WO2014024428A1 - 機器制御方法、機器制御システム及びサーバ装置 - Google Patents
機器制御方法、機器制御システム及びサーバ装置 Download PDFInfo
- Publication number
- WO2014024428A1 WO2014024428A1 PCT/JP2013/004651 JP2013004651W WO2014024428A1 WO 2014024428 A1 WO2014024428 A1 WO 2014024428A1 JP 2013004651 W JP2013004651 W JP 2013004651W WO 2014024428 A1 WO2014024428 A1 WO 2014024428A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- function
- operation instruction
- operation terminal
- execution
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/40—Remote control systems using repeaters, converters, gateways
- G08C2201/42—Transmitting or receiving remote control signals via a network
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/90—Additional features
- G08C2201/93—Remote control using other portable devices, e.g. mobile phone, PDA, laptop
Definitions
- the present invention relates to a device control system, and more particularly to a device control technology by remote operation.
- a home appliance remote control system that collectively manages a plurality of electrical appliances corresponding to such remote operation is disclosed in Patent Document 1.
- identification information for specifying the electric appliance and a remote operation command are associated with each other and registered in the center apparatus.
- the user accesses the center device using an operation terminal such as a mobile communication terminal, reads out information on the electrical appliance to be operated from the center device, and instructs the electrical appliance to operate I do.
- the center device Upon receiving the operation instruction from the user, the center device transmits a remote operation command corresponding to the operation instruction to the electrical appliance, and the electrical appliance executes processing according to the received remote operation command.
- the center apparatus transmits a remote operation command corresponding to the operation instruction to the electrical appliance to be operated.
- a third party who does not have a legitimate operation authority can give an operation instruction if the center device can be accessed.
- the electrical appliance can receive the received remote operation. Processing is executed according to the command. That is, there is a problem that even if an operation instruction that should not be executed (hereinafter referred to as “inappropriate operation instruction”) is given, the process is executed in accordance with the operation instruction. .
- the present invention has been made in view of such a problem, and an object of the present invention is to provide a device control method capable of suppressing remote operation of a device due to such an inappropriate operation instruction.
- an apparatus control method is an apparatus control method in an apparatus control system that remotely operates an apparatus via a server device using an operation terminal, and operates the apparatus.
- An operation instruction receiving step for receiving an operation instruction for receiving from the operation terminal, an environment information acquiring step for acquiring environment information related to at least one of the device and the operation terminal when the operation instruction is received, and the operation instruction
- a determination step for determining whether or not to execute the process according to the determination based on whether or not the environmental information satisfies a predetermined condition, and a positive determination in the determination step , Causing the device to execute an execution command for performing a process according to the operation instruction, and if a negative determination is made, the execution command is not executed Characterized in that it comprises a row restriction step.
- the device control method of the present invention it is determined whether or not to execute the process indicated by the operation instruction based on the environment information related to the device and the operation terminal when performing the remote operation. Remote operation of the device due to inappropriate operation instructions can be suppressed.
- FIG. 1 is a schematic diagram illustrating a system configuration of a device control system 100 according to Embodiment 1.
- FIG. Schematic of the external appearance in an example of the operation terminal 130.
- FIG. The hardware block diagram of the operation terminal 130.
- FIG. The functional block diagram of the principal part of the operating terminal 130.
- 1 is a hardware configuration diagram of a first security module 110.
- FIG. Schematic of the external appearance in an example of the device 140.
- FIG. The hardware block diagram of the apparatus 140.
- FIG. The functional block diagram of the principal part of the apparatus 140.
- FIG. The figure which shows an example of the data structure of device information 1000, and data.
- the hardware block diagram of the 2nd security module 120 The hardware block diagram of the principal part of the 2nd security module 120.
- FIG. The hardware block diagram of the home gateway 150.
- FIG. The functional block diagram of the principal part of the home gateway 150.
- the hardware block diagram of the server apparatus 160 FIG. The functional block diagram of the principal part of the server apparatus 160.
- the flowchart of the process of the operation terminal 130 at the time of giving an operation instruction. 5 is a flowchart of processing of a server device 160 in the first embodiment.
- the flowchart which shows an example of the specific process of determination whether the execution of the function shown by the operation instruction
- FIG. An example of UI (user interface) in the operation terminal 130.
- FIG. 10 The conceptual diagram of the apparatus control system 100B in Embodiment 2.
- FIG. 10 The figure which shows an example of the data structure of user information 1800B, and data.
- 10 is a flowchart of processing in a server device 160 according to the second embodiment.
- 10 is a process flowchart of the operation terminal according to the third embodiment.
- 10 is a flowchart of processing in a server device 160 according to the third embodiment.
- FIG. An example of UI in the operation terminal 130 of Embodiment 3.
- FIG. The figure which shows an example of the data structure and data of user information 1800C of a modification.
- 9 is a UI modification example of the operation terminal according to the third embodiment.
- Embodiment 1> ⁇ 1.1 Overview>
- a device control system capable of controlling a device arranged in a home using an operation terminal taken out of the home will be described.
- the server device when the server device receives an operation instruction from the operation terminal, the server device acquires environment information from the operation terminal and the operation target device. Then, referring to the environmental conditions stored in advance for each function indicated by the operation instruction, the function indicated by the operation instruction is selected as the operation target only when the acquired environmental information satisfies these environmental conditions. Control the device to execute.
- the environmental information refers to information indicating the position of the operation terminal and the operation target device, information indicating the operation state, information regarding the season and date and time, surrounding conditions (for example, temperature, humidity, brightness, Whether there is a person, etc.), and information on authority and priority for operation, etc., and information that can be acquired by the operation terminal, devices, sensors provided in these, and the like.
- the device control method even when the user gives an instruction to operate the device by remote operation, the environmental information when the operation instruction is given does not satisfy a predetermined environmental condition. Since the server device suppresses the execution of the function, the execution of the function determined to be an inappropriate operation instruction can be suppressed.
- FIG. 1 is a schematic diagram showing a system configuration of a device control system 100 according to the present embodiment.
- the device control system 100 includes an operation terminal 130, a first security module 110, devices 140A to 140C, a second security module 120A to a second security module 120C, and a home gateway 150. , A server apparatus 160, a network 170, and a base station 180.
- a network 170 is a network connected to a home gateway 150, a server device 160, and a base station 180, and has a function of transmitting signals between the connected devices.
- a base station 180 is a so-called telecommunications business radio base station that is connected to a network 170 and communicates with an operation terminal 130 using a commercial mobile phone radio communication line. And the server device 160 have a function of relaying communication.
- FIG. 2 is a perspective view showing the external appearance of the operation terminal 130 and the first security module 110.
- the operation terminal 130 is a so-called smartphone-type mobile communication terminal, and the first security module 110 is detachably attached thereto.
- the operation terminal 130 has a receiver hole 710 for transmitting the sound output from the receiver 270 to the outside of the housing on the main surface of the housing, and the sound outside the housing to the microphone 280.
- a microphone hole 720 for transmission is formed, and the main surface of the touch panel 240 is further arranged.
- a security module insertion hole 730 is formed on the side surface of the housing.
- a connector 260 is arranged in the back of the security module insertion hole 730.
- the first security module 110 is also used as the connector 560 in its housing itself.
- the housing of the first security module 110 that is, the connector 560 is inserted into the security module insertion hole 730, so that the connector 260 and the connector 560 are connected, and the first security module 110 is attached to the operation terminal 130. Will be.
- the connector 260 has an electrode group 740 composed of a plurality of metal electrodes
- the housing of the first security module 110 that is, the connector 560 has an electrode group 750 composed of a plurality of metal electrodes.
- FIG. 3 is a circuit diagram of the operation terminal 130.
- the operation terminal 130 includes a CPU (Central Processing Unit) 200, a communication LSI (Large Scale Integration) 210, an antenna 220, a touch panel controller 230, a touch panel 240, a memory 250, The connector 260, the receiver 270, the microphone 280, and the battery 290 are comprised.
- CPU Central Processing Unit
- LSI Large Scale Integration
- the antenna 220 is connected to the communication LSI 210 and used for communication performed by the communication LSI 210, for example, a metal monopole antenna.
- the communication LSI 210 is connected to the antenna 220 and the CPU 200, is controlled by the CPU 200, modulates a transmission signal sent from the CPU 200, and uses the antenna 220 to convert the modulated signal to the base station 180.
- the communication performed between the communication LSI 210 and the base station 180 is performed using a commercial mobile phone wireless communication line compliant with a communication standard such as LTE (Long Term Term Evolution).
- LTE Long Term Term Evolution
- the touch panel 240 is connected to the touch panel controller 230 and is controlled by the touch panel controller 230, and has a function of displaying an image and a function of converting a contact operation from a user using the operation terminal 130 into an electrical signal and outputting the electrical signal.
- the touch panel controller 230 is connected to the CPU 200 and the touch panel 240, is controlled by the CPU 200, and has a function of displaying an image based on an image signal transmitted from the CPU 200 on the touch panel 240, and a touch panel 240 by a user using the operation terminal 130. And a function of sending a signal indicating the accepted contact operation to the CPU 200.
- the connector 260 is connected to the CPU 200 and has the following three functions.
- Function 1 A function of detachably attaching the first security module 110 to the operation terminal 130 by connecting to a connector 560 (described later) of the first security module 110.
- Function 2 A function of connecting the operation terminal 130 and the first security module 110 so that they can communicate with each other by wire when the first security module 110 is attached to the operation terminal 130.
- Function 3 A function of transmitting power supplied from the battery 290 to the first security module 120 when the first security module 110 is attached to the operation terminal 130.
- the receiver 270 is connected to the CPU 200, is controlled by the CPU 200, and has a function of converting an electrical signal sent from the CPU 200 into sound and outputting the sound.
- the microphone 280 is connected to the CPU 200 and has a function of converting sound into an electric signal and sending the converted electric signal to the CPU 200.
- the memory 250 is connected to the CPU 200 and includes a RAM (Random Access Memory), a ROM (Read Only Memory), and a flash memory, and stores a program that defines the operation of the CPU 200 and data that the CPU 200 uses.
- RAM Random Access Memory
- ROM Read Only Memory
- flash memory stores a program that defines the operation of the CPU 200 and data that the CPU 200 uses.
- the CPU 200 is connected to the communication LSI 210, the touch panel controller 230, the memory 250, the connector 260, the receiver 270, and the microphone 280, and executes a program stored in the memory 250, thereby executing the communication LSI 210, the touch panel controller 230, and the receiver.
- 270 and a GPS (Global Positioning System) receiver 285 to control the operation terminal 130 to mainly realize the following three functions.
- the operation terminal 130 is controlled, and the operation terminal 130 has a function equivalent to a general function of a smartphone, such as a call function, an Internet site browsing function, a mail transmission / reception function, and a standby function. Function that realizes the function.
- Device operation function A A function for controlling the operation terminal 130 and realizing device operation processing performed by the device control system 100 in cooperation with other components constituting the device control system 100.
- Environment information acquisition function A A function of controlling the GPS receiver 285 and using the GPS to acquire the position information of the own terminal as the environment information of the operation terminal 130.
- GPS receiver 285 When receiving a request from the CPU 200, the GPS receiver 285 has a function of acquiring position information (latitude / longitude values) at the time of the request and outputting it to the CPU 200 as environment information.
- the battery 290 is a secondary battery that can be repeatedly charged, and has a function of supplying power to the electronic components constituting the operation terminal 130.
- FIG. 4 is a block diagram showing a functional configuration of the operation terminal 130.
- the operation terminal 130 includes a control unit 300, a display unit 310, an operation reception unit 320, an SM (security module) communication unit 330, an audio processing unit 340, a communication unit 350,
- the encryption processing unit 360 and the operation terminal information storage unit 370 are configured.
- the display unit 310 is realized by the CPU 200 that executes the program, the touch panel controller 230, and the touch panel 240.
- the display unit 310 is controlled by the control unit 300, generates an image to be presented to the user who uses the operation terminal 130, and displays the image on the touch panel 240. Has the function of
- the operation accepting unit 320 is realized by the CPU 200 that executes the program, the touch panel controller 230, and the touch panel 240, is controlled by the control unit 300, and accepts a touch operation on the touch panel 240 from a user who uses the operation terminal 130. It has a function.
- the environment information acquisition unit 325 is realized by the CPU 200 that executes the program and the GPS receiver 285, and has a function of acquiring environment information (for example, current position information) of the own device. For example, when the environment information is position information, the environment information acquisition unit 325 acquires the current position from the GPS receiver 285 when the operation reception unit 320 receives an operation instruction from the user. The acquired environment information (position information) is transmitted to the server device 160 via the communication unit 350.
- environment information for example, current position information
- the acquired environment information (position information) is transmitted to the server device 160 via the communication unit 350.
- the SM communication unit 330 is realized by the CPU 200 that executes the program and the connector 260, is controlled by the control unit 300, and when the first security module 110 is attached to the operation terminal 130, It has a function to communicate by wire.
- the voice processing unit 340 is realized by the CPU 200 that executes the program, the receiver 270, and the microphone 280, and is controlled by the control unit 300 and has a function of performing voice input / output processing in a call performed by the operation terminal 130.
- the communication unit 350 is realized by the CPU 200 that executes a program, the communication LSI 210, and the antenna 220, is controlled by the control unit 300, and has a function of communicating with the base station 180 using a commercial mobile phone wireless communication line.
- the server device 160 has a function of communicating with the server device 160 via the base station 180 and the network 170.
- the cryptographic processing unit 360 is realized by the CPU 200 that executes the program, and is controlled by the control unit 300, and performs cryptographic processing for performing encryption processing to maintain data confidentiality and integrity, and authentication processing using cryptographic technology And a key sharing processing function for executing key sharing processing using a cryptographic technique.
- the encryption processing means 360 is configured to use AES (Advanced Encrypting Standard) encryption technology, ECDSA (Elliptic Curve Digital Signature Standard) technology, ECDH ( Elliptic Curve Diffie-Hellman (SSL) technology, SSL (Secure Socket Layer) / TSL (Transport Layer Security) technology, etc. are used.
- AES Advanced Encrypting Standard
- ECDSA Elliptic Curve Digital Signature Standard
- ECDH Elliptic Curve Diffie-Hellman
- SSL Secure Socket Layer
- TSL Transport Layer Security
- the operation terminal information storage unit 370 is realized by the CPU 200 that executes a program and a part of a storage area included in the memory 250, and has a function of storing the operation terminal information 400.
- the operation terminal information 400 will be described later.
- the control unit 300 is realized by the CPU 200 that executes a program, and includes a display unit 310, an operation reception unit 320, an environment information acquisition unit 325, an SM communication unit 330, an audio processing unit 340, a communication unit 350, an encryption processing unit 360, and an operation.
- the terminal information storage unit 370 is controlled to have the function of causing the operation terminal 130 to realize the above-described smartphone control function, device operation function A, and environment information acquisition function A.
- FIG. 6 is a circuit diagram of the first security module 110.
- the first security module 110 includes a CPU 500, a memory 550, and a connector 560.
- the connector 560 is connected to the CPU 500 and has the following three functions.
- Function 1 A function of detachably attaching the first security module 110 to the operation terminal 130 by connecting to the connector 260 of the operation terminal 130.
- Function 2 A function of connecting the operation terminal 130 and the first security module 110 so that they can communicate with each other by wire when the first security module 110 is attached to the operation terminal 130.
- Function 3 A function of transmitting the power transmitted from the connector 260 to the electronic components constituting the first security module 110 when the first security module 110 is attached to the operation terminal 130.
- the memory 550 is connected to the CPU 500 and includes a RAM, a ROM, and a flash memory, and stores a program that defines the operation of the CPU 500 and data that the CPU 500 uses.
- the CPU 500 is connected to the memory 550 and the connector 560, and has a function of causing the first security module 110 to realize the following two functions by executing a program stored in the memory 550.
- Device operation function B A function that controls the first security module 110 and realizes device operation processing performed by the device control system 100 in cooperation with other components constituting the device control system 100.
- Environment information transmission function B a function for controlling the first security module 110 and realizing processing for transmitting environment information of the operation terminal 130 to the server device 160.
- FIG. 7 is a block diagram showing a functional configuration of the first security module 110.
- the first security module 110 includes a control unit 600, an operation terminal communication unit 610, and an ID information storage unit 620.
- the ID information storage unit 620 is realized by the CPU 500 that executes a program and a part of a storage area included in the memory 550, and has a function of storing a security module ID that uniquely identifies the own module.
- the security module ID is written in a predetermined storage area in the ROM constituting the memory 550 when the first security module 110 is manufactured. This prevents the security module ID from being falsified.
- the ID information storage means 620 has tamper resistance to the stored security module ID using an encryption technology using software or hardware.
- the operation terminal communication unit 610 is realized by a CPU 500 that executes a program and a connector 560, and is controlled by the control unit 600.
- the operation terminal communication unit 610 is wired to the operation terminal 130. It has a function to communicate with.
- Control means 600 The control unit 600 is realized by the CPU 500 that executes a program, and controls the operation terminal communication unit 610 and the ID information storage unit 620 to cause the first security module 110 to have the aforementioned device operation function B and environment information transmission function B. It has the function to realize.
- the devices 140A to 140C shown in FIG. 1 are home appliances and facility devices each having a function of connecting to various networks including the Internet. Specifically, air conditioner, refrigerator, microwave oven, home bakery, toaster, water heater remote control, washing machine, dryer, dishwasher, vacuum cleaner, gas table, IH equipment, rice cooker, hot water washing toilet seat, electronic lock, door phone , Various lighting equipment, air cleaner, humidifier, various security sensors (human sensor, security sensor), home server, wash basin, electric toothbrush, dryer, beauty home appliance, massage chair, activity meter, body composition meter, etc. Health home appliances, information devices such as personal computers, tablet terminals and smartphones, mobile phones, fax machines, game machines, televisions, recorder devices, audio devices and their remote controllers.
- the device 140 is connected to a home gateway 150 to be described later, and communicates with an external server device 160 via the home gateway 150.
- FIG. 8 is a perspective view showing the external appearance of the device 140 and the second security module 120.
- the device 140 is, for example, an air conditioner.
- the device 140 has a security module insertion hole 1330 formed on the side surface of the casing.
