WO2017094782A1 - 鍵管理プログラム、及び鍵管理装置 - Google Patents
鍵管理プログラム、及び鍵管理装置 Download PDFInfo
- Publication number
- WO2017094782A1 WO2017094782A1 PCT/JP2016/085581 JP2016085581W WO2017094782A1 WO 2017094782 A1 WO2017094782 A1 WO 2017094782A1 JP 2016085581 W JP2016085581 W JP 2016085581W WO 2017094782 A1 WO2017094782 A1 WO 2017094782A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- key management
- management device
- use condition
- lock release
- Prior art date
Links
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
Definitions
- Embodiments of the present invention relate to a key management program and a key management device.
- An entry / exit management system using an IC card or the like is generally put to practical use in order to control entry / exit of a user to a specific place.
- the entry / exit management system reads and authenticates information from an IC card held by a reader / writer provided in the vicinity of the door, and unlocks the door lock if the authentication is successful.
- Such an entrance and exit management system can record the time when the door is unlocked based on the history of authentication. Further, the entry / exit management system can set the time as the authentication condition so that the door can not be unlocked except for the time set as the condition.
- An object of the present invention is to provide a key management program with high security and a key management apparatus.
- the key management program is a key management program executed by a computer, and the computer includes a communication unit, a time acquisition unit, a key use condition acquisition unit, and a lock release processing unit. Make it work.
- the communication unit communicates with the key management device accommodating the key in a locked state in which removal is restricted.
- the time acquisition unit acquires the current time.
- the key use condition acquiring unit acquires a key use condition including a lock release time and identification information. When the current time is within the range of the lock release time, and the identification information included in the key use condition matches the identification information of the key management apparatus to be communicated, the lock release processing unit A lock release signal is transmitted to the management apparatus to release the lock state.
- FIG. 1 is a diagram for describing a configuration example of a key management system according to an embodiment.
- FIG. 2 is a diagram for describing a configuration example of a key management device according to an embodiment.
- FIG. 3 is a diagram for describing a configuration example of a first portable terminal according to an embodiment.
- FIG. 4 is a diagram for describing a configuration example of a server according to an embodiment.
- FIG. 5 is a diagram for describing an example of a management table according to an embodiment.
- FIG. 6 is a sequence diagram for explaining the operation of each component of the key management system according to the embodiment.
- FIG. 1 is an explanatory diagram for explaining a key management system 1 according to an embodiment.
- the key management system 1 is a system that manages the use of a key 6 corresponding to a lock (for example, a key cylinder).
- the key management system 1 enables, for example, the use of the key 6 when a preset condition is satisfied. Also, the key management system 1 can leave a history of use of the key 6.
- the key management system 1 includes, for example, a key management device 2, a first mobile terminal 3, a server 4, and a second mobile terminal 5.
- the key management device 2 is configured to be able to communicate with the first mobile terminal 3.
- the first portable terminal 3 and the second portable terminal 5 are configured to be able to communicate with the server 4 via the network N.
- the key management device 2 accommodates the key 6 in a locked state in which the key 6 can not be taken out.
- the first mobile terminal 3 determines whether the condition for use of the key 6 (key use condition) is satisfied, and when the key use condition is satisfied, the first mobile terminal 3 releases the lock state to the key management device 2.
- a lock release process of transmitting a signal (lock release signal) is performed.
- the server 4 sets the key use condition of the first mobile terminal 3 and records the history of use of the key 6.
- the second portable terminal 5 can browse the history of use of the key 6 by accessing the server 4.
- a key management device 2 in which a user who deposits his home key 6 with another person (for example, a housework agency service provider etc.) possesses the second portable terminal 5 and the service provider who visits the home described above houses the key 6. And the first portable terminal 3.
- the first mobile terminal 3 performs an unlocking process for releasing the lock state of the key management device 2.
- the service provider can retrieve the user's home key 6 from the key management device 2 when the lock release processing is normally performed by the first mobile terminal 3. Further, the user can browse the history of use of the key 6 by the second portable terminal 5.
- FIG. 2 is an explanatory diagram for describing a configuration example of the key management device 2 according to the embodiment.
