WO2009096566A1 - 携帯端末装置およびその通信許可判定方法 - Google Patents
携帯端末装置およびその通信許可判定方法 Download PDFInfo
- Publication number
- WO2009096566A1 WO2009096566A1 PCT/JP2009/051662 JP2009051662W WO2009096566A1 WO 2009096566 A1 WO2009096566 A1 WO 2009096566A1 JP 2009051662 W JP2009051662 W JP 2009051662W WO 2009096566 A1 WO2009096566 A1 WO 2009096566A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- unit
- authentication
- permission
- control unit
- terminal device
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
- G06Q20/0658—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/14—Payment architectures specially adapted for billing systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/28—Pre-payment schemes, e.g. "pay before"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3221—Access to banking information through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3227—Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present invention relates to a portable terminal device capable of performing electronic money via RFID (Radio Frequency Identification) communication and a communication permission determination method thereof.
- RFID Radio Frequency Identification
- RFID refers to an IC chip that incorporates a non-volatile memory and a radio communication (RFID communication) function using electromagnetic waves, or a resin card that incorporates them. Recently, IC chips and cards equipped with advanced security functions and CPUs have appeared in the RFID tag.
- RFID communication radio communication
- “electronic money” refers to the digital value of monetary value, used for shopping without using a credit card or cash, or used as a payment method for electronic commerce using the Internet, etc. Say.
- An object of the present invention is to provide a mobile terminal device and a communication permission determination method thereof that can maintain high security without sacrificing convenience as much as possible.
- a portable terminal device includes a biometric authentication unit that performs authentication processing based on biometric information, a request acquisition unit that acquires permission request information, and the permission request information acquired by the request acquisition unit. And a control unit that controls a predetermined function according to the authentication unit.
- the control unit specifies a permission range according to an authentication rate calculated based on an authentication process in the biometric authentication unit, and is acquired by the request acquisition unit. When the permission request based on the specified permission request information is within the specified permission range, execution of the predetermined function is permitted.
- the mobile terminal device further includes a communication unit that communicates with an external communication device as one of the request acquisition units, and the predetermined function is a function related to the communication unit, and the control unit
- the permission request based on the permission request information received by the communication unit may be determined to be within the specified permission range, and the result may be transmitted to the communication unit.
- the control unit does not permit the execution of the predetermined function and performs biometric authentication again. You may request
- the portable terminal device further includes a condition storage unit that associates and stores a permission range with an authentication rate, and the control unit determines a permission range based on the association between the authentication rate and the permission range stored in the condition storage unit. You may specify.
- the control unit includes a main control unit that calculates the authentication rate, and a sub-control unit that determines whether a permission request based on permission request information received by the communication unit is within the specified permission range. Also good.
- the main control unit determines whether an authentication rate in the authentication has reached a minimum authentication value when authentication is performed in the biometric authentication unit, and if the authentication rate reaches the minimum authentication value, the sub-control May be controlled so that the sub-control unit is not activated when the minimum authentication value is not reached.
- the mobile terminal device may further include a billing storage unit that is managed by the sub-control unit and stores electronic money information, and the permission request information may be billing request information related to the electronic money information.
- an upper limit of a chargeable amount for the electronic money information may be set as the permission range.
- the upper limit of the charge permission may be set higher as the authentication rate is higher.
- the charging request information may include information indicating a charging category, and the condition storage unit may be set in association with a charging category that permits charging as the permission range.
- the portable terminal device further includes a display unit, and the sub-control unit determines whether the permission request information received by the communication unit is within a permission range specified based on the authentication rate. When it is determined that it is out of the permitted range, this is notified to the main control unit, and when the main control unit is notified from the sub control unit that it is out of the permitted range, the display unit is notified. You may display a payment impossible.
- the communication unit may perform magnetic field communication using electromagnetic waves.
- the mobile terminal device includes, as one of the request acquisition units, an operation unit that accepts an input, and a condition storage unit that stores an authentication rate in stages and associates a function that is permitted to be executed for each stage.
- the predetermined function is a function requested to be executed by the operation unit
- the control unit includes an authentication rate calculated based on an authentication process in the biometric authentication unit and the condition storage unit.
- the function that can be permitted to be executed according to the authentication rate is specified as the permission range
- the control unit is configured to execute the predetermined function requested to be executed based on the permission request information input by the operation unit. It may be determined whether it is within the specified permission range, and if it is within the specified permission range, execution of the predetermined function may be permitted.
- the mobile terminal device divides an authentication rate into a communication unit that communicates with an external communication device, and accesses the external device via the communication unit for each step.
- the information processing apparatus further includes a condition storage unit that associates and stores permissible access types, and the predetermined function is access executed by the communication unit to an external device, and the control unit is the biometric authentication unit.
- the authentication rate calculated based on the authentication process is compared with the condition storage unit, the access type that can be permitted by the authentication rate is specified as the permitted range, and the control unit is acquired by the communication unit. It is determined whether the access requested to be executed is within the specified permission range based on the permission request information. If the access is within the specified permission range, execution of the access is permitted. It may be.
- a communication permission determination method is a communication permission determination method for a mobile terminal device having a biometric authentication unit, the step of acquiring permission request information, and an authentication process in the biometric authentication unit. Performing the step of calculating the authentication rate, specifying the permission range based on the authentication rate, determining whether the acquired permission request information is within the permission range, and determining whether the permission range is within the permission range Outputting a result obtained.
- FIG. 1 It is a figure which shows an example of the electronic money management system structure to which the portable terminal device which concerns on embodiment of this invention is connected. It is a block diagram which shows an example of the internal structure of the portable terminal device which concerns on embodiment of this invention. It is a figure which shows an example of the data structure of the condition storage table which the portable terminal device which concerns on embodiment of this invention has. It is a figure which shows an example of the external appearance structure of the portable terminal device which concerns on embodiment of this invention. It is a flowchart which shows the payment process operation
- SYMBOLS 1 ... Mobile phone, 10 ... RFID part, 11 ... Main control part (authentication process part), 12 ... Memory
- FIG. 1 is a diagram showing an example of a system configuration of an electronic money management system to which a mobile terminal device according to an embodiment of the present invention is connected.
- FIG. 2 is a block diagram showing an internal configuration of the mobile terminal device according to the embodiment of the present invention.
- the mobile phone 1 is illustrated as a mobile terminal device.
- the mobile phone 1 uses the main control unit 11 as a control center, the RFID unit 10, the storage unit 12, the operation unit 13, the display unit 14, the public communication unit 15, and biological information.
- the collecting unit 16 is configured.
- the main control unit 11 comprehensively controls the overall operation of the mobile phone 1. That is, the main control unit 11 performs various processes of the mobile phone 1 (voice calls performed via a circuit switching network, creation and transmission / reception of e-mails, browsing of Internet websites, etc.) according to operations of the operation unit 13. The operation of each block described above (transmission and reception of signals in the communication unit 15, display of an image on the display unit 14, and fingerprint collection processing in the biological information collection unit 16) is controlled so as to be executed in an appropriate procedure.
- the main control unit 11 includes a computer (microprocessor) that executes processing based on a program (operating system, application program, etc.) stored in the storage unit 12, and the processing described above according to the procedure instructed in this program. Execute. That is, the main control unit 11 sequentially reads instruction codes from programs such as an operating system and application programs stored in the storage unit 12 and executes processing.
- the main control unit 11 also functions as a biometric authentication unit, which is collected by a biometric information collecting unit 16 to be described later, for example, a user's fingerprint information acquired and stored in a predetermined area of the storage unit 12 Collation with biometric information is performed, and an authentication rate is output as a result of fingerprint authentication.
- Fingerprint authentication reads several feature points from the collected fingerprints, determines how many of these feature points match the registered feature points, and defines a predefined recognition rate and The authentication rate is calculated by comparison. The feature points are analyzed based on the angle and direction of the most bent portion of the fingerprint line, the number of lines in a specific area, and the like.
- the main control unit 11 stores the contents in a predetermined area of the storage unit 12. It is stored in the condition storage table 120 to be assigned.
- An example of the data structure of the condition storage table 120 is shown in FIG. Details will be described later.
- the storage unit 12 stores various data used for various processes of the mobile phone 1.
- the storage unit 12 includes, for example, a computer program executed by the main control unit 11, an address book for managing personal information such as a telephone number and an e-mail address of a communication partner, a sound file for reproducing a ring tone and an alarm sound, Image file for standby screen, various setting data, temporary data used in the process of program, registered biometric information (fingerprint) used for collation of fingerprint collected by biometric information collection unit 16 To do.
- the storage unit 12 is further allocated and stored with a condition storage area (condition storage table 120) in which an upper limit of money that can be settled for each authentication rate or a charging category is set and registered.
- An example of the data structure of the condition storage table 120 is shown in FIG. In the example shown in FIG. 3, the upper limit of the amount that can be settled for each authentication rate is defined.
- the storage unit 12 includes, for example, a non-volatile storage device (non-volatile semiconductor memory, hard disk device, optical disk device, etc.), a randomly accessible storage device (eg, SRAM, DRAM), or the like.
- a non-volatile storage device non-volatile semiconductor memory, hard disk device, optical disk device, etc.
- a randomly accessible storage device eg, SRAM, DRAM
- the operation unit 13 includes keys to which various functions are assigned, such as a power key, a call key, a numeric key, a character key, a direction key, a determination key, and a call key.
- keys to which various functions are assigned such as a power key, a call key, a numeric key, a character key, a direction key, a determination key, and a call key.
- the display unit 14 is, for example, a liquid crystal display (LCD). And an organic EL display (OLED: Organic Light Emitted Diode), and displays an image corresponding to the video signal supplied from the main control unit 11.
- the display unit 14 is, for example, a telephone number of a transmission destination at the time of wireless transmission by the communication unit 15, a telephone number of a transmission source at the time of reception, contents of received mail or outgoing mail, date, time, remaining battery level, success / failure of transmission, standby Display the screen.
- the display unit 14 also displays a message when payment is not possible under the control of the main control unit 11.
- the public communication unit 15 captures a wireless communication system, performs wireless communication with a base station (not shown) connected to the communication network, and transmits and receives various data.
- the various data is voice data at the time of voice call, mail data at the time of mail transmission / reception, web page data at the time of browsing the web, or electronic money deposited from a charging terminal (not shown).
- the public communication unit 15 captures a plurality of communication systems and performs wireless communication with the communication server 2 of the carrier according to a communication protocol such as CDMA2000 1x (hereinafter simply referred to as 1x), EVDO, or wireless LAN. Do.
- 1x CDMA2000 1x
- EVDO wireless LAN.
- payment processing and transmission / reception of billing information are also performed with the electronic money management apparatus 4 connected via a communication network such as a communication server and WAN.
- the biological information collection unit 16 uses a sweep type fingerprint sensor that reads a fingerprint by tracing the sensor surface with a finger. Fingerprint collation is performed by the main control unit 11, and the main control unit 11 reads out some feature points from the fingerprint collected by the biological information collection unit 16 and is registered in the storage unit 12 among these feature points. An authentication rate is calculated by determining how many points match the current feature point (registered biometric information) and comparing it with a predefined recognition rate.
- the RFID unit 10 includes a sub storage unit 100, an interface unit 101, a sub control unit 102, and a wireless communication unit 103.
- the wireless communication unit 103 includes a loop antenna (not shown).
- the RFID unit 10 is one of magnetic field communication means using a part of the induced electromotive force using, for example, an electromagnetic wave of 13.65 MHz with a reader / writer device (not shown).
- the secondary storage unit 100 stores electronic money information that increases or decreases by charging information (settlement permission request information) coming from a reader / writer (R / W) such as a POS terminal (not shown) installed in a store or the like via the wireless communication unit 103.
- the interface unit 101 serves as an interface as a data communication path between the main control unit 11 and the RFID unit 10 (sub control unit 102).
- the sub-control unit 102 has a built-in CPU and has a function of performing charging processing on the sub-storage unit 100 based on charging information (settlement permission request information) received by the wireless communication unit 103 described later. Specifically, the sub-control unit 102 specifies an upper limit of money that can be settled or a charge category based on an authentication rate calculated as a result of biometric authentication in the main control unit 11. Further, based on the billing information (settlement permission request information) acquired by the wireless communication unit 103, it is determined whether it is within the upper limit of the amount that can be settled or whether it is the billing category that can be settled. If it does not match the upper limit of the amount that can be settled or does not match the billing category that can be settled, the wireless communicator 103 sends out billing impossible information.
- the sub-control unit 102 is activated when the result of biometric authentication in the main control unit 11 is equal to or higher than the minimum authentication rate, and can be settled based on the authentication rate when the sub-control unit 102 itself is activated. It has a function to specify the upper limit of money amount or the charge category. In addition, when the sub control unit 102 performs a payment process based on the billing information (payment permission request information) received by the wireless communication unit 103, the main control unit sets the upper limit on the amount that can be settled according to the authentication rate of biometric authentication. Alternatively, the accounting category is read from the condition storage table 120 stored in the storage unit 12.
- the sub-control unit 102 when performing the payment process based on the charging information (payment permission request information) received by the wireless communication unit 103, is within the upper limit range of the amount that can be settled based on the authentication rate, or the charging category It is configured to request the main control unit 11 to display on the display unit 14 that payment is not possible if the amount exceeds the upper limit of the amount or does not match the charge category.
- the wireless communication unit 103 is an example of a request acquisition unit.
- the wireless communication unit 103 is activated when power from a reader / writer (R / W) such as a POS terminal (not illustrated) installed in a store or the like is detected.
- Wireless communication is performed between the mobile phone 1 and a reader / writer such as a POS terminal.
- the sub storage unit 100, the interface unit 101, and the sub control unit 102 described above are powered by a battery (not shown) built in the mobile phone 1 in a state in which communication by the RFID unit 10 is possible (unlocked). Operates in response to supply.
- FIG. 4 is a diagram showing an example of the external structure of the mobile terminal device (here, mobile phone 1) according to the embodiment of the present invention.
- the mobile phone 1 is assumed to be a foldable mobile phone.
- the mobile phone 1 includes an upper housing 111, a lower housing 112, and a hinge portion 113.
- FIG. 4A is a diagram showing a state (open state) in which the mobile phone 1 is opened
- FIG. 4B is a diagram showing a folded state (closed state) of the mobile phone 1. .
- the display unit 14 is disposed on the upper casing 111 so as not to be exposed to the outside in the closed state of the mobile phone 1 shown in FIG. 4 (b).
- a sweep type fingerprint sensor 160 as the biological information collecting unit 16 is embedded outside the screen effective area of the display unit 14. By tracing the fingerprint sensor 160 with a finger, a fingerprint is collected and captured by the main control unit 11.
- the fingerprint sensor 160 may be provided at a position exposed to the outside in the closed state.
- the lower housing 112 is provided with the operation unit 13 on one surface that is not exposed to the outside in the closed state of the mobile phone 1 shown in FIG. 4B.
- the hinge portion 113 opens and closes the upper housing 111 and the lower housing 112, and allows the transition between the open state of the mobile phone 1 shown in FIG. 4 (a) and the closed state shown in FIG. 4 (b). It is a hinge mechanism which has. Note that the open / closed state of the mobile phone 1 is monitored by the main control unit 11, and the main control unit 11 can detect the closed state of the mobile phone 1.
- the closed state is detected by the main control unit 11 monitoring whether a detection switch (not shown) of the lower casing 112 is pressed by a projection (not shown) disposed on the upper casing 111, for example. (That is, if the detection switch is pressed, it is determined to be in the closed state, otherwise, it is determined to be in the open state).
- the open / close detection is not limited to the switch, and may be various sensors.
- the biometric information collection unit 16 may be, for example, a camera 41 that captures a user's face. In this case, the main control unit 11 determines facial feature elements.
- description will be made using an example of a fingerprint sensor.
- FIG. 5 is a flowchart showing the payment processing operation of the mobile terminal device according to the embodiment of the present invention.
- the flow and relationship of operations in the fingerprint sensor 160, the main control unit 11, and the sub-control unit 102 are shown.
- FIG. 6 is a figure which shows an example of the screen structure displayed on the display part 14 with the portable terminal device which concerns on embodiment of this invention.
- the user sets the authentication level for biometric authentication while the power source of the mobile phone 1 is activated. That is, when a setting request is made by the operation unit 13, the main control unit 11 displays a screen for setting a permission level for each authentication level as shown in FIG.
- the authorized payment amount is set to 2000 yen when the authentication rate is 20%
- the permitted payment amount is set to 8000 yen when the authentication rate is 40%
- the permitted payment amount is set to 12000 yen when the authentication rate is 60%.
- the principle is that payment can be made with a small amount even if the proof rate is low, and a high authentication rate is required for high-value settlement.
- Each value of the condition storage table may have a default value from the time of shipment from the factory without being set by the user.
- the authentication level setting request it is necessary to authenticate at least a regular user.
- the main control unit 11 prompts for password input or further fingerprint authentication, and displays an authentication level setting screen only when this authentication is passed.
- the previous setting is maintained.
- the sensing operation of the fingerprint sensor 160 as the biological information collecting unit 16 is started when the user performs a specific operation by the operation unit 13 in order to activate the payment process. Then, when the user traces the fingerprint sensor 160 with a specific finger (step S401 “Yes”), an interrupt is issued to the main control unit 11 (step S402), and the settlement process described below is started.
- the main control unit 11 is in a sleep state and waiting for receiving an interrupt for the electronic money settlement process.
- the main control unit 11 that has detected the interruption first sets a reception timer in order to perform fingerprint authentication (step S412).
- the fingerprint sensor 160 reads the fingerprint (step S403) and notifies the main control unit 11 of the completion of fingerprint reading (step S404), so that the main control unit 11 can recognize that the fingerprint is received (step S413). “Yes”). If the read completion interrupt cannot be received before the timer counts a predetermined time (step S413 “No”), the main control unit 11 transitions to a sleep interrupt waiting state.
- the fingerprint sensor 160 After reading the user's fingerprint, the fingerprint sensor 160 transmits the read fingerprint information to the main control unit 11 (step S405).
- the main control unit 11 that has received the fingerprint information (step S414) performs fingerprint authentication and calculates an authentication rate (step S415). Then, it is determined whether or not the calculated authentication rate exceeds 20% set as the lowest authentication rate in this example (step S416).
- the upper limit (limit amount) that can be settled set in accordance with the authentication rate is stored in the condition storage table 120 in advance by the user setting.
- step S416 “Yes”) the main control unit 11 turns on the power to the RFID unit 10 (step S417). Further, the main control unit 11 refers to the storage unit 12 and acquires data related to the limit amount according to the authentication rate from the condition storage table 120 (step S418), and the limit amount is stored in the main control unit 11 and the RFID unit. 10 is displayed on the display unit 14 together with the authentication rate (step S419). An example of the screen display at this time is shown in FIG. Further, the main control unit 11 releases the lock and sets it in a state where communication with the RFID unit 10 is possible (step S420). In addition, when it is determined that the authentication rate is 20% or less as a result of fingerprint authentication (step S416 “No”), the main control unit 11 transitions to a sleep interrupt waiting state.
- the RFID unit 10 is basically in a locked state in which the power is turned off.
- the sub-control unit 102 starts operating upon power-on by the main control unit 11 (step S431), sets a limit amount notified by the main control unit 11 (step S432), and unlocks by the main control unit 11 In response to the notification, the lock is released (step S433).
- the user can know that the payment preparation has been completed so that the payment within the limit amount is permitted. Thereafter, the user brings the wireless communication unit 103 of the portable terminal device close to a magnetic field transmission unit of a reader / writer (R / W) (not shown).
- step S434 the sub-control unit 102 acquires the charge amount associated with the purchase of the product from the reader / writer device through magnetic field communication via the wireless communication unit 103, and this amount and the limit amount previously set by the main control unit 11. Make a comparison. If the charge amount does not exceed the set limit amount, settlement is permitted, the charge storage unit subtracts the charge amount, and the wireless communication unit 103 notifies the reader / writer device of the completion of the amount subtraction process.
- the reader / writer device determines that the payment has been successfully completed by receiving this processing completion notification, and displays the payment completion on the display device or the like (step S435). If it is determined in step S434 that the amount of money that can be settled is equal to or greater than the upper limit of the amount that can be settled, the charge disable information is transmitted from the wireless communication unit 103 and displayed on the display device of the reader / writer (R / W) such as POS. The same result is notified to the main control unit 11 (step S435).
- the main control unit 11 is in a state of waiting for settlement from the sub control unit 102 after unlocking (step S420) (step S421), and the result of settlement received from the sub control unit 102 is displayed on the display unit 14. Display on the screen. If a notification indicating that payment is not possible is received, a message indicating that payment is not possible is displayed on the display unit 14 (step S422).
- FIG. 6C shows an example of a screen configuration displayed on the display unit 14 when it is determined that the amount is higher than the upper limit of the amount that can be settled.
- the main control unit 11 cuts off the power supply to the RFID unit 10 and locks the RFID unit 10 (step S423), and sets the fingerprint sensor 160 to the sleep state (step S424). Receiving this, the fingerprint sensor 160 executes sleep processing and shifts to a sleep detection waiting state (step S406).
- the mobile terminal device As described above, according to the mobile terminal device according to the embodiment of the present invention, it is possible to set a limit amount or a charging category according to the authentication rate, and the user can register the condition setting in the condition storage table 120. Since it is performed by operating the operation part 13, security control by a user's intention becomes possible. In addition, even if the authentication rate is low, payment can be made within the limit amount set by the user, so it can be used without delay when making relatively small payments at the ticket gates of stations, etc. You can use electronic money without doing it.
- the condition storage table 120 allocated and stored in a predetermined area of the storage unit 12 defines the upper limit of the amount that can be settled for each authentication rate.
- FIG. 7 shows an example of the condition storage table 120 'when a chargeable category is defined for each authentication rate.
- the billing information from the reader / writer is the billing at the time of purchasing a service such as the type of business type, entry / exit at a ticket gate at a transportation facility, or the billing at the time of purchasing goods at a store. Or the like, supplementary information (billing category information) related to billing is included.
- the sub-control unit 102 identifies the accounting category that can be settled based on the authentication rate by referring to the condition storage table 120 '. Then, the charging category information is extracted from the charging information (payment permission request information) acquired by the wireless communication unit 103 during the payment process, and it is determined whether or not the charging category is a payment category. If it does not match the billing category that can be settled, the non-billing information is transmitted from the wireless communication unit 103.
- the electronic money to be pre-deposited has been described.
- the present invention can also be applied to a credit system or the like charged later as a charging category.
- the mobile phone 1 incorporating the RFID unit 10 is illustrated as a portable terminal device, an RFID card for recording monetary value data and software for managing monetary value data are incorporated in a PC or the like to perform the same control. May be.
- the present invention is not limited to the cellular phone 1 and can be similarly applied to a case where it is installed in, for example, a PDA (Personal Digital Assistants), an electronic notebook, a game machine, or a notebook PC having the same configuration.
- PDA Personal Digital Assistants
- the limit amount corresponding to the authentication rate is stored in the condition storage table 120 in advance, but the condition storage table 120 may not be provided.
- the limit amount is obtained by calculation based on the authentication rate. For example, it is conceivable to calculate the limit amount by multiplying the authentication rate by a predetermined value (for example, 10,000 yen).
- the target that is restricted in stages depending on the authentication rate may be applied in addition to billing.
- a facility may be considered in which a reader / writer is installed in advance at the entrance to a building such as a company or the entrance of each room, and the entrance door is unlocked only when authentication by the RFID unit 10 is successful.
- a reader / writer is installed in advance at the entrance to a building such as a company or the entrance of each room, and the entrance door is unlocked only when authentication by the RFID unit 10 is successful.
- it is desirable to keep the security level of the room where important documents are stored high, but there may be a case where only a minimum security level is required if it is about the entrance of a building.
- the present invention is also effective in such a case.
- the reader / writer installed in each door is set to be capable of transmitting door type information using a magnetic field as a carrier wave.
- the door which can be passed for every authentication level is preset, and it registers in the condition storage table 120.
- the portable terminal device collects biometric information such as a fingerprint in advance by the biometric information collecting unit before the RFID unit 10 is held over the reader / writer for each door, and the main control unit 11 determines the authentication level.
- biometric information such as a fingerprint
- the main control unit 11 determines the authentication level.
- the RFID unit 10 is not unlocked, so the door is not unlocked.
- the level authenticated by the condition storage table 120 is recognized, and up to which level the door can be unlocked is set in the main control unit 11 and the sub storage unit 102.
- the wireless communication unit 103 detects a magnetic field
- the sub-control unit 102 recognizes the start of communication, and acquires door type information sent from the reader / writer.
- the sub-control unit 102 compares the door unlockable level set by the main control unit 11 with the acquired type of door, and if it is unlockable level, the sub-control unit 102 reads the unlock instruction via the wireless communication unit 103. Send to writer. The reader / writer that has received this unlocks the corresponding door.
- the present invention can perform the minimum entrance restriction while ensuring the convenience as much as possible, and in addition, the entrance to an important room can be regulated at a high level. .
- a camera for performing face authentication composed of photoelectric conversion elements such as CCD (Charge Coupled Device) and CMOS (Complementary Metal Oxide Semiconductor) image sensors and their control circuits on the mobile phone 1.
- CCD Charge Coupled Device
- CMOS Complementary Metal Oxide Semiconductor
- FIGS. 4 (a) and 4 (b) in the state of operating the housing (that is, in the open state, the operator takes the housing and puts the line of sight toward the display unit 14), It is provided in the casing in a state where the optical axis is set toward the face (for example, a position indicated by numeral 41 in FIG. 4A).
- biometric authentication rate has been used to describe the degree of coincidence of the feature elements between the input biometric information and the biometric information registered in advance. I just need it. That is, it is not limited to the case where 100% is set only when all of the feature elements are matched, and the percentage is calculated based on the number of matches based on this. For example, the determination may be made only by the number of feature elements that match, or the authentication rate may be determined by the degree of the number of points that match the total number of feature elements.
- the accounting request received by the RFID unit 10 is exemplified as the permission request information, but may be other.
- the permission request information is a communication permission request received by infrared communication with another device using an infrared communication unit (not shown), or when access is made to a server device or the like by a user operation. Alternatively, it may be a communication permission request returned to the user.
- the permission request is a communication permission request
- the security level set according to the writing / reading permission, the importance of the information to be read, and the information acquisition for the partner device communicating by the infrared communication unit or the public communication unit 15 The condition is stored in the condition storage table 120 in the storage unit 12 in advance in association with the biometric authentication rates classified in stages in association with information such as the size of the fee required.
- the main control unit 11 specifies the type of information that requires permission included in the acquired communication permission request, and then specifies the specified information.
- the condition permission table 120 corresponding to the type is referred to. Then, it is determined which level in the condition storage table 120 the biometric authentication rate acquired by the method described above corresponds to, and whether or not the type of communication can be permitted is determined. If it determines with it being in the level which can be permitted, the main control part 11 will return communication permission with respect to the other party apparatus, and will be able to receive the user input for communication start.
- the request acquisition unit is the public communication unit 15 or an infrared communication unit (not shown), and the permission range is specified by the main control unit 11 as described above.
- the access input itself by the user operation for the access-restricted function in the mobile terminal device without communication may be the permission request information.
- an access permission level for each function is set in advance, and stored in the condition storage table 120 in the storage unit 12 in association with the biometric authentication rates divided in stages. .
- the main control unit 11 determines a function accessed by the operation.
- functions that restrict access include a key lock release function that disables key operation input, an address book browsing function, a data browsing function such as photo data stored inside, and an external communication function. Is included.
- the main control unit 11 identifies the access permission level set for the function with reference to the condition permission table 120. . Next, it is determined which level in the condition storage table 120 the biometric authentication rate acquired by the method already described corresponds to, and whether or not the specified access permission level is satisfied.
- the main control unit 11 determines that the level is at an allowable level, the main control unit 11 executes the function requested to be accessed and displays a corresponding screen on the display unit 14. On the other hand, if the level is not permitted, the requested function is not executed and the display is prompted to input biometric information again, or the message “access is not possible” is displayed and the power is turned off. Prohibit unauthorized access to the function.
- the request acquisition unit is the operation unit 13, and the permission range is specified by the main control unit 11 as described above.
- the biometric information may be input after obtaining the permission request information or before obtaining the permission request information.
- the biometric information collection unit 16 is activated to enter the biometric information input acceptance state, and the biometric information is input to the display unit 14. It is preferable to display a message prompting.
- the biometric information is input and the authentication rate is calculated, the calculated authentication rate is held until the power is turned off next time or until no user operation occurs for a while. It may be used as a determination material each time a request is acquired.
- the functions of the respective constituent blocks included in the mobile terminal device according to the embodiment of the present invention shown in FIG. 2 may be realized entirely by software, or at least a part thereof may be realized by hardware.
- data processing in the main control unit 11 and the sub control unit 102 of the RFID unit 10 may be realized on a computer by one or more programs, and at least a part thereof may be realized by hardware. .
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
Description
また、最近、このRFIDタグを携帯電話に内蔵させることで、携帯電話を切符や財布の代わりに使う試みもなされるようになった。
例えば、指紋認証デバイスを搭載し、指紋認証に合格した場合にのみ電子マネー決済を許可する携帯電話が知られている(例えば、特開2002-82914号公報参照)。
すなわち、主制御部11は、携帯電話1の各種処理(回線交換網を介して行われる音声通話、電子メールの作成と送受信、インターネットのWebサイトの閲覧など)が操作部13の操作に応じて適切な手順で実行されるように、上述した各ブロックの動作(通信部15における信号の送受信、表示部14における画像の表示、生体情報採取部16における指紋採取処理)を制御する。
主制御部11は、記憶部12に格納されるプログラム(オペレーティングシステム、アプリケーションプログラム等)に基づいて処理を実行するコンピュータ(マイクロプロセッサ)を備えており、このプログラムにおいて指示された手順に従って上述した処理を実行する。
すなわち、主制御部11は、記憶部12に格納されるオペレーティングシステムやアプリケーションプログラム等のプログラムから命令コードを順次読み込んで処理を実行する。
指紋認証は、採取した指紋から幾つかの特徴点を読み出し、これらの特徴点の中で登録されている特徴点と合致している点がいくつあるかを判定し、予め定義された認識率と比較することで認証率が計算される。特徴点は、指紋の線の中で最も曲がっている部分の角度や方向、特定のエリアの中にある線の数等が分析の対象になる。
また、主制御部11は、操作部13により、認証率ごとに決済可能な金額上限、もしくは認証率ごとに決済可能な課金カテゴリが指定されると、その内容を記憶部12の所定の領域に割当てられる条件記憶テーブル120に記憶させる。条件記憶テーブル120のデータ構造の一例は図3に示されている。詳細は後述する。
記憶部12は、例えば、主制御部11が実行するコンピュータのプログラム、通信相手の電話番号や電子メールアドレス等の個人情報を管理するアドレス帳、着信音やアラーム音を再生するための音声ファイル、待ち受け画面用の画像ファイル、各種の設定データ、プログラムの処理過程で利用される一時的なデータ、生体情報採取部16で採取された指紋の照合に使用される登録生体情報(指紋)等を記憶する。
記憶部12は、更に、認証率ごとに決済可能な金額上限もしくは課金カテゴリが設定登録される条件記憶領域(条件記憶テーブル120)が割り付けられ記憶される。条件記憶テーブル120のデータ構造の一例は図3に示されている。図3に示す例では、認証率ごとに決済可能な金額上限が定義されている。
や有機ELディスプレイ(OLED:Organic Light Emitted Diode)を用いて構成され
ており、主制御部11から供給される映像信号に応じた画像を表示する。
表示部14は、例えば、通信部15による無線発信時における発信先の電話番号、着信時における発信元の電話番号、受信メールや送信メールの内容、日付、時刻、電池残量、発信成否、待ち受け画面等を表示する。
また、表示部14は、主制御部11による制御の下、決済不可時のメッセージ表示も行う。
公衆通信部15は、複数の通信システムを捕捉し、例えば、CDMA2000 1x(以下、単に1xという)やEVDO、あるいは無線LANなどの通信プロトコルにしたがい、キャリアの通信サーバ2との間で無線通信を行う。また、通信サーバおよびWAN等の通信網経由で接続される電子マネー管理装置4との間で入金処理や課金情報についての送受信も行う。
指紋の照合は、主制御部11で行われ、主制御部11は、生体情報採取部16において採取した指紋から幾つかの特徴点を読み出し、これらの特徴点の中で記憶部12に登録されている特徴点(登録生体情報)と合致している点がいくつあるか否かを判定し、予め定義された認識率と比較することで認証率を計算する。
具体的に、副制御部102は、主制御部11での生体認証の結果計算される認証率に基づいて、決済可能な金額上限あるいは課金カテゴリを特定する。 また、無線通信部103により取得した課金情報(決済許可要求情報)に基づいて、決済可能な金額上限内であるか否かもしくは決済可能な課金カテゴリで有るか否かを判定する。そして、決済可能な金額上限以上もしくは決済可能な課金カデゴリに合致しなければ課金不可情報を無線通信部103から送出する。
また、副制御部102が無線通信部103により受信した課金情報(決済許可要求情報)に基づいて決済処理を行う際に、主制御部は、生体認証の認証率に応じた決済可能な金額上限もしくは課金カテゴリを記憶部12に格納された条件記憶テーブル120から読み出す。
また、副制御部102は、無線通信部103により受信した課金情報(決済許可要求情報)に基づいて決済処理を行う際に、認証率に基づいた決済可能な金額上限範囲内に、もしくは課金カテゴリに合致するか否かを判定し、金額上限以上、もしくは課金カテゴリに合致しない場合には、表示部14に決済不可を表示させるように主制御部11に要求するように構成される。
なお、上記した副記憶部100と、インタフェース部101と、副制御部102とは、RFID部10による通信が可能な状態(ロックが解除)において、携帯電話1が内蔵する不図示のバッテリにより電力供給を受け動作するものである。
図4に示されるように、携帯電話1は、折り畳み型の携帯電話を想定している。図4に示されるように、携帯電話1は、上部筐体111と、下部筐体112と、ヒンジ部113とを有する。
ヒンジ部113は、上部筐体111と下部筐体112とを開閉し、図4(a)に示す携帯電話1の開状態と図4(b)に示す閉状態とを遷移可能とする回転軸を有するヒンジ機構である。
なお、携帯電話1の開状態/閉状態は、主制御部11により監視されており、主制御部11は携帯電話1の閉状態を検出することが可能である。具体的には、例えば上部筐体111に配置した図示しない突起部により、下部筐体112の図示しない検出スイッチが押しているか否かを主制御部11が監視することにより閉状態を検出している(すなわち検出スイッチが押下されていれば閉状態、そうでなければ開状態と判定)。なお、開閉検出は、スイッチに限らず、各種センサであってもよい。
また、生体情報採取部16としては例えばユーザの顔を撮影するカメラ41でも良い。この場合は顔の特徴要素を主制御部11にて判定することになる。以下、指紋センサの例を用いて説明する。
まず、ユーザは携帯電話1の電源を起動させた状態で、生体認証の認証レベル設定を行う。すなわち、主制御部11は、操作部13により設定要求が行われると図6(a)に示すように、認証のレベルごとの許可レベルを設定する画面を表示する。この例では、ユーザ操作により、認証率20%では決済許可金額を2000円まで、認証率40%では決済許可金額を8000円まで、詔証率60%では決済許可金額を12000円までと設定している。この設定に関しては基本的に、詔証率が低くとも小額ならば決済でき、高額決済には高い認証率を要することを原則としている。このように金額と認証率の対応付けが完了したことを操作部13により指示すると、主制御部11は指定された金額と認証率の対応関係に基づき、図3に示した条件記憶テーブル120を更新する。この条件記憶テーブルのそれぞれの値は、ユーザが設定せずとも、予め工場出荷時からデフォルト値を有していても良い。
また、認証レベルの設定要求に関しては、少なくとも正規ユーザの認証を行う必要がある。操作部13により設定要求がなされると、主制御部11はパスワード入力あるいは更なる指紋認証を促し、この認証に合格した場合にのみ認証レベルの設定画面を表示させることが好ましい。ここで、不合格の場合には以前の設定が維持されこととする。
以下、図5に示すフローチャート、図6に示す画面構成の一例を参照しながら、本発明の実施の形態に係る携帯端末装置の決済処理の動作について説明する。
割り込みを検出した主制御部11は(ステップS411“Yes”)、指紋認証を行うためにまずは受信タイマの設定を行う(ステップS412)。そして、指紋センサ160が指紋を読み取り(ステップS403)、指紋読取り完了を主制御部11に通知することで(ステップS404)、主制御部11は、その指紋を受信することを認識できる(ステップS413“Yes”)。なお、タイマが所定の時間を計時するまでに読取り完了割り込みを受信できなかった場合(ステップS413“No”)、主制御部11は、スリープ割り込み待ち状態に遷移する。
そして、計算された認証率が、この例において最低の認証率として設定される20%を超えているか否かを判定する(ステップS416)。
なお、認証率に対応して設定される決済可能な金額上限(制限額)は、ユーザ設定により予め条件記憶テーブル120に記憶されてあることは上記したとおりである。
主制御部11は、更に、記憶部12を参照して条件記憶テーブル120から認証率に応じた制限金額に関するデータを取得し(ステップS418)、その制限金額を主制御部11内、およびRFID部10に設定して表示部14に認証率とともに画面表示する(ステップS419)。
このときの画面表示の一例が、図6(b)に示されている。また、主制御部11は、ロックを解除してRFID部10と交信可能な状態に設定する(ステップS420)。なお、主制御部11は、指紋認証の結果、認証率が20%以下であると判定された場合(ステップS416“No”)、スリープ割り込み待ち状態に遷移する。
ユーザは、図6(b)に示される画面を確認することにより、制限金額内での決済が許可されるよう、決済準備が完了したことを知ることができる。
その後、ユーザは不図示のPOS等リーダライタ(R/W)の磁界送出部に、携帯端末装置の無線通信部103を近接させる。
なお、ステップS434において、決済可能な金額上限以上であると判定された場合は、課金不可情報を無線通信部103から送出して、POS等リーダライタ(R/W)の表示デバイスに表示するとともに、主制御部11に対しても同様の結果通知を行う(ステップS435)。
仮に、決済不可の通知を受信した場合は、表示部14に、決済不可であることを示すメッセージを表示する(ステップS422)。
決済可能な金額上限以上であると判定された場合に表示部14に表示される画面構成の一例が図6(c)に示されている。
続いて、主制御部11は、RFID部10に対する電源投入を切断するとともにRFID部10にロックをかけ(ステップS423)、指紋センサ160をスリープ状態に設定する(ステップS424)。これを受けた指紋センサ160は、スリープ処理を実行してスリープ検出待ち状態に移行する(ステップS406)。
また、認証率が低い状態でもユーザが設定した制限金額内であれば決済が可能となり、このため、駅の改札口等での比較的小額決済時には滞りなく利用でき、したがって、利便性を犠牲にすることなく電子マネーを利用できる。
また、携帯端末装置として、RFID部10を内蔵する携帯電話1のみ例示したが、貨幣価値データを記録するRFIDカードと、貨幣価値データの管理を行うソフトウェアをPC等に組み込んで同様の制御を行ってもよい。また、携帯電話1に限らず、同様の構成を有する、例えば、PDA(Personal Digital Assistants)、や電子手帳、ゲーム機、あるいはノートPC等に搭載される場合も同様に適用が可能である。
このような施設に入場する場合、重要文書が保管される部屋のセキュリティレベルは高くしておきたいが、建物の入り口程度ならば最低限のセキュリティレベルさえ確保すれば良い、というケースも有り得る。この様な場合にも本発明は有効である。
このように構成することにより、本発明は、極力利便性を確保しつつも最低限の入場制限を行うことが出来、その上、重要な部屋への入場は高いレベルでセキュリティ規制することが出来る。
この場合、CCD(Charge Coupled Device)やCMOS(Complementary Metal Oxide Semiconductor)イメージセンサ等の光電変換素子とその制御回路等により構成される顔認証を行うためのカメラを携帯電話1に搭載する必要があり、例えば、図4(a)(b)において、筐体を操作する状態(すなわち開状態として、操作者が筐体を手に取り、表示部14に視線を向けた姿勢)において、操作者の顔に向けて光軸が設定される状態で筐体に設けられる(例えば、図4(a)に番号41で示す位置)。
また、以上の説明において、生体認証の認証率、という用語を用いて説明してきたが、これは、入力された生体情報と、予め登録しておいた生体情報との特徴要素の一致の度合いであれば良い。すなわち、特徴要素のうち全てが一致したときのみを100%とし、これを基準として一致した数に基づいてパーセント算出したものに限らない。例えば、一致した特長要素の数だけで判断しても良いし、特徴要素の全数に対して一致した箇所の数の度合いをもって認証率としても良い。
許可要求が通信許可要求の場合には、赤外線通信部あるいは公衆通信部15により通信する相手装置に対する、書込み/読み出しの許可、読み出しする情報の重要度に応じて設定されたセキュリティレベル、情報取得に要する料金の大きさなどの情報に対応付けて、段階的にレベル分けした生体認証率に予め対応付けて記憶部12内の条件記憶テーブル120に記憶しておく。
また、生体情報の入力は、許可要求情報を取得した後に行なっても、許可要求情報を取得する前に行なっても良い。例えば、許可要求情報を取得する前に行う場合には、携帯端末装置の電源起動直後に、生体情報採取部16を起動して生体情報の入力受付状態とするとともに、表示部14に生体情報入力を促す表示をすることが好ましい。そして、生体情報が入力されて認証率が計算されると、次に電源オフされるまで、あるいはしばらくユーザ操作が生じない状態になるまでの間、計算された認証率を保持しておき、許可要求を取得する都度判定材料として用いてもよい。
例えば、主制御部11、RFID部10の副制御部102におけるデータ処理は、1または複数のプログラムによりコンピュータ上で実現してもよく、また、その少なくとも一部をハードウェアで実現してもよい。
本出願は、2008年1月30日出願の日本特許出願・出願番号2008-019975に基づくものであり、その内容はここに参照として取り込まれる。
Claims (16)
- 生体情報に基づき認証処理を行う生体認証部と、
許可要求情報を取得する要求取得部と、
前記要求取得部にて取得した前記許可要求情報に応じて所定の機能を制御する制御部と、を備え、
前記制御部は、前記生体認証部での認証処理に基づき算出される認証率に応じて許可範囲を特定し、前記要求取得部により取得された許可要求情報に基づく許可要求が前記特定された許可範囲内である場合には、前記所定の機能の実行を許容する
携帯端末装置。 - 前記要求取得部の一つとして、外部通信機器と通信を行う通信部を更に備え、
前記所定の機能は、前記通信部に係る機能であって、
前記制御部は、前記通信部により受信した許可要求情報に基づく許可要求が、前記特定された許可範囲内かどうか判定し、その結果を前記通信部に送出させる
請求項1に記載の携帯端末装置。 - 前記制御部は、前記要求取得部により取得された許可要求情報に基づく許可要求が前記特定された許可範囲外である場合には、前記所定の機能の実行を許容せず、再度生体認証部への生体情報の入力を要求する
請求項1に記載の携帯端末装置。 - 認証率に許可範囲を対応付けて記憶する条件記憶部を更に備え、
前記制御部は前記条件記憶部に記憶された認証率と許可範囲の対応付けに基づき、許可範囲を特定する
請求項1に記載の携帯端末装置。 - 前記制御部は、前記認証率を計算する主制御部と、前記通信部により受信した許可要求情報に基づく許可要求が前記特定された許可範囲内かどうかを判定する副制御部とを有する
請求項2に記載の携帯端末装置。 - 前記主制御部は、前記生体認証部での認証が行われると当該認証での認証率が最低認証値に達しているかどうかを判定し、前記最低認証値に達する場合には前記副制御部を起動させ、前記最低認証値に至らない場合には前記副制御部を起動させないよう制御する
請求項5に記載の携帯端末装置。 - 認証率に許可範囲を対応付けて記憶する条件記憶部を更に備え、
前記制御部は前記条件記憶部に記憶された認証率と許可範囲の対応付けに基づき、許可範囲を特定する
請求項6に記載の携帯端末装置。 - 前記副制御部により管理され、電子マネー情報を記憶する課金記憶部をさらに備え、
前記許可要求情報は、前記電子マネー情報に関する課金要求情報である
請求項7に記載の携帯端末装置。 - 前記条件記憶部には、前記許可範囲として前記電子マネー情報に対する課金の許可金額の上限が設定されている
請求項8に記載の携帯端末装置。 - 前記条件記憶部には、認証率が高いほど課金許可の上限金額を高く設定されている
請求項9に記載の携帯端末装置。 - 前記課金要求情報には、課金カテゴリを示す情報が含まれており、
前記条件記憶部には、前記許可範囲として課金を許可する課金カテゴリが対応付けられて設定されている
請求項8に記載の携帯端末装置。 - 表示部を更に備え、
前記副制御部は、前記通信部により受信した許可要求情報が、前記認証率に基づいて特定された許可範囲内かどうかを判定した際に、許可範囲外であると判定した際には、これを前記主制御部に通知し、
前記主制御部は、前記副制御部から許可範囲外であることが通知されると、前記表示部に決済不可を表示させる
請求項8に記載の携帯端末装置。 - 前記通信部は、電磁波を用いた磁界通信を行う
請求項5に記載の携帯端末装置。 - 前記要求取得部の一つとして、入力を受け付ける操作部と、
認証率を段階分けし、当該段階ごとに実行を許可する機能を対応付けて記憶する条件記憶部を更に備え、
前記所定の機能は、前記操作部により実行が要求された機能であって、
前記制御部は、前記生体認証部での認証処理に基づき算出される認証率と前記条件記憶部とを比較し、当該認証率により実行許可することの出来る機能を前記許可範囲として特定し、
前記制御部は、前記操作部により入力された許可要求情報に基づいて実行要求される所定の機能が、前記特定された許可範囲内かどうか判定し、前記特定された許可範囲内である場合には、当該所定の機能の実行を許容する
請求項1に記載の携帯端末装置。 - 前記要求取得部の一つとして、外部通信機器と通信を行う通信部と、
認証率を段階分けし、当該段階ごとに、外部装置に対する前記通信部を介したアクセス許可可能なアクセス種別を対応付けて記憶する条件記憶部を更に備え、
前記所定の機能は、前記通信部により外部装置に対して実行するアクセスであって、
前記制御部は、前記生体認証部での認証処理に基づき算出される認証率と前記条件記憶部とを比較し、当該認証率により許可することの出来るアクセス種別を前記許可範囲として特定し、
前記制御部は、前記通信部により取得された許可要求情報に基づいて実行要求されるアクセスが、前記特定された許可範囲内かどうか判定し、前記特定された許可範囲内である場合には、当該アクセスの実行を許容する
請求項1に記載の携帯端末装置。 - 生体認証部を有する携帯端末装置の通信許可判定方法であって、
許可要求情報を取得するステップと、
前記生体認証部にて認証処理を行い、その認証率を計算するステップと、
前記認証率により許可範囲を特定するステップと、
取得した許可要求情報が、前記許可範囲内かどうかを判定するステップと、
前記許可範囲内かどうかを判定した結果を出力するステップと、
を有する携帯端末装置の通信許可判定方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009551627A JP5479916B2 (ja) | 2008-01-30 | 2009-01-30 | 携帯端末装置およびその制御方法 |
EP09706040.4A EP2239927A4 (en) | 2008-01-30 | 2009-01-30 | PORTABLE TERMINAL DEVICE AND COMMUNICATION AUTHORIZATION JUDGING METHOD OF THIS DEVICE |
US12/865,215 US9098838B2 (en) | 2008-01-30 | 2009-01-30 | Portable terminal device and method of determining communication permission thereof |
KR1020107017215A KR101229604B1 (ko) | 2008-01-30 | 2009-01-30 | 휴대 단말 장치 및 그 통신 허가 판정 방법 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008-019975 | 2008-01-30 | ||
JP2008019975 | 2008-01-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009096566A1 true WO2009096566A1 (ja) | 2009-08-06 |
Family
ID=40912909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2009/051662 WO2009096566A1 (ja) | 2008-01-30 | 2009-01-30 | 携帯端末装置およびその通信許可判定方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9098838B2 (ja) |
EP (1) | EP2239927A4 (ja) |
JP (1) | JP5479916B2 (ja) |
KR (1) | KR101229604B1 (ja) |
WO (1) | WO2009096566A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018005608A (ja) * | 2016-07-04 | 2018-01-11 | 株式会社東芝 | Icカード、携帯可能電子装置及び情報処理方法 |
JP2019154573A (ja) * | 2018-03-08 | 2019-09-19 | テルモ株式会社 | 生体情報システム |
JP2019160346A (ja) * | 2014-08-04 | 2019-09-19 | 株式会社ニコン | 電子機器 |
JP2022052018A (ja) * | 2020-09-23 | 2022-04-04 | 株式会社東芝 | 情報処理装置 |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100253470A1 (en) * | 2007-10-22 | 2010-10-07 | Microlatch Pty Ltd | Transmitter For Transmitting A Secure Access Signal |
US8126882B2 (en) | 2007-12-12 | 2012-02-28 | Google Inc. | Credibility of an author of online content |
JP5772069B2 (ja) * | 2011-03-04 | 2015-09-02 | ソニー株式会社 | 情報処理装置、情報処理方法およびプログラム |
WO2013073520A1 (ja) * | 2011-11-14 | 2013-05-23 | 株式会社エヌ・ティ・ティ・ドコモ | 携帯端末、電子貨幣使用制限システム、記録媒体 |
US11556915B2 (en) | 2013-08-08 | 2023-01-17 | Apple Inc. | Low power mode for payment transactions |
US9603090B2 (en) * | 2013-08-08 | 2017-03-21 | Apple Inc. | Management of near field communications using low power modes of an electronic device |
US10198726B2 (en) | 2013-08-08 | 2019-02-05 | Apple Inc. | Low power mode for payment transactions |
KR102208631B1 (ko) * | 2014-02-19 | 2021-01-28 | 삼성전자 주식회사 | 전자 장치의 보안 정보 입출력 방법 및 이를 사용하는 전자 장치 |
US11843597B2 (en) * | 2016-05-18 | 2023-12-12 | Vercrio, Inc. | Automated scalable identity-proofing and authentication process |
US10148649B2 (en) * | 2016-05-18 | 2018-12-04 | Vercrio, Inc. | Automated scalable identity-proofing and authentication process |
US11080379B2 (en) * | 2019-02-13 | 2021-08-03 | International Business Machines Corporation | User authentication |
CN111107219B (zh) * | 2019-11-20 | 2021-06-22 | 维沃移动通信有限公司 | 一种控制方法和电子设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002082914A (ja) | 2000-09-08 | 2002-03-22 | Nippon Telegraph & Telephone East Corp | 本人認証装置及び本人認証方法 |
JP2002207948A (ja) * | 2001-01-10 | 2002-07-26 | Matsushita Electric Ind Co Ltd | 生体認証による決済処理方法、決済処理装置及びシステム |
JP2007048118A (ja) * | 2005-08-11 | 2007-02-22 | Oki Electric Ind Co Ltd | 自動取引装置および自動取引システム |
JP2007265200A (ja) * | 2006-03-29 | 2007-10-11 | Nec Corp | 携帯端末装置及びプログラム |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5648648A (en) * | 1996-02-05 | 1997-07-15 | Finger Power, Inc. | Personal identification system for use with fingerprint data in secured transactions |
US7003495B1 (en) * | 1999-09-28 | 2006-02-21 | Chameleon Network Inc. | Portable electronic authorization system and method |
US6446045B1 (en) * | 2000-01-10 | 2002-09-03 | Lucinda Stone | Method for using computers to facilitate and control the creating of a plurality of functions |
US20040236699A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for hand geometry recognition biometrics on a fob |
US6972660B1 (en) * | 2002-05-15 | 2005-12-06 | Lifecardid, Inc. | System and method for using biometric data for providing identification, security, access and access records |
RU2005138121A (ru) * | 2003-06-16 | 2007-07-27 | Ю-Ар-Ю Тэкнолоджи, Инкорпорейтед (Us) | Система и способ создания устройств с единым набором учетной информации, адаптированных к обработке биометрических данных, а также система и способ применения таких устройств |
WO2006035421A2 (en) * | 2004-09-28 | 2006-04-06 | Fibiotech-Advanced Technologies Ltd. | Enhanced electronic financial system |
KR100747446B1 (ko) * | 2005-03-07 | 2007-08-09 | 엘지전자 주식회사 | 휴대단말기의 지문인식 장치 및 방법 |
US7536304B2 (en) * | 2005-05-27 | 2009-05-19 | Porticus, Inc. | Method and system for bio-metric voice print authentication |
JP2009501975A (ja) * | 2005-07-15 | 2009-01-22 | レボリューション マネー,インコーポレイテッド | 不正検出規約をユーザが選択するシステム及び方法 |
US20070131759A1 (en) * | 2005-12-14 | 2007-06-14 | Cox Mark A | Smartcard and magnetic stripe emulator with biometric authentication |
EP2126856A4 (en) * | 2006-12-18 | 2012-08-08 | Fundamo Proprietary Ltd | PORTABLE PAYMENT DEVICE |
-
2009
- 2009-01-30 EP EP09706040.4A patent/EP2239927A4/en not_active Withdrawn
- 2009-01-30 WO PCT/JP2009/051662 patent/WO2009096566A1/ja active Application Filing
- 2009-01-30 JP JP2009551627A patent/JP5479916B2/ja not_active Expired - Fee Related
- 2009-01-30 US US12/865,215 patent/US9098838B2/en active Active
- 2009-01-30 KR KR1020107017215A patent/KR101229604B1/ko active IP Right Grant
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002082914A (ja) | 2000-09-08 | 2002-03-22 | Nippon Telegraph & Telephone East Corp | 本人認証装置及び本人認証方法 |
JP2002207948A (ja) * | 2001-01-10 | 2002-07-26 | Matsushita Electric Ind Co Ltd | 生体認証による決済処理方法、決済処理装置及びシステム |
JP2007048118A (ja) * | 2005-08-11 | 2007-02-22 | Oki Electric Ind Co Ltd | 自動取引装置および自動取引システム |
JP2007265200A (ja) * | 2006-03-29 | 2007-10-11 | Nec Corp | 携帯端末装置及びプログラム |
Non-Patent Citations (1)
Title |
---|
See also references of EP2239927A4 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019160346A (ja) * | 2014-08-04 | 2019-09-19 | 株式会社ニコン | 電子機器 |
JP2018005608A (ja) * | 2016-07-04 | 2018-01-11 | 株式会社東芝 | Icカード、携帯可能電子装置及び情報処理方法 |
JP2019154573A (ja) * | 2018-03-08 | 2019-09-19 | テルモ株式会社 | 生体情報システム |
JP7005391B2 (ja) | 2018-03-08 | 2022-01-21 | テルモ株式会社 | 生体情報システム |
JP2022052018A (ja) * | 2020-09-23 | 2022-04-04 | 株式会社東芝 | 情報処理装置 |
JP7383589B2 (ja) | 2020-09-23 | 2023-11-20 | 株式会社東芝 | 情報処理装置 |
Also Published As
Publication number | Publication date |
---|---|
US20100332392A1 (en) | 2010-12-30 |
US9098838B2 (en) | 2015-08-04 |
EP2239927A4 (en) | 2016-06-08 |
KR20100106561A (ko) | 2010-10-01 |
JP5479916B2 (ja) | 2014-04-23 |
KR101229604B1 (ko) | 2013-02-04 |
EP2239927A1 (en) | 2010-10-13 |
JPWO2009096566A1 (ja) | 2011-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5479916B2 (ja) | 携帯端末装置およびその制御方法 | |
US10467832B2 (en) | Configurable digital badge holder | |
JP4711039B2 (ja) | 複数の機能を有する多目的携帯端末の安全性確保の方法 | |
EP1710692B1 (en) | Secure device, terminal device, gate device, and device | |
US7647638B2 (en) | Apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use | |
US8473748B2 (en) | Mobile device-based authentication | |
JP2006338480A (ja) | 処理装置 | |
JP2005244589A (ja) | 使用制限機能付携帯電話機および該機を使用制限する方法 | |
JP5575487B2 (ja) | 携帯端末装置、課金管理部品および携帯端末の制御プログラム | |
WO2006121310A1 (en) | Portable usb memory stick having payment function, and payment system using usb memory stick, and method therefor | |
US20120102565A1 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
JP2005122266A (ja) | カード利用取引処理システム及び方法並びにカード利用取引処理用プログラム | |
US20120271764A1 (en) | Financial trade method and trade system using mobile device for the same | |
JP2003187170A (ja) | 携帯電話利用の認証処理システムおよび認証処理方法 | |
JP4032358B2 (ja) | Rfid認証システムおよびrfid認証方法およびそのためのプログラム | |
US20060102715A1 (en) | Process synchronous proving system and process synchronous proving method | |
JP2005301737A (ja) | 電子マネー入金機及びその認証方法 | |
JP2006058970A (ja) | Icカードとそのユーザ認証方法及びプログラム、icカード付き携帯電話、icカード付き携帯電話システム | |
WO2001082093A1 (fr) | Telephone cellulaire et systeme d'authentification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09706040 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2009551627 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12865215 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 20107017215 Country of ref document: KR Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2009706040 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009706040 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |