WO2007061006A1 - Appareil, procede et programme de lecture d'informations, appareil, procede et programme de generation d'informations d'authentification et support d'enregistrement - Google Patents

Appareil, procede et programme de lecture d'informations, appareil, procede et programme de generation d'informations d'authentification et support d'enregistrement Download PDF

Info

Publication number
WO2007061006A1
WO2007061006A1 PCT/JP2006/323351 JP2006323351W WO2007061006A1 WO 2007061006 A1 WO2007061006 A1 WO 2007061006A1 JP 2006323351 W JP2006323351 W JP 2006323351W WO 2007061006 A1 WO2007061006 A1 WO 2007061006A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
reading
authentication
recorded
recording medium
Prior art date
Application number
PCT/JP2006/323351
Other languages
English (en)
Japanese (ja)
Inventor
Tadayasu Kaneko
Koji Koga
Takeshi Sato
Goro Kobayashi
Original Assignee
Pioneer Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pioneer Corporation filed Critical Pioneer Corporation
Publication of WO2007061006A1 publication Critical patent/WO2007061006A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • Information reading device authentication information generating device, information reading method, authentication information generating method, information reading program, authentication information generating program, and recording medium
  • the present invention relates to an information reading device used when reading information used by a mobile object
  • the present invention relates to an authentication information generating device, an information reading method, an authentication information generating method, an information reading program, an authentication information generating program, and a recording medium.
  • the use of the present invention is not limited to the above-described information reading device, authentication information generating device, information reading method, authentication information generating method, information reading program, authentication information generating program, and recording medium.
  • data used in in-vehicle devices such as navigation devices, such as map data and application data
  • Such data update is, for example, whether the data type of the road data, the route search data, or the route guidance data is a deviation data type, or the background data type is updated! Let the user specify And when updating any of road data, route search data, route guidance data, update all data of the corresponding data type stored in the hard disk, and if it is the data type of background data, This is done by updating data in units of blocks that fall within the specified range (for example, see Patent Document 1 below).
  • Patent Document 1 Japanese Unexamined Patent Application Publication No. 2005-148004
  • the update disk may be lent out or copied by the user when updating is performed using the update disk in which the update data is recorded.
  • Lending update disk If illegal data updates are made by borrowing or copying, it is not possible to obtain revenue from sales of update disks or update data. For this reason, for example, there is a problem that it is difficult to provide the latest information, such as map data reflecting the road conditions that change every moment.
  • an information reading apparatus is an identification for acquiring medium identification information uniquely given to a recording medium on which predetermined information is recorded.
  • the authentication information generating apparatus reads the medium identification information uniquely given to the recording medium on which the predetermined information is recorded, and the information recorded on the recording medium. Using the receiving means for receiving the device identification information inherently given to the information reading device to be taken from the information reading device, and the medium identification information and the device identification information received by the receiving means. Generating means for generating authentication information for reading the predetermined information recorded on the information processing apparatus, and transmitting means for transmitting the authentication information generated by the generating means to the information reading device. .
  • the information reading method includes an identification information acquisition step of acquiring medium identification information uniquely given to a recording medium on which predetermined information is recorded, and the identification information acquisition.
  • An authentication information acquisition step for acquiring authentication information generated based on the identification information, and reading the predetermined information recorded on the recording medium based on the authentication information acquired by the authentication information acquisition step And a reading process.
  • the authentication information generating method reads the medium identification information uniquely given to the recording medium on which the predetermined information is recorded, and the information recorded on the recording medium.
  • the device identification information uniquely assigned to the information reading device to be read is received from the information reading device, and the medium identification information and device identification information received by the receiving step are used to record the recording information.
  • An information reading program according to the invention of claim 7 causes a computer to execute the information reading method according to claim 5.
  • an authentication information generation program according to the invention of claim 8 causes a computer to execute the authentication information generation method of claim 6.
  • a recording medium according to the invention of claim 9 is readable by a computer in which the information reading program according to claim 7 is recorded.
  • a recording medium according to the invention of claim 10 is readable by a computer recording the authentication information generation program according to claim 8.
  • FIG. 1 is a block diagram showing a functional configuration of an information reading system according to an embodiment.
  • FIG. 2 is a flowchart showing a procedure of information reading processing by the information reading device.
  • FIG. 3 is a flowchart showing a procedure of authentication information generation processing by the authentication information generation device.