- the key management device 2 includes a control unit 11, a key storage unit 12, a communication unit 13, and a power supply unit 14.
- the key accommodating portion 12 accommodates the key 6 in a locked state in which the key 6 can not be taken out.
- the key storage portion 12 is configured, for example, as a keyhole having a structure similar to that of a key cylinder corresponding to the key 6.
- the key storage unit 12 includes a lock mechanism 15 and a key detection unit 16.
- the lock mechanism 15 controls the insertion and removal of the key 6 inserted into the keyhole.
- the lock mechanism 15 makes the key 6 inserted into the keyhole of the key housing 12 in a non-extractable state (locked state) from the keyhole based on the control of the control unit 11.
- the lock mechanism 15 sets the key 6 inserted into the keyhole of the key storage unit 12 under the control of the control unit 11 so as to be able to be pulled out of the keyhole (unlocked state).
- the locking mechanism 15 includes an engagement member configured to be engageable with a portion of the key 6 inserted into the keyhole.
- the lock mechanism 15 drives the engagement member based on the control of the control unit 11, whereby the locked state in which the key 6 and the engagement member are engaged, and the key 6 and the engagement member are engaged. There is no unlock state, and switch.
- the key detection unit 16 detects whether the key 6 is inserted in the keyhole or the key 6 is pulled out of the keyhole. For example, when the key storage unit 12 is configured as a key cylinder including a plurality of pin tumblers, the key detection unit 16 may insert the key 6 into the key hole based on the position of the pin tumbler, or the key 6 from the key hole. It detects whether it has been pulled out. Further, the key detection unit 16 may be configured to detect the presence or absence of the key 6 simply by an optical sensor provided in the vicinity of the opening of the keyhole.
- the communication unit 13 performs wireless communication with the first mobile terminal 3.
- the communication unit 13 communicates with the first portable terminal 3 by, for example, Bluetooth (registered trademark), NFC (Near Field Communication) wireless LAN, or some other means.
- the power supply unit 14 supplies power to each unit of the key management device 2.
- the power supply unit 14 includes a chargeable battery.
- the power supply unit 14 charges the battery with power by power supply means connected to an external power supply source.
- the control unit 11 of the key management device 2 establishes a communication path with the first portable terminal 3 by the communication unit 13.
- the control unit 11 transmits information indicating the state of itself to the first portable terminal in response to the polling from the first portable terminal 3.
- the control unit 11 has a memory for storing its own identification information (key management device ID).
- the control unit 11 transmits the key management device ID to the first portable terminal in response to the polling from the first portable terminal 3.
- control unit 11 when receiving the lock release signal from the first portable terminal 3, the control unit 11 switches the state of the lock mechanism 15. For example, when the control unit 11 receives a lock release signal from the first portable terminal 3, the control unit 11 switches the lock mechanism 15 from the locked state to the unlocked state.
- the control unit 11 transmits to the first portable terminal 3 a removal notification indicating that the key 6 has been removed. .
- the CPU 21 is an arithmetic element that executes arithmetic processing.
- the CPU 21 performs various processing based on a program stored in the ROM 22 or the non-volatile memory 24 and data used in the program.
- the CPU 21 functions as a control unit capable of executing various operations by executing a program stored in the ROM 22 or the non-volatile memory 24.
- the ROM 22 is a read only non-volatile memory.
- the ROM 22 stores programs and data used in the programs.
- the ROM 22 is incorporated in the first portable terminal 3 in a state where a program according to the specification of the first portable terminal 3 and data used in the program are stored in advance.
- the RAM 23 is a volatile memory that functions as a working memory.
- the RAM 23 temporarily stores data and the like being processed by the CPU 21. Further, the RAM 23 temporarily stores a program to be executed by the CPU 21.
- the display 26 displays a screen based on the control of the CPU 21.
- the display 26 includes a display panel and a drive circuit for displaying a screen on the display panel.
- the display panel is, for example, a display device for displaying a liquid crystal display, an organic EL display, or another screen.
- the clock 29 obtains the time.
- the clock 29 may be configured to acquire the current time by measuring an elapsed time from a preset time, or may be configured to acquire the current time from another device on the network N. It is also good.