- a connector 860 is disposed behind the security module insertion hole 1330.
- the housing itself of the second security module 120 also serves as the connector 1160.
- the housing of the second security module 120 that is, the connector 1160 is inserted into the security module insertion hole 1330 so that the connector 860 and the connector 1160 are connected, and the second security module 120 is attached to the device 140. It becomes.
- the connector 860 has an electrode group 1340 constituted by a plurality of metal electrodes, and the housing of the second security module 120, that is, the connector 1160 has an electrode group 1350 constituted by a plurality of metal electrodes. Then, in a state where the second security module 120 is attached to the device 140, each of the electrodes constituting the electrode group 1340 and each of the electrodes constituting the electrode group 1350 are electrically connected to each other. As a result, the device 140 and the second security module 120 can communicate with each other by wire.
- FIG. 9 is a circuit diagram of the device 140.
- the device 140 includes a control unit 810, a device main body 820, and a sensor 885.
- the control unit 810 further includes a CPU 800, a connector 860, a memory 850, an input device 870, and an output device 880.
- the device main body 820 is configured by device main body hardware 890.
- the connector 860 is connected to the CPU 800 and has the following three functions.
- Function 1 A function of detachably mounting the second security module 120 on the device 140 by connecting to a connector 1160 (described later) of the second security module 120 (described later).
- Function 2 A function of connecting the device 140 and the second security module 120 so that they can communicate with each other by wire when the second security module 120 is attached to the device 140.
- Function 3 A function of supplying power to the second security module 120 when the second security module 120 is attached to the device 140.
- the input device 870 is connected to the CPU 800 and has a function of converting an operation performed by a user using the device 140 into an electrical signal and sending the electrical signal to the CPU 800. For example, it is realized by an operation panel.
- the output device 880 is connected to the CPU 800 and has a function of displaying images, sounds, and the like based on image signals transmitted from the CPU 800. For example, it is realized by a liquid crystal display and a speaker.
- the memory 850 is connected to the CPU 800 and includes a RAM, a ROM, and a flash memory, and stores a program that defines the operation of the CPU 800 and data that the CPU 800 uses.
- the CPU 800 is connected to the memory 850, the connector 860, the input device 870, the output device 880, the sensor 885, and the device main body hardware 890, and executes the program stored in the memory 850, thereby
- the hardware 890, the input device 870, and the output device 880 are controlled to have the device 140 realize the following three functions.
- Device control function Controls the device 140 so that the device 140 has a function equivalent to a general function of the device, for example, if the device is a TV, a program playback function, a channel switching function, etc.
- the device is a washing machine, it is a function for realizing a rinsing function, a dehydrating function, and the like.
- Device operation function C A function for controlling the device 140 and realizing device operation processing performed by the device control system 100 in cooperation with other components constituting the device control system 100.
- Environmental information acquisition function C A function for controlling the sensor 885 to realize environmental information acquisition processing for the device 140.
- Equipment main body 820 A main component of the device main body 820 is device main body hardware 890.
- the device main body hardware 890 is connected to the CPU 800, is controlled by the CPU 800, and is controlled by the CPU 800, whereby the device 140 which is an electronic device is a hardware group for realizing the function as the electronic device.
- the device main body hardware 890 corresponds to a hardware group including a compressor, a heat exchanger, a blower fan, and the like for realizing a function as an air conditioner.
- the sensor 885 is a sensor for acquiring environmental information related to the device 140.
- the sensor 885 is a temperature sensor, measures the temperature around the device 140 under the control of the CPU 800, and outputs the measurement result to the CPU 800.
- the sensor 885 is a human sensor such as an infrared sensor, detects whether or not there is a person around the device 140, and outputs the detection result to the CPU 800.
- the sensor 885 may be a device such as a GPS receiver, a hygrometer, a clock, or a group of these sensors. Note that the sensor included in each device 140 may be different depending on the type of the device 140.
- FIG. 10 is a block diagram illustrating a functional configuration of the device 140.
- the device 140 includes a control unit 900, a command reception unit 910, an execution unit 920, an SM communication unit 930, an input unit 940, an output unit 950, an environment information acquisition unit 960, and a device information storage unit 970. Consists of
- the command receiving unit 910 is realized by a CPU that executes a program, and has a function of receiving an execution command received from the operation terminal 130 by the second security module 120 via the connector 860 and outputting the command to the control unit 900.
- Executiution means 920 The execution unit 920 is realized by the CPU 800 that executes the program and the device main body hardware 890, and is controlled by the control unit 900.
- the execution command indicating that the control unit 900 causes the device main body hardware 890 to perform a predetermined operation. Is sent, the device main body hardware 890 is used to execute a predetermined operation indicated by the execution command.
- the SM communication unit 930 is realized by a CPU 800 that executes a program and a connector 860, and is controlled by the control unit 900.
- the SM communication unit 930 is wired with the second security module 120. It has a function to communicate with.
- the input unit 940 is realized by the CPU 800 that executes the program and the input device 870, is controlled by the control unit 900, and has a function of receiving an operation performed by the user using the device 140 using the input device 870, and a user When the operation is received, an execution command indicating that the device main body hardware 890 performs the predetermined operation when the operation is an operation indicating that the device main body hardware 890 performs the predetermined operation. It has a function of generating and sending it to the control means 900.
- the output unit 950 is realized by the CPU 800 that executes the program and the output device 880, and is controlled by the control unit 900, and has a function of generating an image to be presented to the user who uses the device 140 and displaying the image on the output device 880. .
- the environment information acquisition unit 960 is realized by the CPU 800 that executes the program and the sensor 885, and is controlled by the control unit 900 to have a function of acquiring the environment information of the device 140.
- the environment information acquisition unit 960 outputs the acquired environment information to the control unit 900.
- the device information storage unit 970 is realized by a CPU 800 that executes a program and a part of a storage area included in the memory 850, and has a function of storing device information 1000.
- the device information 1000 will be described later.
- the control unit 900 is realized by a CPU 800 that executes a program, and includes a command reception unit 910, an execution unit 920, an SM communication unit 930, an input unit 940, an output unit 950, an environment information acquisition unit 960, and a device information storage unit 970.
- the device 140 has a function of controlling and causing the device 140 to realize the device control function, the device operation function C, and the environment information acquisition function C described above.
- the second security module 120A to the second security module 120C will be described using the second security module 120.
- FIG. 12 is a circuit diagram of the second security module 120.
- the second security module 120 includes a CPU 1100, a communication LSI 1110, an antenna 1120, a memory 1150, and a connector 1160.
- the antenna 1120 is connected to the communication LSI 1110 and used for communication performed by the communication LSI 1110, for example, a metal monopole antenna.
- the communication LSI 1110 is connected to the antenna 1120 and the CPU 1100, is controlled by the CPU 1100, modulates a transmission signal sent from the CPU 1100, and uses the antenna 1120 to convert the modulated signal to the home gateway 150.
- communication between the communication LSI 1110 and the home gateway 150 is performed in accordance with the Bluetooth (registered trademark) standard.
- the connector 1160 is connected to the CPU 1100 and has the following three functions.
- Function 1 A function of detachably mounting the second security module 120 on the device 140 by connecting to the connector 860 of the device 140.
- Function 2 A function of connecting the device 140 and the second security module 120 so that they can communicate with each other by wire when the second security module 120 is attached to the device 140.
- Function 3 A function of transmitting the power transmitted from the connector 560 to the electronic components constituting the second security module 120 when the second security module 120 is attached to the device 140.
- the memory 1150 is connected to the CPU 1100 and includes a RAM, a ROM, and a flash memory, and stores a program that defines the operation of the CPU 1100 and data that the CPU 1100 uses.
- the CPU 1100 is connected to the communication LSI 1110, the memory 1150, and the connector 1160, and controls the communication LSI 1110 by executing a program stored in the memory 1150, so that the second security module 120 has the following two functions: It has a function to realize the function.
- Device operation function D A function that controls the second security module 120 and realizes device operation processing performed by the device control system 100 in cooperation with other components constituting the device control system 100.
- Environment information transmission function D A function for controlling the second security module 120 and realizing processing for transmitting environment information output from the device 140 to the operation terminal 130 via the antenna 1120.
- FIG. 13 is a block diagram showing a functional configuration of the second security module 120.
- the second security module 120 includes a control unit 1200, a command confirmation unit 1210, a device communication unit 1230, an ID information storage unit 1240, a communication unit 1250, and an encryption processing unit 1260.
- the communication unit 1250 is realized by a CPU 1100 that executes a program, a communication LSI 1110, and an antenna 1120.
- the communication unit 1250 is controlled by the control unit 1200 and communicates with the home gateway 150 in accordance with the Bluetooth standard. A function of communicating with the server device 160 via the network 170;
- the cryptographic processing means 1260 is realized by the CPU 1100 that executes the program, and is controlled by the control means 1200.
- the cryptographic processing function executes cryptographic processing for maintaining the confidentiality and integrity of data, and authentication processing using cryptographic technology.
- a key sharing processing function for executing key sharing processing using a cryptographic technique.
- the encryption processing means 1260 uses AES encryption technology, ECDSA technology, ECDH technology, SSL / TSL technology, etc. in order to realize these encryption processing function, authentication processing function, and key sharing processing function.
- the command confirmation unit 1210 is realized by the CPU 1100 that executes a program, is controlled by the control unit 1200, and has the following two functions.
- Command confirmation function When the communication unit 1250 receives a signed execution command from the server device 160, the signature is used to verify that the signature of the signed execution command is valid using the cryptographic processing unit 1260. A function that performs verification processing.
- Signature verification result notification function Generates a command included in the signed command that is the target of the signature verification process when the signature verification process can be verified. And a signal indicating that the signature is not valid when it is not possible to verify that the signature is valid. A function to send the control means 1200 to the control means 1200.
- the device communication unit 1230 is realized by a CPU 1100 that executes a program and a connector 1160, is controlled by the control unit 1200, and communicates with the device 140 in a wired manner when the second security module 120 is attached to the device 140. Has the function of
- the ID information storage unit 1240 is realized by the CPU 1100 that executes a program and a part of a storage area included in the memory 1150, and has a function of storing a security module ID child that uniquely identifies the own module.
- the security module ID is written in a predetermined storage area in the ROM constituting the memory 1150 when the second security module 120 is manufactured. This prevents the security module ID from being falsified.
- the ID information storage means 1240 has tamper resistance to the stored security module ID using an encryption technique using software or hardware.
- Control means 1200 The control unit 1200 is realized by the CPU 1100 that executes the program, and controls the command confirmation unit 1210, the device communication unit 1230, the ID information storage unit 1240, the communication unit 1250, and the encryption processing unit 1260 to control the second security module 120. And a function for realizing the device operation function D and the environment information transmission function D described above.
- FIG. 14 is a circuit diagram of the home gateway 150.
- the home gateway 150 includes a CPU 1400, a communication LSI 1410, an antenna 1420, a memory 1450, and a network connection circuit 1460.
- the antenna 1420 is connected to the communication LSI 1410 and used for communication performed by the communication LSI 1410, for example, a metal monopole antenna.
- the communication LSI 1410 is connected to the antenna 1420 and the CPU 1400, is controlled by the CPU 1400, modulates a transmission signal sent from the CPU 1400, and uses the antenna 1420 to convert the modulated signal to the second security. It has a transmission function for transmitting to the module 120, a reception function for receiving a signal transmitted from the second security module 120 using the antenna 1420, and a demodulation function for demodulating the received signal and sending it to the CPU 1400.
- communication between the communication LSI 1410 and the second security module 120 is performed in accordance with the Bluetooth standard.
- the memory 1450 is connected to the CPU 1400 and includes a RAM, a ROM, and a flash memory, and stores a program that defines the operation of the CPU 1400 and data that the CPU 1400 uses.
- the network connection circuit 1460 is connected to the CPU 1400 and the network 170, is controlled by the CPU 1400, receives a signal sent from an external device via the network 170, and sends the signal to the CPU 1400.
- the network connection circuit 1460 is sent from the CPU 1400. And a function of transmitting the received signal to an external device via the network 170.
- the CPU 1400 is connected to the communication LSI 1410, the memory 1450, and the network connection circuit 1460, and controls the communication LSI 1410 and the network connection circuit 1460 by executing a program stored in the memory 1450, thereby controlling the home gateway 150. In addition, it has a function of realizing a communication relay function for relaying communication performed by the server device 160 and the second security module 120.
- FIG. 15 is a block diagram showing a functional configuration of the home gateway 150.
- the home gateway 150 includes a control unit 1500, an SM communication unit 1510, and a server communication unit 1520.
- the SM communication unit 1510 is realized by a CPU 1400 that executes a program, a communication LSI 1410, and an antenna 1420.
- the SM communication unit 1510 is controlled by the control unit 1500 and has a function of communicating with the second security module 120 in accordance with the Bluetooth standard.
- the server communication unit 1520 is realized by the CPU 1400 that executes the program and the network connection circuit 1460, is controlled by the control unit 1500, and has a function of communicating with the server device 160 via the network 170.
- Control means 1500 The control unit 1500 is realized by a CPU 1400 that executes a program, and has a function of controlling the SM communication unit 1510 and the server communication unit 1520 to cause the home gateway 150 to realize the above-described communication relay function.
- FIG. 16 is a circuit diagram of the server device 160.
- the server device 160 is a so-called computer device connected to the network 170, and includes a CPU 1600, a network connection circuit 1660, a memory 1650, and a hard disk drive 1610 as shown in FIG.
- the network connection circuit 1660 is connected to the CPU 1600 and the network 170, is controlled by the CPU 1600, receives a signal sent from an external device via the network 170, and sends the signal to the CPU 1600.
- the network connection circuit 1660 is sent from the CPU 1600. And a function of transmitting the received signal to an external device via the network 170.
- the memory 1650 is connected to the CPU 1600 and includes a RAM, a ROM, and a flash memory, and stores a program that defines the operation of the CPU 1600 and data that the CPU 1600 uses.
- the hard disk drive 1610 is connected to the CPU 1600, has a built-in hard disk, and stores data used by the CPU 1600.
- the CPU 1600 is connected to the network connection circuit 1660, the memory 1650, and the hard disk drive 1610, and controls the network connection circuit 1660 and the hard disk drive 1610 by executing a program stored in the memory 1650, so that the server device 160. In addition, it has a function for realizing the following three functions.
- Device registration function E A function of controlling the server device 160 and realizing device registration processing performed by the device control system 100 in cooperation with other components constituting the device control system 100.
- Device operation function E A function that controls the server device 160 and realizes device operation processing performed by the device control system 100 in cooperation with other components constituting the device control system 100.
- Environment information acquisition function E A function for controlling the server device 160 and realizing processing for acquiring the respective environment information from the operation terminal 130 and the device 140.
- FIG. 17 is a block diagram illustrating a functional configuration of the server device 160.
- the server device 160 includes a control unit 1700, an encryption processing unit 1710, a determination unit 1720, a user information management unit 1730, an environmental condition storage unit 1735, a function information management unit 1740, an environment information acquisition unit 1745, It comprises communication means 1750 and command issuing means 1760.
- the communication unit 1750 is realized by the CPU 1600 that executes the program and the network connection circuit 1660, is controlled by the control unit 1700, and communicates with the second security module 120 via the network 170 and the home gateway 150, and the network. 170 and a function of communicating with the operation terminal 130 via the base station 180.
- the cryptographic processing unit 1710 is realized by the CPU 1600 that executes the program, and is controlled by the control unit 1700.
- the cryptographic processing unit 1710 performs cryptographic processing for maintaining the confidentiality and integrity of data, and authentication processing using cryptographic technology.
- a key sharing processing function for executing key sharing processing using a cryptographic technique.
- the encryption processing means 1710 uses AES encryption technology, ECDSA technology, ECDH technology, SSL / TSL technology, etc. in order to realize these encryption processing function, authentication processing function, and key sharing processing function.
- the user information management unit 1730 is realized by a CPU 1600 that executes a program and a part of a storage area included in the hard disk drive 1610, and has a function of storing user information 1800 and a function of updating stored user information 1800. Have. The user information 1800 will be described later.
- the function information management unit 1740 is realized by a CPU 1600 that executes a program and a part of a storage area included in the hard disk drive 1610.
- the function information management unit 1740 stores a function information 1900 and command information 2000, and stores function information 1900 and And a function of updating the command information 2000.
- the function information 1900 and command information 2000 will be described later.
- the command issuing unit 1760 is realized by the CPU 1600 that executes a program, is controlled by the control unit 1700, and has the following two functions.
- Command generation function a function of generating an execution command for realizing the function to be controlled by the device 140 to be controlled with reference to the function information 1900 and the command information 2000 stored by the function information management unit 1740 .
- Signature adding function When an execution command is generated, a function for generating a signed execution command by performing an electronic signature indicating that the execution command is valid using the cryptographic processing means 1260.
- the user information management unit 1730 is realized by a CPU 1600 that executes a program and a part of a storage area included in the hard disk drive 1610.
- environmental condition information operation condition information 3000, position condition information 3100, date and time condition information 3200, It has a function of storing temperature condition information 3300 and occupancy condition information 3400. These environmental condition information will be described later.
- the environment information acquisition unit is realized by the CPU 1600 that executes the program and the network connection circuit 1660, is controlled by the control unit 1700, acquires the environment information from the operation terminal 130 and the device 140, and outputs the acquired environment information to the control unit 1700.
- the determination unit is realized by the CPU 1600 that executes the program, is controlled by the control unit 1700, refers to the environmental condition information stored in the environmental condition storage unit 1735, and the environmental information acquisition unit 1745 receives the information from the operation terminal 130 and the device 140. Based on the obtained environment information, it has a function of determining whether or not to execute a function in accordance with an operation instruction from the operation terminal 130.
- Control means 1700 The control unit 1700 is realized by a CPU 1600 that executes a program, and includes an encryption processing unit 1710, a determination unit 1720, a user information management unit 1730, an environmental condition storage unit 1735, a function information management unit 1740, an environment information acquisition unit 1745, and a communication unit 1750. And the command issuing means 1760 to have the server device 160 realize the above-described device registration function E, device operation function E, and environment information acquisition function E.
- FIG. 5 is a data configuration diagram of an example of the operation terminal information 400 stored by the operation terminal information storage unit 370.