  • FIG. 4 is a block diagram showing a hardware configuration of the navigation device.
  • FIG. 5 is a flowchart showing a procedure of map data update processing of the navigation device.
  • FIG. 6 is a flowchart showing the procedure of the map data update process of the navigation device.
  • FIG. 7 is a flowchart showing a procedure of password generation processing by the management server.
  • FIG. 1 is a block diagram showing a functional configuration of an information reading system according to an embodiment.
  • the information reading system 100 includes an information reading device 110 that reads information recorded on the recording medium 101, and an authentication information generating device 120 that generates authentication information for reading predetermined information recorded on the recording medium 101.
  • the information reading system 100 includes an information reading device 110 that reads information recorded on the recording medium 101, and an authentication information generating device 120 that generates authentication information for reading predetermined information recorded on the recording medium 101.
  • the information reading apparatus 110 includes an identification information acquisition unit 111, an authentication information acquisition unit 112, a reading unit 113, and a reading control unit 114.
  • the identification information acquisition unit 111 is unique to the recording medium 101.
  • the medium identification information given to is acquired.
  • the identification information acquisition unit 111 acquires the medium identification information by reading the medium identification information recorded on the recording medium 101, for example. Also, the identification information acquisition unit 111 acquires the medium identification information by, for example, user input.
  • the authentication information acquisition unit 112 acquires authentication information generated based on the medium identification information acquired by the identification information acquisition unit 111 and the device identification information uniquely assigned to the own device. For example, the authentication information acquisition unit 112 acquires the authentication information by transmitting the medium identification information and the device identification information to the authentication information generation device 120 and receiving the authentication information generated by the authentication information generation device 120. To do.
  • the reading unit 113 reads predetermined information recorded on the recording medium 101.
  • the reading control unit 114 controls the reading unit 113 based on the authentication information acquired by the authentication information acquiring unit 112. For example, the reading control unit 114 inputs authentication information as a password for reading predetermined information recorded on the recording medium 101, and reads the predetermined information when authenticated.
  • the information recorded on the recording medium 101 is encrypted using the authentication information, and the read control unit 114 decrypts the information recorded on the recording medium 101 using the authentication information. It is also possible to hesitate. In this case, the authentication information is used as an encryption key for predetermined information recorded on the recording medium 101.
  • the authentication information generation device 120 includes a reception unit 121, a generation unit 122, and a transmission unit 123.
  • the receiving unit 121 receives the medium identification information uniquely assigned to the recording medium 101 and the device identification information uniquely assigned to the information reading apparatus 110 that reads the information recorded on the recording medium 101. Receive from 110.
  • the reception unit 121 receives the medium identification information and the device identification information transmitted by the authentication information acquisition unit 112 of the information reading device 110 via the network.
  • the generating unit 122 generates authentication information for reading predetermined information recorded on the recording medium 101 using the medium identification information and the device identification information received by the receiving unit 121. For example, the generation unit 122 performs medium identification information and device identification information with a specific function. The calculated value is calculated, and authentication information unique to the combination of the recording medium 101 and the information reading device 110 is generated.
  • the transmission unit 123 transmits the authentication information generated by the generation unit 122 to the information reading device 110.
  • the transmission unit 123 transmits the authentication information to the authentication information acquisition unit 112 of the information reading device 110 that has transmitted the medium identification information and the device identification information via the network.
  • the exchange of medium identification information, device identification information, and authentication information between the information reading device 110 and the authentication information generating device 120 is not limited to transmission / reception via a network, and for example, the information is recorded. This may be done by transporting the recorded medium (separate from the recording medium 101).
  • the information reading system 100 reads predetermined information recorded on the recording medium 101. At this time, an information reading process by the information reading apparatus 110 and an authentication information generating process by the authentication information generating apparatus 120 are performed.
  • FIG. 2 is a flowchart showing a procedure of information reading processing by the information reading device.
  • the information reading device 110 first acquires medium identification information by the identification information acquisition unit 111 (step S201). Specifically, for example, the medium identification information recorded on the recording medium 101 is read.
  • the authentication information acquisition unit 112 transmits the medium identification information and the device identification information to the authentication information generation device 120 (step S202), and waits until the authentication information is received (step S203: No Loop). At this time, the authentication information generation device 120 performs authentication information generation processing and generates authentication information.
