WO2012073978A1 - Système de sécurité et procédé d'authentification - Google Patents
Système de sécurité et procédé d'authentification Download PDFInfo
- Publication number
- WO2012073978A1 WO2012073978A1 PCT/JP2011/077584 JP2011077584W WO2012073978A1 WO 2012073978 A1 WO2012073978 A1 WO 2012073978A1 JP 2011077584 W JP2011077584 W JP 2011077584W WO 2012073978 A1 WO2012073978 A1 WO 2012073978A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identification code
- electronic key
- communication terminal
- door
- unit
- Prior art date
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/253—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00317—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having only one limited data transmission range
- G07C2009/00333—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having only one limited data transmission range and the lock having more than one limited data transmission ranges
Definitions
- the present invention relates to a security system and an authentication method.
- the system to do is proposed.
- authentication of identification information is automatically performed.
- the door is unlocked.
- Patent Documents 1 and 2 capture an image of a person approaching a door. And the information regarding the image
- communication terminals such as a mobile telephone which a user possesses.
- This allows the user to obtain information on the approaching person approaching the door while staying at a remote location.
- the present invention has been made under the circumstances described above, and it is an object of the present invention to notify the approach of a third party at an appropriate timing while securing the security of the facility.
- a security system is A communication terminal owned by the user, An electronic key for transmitting a first identification code on condition that short distance communication with the communication terminal is established; A communication unit for receiving the first identification code transmitted from the electronic key; A determination unit that determines the identity between the first identification code and the first registration information by comparing the first identification code with first registration information registered in advance; A detection unit for detecting a person entering a first area near the door; A photographing unit for photographing the person; A transmitter configured to transmit an image captured by the imaging unit to the communication terminal on condition that the determination result by the determination unit is not positive when the person is detected by the detection unit; Equipped with
- the communication unit outputs a transmission request signal of the first identification code to a second area near the door,
- the electronic key may attempt to communicate with the communication terminal when the transmission request signal is received.
- the first area may be included in the second area.
- a second identification code is assigned to the communication terminal, The communication terminal when the electronic key acquires the second identification code from the communication terminal, and determines that the second identification code is identical to second registration information registered in advance. It may be possible to establish short-range communication with the
- the electronic key may include an interface for receiving a predetermined password, and may transmit the first identification code when the password acquired via the interface is a password registered in advance.
- the communication terminal may be a mobile phone.
- Mobile phones are generally carried by users at all times. Therefore, when the communication terminal is a mobile phone, it is not necessary for the user to carry a new special device in order to secure the security of the facility. Therefore, it is possible to secure the security of the facility without putting a burden on the user.
- the authentication method is It is an authentication method performed when unlocking a door, and Transmitting a first identification code when short-range communication between a communication terminal carried by the user and an electronic key carried by the user is established; Comparing the first identification code with first registration information registered in advance to determine the identity between the first identification code and the first registration information; including.
- the identification code is transmitted from the electronic key only when the short distance communication between the electronic key and the predetermined communication terminal is established. Then, when the transmitted identification code and the pre-registered registration information are not identical, information on the image of the person approaching the door is transmitted to the communication terminal. Thereby, the user can confirm the person who approached the door. On the other hand, when the transmitted identification code and the registered information registered in advance have the sameness, the information on the image of the person approaching the door is not transmitted to the communication terminal. This makes it possible to notify the approach of the third party at an appropriate timing without transmitting image information meaninglessly.
- establishment of short distance communication between the electronic key and the predetermined communication terminal means that the user holding the electronic key also holds the communication terminal.
- the image information is transmitted to the communication terminal only when the suspicious person approaches without the image information being sent meaninglessly to the communication terminal. Therefore, the convenience of the user is improved.
- FIG. 1 is a block diagram showing a schematic configuration of a security system 10 according to the present embodiment.
- the security system 10 is a system that performs, for example, unlocking and locking of a door of a vehicle according to the position of the user 90 who holds the electronic key 70.
- the security system 10 is a security system that executes an authentication method described later when unlocking the door.
- the security system 10 includes a control device 20, a human sensor 30, a photographing unit 40, a door lock system 50, a wireless communication unit 60, and an electronic key 70.