- the CPU 21 establishes a communication channel with the key management device 2 by the communication unit 27.
- the CPU 21 reads the status of the key management device 2 by polling the key management device 2.
- the CPU 21 reads the key management device ID of the key management device 2 by polling the key management device 2.
- the CPU 21 performs lock release processing to determine whether or not to transmit a lock release signal to the key management device 2 based on the key use condition stored in the non-volatile memory 24.
- the CPU 21 operates as a lock release processing unit.
- the key use condition includes, for example, a key management device ID and a lock release time.
- the CPU 21 determines whether or not the key management device ID of the key management device 2 in which the communication path is established matches the key management device ID indicated by the key use condition. Further, the CPU 21 determines whether the current time is within the range of the lock release time indicated by the key use condition. For example, the CPU 21 matches the key management apparatus ID of the key management apparatus 2 in which the communication path is established with the key management apparatus ID indicated by the key use condition, and the current time is the lock release time indicated by the key use condition. When it is determined to be within the range, it is determined to transmit the lock release signal to the key management device 2.
- the CPU 21 determines that the PIN as the second authentication information and the PIN as the first authentication information do not match, the user operating the first mobile terminal 3 operates the first mobile terminal It is determined that the user is not a legitimate user of 3.
- the control unit 31 controls the server 4.
- the control unit 31 includes a CPU, a ROM, a RAM, and the like.
- the storage unit 32 has a storage medium capable of storing various information.
- the storage unit 32 is configured of, for example, a solid state drive (SSD), a hard disk drive (HDD), or another storage device.
- the storage unit 32 has a storage area for storing the management table 35 in the storage medium.
- the communication unit 33 is a circuit for communicating with another electronic device.
- the communication unit 33 is connected to, for example, the network N.
- the communication unit 33 communicates with another electronic device via the network N.
- FIG. 5 is an explanatory view showing an example of the management table 35 according to an embodiment.
- the management table 35 includes various information for setting key use conditions, use history of the key 6, and the like.
- the management table 35 includes a customer ID, a key management device ID, a lock release time, identity authentication necessity, a key use time, and a key use place.
- the customer ID, the key management device ID, the lock release time, the key use time, and the key use place are associated with one another.
- the key management device ID is identification information for specifying the key management device 2.
- the key management device ID may be the MAC address of the key management device 2 or the ID of the SIM card attached to the key management device 2, or the key management device 2 is included in the key management device 2 and the key management device 2 is The identification information may be notified to the first portable terminal 3 from the key management device 2 when connected to the portable terminal 3 of the above.
- the lock release time is information indicating a time at which the key 6 can be removed from the key management device 2.
- the lock release time may include a start time and an end time.
- the necessity of identity verification is information indicating whether or not identity verification is to be performed.
- the CPU 21 of the first portable terminal 3 adopts the result of the personal authentication for determining whether or not to transmit the lock release signal to the key management device 2.
- the CPU 21 of the first portable terminal 3 does not adopt the result of the personal authentication for determining whether or not to transmit the lock release signal to the key management device 2.
- the key use place is information indicating the place where the key 6 is used.
- the key use place is, for example, position information generated in the first portable terminal 3 when the key 6 is extracted from the key management device 2.
- the control unit 31 of the server 4 determines the customer ID, the key management device ID, the lock release time, the identity authentication necessity, etc. Acquire and write in the management table 35.
- control unit 31 acquires the key use time, the key use place, and the like from the processing result received from the first portable terminal 3 communicating with the key management device 2 and writes the acquired information in the management table 35. For example, when the control unit 31 receives from the first portable terminal 3 a processing result indicating that the key 6 has been used, the control unit 31 associates the processing result with the key management device ID included in the processing result on the management table 35. Add the key usage time and key usage location. For example, when the processing result indicating that the key 6 has been used is received from the first portable terminal 3, the control unit 31 acquires the time included in the processing result as the key use time. Also, for example, when the control result indicates that the key 6 is used is received from the first portable terminal 3, the control unit 31 acquires position information included in the processing result as a key use place.