  • the reading control unit 114 controls the reading unit 113 based on the authentication information to read predetermined information recorded on the recording medium 101 (Ste S204), the process according to this flowchart is terminated.
  • the predetermined information recorded on the recording medium 101 is encrypted using the authentication information
  • the reading control unit 114 decrypts the predetermined information recorded on the recording medium 101 using the authentication information. I'll do it.
  • the information reading apparatus 110 performs predetermined information recorded on the recording medium 101. Read the information.
  • FIG. 3 is a flowchart showing a procedure of authentication information generation processing by the authentication information generation apparatus.
  • the authentication information generating apparatus 120 first waits until the receiving unit 121 receives the medium identification information and the apparatus identification information from the information reading apparatus 110 (Step S 301: No Norep). ).
  • step S301 When the medium identification information and the device identification information are received (step S301: Yes), the authentication information generating device 120 generates authentication information by the generation unit 122 (step S302). Then, the authentication information generated at step S302 is transmitted by the transmission unit 123 (step S303), and the processing according to this flowchart is terminated.
  • the information reading system 100 from the medium identification information uniquely given to the recording medium and the device identification information uniquely given to the own apparatus. Based on the generated authentication information, the information recorded on the recording medium is read. As a result, it is possible to prevent the predetermined information recorded on the recording medium from being read indefinitely. In particular, when the prescribed information is confidential information or when the information itself is distributed as a product, it is possible to prevent unauthorized persons from reading the information illegally.
  • the information recorded on the recording medium can be read immediately. Furthermore, by encrypting predetermined information using authentication information, the information recorded on the recording medium can be more securely protected.
  • the information reading system 100 is applied to update of map data of the navigation device 400 mounted on a vehicle.
  • the recording medium 101 is a DVD-ROM on which map data is recorded
  • the information reading device 110 is a navigation device 400
  • the authentication information generating device 120 is a management server (not shown).
  • FIG. 4 is a block diagram showing the hardware configuration of the navigation device.
  • a navigation device 400 includes a CPU 401, a ROM 402, a RAM (memory) 403, a magnetic disk drive 404, a magnetic disk 405, an optical disk drive 406, an optical disk 407, and an audio 1 / F (interface). 408, a microphone 409, a speaker 410, an input device 411, an image IZF 412, a camera 413, a display 414, a communication IZF 415, a GPS unit 416, and various sensors 417.
  • Each component 401 to 417 is connected by a bus 420.
  • the CPU 401 governs overall control of the navigation device 400.
  • the ROM 402 records programs such as a boot program, a communication program, a database creation program, and a data analysis program. Furthermore, the ROM 402 records device identification information (hereinafter referred to as a hard ID) that uniquely identifies each navigation device 400.
  • RAM403 is used as a work area for CPU401.
  • the magnetic disk drive 404 controls reading and writing of data to the magnetic disk 405 according to the control of the CPU 401.
  • the magnetic disk 405 records data written under the control of the magnetic disk drive 404.
  • the magnetic disk 405 for example, HD (node disk) or FD (flexible disk) can be used.
  • the optical disk drive 406 controls data reading / writing to the optical disk 407 in accordance with the control of the CPU 401.
  • the optical disk 407 is a detachable recording medium from which data is read according to the control of the optical disk drive 406.
  • a writable recording medium can be used as the optical disc 407.
  • the removable recording medium may be a power MO of the optical disc 407, a memory card, or the like.
  • map data used for route guidance includes background data that represents features (features) such as buildings, rivers, and the ground surface, and road shape data that represents the shape of the road.
  • Two-dimensional or three-dimensional data is displayed on the display screen of the display 414. Is drawn to.
  • the navigation device 400 is guiding a route, the map data and The current position of the vehicle acquired by the GPS unit 416 is displayed in an overlapping manner.
  • the road shape data further includes traffic condition data.
  • the traffic condition data includes, for example, the presence / absence of traffic lights and pedestrian crossings, the presence / absence of highway doorways and junctions, the length (distance) of each link, road width, direction of travel, road type (high speed). Road, toll road, general road, etc.).
  • the traffic condition data is stored with past traffic information obtained by statistically processing the past traffic information based on the time of the season and the day of the week.
  • the navigation device 400 obtains information on traffic jams currently occurring based on road traffic information received by communication IZF415, which will be described later. .
  • the above-described map data is periodically updated.
  • the map data will gradually become old due to the opening of new roads and changes in surrounding facilities. Therefore, the latest information is kept by updating the map data regularly.
  • Force of Map Data Recording In the case of HD, which is an example of the magnetic disk 405, the update data is read from the optical disk 407 on which the update data is recorded, and the map data is updated.
  • the map data is recorded on a portable medium (mainly a disk) such as the optical disk 407, it is updated by exchanging the disk with the latest data.
  • the map data recorded on the HD is updated with the update data recorded on a disk such as a DVD-ROM or CD-ROM.