- the operation terminal information 400 is configured by associating a terminal type 410 and a model number 420 with each other.
- the terminal type 410 is information indicating the type of the operation terminal 130.
- the model number 420 is information indicating the model number of the operation terminal 130.
- the terminal type of the operation terminal 130 is a smartphone, and the model number is P-06D.
- the operation terminal information 400 is stored in advance in the operation terminal information storage unit 370 of the operation terminal 130 by the manufacturer when the operation terminal 130 is manufactured.
- FIG. 11 is a data configuration diagram of an example of the device information 1000 stored by the device information storage unit 970.
- the device information 1000 includes a model 1010, a model number 1020, a function 1030, a secure level 1040, and a command 1050 associated with each other.
- the model 1010 is information indicating the model of the device 140.
- Model number 1020 is information indicating the model number of the device 140.
- the function 1030 is information indicating a function that can be controlled by the operation terminal 130 among the functions of the device 140 as an electronic device.
- the secure level 1040 is information indicating the secure level of the operation terminal 130 that is required when the associated function 1030 is controlled using the operation terminal 130.
- the secure level of the operation terminal 130 refers to the state of the operation terminal 130, and the state where the first security module 110 is attached to the operation terminal 130 and the secure level of the operation terminal 130 is 1.
- a state where the first security module 110 is not attached to the operation terminal 130 is referred to as a secure level 2 of the operation terminal 130.
- the secure level 1 is a level superior to the secure level 2, and the operation terminal 130 having the secure level 1 is associated with the secure level 1 and can be controlled by the operation terminal 130, and the secure level. 2, both of the functions that can be controlled by the operation terminal 130 can be controlled, but the operation terminal 130 with the secure level 2 is associated with the secure level 2. Only the functions that can be controlled by this can be controlled.
- the command 1050 is an execution command for causing the device 140 to realize the associated function 1030.
- the model of the device 140 is an air conditioner
- the model number is CS-X252C
- the functions that can be controlled by the operation terminal 130 are power ON, power OFF, operation switching, and timer set
- the secure level is Functions that can be controlled by one operation terminal 130 are power ON, power OFF, operation switching, and timer set. Functions that can be controlled by the operation terminal 130 having a secure level 2 are those when the power is OFF. It is an example.
- the device information 1000 is stored in advance in the device information storage unit 970 of the device 140 by the manufacturer when the device 140 is manufactured.
- FIG. 18 is a data configuration diagram of an example of user information 1800 stored by the user information management unit 1730.
- the user information 1800 is configured by associating a user name 1810, a user account 1820, a password 1830, attribute information 1840, a model 1850, a model number 1860, and a security module ID 1870.
- the user name 1810 is information indicating the name of the user who uses the device control system 100.
- the user account 1820 is information indicating an account used when the user indicated by the associated user name 1810 logs in to the server device 160.
- the password 1830 is information indicating the hash value of the password used when the user indicated by the associated user name 1810 logs in to the server device 160.
- the login password can be arbitrarily determined and changed by the user.
- the value of the password 1830 corresponding to the changed user is rewritten.
- the attribute information 1840 is information indicating user attribute information (for example, address, telephone number, date of birth, etc.) indicated by the associated user name 1810.
- the model 1850 is information indicating the model of the device 140 or the operation terminal 130 used by the user indicated by the associated user name 1810 among the devices 140 and the operation terminal 130 included in the device control system 100.
- the model number 1860 is information indicating the model number of the device 140 or the operation terminal 130 of the model indicated by the model 1850 associated therewith.
- the security module ID 1870 is information indicating the security module ID stored in the first security module 110 or the second security module 120 that is inserted into the device 140 or the operation terminal 130 having the model number indicated by the associated model number 1860. .
- the device to be remotely operated is registered by the user by logging into the server device 160 and performing a predetermined procedure.
- the user can register a plurality of devices to be remotely operated, and can add or delete devices by rewriting information on the model to be registered.
- FIG. 19 is a data configuration diagram of an example of function information 1900 stored by the function information management unit 1740.
- the function information 1900 is a summary of the device information 1000 stored in each device.
- a function that can be remotely operated and a secure level are associated with each device specified by the model and model number, and are stored in the function information management unit 1740 of the server device 160 in an integrated manner.
- the function information 1900 includes a model 1910, a model number 1920, a function 1930, and a secure level 1940 associated with each other.
- Model 1910 is information indicating the model of the device 140 included in the device control system 100.
- the model number 1920 is information indicating the model number of the device 140 included in the device control system 100.
- the function 1930 is information indicating a function that can be controlled by the operation terminal 130 among the functions as the electronic device of the device 140 having the model number indicated by the associated model number 1920.
- the secure level 1940 is information indicating the secure level of the operation terminal 130, which is required when the associated function 1930 is controlled using the operation terminal 130, and the secure level 1040 (see FIG. 11). Is the same.
- FIG. 20 shows an example of the data structure and data of the command information 2000.
- the command information 2000 includes, as items, a model 2010, a model number 2020, a function 2030, and a command 2040 as shown in FIG.
- model 2010, model number 2020, and function 2030 are the same as the model 1910, model number 1920, and function 1930 of the function information 1900 shown in FIG.
- the command 2040 corresponds to each function indicated by the function 2030, and is an item for storing an execution command for causing the device to execute the function.
- Command information 2000 is stored in function information management means 1740 in the same manner as function information 1900.
- the server device 160 When the server device 160 receives an operation instruction from the operation terminal 130, based on the command information 2000, the server device 160 transmits an execution command corresponding to the function indicated by the operation instruction to the operation target device.
- FIG. 21 shows an example of the data structure and data of the operating condition information 3000.
- the operation condition information 3000 includes, as items, a model 3010, a model number 3020, a function 3030, and an operation condition 3040 as shown in FIG.
- model 3010 The items of model 3010, model number 3020, and function 3030 are the same as the model 1910, model number 1920, and function 1930 of the function information 1900 shown in FIG.
- the operation condition 3040 determines whether or not to execute the function indicated by the function 3030 when an operation instruction for executing the function indicated by the function 3030 is given during the operation indicated by the operation condition 3040.
- This item stores conditions for For example, in the example of FIG. 21, in the case of a device whose model 3010 is “air conditioner” and whose model number 3020 is “CS-X2520C”, the operation instruction indicating “power OFF” indicates that this air conditioner is “running”. Then, it is set to “reject”. In other words, when this condition is set, if the air conditioner is in operation, it is not possible to perform an operation to turn off the air conditioner by remote control. Similarly, switching of driving cannot be performed during “driving”.
- “during operation” means a state in which the power supply of the air conditioner is on and operating.
- the recorder whose model number is “DMR-BZT820” is set so that the power OFF operation cannot be performed during recording. Also, the washing machine with the model number “NA-VH300L” is set to “being washed” and the rice cooker with the model number “SR-SPX103” is set to “being cooked” so that the power cannot be turned off. Has been.
- FIG. 22 shows an example of the data structure and data of the position condition information 3100.
- the position condition information 3100 includes, as items, a model 3110, a model number 3120, a function 3130, and a position condition 3140 as shown in FIG.
- model 3110, model number 3120, and function 3130 are the same as the model 1910, model number 1920, and function 1930 of the function information 1900 shown in FIG.
- the position condition 3140 is indicated by the function 3130 based on the distance between the operation terminal 130 that issued the operation instruction and the operation target device 140 when an operation instruction for executing the function indicated by the function 3030 is given.
- This item stores a condition for determining whether or not to execute a function. For example, in the example of FIG. 22, an air conditioner with the model number “CS-X252C” has “power ON” and “switch operation” when the distance between the operation terminal 130 and the air conditioner when the operation instruction is given is 10 km or less. ”And“ timer set ”functions are allowed to be executed, and if they exceed 10 km, execution of these functions is rejected.
- the function whose position condition 3140 is indicated by “ ⁇ ” it means that the condition is not set as in the operation condition 3040 of the operation condition information 3000.
- the air conditioner with model number 3120 “CS-X252C” is set to permit execution of the “power OFF” function regardless of the distance between the operation terminal 130 and the installation position of the air conditioner. Has been.
- FIG. 23 shows an example of the data structure and data of the date / time condition information 3200.
- the date / time condition information 3200 includes, as items, a model 3210, a model number 3220, a function 3230, and a date / time condition 3240.
- model 3210, model number 3220, and function 3230 are the same as the items of model 1910, model number 1920, and function 1930 of the function information 1900 shown in FIG.
- the date and time condition 3240 indicates whether or not to execute the function indicated by the function 3230 based on the date and time when the operation instruction is given when an operation instruction for executing the function indicated by the function 3230 is given. This is an item for storing conditions for determination. For example, in the example of FIG. 23, if an air conditioner with the model number “CS-X252C” is instructed to switch to “heating” operation in the “operation switching” function, the operation instruction is from June to September. When set in the meantime, it is set to reject execution of the operation instruction to switch to the “heating” operation. Further, even if an operation instruction for switching to the “cooling” operation is performed between November and March, the operation instruction is set to be rejected.
- the washing machine having the model number “NA-VH300L” can be operated even if the operation terminal 130 performs an operation instruction to execute the function of “Power ON” between “22:00 to 5:00”. Execution is rejected, and execution of the “power ON” function is permitted at other times.
- date and time is used in a broad sense related to time, and includes not only “day” and “time” but also “year”, “month” and “season”, for example.
- FIG. 24 shows an example of the data structure and data of the temperature condition information 3300.
- the temperature condition information 3300 includes, as items, a model 3310, a model number 3320, a function 3330, and a temperature condition 3340.
- model 3310 The items of model 3310, model number 3320, and function 3330 are the same as the model 1910, model number 1920, and function 1930 of the function information 1900 shown in FIG.
- the temperature condition 3340 indicates that the function indicated by the function 3330 is based on the temperature at the installation location of the target device when the operation instruction is given when the operation instruction for executing the function indicated by the function 3330 is issued.
- This item stores a condition for determining whether or not to execute.
- the air conditioner with the model number “CS-X252C” has an operation instruction to switch to “heating” operation in the “operation switching” function, and when the temperature is 25 degrees Celsius or higher, The function is set to be rejected. Further, when an operation instruction to switch to “cooling” operation is given, the function is set to be rejected when the temperature is 20 degrees Celsius or less. For functions whose temperature condition is indicated by “ ⁇ ”, this indicates that no condition is set.
- the functions of “power ON”, “power OFF”, and “timer set” are permitted to be executed regardless of the temperature. Is set to
- FIG. 25 shows an example of the data structure and data of the in-room condition information 3400.
- the in-room condition information 3400 includes, as items, a model 3410, a model number 3420, a function 3430, and an in-room 3440, as shown in FIG.
- model 3410 The items of model 3410, model number 3420, and function 3430 are the same as the model 1910, model number 1920, and function 1930 of the function information 1900 shown in FIG.
- the function is executed when it is detected that there is a person around the operation target device when an operation instruction for executing the function indicated by the function 3230 is performed when the user is in the room 3440 It is an item that stores the condition of whether or not.
- the occupancy time 3440 is “rejected”, it indicates that the setting is not executed when it is detected that there is a person around the operation target device, and “permitted” indicates that a person is detected. This indicates that the function is allowed to be executed even if If no person is detected, execution of these functions is permitted.
- an air conditioner with a model number “CS-X252C” has functions of “power ON”, “power OFF”, and “operation switching” when a person is detected around the air conditioner.
- the function of “timer set” is set to permit the execution even when a person is detected.
- the recorder whose model number is “DMR-BZT820” is set so that the function of “Power ON” and “Power OFF” is rejected when a person is detected around it.
- the “recording reservation” function is set to permit execution even when a person is detected.
- FIG. 26 is a flowchart of processing when an operation instruction is given on the operation terminal 130.
- the user When the user remotely operates the device 140, the user logs in to the server device 160 using the operation terminal 130 and gives an operation instruction according to the operation menu.
- the operation terminal 130 receives a user account and a login password that are input by the user to log in to the server device 160 (step S10).
- the received user account and login password are transmitted to the server device 160 via the communication means 350 of the operation terminal 130.
- the security module ID received from the first security module is also transmitted to the server device 160 (step S11).
- step S12 it is determined whether or not the login is approved by the server device 160 (step S12). Specifically, it is determined whether or not approval is made based on information indicating whether or not to permit login sent from the server device 160.
- step S12 NO
- the process returns to step S10.
- step S12 when information indicating that login is permitted is received from the server device 160 (step S12: YES), a list of remotely operable devices is acquired from the server device 160 (step S13).
- the display unit 310 displays a list of acquired devices on the touch panel 240, and while viewing the display, the user operates the touch panel 240 to select an operation target device.
- the operation accepting means 320 accepts the user's operation, and the control means 300 determines an operation target device based on the accepted operation (step S14).
- the user further operates the touch panel 240 to select a function to be executed by the target device.
- the operation receiving unit 320 receives the selected function, and the control unit 300 determines an operation instruction based on the selected function (step S15).
- the control unit 300 transmits the determined operation instruction to the server device 160 via the communication unit 350 (step S16).
- the control unit 300 transmits the environment information acquired by the environment information acquisition unit 325 via the communication unit 350.
- the environment information transmitted by the operation terminal 130 is specifically the current position information (for example, latitude and longitude values) of the operation terminal 130 based on the information related to the position acquired by the GPS receiver 285.
- FIG. 27 is a flowchart of processing in the server device 160 when there is an access related to remote operation from the operation terminal 130.
- the control unit 1700 of the server device 160 receives the login information transmitted from the operation terminal 130 in step S11 of FIG. 26 via the communication unit 1750 (step S20).
- the control unit 1700 authenticates the received login information (step S21).
- control unit 1700 determines that the login of the operation terminal 130 is not permitted (step S22: NO)
- the control unit 1700 transmits information indicating that the login is rejected to the operation terminal 130 via the communication unit 1750 (step S23).
- the process returns to step S20 and waits for input of login information from the operation terminal 130.
- step S22 when it is determined that the login of the operation terminal 130 is permitted (step S22: YES), the control unit 1700 transmits information indicating that the login is permitted to the operation terminal 130 via the communication unit 1750 (step S23). .
- control unit 1700 refers to the user information 1800 stored in the user information management unit 1730, and extracts a list of devices registered in the user account permitted to log in.
- control unit 1700 refers to the function information 1900 stored in the function information management unit 1740, and extracts an operable function for each extracted device. Then, the control unit 1700 transmits the extracted device list and the function list operable for each device to the operation terminal 130 via the communication unit 1750 (step S25).
- the control unit 1700 waits for an operation instruction from the operation terminal 130 (step S26), and receives the operation instruction from the operation terminal 130 (step S26: YES), the environment information (for example, for example) is transmitted to the operation terminal 130 that issued the operation instruction.
- the current position information of the operation terminal is requested (step S27).
- the environment information for example, the current position information of the operation terminal transmitted by the operation terminal 130 in step S17 of FIG. S26 is received (step S28).
- the control unit 1700 requests environmental information from the operation target device 140 via the communication unit 1750 (step S29).
- the environmental information of the device requested by the control unit 1700 includes, for example, the operation state of the device (for example, information indicating whether the device is in operation), the installation position of the device (for example, the latitude and longitude of the installation location), the current Information indicating date and time (including year and month), temperature around the device, and whether or not there is a person around the device. It is assumed that the server device 160 according to the present embodiment requests all of the environment information from the operation target device 140.
- the control unit 1700 receives the environment information related to the device 140 from the operation target device 140 via the communication unit 1750 (step S30).
- the determination unit 1720 includes the environment information received by the control unit 1700, the operation condition information 3000 stored in the environment condition storage unit 1735, the position condition information 3100, the date and time condition information 3200, the temperature condition information 3300, and the occupancy condition.
- the information 3400 is compared, and it is determined whether or not the operation target is permitted to execute the function indicated by the operation instruction on the device (step S31).
- the determination unit 1720 determines that execution of the function indicated by the operation instruction is not permitted (step S31: NO)
- the control unit 1700 sends the operation terminal 130 that has issued the operation instruction to the operation terminal 130 via the communication unit 1750.
- information indicating that execution is not permitted is transmitted (step S32)
- the process returns to step S26, and an operation instruction from the operation terminal 130 is awaited.
- step S31 determines that the execution of the function indicated by the operation instruction is permitted (step S31: YES)
- the command issuing unit 1760 refers to the command information 2000 stored in the function information management unit 1740. Then, the execution command corresponding to the function to be executed is extracted, and the extracted execution command is transmitted to the operation target device 140 via the communication unit 1750 (step S33).
- a procedure for determining whether or not to permit execution of a function when an operation instruction indicating “operation switching (in this case, switching to heating operation)” is performed will be described.
- FIG. 28 is a flowchart of a process for determining whether or not to permit the operation switching in the server device 160 at the time of an operation instruction to switch the operation of the air conditioner that is the operation target device 140 to the heating operation.
- Determination means 1720 determines whether the air conditioner is “in operation” (step S40). Specifically, it is determined that the device 140 is in operation when the operation state of the device, which is one of the environmental information acquired in step S30 in FIG. In the case of YES in step S40, in the operation condition information 3000, the operation condition 3040 corresponding to the function 3030 “operation switching” is “during operation: rejected”, so the operation switching to the heating operation is rejected. The execution command is not transmitted to the device 140 (step S46).
- step S40: NO the determination unit 1720 calculates the distance between the operation terminal 130 that issued the operation instruction and the installation location of the air conditioner, and whether the distance is 10 km or more. Determine whether. Specifically, the position information (for example, latitude and longitude values) of the operation terminal 130 acquired in step S28 in FIG. 27, and the air-conditioner installation position (for example, latitude and longitude values) acquired in step S30 in FIG. Calculate the distance from When it is determined that the calculated distance is 10 km or more (step S41: YES), the process of step S46 is performed. If the calculated distance is less than 10 km (step S41: NO), it is determined whether or not the operation instruction time is between June and September (step S42).
- step S42 information on “month” is extracted from the current date and time acquired in step S30 of FIG. 27, and it is determined whether or not it corresponds to June to September. If the extracted “month” information is from June to September (step S42: YES), the process of step S46 is performed. On the other hand, if it is not from June to September (step S42: NO), it is determined whether or not the temperature of the air conditioner installation location is 25 degrees Celsius or higher (step S43). Specifically, it is determined whether or not the temperature indicated by the temperature around the device acquired in step S30 of FIG. 27 is 25 degrees Celsius or higher. When the temperature indicated by the temperature around the device is 25 degrees Celsius or more (step S43: YES), the process of step S46 is performed.