- control unit 31 generates a key use condition based on the data in the management table 35. For example, the control unit 31 generates a key use condition by extracting the key management device ID lock release time and the necessity of the person authentication from the management table 35. The control unit 31 transmits the key use condition to the first mobile terminal 3. The control unit 31 transmits the key use condition to the first portable terminal 3 whose communication path is established with the key management device 2 corresponding to the extracted key management device ID.
- the management table 35 may be associated with information for specifying the first mobile terminal 3 such as the mail address of the first mobile terminal 3, the telephone number, or some identification information. The control unit 31 identifies the first portable terminal 3 based on the information for identifying the first portable terminal 3 associated with the extracted key management device ID, and identifies the identified first portable terminal 3
- the key use condition may be transmitted to the key.
- control unit 31 generates information (key management information) for causing the second portable terminal 5 to display the key use condition and the use history of the key 6 and the like, and transmits the information to the second portable terminal 5 .
- the key management information includes, for example, information such as key usage conditions, key usage time, and key usage location.
- the control unit 31 when receiving the processing result indicating that the key 6 is used from the first portable terminal 3, the control unit 31 generates key management information and transmits the key management information to the second portable terminal 5. For example, when the e-mail address of the second portable terminal 5 is registered on the management table 35, the control unit 31 attaches key management information to an e-mail addressed to the e-mail address of the second portable terminal 5 Transmit to the second mobile terminal 5.
- control unit 31 may be configured to transmit key management information to the second portable terminal 5 in response to a request from the second portable terminal 5. For example, when the display of key management information is requested from the second portable terminal 5, the control unit 31 generates a screen for displaying key management information, and transmits the screen to the second portable terminal 5. Specifically, when the display of key management information is requested from the second mobile terminal 5 on the WEB page, the control unit 31 generates an HTML file for displaying the key management information, and the second mobile terminal It transmits to the terminal 5.
- the second portable terminal 5 possessed by the user who deposits the home key 6 obtains the key management information from the server 4 and displays the key management information, thereby enabling the user to confirm the usage status of the key 6.
- the second portable terminal 5 acquires key management information by receiving from the server 4 a mail with key management information attached.
- the second mobile terminal 5 may be configured to acquire key management information from the server 4 by accessing a predetermined WEB page on the server 4.
- the second mobile terminal 5 may be configured to obtain an HTML file generated based on the key management information but attached.
- the second mobile terminal 5 may transmit a request for changing the key use condition (key use condition change request) to the server 4.
- the second portable terminal 5 changes the lock release time of the management table 35 on the server 4 and the necessity of identity authentication by transmitting a new lock release time as a key use condition change request to the server 4. be able to.
- the server 4 newly generates a key use condition and transmits the key use condition to the first mobile terminal 3.
- the second portable terminal 5 can change the key use condition in the first portable terminal 3.
- the second mobile terminal 5 may be configured to transmit a request for releasing the lock state of the key management device 2 to the first mobile terminal 3 via the server 4 immediately.
- the second portable terminal 5 transmits a key use condition change request to the server 4 by e-mail.
- the second portable terminal 5 may be configured to transmit a key use condition change request to the server 4 by accessing a predetermined WEB page on the server 4.
- the second portable terminal 5 may be configured to directly transmit the key use condition change request to the first portable terminal 3 by e-mail.
- the second portable terminal 5 may be configured to execute the change of the key use condition as described above and the confirmation of the use history of the key 6 by a program. Further, the program stored in the second portable terminal 5 and the key management program stored in the first portable terminal 3 are configured in common, and are configured to be operated with a part of the functions restricted. It may be.
- FIG. 6 is a sequence diagram for explaining the operation of each component of the key management system according to the embodiment.
- the first mobile terminal 3 determines whether to transmit a lock release signal to the key management apparatus 2 based on the key management apparatus ID, the lock release time, and the result of the personal authentication. It will be described that it is a configuration.
