115696A (en) * 1999-10-13 2001-04-24 Alps Electric Co Ltd Communication device

Also Published As

Publication number Publication date
JP3935183B2 (en) 2007-06-20
JP2007120067A (en) 2007-05-17

Similar Documents

Publication Publication Date Title
US8918643B2 (en) Authentication method, authentication system, in-vehicle device, and authentication apparatus
US20130301829A1 (en) Electronic key registration system
EP2672655B1 (en) Electronic key registration system
JP6093503B2 (en) Electronic key registration method
JP2016133969A (en) Mobile terminal additional registration system
WO2013114972A1 (en) Electronic-key registration method and electronic-key registration system
US20100022239A1 (en) Portable telephone and access control method
JP2008059450A (en) Vehicle information rewriting system
CN103328278A (en) Method for pairing a mobile telephone with a motor vehicle and locking/unlocking set
JP6437845B2 (en) Mobile terminal key registration system
JP4525438B2 (en) Communication terminal and wireless tag
CN112041525B (en) Key information generation system and key information generation method
JP2006118122A (en) Key management system
JP2008530840A (en) Method for fast pre-authentication by distance recognition
JP2015154283A (en) Portable terminal registration system
JP4765608B2 (en) Data processing apparatus, data processing program, and data processing system
JP2009032003A (en) Portable electronic device, terminal device, authentication system, and authentication method
JP4699853B2 (en) Insurance authentication apparatus, authority holding apparatus, authority delegation system, authority delegation permission method, and authority delegation permission program
JP7389692B2 (en) Vehicle rental system
WO2007049410A1 (en) Authentication test method for mutual authentication device
JP2007311960A (en) Method for testing mutual authentication device
JP2005060949A (en) Door lock release system for automobile
JP7578011B2 (en) Electronic information storage medium, key sharing method, and program
JP4284237B2 (en) Authentication method, mobile communication terminal device and card type device
JP2023065941A (en) Digital key issuing method and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06810178

Country of ref document: EP

Kind code of ref document: A1