  • the audio IZF 408 is connected to an audio input microphone 409 and an audio output speaker 410. Audio received by the microphone 409 is AZD converted in the audio IZF408. In addition, sound is output from the speaker 410. Note that the voice input from the microphone 409 can be recorded on the magnetic disk 405 or the optical disk 407 as voice data.
  • examples of the input device 411 include a remote controller, a keyboard, a mouse, and a touch panel that are provided with a plurality of keys for inputting characters, numerical values, various instructions, and the like. Furthermore, the input device 411 connects other information processing terminals such as a digital camera and a mobile phone terminal. Data input / output can be performed.
  • the video IZF 412 is connected to a video input camera 413 and a video output display 414.
  • the video I / F 412 includes, for example, a graphic controller that controls the entire display 414, a buffer memory such as VRAM (Video RAM) that temporarily records image information that can be displayed immediately, and a graphic controller. Based on the output image data, it is configured by a control IC that controls display of the display 414.
  • VRAM Video RAM
  • the camera 413 captures images inside and outside the vehicle and outputs them as image data.
  • An image captured by the camera 413 can be recorded on the magnetic disk 405 or the optical disk 407 as image data.
  • the display 414 displays icons, cursors, menus, windows, or various data such as characters and images.
  • a CRT, a TFT liquid crystal display, a plasma display, or the like can be adopted.
  • the communication IZF 415 is connected to a network via radio and functions as an interface between the navigation device 400 and the CPU 401.
  • the communication IZF 415 is further connected to a communication network such as the Internet via radio and functions as an interface between the communication network and the CPU 401.
  • Communication networks include LANs, WANs, public line networks and mobile phone networks.
  • the communication IZF415 is composed of, for example, an FM tuner, VICS (Vehicle Information and Communication System) Z beacon resino, a wireless navigation device, and other navigation devices. Get road traffic information such as traffic regulations. VICS is a registered trademark.
  • the GPS unit 416 calculates information indicating the current position of the vehicle (the current position of the navigation device 400) using received waves from GPS satellites and output values from various sensors 417 described later.
  • the information indicating the current location is information specifying one point on the map data, for example, latitude / longitude and altitude.
  • the GPS unit 416 outputs an odometer, a speed change amount, and an azimuth change amount using output values from the various sensors 417. This makes it possible to analyze dynamics such as sudden braking and sudden handle.
  • the various sensors 417 are a vehicle speed sensor, an acceleration sensor, an angular velocity sensor, and the like.
  • the output value is used for the calculation of the current point by the GPS unit 416, the measurement of the change in speed and direction, the determination of whether or not to operate the drive recorder function, and the like. Further, the various sensors 417 may detect whether a user operates a vehicle handle or a brake. Furthermore, the output values of various sensors 417 can be used as data to be recorded with the drive recorder function.
  • the identification information acquisition unit 111 and the reading unit 113 are controlled by the optical disk drive 406, and the authentication information acquisition unit 112 is controlled by the communication IZF415.
  • the units 114 realizes its function by the CPU 401.
  • the navigation device 400 updates the map data recorded on the HD with the update data recorded on the disc such as DVD-ROM or CD-ROM.
  • the identification information hereinafter referred to as disk ID
  • the node ID and force uniquely assigned to the navigation device 400 are also generated. Is required.
  • the disk ID is managed by a management server that monitors the information in the disk so that it can be used properly.
  • the management server accepts a password transmission request from the user of each disk, and generates and transmits a password if it is determined that the transmission request is authorized.
  • the management server and the navigation device 400 exchange information (disk ID, hard ID, password, etc.) via the network, for example. Further, for example, information may be exchanged by transporting a recording medium on which such information is recorded.
  • FIG. 5 and FIG. 6 are flowcharts showing the procedure of the map data update process of the navigation device.
  • the navigation apparatus 400 first waits until a disk is inserted into the optical disk drive 406 (step S 501: No loop).
  • step S501: Yes it is determined from the header information of the inserted disc whether or not the map data is recorded on the disc (step S502).
  • step S502: Yes the recorded map data is compared with the currently recorded map data to determine whether or not the version has a newer version (step S502: Yes). S503).
  • the disk ID is also read out from the disk force (step S504).
  • each disk is given a disk ID as unique identification information at the time of shipment from the factory.
  • the disk ID is managed by the management server described later.
  • step S502 when no map data is recorded on the disc (step S502: No), the recorded map data is compared with the currently recorded map data. If not (Step S503: No), the process according to this chart is terminated. It should be noted that the recorded map data is now recorded! If it is not a version, it may be updated if the user wishes.
  • step S504 When the disk ID is read in step S504, the navigation device 400 reads the hard ID recorded in the ROM 402 (step S505) and transmits the disk ID and hard ID to the management server (step S506). . That is, a password transmission request is made to the management server, and the process proceeds to step S507 in FIG.
  • step S507 After transmitting the disk ID and hard ID in step S506, the navigation device 400 waits until the password is returned from the management server (step S507: No loop). For example, the management server calculates a password by calculating a disk ID and a hard ID using a predetermined password generation function. When the password is returned (step S507: Yes), the navigation device 400 verifies the password (step S508).