- the first portable terminal 3 When the communication path with the key management device 2 is established, the first portable terminal 3 performs processing of sending polling to the key management device 2 at fixed time intervals (step S11). When the key management device 2 receives polling from the first portable terminal 3, the key management device 2 reads its own state, the key management device ID, etc., and sends a response to which the read information is added to the first portable terminal 3. (Step S12). As the first portable terminal 3 and the key management device 2 perform steps S11 and S12 at fixed time intervals, the first portable terminal 3 sequentially recognizes the state of the key management device 2.
- the server 4 generates a key use condition based on the data on the management table 35 at an arbitrary timing, when the management table 35 is updated, or at fixed time intervals (step S13).
- the server 4 transmits the generated key use condition to the first portable terminal 3 (step S14).
- the first mobile terminal 3 writes the key use condition acquired from the server 4 in the non-volatile memory 24 (step S15).
- the first portable terminal 3 performs an unlocking process at an arbitrary timing, when the key use condition of the non-volatile memory 24 is updated, or at a constant time interval (step S16).
- the first portable terminal 3 refers to the key use condition and determines whether or not personal authentication is necessary.
- the user operating the first mobile terminal 3 is an authorized user of the first mobile terminal 3 by performing the user authentication.
- Person authentication is performed to determine whether there is any (step S17).
- the first mobile terminal 3 determines whether the current time is within the range of the lock release time indicated by the key use condition (step S18). Next, the first mobile terminal 3 determines whether or not the key management device ID of the key management device 2 in which the communication path is established matches the key management device ID indicated by the key use condition (step S19). . In the first portable terminal 3, the key management apparatus ID of the key management apparatus 2 in which the communication path is established matches the key management apparatus ID indicated by the key use condition, and the current time indicates the key use condition indicates When it is determined that the user is in the range of the cancellation time, and a user authentication result indicating that the user operating the first mobile terminal 3 is an authorized user of the first mobile terminal 3 is obtained, It is determined to transmit the lock release signal to the key management device 2. When it is determined from the key use condition that the first mobile terminal 3 transmits the lock release signal, the first mobile terminal 3 transmits the lock release signal to the key management device 2 (step S20).
- the key management device 2 When the key management device 2 receives the lock release signal from the first portable terminal 3, the key management device 2 switches the state of the lock mechanism 15 from the locked state to the unlocked state (step S21). Further, the key management device 2 determines whether the key 6 has been pulled out of the keyhole (step S22). If it is determined that the key 6 has been pulled out of the keyhole, the key management device 2 transmits a removal notification indicating that the key 6 has been removed to the first portable terminal 3 (step S23).
- the first portable terminal 3 When the first portable terminal 3 receives the extraction notification from the key management device 2, it records that the key 6 has been used, the time, the position information, and the key management device ID as, for example, the non-volatile memory 24 as a processing result. (Step S24). Furthermore, the first mobile terminal 3 notifies the server 4 of the processing result (step S25).
- the server 4 acquires the key use time, the key use place and the like based on the processing result received from the first mobile terminal 3, and updates the management table 35 using the acquired key use time and key use place (step S26). Further, the server 4 generates key management information based on the information of the management table 35 updated when the processing result is received from the first portable terminal 3, and generates the generated key management information to the second portable terminal 5. Then, it transmits by mail (step S27).
- the second portable terminal 5 receives the mail attached with the key management information from the server 4 to acquire the key management information, and displays the acquired key management information (step S28). As a result, the second portable terminal 5 can make the user confirm the use status of the key 6.
- the second mobile terminal 5 When the second mobile terminal 5 performs an operation for accessing a predetermined WEB page on the server 4 (step S29), the second mobile terminal 5 accesses the WEB page for displaying key management information on the server 4 Are required (step S30).
- the server 4 When the display of key management information is requested from the second portable terminal 5 on the WEB page, the server 4 generates an HTML file for displaying the key management information (step S31).
- the server 4 transmits the generated HTML file to the second portable terminal 5 (step S32).
- the second mobile terminal 5 displays the HTML file transmitted from the server 4 (step S33). As a result, the second portable terminal 5 can make the user confirm the use status of the key 6.
- the key management system 1 includes the key management device 2 and the first portable terminal 3 in which the key management program is stored.
- the key management device 2 includes a key storage unit 12 that stores the key 6 in a locked state.