- the control device 20 is mounted on a vehicle to be subjected to security measures.
- the control device 20 is a computer having a central processing unit (CPU) 21, a main storage unit 22, an auxiliary storage unit 23, a display unit 24, an input unit 25, and an interface unit 26.
- the CPU 21 executes processing described later in accordance with the program stored in the auxiliary storage unit 23.
- the main storage unit 22 has a RAM (Random Access Memory) and the like.
- the main storage unit 22 is used as a work area of the CPU 21.
- the auxiliary storage unit 23 has a non-volatile memory such as a ROM (Read Only Memory), a magnetic disk, or a semiconductor memory.
- the auxiliary storage unit 23 stores programs executed by the CPU 21 and various parameters. Further, information on an image output from the photographing unit 40 and information including a processing result by the CPU 21 are sequentially stored.
- the display unit 24 has a display unit such as an LCD (Liquid Crystal Display).
- the display unit 24 displays the processing result of the CPU 21 and the like.
- the input unit 25 includes an input key and a pointing device such as a touch panel.
- the operator's instruction is input via the input unit 25 and notified to the CPU 21 via the system bus 27.
- the interface unit 26 is configured to include a serial interface, a parallel interface, a LAN (Local Area Network) interface, and the like.
- the human sensor 30, the imaging unit 40, the door lock system 50, and the wireless communication unit 60 are connected to the system bus 27 via the interface unit 26.
- the human sensor 30 is, for example, an infrared sensor that detects a temperature difference between a person and the surroundings.
- FIG. 2 is a view showing the arrangement of the human sensor 30. As shown in FIG. As shown in FIG. 2, the human sensor 30 is provided on a door handle of a front door constituting the vehicle 100. The human sensor 30 senses a person who enters a region (hereinafter, a detection area DA) surrounded by a circle C2 having a radius of about 1 m, with the human sensor 30 as a center. Then, for example, an electrical signal that becomes high level when sensing a person is output.
- a detection area DA a region surrounded by a circle C2 having a radius of about 1 m
- the photographing unit 40 has two cameras provided on the left and right door handles of the vehicle 100, as shown in FIG. The angle of view and the mounting position of each of the cameras 40a are adjusted such that the periphery of the face of the person approaching the vehicle 100 is positioned within the field of view.
- the photographing unit 40 photographs a person approaching the vehicle 100 based on an instruction of the CPU 21. Then, information on the image acquired by photographing is output.
- the door lock system 50 locks and unlocks the door of the vehicle 100 based on an instruction of the CPU 21.
- the wireless communication unit 60 has two antennas 60a respectively provided on the left and right door handles.
- the wireless communication unit 60 communicates with the electronic key 70 in an area (hereinafter referred to as a communication area CA) centered on the antenna 60a and having a radius of about 2 m via the antenna 60a.
- the electronic key 70 is a communication terminal capable of performing short distance communication with the mobile phone 80 using, for example, Bluetooth (registered trademark).
- the electronic key 70 can also communicate with the wireless communication unit 60.
- a predetermined identification code ID1 is assigned to the electronic key 70. Then, when short distance communication is established between the electronic key 70 and the portable telephone 80, when the identification code request signal (identification code transmission request signal) transmitted from the wireless communication unit 60 is received, the identification code ID1 Send information about
- FIG. 3 is a flow chart showing a series of processes executed by the CPU 21 when unlocking the door of the locked vehicle 100.
- FIG. 4 is a flow chart showing a series of processing executed by the electronic key 70.
- the operation of the security system 10 will be described with reference to FIGS. 3 and 4.
- the CPU 21 transmits an identification code request signal to the communication area CA via the wireless communication unit 60 (step S201).
- the electronic key 70 receives the identification code (ID1) request signal transmitted from the wireless communication unit 60. (Step S301: Yes).
- the electronic key 70 searches for communication devices capable of establishing a short distance wireless communication network (step S302).