  • step S509 the same password generation function as that of the management server is saved in advance on the navigation device 400 side, and the disk ID and hard ID are calculated using the password generation function. Calculate the password. The determination is made based on whether or not the password returned from the management server matches the verification password calculated by the navigation device 400.
  • step S509: Yes If the verification is successful (step S509: Yes), the map data recorded on the disk is read (step S510), and the map data recorded on the HD is updated (step S511). The process ends. On the other hand, if collation cannot be performed (step S509: No), an error message is displayed on the display 414 or the like (step S512), and the processing according to this flowchart is terminated.
  • the fact that unauthorized access to the map data has occurred may be transmitted to the management server. If an error message appears, the user may have inserted the wrong disc or entered the wrong node ID. The user will take measures according to the situation.
  • FIG. 7 is a flowchart showing the procedure of the nosword generation process by the management server.
  • the management server issues a disk ID for uniquely identifying each disk to each disk on which map data is recorded (step S701).
  • the management server writes the disk ID corresponding to each disk in the disk management database.
  • the disk management database in addition to the disk ID, for example, whether or not there is a request to send a user password for the disk corresponding to the disk ID, and if there is a transmission request, the navigation that uses that disk.
  • the hard ID of device 400 is written. It is also possible to record the date and time when there was a transmission request and the presence or absence of an unauthorized transmission request.
  • the system waits until it receives a transmission request for a password used to access map data recorded on the disc from navigation device 400 (step S702: No loop).
  • the password transmission request transmitted from the navigation device 400 includes a disk ID and a node ID.
  • the management server extracts the disk ID and the hard ID (step S703), and determines whether or not the transmission request has a legitimate authority (step S704). .
  • Whether or not the transmission power of the authorized authority is required is determined by, for example, using a disk management database. Refer to and determine whether a password has been issued for the corresponding disk ID. If no word is issued yet, it is determined that the transmission request is from a legitimate disk purchaser (legitimate authority). Also, if a password has already been issued, refer to the hard ID corresponding to the issued password, and if it matches the hard ID included in the current transmission request, it is a re-transmission request with a legitimate authority. Judge. On the management server side, it is possible to authenticate only with the navigation device 400 without determining whether or not the transmission request is from a legitimate authorized person! /.
  • Step S704 In the case of a transmission request with a legitimate authority (Step S704: Yes), the management server generates a map data reading password (Step S705), and returns the generated password to the navigation device 400 ( Step S706). Then, the disk management database is updated (step S707), and the processing according to this flowchart is terminated.
  • the disk management database is updated, for example, by writing in the disk management database the presence / absence of a password transmission request for the disk ID and the hard ID of the navigation device 400 that made the transmission request.
  • step S704 if it is not a transmission request from a legitimate authorized person (step S704: No), an error message is returned to the navigation device 400 (step S708), and the processing according to this flowchart is terminated. At this time, the fact that such an unauthorized transmission request has been made may be written in the disk management database.
  • the hard ID is written in the disk management database together with the disk ID.
  • a password transmission request it is determined by a legitimate authorized person depending on whether the hard ID included in the transmission request matches the hard ID recorded in the disk management database. It is determined whether or not the transmission request is possible.
  • the password can be generated by the management server prior to shipping the disk.
  • the map data encrypted using the password (or a value generated separately from the password using the disk ID and hard ID) as the encryption key may be written to the disk.
  • the map data recorded on the disc can be more securely protected.
  • a disk is created based on a password generated from a disk ID uniquely assigned to the disk and a hard ID uniquely assigned to the own device. Read the recorded information. This can prevent the information recorded on the disc from being read indefinitely. In particular, when the information recorded on the disc is confidential information or when the information itself is distributed as a product, it is possible to prevent unauthorized persons from reading the information illegally.
  • information recorded on the disc can be immediately read out by transmitting and receiving the disc ID, the hard ID, and the password via the network. Furthermore, if the hardware ID of the navigation device 400 that uses the map data can be identified with certainty, the map data encrypted with the password as the encryption key is recorded on the disk. It is possible to protect map data recorded on the map more firmly.
  • the information reading method and authentication information generating method described in the present embodiment can be realized by executing a program prepared in advance on a computer such as a personal computer or a workstation. it can.
  • This program is recorded on a computer-readable recording medium such as a hard disk, a flexible disk, a CD-ROM, an MO, and a DVD, and is executed by being read by the computer.
  • This program may also be a transmission medium that can be distributed over a network such as the Internet! /.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Navigation (AREA)