- the first mobile terminal 3 determines whether to release the lock state of the key management device 2 based on the key use condition acquired in advance. When it is determined that the lock state of the key management device 2 is released, the first portable terminal 3 releases the lock state of the key management device 2.
- the key management system 1 can set conditions for use of the conventional key 6 corresponding to the key cylinder or the like. As a result, security of key management can be improved.
- the first mobile terminal 3 determines whether or not the current time is a preset unlocking time. Further, the first portable terminal 3 determines whether it is connected to the key management device 2 set in advance, based on the key management device ID. In addition, the first mobile terminal 3 determines whether the user operating the first mobile terminal 3 is an authorized user of the first mobile terminal 3 or not. The first portable terminal 3 is connected to the preset key management device 2 as to whether or not the present time is the preset unlocking time. Whether or not to release the lock state of the key management device 2 is determined based on the determination result as to whether the user operating the mobile terminal 3 is the authorized user of the first mobile terminal 3 or not.
- the key management system 1 conditions the time, the combination of the first portable terminal 3 and the key management device 2, and the result of the user authentication as a condition for the use of the conventional key 6 corresponding to the key cylinder etc. Can be set. As a result, security of key management can be improved.
- the key management device 2 detects that the key 6 has been pulled out of the key hole of the key storage unit 12 by the key detection unit 16, and transmits the detection result to the first portable terminal 3.
- the first portable terminal 3 receives the detection result of extraction of the key 6 from the key management device 2
- the first portable terminal 3 records the time, the position information, the key management device ID, and the like as the processing result, thereby using the key 6
- the first portable terminal 3 receives the detection result of extraction of the key 6 from the key management device 2
- the first portable terminal 3 transmits the processing result to the server 4 via the network N, thereby using the key 6
- the history can be left on the server 4. As a result, security of key management can be improved.
- the second mobile terminal 5 may be configured to include the management table 35.
- the second portable terminal 5 performs updating of the management table 35, setting of the key use condition for the first portable terminal 3, and the like based on an operation or information input from another electronic device. Even with such a configuration, there is no need to go through the server 4, so the system can be simplified.
- the first mobile terminal 3 when it is determined that the user of the first mobile terminal 3 is a legitimate user, the first mobile terminal 3 permits activation of the key management program, and the user of the first mobile terminal 3 is a legitimate user. If it is determined that the above is not the case, the key management program may be inhibited from being activated. Furthermore, the first mobile terminal 3 may be configured to use the result of the person authentication at the time of activation of the key management program to determine whether to transmit a lock release signal to the key management device 2.
Landscapes
- Lock And Its Accessories (AREA)
Abstract
Description
鍵管理システム1は、錠(例えばキーシリンダなど)に対応した鍵(キー)6の使用を管理するシステムである。鍵管理システム1は、例えば、予め設定された条件が満たされた場合に鍵6の使用を可能にする。また、鍵管理システム1は、鍵6の使用の履歴を残すことができる。
Claims (9)
- コンピュータにより実行される鍵管理プログラムであって、
前記コンピュータを、
引き抜きを制限したロック状態で鍵を収容する鍵管理装置と通信する通信部と、
現在時刻を取得する時刻取得部と、
ロック解除時刻と識別情報とを含む鍵使用条件を取得する鍵使用条件取得部と、
前記現在時刻が前記ロック解除時刻の範囲内であり、且つ前記鍵使用条件に含まれる前記識別情報と前記通信する前記鍵管理装置の識別情報とが一致する場合に前記鍵管理装置にロック状態を解除させるロック解除信号を送信するロック解除処理部と、
として動作させる鍵管理プログラム。 - さらに、前記コンピュータを、前記ロック解除処理部により前記鍵管理装置にロック解除信号を送信し、且つ前記鍵管理装置から前記鍵が引き抜かれたことを示す引き抜き通知を受信した場合、現在時刻を鍵使用時刻とした履歴情報をメモリに記録する履歴記録部として動作させる請求項1に記載の鍵管理プログラム。
- さらに、前記コンピュータを、前記鍵管理装置から前記引き抜き通知を受信した場合、前記鍵管理装置の位置情報を取得する位置情報取得部として動作させ、
前記履歴記録部は、前記位置情報を含む前記履歴情報をメモリに記録する請求項2に記載の鍵管理プログラム。 - 前記鍵使用条件は、前記鍵を使用可能な場所をさらに含み、
前記ロック解除処理部は、前記鍵使用条件に含まれる前記使用可能な場所と前記位置情報との差が予め設定された値以上である場合に前記鍵管理装置のロック状態の解除を制限し、予め設定された値未満である場合に前記鍵管理装置のロック状態の解除を許可する請求項3に記載の鍵管理プログラム。 - 前記鍵使用条件は、本人認証の要否をさらに含み、
前記ロック解除処理部は、前記鍵使用条件において本人認証が要である場合、前記コンピュータを操作しているユーザが前記コンピュータの正規のユーザであるか否かを判定する本人認証を行い、前記コンピュータを操作しているユーザが前記コンピュータの正規のユーザであると判定した場合、前記鍵管理装置のロック状態の解除を許可する請求項3に記載の鍵管理プログラム。 - さらに、前記コンピュータを、前記履歴情報を外部機器に通知する通知部として動作させる請求項2乃至5のいずれか1項に記載の鍵管理プログラム。
- 前記通知部は、前記引き抜き通知が受信してから予め設定された時間内に前記鍵管理装置から前記鍵が挿入されたことを示す挿入通知が受信されない場合に異常を示す通知を外部機器に通知する請求項6に記載の鍵管理プログラム。
- 引き抜きを制限したロック状態で鍵を収容する鍵収容部と、
外部機器と通信を確立する通信部と、
前記外部機器からロック解除信号を受信した場合に前記ロック状態を解除する制御部と、
前記鍵収容部から前記鍵が引き抜かれたことを検知する鍵検知部と、
前記鍵が引き抜かれたことを前記外部機器に通知する通知部と、
を具備する鍵管理装置。 - 前記通知部は、前記ロック解除信号を受信していない状態で前記鍵が前記鍵収容部から引き抜かれたことが前記鍵検知部により検知された場合、異常を示す通知を前記外部機器に送信する請求項8に記載の鍵管理装置。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2018124001A RU2018124001A (ru) | 2015-12-03 | 2016-11-30 | Программа управления ключом и устройство управления ключом |
KR1020187015685A KR20180081092A (ko) | 2015-12-03 | 2016-11-30 | 키 관리 프로그램을 기록한 컴퓨터 판독가능한 비휘발성 기록 매체, 키 관리 장치, 및 키 관리 시스템 |
EP16870719.8A EP3385477A4 (en) | 2015-12-03 | 2016-11-30 | PROGRAM AND DEVICE FOR KEY MANAGEMENT |
CN201680070209.2A CN108431350A (zh) | 2015-12-03 | 2016-11-30 | 钥匙管理程序以及钥匙管理装置 |
US15/995,941 US20180283046A1 (en) | 2015-12-03 | 2018-06-01 | Key management program and key management device |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2015-236751 | 2015-12-03 | ||
JP2015236751 | 2015-12-03 | ||
JP2016-144260 | 2016-07-22 | ||
JP2016144260A JP2017106296A (ja) | 2015-12-03 | 2016-07-22 | 鍵管理プログラム、及び鍵管理装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/995,941 Continuation US20180283046A1 (en) | 2015-12-03 | 2018-06-01 | Key management program and key management device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017094782A1 true WO2017094782A1 (ja) | 2017-06-08 |
Family
ID=58797346
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2016/085581 WO2017094782A1 (ja) | 2015-12-03 | 2016-11-30 | 鍵管理プログラム、及び鍵管理装置 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2017094782A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022090021A (ja) * | 2017-12-18 | 2022-06-16 | ローレルバンクマシン株式会社 | 予約管理システム、予約管理方法およびプログラム |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004190451A (ja) * | 2002-12-13 | 2004-07-08 | Token Corp | 電子錠 |
JP2005188199A (ja) * | 2003-12-26 | 2005-07-14 | Fujitsu Ltd | ネットワーク鍵管理システム及び鍵管理サーバ |
JP2007120103A (ja) * | 2005-10-27 | 2007-05-17 | Toko Electric Corp | キーホルダ、セキュリティ・キーボックスおよびキー管理システム |
US20090153291A1 (en) * | 2007-11-12 | 2009-06-18 | Ge Security, Inc. | Method and apparatus for communicating access to a lockbox |
JP2014240587A (ja) * | 2013-06-12 | 2014-12-25 | 株式会社アーバンレック | キー提供システム |
-
2016
- 2016-11-30 WO PCT/JP2016/085581 patent/WO2017094782A1/ja active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004190451A (ja) * | 2002-12-13 | 2004-07-08 | Token Corp | 電子錠 |
JP2005188199A (ja) * | 2003-12-26 | 2005-07-14 | Fujitsu Ltd | ネットワーク鍵管理システム及び鍵管理サーバ |
JP2007120103A (ja) * | 2005-10-27 | 2007-05-17 | Toko Electric Corp | キーホルダ、セキュリティ・キーボックスおよびキー管理システム |
US20090153291A1 (en) * | 2007-11-12 | 2009-06-18 | Ge Security, Inc. | Method and apparatus for communicating access to a lockbox |
JP2014240587A (ja) * | 2013-06-12 | 2014-12-25 | 株式会社アーバンレック | キー提供システム |
Non-Patent Citations (1)
Title |
---|
See also references of EP3385477A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022090021A (ja) * | 2017-12-18 | 2022-06-16 | ローレルバンクマシン株式会社 | 予約管理システム、予約管理方法およびプログラム |
JP7389439B2 (ja) | 2017-12-18 | 2023-11-30 | ローレルバンクマシン株式会社 | 予約管理システム、予約管理方法およびプログラム |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109790727B (zh) | 挂锁装置、包括挂锁装置的系统及其操作方法 | |
JP2017106296A (ja) | 鍵管理プログラム、及び鍵管理装置 | |
US10565809B2 (en) | Method, system and device for securing and managing access to a lock and providing surveillance | |
JP5172847B2 (ja) | 電子機器 | |
US20060085847A1 (en) | Locking system and locking method | |
US20020049881A1 (en) | Information processing apparatus, information processing apparatus control method and storage medium | |
KR101717992B1 (ko) | 공용 도어락 제어 시스템 및 방법 | |
JP2019144695A (ja) | 顔認証システム、顔認証サーバおよび顔認証方法 | |
JP4812371B2 (ja) | 画像表示制御システム、認証システム及びアプリケーション管理装置 | |
JP4274283B1 (ja) | 生体認証手段を備えたid信号発信装置 | |
JP3834056B1 (ja) | 認証システム、リーダ・ライタ装置及び保管庫 | |
WO2017094782A1 (ja) | 鍵管理プログラム、及び鍵管理装置 | |
CN111797376A (zh) | 自动更新数据保存的自动废止期限的车辆生物识别系统 | |
US9058476B2 (en) | Method and image forming apparatus to authenticate user by using smart card | |
JP2008250821A (ja) | 認証システム、認証装置、認証方法及び認証プログラム | |
KR102442149B1 (ko) | 외부 단말기기를 이용한 사용자인증 기반의 전자키 및 그 동작 방법 | |
JP2008144531A (ja) | 電子錠制御システム | |
EP3017433B1 (en) | Secure mode for electronic access control readers | |
JP2007217903A (ja) | キーと解錠装置と鍵装置とキー用プログラムと解錠装置用プログラム | |
JP2021195748A (ja) | 情報処理装置及びシステム | |
JP2007197924A (ja) | カードロックシステム | |
KR100515166B1 (ko) | 비상도어개폐기능을 가진 지문인식 도어개폐 시스템 | |
JP6660769B2 (ja) | 解錠装置、解錠システム、解錠装置の制御方法、制御プログラム、および記録媒体 | |
JP2009281035A (ja) | 入退室制御装置およびそれを用いた入退室管理システム | |
JP2022024858A (ja) | 情報処理方法、及び、情報処理システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16870719 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20187015685 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2016870719 Country of ref document: EP Ref document number: 2018124001 Country of ref document: RU |