- the determination unit 1720 determines whether or not there is a person around the air conditioner (step S44). Specifically, the determination is made based on information indicating whether or not there is a person around the device acquired in step S30 of FIG. When the information indicating whether there is a person around the device indicates that there is a person around the device (step S44: YES), the process of step S46 is performed. On the other hand, when the information indicating whether there is a person around the device does not indicate that there is a person around the device (step S45: NO), the determination unit 1720 permits the execution of the function of switching to the heating operation ( Step S45).
- the order of condition comparison is not limited to the order shown in FIG.
- the order of comparison with the registered conditions may be any order. If there are a plurality of conditions permitting the execution of the function indicated by the operation instruction, if any one of the conditions permitting the execution is not satisfied, the determination unit 1720 rejects the execution of the function, Allows execution of the function when the condition is met.
- the value of 10 km used in step S41 is not a fixed value but 10 km set in the position condition 3140 of the position condition information 3100, and when a different value is set in the position condition 3140. Uses the different values. For example, the value used for determining whether to permit “power ON” of the recorder whose model number is “DMR-BZT820” is 50 km.
- step S42 and “25 degrees Celsius” in step S43 are not fixed values, but are the values set in the date and time condition 3240 for each function and the temperature condition 3340, respectively. Use the value set in.
- FIG. 29 is a flowchart of processing of the device 140 that is the operation target when the operation terminal 130 issues an operation instruction.
- the control unit 900 of the device 140 communicates with the second security module 120 connected with the connector 860 of the device 140 via the SM communication unit 930, and the server device 160 is connected via the second security module 120.
- the environmental information acquisition request transmitted in step S29 of 27 is received (step S50: YES).
- step S50: NO When no environment information acquisition request is received from the server device 160 (step S50: NO), the reception of the environment information acquisition request is awaited.
- step S50 the control unit 900 of the device 140 instructs the environment information acquisition unit 960 of the environment information requested for acquisition from the server device 160, and the environment information acquisition unit 960 instructs the control unit 900 to The environmental information is acquired according to the control information, and the acquired environmental information is output to the control unit 900. Then, the control unit 900 outputs the environment information to the second security module 120 via the SM communication unit 930, and the control unit 1200 of the second security module 120 sends the received environment information to the server via the communication unit. It transmits to the apparatus 160 (step S51).
- control unit 900 determines whether or not the execution command from the server device 160 has been received via the second security module 120, and when the reception command has not been received (step S52: NO). The processing from step S50 is repeated. On the other hand, when the command reception means 910 receives an execution command from the server device (step S52: YES), the control means 900 outputs the received execution command to the execution means 920, and the execution means 920 The hardware 890 is caused to execute processing corresponding to the execution command (step S53).
- FIG. 30 shows an example of a UI (user interface) displayed on the display means 310 of the operation terminal 130.
- FIG. 31 is an example of a processing sequence for remote operation.
- step S110 when the user performs remote operation of the device 140, the user inputs his / her user account and password registered in the server device 160 on the login screen 4000 as shown in FIG. Login is performed (step S110). Specifically, when the user inputs a user account and a password and presses an [OK] button, the control means 300 of the operation terminal 130 uses the input user account and password and the security of the first security module 110 as login information. The ID is encrypted by the encryption processing means and transmitted to the server device 160 via the communication means 350.
- the server device 160 authenticates the received login information (step S111). Specifically, the login information transmitted by the operation terminal 130 is received, the received login information is decrypted by the encryption processing unit 1710, and received by referring to the user information 1800 stored in the user information management unit 1730. Validate login information.
- the server device 160 extracts a device registered in the user information 1800 in advance as a device remotely operated by the user specified by the user account, and displays a list of the extracted devices. It transmits to the operation terminal 130 (step S112).
- the operation terminal 130 receives the list of devices transmitted from the server device 160, and displays a device list that can be remotely operated by the user based on the received device list, such as a device menu 4010 in FIG. (Step S113).
- the user selects a device to be remotely controlled from the device list displayed in the device menu 4010. Specifically, for example, when the user presses the air conditioner pull-down button 4011 in the device menu 4010 of FIG. 30 to select the operation of the air conditioner, the operation can be performed as shown in the function menu 4020 of FIG. A list of features is displayed.
- the user further selects a function for performing an operation instruction from the displayed list of functions.
- the power ON / OFF function 4021 is selected.
- the operation terminal 130 displays a setting menu 4030 for the power ON / OFF function 4021 on the display unit 310.
- the user selects an operation to be set using the displayed setting menu 4030. In the example of FIG. 30, an operation to turn on the power is selected.
- operation terminal 130 transmits an operation instruction corresponding to the selected operation to server device 160 (step S114).
- the server device 160 receives the operation instruction transmitted by the operation terminal 130 (step S115).
- the server device 160 transmits a request for environment information (for example, current position information) of the operation terminal 130 to the operation terminal 130 that has transmitted the operation instruction (step S116).
- the operation terminal 130 transmits environment information (for example, current position information) to the server device 160 (step S117).
- environment information for example, current position information
- the server device 160 When the server device 160 receives the environment information transmitted from the operation terminal 130 (step S118), the server device 160 requests the environment information from the operation target device 140 (step S119).
- the device 140 transmits its own environment information to the server device 160 (step S120).
- the server device 160 When the server device 160 receives the environmental information from the device 140 (step S121), the server device 160 stores the environmental conditions stored in advance based on the environmental information received from the operation terminal 130 and the environmental information received from the device 140. Referring to, it is determined whether or not an operation instruction is executed (step S122). When server device 160 determines not to execute the function indicated in the operation instruction from operation terminal 130 (step S122: NO), server device 160 does not execute the function indicated in the operation instruction on operation terminal 130. A message to that effect is transmitted (step S126).
- the operation terminal 130 receives the message transmitted by the server device 160 (step S127), displays the message on the display unit 310, and notifies the user (step S128).
- step S122 when it is determined that the function indicated by the operation instruction from the operation terminal 130 is to be executed (step S122: YES), the server device 160 selects an execution command corresponding to the function indicated by the operation instruction. To the device 140 (step S123).
- the device 140 executes a process indicated by the execution command (step S125).
- the server device 160 determines that the operation instruction from the operation terminal 130 is not executed, the server device 160 does not transmit an execution command to the device 140. In 140, the function is not executed by remote operation.
- the server device 160 determines that the function indicated by the operation instruction from the operation terminal 130 is not executed once, the operation is again performed for the user. Confirm whether to execute the function indicated by the instruction forcibly. When a predetermined condition is satisfied, an execution command for the function indicated by the operation instruction is forcibly transmitted to the device 140.
- the configuration of the device control system 100B is basically the same as that of the device control system 100 of the first embodiment, but differs in that it further includes an operation terminal 130B in addition to the configuration of the device control system 100.
- the configuration and functions of the operation terminal 130B are basically the same as those of the operation terminal 130.
- operation terminal 130B has a function of receiving an e-mail transmitted to an e-mail address registered in e-mail address 1835 of user information 1800B described later. In addition, it has a function of giving an operation instruction for forced execution according to the sent e-mail.
- server device 160 The difference is that the user information management unit 1730 of the server device 160 stores user information 1800B described later instead of the user information 1800.
- the server device 160 of the present embodiment issues an operation instruction when the execution of the function indicated by the operation instruction from the operation terminal 130 is rejected.
- the operation instruction of the forced execution from the operation terminal 130B is verified, it is determined whether or not the forced execution is performed, and the function of performing the forced execution based on the determination is provided.
- items of an email address 1835 and an authority level 1836 are added as compared to the user information 1800.
- the item of the e-mail address 1835 stores an e-mail address of an e-mail transmission destination for inquiring whether to perform forced execution once the execution of the function indicated by the operation instruction is refused. It is.
- the item of authority level 1836 is an item for storing information indicating whether or not the authority to perform forced execution is possessed. When the authority level is “1”, it indicates that there is an authority for forced execution, and when it is “0”, it indicates that there is no authority for forced execution.
- the processing operation of the operation terminal 130 and the processing operation of the device 140 are the same as those of the operation terminal 130 of the first embodiment.
- FIG. 34 is a flowchart of processing in the server device 160 when there is an access related to remote operation from the operation terminal 130.
- step S31 the processing before step S31 is the same as step S20 to step S30 in FIG. 27, and is therefore omitted and illustrated from step S31.
- step S31 since the process after YES in step S31 is the same as the process described in FIG. 27, the process in the case of NO in step S31 will be described.
- step S31 determines whether the execution of the function indicated by the operation instruction from the operation terminal 130 is not permitted.
- the control unit 1700 of the server device 160 refers to the user information 1800B and sends an e-mail address 1835.
- An e-mail for inquiring whether or not to perform forced execution is transmitted to the e-mail address registered in (step S60). In the present embodiment, it is assumed that the e-mail address is received not by operation terminal 130 but by operation terminal 130B.
- the control unit 1700 waits for reception of a forced execution request for a predetermined time (for example, 5 minutes), and ends the process if there is no forced execution request from the operation terminal 130B by the predetermined time (step S61: NO). To do.
- a forced execution request is received from the operation terminal 130B within a predetermined time via the communication unit 1750 (step S61: YES)
- the determination unit 1720 determines that the received forced execution request is valid forced execution. It is determined whether it is a request (step S62). Specifically, for example, when sending an email, the control unit 1700 generates a unique passphrase (for example, an arbitrary character string) for each operation instruction, and uses the generated passphrase as the content of the email. Include and send.
- a unique passphrase for example, an arbitrary character string
- the determining unit 1720 determines whether the received forced execution request is a valid forced execution request based on whether or not the same passphrase as the unique passphrase generated by the control unit 1700 is included. Only when the passphrase included in the received forced execution request matches the passphrase included in the email sent by the control means 1700, the forced execution request is determined to be valid, and the received forced execution is received. If the pass phrase is not included in the request or the pass phrases do not match, it is determined that the request is not valid.
- step S62 determines whether the request is a valid forced execution request (step S62: NO) is a valid forced execution request (step S62: YES).
- step S62: YES determines whether the forced execution request is a request for forced execution from a user having the authority to execute the forced execution. Judgment is made (step S63). Specifically, the determination unit 1720 refers to the user information 1800B, and when the information stored in the authority level 1836 corresponding to the user who has requested the forced execution is “1”, the forced execution is performed. It is determined that there is an authority, and when it is other than “1” (for example, “0”), it is determined that there is no authority for forced execution.
- step S63: NO the control unit 1700 terminates the process as in the case of NO in step S61 or step S62.
- the command issuing unit 1760 refers to the command information 2000 stored in the function information managing unit 1740, and executes the function corresponding to the function to be executed.
- the command is extracted, and the extracted execution command is transmitted to the operation target device 140 via the communication unit 1750 (step S33).
- FIG. 35 is an example of a processing sequence for remote operation according to the second embodiment.
- step S130 the operation before step S130 is the same as step S110 to step S128 of FIG. In FIG. 35, for the sake of convenience of explanation, steps up to step S121 are omitted, and the process is illustrated from step S122.
- step S122 the server device 160 transmits a message indicating that execution of the function indicated in the operation instruction is rejected to the operation terminal 130 that has issued the operation instruction (step S126), and user information 1800B. Is sent to the e-mail address registered in the e-mail address 1835 (step S130). The e-mail sent to the e-mail address is received not by the operation terminal 130 but by the operation terminal 130B (step S131).
- the user confirms the content of the e-mail and determines whether to execute forced execution.
- the user inputs an instruction to perform forced execution to the operation terminal 130B.
- the operation terminal 130B that has received the input from the user transmits a request for forced execution (step S132).
- the server device 160 receives the forced execution request from the operation terminal 130B, and determines whether or not the forced execution request is valid (step S133). Note that the method for determining whether or not it is valid has already been described in step S62 in FIG. When the server apparatus 160 determines that the forced execution request is valid (step S133: YES), the server apparatus 160 determines whether the user who has issued the forced execution request has the authority to execute the forced execution (step S134). Note that the method for determining whether or not the authority for forced execution is present has already been described in step S63 in FIG.
- the server device 160 determines that the user who made the forced execution request has the authority to execute the forced execution, the server device 160 transmits the execution command to the operation target device 140 (step S135).
- the device 140 receives the execution command transmitted by the server device 160 (step S136), and executes processing according to the execution command (step S137).
- step S133 if NO in step S133 or step S134, a message indicating that forced execution is not permitted is transmitted to operation terminal 130B (step S138).
- the operation terminal 130B receives the message indicating the forced execution disapproval (step S139), and displays the forced execution disapproval message on the display unit 310 of the own device (step S140).
- the device control system 100B of the present embodiment allows the user's e-mail address even if the server device 160 once refuses to execute the function indicated by the operation instruction from the operation terminal 130. Whether or not the function indicated by the operation instruction transmitted from the operation terminal 130 is forcibly executed, and is temporarily refused by an instruction from a legitimate user having authority to operate the operation target device. The execution of the function indicated by the operation instruction can be determined again and executed.
- the server device 160 when a user logs in to the server device 160, the server device 160 can acquire environment information of the device registered by the user and execute the function of each device. Is different from the device control system 100 of the first embodiment in that only possible functions are transmitted to the operation terminal 130.
- the user when the user logs in to the server device 160, the user can know the functions that cannot be operated for each registered device. That is, before performing an operation instruction, it is possible to know the devices and functions that can be operated, and it is possible to select an operation from only the functions that can be operated and perform the operation instruction.
- Device control system 100C of the present embodiment has the same configuration as that of device control system 100 of the first embodiment, and will be described using the same reference numerals as in the first embodiment for convenience of explanation.
- the server device 160 according to the present embodiment When the server device 160 according to the present embodiment is logged in to the own device using the operation terminal 130, the environment information for each device registered by the user before the user performs an operation instruction operation. An acquisition request is made, and based on the acquired environmental information, it is determined whether or not each function of each device can be operated.
- the server device 160 according to the first embodiment is different from the server device 160 according to the first embodiment in that it has a function of transmitting information on operable devices and functions to the operation terminal 130 based on the determination result.
- the operation terminal 130 according to the present embodiment displays information on devices and functions that can be operated from the server device 160 before the device menu is displayed after the user operates the terminal and logs in the server device 160.
- the operation terminal 130 according to the first embodiment is different from the operation terminal 130 in that the reception function is provided.
- FIG. 36 is a flowchart of processing when an operation instruction is given on the operation terminal 130.
- the user When the user remotely operates the device 140, the user logs in to the server device 160 using the operation terminal 130 and gives an operation instruction according to the operation menu.
- the operation accepting means 320 of the operation terminal 130 accepts the user account and login password that the user has entered for logging in to the server device 160, and outputs the accepted user account and login password to the control means 300 (step S70). .
- the control unit 300 transmits the received user account and login password to the server device 160 via the communication unit 350 of the operation terminal 130.
- the security module ID received from the first security module is also transmitted to the server device 160 (step S71).
- the user account, the login password, and the security module ID are encrypted by the encryption processing unit 360, and the encrypted information is transmitted to the server device 160.
- step S72 it is determined whether or not login is approved by the server device 160 (step S72). Specifically, it is determined whether or not approval is made based on information indicating whether or not to permit login sent from the server device 160.
- step S72 NO
- the process returns to step S70.
- step S72 when information indicating that login is permitted is received from the server device 160 (step S72: YES), the environment information of the own device is transmitted to the server device 160 (step S73).
- the environment information transmitted in step S73 is the same environment information as the environment information transmitted in step S17 of FIG.
- a list of remotely operable devices is acquired from the server device 160 (step S74).
- the list of devices acquired in step S13 of the first embodiment is all the devices registered by the user, whereas the list of devices acquired in step S74 is registered by the user.
- the existing devices only a device having a function that the server device 160 has determined that the execution of the function can be permitted when an operation instruction is given at the time of login.
- the display unit 310 displays a list of acquired devices on the touch panel 240, and while viewing the display, the user operates the touch panel 240 to select an operation target device.
- the operation accepting means 320 accepts the user's operation, and the control means 300 determines an operation target device based on the accepted operation (step S75).
- the user further operates the touch panel 240 to select a function to be executed by the target device.
- a function to be executed by the target device Only functions that can execute the function are displayed on touch panel 240. That is, even if the user gives an operation instruction, the function that is not executed is not displayed.
- the operation accepting means 320 accepts the selected function, and the control means 300 determines an operation instruction based on the selected function (step S76).
- the control unit 300 transmits the determined operation instruction to the server device 160 via the communication unit 350 (step S77).
- FIG. 37 is a flowchart of processing in the server device 160 when there is an access related to remote operation from the operation terminal 130.
- Step 37 is the same as the processing of Step S20 to Step S24 of FIG. 27 already described in the first embodiment.
- control unit 1700 When the control unit 1700 performs the process of step S24, the control unit 1700 then transmits an environment information acquisition request to the operation terminal 130 (step S85). Then, as a response, the control unit 1700 receives environment information from the operation terminal 130 (step S86).
- control unit 1700 refers to the user information 1800, and transmits an environment information acquisition request to all devices registered by the logged-in user via the communication unit 1750 (step S87).
- the environmental information of the device requested by the control means 1700 is the same as the environmental information requested in step S29 of FIG. 27 already described in the first embodiment.
- the determination unit 1720 can execute the function for each function for all the devices registered by the user. Make a decision. Specifically, it is determined whether or not execution of each function is permitted by the same method as that performed in step S31 of FIG. 27 of the first embodiment. Then, based on the result of the determination, only information on the operable device and function is transmitted to the operation terminal 130 (step S89).
- the command issuing unit 1760 is stored in the function information management unit 1740. Referring to the command information 2000, the execution command corresponding to the function to be executed is extracted, and the extracted execution command is transmitted to the operation target device 140 via the communication unit 1750 (step S91).
- FIG. 38 shows an example of a UI (user interface) displayed on the display means 310 of the operation terminal 130.
- FIG. 39 is an example of a processing sequence for remote operation in the device control system 100C of the present embodiment.
- step S210 when performing remote operation of the device 140, the user inputs his / her user account and password registered in the server device 160 on a login screen 4100 as shown in FIG. Login is performed (step S210). Specifically, when the user inputs a user account and a password and presses an [OK] button, the control means 300 of the operation terminal 130 uses the input user account and password and the security of the first security module 110 as login information.
- the ID is encrypted by the encryption processing unit 360 and transmitted to the server device 160 via the communication unit 350.
- the server device 160 authenticates the received login information (step S211). Specifically, the login information transmitted by the operation terminal 130 is received, the received login information is decrypted by the encryption processing unit 1710, and received by referring to the user information 1800 stored in the user information management unit 1730. Validate login information.
- the server device 160 transmits an environment information acquisition request to the operation terminal 130, and the operation terminal 130 transmits environment information to the server device 160 as a response to the acquisition request. (Step S212). Then, the server device 160 receives the environment information transmitted from the operation terminal 130 (step S213).
- the server device 160 refers to the user information 1800 and makes an environment information acquisition request to all devices registered by the logged-in user (step S214).
- the device 140 that has received the environment information acquisition request from the server device 160 transmits its own environment information to the server device 160 as a response (step S215).
- the server device 160 receives the environmental information of each device from the device that transmitted the environment information acquisition request (step S216).
- the server device 160 refers to the environmental condition information stored in the environmental condition storage unit 1735 based on the environmental information from the operation terminal 130 and each device, and for each function of each device, the function of the function is stored. It is determined whether or not execution is permitted (step S217). Then, the device list and the operation-permitted function information, which are information on the devices and functions determined to be permitted to be executed, are transmitted to the operation terminal 130 (step S218).
- the operation terminal 130 receives a list of devices transmitted from the server device 160, and displays a list of devices that can be remotely operated by the user, such as a device menu 4110 in FIG. 38, based on the received device list. It is displayed on 310 (step S219).
- the user selects a device to be remotely operated from the device list displayed in the device menu 4110. Specifically, for example, when the user presses the air conditioner pull-down button 4111 in the device menu 4110 of FIG. 38 to select the operation of the air conditioner, the operation can be performed as shown in the function menu 4120 of FIG. A list of features is displayed.
- the server device 160 determines that the execution of the functions of the “power ON” and “timer set” of the air conditioner is rejected. In this case, unlike the function menu 4020 of FIG. In the function menu 4120 of FIG. 38, these “power ON” and “timer set” functions are not displayed.
- the user selects a function for performing an operation instruction from the displayed list of functions.
- the “operation switching” function 4121 is selected.
- the operation terminal 130 displays the setting menu 4130 of the “operation switching” function 4121 on the display unit 310.
- the user selects an operation to be set using the displayed setting menu 4130.
- an operation for switching to cooling is selected.
- operation terminal 130 transmits an operation instruction corresponding to the selected operation to server device 160 (step S220).
- the server device 160 receives the operation instruction transmitted by the operation terminal 130 (step S221). When receiving the operation instruction from the operation terminal 130, the server device 160 transmits an execution command corresponding to the operation instruction to the operation target device 140 (step S222).
- the device 140 executes a process indicated by the execution command (step S224).
- step S224 the device 140 executes a process indicated by the execution command.
- the device control system 100C of the present embodiment only information about functions that can be remotely operated in the login state is transmitted from the server device 160 to the operation terminal 130. That is, the list of functions for operating the device presented by the operation terminal 130 to the user is only a function that can be executed in the state of each device at the time of login, and the user issues an operation instruction before issuing the operation instruction. It is possible to know whether or not the function to be performed is an executable function.
- Modification> The device control system according to the present invention has been described above based on the embodiment. However, the device control system can be modified as follows, and the present invention is applied to the device control system as described in the above embodiment. Of course, it is not limited.
- the server apparatus 160 acquires all the environmental information for use in determining whether or not the environmental condition is satisfied from the operation target device 140. Not all are obtained from the operation target device. If the environmental information used for determining whether or not the environmental condition is satisfied is obtained, the environmental information may be obtained from anywhere. For example, a part of the environment information may be acquired from a device or a sensor different from the device 140, or may be acquired from user information or function management information managed by the server device 160. As a specific example, the position information of the operation target device 140 may not be obtained from the device 140 but may be calculated based on an address registered in the attribute information 1840 of the user information 1800. Also, as shown by user information 1800C in FIG. 40, an item of position information 1880 is added to user information 1800, and the position information (latitude and longitude) is registered in advance for each device registered by the user, The position information may be acquired from the position information 1880.
- information related to the situation around the device 140 may be obtained from a human sensor or the like installed in the same area as the device 140. Further, information such as temperature, humidity, date, time, etc. may be obtained from a dedicated sensor installed in the same area as the device.
- the server device 160 acquires the environment information of the operation terminal 130 that issued the operation instruction.
- the environment information of the operation terminal 130 is not necessarily acquired.
- the environmental information of the operation terminal 130 may be acquired when it is necessary for execution permission / rejection determination according to environmental conditions. For example, in the case of an operation instruction for executing a function for which a condition based on the positional relationship between the operation terminal and the device is not set, environmental information indicating the position of the operation terminal 130 is not necessary, and thus does not need to be acquired.
- the operation state of the device for example, information indicating whether or not the device is in operation
- the installation position of the device for example, the latitude and longitude of the installation location
- the current date and time (Including year and month) information
- temperature around the device and information indicating whether or not there is a person around the device.
- environmental information is not limited to acquiring all.
- the device control system 100 of the first embodiment when an operation instruction for executing the power-off of the recorder is given, at least the operating state of the recorder (whether recording is in progress) and whether there are people around the device. It is only necessary to acquire the environmental information, and other environmental information may not be acquired.
- the position condition of the position condition information 3100 is set based on the distance between the operation terminal 130 and the operation target device 140, and the operation is performed based on the distance between the operation terminal and the device.
- the determination of whether or not the instruction is permitted is not limited to the distance between the operation terminal and the device. It suffices if it is possible to determine whether or not to execute the function of the operation instruction based on the positional relationship between the operation terminal and the device at the time of operating the device.
- an area within a certain range may be determined in advance, and the rejection determination may be performed based on whether the location of the operation terminal and the device is the same area. For example, if the area is defined in units of countries and the installation position of the device is “Japan”, and the area where the operation terminal that issued the operation instruction is “USA”, the operation instruction is rejected. If the same area, that is, the area where the operation terminal is located is also “Japan”, the execution of the operation instruction may be permitted.
- the area division is not limited to the country unit, and any division may be used as long as it can be divided into units that are grouped to some extent. For example, it may be an administrative division unit such as a “prefecture” unit or a “city” unit.
- the distance between the operation terminal and the device when the execution of the operation instruction is permitted is stored as an operation history, and the operation terminal when a new operation instruction is issued
- execution of a newly performed operation instruction may be permitted.
- a plurality of environmental conditions are set, and based on all the environmental conditions set for each function, whether or not to execute the function indicated by the operation instruction is determined.
- the judgment of acceptance is not limited to this.
- the setting of the environmental condition may be one, or the execution permission / inhibition of the function indicated by the operation instruction may be determined using only a specific environmental condition among a plurality of environmental conditions set.
- a priority condition is set for the environmental condition and a different judgment result is generated between the environmental condition with a higher priority and the environmental condition with a lower priority, the judgment result of the environmental condition with the higher priority is displayed. You may make it use.
- the user information is registered for the device to be operated for each user.
- the device to be operated may not be registered for each user. It is only necessary to identify the device to be operated for the logged-in user.
- the same device may be registered with a plurality of users.
- a group may be created by a plurality of users, and devices that can be operated may be registered for the group.
- FIG. 41 shows an example of the data structure of user information when registering in units of groups.
- User information 1800D The items of the user name 1810, user account 1820, password 1830, email address 1835, authority level 1836, attribute information 1840, model 1850, model number 1860, and security module ID 1870 of the user information 1800D shown in FIG. This is the same as the item of the user information 1800B.
- items of a group 1801 and a type 1895 are added compared to the user information 1800B.
- the group 1801 is an item for storing information indicating a group of a plurality of users who can operate the same device. Note that one user may be included in one group.
- the type 1895 is an item for identifying whether it is an operated device or an operating terminal.
- the “device” of the type 1895 indicates that the device is the operated device, and the “operation terminal” indicates that the device is the operating terminal.
- the group G includes the user A and the user B.
- “Smartphone” indicates that it is registered as a device that can be operated by users of group G, that is, both user A and user B.
- the user A or the user B gives an operation instruction using a smartphone whose model number 1860 is “P-06D” or “P-02D”.
- the determination as to whether or not to forcibly execute is made at the authority level set for each user, but the authority for forced execution is not limited to being set for each user. It is sufficient if the authority for forced execution can be confirmed when a forced execution request is made.
- the authority level may be set not for each user but for each operation terminal. In this way, if the operation terminal is different, even if the user's user account and password are used illegally, forced execution is not performed unless the operation terminal has an authority level that can be forcibly executed. Since it cannot be performed, it is possible to further prevent the device from being remotely operated illegally.
- the authority level setting is forcible execution authority (“1”) or not (“0”)
- the authority level setting is not limited to the presence or absence. Any setting that can determine whether or not the authority for forced execution is available is acceptable.
- the authority level may be set with an order instead of “1” or “0”, and the authority for forced execution may be given when the authority level is higher than a certain order.
- the authority level may be set with a difference.
- a process of giving priority to an operation instruction from a user with a higher authority level can be performed.
- the server device 160 determines whether or not the forced pass request includes a unique passphrase included in the email transmitted by the server device 160 is included in the forced run request from the operation terminal 130.
- the determination of the validity of the forced execution request is not limited to this. Any method may be used as long as the validity of the forced execution request can be determined.
- the server device 160 provides an operation menu dedicated to accepting a forced execution request instead of a normal operation menu for remote operation, and notifies the user of an access method to the operation menu. The determination may be made on the basis of whether the user has made a request for forced execution based on a predetermined operation. Further, the server device 160 may issue an authentication password that is valid only for a certain period of time to the user who has given the operation instruction, and may determine the validity based on whether or not an access is made using the authentication password.
- the service is provided by notifying the access method to the dedicated operator by e-mail.
- the operator may determine whether the accessing user is a legitimate user and transmit an execution command based on the operation instruction performed by the user to the operation target device.
- the password 1830 of the user information 1800 stored in the server device 160 is stored with the hash value of the login password
- the information stored in the password 1830 is not limited to this. Any information that can be used for login authentication by comparing with a password input when the user logs into the server device 160 may be used.
- the login password itself may be stored, or a value obtained by encrypting the login password may be stored.
- the operation terminal 130 that has issued the operation instruction and the server device 160 are transmitted from the operation terminal 130B.
- the operation terminal 130B that receives the forced execution inquiry e-mail is different, but the same operation terminal is used. There may be. As long as a forced execution inquiry can be transmitted to a legitimate user registered in the user information, the operation terminal that first gives an operation instruction and the operation terminal that makes a forced execution request may not be different.
- the display mode is not limited to this. Any display mode may be used as long as it can be displayed so that the user can identify whether the device can be operated and whether it is an executable function.
- a mode for example, reverse display, display in a different color, or grayout
- a mode that is different from a function that can execute a function that cannot be executed (power ON and timer set in the example of FIG. 42). Or the like.
- it may be displayed in such a manner that the user cannot select a function that cannot be executed.
- the device menu 4210 may not display the device, or may be different from the device having the function that can be executed (for example, reverse display, You may display by the display in a different color, the display in grayout, etc.). Moreover, you may display in the aspect which cannot select the apparatus without the function which can be performed.
- the communication between the communication LSI 1110 and the home gateway 150 is performed according to the Bluetooth standard.
- the communication between the communication LSI 1110 and the home gateway 150 is Not limited to Bluetooth standards. Any communication method may be used as long as communication is possible between the communication LSI 1110 and the home gateway 150.
- wireless communication such as WiFi (registered trademark) or communication connected by a wired LAN may be used.
- the user account and the password are used to authenticate the login to the server device.
- the configuration may be such that biometric information (biometric authentication) such as fingerprints and irises is used for authentication.
- biometric authentication biometric authentication
- a configuration may be employed in which a user account or password is not input and the ID information of the security module is transmitted to enter a login state or a list of operable operation terminals is received.
- the operation terminal is operated using an operation terminal outside the house, but the operation terminal is not limited to the outside.
- the position of the operation terminal for operation may be anywhere.
- the operation terminal may be in a house, or may be configured to remotely operate devices in the same room or another room in the house.
- the operation terminal is not limited to a smartphone. Any device may be used as long as an operation instruction for remotely operating the device can be performed. For example, it may be a controller dedicated to remote operation or an information device such as a personal computer.
- the device on the operated side is not limited to home appliances used in ordinary households. It may be a device installed in a car / train / airplane, a medical device installed in a hospital, a business device in an office / factory, or the like.
- the server device has a function of acquiring environmental information from each device and determining whether or not to execute the function indicated in the operation instruction based on the environmental information.
- These functions are not limited to being performed by one server device. As long as the above-described device remote control can be controlled by the entire device control system, these functions performed by the server device may be performed by a plurality of devices. Further, other functions may be performed by any device constituting the device control system.
- the home gateway 150 may have a function of acquiring environment information from a device that can communicate with its own device, or a function of issuing an execution command indicated in an operation instruction and transmitting the command to an operation target device. In this case, the home gateway 150 transmits the acquired environment information to the server device 160 and receives an operation instruction from the server device 160.
- the same environmental condition information as the environmental condition information managed by the server device 160 is stored in advance in the operation terminal 130. It may be determined whether or not to execute the function indicated in the operation instruction instructed by the user. At this time, the server device 160 transmits the environment information of the device 140 acquired by the own device to the operation terminal 130.
- Each component described in the embodiment realizes its function by cooperating with the server device, the operation terminal, the device, and the processor included in the first and second security modules.
- the device control method according to the present invention may be realized by a computer using a computer program, or may be transmitted as a digital signal composed of the computer program.
- the present invention also provides a computer-readable recording medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD (Blu-ray Disc). ) (Registered trademark), recorded in a semiconductor memory, or the like. Further, the present invention may be the computer program or the digital signal recorded on these recording media.
- the computer program or digital signal according to the present invention may be transmitted via an electric communication line, a wireless or wired communication line, a network represented by the Internet, data broadcasting, or the like.
- a device control method is a device control method in a device control system that performs remote operation of a device via a server device using an operation terminal, and provides an operation instruction for operating the device.
- An operation instruction receiving step received from the operation terminal, an environment information acquiring step for acquiring environment information related to at least one of the device and the operation terminal when the operation instruction is received, and a process corresponding to the operation instruction
- the determination step of determining whether or not to execute based on whether or not the environmental information satisfies a predetermined condition, and in the case where an affirmative determination is made in the determination step, When an execution command for performing processing according to the operation instruction is executed and a negative determination is made, an execution restriction step that does not execute the execution command And wherein the Mukoto.
- the device control method of this configuration When using the device control method of this configuration, it acquires environmental information when there is a device operation instruction from the operation terminal, and determines whether or not a predetermined environmental condition is satisfied based on the acquired environmental information. It is possible to determine whether or not to execute processing according to the operation instruction.
- the environment information includes information indicating an operation state of the device, the operation instruction is an operation instruction related to one of the functions, and the determination step refers to the operation condition, and the environment information In the operation state indicated by, a positive determination may be made when it is determined that execution of a process corresponding to the one function is permitted.
- the environment information includes position information related to the positions of the operation terminal and the device
- the determination step includes information related to a positional relationship between the operation terminal and the device based on the position information. An affirmative determination may be made when it is determined that a predetermined range is indicated.
- the operation terminal has a positioning device using GPS (Global Positioning System), and the environment information acquisition step includes the position information of the operation terminal from the position information output by the positioning device. You may get.
- GPS Global Positioning System
- the position of the operation terminal can be accurately obtained using GPS.
- the environment information includes information related to a time when the operation terminal performs the operation instruction
- the determination step includes the time in a condition related to a relationship between the operation instruction and the time. An affirmative determination may be made when the information according to the above indicates a predetermined period.
- the environmental information includes information related to the ambient temperature of the device, and the determination step determines whether the temperature information is predetermined in a condition related to a relationship between the operation instruction and the temperature. A positive determination may be made when the temperature is within the specified temperature range.
- it further includes a detection step of detecting whether or not there is a person within a predetermined range around the device, and the determination step relates to a relationship between the operation instruction and the detection. In the condition, a positive determination may be made when the detection step detects that the person is not present.
- a notification step of notifying the user of the device of information indicating that, and the operation from the user who has received the notification A user input receiving step for receiving input of information relating to the instruction, and an execution authority information output step for outputting execution authority information relating to the operation authority for causing the processing according to the operation instruction to be executed based on the input of the user
- an execution authority information reception step for receiving the execution authority information, and a verification step for verifying whether or not the authority for forcibly executing the process is based on the execution authority information
- the execution restriction step may exceptionally cause the processing in the device to be executed when an affirmative determination is made in the verification step.
- the execution authority information further includes a user information storage step for storing user information related to determination as to whether or not the user has the authority to forcibly execute the process related to the operation of the device.
- User specifying information for specifying a user who has performed the operation instruction may be included, and the verification step may perform the verification by comparing the user specifying information with the user information.
- the device control method is a device control method in a device control system that performs remote operation of a device via a server device using an operation terminal.
- the environment information predetermines whether or not to execute an environment information acquisition step for acquiring environment information related to at least one of the device and the operation terminal, and whether or not to execute a process corresponding to the function for each function in the device.
- the user can know the functions that can be operated in each device at the time of login, and can select and operate only from the functions that can be operated at that time. .
- a device control system includes a server device, an operation terminal, and a device, and device control for remotely operating the device through an operation instruction of the operation terminal via the server device.
- the server device includes: a communication unit that communicates with the operation terminal and the device; an operation instruction reception unit that receives the operation instruction from the operation terminal through a communication unit of the own device; Whether to execute environmental information acquisition means for acquiring environmental information related to at least one of the device and the operation terminal via the communication means and processing according to the operation instruction when an operation instruction is received If the determination means performs the determination based on whether the environmental information satisfies a predetermined condition or not, and if the determination means makes a positive determination, the communication means of the own device An execution restriction unit that transmits an execution command for performing a process according to the operation instruction to the device and does not transmit the execution command when a negative determination is made;
- the terminal includes a communication unit that communicates with the server device, and an operation instruction unit that transmits an operation instruction for operating the device to the server device via the
- Environment information output means for transmitting to the server device via the communication means of the own device, wherein the device transmits the communication information for communicating with the server device and the environment information of the own device.
- the execution instruction receiving means for receiving the execution command from the server device via the communication means of the own device, and the execution command received
- a command executing means for performing the execution of the processing based on the execution command.
- the device control system having this configuration acquires environmental information when there is an operation instruction of the device from the operation terminal, determines whether or not a predetermined environmental condition is satisfied based on the acquired environmental information, and It is possible to determine whether or not to execute processing according to the operation instruction.
- the device control system can suppress the execution of the function indicated by an inappropriate operation instruction that does not satisfy the environmental conditions when the device is remotely operated.
- a server device is used in a device control system for performing remote operation of a device, receives an operation instruction for performing remote operation of the device from an operation terminal, and performs processing according to the operation instruction
- a communication device that performs communication with the operation terminal and the device, and an operation instruction that receives an operation instruction for operating the device from the operation terminal via the communication device
- a determination step for determining whether or not to perform the determination based on whether or not the environmental information satisfies a predetermined condition, and a positive determination by the determination means An execution command for performing processing according to the operation instruction is transmitted to the device via the communication means, and execution of the execution command is not performed when a negative determination is made. Limiting means.
- the server device having this configuration acquires environmental information when there is an operation instruction for a device from the operation terminal, determines whether or not a predetermined environmental condition is satisfied based on the acquired environmental information, and performs the operation It is possible to determine whether or not to execute processing according to the instruction.
- the server device can suppress the execution of the function indicated by an inappropriate operation instruction that does not satisfy the environmental conditions when the device is remotely operated using the operation terminal.
- the present invention can be used as a control technique for remotely operating a device using an operation terminal via an external server device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Telephonic Communication Services (AREA)
- Selective Calling Equipment (AREA)
- Telephone Function (AREA)
Abstract
Description
<1.1 概要>
以下、本発明に係る機器制御方法の一実施形態として、宅内に配置されている機器を、宅外に持ち出した操作端末を用いて制御することができる機器制御システムについて説明する。
<1.2.1 機器制御システム100>
図1は、本実施の形態に係る機器制御システム100のシステム構成を示す概略図である。
図1において、ネットワーク170は、ホームゲートウェイ150とサーバ装置160と基地局180とに接続されるネットワーク網であり、接続される装置間の信号を伝達する機能を有する。
<<回路構成>>
図2は、操作端末130と第1セキュリティモジュール110との外観を示す斜視図である。
アンテナ220は、通信用LSI210に接続され、通信用LSI210が行う通信に利用される、例えば、金属製のモノポールアンテナである。
通信用LSI210は、アンテナ220とCPU200とに接続され、CPU200によって制御され、CPU200から送られて来た送信用信号を変調する変調機能と、変調した信号を、アンテナ220を利用して基地局180に送信する送信機能と、基地局180から送信された信号を、アンテナ220を利用して受信する受信機能と、受信した信号を復調してCPU200へ送る復調機能とを有する。
タッチパネル240は、タッチパネルコントローラ230に接続され、タッチパネルコントローラ230によって制御され、画像を表示する機能と、操作端末130を利用するユーザからの接触操作を電気信号に変換して出力する機能とを有する。
コネクタ260は、CPU200に接続され、以下の3つの機能を有する。
レシーバ270は、CPU200に接続され、CPU200によって制御され、CPU200から送られる電気信号を音声に変換して出力する機能を有する。
メモリ250は、CPU200に接続され、RAM(Random Access Memory)とROM(Read Only Memory)とフラッシュメモリとから構成され、CPU200の動作を規定するプログラムと、CPU200が利用するデータとを記憶する。
CPU200は、通信用LSI210とタッチパネルコントローラ230とメモリ250とコネクタ260とレシーバ270とマイク280とに接続され、メモリ250に記憶されているプログラムを実行することで、通信用LSI210とタッチパネルコントローラ230、レシーバ270、及びGPS(Global Positioning System)受信機285を制御して、操作端末130に、主として、以下の3つの機能を実現させる機能を有する。
GPS受信機285は、CPU200から要求があると、要求があった時点での位置情報(緯度経度の値)を取得し、環境情報としてCPU200に出力する機能を有する。
バッテリ290は、繰り返し充電され得る二次電池であって、操作端末130を構成する電子部品に電力を供給する機能を有する。
以下、上記回路構成を備える操作端末130について、機能面から見た構成について説明する。
表示手段310は、プログラムを実行するCPU200と、タッチパネルコントローラ230と、タッチパネル240とによって実現され、制御手段300によって制御され、操作端末130を利用するユーザに提示する画像を生成してタッチパネル240に表示する機能を有する。
操作受付手段320は、プログラムを実行するCPU200と、タッチパネルコントローラ230と、タッチパネル240とによって実現され、制御手段300によって制御され、操作端末130を利用するユーザからの、タッチパネル240への接触操作を受け付ける機能を有する。
環境情報取得手段325は、プログラムを実行するCPU200と、GPS受信機285とによって実現され、自機の環境情報(例えば、現在の位置情報)を取得する機能を備える。環境情報取得手段325は、例えば、環境情報が位置情報の場合には、操作受付手段320が操作指示をユーザから受け付けた際の現在位置をGPS受信機285から取得する。取得した環境情報(位置情報)は、通信手段350を介して、サーバ装置160に送信される。
SM通信手段330は、プログラムを実行するCPU200と、コネクタ260とによって実現され、制御手段300によって制御され、操作端末130に第1セキュリティモジュール110が装着されている場合において、第1セキュリティモジュール110と有線にて通信する機能を有する。
音声処理手段340は、プログラムを実行するCPU200と、レシーバ270と、マイク280とによって実現され、制御手段300によって制御され、操作端末130の行う通話における音声の入出力処理を行う機能を有する。
通信手段350は、プログラムを実行するCPU200と、通信用LSI210と、アンテナ220とによって実現され、制御手段300によって制御され、商用携帯電話用無線通信回線を利用して基地局180と通信する機能と、基地局180とネットワーク170とを介して、サーバ装置160と通信する機能を有する。
暗号処理手段360は、プログラムを実行するCPU200によって実現され、制御手段300によって制御され、データの秘匿性、完全性を保つための暗号化処理を実行する暗号処理機能、暗号技術を用いた認証処理を実行する認証処理機能、暗号技術を用いた鍵共有処理を実行する鍵共有処理機能を有する。ここで、暗号処理手段360は、これら、暗号処理機能、認証処理機能、鍵共有処理機能を実現するために、AES(Advanced Encrypting Standard)暗号技術、ECDSA(Elliptic Curve Digital Signature Standard)技術、ECDH(Elliptic Curve Diffie-Hellman)技術、SSL(Secure Socket Layer)/TSL(Transport Layer Security)技術等を利用する。
操作端末情報格納手段370は、プログラムを実行するCPU200と、メモリ250に含まれる記憶領域の一部とによって実現され、操作端末情報400を記憶する機能を有する。なお、操作端末情報400については後述する。
制御手段300は、プログラムを実行するCPU200によって実現され、表示手段310、操作受付手段320、環境情報取得手段325、SM通信手段330、音声処理手段340、通信手段350、暗号処理手段360、及び操作端末情報格納手段370を制御して、操作端末130に、前述の、スマートフォン制御機能と機器操作機能Aと環境情報取得機能Aとを実現させる機能を有する。
<<回路構成>>
図6は、第1セキュリティモジュール110の回路図である。
コネクタ560は、CPU500に接続され、以下の3つの機能を有する。
メモリ550は、CPU500に接続され、RAMとROMとフラッシュメモリとから構成され、CPU500の動作を規定するプログラムと、CPU500が利用するデータとを記憶する。
CPU500は、メモリ550とコネクタ560とに接続され、メモリ550に記憶されているプログラムを実行することで、第1セキュリティモジュール110に、以下の2つの機能を実現させる機能を有する。
以下、上記回路構成を備える第1セキュリティモジュール110について、機能面から見た構成について説明する。
ID情報格納手段620は、プログラムを実行するCPU500と、メモリ550に含まれる記憶領域の一部とによって実現され、自モジュールを一意に識別するセキュリティモジュールIDを記憶する機能を有する。
操作端末通信手段610は、プログラムを実行するCPU500と、コネクタ560とによって実現され、制御手段600によって制御され、操作端末130に第1セキュリティモジュール110が装着されている場合において、操作端末130と有線にて通信する機能を有する。
制御手段600は、プログラムを実行するCPU500によって実現され、操作端末通信手段610とID情報格納手段620とを制御して、第1セキュリティモジュール110に、前述の機器操作機能Bと環境情報送信機能Bとを実現させる機能を有する。
図1に示される、機器140A~機器140Cは、それぞれ、インターネットを含む様々なネットワークに接続する機能を有する家電機器、設備機器である。具体的には、エアコン、冷蔵庫、電子レンジ、ホームベーカリー、トースター、給湯器リモコン、洗濯機、乾燥機、食器洗い乾燥機、掃除機、ガステーブル、IH機器、炊飯器、温水洗浄便座、電子錠、ドアホン、各種照明機器、空気洗浄機、加湿器、各種セキュリティセンサー(人感センサー、防犯センサー)、ホームサーバ、洗面台、電動歯ブラシ、ドライヤー、美容家電機器、マッサージチェアや活動量計や体組成計などの健康家電機器、パソコン、タブレット端末、スマートフォン等の情報機器、携帯電話、FAX、ゲーム機、テレビ、レコーダ機器、オーディオ機器及びそれらのリモコン等である。
以下、機器140A~機器140Cについて、これら機器を個別に説明するのではなく、これら機器を代表して、機器140を用いて説明する。
制御部810は、更に、CPU800と、コネクタ860と、メモリ850と、入力装置870と、出力装置880とから構成される。また、機器本体部820は、機器本体ハードウェア890によって構成される。
コネクタ860は、CPU800に接続され、以下の3つの機能を有する。
入力装置870は、CPU800に接続され、機器140を利用するユーザによってなされる操作を電気信号に変換して、CPU800に送る機能を有する。例えば、操作パネルにより実現される。
出力装置880は、CPU800に接続され、CPU800から送られてくる画像信号に基づく画像、音声等を表示する機能を有する。例えば、液晶ディスプレイ、スピーカにより実現される。
メモリ850は、CPU800に接続され、RAMとROMとフラッシュメモリとから構成され、CPU800の動作を規定するプログラムと、CPU800が利用するデータとを記憶する。
CPU800は、メモリ850、コネクタ860、入力装置870、出力装置880、センサー885、及び機器本体ハードウェア890とに接続され、メモリ850に記憶されているプログラムを実行することで、センサー885、機器本体ハードウェア890、入力装置870、及び出力装置880を制御して、機器140に、以下の3つの機能を実現させる機能を有する。
機器本体部820の主要な構成要素は、機器本体ハードウェア890である。
センサー885は、機器140に係る環境情報を取得するためのセンサーである。
以下、上記回路構成を備える機器140について、機能面から見た構成について説明する。
コマンド受付手段910は、プログラムを実行するCPUによって実現され、コネクタ860を介して第2セキュリティモジュール120が操作端末130から受信した実行コマンドを受け付け、制御手段900に出力する機能を有する。
実行手段920は、プログラムを実行するCPU800と、機器本体ハードウェア890とによって実現され、制御手段900によって制御され、制御手段900から、機器本体ハードウェア890に所定の動作をさせる旨を示す実行コマンドが送られて来た場合に、機器本体ハードウェア890を用いて、その実行コマンドの示す所定の動作を実行する機能を有する。
SM通信手段930は、プログラムを実行するCPU800と、コネクタ860とによって実現され、制御手段900によって制御され、機器140に第2セキュリティモジュール120が装着されている場合において、第2セキュリティモジュール120と有線にて通信する機能を有する。
入力手段940は、プログラムを実行するCPU800と、入力装置870とによって実現され、制御手段900によって制御され、機器140を利用するユーザによる、入力装置870を用いてなされる操作を受け付ける機能と、ユーザによる操作を受け付けた場合において、その操作が、機器本体ハードウェア890に所定の動作をさせる旨を示す操作であるときに、機器本体ハードウェア890にその所定の動作をさせる旨を示す実行コマンドを生成して、制御手段900に送る機能を有する。
出力手段950は、プログラムを実行するCPU800と、出力装置880とによって実現され、制御手段900によって制御され、機器140を利用するユーザに提示する画像を生成して出力装置880に表示する機能を有する。
環境情報取得手段960は、プログラムを実行するCPU800と、センサー885とによって実現され、制御手段900によって制御され、機器140の環境情報を取得する機能を有する。環境情報取得手段960は、取得した環境情報を制御手段900に出力する。
機器情報格納手段970は、プログラムを実行するCPU800と、メモリ850に含まれる記憶領域の一部とによって実現され、機器情報1000を記憶する機能を有する。なお、機器情報1000については後述する。
制御手段900は、プログラムを実行するCPU800によって実現され、コマンド受付手段910、実行手段920、SM通信手段930、入力手段940、出力手段950、環境情報取得手段960、及び機器情報格納手段970とを制御して、機器140に、前述の、機器制御機能と機器操作機能Cと環境情報取得機能Cとを実現させる機能を有する。
<<回路構成>>
図1に示される、第2セキュリティモジュール120A~第2セキュリティモジュール120Cは、それぞれ、互いに同様の構成を有し、互いに同様の機能を有している。
アンテナ1120は、通信用LSI1110に接続され、通信用LSI1110が行う通信に利用される、例えば、金属製のモノポールアンテナである。
コネクタ1160は、CPU1100に接続され、以下の3つの機能を有する。
メモリ1150は、CPU1100に接続され、RAMとROMとフラッシュメモリとから構成され、CPU1100の動作を規定するプログラムと、CPU1100が利用するデータとを記憶する。
CPU1100は、通信用LSI1110とメモリ1150とコネクタ1160とに接続され、メモリ1150に記憶されているプログラムを実行することで、通信用LSI1110を制御して、第2セキュリティモジュール120に、以下の2つの機能を実現させる機能を有する。
以下、上記回路構成を備える第2セキュリティモジュール120について、機能面から見た構成について説明する。
通信手段1250は、プログラムを実行するCPU1100と、通信用LSI1110と、アンテナ1120とによって実現され、制御手段1200によって制御され、Bluetooth規格に準拠してホームゲートウェイ150と通信する機能と、ホームゲートウェイ150とネットワーク170とを介して、サーバ装置160と通信する機能とを有する。
暗号処理手段1260は、プログラムを実行するCPU1100によって実現され、制御手段1200によって制御され、データの秘匿性、完全性を保つための暗号化処理を実行する暗号処理機能、暗号技術を用いた認証処理を実行する認証処理機能、暗号技術を用いた鍵共有処理を実行する鍵共有処理機能を有する。ここで、暗号処理手段1260は、これら、暗号処理機能、認証処理機能、鍵共有処理機能を実現するために、AES暗号技術、ECDSA技術、ECDH技術、SSL/TSL技術等を利用する。
コマンド確認手段1210は、プログラムを実行するCPU1100によって実現され、制御手段1200によって制御され、以下の2つの機能を有する。
機器通信手段1230は、プログラムを実行するCPU1100と、コネクタ1160とによって実現され、制御手段1200によって制御され、機器140に第2セキュリティモジュール120が装着されている場合において、機器140と有線にて通信する機能を有する。
ID情報格納手段1240は、プログラムを実行するCPU1100と、メモリ1150に含まれる記憶領域の一部とによって実現され、自モジュールを一意に識別するセキュリティモジュールID子を記憶する機能を有する。
制御手段1200は、プログラムを実行するCPU1100によって実現され、コマンド確認手段1210、機器通信手段1230、ID情報格納手段1240、通信手段1250、及び暗号処理手段1260を制御して、第2セキュリティモジュール120に、前述の機器操作機能Dと環境情報送信機能Dとを実現させる機能を有する。
図14は、ホームゲートウェイ150の回路図である。
アンテナ1420は、通信用LSI1410に接続され、通信用LSI1410が行う通信に利用される、例えば、金属製のモノポールアンテナである。
メモリ1450は、CPU1400に接続され、RAMとROMとフラッシュメモリとから構成され、CPU1400の動作を規定するプログラムと、CPU1400が利用するデータとを記憶する。
ネットワーク接続回路1460は、CPU1400とネットワーク170とに接続され、CPU1400によって制御され、ネットワーク170を介して外部装置から送られて来た信号を受信してCPU1400へ送る機能と、CPU1400から送られて来た信号を、ネットワーク170を介して外部装置へ送信する機能とを有する。
CPU1400は、通信用LSI1410とメモリ1450とネットワーク接続回路1460とに接続され、メモリ1450に記憶されているプログラムを実行することで、通信用LSI1410とネットワーク接続回路1460とを制御して、ホームゲートウェイ150に、サーバ装置160と第2セキュリティモジュール120とが行う通信を中継する通信中継機能を実現させる機能を有する。
以下、上記回路構成を備えるホームゲートウェイ150について、機能面から見た構成について説明する。
SM通信手段1510は、プログラムを実行するCPU1400と、通信用LSI1410と、アンテナ1420とによって実現され、制御手段1500によって制御され、Bluetooth規格に準拠して第2セキュリティモジュール120と通信する機能を有する。
サーバ通信手段1520は、プログラムを実行するCPU1400と、ネットワーク接続回路1460とによって実現され、制御手段1500によって制御され、ネットワーク170を介してサーバ装置160と通信する機能を有する。
制御手段1500は、プログラムを実行するCPU1400によって実現され、SM通信手段1510とサーバ通信手段1520とを制御して、ホームゲートウェイ150に、前述の通信中継機能を実現させる機能を有する。
<<回路構成>>
図16は、サーバ装置160の回路図である。
ネットワーク接続回路1660は、CPU1600とネットワーク170とに接続され、CPU1600によって制御され、ネットワーク170を介して外部装置から送られて来た信号を受信してCPU1600へ送る機能と、CPU1600から送られて来た信号を、ネットワーク170を介して外部装置へ送信する機能とを有する。
メモリ1650は、CPU1600に接続され、RAMとROMとフラッシュメモリとから構成され、CPU1600の動作を規定するプログラムと、CPU1600が利用するデータとを記憶する。
ハードディスクドライブ1610は、CPU1600に接続され、ハードディスクを内蔵し、CPU1600が利用するデータを記憶する。
CPU1600は、ネットワーク接続回路1660、メモリ1650、及びハードディスクドライブ1610に接続され、メモリ1650に記憶されているプログラムを実行することで、ネットワーク接続回路1660とハードディスクドライブ1610とを制御して、サーバ装置160に、以下の3つの機能を実現させる機能を有する。
以下、上記回路構成を備えるサーバ装置160について、機能面から見た構成について説明する。
通信手段1750は、プログラムを実行するCPU1600と、ネットワーク接続回路1660とによって実現され、制御手段1700によって制御され、ネットワーク170とホームゲートウェイ150とを介して第2セキュリティモジュール120と通信する機能と、ネットワーク170と基地局180とを介して操作端末130と通信する機能とを有する。
暗号処理手段1710は、プログラムを実行するCPU1600によって実現され、制御手段1700によって制御され、データの秘匿性、完全性を保つための暗号化処理を実行する暗号処理機能、暗号技術を用いた認証処理を実行する認証処理機能、暗号技術を用いた鍵共有処理を実行する鍵共有処理機能を有する。ここで、暗号処理手段1710は、これら、暗号処理機能、認証処理機能、鍵共有処理機能を実現するために、AES暗号技術、ECDSA技術、ECDH技術、SSL/TSL技術等を利用する。
ユーザ情報管理手段1730は、プログラムを実行するCPU1600と、ハードディスクドライブ1610に含まれる記憶領域の一部とによって実現され、ユーザ情報1800を記憶する機能と、記憶するユーザ情報1800を更新する機能とを有する。なお、ユーザ情報1800については後述する。
機能情報管理手段1740は、プログラムを実行するCPU1600と、ハードディスクドライブ1610に含まれる記憶領域の一部とによって実現され、機能情報1900及びコマンド情報2000とを記憶する機能と、記憶する機能情報1900及びコマンド情報2000を更新する機能とを有する。なお、機能情報1900及びコマンド情報2000については後述する。
コマンド発行手段1760は、プログラムを実行するCPU1600によって実現され、制御手段1700によって制御され、以下の2つの機能を有する。
ユーザ情報管理手段1730は、プログラムを実行するCPU1600と、ハードディスクドライブ1610に含まれる記憶領域の一部とによって実現され、環境条件情報として、動作条件情報3000、位置条件情報3100、日時条件情報3200、気温条件情報3300、及び在室時条件情報3400を記憶する機能を有する。なお、これら環境条件情報については後述する。
環境情報取得手段は、プログラムを実行するCPU1600と、ネットワーク接続回路1660とによって実現され、制御手段1700によって制御され、操作端末130と機器140とからそれぞれの環境情報を取得し、制御手段1700に出力する機能を有する。
判断手段は、プログラムを実行するCPU1600によって実現され、制御手段1700によって制御され、環境条件記憶手段1735に記憶されている環境条件情報を参照し、環境情報取得手段1745が操作端末130及び機器140から得た環境情報に基づいて、操作端末130からの操作指示に応じた機能の実行を行うか否かを判断する機能を有する。
制御手段1700は、プログラムを実行するCPU1600によって実現され、暗号処理手段1710、判断手段1720、ユーザ情報管理手段1730、環境条件記憶手段1735、機能情報管理手段1740、環境情報取得手段1745、通信手段1750、及びコマンド発行手段1760を制御して、サーバ装置160に、前述の機器登録機能Eと機器操作機能Eと環境情報取得機能Eとを実現させる機能を有する。
以下、機器制御システム100で利用する各データについて説明する。
(操作端末情報400)
図5は、操作端末情報格納手段370によって記憶される操作端末情報400の一例についてのデータ構成図である。
図11は、機器情報格納手段970によって記憶される機器情報1000の一例についてのデータ構成図である。
図18は、ユーザ情報管理手段1730によって記憶されるユーザ情報1800の一例についてのデータ構成図である。
図19は、機能情報管理手段1740によって記憶される機能情報1900の一例についてのデータ構成図である。
図20に、コマンド情報2000のデータ構造とデータの一例を示す。
図21に、動作条件情報3000のデータ構造とデータの一例を示す。
図22に、位置条件情報3100のデータ構造とデータの一例を示す。
図23に、日時条件情報3200のデータ構造とデータの一例を示す。
図24に、気温条件情報3300のデータ構造とデータの一例を示す。
なお、気温条件が「-」で示されている機能については、条件が設定されていないことを示す。例えば、図24の例では、型番が「CS-X252C」のエアコンは、「電源ON」、「電源OFF」、及び「タイマセット」の機能は、気温に関係なくその機能の実行が許可されるように設定されている。
図25に、在室時条件情報3400のデータ構造とデータの一例を示す。
次に、以上のように構成される機器制御システム100の行う動作について、図面を参照しながら説明する。
まず、操作端末130の処理動作について説明する。
次に、サーバ装置160の処理動作について説明する。
次に、操作対象である機器140の処理動作について説明する。
以下、上記機能を備えた操作端末130、機器140、及びサーバ装置160を備えた機器制御システムにおいて、操作端末130を用いて機器140を遠隔操作する場合の一例について処理動作を具体的に説明する。
<2.実施の形態2>
<2.1 概要>
実施の形態1の機器制御システム100では、サーバ装置160が、操作端末130からの操作指示の実行を行わないと判断すると、サーバ装置160は、機器140に対して実行コマンドを送信しないので、機器140では、遠隔操作による機能の実行は行われない。
(機器制御システム100B)
機器制御システム100Bの構成は、実施の形態1の機器制御システム100と基本的に同じであるが、機器制御システム100の構成に加えて、更に操作端末130Bを備える点で異なる。
(操作端末130B)
操作端末130Bの構成及び機能は、操作端末130と基本的に同じである。操作端末130Bは、操作端末130の機能に加えて、後述するユーザ情報1800BのEメールアドレス1835に登録されているEメールアドレス宛てに送信されたEメールを受信する機能を有する。また、送信されたEメールに従って、強制的に実行させるための操作指示を行う機能を備える。
サーバ装置160のユーザ情報管理手段1730がユーザ情報1800の代わりに後述するユーザ情報1800Bを格納している点が異なる。
(ユーザ情報1800B)
ユーザ名1810、ユーザアカウント1820、パスワード1830、属性情報1840、機種1850、型番1860、セキュリティモジュールID1870は、実施の形態1のユーザ情報1800の項目と同じである。
次に、以上のように構成される機器制御システム100Bの行う動作について、図面を参照しながら説明する。
以下、サーバ装置160の処理動作について説明する。
以下、上記機能を備えた操作端末130、操作端末130B、機器140、及びサーバ装置160を備えた機器制御システム100Bにおいて、操作端末130及び操作端末130Bを用いて機器140を遠隔操作する場合の一例について処理動作を具体的に説明する。
本実施の形態の機器制御システム100Bは、操作端末130からの操作指示で示された機能の実行をサーバ装置160が、一旦、その実行を拒否した場合であっても、当該ユーザのEメールアドレスに、操作端末130から送信した操作指示で示された機能を強制的に実行するか否かを問い合わせ、その操作対象の機器を操作する権限を有する正当なユーザからの指示によって、一旦、拒否した操作指示で示された機能の実行を再度判断し、実行することができる。
<3.実施の形態3>
<3.1 概要>
実施の形態1の機器制御システム100では、ユーザが操作端末130を操作して機器140の操作指示を行った際に、その操作対象の機器140の環境情報を取得した。
本実施の形態の機器制御システム100Cは、実施の形態1の機器制御システム100の構成と同じであるので、説明の便宜上、実施の形態1と同じ符号を用いて説明する。
次に、以上のように構成される機器制御システム100C行う動作について、図面を参照しながら説明する。
まず、操作端末130の処理動作について説明する。
なお、実施の形態1のステップS13で取得する機器の一覧が、このユーザが登録している機器全てであったのに対して、このステップS74で取得する機器の一覧は、ユーザが登録している機器のうち、ログインした時点において、操作指示があった場合にその機能の実行を許可し得るとサーバ装置160が判断した機能を持った機器のみの一覧である。
次に、サーバ装置160の処理動作について説明する。
以下、操作端末130、機器140、及びサーバ装置160を備えた機器制御システム100Cにおいて、操作端末130を用いて機器140を遠隔操作する場合の一例について処理動作を具体的に説明する。
<3.5 まとめ>
本実施の形態の機器制御システム100Cでは、サーバ装置160から操作端末130に、ログイン時の状態において遠隔操作が可能な機能についての情報だけが送信されることになる。すなわち、操作端末130がユーザに提示する機器を操作するための機能の一覧は、ログイン時における各機器の状態において実行可能な機能だけであり、ユーザは、操作指示を行う前に、操作指示を行おうとしている機能が実行可能な機能であるか否かを知ることができる。
<4.変形例>
以上、本発明に係る機器制御システムを、実施の形態に基づいて説明したが、以下のように変形することも可能であり、本発明は上述した実施の形態で示した通りの機器制御システムに限られないことは勿論である。
図41で示すユーザ情報1800Dのユーザ名1810、ユーザアカウント1820、パスワード1830、Eメールアドレス1835、権限レベル1836、属性情報1840、機種1850、型番1860、セキュリティモジュールID1870の項目は、実施の形態2のユーザ情報1800Bの項目と同じである。
ユーザが指示した操作指示に示された機能を実行するか否かの判断をしてもよい。このとき、サーバ装置160は、自機が取得した機器140の環境情報を操作端末130に送信する。
<5.補足>
以下、更に本発明の一実施形態としての機器制御システムの構成及びその変形例と効果について説明する。
110、120、120A、120B、120C セキュリティモジュール
130、130B 操作端末
140、140A、140B、140C 機器
150 ホームゲートウェイ
160 サーバ装置
170 ネットワーク
180 基地局
325 環境情報取得手段
370 操作端末情報格納手段
400 操作端末情報
910 コマンド受付手段
960 環境情報取得手段
970 機器情報格納手段
1000 機器情報
1210 コマンド確認手段
1720 判断手段
1730 ユーザ情報管理手段
1735 環境条件記憶手段
1740 機能情報管理手段
1745 環境情報取得手段
1760 コマンド発行手段
1800、1800B、1800C、1800D ユーザ情報
1900 機能情報
2000 コマンド情報
3000 動作条件情報
3100 位置条件情報
3200 日時条件情報
3300 気温条件情報
3400 在室時条件情報
4000、4100、4200 ログイン画面
4010、4110、4210 機器メニュー
4020、4120、4220 機能メニュー
4030、4130、4230 設定メニュー
Claims (12)
- 操作端末を用いて、サーバ装置を介して機器の遠隔操作を行う機器制御システムにおける機器制御方法であって、
前記機器を操作するための操作指示を前記操作端末から受け付ける操作指示受付ステップと、
前記操作指示を受け付けた際に、前記機器及び前記操作端末の少なくとも一方に係る環境情報を取得する環境情報取得ステップと、
前記操作指示に応じた処理を実行するか否かの判定を、前記環境情報が予め定められた条件を満たすか否かに基づいて行う判定ステップと、
前記判定ステップで肯定的な判定を行った場合には、前記機器に、前記操作指示に応じた処理を行うための実行コマンドを実行させ、否定的な判定を行った場合には、前記実行コマンドを実行させない実行制限ステップとを含む
ことを特徴とする機器制御方法。 - 更に、前記機器の機能ごとに、当該機器の動作状態において当該機能に応じた処理の実行を許可するか否かを示す操作条件を記憶する操作条件記憶ステップを備え、
前記環境情報は、前記機器の動作状態を示す情報を含み、
前記操作指示は、前記機能のうちの一の機能に係る操作指示であり、
前記判定ステップは、前記操作条件を参照し、前記環境情報で示される動作状態において、当該一の機能に応じた処理の実行が許可されていると判断した場合に肯定的な判定を行う
ことを特徴とする請求項1記載の機器制御方法。 - 前記環境情報は、前記操作端末及び前記機器の位置に係る位置情報を含み、
前記判定ステップは、前記位置情報に基づく当該操作端末と当該機器との位置関係に係る情報が予め定められた範囲内を示すと判断した場合に肯定的な判定を行う
ことを特徴とする請求項1記載の機器制御方法。 - 前記操作端末は、GPS(Global Positioning System)を利用した測位装置を有し、
前記環境情報取得ステップは、前記操作端末の前記位置情報を前記測位装置が出力する位置情報から得る
ことを特徴とする請求項3記載の機器制御方法。 - 前記環境情報は、前記操作端末が前記操作指示を行う際の時間に係る情報を含み、
前記判定ステップは、前記操作指示と前記時間との関係に係る条件において、前記時間に係る情報が予め定められた期間内を示す場合に肯定的な判定を行う
ことを特徴とする請求項1記載の機器制御方法。 - 前記環境情報は、前記機器の周囲の温度に係る情報を含み、
前記判定ステップは、前記操作指示と前記温度との関係に係る条件において、前記温度に係る情報が予め定められた温度範囲内を示す場合に肯定的な判定を行う
ことを特徴とする請求項1記載の機器制御方法。 - 更に、前記機器の周囲の予め定められた範囲内に人がいるか否かの検知を行う検知ステップを含み、
前記判定ステップは、前記操作指示と前記検知との関係に係る条件において、前記検知ステップが前記人がいないと検知した場合に肯定的な判定を行う
ことを特徴とする請求項1記載の機器制御方法。 - 更に、前記判定ステップで否定的な判定を行った場合に、その旨を示す情報を前記機器のユーザへ報知を行う報知ステップと、
前記報知を受けたユーザからの前記操作指示に係る情報の入力を受け付けるユーザ入力受付ステップと、
前記ユーザの前記入力に基づいて、前記操作指示に応じた処理を実行させるための操作権限に係る実行権限情報を出力する実行権限情報出力ステップと、
前記実行権限情報を受け付ける実行権限情報受付ステップと、
前記実行権限情報に基づいて、前記処理を強制的に実行させるための権限を有するか否かの検証を行う検証ステップとを備え、
前記実行制限ステップは、前記検証ステップで肯定的な判定を行った場合には、例外的に前記機器における前記処理を実行させる
ことを特徴とする請求項1記載の機器制御方法。 - 更に、前記機器の操作に係る処理を強制的に実行させる権限を有するユーザか否かの判定に係るユーザ情報を記憶するユーザ情報記憶ステップを備え、
前記実行権限情報には、前記操作指示を行ったユーザを特定するためのユーザ特定情報が含まれ、
前記検証ステップは、前記ユーザ特定情報と前記ユーザ情報とを照合することにより前記検証を行う
ことを特徴とする請求項8記載の機器制御方法。 - 操作端末を用いて、サーバ装置を介して機器の遠隔操作を行う機器制御システムにおける機器制御方法であって、
前記遠隔操作を行う際の前記機器及び前記操作端末の少なくとも一方に係る環境情報を取得する環境情報取得ステップと、
前記機器における機能ごとに、当該機能に応じた処理を実行するか否かの判定を、前記環境情報が予め定められた条件を満たすか否かに基づいて行う判定ステップと、
前記許否判定の結果を示す許否判定情報を前記操作端末に通知する許否判定情報通知ステップと、
前記許否判定情報おいて処理の実行を許可されたことを示す機能のうちの一の機能に係る操作指示を前記操作端末から出力する操作指示出力ステップと、
前記操作指示の入力を受け付ける操作指示入力ステップと、
前記機器により前記操作指示に応じた処理の実行制御を行う機器制御ステップとを含む
ことを特徴とする機器制御方法。 - サーバ装置と、操作端末と、機器とを含み、前記サーバ装置を介して、前記操作端末の操作指示によって前記機器の遠隔操作を行うための機器制御システムであって、
前記サーバ装置は、
前記操作端末及び前記機器と通信を行う通信手段と、
前記操作指示を、自機の通信手段を介して、前記操作端末から受け付ける操作指示受付手段と、
前記操作指示を受け付けた際に前記機器及び前記操作端末の少なくとも一方に係る環境情報を、前記通信手段を介して、取得する環境情報取得手段と、
前記操作指示に応じた処理を実行するか否かの判定を、前記環境情報が予め定められた条件を満たすか否かに基づいて行う判定手段と、
前記判定手段で肯定的な判定を行った場合には、自機の通信手段を介して、前記機器に、前記操作指示に応じた処理を行うための実行コマンドを送信し、否定的な判定を行った場合には、前記実行コマンドの送信を行わない実行制限手段とを備え、
前記操作端末は、
前記サーバ装置と通信を行う通信手段と、
前記機器を操作するための操作指示を、自機の通信手段を介して、前記サーバ装置に送信する操作指示手段と
自機の環境情報を、自機の通信手段を介して、前記サーバ装置に送信する環境情報出力手段とを備え、
前記機器は、
前記サーバ装置との通信を行う通信手段と、
自機の環境情報を、自機の通信手段を介して、前記サーバ装置に送出する環境情報送出手段と、
前記サーバ装置から、自機の通信手段を介して、前記実行コマンドを受け付ける実行指示受付手段と、
前記実行コマンドを受け取った場合に、当該実行コマンドに基づく処理の実行を行うコマンド実行手段とを備える
ことを特徴とする機器制御システム。 - 機器の遠隔操作を行うための機器制御システムで用いられ、操作端末から前記機器の遠隔操作を行うための操作指示を受け付け、前記操作指示に応じた処理の実行制御を行うサーバ装置であって、
前記操作端末及び前記機器との通信を行う通信手段と、
前記機器を操作するための操作指示を、前記通信手段を介して前記操作端末から受け付ける操作指示受付手段と、
前記操作指示を受け付けた際に前記機器及び前記操作端末の少なくとも一方に係る環境情報を、前記通信手段を介して取得する環境情報取得手段と、
前記操作指示に応じた処理を実行するか否かの判定を、前記環境情報が予め定められた条件を満たすか否かに基づいて行う判定ステップと、
前記判定手段で肯定的な判定を行った場合には、前記通信手段を介して、前記機器に対して、前記操作指示に応じた処理を行うための実行コマンドを送信し、否定的な判定を行った場合には、前記実行コマンドの送信を行わない実行制限手段とを備える
ことを特徴とするサーバ装置。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/415,807 US9774608B2 (en) | 2012-08-07 | 2013-08-01 | Device control method, device control system, and server device |
JP2014529278A JP6160929B2 (ja) | 2012-08-07 | 2013-08-01 | 機器制御方法、機器制御システム及びサーバ装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261680394P | 2012-08-07 | 2012-08-07 | |
US61/680,394 | 2012-08-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014024428A1 true WO2014024428A1 (ja) | 2014-02-13 |
Family
ID=50067683
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/004651 WO2014024428A1 (ja) | 2012-08-07 | 2013-08-01 | 機器制御方法、機器制御システム及びサーバ装置 |
PCT/JP2013/004673 WO2014024441A1 (ja) | 2012-08-07 | 2013-08-01 | 機器制御方法、機器制御システム |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/004673 WO2014024441A1 (ja) | 2012-08-07 | 2013-08-01 | 機器制御方法、機器制御システム |
Country Status (4)
Country | Link |
---|---|
US (2) | US9774608B2 (ja) |
JP (2) | JP6160929B2 (ja) |
TW (2) | TW201419878A (ja) |
WO (2) | WO2014024428A1 (ja) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100188A (zh) * | 2014-05-14 | 2015-11-25 | 夏普株式会社 | 网络系统、服务器、终端以及信息处理方法 |
JP2016046735A (ja) * | 2014-08-25 | 2016-04-04 | シャープ株式会社 | 制御装置、制御システム、制御装置の制御方法、および制御プログラム |
JP2017514417A (ja) * | 2014-03-20 | 2017-06-01 | メルノア インコーポレーテッド | バルブを制御する無線装置、システム、及び方法 |
JP2017523737A (ja) * | 2015-03-25 | 2017-08-17 | 小米科技有限責任公司Xiaomi Inc. | スマートホームデバイスの制御方法、装置、電子デバイス、プログラム及び記憶媒体 |
JP2018018142A (ja) * | 2016-07-25 | 2018-02-01 | 住友電気工業株式会社 | 機器管理装置および機器管理プログラム |
JP2019039570A (ja) * | 2017-08-22 | 2019-03-14 | シャープ株式会社 | 空気清浄システム |
WO2019146403A1 (ja) * | 2018-01-23 | 2019-08-01 | パナソニックIpマネジメント株式会社 | 便座動作設定システム、方法、及びプログラム |
WO2020008881A1 (ja) * | 2018-07-03 | 2020-01-09 | ソニー株式会社 | 情報処理装置および情報処理方法 |
WO2020084837A1 (ja) * | 2018-10-25 | 2020-04-30 | パナソニックIpマネジメント株式会社 | 情報端末、及び、操作支援プログラム |
WO2021177319A1 (ja) * | 2020-03-04 | 2021-09-10 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 不正通信検知方法、不正通信検知装置、及びプログラム |
JP2021525923A (ja) * | 2018-06-01 | 2021-09-27 | 上海掌門科技有限公司Shanghai Zhangmen Science And Technology Co., Ltd. | インテリジェント機器を制御する方法及び機器 |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5653409B2 (ja) * | 2012-08-30 | 2015-01-14 | 三菱電機株式会社 | 機器制御装置、機器制御方法、および、プログラム |
DE112013006478B4 (de) * | 2013-01-22 | 2020-03-26 | Mitsubishi Electric Corporation | Fernsteuerungssystem, Gerätesteuerungsvorrichtung und Programm |
US9794989B2 (en) * | 2013-12-06 | 2017-10-17 | Panasonic Intellectual Property Corporation Of America | Terminal apparatus and control method for assistive cooking |
JP6488691B2 (ja) * | 2014-03-03 | 2019-03-27 | 株式会社バッファロー | 無線中継装置、制御システムおよびコンピュータープログラム |
US9294575B1 (en) * | 2014-06-04 | 2016-03-22 | Grandios Technologies, Inc. | Transmitting appliance-specific content to a user device |
CN104504887B (zh) * | 2015-01-06 | 2018-09-04 | 连宁 | 一种无线遥控的控制方法及系统 |
US10757216B1 (en) | 2015-02-20 | 2020-08-25 | Amazon Technologies, Inc. | Group profiles for group item recommendations |
US11363460B1 (en) * | 2015-03-03 | 2022-06-14 | Amazon Technologies, Inc. | Device-based identification for automated user detection |
KR20160111220A (ko) * | 2015-03-16 | 2016-09-26 | 엘지전자 주식회사 | 전기제품, 전기제품의 펌웨어 업데이트 방법 및 네트워크 시스템 |
DE102015208830A1 (de) * | 2015-05-12 | 2016-11-17 | BSH Hausgeräte GmbH | Haushaltsgerät mit einer Türsteuerung |
TWI577319B (zh) * | 2015-07-22 | 2017-04-11 | 國立臺灣師範大學 | 多功能吹風機架 |
JP6706485B2 (ja) * | 2015-11-13 | 2020-06-10 | 東京電力ホールディングス株式会社 | 集中制御システム |
JP6660715B2 (ja) * | 2015-11-13 | 2020-03-11 | 東京電力ホールディングス株式会社 | 集中制御システム |
KR102638748B1 (ko) * | 2015-12-04 | 2024-02-20 | 삼성전자 주식회사 | 적어도 하나의 센서를 이용한 기기 관리 방법 및 장치 |
CN105956463B (zh) * | 2016-04-23 | 2019-01-11 | 腾讯科技(深圳)有限公司 | 一种设备控制方法、装置及终端 |
DE102016111971A1 (de) * | 2016-06-30 | 2018-01-04 | Fresenius Medical Care Deutschland Gmbh | Dediziertes Fernsteuern von mehreren Dialysegeräten |
CN106200404A (zh) * | 2016-08-26 | 2016-12-07 | 合肥康胜达智能科技有限公司 | 基于云平台的智能家居 |
DE102016221614A1 (de) * | 2016-11-04 | 2018-05-09 | BSH Hausgeräte GmbH | Verbinden eines Haushaltsgeräts mit einer Fernbedienung |
WO2018198958A1 (ja) * | 2017-04-27 | 2018-11-01 | 株式会社ノーリツ | 通信アダプタ、温水供給装置の遠隔操作システムおよび遠隔操作方法、ならびに、プログラム |
JP6775536B2 (ja) * | 2018-01-31 | 2020-10-28 | 日立グローバルライフソリューションズ株式会社 | プログラム、並びにプログラムとプログラムを有する操作端末と家電製品とを有する家電製品システム |
CN110609480B (zh) * | 2018-06-15 | 2022-05-06 | 青岛海尔洗衣机有限公司 | 家用电器的安全控制方法和系统 |
US11935399B2 (en) * | 2018-06-29 | 2024-03-19 | Sony Corporation | Sensing device, device management apparatus for sensing device, device selecting method, and device managing method |
CN111352348A (zh) * | 2018-12-24 | 2020-06-30 | 北京三星通信技术研究有限公司 | 设备控制方法、装置、电子设备及计算机可读存储介质 |
US20220012547A1 (en) * | 2018-12-24 | 2022-01-13 | Samsung Electronics Co., Ltd. | Method and apparatus for controlling smart device to perform corresponding operations |
EP4155951A4 (en) * | 2020-05-19 | 2023-07-12 | Mitsubishi Electric Corporation | APPARATUS, NETWORK APPARATUS, AND INSTRUCTION EXECUTION METHOD |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001145175A (ja) * | 1999-11-16 | 2001-05-25 | Matsushita Electric Ind Co Ltd | ネットワーク制御システム、及びネットワーク制御システムに用いるデバイス並びにコントローラ |
JP2002044763A (ja) * | 2000-07-28 | 2002-02-08 | Matsushita Electric Ind Co Ltd | 電子機器 |
JP2003120984A (ja) * | 2001-10-17 | 2003-04-23 | Sharp Corp | 空気調和機およびその制御方法 |
JP2003172536A (ja) * | 2001-09-28 | 2003-06-20 | Toto Ltd | 入浴時空調システム |
WO2004102902A1 (ja) * | 2003-05-14 | 2004-11-25 | Fujitsu Limited | ノード冗長制御方法およびノード冗長制御装置 |
JP2005348037A (ja) * | 2004-06-02 | 2005-12-15 | Toyota Motor Corp | 遠隔制御装置 |
JP2007336227A (ja) * | 2006-06-14 | 2007-12-27 | Canon Inc | 制御機器、被制御機器、これら含む遠隔制御システムおよび遠隔制御方法 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7025209B2 (en) * | 1998-05-29 | 2006-04-11 | Palmsource, Inc. | Method and apparatus for wireless internet access |
US7228429B2 (en) * | 2001-09-21 | 2007-06-05 | E-Watch | Multimedia network appliances for security and surveillance applications |
JP2004192017A (ja) * | 2001-02-06 | 2004-07-08 | Dainippon Printing Co Ltd | Icカードを装着した移動体通信端末を利用した情報家電端末の遠隔制御システムとそれに使用する移動体通信端末とicカード |
US20020147926A1 (en) * | 2001-04-04 | 2002-10-10 | Pecen Mark E. | Method and apparatus for authentication using remote multiple access SIM technology |
JP2003319471A (ja) | 2002-04-19 | 2003-11-07 | Toshiba Corp | 家電遠隔制御システム、センター装置及び携帯通信端末 |
US7839299B2 (en) * | 2003-03-12 | 2010-11-23 | Panasonic Corporation | Remote control device, remote control method, and remotely controlled device |
KR20070012570A (ko) | 2003-05-21 | 2007-01-25 | 가부시키가이샤 히다치 하이테크놀로지즈 | 지문센서내장 휴대 단말장치 |
JP4967259B2 (ja) | 2005-06-14 | 2012-07-04 | 船井電機株式会社 | 制御装置及び被制御機器 |
JP4259503B2 (ja) * | 2005-09-05 | 2009-04-30 | トヨタ自動車株式会社 | 遠隔操作システム |
KR100790173B1 (ko) * | 2006-02-23 | 2008-01-02 | 삼성전자주식회사 | 단문 메시지 서비스를 이용하여 무선 기기를 제어하기 위한방법과 홈 네트워크 시스템 및 이동 단말기 |
JP4595886B2 (ja) | 2006-05-24 | 2010-12-08 | 日本電気株式会社 | 機器不正使用防止システム、および機器 |
US20080001773A1 (en) * | 2006-06-29 | 2008-01-03 | X10 Ltd. | Programmable remote control and methods of using same |
US8239922B2 (en) * | 2007-08-27 | 2012-08-07 | Honeywell International Inc. | Remote HVAC control with user privilege setup |
CN101925915B (zh) * | 2007-11-21 | 2016-06-22 | 高通股份有限公司 | 设备访问控制 |
JP2010034912A (ja) | 2008-07-29 | 2010-02-12 | Kyocera Corp | 携帯端末、管理装置、icカード、および機能制限方法 |
US9312728B2 (en) * | 2009-08-24 | 2016-04-12 | Access Business Group International Llc | Physical and virtual identification in a wireless power network |
US8621219B2 (en) * | 2010-04-21 | 2013-12-31 | Samsung Electronics Co., Ltd | Communication system having plural terminals and method for controlling terminal in communication system |
US20120210150A1 (en) * | 2011-02-10 | 2012-08-16 | Alcatel-Lucent Usa Inc. | Method And Apparatus Of Smart Power Management For Mobile Communication Terminals |
-
2013
- 2013-08-01 JP JP2014529278A patent/JP6160929B2/ja not_active Expired - Fee Related
- 2013-08-01 US US14/415,807 patent/US9774608B2/en not_active Expired - Fee Related
- 2013-08-01 US US14/415,295 patent/US9882915B2/en not_active Expired - Fee Related
- 2013-08-01 WO PCT/JP2013/004651 patent/WO2014024428A1/ja active Application Filing
- 2013-08-01 JP JP2014529288A patent/JP6160930B2/ja not_active Expired - Fee Related
- 2013-08-01 WO PCT/JP2013/004673 patent/WO2014024441A1/ja active Application Filing
- 2013-08-02 TW TW102127810A patent/TW201419878A/zh unknown
- 2013-08-02 TW TW102127815A patent/TW201429264A/zh unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001145175A (ja) * | 1999-11-16 | 2001-05-25 | Matsushita Electric Ind Co Ltd | ネットワーク制御システム、及びネットワーク制御システムに用いるデバイス並びにコントローラ |
JP2002044763A (ja) * | 2000-07-28 | 2002-02-08 | Matsushita Electric Ind Co Ltd | 電子機器 |
JP2003172536A (ja) * | 2001-09-28 | 2003-06-20 | Toto Ltd | 入浴時空調システム |
JP2003120984A (ja) * | 2001-10-17 | 2003-04-23 | Sharp Corp | 空気調和機およびその制御方法 |
WO2004102902A1 (ja) * | 2003-05-14 | 2004-11-25 | Fujitsu Limited | ノード冗長制御方法およびノード冗長制御装置 |
JP2005348037A (ja) * | 2004-06-02 | 2005-12-15 | Toyota Motor Corp | 遠隔制御装置 |
JP2007336227A (ja) * | 2006-06-14 | 2007-12-27 | Canon Inc | 制御機器、被制御機器、これら含む遠隔制御システムおよび遠隔制御方法 |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10945109B2 (en) | 2014-03-20 | 2021-03-09 | Melnor, Inc. | Wireless apparatus, system, and method for controlling a valve |
JP2017514417A (ja) * | 2014-03-20 | 2017-06-01 | メルノア インコーポレーテッド | バルブを制御する無線装置、システム、及び方法 |
JP2015219566A (ja) * | 2014-05-14 | 2015-12-07 | シャープ株式会社 | ネットワークシステム、サーバ、端末、情報処理方法、およびプログラム |
US9998891B2 (en) | 2014-05-14 | 2018-06-12 | Sharp Kabushiki Kaisha | Network system, server, terminal, and information processing method |
CN105100188A (zh) * | 2014-05-14 | 2015-11-25 | 夏普株式会社 | 网络系统、服务器、终端以及信息处理方法 |
JP2016046735A (ja) * | 2014-08-25 | 2016-04-04 | シャープ株式会社 | 制御装置、制御システム、制御装置の制御方法、および制御プログラム |
JP2017523737A (ja) * | 2015-03-25 | 2017-08-17 | 小米科技有限責任公司Xiaomi Inc. | スマートホームデバイスの制御方法、装置、電子デバイス、プログラム及び記憶媒体 |
JP2018018142A (ja) * | 2016-07-25 | 2018-02-01 | 住友電気工業株式会社 | 機器管理装置および機器管理プログラム |
JP2019039570A (ja) * | 2017-08-22 | 2019-03-14 | シャープ株式会社 | 空気清浄システム |
WO2019146403A1 (ja) * | 2018-01-23 | 2019-08-01 | パナソニックIpマネジメント株式会社 | 便座動作設定システム、方法、及びプログラム |
CN111615353A (zh) * | 2018-01-23 | 2020-09-01 | 松下知识产权经营株式会社 | 座便动作设定系统、方法及程序 |
JPWO2019146403A1 (ja) * | 2018-01-23 | 2021-01-07 | パナソニックIpマネジメント株式会社 | 便座動作設定システム、方法、及びプログラム |
JP7117612B2 (ja) | 2018-01-23 | 2022-08-15 | パナソニックIpマネジメント株式会社 | 便座動作設定システム、方法、及びプログラム |
JP2021525923A (ja) * | 2018-06-01 | 2021-09-27 | 上海掌門科技有限公司Shanghai Zhangmen Science And Technology Co., Ltd. | インテリジェント機器を制御する方法及び機器 |
WO2020008881A1 (ja) * | 2018-07-03 | 2020-01-09 | ソニー株式会社 | 情報処理装置および情報処理方法 |
WO2020084837A1 (ja) * | 2018-10-25 | 2020-04-30 | パナソニックIpマネジメント株式会社 | 情報端末、及び、操作支援プログラム |
JPWO2020084837A1 (ja) * | 2018-10-25 | 2021-09-16 | パナソニックIpマネジメント株式会社 | 情報端末、及び、操作支援プログラム |
JP7033724B2 (ja) | 2018-10-25 | 2022-03-11 | パナソニックIpマネジメント株式会社 | 情報端末、及び、操作支援プログラム |
WO2021177319A1 (ja) * | 2020-03-04 | 2021-09-10 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 不正通信検知方法、不正通信検知装置、及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
US20150180880A1 (en) | 2015-06-25 |
JP6160930B2 (ja) | 2017-07-12 |
TW201419878A (zh) | 2014-05-16 |
WO2014024441A1 (ja) | 2014-02-13 |
US9882915B2 (en) | 2018-01-30 |
US9774608B2 (en) | 2017-09-26 |
JP6160929B2 (ja) | 2017-07-12 |
JPWO2014024428A1 (ja) | 2016-07-25 |
US20150168930A1 (en) | 2015-06-18 |
TW201429264A (zh) | 2014-07-16 |
JPWO2014024441A1 (ja) | 2016-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6160929B2 (ja) | 機器制御方法、機器制御システム及びサーバ装置 | |
US10887447B2 (en) | Configuration and management of smart nodes with limited user interfaces | |
US10586112B2 (en) | Method and system for provisioning an electronic device | |
US11546429B2 (en) | Device management system and device management method | |
US10015825B2 (en) | Smart-home device facilitating convenient setup of plural instances thereof in the smart home | |
US11665524B2 (en) | Apparatus and method for registering and associating internet of things (IoT) devices with anonymous IoT device accounts | |
US9130910B1 (en) | In-field smart device updates | |
US20160128104A1 (en) | In-field smart device updates | |
US11756412B2 (en) | Systems and methods for associating services and/or devices with a voice assistant | |
US10938811B2 (en) | Electronic apparatus to process request for having access to host apparatus, control method thereof, and system | |
CN108540523B (zh) | 物连网装置管理装置、通讯系统及通讯方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13827297 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2014529278 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14415807 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13827297 Country of ref document: EP Kind code of ref document: A1 |