- the electronic key 70 When the electronic key 70 detects a communication terminal capable of executing short distance communication as a result of executing the search (step S303: Yes), it requests transmission of information on the identification code ID2 assigned to the communication terminal. An identification code (ID2) request signal is sent out (step S304). Then, when information related to the identification code ID2 transmitted from the communication terminal that has received the identification code request signal is received (step S305: Yes), authentication processing for the identification code ID2 is executed (step S306).
- ID2 identification code
- This authentication process is a process of comparing the registration information registered in advance in the electronic key 70 with the identification code ID2 transmitted from the communication terminal as the identification code of the mobile phone 80 possessed by the user 90.
- the electronic key 70 determines that the identification code ID2 transmitted from the communication terminal and the registration information are identical as a result of executing the authentication process, the portable telephone 80 in which the communication terminal is possessed by the user 90. It authenticates as (step S307: Yes). Thus, communication between the electronic key 70 and the mobile phone 80 is established.
- the electronic key 70 transmits information on the identification code ID1 assigned to the electronic key 70 (step S308).
- the electronic key 70 has not received the identification code (ID1) request signal (step S301: No)
- the communication key capable of executing short distance communication is not detected (step S303: No)
- the information on the identification code ID2 is not received (step S305: No)
- the identification code ID2 transmitted from the communication terminal is not identical to the registration information (step S307: No)
- the process returns to step S301.
- step S201 when the CPU 21 transmits an identification code request signal (step S201), the CPU 21 monitors the signal from the human sensor 30, thereby attempting to detect an approaching individual (adapter) who has entered the detection area DA (step S202). .
- step S202 Yes
- the CPU 21 instructs the photographing unit 40 to photograph the approaching individual (step S203). As a result, the approaching person approaching the vehicle 100 is photographed.
- step S202 When the CPU 21 does not detect an approaching individual (step S202: No) or when the process of step S203 is completed, the CPU 21 confirms the presence or absence of the reception of information related to the identification code ID1 (step S204). Then, when the CPU 21 can not confirm that the information related to the identification code ID1 has been received (step S204: No), the CPU 21 transmits the image of the approached person to the mobile phone 80 possessed by the user 90 (step S205). Thereby, the user 90 can confirm the approaching person who has approached the vehicle 100.
- step S204 when the CPU 21 can confirm that the information on the identification code ID1 has been received (step S204: Yes), the CPU 21 executes an authentication process for the identification code ID1 (step S206).
- This authentication process is a process of comparing, as an identification code assigned to the electronic key 70, registration information registered in advance in the auxiliary storage unit 23 with the identification code ID1 transmitted from the electronic key 70.
- the CPU 21 determines that the identification code ID1 transmitted from the electronic key 70 and the registration information have the same identity as a result of executing the authentication process, the electronic key 70 unlocks the door of the vehicle 100. It authenticates as what is an electronic key of (step S207: Yes). Then, the CPU 21 instructs the door lock system 50 to unlock the door of the vehicle 100 (step S208). Thereby, the door of the vehicle 100 is unlocked. When the door of the vehicle 100 is unlocked, the CPU 21 ends the process for unlocking the door.
- step S207 determines that the identification information and the registration information transmitted from the electronic key 70 do not have the same identity as a result of executing the authentication process (step S207: No)
- the image of the approached person photographed Are transmitted to the mobile phone 80 possessed by the user 90 (step S205).
- the user 90 can confirm the approaching person who has approached the vehicle 100.
- the security system 10 when the identification code request signal transmitted from the control device 20 is received by the electronic key 70, the electronic key 70 and the portable telephone held by the user 90 Information on the identification code ID1 of the electronic key 70 is transmitted from the electronic key 70 only when the short distance communication is established with the terminal 80. And if the information regarding this identification code ID1 is received by the control apparatus 20, the lock of the door which comprises the vehicle 100 will be cancelled
- the identification code request signal transmitted from the control device 20 is received by the electronic key 70, short distance communication has not been established between the electronic key 70 and the portable telephone 80 carried by the user 90. In this case, the information related to the identification code ID1 of the electronic key 70 is not transmitted from the electronic key 70.
- the imaging unit 40 captures an image of the third party. Then, only when the short distance communication between the electronic key 70 and the portable telephone 80 is not established, the information on the photographed image is transmitted to the portable telephone 80.
- the information on the image captured by the user 90 is not transmitted to the mobile phone 80.
- a third party other than the user 90 approaches the vehicle 100, an image obtained by photographing the third party regardless of whether the third party holds the electronic key 70 or not.
- Information related to the above is transmitted to the mobile phone 80 possessed by the user 90. Therefore, image information is transmitted to the mobile phone 80 possessed by the user 90 only when a third party approaches the vehicle 100. As a result, unnecessary image information is not transmitted to the mobile phone 80 possessed by the user 90.
- step S202 when the approaching individual is detected in step 202 (step S202: Yes), photographing of the approaching individual is performed in step 203. Then, in step S205, the image information is transmitted to the mobile phone 80 possessed by the user 90. If the approaching individual is not detected in step 202 (step S202: No), the approaching individual is not photographed, and the image information is not transmitted in step S205.
- step S207 if the determination in step S207 is negative and the photographing of the approaching individual is not performed, the process may return to step S202. Thereby, the detection of the approaching individual (step S202) and the photographing of the approaching individual (step S203) are performed, and the determination in step S207 is negative, and the photographing of the approaching individual is not performed. Even in this case, the image can be transmitted to the mobile phone 80 possessed by the user 90. This enables the security system to operate based on more up-to-date information.
- the electronic key 70 transmits the information related to the identification code ID1 only when the short distance communication is established between the electronic key 70 and the mobile phone 80.
- the electronic key 70 is provided with an interface such as a push button, and the electronic key 70 transmits information related to the identification code ID1 when a predetermined password is input through the interface. It is also good. As a result, even when the user 90 does not have the mobile phone 80, the user can unlock the door of the vehicle 100 by inputting the password to the electronic key 70.
- the communication area CA includes the detection area DA.
- the present invention is not limited to this, and the communication area CA and the detection area DA may have the same size.
- the electronic key 70 transmits information related to the identification code ID1 on the condition that short distance communication has been established between the electronic key 70 and the mobile phone 80 possessed by the user 90.
- the electronic key 70 is operated on condition that short distance communication is established between the communication terminal and the electronic key 70. May transmit information on the identification code ID1. Also in this case, information on the image of the user 90 is not transmitted meaninglessly. Therefore, the user 90 can confirm a third party approaching the vehicle 100 without stress.
- the image information is transmitted.
- the present invention is not limited to this, and it is also possible to intimidate a third party by sounding a horn or lighting a headlight or the like in combination with transmission of image information.
- the vehicle may not be used by locking the steering wheel, the accelerator, and the seat belt or disabling the start of the engine.
- the human sensor 30 detects the approach of a third party.
- the present invention is not limited to this, and the image taken by the camera 40a may be subjected to image processing to detect a third person approaching the vehicle.
- the image information is transmitted when a third party approaches.
- the position information of the vehicle 100 may be transmitted together with the transmission of the image information.
- This position information can be acquired, for example, by using a GPS (Global Positioning System).
- the electronic key 70 is an electronic key for unlocking the door of the vehicle 100 when it is determined that the identification code ID1 transmitted from the electronic key 70 and the registration information are identical. It authenticates as a certain thing (step S207: Yes). Then, the door lock system 50 is instructed to unlock the door of the vehicle 100 (step S208).
- the present invention is not limited thereto, and after the electronic key 70 is authenticated as an electronic key for unlocking the door of the vehicle 100 (step S207: Yes), when the user 90 further detects gripping of the door handle Alternatively, the door lock system 50 may be instructed to unlock the door only when the user's operation of the door switch is detected.
- step S207 when the electronic key 70 is authenticated as an electronic key for unlocking the door of the vehicle 100 (step S207: Yes), the door lock system 50 unlocks the door of the vehicle 100.
- step S208 An example is given (step S208).
- whether or not the door lock system 50 is instructed to unlock the door may be determined according to other conditions regardless of the success or failure of the authentication.
- the CPU 21 can transmit the image information to the mobile phone 80 and then execute a further determination process to determine whether to instruct unlocking of the door. Even in this case, since the image information is transmitted to the mobile phone 80, the user can know that there is a third party approaching the door, and can confirm the image of the third party.
- the security system 10 is used for the vehicle 100 .
- the security system 10 of the present invention is suitable for equipment used by a specific user, such as a single-family house or an apartment.
- the CPU 21 of the control device 20 executes a program stored in the auxiliary storage unit to execute a series of processes.
- the control device 20 may be configured by hardware.
- the program stored in the auxiliary storage unit 23 of the control device 20 is a computer such as a flexible disk, a compact disk read-only memory (CD-ROM), a digital versatile disk (DVD), a magneto-optical disk (MO) or the like.
- the program may be stored in a readable recording medium and distributed, and the program may be installed in a computer to configure an apparatus that executes the above-described processing.
- the program may be stored in a disk device or the like included in a predetermined server device on a communication network such as the Internet, for example, superimposed on a carrier wave and downloaded to a computer.
- the security system of the present invention is suitable for maintaining the security of equipment. Further, the authentication method of the present invention is suitable for the authentication process executed when the door is unlocked.
- Controller CPU 22 main storage unit 23 auxiliary storage unit 24 display unit 25 input unit 26 interface unit 27 system bus 30 human sensor 40 shooting unit 40a camera 50 door lock system 60 wireless communication unit 60a antenna 70 electronic key 80 mobile phone 90 user 100 vehicle C1 Yen C2 Yen CA Communication Area DA Detection Area
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Mechanical Engineering (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
Selon l'invention, tant qu'une communication de courte portée entre une clé électronique (70) et un téléphone mobile (80) porté par un utilisateur (90) est établie, la clé électronique (70) transmet des informations concernant le code d'identification de la clé électronique (70). A moins que les informations concernant le code d'identification transmises à partir de la clé électronique (70) et que des informations enregistrées à l'avance ne soient identifiées positivement, des informations d'image d'un tiers approchant le véhicule sont transmises. Par conséquent, la sécurité peut être maintenue et l'utilisateur (90) portant un terminal de communication peut être notifié de l'approche d'un tiers à un moment approprié.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012546897A JPWO2012073978A1 (ja) | 2010-12-02 | 2011-11-29 | セキュリティシステム及び認証方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-269742 | 2010-12-02 | ||
JP2010269742 | 2010-12-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012073978A1 true WO2012073978A1 (fr) | 2012-06-07 |
Family
ID=46171907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/077584 WO2012073978A1 (fr) | 2010-12-02 | 2011-11-29 | Système de sécurité et procédé d'authentification |
Country Status (2)
Country | Link |
---|---|
JP (1) | JPWO2012073978A1 (fr) |
WO (1) | WO2012073978A1 (fr) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014199548A (ja) * | 2013-03-29 | 2014-10-23 | 綜合警備保障株式会社 | 飛行制御システム及び飛行制御方法 |
JP2015083408A (ja) * | 2013-10-25 | 2015-04-30 | Kddi株式会社 | 距離測定システム |
CN104842938A (zh) * | 2015-04-20 | 2015-08-19 | 杨尧任 | 车辆多重验证的控制方法 |
JP2015169008A (ja) * | 2014-03-07 | 2015-09-28 | 株式会社東海理化電機製作所 | スマートシステム |
GB2529817A (en) * | 2014-09-02 | 2016-03-09 | Robin Geoffrey Nixon | Key module |
CN107665557A (zh) * | 2017-11-06 | 2018-02-06 | 佛山市章扬科技有限公司 | 一种基于互联网的智能防盗门 |
CN109035650A (zh) * | 2018-08-03 | 2018-12-18 | 叶春林 | 简便家用防盗系统 |
JP2019034638A (ja) * | 2017-08-14 | 2019-03-07 | 本田技研工業株式会社 | 車両制御装置、車両、車両制御方法およびプログラム |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005092622A (ja) * | 2003-09-18 | 2005-04-07 | Nec Fielding Ltd | 防犯監視システム、防犯監視方法、および、防犯監視プログラム |
JP2008057112A (ja) * | 2006-08-29 | 2008-03-13 | Matsushita Electric Ind Co Ltd | 入退室管理システム及びそのプログラム |
-
2011
- 2011-11-29 WO PCT/JP2011/077584 patent/WO2012073978A1/fr active Application Filing
- 2011-11-29 JP JP2012546897A patent/JPWO2012073978A1/ja active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005092622A (ja) * | 2003-09-18 | 2005-04-07 | Nec Fielding Ltd | 防犯監視システム、防犯監視方法、および、防犯監視プログラム |
JP2008057112A (ja) * | 2006-08-29 | 2008-03-13 | Matsushita Electric Ind Co Ltd | 入退室管理システム及びそのプログラム |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014199548A (ja) * | 2013-03-29 | 2014-10-23 | 綜合警備保障株式会社 | 飛行制御システム及び飛行制御方法 |
JP2015083408A (ja) * | 2013-10-25 | 2015-04-30 | Kddi株式会社 | 距離測定システム |
WO2015060040A1 (fr) * | 2013-10-25 | 2015-04-30 | Kddi株式会社 | Système de mesure de distance |
JP2015169008A (ja) * | 2014-03-07 | 2015-09-28 | 株式会社東海理化電機製作所 | スマートシステム |
GB2529817A (en) * | 2014-09-02 | 2016-03-09 | Robin Geoffrey Nixon | Key module |
US9821767B2 (en) | 2014-09-02 | 2017-11-21 | Robin Geoffrey NIXON | Key module |
GB2529817B (en) * | 2014-09-02 | 2020-09-23 | Geoffrey Nixon Robin | Key module |
CN104842938A (zh) * | 2015-04-20 | 2015-08-19 | 杨尧任 | 车辆多重验证的控制方法 |
JP2019034638A (ja) * | 2017-08-14 | 2019-03-07 | 本田技研工業株式会社 | 車両制御装置、車両、車両制御方法およびプログラム |
CN107665557A (zh) * | 2017-11-06 | 2018-02-06 | 佛山市章扬科技有限公司 | 一种基于互联网的智能防盗门 |
CN109035650A (zh) * | 2018-08-03 | 2018-12-18 | 叶春林 | 简便家用防盗系统 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2012073978A1 (ja) | 2014-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012073978A1 (fr) | Système de sécurité et procédé d'authentification | |
JP6670801B2 (ja) | カーシェアリングシステム及びカーシェアリング用プログラム | |
US9751497B2 (en) | Vehicle control apparatus | |
JP5999108B2 (ja) | 車両遠隔操作情報提供装置、車載遠隔操作情報取得装置及びこれらの装置を備えた車両遠隔操作システム | |
JP4186440B2 (ja) | 車両搭載機器の制御システム、携帯電話機、及び車両搭載機器の制御方法 | |
CN112116735A (zh) | 一种智能锁解锁方法及相关设备 | |
JP4636171B2 (ja) | 車両用生体認証システム | |
JP4389838B2 (ja) | 遠隔操作装置、遠隔操作装置の制御方法、遠隔操作システム | |
JP6451622B2 (ja) | 車載装置及び認証システム | |
EP3287331A1 (fr) | Appareil de sécurité pour automobiles et procédés associés | |
CN109840973B (zh) | 一种基于人脸识别的共享单车自动开锁方法及控制系统 | |
WO2015174012A1 (fr) | Système de clé électronique | |
US10220814B2 (en) | Vehicle control system | |
JP2008037414A (ja) | 車両通信システム | |
JP4035719B2 (ja) | 車両盗難防止システム及び方法 | |
JP2014151884A (ja) | 通信システム、車載機及び携帯機並びに通信方法 | |
JP2010126949A (ja) | 電子キーシステム | |
JP2007251557A (ja) | 認証処理システムおよび認証処理方法、通信装置および通信方法、並びに認証装置および認証方法 | |
JP2014150425A (ja) | 制御システム | |
JP2004102940A (ja) | 認証システム | |
JP3736725B2 (ja) | 車両盗難防止システム | |
JP2010221958A (ja) | 車両防犯システム | |
JP7206794B2 (ja) | 移動体制御システム | |
JP3839708B2 (ja) | 車両盗難検出システム | |
JP6414526B2 (ja) | 遠隔操作システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11845397 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2012546897 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11845397 Country of ref document: EP Kind code of ref document: A1 |