WO2012001768A1 - 携帯通信端末、その起動方法及びネットワーク通信システム - Google Patents
携帯通信端末、その起動方法及びネットワーク通信システム Download PDFInfo
- Publication number
- WO2012001768A1 WO2012001768A1 PCT/JP2010/061045 JP2010061045W WO2012001768A1 WO 2012001768 A1 WO2012001768 A1 WO 2012001768A1 JP 2010061045 W JP2010061045 W JP 2010061045W WO 2012001768 A1 WO2012001768 A1 WO 2012001768A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- information
- cpu
- network
- communication terminal
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/65—Environment-dependent, e.g. using captured environmental data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Definitions
- the present invention relates to a technology such as a portable communication terminal having a CPU that controls transmission / reception of information to / from other communication devices via a network in accordance with an operation on an operation unit of the main body.
- mobile phones have various functions such as e-mail, information search / browsing, electronic payment, etc. in addition to a call function, and various important information for executing these functions is stored.
- the e-mail function the e-mail address of the other party is included, and in the electronic settlement, a bank account, a password, etc. are included. Therefore, if a mobile phone is stolen or used illegally by another person, it may lead to an impersonation problem or an illegal act such as theft or theft of money or personal information.
- a method of authenticating a person by requesting input of a password or requesting acquisition of a fingerprint.
- Patent Document 1 a blood vessel pattern of a predetermined part of the owner of the mobile phone is imaged using each light of visible light and infrared light, and a blood vessel pattern is obtained from both the imaged images, and this blood vessel pattern is obtained. And a technique for authenticating a person by comparing a reference pattern of a blood vessel of the relevant person's site registered in advance with the person. By using a plurality of pieces of information in this manner, impersonation and the like can be further prevented as compared with a method of collating passwords and fingerprints, so that information confidentiality of the mobile phone is improved. Patent Document 1 does not use fingerprints on the surface of a living body and theoretically can raise the authentication level to some extent.
- Patent Document 2 describes an OS (Operation System) startup method stored in a hard disk of an information processing apparatus. More specifically, when power-on of the information processing apparatus is detected, a boot device that can be started is searched by booting the BIOS (Basic Input / Output system) stored in the flash memory, and the USB (Universal Serial Bus) ) Start the boot OS stored in the memory, and first display the password input screen on the display means. Next, an input of a password from the input means is accepted for this input screen. When the password is input, the input password and information unique to the USB memory are concatenated and converted into a hash value, and an unlock password for the hard disk to be activated is generated.
- BIOS Basic Input / Output system
- USB Universal Serial Bus
- Patent Document 2 describes that a virus check of a hard disk can be performed by performing a virus check using a virus check function stored in a USB memory in a state where the hard disk is unlocked. Has been.
- Patent Document 3 describes a multi-core type mobile phone that employs a technique for preventing a program from being analyzed, falsified, and the like during program execution. More specifically, a tamper-resistant second CPU is provided in addition to the first CPU, and an execution code of an application program having one or more classes including an execution code is loaded into a memory processed by the second CPU and executed. In this way, it is difficult to analyze and tamper with the execution code portion using a debugger or the like at the time of execution, and to protect the application from illegal acts.
- the cellular phone disclosed in Patent Document 1 requires a light source that emits two types of light, visible light and infrared light, and requires complicated processing such as extracting a blood vessel image in the skin from the captured image. There is a problem. Further, as in the case of fingerprints or the like, the authentication rate is only a method for performing authentication by comparing the acquired biometric information with information registered in advance, and thus there is a certain limit on the authentication rate. In particular, since this is based on information comparison processing, improper acquisition and use of this information may lead to impersonation.
- Patent Document 2 is a mode in which a password is input on a password input screen, there is a risk of password theft. Therefore, an individual who creates a hash value by combining with unique information of a USB memory and uses it as unlock information Authentication technology. Patent Document 2 describes that a virus check of a hard disk can be performed by performing a virus check using a virus check function stored in a USB memory, but there is no specific description. .
- Patent Document 3 is merely a separate distributed processing of the execution code portion and the application program portion.
- the object of the present invention is to provide a mechanical relationship between a lock, which is a structural feature of the main body, and a key as an auxiliary structure that is paired with the lock, and only when a pair of keys is used.
- Another object of the present invention is to provide a portable communication terminal capable of providing a specific use mode environment with high security instead of the normal use mode, a starting method thereof, and a network communication system.
- a mobile communication terminal includes a first CPU that controls transmission / reception of information to / from other communication devices via a first network in response to an operation on an operation unit of the main body. And a lock formed on a proper position of the main body to which a unique key to be paired with the main body is hung and a key signal for generating a key signal when the unique key to be paired is hung on the lock Generating means; and, upon receiving the key signal from the key signal generating means, a starting means for starting a second CPU that executes transmission / reception of information via the second network instead of the first network. It is characterized by that.
- a method for starting a mobile communication terminal includes a first CPU that controls transmission / reception of information to / from another communication device via a first network in accordance with an operation on an operation unit of the main body.
- activating a second CPU that executes transmission / reception of information via the second network instead of the first network by the activating means. It is characterized by having.
- a network communication system is a portable communication terminal according to any one of claims 1 to 8 connected to the first and second networks, and a computer terminal connected to the second network. And transmitting and receiving information between the portable communication terminal and the computer terminal when activated by the second CPU.
- the mobile communication terminal when an operation is performed on the operation unit of the main body, communicates with another communication device via the generally used first network. Control the transmission and reception of information between them.
- a unique key to be paired is applied to the lock formed at a proper position of the main body, a key signal is generated by the key signal generating means, and when the key signal is received, the second CPU is started by the starting means.
- the second CPU executes transmission / reception of information via a second network different from the first network. Since information is transmitted / received through the second network under the second CPU, information can be divided from the first network, and the second network can be made a high-security network accordingly. It becomes.
- the lock which is a structural feature of the main body, and the key as an auxiliary structure to be paired with the lock are mechanically related, so that only when the paired key is used. Therefore, a specific use mode environment with high security can be provided instead of the normal use mode.
- FIG. 1 It is a schematic diagram showing a network communication system to which a mobile phone according to an embodiment of a mobile communication terminal of the present invention is applied.
- FIG. 1 It is a block diagram which shows an example of the hardware constitutions of the mobile telephone shown in FIG. It is a figure which shows the lock
- 5 is a flowchart illustrating an example of a procedure of a BIOS 1 startup continuation process executed by a CPU 31. It is a flowchart which shows an example of the procedure of the starting continuation process of BIOS2 performed by CPU32. It is a flowchart which shows an example of the procedure of the authentication request
- 5 is a flowchart illustrating an example of a procedure of authentication processing executed by a control unit 61 of the authentication server 6. It is a flowchart which shows an example of the procedure of acquisition of the certificate as an example of transfer of the information between the computer terminals 21 performed by CPU32 in specific mode.
- FIG. 1 is a schematic diagram showing a network communication system to which a mobile phone according to an embodiment of a mobile communication terminal of the present invention is applied.
- FIG. 2 is a block diagram showing an example of a hardware configuration of the mobile phone shown in FIG. 3A and 3B are diagrams showing a lock structure of a mobile phone and a structure of an inherent key that is an accessory.
- FIG. 3A is a partial perspective view illustrating a key hole
- FIG. 3B is a view illustrating a relationship between the lock and the key.
- FIG. 1 is a schematic diagram showing a network communication system to which a mobile phone according to an embodiment of a mobile communication terminal of the present invention is applied.
- FIG. 2 is a block diagram showing an example of a hardware configuration of the mobile phone shown in FIG. 3A and 3B are diagrams showing a lock structure of a mobile phone and a structure of an inherent key that is an accessory.
- FIG. 3A is a partial perspective view illustrating a key hole
- FIG. 3B
- the network communication system shown in FIG. 1 includes a computer terminal 21 installed in one or a plurality of types of organizations in a network 1 such as the Internet, and a mobile phone that is owned by a plurality of members and can exchange information with the computer terminal 21. It is constructed with a telephone 3.
- the computer terminal 21 is, for example, installed in a local government that issues various documents such as a certificate requested by a member (certificate issuing service).
- the computer terminal 21 creates, for example, personal information, and stores and manages it, for example, a public organization or a quasi-public (including private sector) organization (state (ministry), local government, association, association) Etc.), and an example applied to information communication with the mobile phone 3 can be given.
- a public organization or a quasi-public (including private sector) organization (state (ministry), local government, association, association) Etc. As an example of application to information communication, in addition to the issuance of various certificates by the above-mentioned local governments, it is assumed that various
- the mobile phone 3 can communicate with other mobile phones and non-illustrated fixed telephones via a radio relay station (not shown), and via a radio relay station and an e-mail system 4 (not shown). It is possible to send and receive e-mails with other mobile phones or with other terminals connected to the Internet via the Internet 1, and various websites installed on the Internet can be used. It is possible to browse and acquire desired information by browsing.
- a mail system 4 of a mobile phone company is used as a mechanism for sending and receiving electronic mail.
- a member (individual, group, etc.) who desires the authority to receive provision of a predetermined service obtains the cellular phone 3 after receiving membership registration through a predetermined procedure. As will be described later, when the cellular phone 3 receives registration, unique information for identifying the cellular phone 3 and other necessary information are written in the internal storage unit.
- the mobile phone 3 is a multi-core type. That is, the mobile phone 3 includes first and second CPUs (Central / Processing / Units) 31 and 32 as overall control units.
- the CPU 31 is connected to a ROM (Read Only Memory) 31a and a RAM (Random Access Memory) 31b.
- ROM Read Only Memory
- RAM Random Access Memory
- BIOS storage unit 310a in which BIOS1 (Basic Input / Output system) is written
- MBR Master Boot Record
- BIOS1 Basic Input / Output system
- OS Operating System
- AP program storage unit 310b in which an application program (hereinafter referred to as AP) is written.
- AP application program
- the RAM 31b is for temporarily storing information in the middle of processing, and is also used when the CPU 31 is activated.
- An OS (Operating System) or AP written in the program storage unit 310b is a program file (hereinafter referred to as a general-purpose program) for giving the mobile phone 3 a normal call, e-mail, browsing / acquiring information, and other generally provided services. AP)).
- a state (mode) in which the general-purpose AP can be used is referred to as a general-purpose mode.
- the CPU 32 is connected to the ROM 32a and the RAM 32b.
- the ROM 32a includes a BIOS storage unit 320a in which the BIOS 2 is written, an MBR loaded by executing the BIOS 2, an OS loaded by the loader program, and a program storage unit 320b in which various application programs are written. Have.
- the RAM 32b is for temporarily storing information in the middle of processing, and is also used when the CPU 32 is activated.
- the OS (Operating System) and AP written in the program storage unit 320b are program files for executing processing that can give other specific services as described later, which is different from the general-purpose AP of the mobile phone 3.
- a specific AP a state (mode) in which a specific AP can be used is referred to as a specific mode.
- the unique information storage unit 301 is written with unique information for identifying the mobile phone 3 when membership registration is received and cannot be rewritten.
- the mobile phone 3 includes a display unit 33 that displays input information for confirmation, input guide display, and communication contents as an image, and an operation unit that includes a numeric keypad, a touch panel, and the like for inputting commands and information required by the operator. 34, a camera 35 that captures an object, and a processing unit that performs processing corresponding to the communication protocol, for example, CDMA (Code Division Multiple Access) 36.
- CDMA Code Division Multiple Access
- the CDMA 36 exemplified here is one of protocols used for wireless communication such as cellular phones, and a plurality of callers' voice signals are multiplied by different codes, and these voice signals are combined to use one frequency. And the receiving side extracts only the other party's voice signal by multiplying the synthesized signal by the code of the other party who is talking to him.
- the member server 5 has appropriate information regarding members who can control the operation of the computer terminal 21 and the mobile phone 3, for example, member information such as a member's name, name, e-mail address, address, etc. (if necessary Password) is stored in units of members.
- member information such as a member's name, name, e-mail address, address, etc. (if necessary Password) is stored in units of members.
- information that can be provided to the computer terminal 21 as necessary for example, software necessary for executing a service provided to the member, a document for creating a required document Transaction contents and history information for each member may be stored (stored and managed) in a creation program, or in a large-capacity server.
- the member server 5 includes a storage unit that stores a file transmission / reception history of each member and its files for management.
- the authentication server 6 determines whether or not the mobile phone 3 is a mobile phone when the member registration is received, or if it is determined that the mobile phone 3 is a valid mobile phone 3. Then, an authentication determination process is performed to determine whether the operator is a legitimate member. When the operator is authenticated, an authentication key is returned (issued) to the requesting mobile phone 3.
- the authentication server 6 includes a control unit 61 configured by a computer for executing an authentication process for a personal authentication request and software for executing the authentication process, and also provides reference information for verifying information for each member. Is stored.
- the reference information for authentication is specific information of the mobile phone 3 for each member, the password of the person, and a partial image of the person's body, for example, a face image.
- the reference information is stored in the authentication reference information storage unit 62 as the reference authentication information.
- the unique information and the password can be determined based on whether there is a complete match.
- a predetermined number of feature points are extracted and determined by the degree of coincidence between them. In order to enhance, pattern recognition technology may be adopted.
- the authentication server 6 is provided with a display unit, and the received image and the reference face image when the authentication request is made are displayed on the display unit, and the operator makes a difference determination while observing the screen of the display unit. It is good also as an aspect which performs operation of authentication key issue instruction
- the mobile phone 3 stores the assigned authentication key and, when receiving a service request, adds the authentication key to the information processed by the specific AP and transmits it to the computer terminal 21.
- the issued authentication key is preferably a one-time password that is valid only for one specific mode.
- the mail system 4 is interposed between the mobile phone 3 and the network 1 and functions as an information transmission system.
- the mail system 4 is connected to the network 1 through a carrier, and has a required number of wireless base stations and information. It has a processing part.
- the base station is a transmission / reception unit that has an antenna and transmits / receives radio waves to / from the mobile phone 3.
- a required number of mail systems 4 are provided for load distribution. Similarly, the required number of base stations are arranged for each call area.
- the information processing unit of the mail system 4 is publicly known, and is transmitted and received between the computer terminal 21 and the authentication server 6 by being transmitted over the network 1 and the format and protocol of the document file transmitted and received by the mobile phone 3 in the form of e-mail.
- a mail gateway that performs conversion between the format and protocol of the document file to be transmitted, a portable electronic mail server that controls transmission and reception of the document file, and a mailbox that temporarily stores the document file to be transmitted and received.
- transmission / reception of the document file described above is typically performed by a packet formed in accordance with a TCP / IP (transmission control protocol / internet protocol) protocol.
- TCP / IP transmission control protocol / internet protocol
- the received packet is returned to the original document file, or the transmission target file is replaced with the packet and transmitted.
- the header of each transmitted packet includes the computer that is the transmission source.
- the global IP address of the terminal 21 and the authentication server 6 and the global IP address of the computer terminal 21 that is the transmission destination are included.
- the CDMA 36 shown in FIG. 2 is equipped with a router (not shown) or is serially connected to the router.
- the address information indicating the transmission destination added to a predetermined position of each packet as a transmission signal or a reception signal is a global IP address based on the Internet protocol or the global IP address is attached.
- MAC address MAC address
- Ethernet registered trademark
- Address information routing table and arp (Address Resolution Protocol) table
- the packet is collated with the table and transmitted to the route having the same address, whereby the transmission path is switched via the Internet or via a dedicated network by software.
- the CPU 31 of the mobile phone 3 executes a program stored in the ROM 31a and read out and stored in the RAM 31b, thereby detecting a power on / off, and a key signal to be described later.
- Various service content execution processing such as browse processing, game execution, schedule management, etc.
- the CPU 32 executes a program stored in the ROM 32a, read out, and stored in the RAM 32b, thereby detecting a power supply detection unit 321 that detects power on / off, and a key signal detection that detects a key signal described later.
- Unit 322 activation processing unit 323 for activating CPU 32, activation instruction unit 324 for instructing activation of CPU 31 on the other side, authentication processing unit 325 for authenticating the validity of mobile phone 3 itself and the operator, It functions as a service mode selection processing unit 326 that accepts an operation for selecting a desired service in the mode, a service content processing unit 327 that performs processing to know the selected service content, and a communication processing unit 328.
- the authentication processing unit 325 includes an authentication operation guide unit 3251 for guiding an authentication operation to the operator, and an authentication information acquisition unit 3252 for executing processing according to the authentication result. Further, the service content processing unit 327 executes service content execution between the service content request processing unit 3271 that requests the service content selected by the service mode selection processing unit 326 to the computer terminal 21 and the computer terminal 21. And a processing unit 3272.
- the cellular phone 3 includes a lock portion 38 and a key 39 in pairs.
- the key signal generation unit 37 in FIG. 2 is paired with the lock unit 38, that is, generates a key signal when a valid key 39 that only fits the lock unit 38 is put (inserted). Is.
- the key 39 is acquired as a pair with the mobile phone 3 to be acquired when receiving membership registration (or the mobile phone 3 may be already acquired).
- FIG. 3A and 3B are conceptual diagrams for explaining the relationship between the mobile phone 3, the lock portion 38, and the key 39.
- FIG. 3A is a partial perspective view showing the keyhole position of the lock portion 38, and FIG. It is a general
- the main body 30 of the mobile phone 3 is provided with a display unit 33 (see FIG. 2) and an operation unit 34 including a numeric keypad and function keys, as is well known.
- a key hole 380 of the lock portion 38 is disposed at an appropriate position of the main body 30, here, on the side surface portion.
- the key 39 can be inserted into the key hole 380 from the tip side.
- the type of the lock part and the key is not particularly limited.
- the lock portion 38 has an outer cylinder 381 on the outer diameter side and an inner cylinder 382 on the inner diameter side arranged concentrically, and both cylinders 381 and 382 have a keyhole depth direction.
- the same number of pin holes (five in the illustrated example) are arranged in parallel at the corresponding positions.
- a driver pin 383 is fitted into the pin hole of the outer cylinder 381
- a key pin 384 is fitted into the pin hole of the inner cylinder 382 so that the ends thereof are in contact with each other so as to be slidable in the pin hole direction.
- a key signal generation unit 37 which is a sensor 370 is arranged. That is, when the key 39 is turned and a part of the key 39 comes into contact with the sensor 370, the contact is detected and an electric signal is output from the sensor 370 as a detection signal. Therefore, even if the mobile phone 3 is stolen, the member who owns the mobile phone 3 cannot enter the specific mode environment by switching to the person without stealing the key 39 paired on the key holder or the like. Can provide higher security.
- the sensor 370 may be a limit switch type in which the contact of the key 39 is mechanically received and the action piece changes its position and outputs a signal, or the key 39 (or part thereof) is a magnet, and the sensor 370 If a magnetic sensor is used, it is possible to detect that the key 39 has been turned and approached the sensor 370. Alternatively, even if the key 39 is made of a dielectric and the sensor 370 is a dielectric sensor, it can function as a proximity sensor in the same manner by sensing a change in dielectric constant. As described above, the sensor 370 can determine whether or not the key 39 is paired with the lock portion 38 of the mobile phone 3, that is, whether or not the key 39 is valid for the mobile phone 3. Note that the key 39 can be removed from the keyhole 380 by rotating the key 39 back to the original position.
- the power detection units 311 and 321 exist as one of the operation units 34 (for example, if a specific one of the numeric keys is continuously pressed for a predetermined time, the power is turned on. When the power switch is turned on and off, a change in the voltage of the power supply is detected to detect on / off of the power supply.
- the power source supplies power for driving each circuit member of the mobile phone 3, and is composed of, for example, a secondary battery, which can be charged by a commercial power source or the like and can be reused.
- the key signal detection units 312 and 322 detect the signal from the key signal generation unit 37 as a key signal, and further detect the signal down (off) when the key 39 is removed from the key hole 380.
- the activation processing unit 313 continues to load the BIOS 1 and activates the CPU 31. On the other hand, if the key signal is detected, the BIOS 1 Is going down on the way. If the key signal is detected while the BIOS 2 is being activated upon receiving power on, the activation processing unit 323 continues to load the BIOS 2 and activates the CPU 32. On the other hand, if the key signal is not detected, The BIOS 2 is brought down halfway. Since either one of the CPUs 31 and 32 is activated, the CPU to be activated may be controlled to be lowered by the CPU that is activated.
- the activation instructing unit 314 instructs the CPU 32 on the other side to activate and lowers its own CPU 31 when a key signal is detected while the CPU 31 is operating in the general-purpose mode.
- the activation instructing unit 324 instructs the other CPU 31 to activate and lowers its own CPU 32 when it is detected that the key signal is turned off while the CPU 32 is operating in the specific mode. is there.
- the specific mode lasts for a period during which the key 39 is inserted into the lock 38, but is not limited to this, and the switch to the specific mode is instructed by inserting the key 39 into the lock 38. In this state, if processing such as a specific mode release instruction is performed by inserting the key 39 into the lock part 38, even if the key 39 is removed from the lock part 38 between the switching instruction and the release instruction, The mode can be maintained.
- the service mode selection processing unit 315 receives an operation content to the operation unit 34 in the general-purpose mode, and performs a service mode (content) selection process desired by the operator.
- the service mode selection processing unit 326 receives an operation content for the operation unit 34 in the specific mode, and performs a process for selecting a service mode (content) desired by the operator.
- a key signal is output from the sensor 370.
- the communication processing unit 328 performs the routing setting with the MAC address removed from the Internet, as in the case of the specific mode.
- the authentication operation guide unit 3251 executes a process for guiding the authentication operation to the operator. For example, a screen for guiding password input operation (or sound) may be displayed, and a guide display (or sound may be used) for photographing a part of the operator's body, for example, the face portion, with the camera 35 is performed.
- the authentication processing unit 325 executes input password capture processing and captured face image capture processing.
- the captured password and face image are transmitted to the authentication server 6 from the communication processing unit 328 and the CDMA 36 in association with the unique information of the mobile phone 3. If the authentication is successful, the authentication information acquisition unit 3252 executes an authentication key acquisition process. If not, the authentication information acquisition unit 3252 executes a process such as prompting the authentication process to be re-executed.
- the service content request processing unit 3271 creates a request content for the computer terminal 21 to execute the service content selected by the service mode selection processing unit 326 and adds an authentication key to the computer terminal 21 via the communication processing unit 328 and the CDMA 36. It is to be sent.
- the service content execution processing unit 3272 is executed with the computer terminal 21 according to the service request content. For example, when issuing a predetermined certificate is requested, an electronic certificate receiving operation is performed. Only.
- FIG. 4 is a flowchart illustrating an example of a procedure of the startup process of the CPU 31 performed by the CPU 31 when the power is turned on.
- the BIOS 1 is loaded and its activation is started (step S1). Whether the key signal is present or not is included during the activation of the BIOS 1 (step S3). If the key signal is detected, the CPU 31 is instructed to forcibly go down (step S5), and the process exits this flow. On the other hand, if the key signal is not detected, the activation of the BIOS 1 is continued (step S7), and the activation of the CPU 31 is finished. Here, interrupt permission is performed (step S9).
- step S11 use in the general-purpose mode is permitted (step S11). Then, it is determined whether or not the power is turned off (step S13). If it is not turned off, the process returns to step S11. If it is turned off, this flow is terminated.
- FIG. 5 is a flowchart showing an example of the procedure of the startup process of the CPU 32 performed by the CPU 32 when the power is turned on.
- the BIOS 2 is loaded and its activation is started (step S21). Whether the key signal is present or not is included during the activation of the BIOS 2 (step S23), and if the key signal is not detected, the CPU 32 is instructed to forcibly go down (step S25), and the process exits this flow. On the other hand, if the key signal is detected, the activation of the BIOS 2 is continued (step S27), and the activation of the CPU 32 is terminated.
- step S29 If the authentication process is executed (step S29) and the authentication is unsuccessful (No in step S31), an instruction for guiding the prompt for restart is given (step S33), and the flow is exited. Note that the number of restarts due to authentication failure may be limited.
- step S35 interrupt permission is performed here (step S35).
- step S37 use in the specific mode is permitted (step S37). Therefore, it can be used in a specific mode from the time when the power is turned on.
- step S39 it is determined whether or not the power is turned off. If it is not turned off, the process returns to step S37, and if it is turned off, this flow is terminated. Since information is transmitted and received in the specific mode under the second CPU 32, information can be divided from the general-purpose mode, and the specific mode can be made a network with high security accordingly.
- FIG. 6 is a flowchart showing an example of the procedure of the interrupt process executed by the CPUs 31 and 32.
- the CPU that is currently operating is the CPU 31, it is detected that the key signal has changed from “none” to “present” (Yes in step S51).
- a command for instructing the CPU 32 to start up is output, and the CPU 31 of its own is downed (step S53). Therefore, even in the general-purpose mode usage environment, it is possible to obtain a specific-mode usage environment from a desired point in time.
- step S55 when the CPU currently operating is the CPU 32, if it is detected that the key signal has changed from “present” to “absent” (Yes in step S55). A command for instructing the CPU 31 to start (start loading of the BIOS 1) is output, and the CPU 32 of its own is downed (step S57).
- FIG. 7 is a flowchart illustrating an example of the procedure of the BIOS 1 startup continuation process executed by the CPU 31.
- the BIOS 1 reads the MBR1 of the ROM 31a into the RAM 31b (step S61), and the loader is read into the RAM 31b by the read MBR1 (step S63).
- the OS1 and the general-purpose AP are read into the RAM 31b (step S65).
- routing setting in the general-purpose mode is performed (step S67).
- FIG. 8 is a flowchart showing an example of the procedure of the BIOS 2 startup continuation process executed by the CPU 32.
- MBR2 of the ROM 32a is read into the RAM 32b by the BIOS 2 (step S71), and the loader is read into the RAM 32b by the read MBR2 (step S73).
- the OS 2 and the specific AP are read into the RAM 32b (step S75).
- routing setting in the specific mode is performed (step S77).
- FIG. 9 is a flowchart showing an example of the procedure of the authentication request process executed by the CPU 32.
- a password input operation guide is displayed on the display unit 33 (step S81).
- As the guide screen for example, when the password is 4 digits, four square cells are displayed on the screen.
- a square cell is displayed each time the user presses the button.
- a display indicating acceptance in order from the head side of the eyes is performed, whereby a 4-digit password is input.
- a guide display for photographing with a camera is performed on a part that is a specific part of the operator's body (step S85).
- the camera shooting guide display is, for example, a camera 35 of the mobile phone 3, a release button and a simulated human body image, or a camera shooting animation displayed as a moving image.
- password and human body photography are the authentication requirements, so even if you are in a specific mode of use environment, you can not actually send and receive information unless you create authentication information and receive that authentication, Higher security communication is possible.
- the authentication request information is created by adding the unique information written in the unique information storage unit 301 to the information of the password and the captured image, and this authentication request information is in the specific mode.
- the same routing process is performed and transmitted to the authentication server 6 (step S89).
- it is determined whether authentication key information indicating successful authentication is returned from the authentication server 6 within a predetermined time (step S91). If the authentication key is not returned, this flow is exited. On the other hand, if the authentication key has been returned, a notification screen for permission to use the specific mode is displayed, and thereafter the service standby screen in the specific mode is set (step S93).
- FIG. 10 is a flowchart illustrating an example of a procedure of authentication processing executed by the control unit 61 of the authentication server 6.
- step # 1 it is determined whether authentication request information has been received from any of the mobile phones 3 (step # 1). If the authentication request information has not been received, this flow is exited.
- the specific information of the mobile phone is extracted from the received authentication request information and collated with the specific information in the reference authentication information in the authentication reference information storage unit 62. (Step # 3). As a result of the collation, if the unique information does not match, the present flow is exited.
- a reference password and a reference image associated with the received unique information are extracted (step # 5).
- the received password is compared with the reference password (step # 7), and if they do not match (No in step # 9), the process exits this flow.
- the received captured image and the reference image are collated (step # 11), and if they do not match (No in step # 13). , Exit this flow.
- an authentication key is created and stored in the authentication server 6 in correspondence with the unique information of the mobile phone 3 and returned to the mobile phone 3 as the transmission source. (Step # 15).
- the computer terminal 21 When the computer terminal 21 receives a service request from the mobile phone 3 later, the computer terminal 21 extracts information on the authentication key added to the service request, and the authentication information on the mobile phone 3 and the authentication key are extracted from the authentication server 6. You may make it perform the operation
- the authentication server 6 stores a newly created authentication key for each specific information of the mobile phone 3 for a predetermined period.
- the storage period may be the period of the specific mode at that time. In the case where the authentication key is fixed, it may be a period considering security, for example, about one day, or about several days.
- the authentication key created by the authentication server 6 may be fixed for each mobile phone, but it is desirable to use a one-time password in consideration of safety.
- the one-time password is preferably generated by a random expression using, for example, a random number generator.
- FIG. 11 is a flowchart showing an example of a certificate acquisition procedure as an example of information exchange with the computer terminal 21 executed by the CPU 32 in the specific mode.
- the computer terminal 21 is installed in a local government (for example, a public office) that issues various certificates in an electronic form.
- a local government for example, a public office
- the member who has issued his / her mobile phone 3 issues an electronic certificate, for example, a seal certificate, to the government office, and after receiving the bank, requests the seal certificate. This will be described in the case of transmission to electronic computer terminal 23 (submission electronically).
- the bank-installed computer terminals 23 are collectively described in the following (1).
- an application for issuing a seal certificate is read from a specific AP, the computer terminal 21 of the corresponding local government (residential district office) is designated (step S101), and the application is issued as an issuance request. It is transmitted to the computer terminal 21 (step S103).
- the receiving computer terminal for example, the computer terminal 21, transmits the unique information extracted from the received information and the authentication key to the authentication server 6 to enable the validity confirmation process in order to confirm the validity of the transmission source. Yes.
- step S105 the process proceeds to a waiting state for receiving the applied seal certificate
- step S107 the received seal certificate is displayed on the display unit 33
- the received seal certificate is temporarily stored in the RAM 32b.
- step S109 the presence / absence of a transfer instruction is confirmed (step S109). If there is a transfer instruction, a transfer destination of the received seal certificate, for example, a computer terminal 23 of a predetermined bank is designated (step S111). When the transfer destination is designated, the seal certificate is transferred to the computer terminal 23 of a predetermined bank (step S113). On the other hand, if there is no transfer instruction, the process exits this flow.
- the history of information transmitted / received by each mobile phone 3 in the specific mode is basically stored in the member server 5 as history.
- the above-described validity checking process itself is similarly stored as a history corresponding to the unique information in the authentication server 6 for a predetermined period (for example, during one specific mode or certificate validity period).
- the computer terminal 23 of the bank extracts the unique information and the authentication key from the transfer information to confirm the validity of the certificate, and sends it to the authentication server 6.
- the computer terminal 23 of the bank extracts the unique information and the authentication key from the transfer information to confirm the validity of the certificate, and sends it to the authentication server 6.
- the authentication server 6 extracts the unique information and the authentication key from the transmitted information and confirming the validity of the information by the authentication server 6.
- the authentication key is a one-time password
- the validity authentication is valid only during one specific mode.
- Such validity confirmation is not limited to the computer terminals 21 and 23 but is also performed on the mobile phone 3. Furthermore, it is performed in the same manner for the computer terminal 22 of the supplier in the embodiment (1) below.
- the computer terminal 21 that issues a certificate or the like is described.
- the present invention is not limited to such a mode, and the following modes can be adopted. That is, in place of the computer terminal 21 or in addition to the computer terminal 21, the computer terminal 22 installed in various merchants that are members and the financial institution such as a bank can be used for settlement of commercial transactions generated between members.
- a network communication system may be constructed with the computer terminal 23 to be supported.
- the computer terminals 21 to 23 store computer version program files corresponding to the specific AP stored in the mobile phone 3, and perform information processing (specific mode) with a partner whose connection is permitted by these programs. It is good also as a dedicated terminal which performs. Or, for example, it is a general AP that can use software for document creation, software for communication and information search / browsing via the Internet, etc. (general-purpose mode). It may be a mode switching type. The mode switching type may be a type that can connect to another network such as NGN (Next Generation Network) with a specific AP instead of the Internet. In general-purpose mode, general processing such as information creation, processing, storage, and transmission / reception of information using communication software is executed. Is possible.
- NGN Next Generation Network
- the computer terminals 22 and 23 as specific APs, software for performing the purchase and sale of goods and services, estimation or billing, creation and communication of each document relating to deposits and withdrawals (so-called commercial transactions), and predetermined if necessary Authentication processing software is loaded from the internal ROM after booting. That is, the computer terminals 22 and 23, like the mobile phone 3, use a specific AP to make payments in general commercial transactions, for example, issue and receipt of invoices from vendor stores, and contracts of invoice issuers from buyers. In addition to issuing a deposit (that is, payment) instruction to the account of a financial institution and issuing a receipt thereof, various electronic document transmission / reception processes are possible regardless of electronic settlement.
- the specific AP can create various documents as text-format or binary-format electronic files.
- the electronic file is exchanged between the computer terminals 22 and 23 and the mobile phone 3 via the member server 5 (or in parallel).
- a specific AP that performs a settlement instruction process (such as a settlement process instruction between financial institutions) according to a financial settlement document is also installed in the computer terminal 23 of each financial institution.
- the coincidence signal is output from the sensor 370 when the key 39 and the lock part 38 are a valid pair.
- the key 39 It is good also as an aspect which produces
- the key 39 is an electronic key in which code information of a predetermined number of bits (any of magnetic, electrode structure, and light transmission and light shielding structure is possible) is recorded, and the lock unit 38 side is a sensor unit that reads this code information ( A magnetic sensor, a voltmeter, a light receiving sensor) may be provided.
- the key 39 creates magnet code information so that a minute magnet is not arranged at a predetermined number of bit positions, and the lock unit 38 scans this code information or arranges magnetic sensors for the same number of bits. And read it.
- an operation such as rotation is not necessary, so that the structure is simplified.
- the code signal of the key is stored in correspondence with, for example, the unique information storage unit 301 in the mobile phone 3, and the authentication request processing with the same routing selection as the specific mode is performed by collating with the read code signal. It should be allowed. Therefore, it can be effectively used as a key validity evaluation element.
- the activation instruction of the other CPU and the down of the own CPU are performed depending on whether or not the key 39 is attached. Instead, a pair of valid keys 39 is inserted.
- the CPU 31 on the side normally connected to the power supply line may be mechanically disconnected from the power supply line, and only in this case, the CPU 32 may be mechanically connected to the power supply line.
- a charging element such as a capacitor is arranged on the power supply line for each of the CPUs 31 and 32 to prevent a sudden power down, detect a key insertion / removal, or detect a gradual decrease in the capacitor potential. In the meantime, it is only necessary to execute the startup instruction of the other CPU and the down process of the own CPU.
- both the password input using the operation unit 33 and the face image captured using the camera 35 are to be collated.
- the present invention is not limited to this. Only the information of may be sufficient.
- the subject imaged by the camera 35 is not limited to a face image, and may be a part having discriminability.
- the cellular phone 3 has been described as an example.
- the present invention is not limited to this, and the present invention can be applied to portable information terminals such as PDAs (personal digital assistants) that can communicate with the outside.
- PDAs personal digital assistants
- a secure network is constructed by routing setting with a MAC address in the specific mode.
- a physically different network for example, the Internet in the general-purpose mode is used.
- NGN Next Generation Network
- the present invention is a portable communication terminal having a first CPU that controls transmission / reception of information to / from other communication devices via the first network in accordance with an operation on the operation unit of the main body.
- a lock formed with a unique key that is paired with the main body, and a key signal that generates a key signal when the unique key is paired with the lock.
- an activation means for activating a second CPU that executes transmission / reception of information via the second network instead of the first network when the key signal is received from the key signal generation means. It is preferable. According to this configuration, since the information is transmitted and received through the second network under the second CPU, the information can be divided from the first network, and the second network is highly secured accordingly. Networking is possible.
- the normal use mode is available only when the key that is the pair is used by mechanically relating the lock, which is a structural feature of the main body, and the key as an attached structure to be paired with the lock.
- a specific use mode (specific mode) environment with high security can be provided instead of (general-purpose mode).
- the key signal generating means generates the key signal when it is detected that the key to be paired is locked on the lock. According to this configuration, since the key signal is generated by actually engaging the key with the lock, the specific use mode environment cannot be obtained even if the key is stolen and illegally owned.
- the paired key is locked on the lock by one of mechanical, electrical and magnetic means.
- an electrical or magnetic detection method can be adopted according to the specifications, which is highly versatile.
- the key signal generation means outputs unique information set to the paired key to the first and second CPUs when the paired key is locked on the lock. .
- the first and second CPUs can use this information as a key validity evaluation element. It can be used effectively.
- the power supply switch is provided, and the activation means activates the second CPU when the paired key is locked on the lock when the power switch is turned on.
- the use environment of the second network can be obtained from the time when the mobile communication terminal is turned on.
- the activation means stops the operation of the first CPU and activates the second CPU when the key is locked in the paired keyhole during the operation of the first CPU. It is preferable to do. According to this configuration, it is possible to obtain the usage environment of the second network from a desired time even in the usage environment of the first network.
- the second CPU when the second CPU is activated and the biological information detection unit that acquires the biological information of the operator, the password information input from the operation unit and the biological information of the operator acquired by the biological information detection unit It is preferable to include communication processing means for transmitting at least one of the information as authentication information to an authentication server provided on the second network and receiving an authentication result. According to this configuration, even in the usage environment of the second network, authentication information must be further created, and if the authentication is not received, information cannot actually be transmitted / received, so higher security communication is possible. Become.
- the biometric information detection unit is a camera that captures an image of the subject, the biometric information is an image of a predetermined part of the operator imaged by the camera, and the authentication server has the pair of keys. It is preferable that an image of the predetermined part of the person is registered as a verification image. According to this configuration, even if the portable communication terminal and the key are stolen, the unauthorized person does not know the human body part to be photographed with the password or the camera, so that the authentication information cannot be created.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
させることで鍵信号を生成させるようにしたので、鍵を盗むなどして不正に所有しても特定使用モード環境を得ることができない。
21~23 コンピュータ端末
3 携帯電話機
30 本体
31 CPU(第1のCPU)
32 CPU(第2のCPU)
301 固有情報記憶部
33 表示部
34 操作部(電源スイッチ)
35 カメラ(生体情報検出部)
36 CDMA(通信処理手段の一部)
37 鍵信号生成部(鍵信号生成手段)
370 センサ
38 錠部(錠)
39 鍵
311,312 電源検出部
312 鍵信号検出部
322 鍵信号検出部(起動手段の一部)
313 起動処理部
323 起動処理部(起動手段の一部)
314,424 起動指示部
325 認証処理部
326 サービスモード選択処理部
327 サービス内容処理部
328 通信処理部(通信処理手段の一部)
5 会員サーバ
6 認証サーバ
61 制御部
62 認証基準情報記憶部
Claims (10)
- 本体の操作部への操作に応じて、他の通信機器との間で第1のネットワークを介して情報の送受信を制御する第1のCPUを有する携帯通信端末において、
前記本体の適所に形成された、当該本体と対となる固有の鍵が掛けられる錠と、
前記対となる固有の鍵が前記錠に掛けられた場合に、鍵信号を生成する鍵信号生成手段と、
前記鍵信号生成手段から前記鍵信号を受けると、前記第1のネットワークに代えて第2のネットワークを介して情報の送受信を実行する第2のCPUを起動する起動手段とを備えたことを特徴とする携帯通信端末。 - 前記鍵信号生成手段は、前記対となる鍵が前記錠に掛けられたことが検出された場合に前記鍵信号を生成することを特徴とする請求項1に記載の携帯通信端末。
- 前記対となる鍵が前記錠に掛けられたことを、機械的、電気的及び磁気的のうちの1の手段で検出することを特徴とする請求項2に記載の携帯通信端末。
- 前記鍵信号生成手段は、前記対となる鍵が前記錠に掛けられた場合に、前記対となる鍵に設定された固有情報を前記第1、第2のCPUに出力することを特徴とする請求項1~3のいずれかに記載の携帯通信端末。
- 電源スイッチを有し、
前記起動手段は、前記電源スイッチがオンされた時に、前記対となる鍵が前記錠に掛けられていた場合に、前記第2のCPUを起動する請求項1~4のいずれかに記載の携帯通信端末。 - 前記起動手段は、前記第1のCPUの動作中に、前記対となる鍵穴に前記鍵が掛けられた場合に、前記第1のCPUの動作を停止すると共に前記第2のCPUを起動することを特徴とする請求項1~5のいずれかに記載の携帯通信端末。
- 操作者の生体情報を取得する生体情報検出部と、
第2のCPUが起動された場合に、前記操作部から入力されたパスワード情報及び前記生体情報検出部で取得された操作者の生体情報の少なくとも一方を認証情報として、前記第2のネットワーク上に設けられた認証サーバに送信し、認証結果を受信する通信処理手段とを備えることを特徴とする請求項1~6のいずれかに記載の携帯通信端末。 - 生体情報検出部は、被写体を撮像するカメラであり、前記生体情報は前記カメラで撮像された操作者の所定部位を撮像した画像であり、前記認証サーバは、前記対となる鍵の所持者の前記所定部位の画像を照合用画像として登録しているものであることを特徴とする請求項7記載の携帯通信端末。
- 本体の操作部への操作に応じて、他の通信機器との間で第1のネットワークを介して情報の送受信を制御する第1のCPUを有する携帯通信端末の起動方法において、
前記本体の適所に形成された錠に、当該本体と対となる固有の鍵が掛けられ掛けられた場合に、鍵信号生成手段によって鍵信号を生成するステップと、
前記鍵信号生成手段から前記鍵信号を受けると、起動手段によって、前記第1のネットワークに代えて第2のネットワークを介して情報の送受信を実行する第2のCPUを起動するステップとを備えたことを特徴とする携帯通信端末の起動方法。 - 前記第1、第2のネットワークに接続された、請求項1~8のいずれかに記載の携帯通信端末と、前記第2のネットワークに接続されたコンピュータ端末とを備え、前記第2のCPUで起動された場合の携帯通信端末と前記コンピュータ端末との間で情報の送受を行うことを特徴とするネットワーク通信システム。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2010/061045 WO2012001768A1 (ja) | 2010-06-29 | 2010-06-29 | 携帯通信端末、その起動方法及びネットワーク通信システム |
CN2010800678077A CN102986199A (zh) | 2010-06-29 | 2010-06-29 | 便携式通信终端、它的启动方法和网络通信系统 |
EP10854065.9A EP2590389A4 (en) | 2010-06-29 | 2010-06-29 | MOBILE COMMUNICATION TERMINAL, METHOD FOR ITS ACTIVATION AND NETWORK COMMUNICATION SYSTEM |
JP2012522374A JPWO2012001768A1 (ja) | 2010-06-29 | 2010-06-29 | 携帯通信端末、その起動方法及びネットワーク通信システム |
US13/806,906 US20130102285A1 (en) | 2010-06-29 | 2010-06-29 | Mobile communication terminal, startup method thereof, and network communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2010/061045 WO2012001768A1 (ja) | 2010-06-29 | 2010-06-29 | 携帯通信端末、その起動方法及びネットワーク通信システム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012001768A1 true WO2012001768A1 (ja) | 2012-01-05 |
Family
ID=45401523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/061045 WO2012001768A1 (ja) | 2010-06-29 | 2010-06-29 | 携帯通信端末、その起動方法及びネットワーク通信システム |
Country Status (5)
Country | Link |
---|---|
US (1) | US20130102285A1 (ja) |
EP (1) | EP2590389A4 (ja) |
JP (1) | JPWO2012001768A1 (ja) |
CN (1) | CN102986199A (ja) |
WO (1) | WO2012001768A1 (ja) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9394723B1 (en) | 2013-01-22 | 2016-07-19 | Amazon Technologies, Inc. | Lock that mechanically detects tampering |
US9567770B1 (en) * | 2013-01-22 | 2017-02-14 | Amazon Technologies, Inc. | Lock that electronically detects tampering |
US9417678B2 (en) * | 2013-03-15 | 2016-08-16 | Lilitab LLC | Magnet key |
WO2015014014A1 (zh) * | 2013-07-30 | 2015-02-05 | 宇龙计算机通信科技(深圳)有限公司 | 终端、数据交互方法和数据交互系统 |
CN108305357A (zh) * | 2017-12-29 | 2018-07-20 | 国家电网公司 | 一种基于智能解锁钥匙的防误解锁的方法 |
CN108876983A (zh) * | 2018-05-17 | 2018-11-23 | 东莞市华睿电子科技有限公司 | 一种保险柜智能锁的解锁方法 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002199468A (ja) * | 2000-12-25 | 2002-07-12 | Roisu.Com Kk | 認証キーシステムおよび電子キーシステム並びに遠隔操作キーシステム |
JP2006025347A (ja) * | 2004-07-09 | 2006-01-26 | Sanyo Electric Co Ltd | 携帯端末 |
JP2006148478A (ja) | 2004-11-18 | 2006-06-08 | Sharp Corp | 携帯型電子機器 |
JP2006229694A (ja) * | 2005-02-18 | 2006-08-31 | Matsushita Electric Ind Co Ltd | 携帯端末装置、これを用いた取引システム並びに携帯端末装置の制御方法 |
JP2007019747A (ja) * | 2005-07-06 | 2007-01-25 | Matsushita Electric Ind Co Ltd | 携帯端末装置、無線通信ユニット、認証制御方法及び認証制御プログラム |
WO2007011001A1 (ja) | 2005-07-22 | 2007-01-25 | Matsushita Electric Industrial Co., Ltd. | 実行装置 |
JP2007066123A (ja) | 2005-09-01 | 2007-03-15 | Yokogawa Electric Corp | Os起動方法及びこれを用いた装置 |
JP2009147810A (ja) * | 2007-12-17 | 2009-07-02 | Tokai Rika Co Ltd | 電話機能一体型電子キー |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004062203B4 (de) * | 2004-12-23 | 2007-03-08 | Infineon Technologies Ag | Datenverarbeitungseinrichtung, Telekommunikations-Endgerät und Verfahren zur Datenverarbeitung mittels einer Datenverarbeitungseinrichtung |
US8161290B2 (en) * | 2006-07-18 | 2012-04-17 | At&T Intellectual Property I, L.P. | Security for a personal communication device |
-
2010
- 2010-06-29 CN CN2010800678077A patent/CN102986199A/zh active Pending
- 2010-06-29 WO PCT/JP2010/061045 patent/WO2012001768A1/ja active Application Filing
- 2010-06-29 EP EP10854065.9A patent/EP2590389A4/en not_active Withdrawn
- 2010-06-29 JP JP2012522374A patent/JPWO2012001768A1/ja active Pending
- 2010-06-29 US US13/806,906 patent/US20130102285A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002199468A (ja) * | 2000-12-25 | 2002-07-12 | Roisu.Com Kk | 認証キーシステムおよび電子キーシステム並びに遠隔操作キーシステム |
JP2006025347A (ja) * | 2004-07-09 | 2006-01-26 | Sanyo Electric Co Ltd | 携帯端末 |
JP2006148478A (ja) | 2004-11-18 | 2006-06-08 | Sharp Corp | 携帯型電子機器 |
JP2006229694A (ja) * | 2005-02-18 | 2006-08-31 | Matsushita Electric Ind Co Ltd | 携帯端末装置、これを用いた取引システム並びに携帯端末装置の制御方法 |
JP2007019747A (ja) * | 2005-07-06 | 2007-01-25 | Matsushita Electric Ind Co Ltd | 携帯端末装置、無線通信ユニット、認証制御方法及び認証制御プログラム |
WO2007011001A1 (ja) | 2005-07-22 | 2007-01-25 | Matsushita Electric Industrial Co., Ltd. | 実行装置 |
JP2007066123A (ja) | 2005-09-01 | 2007-03-15 | Yokogawa Electric Corp | Os起動方法及びこれを用いた装置 |
JP2009147810A (ja) * | 2007-12-17 | 2009-07-02 | Tokai Rika Co Ltd | 電話機能一体型電子キー |
Non-Patent Citations (1)
Title |
---|
See also references of EP2590389A4 |
Also Published As
Publication number | Publication date |
---|---|
CN102986199A (zh) | 2013-03-20 |
JPWO2012001768A1 (ja) | 2013-08-22 |
EP2590389A1 (en) | 2013-05-08 |
EP2590389A4 (en) | 2014-01-01 |
US20130102285A1 (en) | 2013-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101877333B1 (ko) | 블록체인 기반의 모바일 아이디를 이용하여 사용자를 비대면 인증하는 방법, 단말 및 이를 이용한 서버 | |
CN106464673B (zh) | 用于验证装置注册的增强的安全性 | |
TW201741922A (zh) | 一種基於生物特徵的安全認證方法及裝置 | |
US20150324789A1 (en) | Cryptocurrency Virtual Wallet System and Method | |
CN113902446A (zh) | 基于安全单元和可信执行环境的人脸支付安全方法 | |
JP2018532301A (ja) | 本人認証方法及び装置 | |
CN109325342A (zh) | 身份信息管理方法、装置、计算机设备和存储介质 | |
EP2690840B1 (en) | Internet based security information interaction apparatus and method | |
JP5303407B2 (ja) | 生体認証システム、携帯端末、半導体素子、および情報処理サーバ | |
TW201121280A (en) | Network security verification method and device and handheld electronic device verification method. | |
WO2011060115A1 (en) | One time pin generation | |
TW201816648A (zh) | 業務實現方法和裝置 | |
WO2011077512A1 (ja) | 本人認証方法、本人認証システム及び携行型通信端末 | |
WO2012001768A1 (ja) | 携帯通信端末、その起動方法及びネットワーク通信システム | |
EP2690589A1 (en) | Method and system for security information interaction based on internet | |
CN107864124B (zh) | 一种终端信息安全保护方法、终端及蓝牙锁 | |
CN108335105B (zh) | 数据处理方法及相关设备 | |
AU2017285865A1 (en) | Mobile authentication method and system therefor | |
JP2012094146A (ja) | 特に資源の利用に関する利用者の認証によって保護された関数の実行を制御する方法及びシステム | |
JP2004110684A (ja) | 決済方法および決済システム | |
JP2007226675A (ja) | 現金取引システム,認証情報生成装置,現金自動預払機の認証方法および認証情報生成方法 | |
JP2007156621A (ja) | 認証サーバ装置、通信端末装置、決済処理認証システム、決済処理認証方法、制御プログラム、および、記録媒体 | |
KR101613664B1 (ko) | 인증서를 이용한 전자거래에서의 본인확인기능을 강화한 보안 시스템 | |
JP5062707B2 (ja) | 追加機能ユニットの有効化/無効化方法、そのシステム及びそのプログラム並びに追加機能ユニット | |
JP2004185255A (ja) | 個人情報管理及び生体認証を兼ね備えたフロッピー(登録商標)ディスク型生体情報認証装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080067807.7 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10854065 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012522374 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13806906 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010854065 Country of ref document: EP |