Abstract

L'invention concerne un système de lecture (100) d'informations comprenant un appareil de lecteur (110) d'informations, et un appareil de génération (120) d'informations d'authentification. Une section d'acquisition (111) d'informations d'identification acquiert des informations d'identification de support affectées individuellement à un support d'enregistrement (101) sur lequel des informations prédéterminées sont enregistrées. Une section d'acquisition (112) d'informations d'authentification acquiert des informations d'authentification générées les bases d'informations d'identification de support et d'appareil qui lui sont individuellement affectées. Une section de lecture (113) lit des informations enregistrées sur le support d'enregistrement (101). Une section de commande de lecture (114) commande la section de lecture en fonction des informations d'authentification. Une section de réception (121) reçoit les d'informations d'identification de support et d'appareil provenant de la section de lecture d'informations (110). Une section de génération (122) génère des informations d'authentification à l'aide des informations d'identification de support et d'appareil. Une section de transmission (123) transmet les informations d'authentification générées à l'appareil de lecture (110) d'informations.
PCT/JP2006/323351 2005-11-24 2006-11-22 Appareil, procede et programme de lecture d'informations, appareil, procede et programme de generation d'informations d'authentification et support d'enregistrement WO2007061006A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2005338640 2005-11-24
JP2005-338640 2005-11-24

Publications (1)

Publication Number Publication Date
WO2007061006A1 true WO2007061006A1 (fr) 2007-05-31

Family

ID=38067231

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/323351 WO2007061006A1 (fr) 2005-11-24 2006-11-22 Appareil, procede et programme de lecture d'informations, appareil, procede et programme de generation d'informations d'authentification et support d'enregistrement

Country Status (1)

Country Link
WO (1) WO2007061006A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009289267A (ja) * 2008-05-28 2009-12-10 Sony Dadc Austria Ag データキャリアのコンテンツへのアクセスを制御する方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003323348A (ja) * 2002-05-07 2003-11-14 Matsushita Electric Ind Co Ltd 不正利用を防止する電子データ配布方式対応機器
JP2004139473A (ja) * 2002-10-18 2004-05-13 Toshiba Corp コンテンツ記録装置、再生装置及び記録再生装置、並びに記憶媒体
JP2005284506A (ja) * 2004-03-29 2005-10-13 Matsushita Electric Ind Co Ltd ダウンロードシステム及びダウンロードシステムを構成する機器、管理局、リムーバブルメディア

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003323348A (ja) * 2002-05-07 2003-11-14 Matsushita Electric Ind Co Ltd 不正利用を防止する電子データ配布方式対応機器
JP2004139473A (ja) * 2002-10-18 2004-05-13 Toshiba Corp コンテンツ記録装置、再生装置及び記録再生装置、並びに記憶媒体
JP2005284506A (ja) * 2004-03-29 2005-10-13 Matsushita Electric Ind Co Ltd ダウンロードシステム及びダウンロードシステムを構成する機器、管理局、リムーバブルメディア

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009289267A (ja) * 2008-05-28 2009-12-10 Sony Dadc Austria Ag データキャリアのコンテンツへのアクセスを制御する方法

Similar Documents

Publication Publication Date Title
JP4633747B2 (ja) 情報配信システム及び情報配信方法
WO2014045699A1 (fr) Dispositif, procédé et programme informatique de commande de partage de capteurs
JP6498304B2 (ja) 地図情報管理システム、地図情報管理装置、地図会社専用アプリデータ管理装置および車両用データ管理装置
WO2011099076A1 (fr) Dispositif d'affichage de carte
JP2009038586A (ja) 位置認証システム
JP2021192049A (ja) データ保管装置及びデータ保管プログラム
CN113678182A (zh) 用于交通信号验证的系统和密码硬化方法
US7991862B2 (en) Content purchasing and distributing method
US8683606B2 (en) Navigation system
US9317665B2 (en) Service management apparatus, program, and service management method
CN115803796A (zh) 用于为车辆检测交通杆攻击的系统和方法
WO2007061006A1 (fr) Appareil, procede et programme de lecture d'informations, appareil, procede et programme de generation d'informations d'authentification et support d'enregistrement
JP5348502B2 (ja) ナビゲーションシステム
JP2002109593A (ja) 無線通信装置および情報変更方法
JP6360854B2 (ja) ビーコン装置認証システム、携帯端末装置、ビーコン装置、ビーコン装置設置システム、ビーコン装置認証方法、ビーコン装置設置方法、ビーコン装置認証プログラム、およびビーコン装置設置プログラム
JP2006276932A (ja) 車載器セットアップシステム及び車載器のセットアップ方法、セットアップ装置及びその制御方法、車載器及びその制御方法、制御プログラム及び記録媒体
JP2007164306A (ja) 位置証明システム、証明センタ装置、位置証明方法、証明装置および端末
US20220414267A1 (en) Method, apparatus, and computer program product for confidential computing
JP4814672B2 (ja) 電子機器の盗難防止装置、方法及びプログラム
WO2008050401A1 (fr) Appareil de gestion de communication, appareil terminal de communication, procédé de gestion de communication, procédé de communication, programme de gestion de communication, programme de communication et support d'enregistrement
WO2008053564A1 (fr) Appareils de terminal de communication, appareil de gestion de communication, procédé de communication, procédé de gestion de communication, programme de communication, programme de gestion de communication et support d'enregistrement
JP2002095050A (ja) 情報伝送システム、無線通信装置および移動体
WO2007061007A1 (fr) Processeur d'informations, dispositif monte dans un vehicule, procede et programme de traitement d'informations et support d'enregistrement
JP2012088328A (ja) 地図表示装置
WO2008050400A1 (fr) Appareil de gestion de communication, appareil terminal de communication, procédé de gestion de communication, procédé de communication, programme de gestion de communication, programme de communication et support d'enregistrement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06833173

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP