WO2020080314A1 - 位置特定システム、位置特定装置、位置特定方法、位置特定プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器 - Google Patents
位置特定システム、位置特定装置、位置特定方法、位置特定プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器 Download PDFInfo
- Publication number
- WO2020080314A1 WO2020080314A1 PCT/JP2019/040332 JP2019040332W WO2020080314A1 WO 2020080314 A1 WO2020080314 A1 WO 2020080314A1 JP 2019040332 W JP2019040332 W JP 2019040332W WO 2020080314 A1 WO2020080314 A1 WO 2020080314A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- position specifying
- personal
- time
- terminal
- unit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/14—Determining absolute distances from a plurality of spaced points of known location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S11/00—Systems for determining distance or velocity not using reflection or reradiation
- G01S11/02—Systems for determining distance or velocity not using reflection or reradiation using radio waves
- G01S11/06—Systems for determining distance or velocity not using reflection or reradiation using radio waves using intensity measurements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/318—Received signal strength
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0205—Details
- G01S5/021—Calibration, monitoring or correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
Definitions
- the present invention relates to a position specifying system, a position specifying device, a position specifying method, a position specifying program, a computer-readable recording medium, and a recorded device.
- GPS Global Positioning System
- Wi-Fi positioning base station positioning, sound wave positioning, Bluetooth positioning (BLE beacon), visible light positioning, camera image positioning, barometric positioning, PDR (Pedestrian Dead-) are commonly used for indoor position measurement. Reckoning), geomagnetic positioning, GPS, IMES (Indoor Messaging System), and so on.
- PDR Portable Network Deformation
- IMES Indoor Messaging System
- beacon signal there is a BLE beacon based on a general-purpose BLE (Bluetooth Low Energy) standard that enables communication with extremely low power consumption and is low cost.
- BLE beacon has extremely low consumption and is versatile among wireless standards. If you can use this BLE beacon to capture, distinguish, and recognize each person moving with a smartphone terminal etc. with high speed and high accuracy, not only for location determination but also by approaching instead of a key.
- Patent Documents 3 and 4 For example, a mechanism for approving a beacon base station and a terminal has been developed for security related to payment authentication (Patent Document 5). However, since it cannot be linked with the measurement of the position, in order to specify the payer, the other party such as displaying the face on the cash register machine or the like and handing over the product is manually specified. Other methods such as NFC or two-dimensional bar code authentication of the payment terminal have been proposed, but none of them has reported a security method of linking position measurement and payment in a touchless manner.
- An object of the present invention is to provide a position specifying system, a position specifying device, a position specifying method, a position specifying program, a computer-readable recording medium, and a recorded device capable of stably performing position detection indoors. To do.
- a position specifying system including a personal portable terminal carried by an individual whose position is to be specified, and a position specifying device specifying the position of the personal portable terminal.
- the personal portable terminal is a personal terminal side transmitting unit for transmitting a position specifying signal used for specifying a position to the position specifying device, and a personal terminal side control for controlling the personal terminal side transmitting unit.
- a plurality of units arranged at a first position separated by a first distance from the personal portable terminal for receiving the position specifying signal transmitted by the personal terminal side transmitter.
- a first position specifying side receiving unit and a plurality of second positions which are different from the first position and which are arranged at a second position separated from the personal portable terminal by a second distance longer than the first distance.
- Location-specific reception And a position specifying side computing unit for specifying the position of the personal portable terminal based on the intensity difference of the position specifying signals respectively received by the first position specifying side receiving unit and the second position specifying side receiving unit. And can be provided.
- the position identification side arithmetic unit is a radio wave of the position identification signal received by the plurality of first position identification side reception units. Intensity, the difference between the radio field intensity of the position identification signal received by the plurality of second position identification side receiving unit, and calculates a conditional expression comparing the magnitude of a preset threshold, the personal mobile terminal It can be configured to locate.
- the position identifying side computing unit is configured to identify the position identified by the plurality of first position identifying side receiving units.
- the personal terminal side control unit causes the personal portable terminal to move a certain distance from the position identifying device (for example, It is possible to control that the personal terminal side transmitting unit transmits a position specifying signal to the position specifying device by detecting the approach within 10 m or 100 m.
- the personal terminal side transmitting unit transmits a position specifying signal to the position specifying device before an individual carrying the personal portable terminal approaches the position specifying device, and A smooth position specifying operation can be executed with the position specifying device.
- the position identifying system of the fifth aspect of the present invention in addition to any of the above configurations, it is installed at a position further away from the position identifying device by a certain distance (for example, 10 m or 100 m).
- a start signal transmitter for transmitting a start signal for starting the operation of transmitting the position specifying signal to the position specifying device by the personal terminal side transmitter to the personal portable terminal can be provided.
- the personal terminal side transmitting unit and the position specifying side receiving unit can perform bidirectional communication.
- the position-specific side computing unit may be configured to authenticate the personal portable terminal by communicating with the personal-terminal-side transmitting unit at the position-specific side receiving unit.
- the personal mobile terminal further stores an individual identification information given in advance.
- the personal terminal side control section is provided with a unique identification stored in the personal terminal side storage section when the personal terminal side control section communicates with the position specifying side receiving section at the personal terminal side transmitting section. It is possible to issue information and a unique one-time password that can be used only once for each of the identification information, and the position specifying side computing unit receives the position specifying side receiving unit from the personal terminal side transmitting unit. It can be configured to authenticate identification information and one-time passwords.
- the personal portable terminal further includes a personal terminal side time section for generating information regarding time.
- the personal terminal side storage unit has a common key unique to the identification information given to the personal portable terminal, which is exchanged in advance between the personal portable terminal and the position specifying device, and the one-time password. Holds a predetermined function to be used for generating, and the position specifying device further holds the identification information given to the personal portable terminal and the common key unique to each identification information in association with each other.
- a position specifying side time unit for generating time-related information and the personal mobile terminal transmits the identification information and the one-time password to the position specifying device.
- the personal terminal side control unit obtains information on the issuing time when the one-time password is issued by the personal terminal side time unit, and applies it to a predetermined function held in the personal terminal side storage unit. Further, it is configured to issue the one-time password by encrypting with a common key held in the personal terminal side storage unit, and the position specifying side arithmetic unit is the position specifying side receiving unit, The reception time when the identification information and the one-time password are received from the personal terminal side transmission unit is acquired from the position determination side time unit, and a common key corresponding to the identification information is acquired from the received identification information.
- the one-time password is decrypted using the common key obtained by searching from the storage unit on the position specifying side, information regarding the functionalized issuing time is acquired, and the one-time password is obtained at one receiving time.
- the difference between the information about the issuance time acquired by the above and the information about the one reception time is compared with the difference between the information about the issuance time acquired at another reception time and the information about the another reception time.
- the personal portable terminal may be authenticated if the difference is within a predetermined time, and the personal portable terminal may not be authenticated unless the difference is within a predetermined time.
- the position identification side arithmetic unit stores information about the issue time acquired at the one reception time.
- a difference between the information regarding the one reception time and the information regarding the issuance time acquired at another reception time, which is stored in the position specifying side storage unit as authentication reference information, and the difference between the information regarding the another reception time. Can be configured to authenticate the personal mobile terminal by comparing with the authentication reference information stored in the position specifying side storage unit.
- the authentication reference information stored in the position identification side storage unit is stored for a certain period of time (for example, 1 minute or It can be configured to delete after 10 minutes, 1 hour, etc.).
- a certain period of time for example, 1 minute or It can be configured to delete after 10 minutes, 1 hour, etc.
- the position identifying side computing unit performs payment when the personal portable terminal is authenticated. Can be configured.
- the position identification device may further include the personal portable terminal measured by the position identification side arithmetic unit.
- a position specifying side control unit for controlling an operation of restricting movement of an individual carrying the personal portable terminal according to a position can be provided.
- the position identifying device is an openable door that restricts passage of an individual carrying a personal portable terminal. It is a gate having a section, and the position specifying side control section can control opening and closing of the door section.
- the communication method with the personal terminal side transmitting unit and the position specifying side receiving unit is BLE, RFID. Or it can be Wi-Fi.
- the personal portable terminal functions as a ticket for public transportation
- the position identifying device includes: It can be configured to perform authentication and settlement of a ticket for an individual carrying the personal portable terminal.
- an individual portable terminal carried by an individual whose position is to be identified in addition to any one of the above configurations, an individual portable terminal carried by an individual whose position is to be identified, and a position of the individual portable terminal.
- the personal mobile terminal includes a personal terminal side transmitter for performing two-way communication with the position specifying device and a personal terminal side transmitter.
- the personal terminal side control unit for controlling, the unique identification information given in advance, and the identification information given to the personal mobile terminal exchanged in advance between the personal mobile terminal and the position specifying device.
- the position specifying side calculation unit for performing the operation, the position specifying side storage unit for holding the identification information assigned to the personal portable terminal, and the common key unique to each of the identification information, and the time information.
- a position specifying side time unit for generating the position and when the personal terminal side control unit communicates with the position specifying side receiving unit at the personal terminal side transmitting unit, the personal terminal side holding unit holds the personal terminal side storage unit. It is possible to issue the unique identification information and a one-time password that can be used only once for each identification information, and the position specifying side computing unit causes the position specifying side receiving unit to send the personal terminal side call.
- the identification information received from the department And the one-time password are authenticated, and when the personal mobile terminal transmits the identification information and the one-time password to the position specifying device, the personal-terminal-side control unit issues the one-time password.
- the information about the issue time at the time of acquisition is obtained by the personal terminal side time section, applied to the predetermined function held in the personal terminal side storage section, and further by the common key held in the personal terminal side storage section. It is configured to issue the one-time password by encryption, and the position-specific side computing unit receives the identification information and the one-time password from the personal terminal-side transmitting unit at the position-specific side receiving unit.
- the reception time at this time is acquired from the position specifying side time part, and the common key corresponding to the identification information is specified from the received identification information.
- the one-time password is decrypted using the obtained common key by searching from the side storage unit, and the information on the issuance time that has been functionalized is acquired, and the information about the issuance time acquired at one reception time, and If the difference between the information regarding one reception time is compared with the difference between the information regarding the issuance time acquired at another reception time and the information regarding the another reception time, and if the difference is within a predetermined time
- the personal portable terminal can be authenticated, and the personal portable terminal is not authenticated unless it is within a predetermined time.
- the position specifying device specifies the position of the personal portable terminal carried by the individual whose position is to be specified.
- a plurality of plural terminals arranged at a first position apart from the personal portable terminal by a first distance for receiving a position specifying signal used for specifying a position, which is transmitted from the personal terminal side transmitter to the position specifying device.
- a position specifying signal used for specifying a position, which is transmitted from the personal terminal side transmitter to the position specifying device.
- the first position specifying side receiving unit and a plurality of first positions which are different from the first position and are arranged at a second position separated from the personal portable terminal by a second distance longer than the first distance.
- the position specifying method of the eighteenth aspect of the present invention it is provided with a personal mobile terminal carried by an individual whose position is to be specified, and a position specifying device for specifying the position of the personal mobile terminal.
- a position specifying method for specifying the position of the personal portable terminal wherein the personal portable terminal detects that an individual carrying the personal portable terminal has approached the position specifying device within a certain distance.
- the personal terminal side control unit activates the personal terminal side transmission unit, and the personal portable terminal transmits a position specifying signal used for specifying a position from the personal terminal side transmitting unit to the position specifying device.
- a plurality of first position features arranged at a first position where the position specifying device transmits the position specifying signal transmitted by the personal terminal side transmitting unit at a first distance from the personal portable terminal.
- the side receiving unit and a plurality of second position specifying side receptions that are different from the first position and are arranged at a second position that is separated from the personal portable terminal by a second distance that is longer than the first distance.
- a plurality of first position specifying side receiving units and a plurality of second position specifying side receiving units respectively receive the position specifying signals on the basis of the intensity difference between the positions. Identifying the location of the terminal.
- the personal terminal side transmitting section is Transmitting the unique identification information held in the personal terminal side storage unit and a unique one-time password that can be used only once for each of the identification information to the position identification side receiving unit;
- the side calculation unit includes a step of authenticating the personal mobile terminal based on the identification information and the one-time password, and the personal mobile terminal transmits the identification information and the one-time password to the position measuring machine.
- the personal terminal side control unit acquires information about the issuing time when the one-time password is issued by the personal terminal side time unit, and is stored in the personal terminal side storage unit.
- the one-time password is issued by encrypting with a common key held in the personal terminal side storage unit, and the position specifying side arithmetic unit is configured to apply the identification information and the one
- the position measuring side computing unit receives the identification information and the one-time password from the personal terminal side transmitting unit at the position measuring side communication unit.
- the reception time at the time is acquired from the position measurement side time part, and the common key corresponding to the identification information is searched from the position measurement side storage part from the received identification information, and the obtained common key is used.
- the one-time password is decrypted, information on the functionalized issuing time is acquired, and information on the issuing time acquired at one receiving time and the one receiving time are obtained.
- the difference between the information about the issue time acquired at another reception time and the difference between the information about the another reception time and the information about the other reception time, and if the difference is within a predetermined time It is possible to authenticate the terminal and not authenticate the personal portable terminal unless it is within a predetermined time. As a result, it is possible to authenticate the individual carrying the personal mobile terminal, and it is possible to detect the position by distinguishing the individual.
- the position specifying program of the twentieth aspect of the present invention it is provided with a personal portable terminal carried by an individual whose position is to be specified, and a position specifying device for specifying the position of the personal portable terminal.
- the position specifying system which is a position specifying program for specifying the position of the personal portable terminal
- the personal portable terminal detects that an individual carrying the personal portable terminal has approached the position specifying device within a certain distance.
- the personal terminal side control unit activates the personal terminal side transmitting unit, and the personal portable terminal transmits a position specifying signal used for specifying a position from the personal terminal side transmitting unit to the position specifying device.
- a plurality of functions, and the position specifying device arranges the position specifying signal transmitted by the personal terminal side transmitter at a first position separated from the personal portable terminal by a first distance.
- a first position specifying side receiving unit and a plurality of second positions which are different from the first position and which are arranged at a second position separated from the personal portable terminal by a second distance longer than the first distance.
- the position specifying side computing unit based on the function of receiving each and the strength difference of the position specifying signals respectively received by the plurality of first position specifying side receiving units and the second position specifying side receiving units, the position specifying side computing unit The computer can be made to realize the function of specifying the position of the personal portable terminal.
- a computer-readable recording medium or recorded device stores the above program.
- the recording medium is CD-ROM, CD-R, CD-RW, flexible disk, magnetic tape, MO, DVD-ROM, DVD-RAM, DVD-R, DVD + R, DVD-RW, DVD + RW, Blu-ray (registered. Trademark), HD DVD (AOD), and other magnetic disks, optical disks, magneto-optical disks, semiconductor memories, and other media capable of storing programs are included.
- the programs include programs distributed by downloading through a network line such as the Internet.
- the recording medium includes a device capable of recording the program, for example, a general-purpose device or a dedicated device in which the program is implemented in the form of software, firmware, or the like in an executable state.
- a device capable of recording the program for example, a general-purpose device or a dedicated device in which the program is implemented in the form of software, firmware, or the like in an executable state.
- each process or function included in the program may be executed by computer-executable program software, or the process of each unit may be executed by hardware such as a predetermined gate array (FPGA, ASIC, DSP) or a program. It may be implemented in a form in which software and partial hardware modules that implement some elements of hardware are mixed.
- FIG. 7 It is a conceptual diagram which shows the example which arrange
- FIG. 7 it is a conceptual diagram which shows the example of the existence area of the transmitter calculated
- FIG. 4 is a histogram showing a difference between four BLE receivers arranged at two different distances from the BLE transmitter and averaging the radio field intensity at each position. It is a schematic diagram which shows the example which has arrange
- FIG. 3 is a functional block diagram of the position specifying system according to the first embodiment. It is a block diagram of a position identification system. It is a schematic diagram which shows the position identification system which concerns on Embodiment 2.
- FIG. 21 is a schematic diagram showing an existing area of a BLE receiver obtained from a radio wave intensity difference of a BLE transmitter in the arrangement example of FIG. 20. In Embodiment 2, it is a schematic diagram which shows the example which has arrange
- FIG. 23 is a schematic diagram showing an example of an existing area of a BLE receiver obtained from a radio wave intensity difference of a BLE transmitter in the arrangement example of FIG. 22. It is a schematic diagram which shows the position identification system which concerns on Embodiment 3. It is a schematic diagram which shows the example which has arrange
- FIG. 26 is a schematic diagram showing an example of an existing area of a BLE receiver obtained from a difference between averaged radio wave intensities of BLE transmitters in the arrangement example of FIG. 25. It is a schematic diagram which shows the example which pinpoints the position of a BLE transmitter by limiting the existing area of a BLE receiver.
- FIG. 35A is a perspective view showing an external configuration example of a position specifying device
- FIG. 35B is a perspective view showing an external configuration example of a position specifying device according to a modification.
- FIG. 36A is a plan view of the position identifying device
- FIG. 36B is a cross-sectional view taken along line XXXVIB-XXXVIB of FIG. 36A.
- It is a block diagram which shows the position specific side control part of a position specific device.
- It is a flow figure showing a flow of registration processing to a posterior payment system using a business management terminal.
- FIG. 11 is a flowchart showing a flow of registration processing in the present payment system using an individual mobile terminal in the post-payment system. It is a flowchart which shows the flow of the process which applies a business operator service from an individual portable terminal by a post payment system.
- FIG. 8 is a flowchart showing a flow of processing for calculating radio field intensity when the position specifying device specifies the position of the personal portable terminal. It is a flowchart which shows the flow of the process which calculates
- the embodiments described below exemplify a position specifying system, a position specifying device, a position specifying method, a position specifying program, a computer-readable recording medium, and a recorded device for embodying the technical idea of the present invention.
- the present invention is not limited to the following.
- the dimensions, materials, shapes, relative arrangements, and the like of the components described below are not intended to limit the scope of the present invention thereto, unless specifically stated, and are merely exemplified. It was intended.
- the contents described in one embodiment and example can be applied to other embodiments and examples.
- the sizes and positional relationships of members shown in the drawings may be exaggerated for clarity of explanation.
- the terms “smartphone terminal” and “smartphone” are used to mean not only smartphones but also terminals having a communication function such as tablets, WIFI routers, and portable music players.
- the position of a user who is moving with a smartphone terminal or the like is recognized with high accuracy in a short time.
- a ticket for public transportation, a ticket for a concert, or the like with an application such as a smartphone terminal
- the gate cannot be opened when the touch operation cannot be performed, for example, when carrying luggage or holding a child, or a physically handicapped person.
- it was on the other hand, in the position specifying system according to the present embodiment it is possible to detect passing through the automatic ticket gate or the entrance gate without touching by detecting the position by wireless communication. Further, as will be described later, by combining a user authentication function, entry / exit management and automatic payment can be performed. For example, it can be applied to payments in supermarkets and convenience stores. (Distance measuring method using BLE)
- BLE beacon a BLE beacon, a distance measuring method using the BLE beacon, a position specifying method using the BLE beacon, and a position specifying method according to one embodiment of the present invention are described, and then one of the embodiments according to the present invention is described. An authentication method in directional communication will be described.
- the BLE beacon is defined by the standard of Bluetooth 4.0 or later, and BLE means Bluetooth Low Energy.
- BLE communicates in the 2.4 GHz band, there are two communication modes, a broadcast mode and a connection mode.
- the broadcast mode data is unilaterally transmitted openly from one BLE device to another unspecified BLE device.
- the radio field intensity at the time of transmission is constant over time.
- the connection mode data is privately transmitted and received between a certain BLE device and another BLE device.
- the radio field intensity is temporally varied so that the device at the transmission destination has a constant radio field intensity.
- power is significantly reduced by transmitting only for a very short time (for example, sub ms) every fixed time (for example, several ms or tens of ms). (Distance measuring method using BLE beacon)
- FIG. 1 shows how a distance is measured using a BLE beacon as a BLE transmitter and a smartphone terminal as a BLE receiver.
- the broadcast mode radio signal output from the BLE transmitter has a constant radio wave intensity over time (for example, ⁇ 43 dBm on average), and the radio wave intensity attenuates as the distance increases. Therefore, by measuring the received signal strength RSSI (Received Signal Strength Indication) while transmitting the signal strength output from the BLE transmitter on the signal, the attenuation (propagation loss) of the signal strength is found. , Based on this, the measured distance can also be calculated.
- RSSI Receiveived Signal Strength Indication
- the damping index n is 2 in vacuum, but can be 2 or more in a real environment. According to Equation 1, it can be seen that when the measurement distance is doubled, the obtained RSSI is reduced by 6 dBm or more. However, it is considered that the radio field intensity is not stable because the gain of the transmitting / receiving antenna of the smartphone terminal or the like that is actually used is not stable.
- FIG. 2 shows the radio field intensities of four BLE receivers BLE1 to BLE4 separated from the BLE transmitter by almost the same distance (for example, 1 m) on a time axis.
- each BLE receiver acquires data approximately every 4 ms.
- the radio field intensity fluctuates by about 20 dB within a time of about several hundred ms. This is due to the temporal measurement fluctuations of the BLE transmitted and received radio wave intensities, which makes it impossible to accurately measure the radio wave intensity. Therefore, it usually takes about 1 minute to continue to receive radio waves at the same point and average the obtained RSSI to obtain a time-stable propagation loss value. To obtain the measurement distance. This method cannot measure the distance accurately at high speed. (Position identification method using BLE beacon)
- FIG. 1 An example of general triangulation using a BLE beacon is shown in FIG.
- the signals from the three BLE beacon transmitters are received by the BLE receivers such as smartphone terminals for a sufficient time, and the distance obtained from Equation 1 is measured by each terminal to measure an accurate position. be able to.
- the distance measured by each BLE beacon transmitter By drawing the distance measured by each BLE beacon transmitter as a circle, a point X where the arcs coincide is obtained.
- each BLE beacon transmitter is -40 dBm as the transmission power
- the received power of each smartphone is -51 dBm, -55 dBm, and -46 dBm
- the propagation loss is 11 dB
- This point X is the point where the BLE receiver exists. However, it may not be possible to measure the position because the distance cannot be measured accurately in a short time.
- Fig. 4 shows triangulation in a short time using the BLE beacon. Similar to FIG. 3, in a state where three BLE beacon transmitters are arranged, a signal from each BLE beacon transmitter is received by a BLE receiver such as a smartphone terminal for a short time, and the distance obtained from Equation 1 is calculated for each terminal. When trying to measure from, you cannot measure the exact distance. Therefore, when a circle of the distance measured from each BLE beacon transmitter is drawn, the overlapping of the circles indicating the distance becomes large as shown in FIG. 4, and no coincident point is created. Therefore, the location of the BLE receiver is unknown.
- the method for identifying or detecting the distance or position using BLE has been described above.
- the position detection and the like are not limited to BLE, but other Bluetooth standards, Wi-Fi, RFID (Radio Frequency Identifier), IMES, Other wireless communication standards such as ultrasound, ZigBee, etc. can also be used.
- Wi-Fi Wireless Fidelity
- RFID Radio Frequency Identifier
- IMES Inertial Management Entity
- Other wireless communication standards such as ultrasound, ZigBee, etc.
- it is difficult to detect with high accuracy in a short time as in the case of the above-mentioned BLE, and it is not suitable for practical use.
- the position identification requires processing of 100 ms or less. Furthermore, considering the case where the smartphone terminal is in the user's bag or clothes pocket, the difference between the radio wave intensity transmitted from the BLE transmitter and the RSSI obtained from the BLE receiver is not necessarily the propagation loss in space. It is also necessary to consider that it is not limited to.
- the processing speed and the positional accuracy are not limited to those applied to ticket gates and entrance gates, but are similarly required for payment at supermarkets and convenience store cash registers. [Embodiment 1]
- the conventional method was not practical in terms of accuracy and processing speed even when trying to identify the position using a smartphone terminal carried by the user as a BLE receiver. Therefore, in the position specifying method according to the first embodiment of the present invention, in order to realize the position accuracy and the processing speed adaptable to the actual environment, the smartphone terminal or the like is not the BLE receiver but the BLE transmitter, and the BLE receiver is further set. Multiple units are placed at different positions. As a result, the position can be specified from the difference in the radio wave intensity of the BLE receiver, and the practical detection accuracy and detection speed corresponding to the actual environment can be realized. As a result, it has become possible to capture, distinguish, and recognize a user moving with a smartphone terminal etc. one by one at high speed and with high accuracy. In addition, actions associated with authentication can be automated without touch, and actions can be grasped. For example, at a cash register or a ticket gate, even if a user who should pay is moving, it is possible to identify the user without erroneous recognition.
- Fig. 5 shows an example in which smartphone terminals are used as BLE transmitters and BLE receivers are arranged at two locations.
- the smartphone terminal or the like is in a bag, a pocket of clothes, or the like, and the output radio field intensity immediately outside thereof is different from the output radio field intensity of the smartphone terminal or the like, the radio wave intensity difference of the BLE receiver does not change. . Further, this makes it possible to absorb the time-dependent measurement fluctuation of the radio wave intensity of the BLE transmitter, which contributes to accurate radio wave intensity measurement.
- FIG. 6 shows an example of the area where the transmitter exists, which is obtained from the difference in the radio wave intensity of the BLE receiver when the smartphone terminal or the like is used as the BLE transmitter and the BLE receivers are arranged at two locations.
- the area where the transmitter is present which is obtained from the difference in the radio wave intensity of the BLE receiver, draws a circle or a straight line of Apollonius. This is because the radio field intensity is represented by a logarithm, so that when the difference in radio field intensity is constant (for example, 10 dB), the ratio in distance can be regarded as constant (for example, 10 times).
- the area in which the BLE transmitter exists is not necessarily limited by only one circle or straight line.
- FIG. 7 shows a case where a smartphone terminal or the like is a BLE transmitter and the BLE receivers are arranged at three places, and in this case, an example of an area where the BLE transmitter is present, which is obtained from the radio wave intensity difference of the BLE receiver.
- three Apollonius circles or straight lines will be drawn.
- a coincident point X is created, and this point X becomes the point where the BLE transmitter concerned exists.
- the position of the BLE transmitter cannot be determined.
- the condition for arranging so that the position can be specified without fail is that four or more BLE receivers are arranged so that none of them is parallel to the sides of the quadrangle drawn by the BLE receivers.
- the area where the BLE transmitter exists is smaller than a required size, such as a diameter of 40 cm, it is possible to specify the location as if it exists.
- the BLE receivers are arranged at different distances from the BLE transmitters arranged at two places.
- a certain threshold value for example, 10 dB
- the area where the BLE transmitter is present is calculated based on the difference in radio field intensity of the BLE receiver. It is the entire area inside the circle. The present position may be specified by utilizing this.
- FIG. 2 a histogram of the radio field intensity detected by one BLE receiver separated by a certain distance (for example, 1 m) from the BLE transmitter (for example, the average radio field intensity of -43 dBm is output) is shown in FIG. Show.
- the BLE receiver fluctuated by about 30 dB, and the standard deviation was about 5.85.
- the variation of the radio field intensity is very large, and the difference between the maximum value and the minimum value is also large. Therefore, even if the distance is calculated from such radio field intensity, the variation is also large.
- the difference in radio field intensity between two BLE receivers that are separated by a different distance (for example, 1 m or 3 m) from the BLE transmitter (for example, the average radio field intensity is -43 dBm is output).
- FIG. 10 shows a histogram of the radio wave intensity difference distribution of a single receiver). The standard deviation was about 6.21.
- the BLE receiver closer to the BLE transmitter has a larger radio field intensity than the BLE receiver farther from the BLE transmitter, but it is understood that the BLE receiver is partially reversed. In this way, it can be seen that the variation in the radio wave intensity difference is large and the magnitude relationship is also broken.
- the time-based measurement fluctuation of the BLE received signal strength is absorbed.
- FIG. 2 it can be seen that the fluctuations in the radio wave intensity of the four BLE receivers separated by a certain distance (for example, 1 m) from the BLE transmitter change almost independently.
- the standard deviation becomes about 1 / ⁇ n times when the average of the same probability distributions that draw independent n ideal normal distribution histograms is obtained. Therefore, it is expected that by arranging a plurality of BLE receivers at the same position and averaging the radio field intensities of the BLE receivers obtained there, it is possible to reduce the temporal measurement fluctuation of the BLE received radio field intensity.
- Fig. 11 shows an example in which a smartphone terminal or the like is used as a BLE transmitter and a plurality of BLE receivers are arranged at two locations.
- the standard deviation obtained from the histogram is 2. It will be about 63. It can be confirmed that this value is about 1/2 of the standard deviation obtained from the histogram of the radio field intensity of one BLE receiver separated from the BLE transmitter by a certain distance (for example, 1 m). As a result, it can be seen that it is possible to reduce the time-dependent measurement fluctuation of the BLE received radio field intensity.
- BLE receivers placed at different distances eg, 1 m, 3 m
- a BLE transmitter eg, output with an average field strength of ⁇ 43 dBm
- the histogram of the difference is shown in FIG. According to this graph, it can be seen that the variation in radio field intensity is smaller and the magnitude relationship is corrected as compared with FIG. 10 and the like.
- the standard deviation was about 2.85.
- the BLE signal strength and the received signal strength are obtained. It can be seen that the time-dependent measurement fluctuation of the intensity can be sufficiently reduced.
- FIG. 13 shows an example in which a smartphone terminal or the like is used as a BLE transmitter and a plurality of BLE receivers are arranged at three locations.
- FIG. 14 shows an example of a BLE transmitter existing area obtained from the difference between the averaged radio wave intensities of a plurality of BLE receivers in the example in which the BLE transmitter and the BLE receiver of FIG. 13 are arranged.
- three Apollonius circles or straight lines will be drawn.
- a coincident point X is created, and this point X becomes the point where the BLE transmitter concerned exists.
- the position of the BLE transmitter cannot be determined.
- the condition for arranging so that the position can be specified without fail is that four or more BLE receivers are arranged so that none of them are parallel to the sides of the quadrangle drawn thereby.
- FIG. 15 shows an example in which the location of the BLE transmitter is specified by limiting the area where the BLE transmitter is present.
- the presence area of the BLE transmitter is set to be within a range (for example, within a circle having a diameter of 40 cm or less) in which each user moving with a smartphone terminal can be accurately distinguished. be able to.
- the difference between the averaged radio wave intensities of a plurality of BLE receivers is equal to or more than a certain threshold (for example, 10 dB).
- a certain threshold for example, 10 dB.
- the existing area of the BLE transmitter is the entire area inside the Apollonius circle that is calculated and drawn from the difference between the averaged radio wave intensities of the plurality of BLE receivers.
- FIG. 16 shows an example of a device for further reducing the false recognition in a situation where highly accurate authentication such as payment is required. As shown in FIG.
- two pass determination areas for the user are provided, and authentication is performed only when the user passes through both of them with a certain time difference (for example, 0.5 seconds to 2 seconds), thereby further reducing false recognition. can do. That is, even if the user accidentally approaches the passage determination area of one user and is authenticated, it is not determined to have passed unless the passage determination area of another user is authenticated.
- a certain time difference for example, 0.5 seconds to 2 seconds
- FIG. 17 shows a device for limiting the passage of the user in FIG.
- an automatic ticket gate is installed as a gate for defining a passage route for a user.
- the position of the BLE transmitter can be specified on condition that the difference between the averaged radio wave intensities of the plurality of BLE receivers at each location is equal to or more than a certain threshold value (for example, 10 dB).
- a certain threshold value for example, 10 dB
- the radio field intensity does not necessarily represent the point where the circles and straight lines of the three Apollonius which are the areas where BLE transmitters exist, as shown in Fig. 8 and Fig. 14, coincide. Therefore, it is desirable to prepare three or more Apollonius circles or straight lines and estimate the position where the error is the smallest as the position of the BLE transmitter.
- the least squares method in the distance or the radio field intensity may be used, or another regression calculation such as the nonlinear least squares method may be used.
- a position specifying system 100 shown in this figure includes a personal portable terminal 10 carried by an individual whose position is to be specified, and a position specifying device 20 specifying the position of the personal portable terminal 10.
- the personal mobile terminal 10 includes a personal terminal side transmitter 11 and a personal terminal side controller 12.
- the personal terminal side transmitter 11 is a member for communicating with the position identifying device 20. Specifically, the personal terminal side transmitter 11 transmits a position specifying signal used for specifying a position to the position specifying device 20. Further, the personal terminal side control unit 12 controls the personal terminal side transmission unit 11.
- the position identification device 20 includes a position identification side reception unit 21 and a position identification side calculation unit 25.
- the position specifying side receiving unit 21 is a member for receiving the position specifying signal transmitted by the personal terminal side transmitting unit 11, and includes a plurality of first position specifying side receiving units 22A and 22B and a plurality of second position specifying sides.
- the receivers 23A and 23B are provided.
- the first position specifying side reception units 22 are arranged side by side at a first position separated from the personal mobile terminal 10 by a first distance.
- the second position specifying side receiving unit 23 is arranged side by side at a second position different from the first position and separated from the personal portable terminal 10 by a second distance longer than the first distance. .
- the position specifying side computing unit 25 based on the intensity difference of the position specifying signals respectively received by the plurality of first position specifying side receiving units 22A, 22B and the second position specifying side receiving units 23A, 23B, the personal portable terminal 10 Identify the position of. This makes it possible to reduce the variation in the signal strength of the plurality of position specifying side receiving units that receive the position specifying signal emitted by the personal terminal side transmitting unit 11, by using the strength difference of the position specifying signals. The position of the personal mobile terminal 10 can be measured accurately and in a short time.
- the position specifying side computing unit 25 calculates the radio field intensity of the position specifying signals received by the plurality of first position specifying side receiving units 22A and 22B and the position specifying signals received by the plurality of second position specifying side receiving units 23A and 23B.
- the position of the personal mobile terminal 10 is specified by calculating a conditional expression that compares the difference between the radio field intensity and a preset threshold value. For example, a conditional expression for comparing whether or not the difference in radio field intensity is larger than a preset threshold value (for example, 10 dB) is calculated.
- the position specifying side computing unit 25 uses the average value of the radio field intensity of the position specifying signals received by the plurality of first position specifying side receiving units 22A and 22B and the plurality of second position specifying side receiving units 23A and 23B.
- the position of the personal mobile terminal 10 is specified by calculating a conditional expression that compares the difference between the received radio wave intensity of the position identification signal and the average value of the radio wave intensity with a preset threshold value. (Automatic activation function of the personal terminal side transmitter 11)
- the personal mobile terminal 10 is used as a transmitter.
- power consumption can be suppressed by communicating by BLE.
- the BLE function of the smartphone terminal is always turned on, it may cause resistance when the user wants to reduce battery consumption. Therefore, some users may want to turn off the BLE function of the smartphone terminal.
- it is essential to turn on the BLE function of the smartphone terminal. For example, when using the position specifying system as a ticket for public transportation such as a subway, an automatic ticket gate The user must operate his or her smartphone terminal and manually turn on the BLE function before approaching to, which is troublesome.
- the BLE function or the like may be provided with an automatic start function that automatically starts the personal terminal side transmitter 11 before the user approaches the position identifying device 20.
- the personal terminal side control unit 12 detects that an individual carrying the personal portable terminal 10 has approached the position identifying device 20 within a certain distance, and automatically turns on the BLE function to make a call from the personal terminal side.
- the unit 11 is activated, and the personal terminal side transmitter 11 is controlled to transmit a position specifying signal to the position specifying device 20.
- This makes it possible to control the individual terminal side transmitter 11 to transmit a position specifying signal to the position specifying device 20 before an individual carrying the personal mobile terminal 10 approaches the position specifying device 20.
- a smooth position specifying operation can be executed between the mobile terminal 10 and the position specifying device 20.
- a smartphone terminal or the like it is possible to cause a smartphone terminal or the like to transmit the BLE beacon signal.
- the smartphone terminal or the like that receives the signal automatically transmits the BLE beacon signal (for example, use A signal for position measurement including the ID information of the person's mobile terminal).
- the GPS function of the mobile terminal may be used to automatically transmit a signal when approaching a specific facility such as a station. In this case, a geofence function or the like can be used.
- a member for starting the personal terminal side transmitter 11 may be installed.
- the activation signal transmitter is installed at a position separated from the position identifying device 20 by a certain distance or more.
- the activation signal transmitter transmits, to the personal mobile terminal 10, an activation signal that activates the operation of transmitting the position identification signal to the position identification device 20 by the personal terminal side transmitter 11. This makes it possible to activate the personal terminal side transmitter 11 in advance before the individual carrying the personal mobile terminal 10 approaches the position identifying device 20, and between the personal mobile terminal 10 and the position identifying device 20.
- a smooth position specifying operation can be executed.
- activation signal transmitters 90 are installed at the entrances of railway stations.
- the activation signal transmitter 90 turns on the BLE function of the smartphone terminal of the user USR and starts the operation of transmitting the position specifying signal.
- the user USR installs the activation signal transmitter 90 in advance on the route toward the position identifying device 20 such as the automatic ticket gate, so that the user USR can be installed in the position identifying device 20 such as the automatic ticket gate.
- the transmission operation of the position specifying signal can be started before approaching, and when the position specifying device 20 is approached, the position specifying signal is detected on the position specifying device 20 side and the position specification of the smartphone terminal is executed. It becomes possible.
- an end signal transmitter may be separately installed on the route of the user USR to turn off the BLE function.
- an end signal transmitter may be shared with the start signal transmitter.
- a BLE beacon or the like can be used as such a start signal transmitter and an end signal transmitter.
- the position of the personal mobile terminal 10 such as a smartphone terminal can be specified using GPS
- the position of the personal mobile terminal 10 may be specified using GPS.
- a smartphone terminal or the like when placed indoors where GPS cannot be used, it may be detected to automatically turn on the BLE function and start transmitting the position specifying signal. .
- a mobile device such as a smartphone terminal carried by a user is used as a BLE transmitter
- a mobile device such as a smartphone terminal carried by a user is used as a BLE receiver
- the position of the mobile device is detected by communicating with a plurality of BLE transmitters arranged at predetermined positions. You may.
- FIG. 20 Such an example is shown in FIG. 20 as a position specifying system according to the second embodiment.
- the position specifying system shown in this figure shows an example in which a smartphone terminal or the like is used as a BLE receiver and BLE transmitters are arranged at two positions.
- the smartphone terminal side is used as a transmitter, and multiple receivers are installed at multiple locations to reduce variations in receiver sensitivity with multiple transmitters, and the difference in transmitters Variations in radio field intensity are reduced (cancel out).
- a plurality of transmitters are installed at a plurality of places, and the sensitivity of the receiver is canceled by taking a difference between the transmitters. I'm out.
- the receiver side and the transmitter side as multiple units, it is possible to reduce variations in the amplifier on the transmitter side (variations in radio field intensity) and variations in the amplifier on the receiver side (variations in reception sensitivity). And, the effect of cancel out is demonstrated.
- the variation in the radio field intensity of the transmitter cannot be reduced so much by one device.
- by providing a plurality of units it is possible to reduce the variation to some extent by averaging each location.
- FIG. 21 shows an example of the area where the BLE receiver exists, which is obtained from the difference in the radio wave intensity of the BLE transmitter in the arrangement example of FIG.
- the area where the BLE receiver exists which is obtained from the difference in the radio wave intensity of the BLE receiver, draws a circle or a straight line of Apollonius.
- the area in which the BLE transmitter exists is not necessarily limited by only one circle or straight line.
- FIG. 22 shows an example in which smartphone terminals are used as BLE receivers and BLE transmitters are arranged at three locations.
- FIG. 23 illustrates an example of an existing area of the BLE receiver obtained from the radio wave intensity difference of the BLE transmitter in the arrangement example of FIG. In this case, three Apollonius circles or straight lines will be drawn. By drawing this Apollonius circle, a coincident point X is created, and this point X becomes a point where the BLE receiver exists. However, if only one straight line is drawn, the position of the BLE receiver cannot be determined.
- the condition for arranging so that the position can be specified without fail is that four or more BLE transmitters are arranged so that none of the BLE transmitters are parallel to each other on the sides of the rectangle drawn thereby.
- the position can be specified as existing at that position.
- the condition is that the radio wave intensity difference between BLE transmitters that are different distances from the BLE receivers that are arranged at two locations is equal to or greater than a certain threshold.
- the area where the BLE receiver exists is the entire area inside the circle of Apollonius which is calculated and drawn from the radio wave intensity difference of the BLE transmitter, and therefore this may be used.
- each BLE transmitter arranged in a plurality of different places is shown as a single structure, but the present invention is not limited to this structure, and the BLE transmitters arranged in a plurality of different places are It is also possible to have multiple units.
- FIG. 24 shows an example in which a smartphone terminal or the like is used as a BLE receiver and a plurality of BLE transmitters are arranged at two locations.
- the standard deviation obtained from the histogram is the radio wave intensity of one BLE transmitter separated by a certain distance from the BLE receiver. It can be confirmed that it is about 1/2 of the standard deviation obtained from the histogram. As a result, it can be seen that it is possible to reduce the time-dependent measurement fluctuation of the BLE transmitted radio wave intensity.
- FIG. 25 shows an example in which a smartphone terminal or the like is used as a BLE receiver and a plurality of BLE transmitters are arranged at three locations.
- FIG. 26 shows the existence of a BLE receiver obtained by averaging the radio wave intensities of a plurality of BLE transmitters when a plurality of BLE transmitters are arranged at three places, using a smartphone terminal or the like as a BLE receiver.
- An example of an area is shown. In this case, three Apollonius circles or straight lines will be drawn. By drawing this Apollonius circle, a coincident point X is created, and this point X becomes a point where the BLE receiver exists. However, if only one straight line is drawn, the position of the BLE receiver cannot be determined.
- the condition for arranging so that the position can be specified without fail is that four or more BLE transmitters are arranged so that none of the BLE transmitters are parallel to each other on the sides of the quadrangle drawn thereby.
- FIG. 27 shows how the location of the BLE transmitter is specified by limiting the area where the BLE receiver is present.
- the presence area of the BLE receiver distinguishes each user moving with a smartphone terminal or the like with high accuracy (for example, a diameter of 40 cm or less).
- a plurality of BLE transmitters are arranged at different distances from the BLE receivers arranged in two places.
- the difference between the averaged radio wave intensities of the BLE transmitters is equal to or more than a certain threshold, and the area where the BLE receivers exist is the plurality of BLE transmitters. It is the entire area inside the Apollonius circle that is drawn by calculating from the difference between the averaged radio wave intensities.
- an offset may be set in the radio field strength so that the received radio field strengths of multiple BLE receivers can be detected in the same way.
- the BLE receiver on the far side from the BLE transmitter may be installed far enough from the BLE receiver on the near side to treat it as a BLE receiver on the far side common to a plurality of near BLE receivers. This also makes it possible to automate touch-less actions associated with authentication by capturing, distinguishing, and recognizing each user moving with a smartphone terminal or the like at high speed and with high accuracy.
- FIG. 28 shows an example of a device for further reducing false recognition in a situation where highly accurate authentication such as payment is required. As shown in FIG. 28, by providing two passage determination areas for the user and authenticating only both of them when the user passes through them with a fixed time difference, it is possible to further reduce erroneous recognition.
- FIG. 27 may use the arrangement of FIG. 27. That is, when setting the passage determination area of the user in the first half at the time of passage, as shown in FIG. 27, a plurality of BLE transmitters are arranged at two locations, which are different distances from the BLE receiver. A determination method is used on condition that the difference between the averaged radio wave intensities is equal to or greater than a certain threshold. On the other hand, when setting the passage determination area for the user in the latter half of the passage, in contrast to FIG.
- a plurality of BLE transmissions are placed at two locations, which are different distances from the BLE receiver. It is possible to use a determination method on condition that the difference between the averaged radio wave intensities of the devices is equal to or more than a certain threshold.
- the BLE receiver has a mechanism for notifying the position specifying system of the measured radio field intensity result or the result of position identification from the radio field intensity. It is required separately.
- the radio field intensity does not necessarily represent the point where three Apollonius circles or straight lines, which are the areas where BLE transmitters exist, as shown in Fig. 23 and Fig. 26, coincide. Therefore, it is desirable to prepare three or more Apollonius circles or straight lines and estimate the position with the smallest error as the position of the BLE receiver.
- the temporal measurement fluctuations of the BLE reception radio wave intensity and the transmission radio wave intensity can be sufficiently reduced, and the position of the BLE receiver can be identified quickly and accurately.
- the present invention is not limited to BLE, and other wireless communication standards such as Bluetooth standards other than BLE, Wi-Fi, RFID, IMES, ultrasonic waves, ZigBee, or optical communication may be used.
- Bluetooth standards other than BLE, Wi-Fi, RFID, IMES, ultrasonic waves, ZigBee, or optical communication
- Wi-Fi Wireless Fidelity
- RFID magnetically erasable senable senable senable fidelity
- IMES ultrasonic waves
- ZigBee ZigBee
- optical communication optical communication
- FIG. 29 shows the three elements of authentication.
- An ID or password which is used as a general authentication method, is one piece of knowledge information that utilizes the knowledge known to the user.
- the knowledge information in addition to the ID and password, a PIN number, a secret question (partially possessed information), and the like can be mentioned.
- the IC card used for unlocking the door is one of the possession information that is used by the user.
- the possessed information includes a one-time password, a USB token, SMS authentication, E-mail authentication, voice call, smartphone application authentication, encryption table authentication, and the like.
- fingerprint authentication is one of the biometric information that utilizes the characteristics of the user himself.
- biometric information include fingerprint authentication, face authentication, iris authentication, retina authentication, vein authentication, and the like.
- location information There are several possible methods to measure such location information, but if location information is to be contactlessly and effortlessly used, a physical medium capable of propagating in the air such as radio waves or light, sound, etc. is used. If it is outdoors, it is also possible to perform wide-range and high-accuracy position identification with a small number of position identification devices 20 by performing measurement using the theory of relativity such as GPS. However, because there are obstacles at various frequencies indoors, a large number of position identifying devices 20 are required. In particular, in order to identify the position of the user to ensure security, an accuracy of about 40 cm is required. For this reason, it is better that the installation intervals of the position identification devices 20 are closer, and the number of installations tends to increase.
- the usable communication band per device such as a terminal or an IC card which the user wants to receive authentication is limited to one or two, or the usable communication band per position identifying device 20 is set to one.
- Countermeasures for one-to-many bidirectional communication such as limiting to two or the like, can be considered.
- the position identification and the position information authentication are completed at the time when the position is specified by using a signal including a unique ID issued by a terminal, an IC card or the like which the user intends to receive the authentication, and a corresponding one.
- the ID and its equivalent must be encrypted.
- the encryption procedure is always performed using the same encryption key, the encrypted ID and the corresponding one are always constant, and the identity is easily spoofed. That is, spoofing may be possible by copying and transmitting the encrypted ID and the corresponding one itself.
- one-way communication is adopted as a communication method when performing many-to-many communication.
- one-way communication is performed from the terminal carried by the user, the IC card, or the like to be authenticated, to the position specifying device 20 side, and the authentication carried by the position specifying device 20 and the user is received based on the information.
- the position of the intended terminal or IC card is specified.
- the position identifying device 20 performs one-way communication with a terminal or the like that is going to receive user authentication, and identifies these positions based on the information.
- one-way communication can be performed by using a BLE beacon. In such one-to-one or one-to-many one-way communication, issuing a one-time password every time can solve the security problem.
- the method of measuring the position information is not limited to this embodiment. For example, by adding a unique one-time password each time to a unique ID and corresponding one issued by a terminal, an IC card, or the like that the user wants to authenticate, the position can be transmitted using that signal.
- the position identification and the position information authentication can be completed in each of the plurality of position identification devices 20 at each reception. Since this signal can only be used once, it will not be authenticated a second time if stolen. Further, even if reception fails in any of the plurality of position specifying devices 20, it is possible to perform reception immediately after, so that extremely stable communication can be performed. (one-time password)
- the hash chain type uses a one-way function such as a hash function.
- the hash function is a function that obtains a certain number from a certain number, but generally, the original number cannot be specified from the obtained number. Therefore, it is possible to create a required number of password strings by repeatedly applying a one-way function such as a hash function.
- This password string is used as a one-time password for each valid time from the reverse. Even if this password is known, the next password after the valid time cannot be requested. Also, the password sequence cannot be generated infinitely.
- the time-synchronous type is to authenticate using a token obtained from the time.
- the token is obtained from the time using the same algorithm inside the device to be authenticated and the device to be authenticated, and authentication is performed based on whether they match. Even if the time is slightly different between the respective devices, the authenticating device detects the time difference and performs the authentication while correcting the time of itself for the device to be authenticated. As a result, the authentication can always be performed at the synchronized time.
- the token update time is set to, for example, one minute, and a time lag is allowed within a time range of, for example, 1 second, so that it is impossible to correct in units of ms or the like.
- the challenge type is that the device to be authenticated responds (response) to the problem (challenge) issued from the device to be authenticated.
- response response
- challenge problem issued from the device to be authenticated.
- a mechanism is usually built in so that if the same problem is raised, the answer will be different from before.
- the challenge type is premised on bidirectional communication.
- Transaction type means that a password list is prepared in advance and used one by one for each authentication. One password can be used only once. It is not possible to generate an infinite list of this password.
- this problem is solved by sending the encrypted time. That is, in a certain established communication environment, the fact that the time difference between the sending side and the receiving side is almost constant is used to confirm the time difference between the sending and receiving, and to judge the authenticity of the communication.
- the personal portable terminal transmits data to the position specifying device, it transmits identification information and a one-time password.
- the personal portable terminal acquires the issue time, encrypts the information of the issue time with the common key, and issues the one-time password.
- the personal portable terminal transmits the identification information and the one-time password to the position specifying device.
- the identification information and the one-time password are received from the personal terminal side transmitting unit, and the reception time at this time is acquired from the position identifying side time unit. Then, based on the received identification information, the common key corresponding to this identification information is searched from the position identification side storage unit, the one-time password is decrypted using the obtained common key, and the functionalized information regarding the issue time is obtained. get. As a result, it is possible to acquire the information about the issuing time (in other words, the sending time on the personal portable terminal side) at the time of issuing the one-time password and the information about the receiving time, and thus the difference between them is acquired.
- the issuing time in other words, the sending time on the personal portable terminal side
- the difference between the password issuance time and the reception time of the transmitted data is measured for each data communication.
- the transmitting side and the receiving side are placed in a constant communication environment, it is unlikely that the communication environment will greatly change in a short time.
- the speed at which BLE communication is performed can be assumed to be constant until the user passes through the automatic ticket gate.
- the time difference between the time of transmission and the time of reception is measured for each data communication. If this is constant, communication is being performed correctly, and if it is not constant, unauthorized access such as spoofing is suspected. .
- the transmission time is encrypted and transmitted, and by monitoring the time difference between transmission and reception, it is possible to determine the unauthorized access when the time difference is significantly different, and therefore it is possible to authenticate the personal mobile terminal.
- such authentication of the personal mobile terminal is performed every time the position identifying device is approached. For example, every time a user with a smartphone terminal passes through an automatic ticket gate. As a result, even if the communication speed differs depending on the environment in which the automatic ticket gate is installed, the time difference between transmission and reception is measured for each environment, so that the authentication is correctly performed. For this reason, it is preferable that the information on the time difference that has been once acquired is erased after a certain time has elapsed.
- the difference between the issuance time acquired at the reception time at a certain timing (preferably the first stage of data communication) and the acquired reception time is stored as the authentication reference information in the position identification side storage unit or the like. Then, for a certain period of time after the storage, authentication is performed by using this authentication reference information as a standard transmission / reception time difference. That is, for a series of communication data, the difference between the reception time and the issuing time is compared with the authentication reference information, and if the level is the same or almost the same, authentication is performed, and if the difference is large, authentication is not performed. As a result, smooth authentication can be performed.
- Fig. 30 shows how the encrypted time is sent and authenticated.
- Alice and Bob share identification information such as a unique ID issued by a terminal or the like that Alice wants to authenticate with a secure method, and an encryption key that is a set with it, to share between Alice and Bob.
- Alice has a unique ID issued by a terminal or the like to be authenticated, and the time possessed by the terminal or the like is encrypted, for example, in the unit of ms from 1970, such as UNIX time, and the ID etc.
- Alice sends to Bob as a signal with the encrypted time together.
- the received Bob searches for an encryption key for decryption based on the received ID and the like, decrypts the time encrypted using the encryption key, and obtains the difference from the received time. Then, the same processing is performed on the signal received at the next timing, and it is confirmed whether the difference between the previously decoded time and the received time matches. If they match, it authenticates the signal from Alice, and if they do not match, it does not authenticate. After that, this is repeated.
- the reference signal may be at any time.
- the received Bob searches for an encryption key for decryption based on the received ID and the like, decrypts the encrypted time using the encrypted key, and records it together with the received time. . Then, the same processing is performed on the signal received at the next timing, and it is confirmed whether the difference between the decoded times and the difference between the received times match. If they match, it authenticates the signal from Alice, and if they do not match, it does not authenticate. After that, this is repeated.
- the reference signal may be any signal.
- this signal can only be used once, so even if it is stolen, it will not be authenticated a second time. Further, even if the reception fails in any of the plurality of position specifying devices 20, since the reception can be performed immediately after, the authentication can be performed after the reception, and the very stable authentication can be performed.
- the encrypted time differs from the reception timing, so not only is the second authentication not performed, but also simple signal duplication is performed at high speed, such as by using an analog circuit. Even if it does, spoofing is known when the same signal is received more than once. Or, if there is a simple signal duplication, the signals of all the users who are making nearby calls are duplicated, so that the location is identified as if there were multiple people in one place, thus impersonating Prove.
- the number of bits of the ID may be 40 bits, for example. Since 40 bits can prepare IDs for about 1 trillion people, they can be uniquely set.
- the ID may be any layer of the OSI reference model.
- the number of bits of time may be, for example, 48 bits. The 48 bits have enough space to express 4000 years in microseconds.
- the expression may be changed in a way that the time cannot be predicted, or padding processing may be performed.
- the encryption for example, common key encryption such as 3DES or AES may be used, or public key encryption such as elliptic encryption may be used.
- the time from 1970 may be measured in ms, or the time measured in seconds may be added to the ms unit.
- the time does not necessarily have to match the time since 1970, and it has a mechanism to allow an error. However, if the time is too long, there will be a security problem. It is assumed that Alice and Bob perform one-way communication using the method according to this embodiment, the signal intervals transmitted by Alice are random, and Eve is an attacker. In this case, if Eve records the outgoing signal of Alice and the set of outgoing timing of the signal, and Eve sends the same outgoing signal at the outgoing timing of the signal, Bob cannot distinguish whether it is Alice or not. For this reason, it is necessary that they match each other for, for example, about 10 seconds or less so that the signals are continuously transmitted. Therefore, it is desirable to perform synchronization with the time server as appropriate.
- the authentication method for one-way communication according to the present embodiment can also be used for general one-way signals that do not require position identification. That is, it can be used as a BLE beacon, which is a type of one-way communication, or as an authentication method that is securely encrypted in business radio or the like.
- a functional block diagram of an authentication system that does not require position identification is shown in FIG.
- An authentication system 400 shown in this figure includes a personal mobile terminal 10 carried by an individual whose position is to be identified, and a position identifying device 20 that identifies the position of the personal portable terminal 10.
- the personal mobile terminal 10 includes a personal terminal side transmission unit 11, a personal terminal side control unit 12, a personal terminal side storage unit 13, and a personal terminal side time unit 14.
- the personal terminal side transmitter 11 performs bidirectional communication with the position specifying device 20.
- the personal terminal side control unit 12 controls the personal terminal side transmission unit 11.
- the personal terminal side storage unit 13 is unique to the unique identification information given in advance and the identification information given to the personal mobile terminal 10 exchanged in advance between the personal mobile terminal 10 and the position identifying device 20. It holds a common key and a predetermined function used to generate a one-time password.
- the personal terminal side time section 14 generates information regarding time.
- the position specifying device 20 includes a position specifying side receiving unit 21, a position specifying side computing unit 25, a position specifying side storage unit 26, and a position specifying side time unit 27.
- the position determination side reception unit 21 performs bidirectional communication with the personal terminal side transmission unit 11.
- the position-specific side calculation unit 25 authenticates the personal mobile terminal 10 by communicating with the personal-terminal-side transmitter 11 by the position-specific side reception unit 21.
- the position identification side storage unit 26 holds the identification information given to the personal mobile terminal 10 and the common key unique to each identification information in association with each other.
- the position determination side time section 27 generates information about the time.
- the personal terminal side control unit 12 is, when the personal terminal side transmitting unit 11 communicates with the position specifying side receiving unit 21, unique identification information held in the personal terminal side storage unit 13 and unique for each identification information. Issue a one-time password that can be used only once. Further, the position-specific side calculation unit 25 authenticates the identification information and the one-time password received by the position-specific side reception unit 21 from the personal terminal side transmission unit 11.
- the personal terminal-side control unit 12 uses the personal terminal-side time unit 14 to provide information regarding the issuing time when the one-time password is issued.
- the one-time password is issued by obtaining and applying it to a predetermined function held in the personal terminal side storage unit 13 and further encrypting it with the common key held in the personal terminal side storage unit 13.
- the position specifying side computing unit 25 acquires, from the position specifying side time unit 27, the reception time when the position specifying side receiving unit 21 receives the identification information and the one-time password from the personal terminal side transmitting unit 11. Then, from the received identification information, a common key corresponding to the identification information is searched from the position specifying side storage unit 26, the one-time password is decrypted by using the obtained common key, and the function-related issue time information is obtained. To get. Further, the acquired information about the issuing time is compared with the acquired information about the receiving time to acquire the difference. That is, the information about the time required for communication, which is obtained by subtracting the transmission time from the reception time, is acquired.
- the same process is performed at a different timing to acquire the time required for transmission / reception, and if it is the same as the time required for previous transmission / reception, it is determined that correct communication is being performed, and this personal mobile phone is used. Authenticate the terminal. On the other hand, if the time required for transmission and reception is significantly different from the previous time, it is judged as unauthorized access and authentication is not performed. As a result, it is possible to authenticate the individual carrying the personal mobile terminal 10, and it is possible to detect the position by distinguishing the individual.
- the time required for transmission and reception is the same for each communication if the communication environment can be assumed to be constant and unchanged.
- the time information of each device such as the personal portable terminal, the position identifying device, and the server is corrected according to the world clock or the time server, but there is a slight difference in the time. Therefore, the times possessed by the individual portable terminals and the position specifying device do not originally completely match.
- the time required for transmission and reception for each communication is held as the authentication reference information as described above, and the authentication is performed by comparing with this value.
- a time lag occurs due to traffic congestion on the communication network.
- the communication from the user A's personal portable terminal at the site to the position determining device is high speed close to the speed of light, there is almost no fluctuation in communication time on the communication path. As a result, it is possible to effectively prevent spoofing.
- another person records the transmission timing and the data and holds the data, the transmission can be performed at a proper timing, so that the person may be spoofed. Therefore, it is preferable to add an absolute time difference restriction.
- a method of setting a limit by setting a reference time difference such as within 1 second or within 100 ms as an absolute time difference.
- a reference time difference such as within 1 second or within 100 ms as an absolute time difference.
- the time difference between the time received on the automatic ticket gate side and the decrypted time that is, the transmission time on the personal mobile terminal side
- this time difference is a preset reference value. If it is larger than the time difference, the spoofing can be avoided by discarding the data.
- one-way communication encryption which is often used in business radio or the like that communicates with many users, is often encrypted with a common key determined in advance.
- the common key is embedded in the communication device. Therefore, if the common key is leaked from a certain communication device, the security problem is likely to spread to the whole.
- different common keys may be provided for each communication device, and thus it is unlikely to be affected by such security problems.
- the present embodiment is used when unlocking or paying by a method of touching a doorknob, a method of reading a QR code with an IC card, a smartphone terminal, or the like, or a method of using a BLE beacon or the like. It is also possible to authenticate using the authentication method in the one-way communication according to. As a result, users moving with a smartphone terminal etc. can be captured and distinguished at high speed and with high accuracy one by one, and the individual authentication can be performed securely without any contact, and the actions accompanying the authentication can be performed without touch. Can be automated with.
- the BLE transmitter does not need a computing unit or the like. Further, a signal transmitted for position identification or authentication as in the present embodiment may put pressure on the communication band. Therefore, it is very desirable for industrial development to transmit only in the necessary area, range, and time.
- Example 1 Post-payment system
- FIG. 32 An outline of a post-payment system such as a railway or a bus is shown in FIG. 32, and a flow chart is shown in FIG. 33.
- the post-payment system shown in FIG. 32 includes a management server having a registration payment management system and a usage management system, a station where a ticket gate is installed, a personal portable terminal 10 owned by a user, and a railway company.
- step S3301 a dedicated application for making subsequent payment of a ticket gate is installed in advance on the user's personal portable terminal 10.
- personal information such as name and credit card number for payment is registered in this dedicated application.
- an ID common key (for example, 3DES) is transmitted from the personal mobile terminal 10 to the registration payment management system side of the registration server by a dedicated application. Further, in step S3303, the registration payment management system authenticates the credit card information with the credit card company at a necessary timing. Further, in step S3304, the input personal information is stored in the personal information server. Furthermore, in step S3305, the ID common key usage period list is transmitted from the registration payment management system to the usage management system.
- step S3306 when the user uses the railway company, the ticket gate terminal synchronization processing is performed at the timing of passing through the ticket gate. Then, in step S3307, BLE is transmitted from the personal portable terminal 10 to the automatic ticket gate, which is the position identifying device 20, when the ticket gate approaches.
- step S3307 the position specifying system is activated to specify the position of the personal mobile terminal 10. Further, in step S3308, the result of localization is transmitted to the usage management system.
- step S3309 the management server bills and pays the personal mobile terminal 10 and submits OD data.
- FIG. 34 shows a detailed configuration diagram of the post-payment system.
- the subsequent payment system shown in this figure includes a management server system 30, a business management system 40, a management terminal 50, a position identifying device 20, a personal mobile terminal 10, a financial institution 60, and a time distribution server 70.
- Each member has a communication function and is connected to each other via a communication network.
- communication is performed via a network such as WAN, LAN, cellular communication network, Wi-Fi, Bluetooth, or the Internet.
- a network such as WAN, LAN, cellular communication network, Wi-Fi, Bluetooth, or the Internet.
- encryption, electronic certificate, and electronic signature can be performed using public key encryption or common key encryption.
- a general arithmetic unit, a sensor, and other processing may be implemented by software or hardware. For example, it may be realized by software executed by a CPU or the like, or may be realized by hardware such as an LSI, an ASIC, or an FPGA.
- a storage device such as a general memory is included in each component as needed.
- the XX operation unit may be configured by hardware such as a computer or a server, or may be realized by software.
- an arithmetic processing unit such as CPU, LSI, ASIC can be used.
- a hard disk, a non-volatile semiconductor memory, or the like can be used.
- the management system 40 for businesses may be installed in, for example, an IT management department of a railway company.
- the management terminal 50 may be installed in a station or the like.
- the position specifying device 20 may be an automatic ticket gate and a plurality of devices may be installed.
- the management system for business 40 and the management terminal 50 may be simpler with fewer components.
- the personal mobile terminal 10 may include a plurality of sensors as constituent elements.
- the management terminal 50 When used in a bus, the management terminal 50 may be installed in a bus office or the like, and the position identifying device 20 may be installed in the bus. Instead of using the Internet for communication, necessary data may be exchanged using an SD card (product name) or the like.
- SD card product name
- the management server system 30 includes a server-side communication unit 31, a server-side calculation unit 32, a server-side storage unit 33, a server-side usage information database, a server-side personal information database, and a server-side ID / encryption key database. It is a group of servers that are configured by one or more servers.
- the management server system 30 is connected to the entire system and controls the entire system of this embodiment.
- the management server system 30 registers individual data and relays service usage between the individual and a business operator who uses the position identifying device 20. If the personal data includes payment information, the service usage fee of the business operator used by the user is collected from the payment means of the user based on the service usage fee table of the business operator provided.
- Each server-side database may reside in multiple different data storage locations. Note that communication from the personal mobile terminal 10 must be always connected as much as possible, but it is not always necessary to be always connected to the business operator and other systems, and stability is considered by dividing into at least two types of servers. Operation method is desirable. Note that the server-side usage information database, the server-side personal information database, and the server-side ID / encryption key database can be integrated as well as individual servers. Alternatively, it may be incorporated in the server-side storage unit 33.
- the server-side ID / encryption key database stores an encryption key, a place of use, a period of use, etc., which is a set with the unique ID of the personal mobile terminal 10 sent to the management server system 30, and stores the management terminal 50 and the position specifying device. Deliver to 20.
- the entry / exit record may be included.
- the encryption key may be common key encryption such as 3DES or AES encryption, or public key encryption such as RSA, DSA or elliptic encryption.
- a short bit number such as 3DES is preferable, and a low calculation cost such as common key encryption is preferable, but the encryption method is more secure and the calculation cost is compared according to the number of bits that can be handled. It is desirable to gradually shift to less expensive ones. (Business management system 40)
- the business management system 40 includes a business communication unit 41, a business computing unit 42, a business input / output unit 43, a business usage information database, and a business storage 44. .
- the management system for business 40 receives income and usage information obtained by accepting a usage application from a user registered in the management server system 30 and using the service provided by the business. The resulting system. It should be noted that the business operator can specify the usage place, usage period, etc. of the position identifying device 20 for the user according to the service provided. When collecting a usage fee from the user based on the service provided by the business operator, the business operator provides the service usage fee table to the management server system 30 through the business management system 40.
- the business operator side input / output unit 43 may be omitted, or may be used by being connected to another system.
- the management terminal 50 includes a management terminal side usage information database, a management terminal side time section 54, a management terminal side ID / encryption key database, a management terminal side communication section 51, a management terminal side calculation section 52, and a management terminal side.
- An input / output unit 53 and a management terminal side storage unit 55 are provided.
- the management terminal 50 is mainly for the purpose of managing the position specifying device 20 and relaying between the management server system 30 and the position specifying device 20, and the management terminal side time section 54 and the management terminal necessary for the position specifying device 20.
- the side ID / encryption key database is temporarily held and delivered to the position identifying device 20. Further, the usage information coming from the position identifying device 20 can be recorded in the management terminal side usage information database and transmitted to the management server system 30.
- the function of the management terminal 50 may be transferred to one or a plurality of position specifying devices 20.
- the management terminal 50 has two other roles. One is to collect the passing data of the position identifying device 20. For example, we will analyze from which station there are many passengers at this station, and use it as reference data for constructing future train schedules. Such passage data may be accumulated in the usage information database, aggregated in units of, for example, 5 minutes, and transmitted to the management server system 30. The management server system 30 and the management terminal 50 may use this information to perform congestion information of stations, calculation of concentration, and passenger flow survey.
- Another role is to provide services to users. Specifically, it confirms the entry / exit records of users and corrects the consistency. At this time, a staff member of the center may use an input / output device such as a camera and a microphone to interact with each other, and at the same time, respond to a failure, guide a new plan ticket, and sell the ticket.
- an input / output device such as a camera and a microphone
- the management terminal side time section 54 may be capable of counting time with higher accuracy than, for example, the ms unit.
- the time does not necessarily have to be accurate, but it is necessary for the time to coincide with each other in about 1 minute or less. Therefore, it is desirable to correct the time as much as possible by using a general time distribution server 70. When the time difference is large, it is possible to prompt the terminal or device manager to make an error correction.
- the communication device may use the Bluetooth transmission / reception function to check the state of the personal mobile terminal 10 or may notify the approach of the station to the personal mobile terminal 10.
- the entry / exit record sent from the position identifying device 20 is held in the management terminal side storage unit 55 or the management terminal side ID / encryption key database, or sent to the management server system 30.
- the reference from the position identifying device 20 may be answered.
- An image capturing unit may be provided in the management terminal side input / output unit 53.
- the image capturing unit may switch the subsequent position identification from the user and the position acquired by the position identification device 20 to, for example, a BLE beacon to an image, may transmit the information to the position identification device 20, or may be a personal portable device. For example, the transmission of the BLE beacon from the terminal 10 may be stopped. (Position identification device 20)
- the position specifying device 20 includes a position specifying communication unit 21A, a position specifying control unit 28, a position specifying calculation unit 25, a position specifying ID / encryption key database, and a position specifying time unit 27.
- the position specifying device 20 allows the position of the personal mobile terminal 10 to be quickly and accurately specified and authenticated so that the personal mobile terminal 10 can pass through without being taken out. It should be noted that when payment is required for providing the service, the payment is automatically made after the fact by interacting with the financial institution 60. Further, it is possible to receive the confirmation result of the credit examination and the authentication and record the result in the position identification side ID / encryption key database.
- the position specifying side communication unit 21A functions as the position specifying side receiving unit 21.
- the position specifying side control unit 28 controls the operation of restricting the movement of an individual carrying the personal portable terminal 10 according to the position of the personal portable terminal 10 measured by the position specifying side computing unit 25. Thereby, while recognizing the individual carrying the personal mobile terminal 10, it is possible to control the movement of the personal mobile terminal 10 according to the position of the person.
- the position identifying device 20 may be, for example, a gate-type automatic ticket gate having an openable / closable door part 29 for restricting passage of an individual carrying the personal mobile terminal 10.
- the position specifying side control unit 28 controls opening / closing of the door 29.
- it is possible to judge whether or not the door 29 of the automatic ticket gate, which restricts the passage of an individual carrying the personal portable terminal 10 can be opened or closed based on the individual recognition and position detection.
- the position specifying side storage unit 26 holds software for operating the own device, identification information of the station where the own device is installed, identification information of the own device, and display information for the display unit. It should be noted that a charge table in which charges for each station (or each use distance) are stored, a distance between each station, and the like may be stored.
- FIG. 35A An external configuration example of the position identifying device 20 is shown in FIG. 35A, a plan view is shown in FIG. 36A, and a sectional view taken along line XXXVIB-XXXVIB in FIG. 36A is shown in FIG. 36B.
- the position identifying device 20 shown in these figures is an automatic ticket gate.
- the pair of partition plates 24 are separated in a substantially parallel posture.
- Each of the partition plates 24A and 24B forming the pair of partition plates 24 is made of a resin or the like that is permeable to radio waves as a rigid body, and if necessary, a part thereof is made of a metal that does not transmit radio waves. You may.
- the size of the position identifying device 20 prototyped by the inventor was 90 cm in height, 75 cm in width, and 180 cm in depth.
- the position identifying device 20 defines a passage determination area DA and a passage determination area DB between the pair of partition plates 24A and 24B along the flow line of the user.
- the right side is the entrance of the automatic ticket gate
- the passage determination area DA is arranged on the entrance side
- the passage determination area DB is arranged on the exit side of the automatic ticket gate.
- the passage determination area DA may be on the exit side and the passage determination area DB may be on the entrance side. The same applies when the entrance and the exit are not defined and the user is allowed to move in both directions. .
- the position specifying side receiving unit 21 is installed in the vicinity of the passage determining area DA, and the position specifying side receiving unit 21 determines whether or not the user exists in the passage determining area DA. Therefore, in the vicinity of the passage determination area DA, the BLE beacon receivers 2111, 2112, 2113, 2114 are provided as the first position specifying side receiving unit 22 and the second position specifying side receiving unit 23 that form the position specifying side receiving unit 21.
- BLE beacon receivers 2111 and 2112 are provided adjacent to the partition plate 24A as the first position specifying side receivers 22A and 22B.
- BLE beacon receivers 2113 and 2114 are provided adjacent to the partition plate 24B as the second position specifying side receiving units 23A and 23B.
- BLE beacon receivers 2115, 2116, 2117, and 2118 are installed as the position specifying side receiving unit 21.
- the BLE beacon receivers 2115 and 2116 are provided as the first position specifying side receivers 22A and 22B adjacent to the partition plate 24A.
- BLE beacon receivers 2117 and 2118 are provided adjacent to the partition plate 24B as the second position specifying side receiving units 23A and 23B.
- a passage determination area DA1 is defined as a concentric passage determination area centered on a set of BLE beacon receivers 2111, 2112.
- a passage determination area DA2 is defined as a concentric circular passage determination area centered on a set of BLE beacon receivers 2113 and 2114.
- a passage determination area DA is defined as a concentric circular passage determination area centered on a midpoint of a line segment connecting the pair of BLE beacon receivers 2111, 2112 and the pair of BLE beacon receivers 2113, 2114.
- a passage determination area DB1 is defined as a concentric passage determination area centered on a set of BLE beacon receivers 2115 and 2116.
- a passage determination area DB2 is defined as a concentric circular passage determination area centered on a set of BLE beacon receivers 2117 and 2118. Further, a passage determination area DB is defined as a concentric circular passage determination area centered on the midpoint of a line segment connecting the pair of BLE beacon receivers 2115 and 2116 and the pair of BLE beacon receivers 2117 and 2118. As described above, the passage determination area DA indicates a wide range including the passage determination areas DA1 and DA2, and the wide range including both the passage determination area DB and the passage determination areas DB1 and DB2.
- the passage determination area is defined by a plurality of BLE beacon receivers, BLE communication is performed with the personal mobile terminal 10, and the position of the personal mobile terminal 10 is specified.
- BLE communication is performed with the personal mobile terminal 10
- the position of the personal mobile terminal 10 is specified.
- the passage determination area DA, the passage determination area DA1, and the passage determination area DA2 it is possible to identify the position of the personal mobile terminal 10 that has entered the automatic ticket gate.
- the passage determination area DB, the passage determination area DB1, and the passage determination area DB2 are used to identify the position of the personal mobile terminal 10 that has advanced through the automatic ticket gate (passage determination areas DA, DB).
- the passage determination areas DA and DB calculate a conditional expression that compares the difference between the average of the BLE beacon receivers 2111 to 2114 and the average of the BLE beacon receivers 2115 to 2118 and the preset threshold value.
- the position of the personal mobile terminal 10 is specified.
- the distance between the set of BLE beacon receivers 2111, 2112 and the set of BLE beacon receivers 2115, 2116 is 2000 mm
- the average of the BLE beacon receivers 2111 to 2114 is 10 dB larger than the average of the BLE beacon receivers 2115 to 2118.
- the average of the BLE beacon receivers 2111 to 2114 is 10 dB smaller than the average of the BLE beacon receivers 2115 to 2118.
- the passage determination area DA1 calculates a conditional expression that compares the difference between the set of BLE beacon receivers 2111 and 2112 and the average of the BLE beacon receivers 2115 to 2118 with a preset threshold value, The position of the personal mobile terminal 10 is specified.
- the average of the BLE beacon receivers 2111 to 2112 is 10 dB larger than the average of the BLE beacon receivers 2115 to 2118.
- the average of the BLE beacon receivers 2113 to 2114 is 10 dB larger than the average of the BLE beacon receivers 2115 to 2118.
- the passage determination area DB1 calculates a conditional expression that compares the difference between the set of BLE beacon receivers 2115 and 2116 and the average of the BLE beacon receivers 2111 to 2114 with a preset threshold value.
- the position of the personal mobile terminal 10 is specified.
- the average of the BLE beacon receivers 2115 to 2116 is 10 dB larger than the average of the BLE beacon receivers 2111 to 2114.
- the average of the BLE beacon receivers 2117 to 2118 is 10 dB larger than the average of the BLE beacon receivers 2111 to 2114.
- the passage determination areas DA1 and DA2 are set to detect the position of the personal mobile terminal 10. .
- the passage determination areas DB1 and DB2 are set for the passage determination area DB. How to set the size and position of the passage determination area depends on the position of the BLE beacon receiver and the average difference in the radio wave intensity detected by each BLE beacon receiver. In the passage determination area of interest, it is determined whether or not the personal mobile terminal 10 is located in the passage determination area based on whether or not the difference in radio field intensity obtained from these set average differences in radio field intensity is large.
- the average of the radio wave strengths detected by the BLE beacon receivers 2111, 2112 is the BLE beacon receiver.
- the one with a stronger radio wave that is likely to have a BLE transmitter is used.
- a personal portable terminal is set in the passage determination area DA1. It is determined whether 10 is located.
- the passage determination area DA As shown in the vertical sectional view of FIG. 36B, since the shape is spherical, the height DH is maximized near the center of the gate, and a wide passage determination area DA can be secured, while the section is divided.
- the width in the height direction becomes narrower as it approaches the plates 24A, 24B, and the outer edge of the passage determination area DA becomes a dot shape near the partition plates 24A, 24B, and as a result, the region in the height direction becomes narrower. The accuracy of the position detection in is reduced.
- the user who moves along the wall surface that is, the partition plates 24A and 24B, rather than the center between the gates of the automatic ticket gate, or the user who holds the personal mobile terminal 10 in his hand and positions it on the wall surface side of the gate.
- the passage determination areas DA1 and DA2 rather than the passage determination area DA when detecting the position.
- the height DH1 of the passage determination area DA1 becomes larger as it approaches the partition plates 24A and 24B, which is opposite to the height of the passage determination area DA, and becomes the maximum at the position of the partition plates 24A and 24B. It is suitable for position detection in a region.
- the BLE beacon receivers 2111 to 2114 are set to the BLE beacon receivers 2111.
- the position is detected by changing to ⁇ 2112. If the distance between the BLE beacon receiver 2111 and the BLE beacon receiver 2115 is sufficiently large, the distance between the BLE beacon receiver 2111 and the BLE beacon receiver 2115, the BLE beacon receiver 2111 and the BLE beacon receiver 2117, and Since the distance of does not change much in terms of intensity, the target of the difference may be the BLE beacon receivers 2115 to 2118.
- the above is an example of the passage determination area DA1, but the same applies to the passage determination areas DA2, DB1, and DB2.
- the outer edge of the passage determination area can be regulated. For example, when a large number of ticket gates are installed side by side, it is possible to block them so that the position of a personal portable terminal of a user who uses an adjacent ticket gate is not erroneously measured. .
- different detection areas of the passage determination area DA and the passage determination area DB are set between the pair of partition plates 24A and 24B, and the position of the personal mobile terminal 10 is determined in real time. Can be detected.
- the passage determination area DA and the passage determination area DB separately on the entrance side and the exit side of the automatic ticket gate (gate)
- the user having the personal mobile terminal 10 has entered the gate, It is possible to detect each of the exits, and it is possible to determine whether or not the gate has passed.
- the gate allows bidirectional movement without specifying the entrance side and the exit side.
- the authentication time interval is set in consideration of the walking speed of the user.
- each partition plate 24 may be arranged with a photoelectric sensor or an infrared sensor along the flow line of the user passing between the partition plates 24 to monitor the movement of the user.
- a position identification device such as an automatic ticket gate is equipped with a sensor for monitoring passage of a user, and this can be used. For example, when a person who does not have a personal portable terminal such as a smartphone terminal tries to pass through an automatic ticket gate, the person can physically detect this and perform an operation such as closing the door 29.
- the distance between the first position-specific side receiving unit 22A and the first position-specific side receiving unit 22B is shorter than the distance between the first position-specific side receiving unit 22 and the second position-specific side receiving unit 23.
- 22 A of 1st position specific side receiving parts and 22 B of 1st position specific side receiving parts are arrange
- the distance between the BLE beacon receiver 2111 and the BLE beacon receiver 2112 installed adjacent to each other is, for example, 5 mm to 50 mm. (Position specifying side control unit 28)
- the function of the position specifying side control unit 28 of the position specifying device 20 is shown in the block diagram of FIG.
- the position specifying side control unit 28 shown in this figure includes a first display unit 28A, a second display unit 28B, a door unit 29, and a passage sensor unit 210.
- the position specifying side control unit 28 may include a reader / writer 28C for reading and writing a conventional ticket or IC card.
- the position identifying device 20 controls the passage of the user in the A direction in FIG. 35A, for example.
- the first display unit 28A corresponds to an indicator light or the like that is provided at a conspicuous position of an existing automatic ticket gate or the like and displays a user's passage, an error, discrimination of a child fee, and the like.
- the second display unit 28B corresponds to a liquid crystal display, an organic EL display, or the like, which is provided at a portion where a ticket is put in or an IC card is held over and which displays a withdrawal fee or a balance.
- the door unit 29 is controlled to be in an open state or a closed state according to the result of the processing performed on the personal portable terminal 10 of the user.
- a plurality of passage sensor units 210 are provided, for example, on the side surface on the passage side of the position identifying device 20.
- the passage sensor unit 210 an example in which five passage sensors 2101 to 2105 are provided on the partition plates 24A and 24B is shown. These passage sensors 2101 to 2105 detect the users in the passage formed by the automatic ticket gate 20B.
- the passage sensors 2101 to 2105 are realized by, for example, an infrared sensor, an optical sensor, an ultrasonic sensor, or the like.
- the passage sensors 2101 to 2105 may be of a transmission type that detects a user in the passage in cooperation with a passage sensor unit provided in an opposing auxiliary device, or a passage sensor provided in itself. It may be of a reflective type that detects a user in the passage in cooperation with. Further, a change in the intensity of the transmitted wave may be detected, or a change in the phase may be detected. By this, the height may be measured, and a function of passing a user or a baggage whose height is less than a certain value may be added. On the other hand, if there is a person detected when the personal portable terminal 10 cannot be authenticated, it can be determined from the height or the like that the person has been illegally used.
- the automatic ticket gate 20B shown in FIG. 35B includes, for example, a first display unit 28A, a second display unit 28B, a door unit 29, a reader / writer 28C, and passage sensors 2101 to 2105.
- the automatic ticket gate 20B controls passage of the user in the direction A in the figure.
- the first display unit 28A and the second display unit 28B display various information.
- the door unit 29 is controlled to be in an open state or a closed state according to the result of the authentication processing performed on the personal mobile terminal 10.
- the reader / writer 28C is a member compatible with reading existing tickets and IC cards, and includes, for example, an antenna 28C1 and a communication unit 28C2.
- the communication unit 28C2 includes a controller, a modulator, a demodulator, and the like.
- the controller controls the modulation unit and the demodulation unit.
- the modulation unit superimposes the command on a radio wave having a predetermined frequency band and transmits the radio wave to the antenna 28C1. Further, the demodulation unit demodulates the information included in the radio wave acquired via the antenna 28C1 and outputs the demodulated information (command) to the control device.
- the position specifying side calculation unit 25 specifies the position of the personal mobile terminal 10 using the BLE beacon receiver, and at the same time, performs personal authentication and payment capability authentication based on the position specifying side time unit 27 and the information in the ID / encryption key database. By doing so, position identification authentication is performed. Based on this determination result, the control for permitting or prohibiting the passage of the user is executed.
- the position determination side control unit 28 When performing control to permit the passage of the user, the position determination side control unit 28 causes the door unit 29 to be in the open state, and causes the first display unit 28A to display information indicating the passage permission.
- the position determination side control unit 28 causes the door unit 29 to be in a closed state, or causes the first display unit 28A to display information indicating the passage prohibition.
- the position specifying side control unit 28 closes the door 29 or displays information about the error processing on the first display unit 28A as the error processing. I will let you.
- the information regarding the error processing is, for example, the case where the position cannot be specified, the case where the personal authentication is not possible, or the case where the payment ability cannot be verified. In addition, you may include the case where the admission record cannot be confirmed.
- the position identifying device 20 outputs a predetermined sound or voice according to the determination result of the position identifying side computing unit 25, or responds to the position identifying side computing unit 25 from the input of voice to solve error processing or the like. A sound input / output unit may be provided for this purpose. Further, the position identifying device 20 may transmit the entry / exit record to the management terminal 50 or the management server system 30 in order to take measures against the quixel.
- the personal portable terminal 10 may be authenticated and passed in cooperation with the image, or the position information of the position specifying device 20 may be changed. Authentication may be stopped. Further, the first display unit 28A and the second display unit 28B can be omitted. (Personal mobile device 10)
- the personal mobile terminal 10 is a personally-owned communication terminal carried by a user whose position is to be specified or authenticated. As shown in FIG. 34, the personal mobile terminal 10 includes a personal terminal side communication unit 11A, a personal terminal side control unit 12, a personal terminal side time unit 14, a personal terminal side storage unit 13, and a personal terminal side input / output. The unit 15 and the personal terminal side computing unit 16 are provided.
- the personal terminal side time section 14 generates information regarding time.
- the clock on the personal portable terminal 10 side corresponds.
- the personal terminal side time section 14 may be integrated with other members such as the personal terminal side calculation section 16 or incorporated into the personal terminal side calculation section 16 or the like.
- the personal terminal side storage unit 13 is a storage member for holding various kinds of information, and a non-volatile semiconductor memory, a hard disk, or the like can be used. Here, it holds unique identification information, a unique common key, a function used to generate a one-time password, and the like.
- the personal terminal side input / output unit 15 is a member that performs input / output of the personal portable terminal 10, and is an input device such as a keyboard, a mouse, a console, a microphone, an output device such as a display and a speaker, or a touch panel that also serves as input / output. Man / machine interface is available.
- the personal terminal side computing unit 16 is a member that performs various computations and processes, and can use the SoC of the smartphone terminal, the CPU of the personal computer, or the ASIC.
- the personal terminal side control unit 12 may be integrated with the personal terminal side calculation unit 16.
- This personal mobile terminal 10 can be registered in the management server system 30 and can apply for the provision of a company service that uses the position identifying device 20 through the management server system 30.
- information such as a credit card, a debit card, a prepaid card, and a cash card is registered in the management server system 30.
- a small terminal that only transmits a BLE beacon after registration of personal information and setting with the management server system 30 may be used, or may be transmitted only in the vicinity of the position identifying device 20.
- the personal terminal side communication unit 11A is a member for communicating with an external device.
- the personal portable terminal 10 is an external device according to standardized communication standards such as LTE, 3G / 4G / 5G, CDMA, WIMAX, and WiFi (all are product names) or their own communication standards. Can communicate with.
- the personal terminal side communication unit 11A functions as the personal terminal side transmission unit 11.
- the personal terminal side communication unit 11A includes a BLE beacon transmission device. Further, a GPS device or a BLE beacon receiving device may be provided.
- the personal mobile terminal 10 can pass through the position identifying device 20 by transmitting a BLE beacon. Note that the personal mobile terminal 10 may transmit a BLE beacon when it senses an approach to the management terminal 50 and the position identifying device 20 using the GPS device or the BLE beacon reception function, or may transmit a BLE beacon when it is separated. You may stop calling.
- the personal terminal side communication unit 11A can be provided with a wireless communication function such as a wireless LAN or mobile communication. This wireless communication function can be connected to a network such as the Internet. Further, a personal terminal side display unit and a personal terminal side input unit may be provided. Further, an acceleration sensor or the like may be provided, a local measuring device may be provided, or an image input device may be provided.
- the personal mobile terminal 10 that has passed through the position specifying device 20 performs PID for estimating the direction and speed of movement from sensors such as acceleration, gyro, and geomagnetism, physical information unique to the environment in advance as a database, and performs position specification by matching processing. The subsequent position may be specified by combining the so-called fingerprinting method or the like.
- indoor map guidance may be provided, or the map may be displayed on the input / output unit on the personal terminal side.
- the transfer guidance application When used in a ticket gate as in the present embodiment, it may be used in conjunction with the transfer guidance application to check the boarding position and time, station yard guidance, usage fees, and the like.
- the movement route information may be transmitted to the management server system 30 and registered in the usage information.
- the financial institution 60 has a credit card company, a bank, etc., a credit screening function, a credit card number issuing function, and a payment function.
- the financial institution 60 conducts credit examination of the payment registration of the user registered in the management server system 30.
- the management server system 30 performs user registration, update of the ID / encryption key database, payment from the user, and payment to the business operator. (Registration process to the post-payment system using the management terminal 50 for business operator)
- FIG. 38 is a flow chart showing the flow of registration processing in the subsequent payment system using the management terminal 50 for businesses in the present embodiment.
- This flow chart shows a case where the management terminal for business 50 has a business-side input / output unit 43 and a business-side communication unit 41 capable of connecting to the Internet, and the like, and when necessary. When unnecessary or impossible, this flow is applied as being set in advance by using another terminal having a separate equivalent function that can be connected to the management terminal 50 for business.
- the business management terminal 50 can install the registration processing application in the present system by using the Internet or the like. Alternatively, the registration process can be performed on the Internet. Alternatively, it may be used as a dedicated terminal in which the registration processing application is installed.
- the business management terminal 50 always confirms the electronic certificate of the certificate authority of the management server system 30, confirms the safety, and connects.
- the business management terminal 50 registers payment information such as a bank account in the management server system 30, for example.
- the management terminal for business 50 sends to the management server system 30 a service usage fee table for collecting usage fees from users based on the services provided by the business. It should be noted that this service usage fee table may be sent after the fact in such a form that the user can know the ID and the usage fee.
- the management server system 30 issues a unique business ID to the business management system 40 and gives it to the business management system 40.
- the business management system 40 issues an encryption key that forms a set with the ID and sends it to the management server system 30 in a secure form.
- the management server system 30 and the business management system 40 store each in a storage device.
- the management terminal 50 and the position specifying device 20 may be installed first, may be installed later, or may be installed in parallel at the same time.
- the management server system 30 saves these pieces of information in a storage device. The account may be moved to another business management system 40 while obtaining the authentication of the management server system 30.
- FIG 39 is a flow chart showing the flow of registration processing in the present system using the personal mobile terminal 10 in the post-payment system according to the present embodiment.
- This flow chart shows a case where the personal mobile terminal 10 has a communication device capable of connecting to the Internet with an input / output device such as a smartphone terminal, and when necessary. If unnecessary or impossible, this flow is applied as being set in advance by using another terminal having a separate equivalent function that can be connected to the personal mobile terminal 10.
- the personal mobile terminal 10 can install the registration processing application in the present system by using the Internet or the like. Alternatively, the registration process can be performed on the Internet. Alternatively, it may be used as a dedicated terminal in which the registration processing application is installed.
- the personal mobile terminal 10 checks the electronic certificate of the certificate authority of the management server system 30 at any time, confirms the safety, and connects.
- the personal mobile terminal 10 registers payment information such as a credit card in the management server system 30, for example.
- payment information such as a credit card in the management server system 30, for example.
- information such as name and address, which is necessary for credit card credit examination, is also registered.
- This registration information is stored in a secure form in the personal information database of the management server system 30. Credit screening is performed based on this information.
- the result of the credit examination is stored in the personal information database.
- the management server system 30 issues a unique ID to the personal mobile terminal 10 and gives it to the personal mobile terminal 10.
- the personal mobile terminal 10 issues an encryption key that forms a set with the ID and sends it to the management server system 30 in a secure form.
- the personal mobile terminal 10 stores this ID / encryption key in the storage device.
- the management server system 30 saves these pieces of information in the personal information database and the ID / encryption key database. Note that, for example, even when the user loses a credit card or the like, the user information can be temporarily invalidated.
- the account may be moved to another personal mobile terminal 10 while obtaining the authentication of the management server system 30.
- FIG. 40 shows a flow chart showing the flow of processing for applying for the enterprise service from the personal mobile terminal 10 by the post-payment system according to the present embodiment.
- the personal mobile terminal 10 can register the service of the business operator who wants to use it. For example, you may enter into a contract with some companies, or you may use it automatically or voluntarily by entering a contract with some companies, or you may omit the application. May be.
- the personal mobile terminal 10 applies to the management server system 30 to apply for a necessary business operator service.
- the management server system 30 notifies / applies the information to the management system 40 for business, and asks the business whether the information is acceptable or not. When the company refuses, the management server system 30 is notified.
- the management server system 30 notifies the personal mobile terminal 10 that the application has been rejected, and the personal mobile terminal 10 cannot proceed to the subsequent steps.
- the business management system 40 may be configured to be able to automatically determine whether or not to allow.
- the business management system 40 When the business operator approves the application, the business management system 40 notifies the management server system 30 of the business operator ID, the authorization period that the position identifying device 20 may approve, and the installation location where the passage is permitted. .
- the management system 40 for enterprises can specify the installation place and the approval period for the position specifying device 20 managed by itself.
- the management server system 30 may notify the personal mobile terminal 10 that the application is permitted.
- the management server system 30 sets the ID / encryption key of the user who has applied to the position identifying device 20 and the authorization period, which exists in the installation location for which the management system for business 40 is permitted to notify. This may be set through the management terminal 50.
- the position specifying device 20 and / or the management terminal 50 notifies the management server system 30 of a setting completion notification.
- the management server system 30 that has received the setting completion notification may notify the personal mobile terminal 10 and the management system 40 for business of the setting completion.
- FIG. 41 shows a flow chart showing the flow of processing for monitoring and maintaining changes in the credit status in the management server system 30 by the post-payment system according to the present embodiment.
- the management server system 30 periodically checks the status of credit examination with the financial institution 60 in order to monitor changes in the credit status, unless the credit information changes.
- the management server system 30 updates the ID / encryption key database.
- the management system for business 40, the management terminal 50, and the position identifying device 20 are notified as needed.
- the difference between the ID / encryption key database may be sent, or all the data may be sent.
- an ID that has received a credit NG such as a credit card cannot pass through the position authentication device that requires subsequent payment.
- the management server system 30 may also notify the personal mobile terminal 10 of denial of a credit card or the like. Note that registration of a new credit card or the like may be prompted.
- FIG. 42 is a flow chart showing the flow of processing when the user uses the position identifying device 20 in the post-payment system according to the present embodiment.
- the personal mobile terminal 10 is set in advance by receiving a signal from a BLE transmitter installed as a communication device of the management terminal 50 or the position specifying device 20 near the position specifying device 20, or by GPS.
- a BLE beacon signal is transmitted by approaching the vicinity of the installation position of the position identifying device 20.
- the power may be constantly transmitted, or the power consumption may be kept low by increasing the frequency of transmission by approaching.
- At least ID is given to the transmitted BLE beacon signal.
- the position identifying device 20 identifies and authenticates the source of the BLE beacon signal assigned with the ID.
- the BLE beacon signal may be encrypted or may be decrypted by the management terminal 50 and the position identifying device 20.
- the personal portable terminal 10 may be notified of the passing authentication. Moreover, you may notify to the management system 40 for enterprises. Further, the usage history may be notified to the management terminal 50. The flow of position identification and encryption / decryption will be described later.
- the position identifying device 20 periodically notifies the management server system 30 of the usage history.
- the management terminal 50 may be used, or the management terminal 50 may be executed instead of the position identifying device 20.
- the management history 40 for the business and the personal mobile terminal 10 are notified of the usage history of the determined institution by the time of settlement. If there is a subsequent payment, the amount will be settled.
- the management server system 30 calculates the billing cost, bills the billing cost to the financial institution 60, and pays the part of the payment paid by the financial institution 60 excluding the fee, etc. to the business operator.
- the usage information and the payment result are notified through the business management system 40. Note that the notification may not be given through the management system 40 for business. Further, the user is notified of the usage payment information through the personal mobile terminal 10.
- the management server system 30 may be notified via a website or SNS, may be notified via other Internet media or paper media, or may be notified via a company such as a credit card so that the management server system 30 does not notify directly.
- Good. Provide for location identification
- FIG. 43 shows a processing flow of the personal mobile terminal 10 in the position identification of the personal mobile terminal 10 by the position identification device 20.
- the personal mobile terminal 10 receives a signal from a management terminal 50 near the position specifying device 20 or a BLE transmitter installed as a communication device of the position specifying device 20, or by receiving GPS radio waves. Is detected, it is detected that the position specifying device 20 is approaching the area, and a BLE beacon is transmitted. Alternatively, the power may be constantly transmitted, or the power consumption may be kept low by increasing the frequency of transmission by approaching. This area may have a radius of 10 m or a radius of 100 m, for example. Then, the departure of this area may be detected and the transmission of the BLE beacon may be stopped.
- the position identifying device 20 receives the BLE beacon radio wave by, for example, each of the eight BLE beacon receivers shown in FIG.
- Each BLE beacon receiver measures the ID and the like in the BLE beacon radio wave and its radio wave intensity.
- a reference value described later is calculated, and it is determined whether or not the difference is equal to or more than a threshold value. If the difference is greater than or equal to the threshold value, it is determined that the personal mobile terminal 10 having the ID exists in an area having a large reference value. If the difference is not equal to or more than the threshold value, it is determined that the personal mobile terminal 10 having the ID does not exist in any area.
- the method of calculating the radio field intensity will be described later.
- FIG. 45 is a flowchart showing the flow of processing for calculating the radio field intensity when the position identifying device 20 identifies the position of the personal mobile terminal 10.
- the radio wave intensity of the BLE beacon signal of this embodiment may be calculated based on history information of the reception intensity of the BLE beacon signal.
- the device A and the device B of the BLE beacon receiver shown in the upper part of the figure do not use only the value at each reception timing when handling the radio field intensity obtained every p seconds, but at a fixed time.
- An average based on data for a predetermined period (r seconds in the example of FIG. 45. p ⁇ q ⁇ r) including information on the radio wave intensity at a single or multiple timings (every q seconds in the example of FIG. 45). The value is calculated and used as the radio field intensity for each BLE beacon receiver.
- FIG. 46 is a flowchart showing the flow of processing for calculating the radio field intensity when the position identifying device 20 identifies the position of the personal mobile terminal 10.
- the radio wave intensity of the BLE beacon signal may be calculated based on history information of the reception intensity of the BLE beacon signal.
- the device A and the device B of the BLE beacon receiver shown in the upper part of the figure handle the radio field intensity obtained every p seconds, but the devices are not always updated at the timing when data is added. Absent. Therefore, the same processing is performed for each device. That is, a predetermined period of time (every q times update in the example of FIG. 46) including information on the radio wave intensity for each single or multiple data updates (every r times update, p ⁇ .
- the average value is calculated based on the data of q ⁇ r), and is set as the radio field intensity for each BLE beacon receiver. If there is no communication for a certain ID within a certain period of time, the accumulated past data may be deleted. (Procedure for obtaining the reference value from the radio wave intensity of the BLE receiver)
- FIG. 47 is a flowchart showing the flow of processing for obtaining the reference value from the radio wave intensity of the BLE receiver.
- the radio field intensity measured by each BLE receiver using the radio field intensity measuring method described above is used, and the same ID will be described below.
- the determination method in which a plurality of conditions are combined is described in the present embodiment, these conditions may be determined in any combination.
- the position identification has various arrangements as described in the knowledge that is the basis of this embodiment, and this embodiment is described as an example. Here, description will be given using the passage determination areas DA, DA1, DA2, DB, DB1, and DB2 in the position identifying device 20 shown in FIGS. 36A and 36B.
- BLE communication is performed by using the personal mobile terminal 10 as a BLE transmitter and the position identifying device 20 as a BLE receiver, and the position of the personal mobile terminal 10 is determined within a plurality of preset passage determination areas. It is determined by sequentially determining whether or not The plurality of passage determination areas are, for example, the passage determination areas DA, DA1, DA2, DB, DB1, DB2 shown in FIG. 36A.
- the order in which the determination is performed for these plurality of passage determination areas can be appropriately set according to the processing speed and accuracy. For example, it is first determined whether or not it is within the passage determination area DA, and when it is determined that it is within the passage determination area DA, the processing ends.
- step S4701 the personal mobile terminal 10 performs BLE communication with each of the BLE beacon receivers 2111 to 2118, which are BLE receivers, and the BLE receivers detect the ID and the radio field intensity.
- step S4702 with respect to the detected radio field intensity, the average of the BLE beacon receivers 2111 to 2114 corresponding to the inspection area A and the average of the BLE beacon receivers 2115 to 2118 corresponding to the inspection area B are calculated, It is determined whether the difference is greater than or equal to a predetermined threshold.
- the predetermined threshold value is appropriately set according to the usage environment such as the amount of noise and the strength of the radio wave used.
- the threshold is set to 10 dB. If the difference between the average values is equal to or more than the threshold value, the process advances to step S4708, and the personal portable terminal 10 corresponding to the ID is determined to be present in the inspection area A having a large average value, that is, the passage determination area DA and processed. To finish.
- step S4702 if the difference between the average values is not greater than or equal to the threshold value, the flow advances to step S4703, and in the inspection area A (here, the BLE beacon receivers 2111 to 2114), the maximum value and the minimum value of the radio field intensity are the predetermined threshold values. If it is above (for example, 10 dB or more), the process of removing the minimum value from the calculation target of the average value is performed. As a result, when the variation in the radio wave intensity between BLE beacon receivers is too large, the BLE beacon may occasionally output a very low radio field intensity such as ⁇ 30 dBm from time to time, which is advantageous in removing an abnormal value. can get.
- the inspection area A here, the BLE beacon receivers 2111 to 2114
- step S4704 the average of the BLE beacon receivers 2111 to 2114 and the average of the BLE beacon receivers 2115 to 2118 are calculated, and it is determined whether the difference is equal to or more than a predetermined threshold value. judge. If the difference between the average values is equal to or larger than the threshold value, the process advances to step S4708 to determine that the personal mobile terminal 10 corresponding to the ID exists in the passage determination area DA, and ends the process.
- step S4704 if the difference between the average values is not greater than or equal to the threshold value, the flow advances to step S4705, and the inspection area A1 (BLE beacon receivers 2111 to 2112 corresponding to the passage determination area DA1) and the inspection area A2 (passage determination area DA2 are selected).
- the inspection area A1 BLE beacon receivers 2111 to 2112 corresponding to the passage determination area DA1
- the inspection area A2 passage determination area DA2 are selected.
- a predetermined threshold value for example, 10 dB
- the one with the larger average value (BLE beacon receivers 2111 to 2112 or BLE beacon reception) Machine 2113 to 2114) is selected. This means that the closer the personal mobile terminal 10 is, the larger the average value of the radio field intensity, and therefore the determination is based on that value.
- step S4706 calculates the average of the selected BLE beacon receivers 2111 to 2112 or BLE beacon receivers 2113 to 2114 and the average of the BLE beacon receivers 2115 to 2118, and the difference between them is a predetermined threshold value (for example, it is determined whether it is 10 dB or more.
- a predetermined threshold value For example, it is determined whether it is 10 dB or more.
- the process similarly proceeds to step S4708, and the personal portable terminal 10 corresponding to the ID is determined to be present in the passage determination area DA1 or DA2, and the process ends.
- the personal mobile terminal 10 approaches the partition plates 24A and 24B instead of the center of the gate, detection is possible.
- step S4706 the flow advances to step S4707 to determine that the personal mobile terminal 10 with the ID is not present in the passage determination area DA (and DA1 and DA2). ..
- the flow of the process of specifying the position of the personal mobile terminal 10 by the position specifying device 20 is shown in the flow chart of FIG.
- area determination the result of the determination as to whether or not it exists in the area obtained earlier.
- data is added each time data processing is updated, but information on the radio field intensity is included at every constant time (every q times of updates in the example of FIG. 48) and at each data update.
- p ⁇ q ⁇ r Based on the data of a predetermined period (every r times of updates in the example of FIG. 48, p ⁇ q ⁇ r), if p or more out of r is judged to be ⁇ , it can be judged to be ⁇ even after updating.
- the present system can be used when the erroneous determination is very low, but the present invention can make the determination with sufficient reliability because the erroneous determination can be 0.0%. If there is no communication for a certain ID within a certain period of time, the accumulated past data may be deleted.
- an area as shown in FIG. 36A can be detected. For example, it is possible to recognize an area close to a sphere having a diameter of 40 cm to 60 cm. As a result, the height at which the personal mobile terminal 10 is held can be approximately covered with the height of a smartphone (not recommended) even though it is a pocket or a bag for general adults. Note that, in order to target children and the like, in addition to the eight BLE receivers mounted at the same height, eight BLE receivers may be mounted at different heights in the same manner to specify the position. (Procedure for encryption / decryption)
- FIG. 49 is a flowchart showing the flow of processing of the personal mobile terminal 10 in encryption / decryption.
- the personal mobile terminal 10 performs personal authentication such as personal information and a credit card and device authentication of the personal mobile terminal 10 in advance, for example.
- device authentication for example, only one device may be set by software license setting, or activation may be restricted.
- a unique ID is given to the personal mobile terminal 10.
- the personal mobile terminal 10 and its setting terminal can set an encryption key that is a set with a unique ID.
- This encryption key may use common key encryption such as 3DES or AES, or public key encryption such as elliptic encryption.
- This encryption key is stored as a set with the ID in the ID / encryption key database of the management server system 30 in a secure manner.
- FIG. 50 is a flowchart showing an example of the flow of processing of the personal mobile terminal 10 in encryption / decryption.
- the personal mobile terminal 10 acquires the time of the personal mobile terminal 10 during operation, for example, in 48-bit units such as ms, and performs padding processing.
- This padding processing is, for example, one that uses an equation obtained from the time, which is also used in a one-time password used in so-called bank transfer. Therefore, the attacker must not be able to guess the padding processing contents from the time and this data.
- step S5002 the padding time is encrypted with an encryption key that is prepared in advance and is a set with the ID. Then, in step S5003, the ID and the encrypted time are sent.
- the personal portable terminal which is the device to be authenticated that is authenticated, encrypts the time at the time of transmission and sends it together with the ID to the authenticating device that performs authentication. (Same time difference between sending and receiving)
- FIG. 51 is a flowchart showing an example of the flow of authentication processing of the position identifying device 20 in encryption / decryption. Since the position identifying device 20 performs the authentication, first, in step S5101, the ID (identification information) sent from the device such as the personal portable terminal that is about to be authenticated and the encrypted time are used as the position identifying device 20. To receive. Next, in step S5102, the position identifying device 20 that performs authentication searches the encryption key from the ID of the device to be authenticated, and decrypts the encrypted time sent together with the ID. Then, in step S5103, it is determined whether or not the time information i (ID) set for each ID is defined. If not yet defined here, the flow advances to step S5104 to define i (ID).
- ID identification information sent from the device such as the personal portable terminal that is about to be authenticated and the encrypted time are used as the position identifying device 20.
- the position identifying device 20 that performs authentication searches the encryption key from the ID of the device to be authenticated, and de
- i the time difference between the received time and the decrypted time (that is, the transmission time of the device to be authenticated) is calculated.
- i (ID) the time difference between the received time and the decrypted time (that is, the transmission time of the device to be authenticated) is calculated.
- the process returns to step S5101 and repeats. That is, the new ID and the encrypted time are received.
- the process advances to step S5105 to determine whether the time difference between the received time and the decoded time matches i (ID). If they match, in step S5106. Authenticate. If they do not match, authentication is not performed, and the process returns to step S5101 to repeat the process. By repeating this operation, authentication can be repeatedly performed.
- the process may be stopped at the required number of times, or may be repeated if continuous authentication is essential for real-time position identification and the like. (Transmission / reception time difference is within a predetermined range)
- the procedure for performing authentication when the time difference between the transmission time and the reception time is the same was explained.
- the time difference i (ID) may not match with accuracy of the unit of ms.
- the time may be different between the device to be authenticated that defines the transmission time and the authentication device side that defines the reception time. Therefore, an authentication method that can tolerate such a slight time error will be described below with reference to the flowchart of FIG.
- FIG. 52 is a flowchart showing another example of the flow of authentication processing of the position identifying device 20 in encryption / decryption.
- the position specifying device 20 for authentication receives the ID and the encrypted time sent from the device to be authenticated.
- the position identifying device 20 searches for an encryption key from the received ID and decrypts the encrypted time sent together with the ID.
- it is determined whether or not the time information i (ID) set for each ID is defined. If not yet defined here, the flow advances to step S5204 to define time information i (ID).
- time information i (ID) There can be a plurality of defining methods, for example, the time difference between the received time and the decoded time is obtained.
- the time information i (ID) is defined in this way, the process returns to step S5201 and is repeated. That is, the new ID and the encrypted time are received.
- step S5203 the flow advances to step S5205, and the time difference between the newly received time and the decoded time is i (ID), and the difference is an arbitrary set value, for example, T Determine if it is less than a second. If they match, authentication is performed in step S5206. By repeating this operation, authentication can be repeatedly performed. The process may be stopped at the required number of times, or may be repeated if continuous authentication is essential for real-time position identification and the like. (Sending time and receiving time)
- the procedure for performing authentication based on the time information i (ID) has been described, but multiple pieces of information that serve as authentication criteria may be used.
- the authentication may be performed using the time information i (ID) indicating the received time and the decrypted time, that is, the time information j (ID) indicating the transmission time.
- Such an authentication method will be described as a modified example with reference to FIG.
- FIG. 53 is a flowchart showing the flow of authentication processing of the position identifying device 20 in encryption / decryption.
- step S5301 since the position identifying device 20 performs authentication, the ID and the encrypted time sent from the device to be authenticated are received.
- step S5302 the position identifying device 20 searches for an encryption key from the received ID, and decrypts the encrypted time sent with the ID.
- step S5303 it is determined whether or not the time information i (ID) and j (ID) set for each ID are defined, and if they are not defined yet, in step S5304, these time information i ( ID) and j (ID) are defined.
- the received time is defined as i (ID) and the decrypted time is defined as j (ID), and the process returns to step S5301 and is repeated. That is, the new ID and the encrypted time are received.
- step S5303 the flow advances to step S5305 to obtain the difference between the received time and i (ID) and the decrypted time and j (ID), respectively. Then, it is determined whether these differences match. If they match, authentication is performed in step S5305. On the other hand, if it is not located, authentication is not performed and the process returns to step S5301 to repeat the process. By repeating such a procedure, authentication can be repeatedly performed. The process may be stopped at the required number of times, or may be repeated if continuous authentication is essential for real-time position identification and the like.
- authentication is performed when the difference between i (ID) and j (ID) is the same, but as described above, it is not necessary to obtain a perfect match, and a certain degree of error is tolerated.
- the authentication may be performed when the value of the degree is obtained.
- FIG. 54 is a flowchart showing the flow of the authentication process of the position identifying device 20 in the encryption / decryption according to the modification.
- the authentication is performed using the time difference between the received time and the time difference between the decrypted time. That is, the time received for a certain ID is obtained as i (ID), and the decoding time is obtained as j (ID). If i (ID) and j (ID) are defined, and the difference between the received time and i (ID) and the decoded time and j (ID) do not match with accuracy in the unit of ms.
- Authentication is determined by detecting the. Specifically, the procedure of the position identifying device 20 performing authentication will be described with reference to FIG.
- step S5401 the position identifying device 20 receives the ID and the encrypted time from the device to be authenticated such as a personal mobile terminal.
- step S5402 the position identifying device 20 retrieves the encryption key from the sent ID and decrypts the encrypted time sent together with the ID.
- step S5403 it is determined whether i (ID) and j (ID) have been defined. If i (ID) and j (ID) are not defined yet, the received time is defined as i (ID) and the decrypted time is defined as j (ID) in step S5404, and then step S5401. Return to and repeat the process. That is, the ID and time are newly received.
- step S5403 if i (ID) and j (ID) have been defined, the flow advances to step S5405 to determine the received time and i (ID), and the decrypted time and j (ID), respectively. It is determined whether or not they match each other within an arbitrary set value T seconds or less. If they match, the process advances to step S5406 to perform authentication. On the other hand, if they do not match, the authentication is not performed and the standby state is set. That is, the process returns to step S5401 and the process is repeated. This enables authentication. Note that the number of repetitions may be limited to the required number of times and the processing may be stopped.
- i (ID) and j (ID) can be initialized after a predetermined time has elapsed.
- i (ID) and j (ID) which are authentication criteria, are updated at regular intervals, and even if the impersonation succeeds once, it is impossible to continue the impersonation permanently. Security can be further improved. (Spoofing detection method)
- FIG. 55 is a flowchart showing a flow of processing for denying impersonation by the position identifying device 20 in encryption / decryption.
- the decrypted time is newer than j (ID)
- the same procedure as before can be performed.
- FIG. 55 a description corresponding to FIG. 53 is given, but a method corresponding to FIG. 54 may be used.
- the decoded time is not newer than j (ID), that is, if the signal is a copy of some signal, a signal newer than j (ID) cannot be created, and ID is spoofed. Impersonation can be avoided by stopping.
- FIG. 56 and FIG. 57 show a situation in which an experiment is performed by assuming that it is a ticket gate.
- the image on the left is the image under experiment, and the figure on the upper right shows the state of the authentication.
- the user is behind the screen of the image shown on the left, and in the diagram shown on the upper right, "O" is displayed every several ms at the back of the screen, confirming that the position identification authentication has been completed.
- the probability of this display is 95% or more per time, and the probability of being able to authenticate while moving about 10 cm can be set to about 1-10 -17 by performing the above-described processing. At the same time, the probability of erroneous recognition per time is 0.0%.
- FIG. 57 it can be seen that the front side of the screen can be authenticated.
- the passage of the user in the opposite direction can be controlled by performing an operation in which the position is reversed.
- the ticket gate of the present embodiment may have a device for reading and processing an existing ticket or IC card, or may have a network connection for that purpose, and may cooperate with the system of the present embodiment. It may be used or treated as an independent payment method.
- a smart phone terminal or the like having a composite function since a smart phone terminal or the like having a composite function is used in the present embodiment, it is possible to prevent an illegal boarding such as exchanging an IC card.
- license authentication for using the application is required for each terminal, for example.
- the user needs to take a procedure to stop the license from the old terminal and change the license to the new terminal when changing the terminal. For example, you may do the procedure at the registration site, etc., or when you log in by entering the ID and password etc. that you enter in the corresponding application on the new terminal, you will be automatically logged out from the corresponding application on the old terminal and you will not be able to use it May be.
- the management device or the like can determine whether or not the personal portable terminal 10 has already entered, so that it is possible to prevent an illegal boarding even if it is linked with another payment method.
- signal transmission and reception are not limited to BLE beacons.
- BLE communication that is, transmission and reception of BLE is also possible.
- the BLE communication has an advantage that a usable communication band is wider than that of the BLE beacon.
- the type of signal is not limited to BLE, and signals used for known standardized wireless communication such as Wi-Fi, RFID, IMES, ZigBee, etc. can be appropriately used.
- the medium is not limited to a radio wave signal, and a medium such as ultrasonic waves or optical communication may be used. [Example 2] (General post payment system)
- the business operator installs the management terminal 50 at a convenience store and the location specifying device 20 at an exit or the like.
- An RFID tag reader is installed in the position identifying device 20.
- RFID tags are attached to the products. Price information and associated information are recorded in the RFID tag.
- the user signs a usage contract with the business through the management server system 30.
- the user registers which position specifying device 20 can be used and when.
- the user passes through the position specifying device 20 at the outlet of the store while holding the personal mobile terminal 10 and holding a bag containing products for shopping.
- the position identifying device 20 reads the RFID tag and calculates the total amount of money while performing the position identification / authentication of the personal portable terminal 10 of the user, and bills the user afterwards.
- the position measuring device 20 instead of the position measuring device 20, only Bluetooth may be installed at a cash register or the like and used instead.
- the position measurement is not highly accurate, the position measurement accuracy of the conventional degree can be achieved, and the authentication technique according to the present embodiment can be used to authenticate the person.
- a payment / approval button or the like may be displayed on the cashier screen or the like, and the user may press the button to settle the payment.
- the payment may be made after entering a 4-digit number.
- the cash register device may be composed of a device such as a tablet and an application.
- the recognition of the product is not limited to the configuration in which the product is recognized by the RFID tag, the camera or the like, and the conventional barcode input or the like may be used. In this case, the entrepreneur needs to arrange a clerk at the cash register, but there is an advantage that the cash management is not necessary and the convenience of completing the settlement is obtained for the user.
- a wireless charging system called Cota can charge up to 10 m with 1 W. By installing multiple of these at stations, you will be able to charge compatible smartphones while walking. However, the charging fee cannot be charged unless the person who is charging is specified. Therefore, by using the position identification authentication technique of the present embodiment, the user can be identified and authenticated while walking, and the user can make a subsequent payment.
- the business operator installs the position specifying device 20 around the wireless charging system.
- the application for position identification / authentication of the personal portable terminal 10 installed by the user has a function of measuring the charge amount.
- the user makes a contract with the business in advance via the management server system 30.
- the user holds the personal mobile terminal 10 to be charged and moves to the vicinity of the wireless charging system.
- the position identifying device 20 can confirm the payment capability by performing the position identification / authentication of the user's personal mobile terminal 10, and transmit and charge the radio wave for the wireless charging system toward the personal mobile terminal 10. it can.
- the personal mobile terminal 10 can measure the amount of charge through the position identification / authentication application, calculate the amount of charge, and notify the management server system 30.
- the management server system 30 can charge the user a usage fee for the wireless charging system. This improves convenience for both users and businesses. [Example 4] (General post payment system) (Drive through)
- the business operator can identify and authenticate the user while the user is in the vehicle, and the user can make the subsequent payment.
- the position identifying device 20 is installed in the drive through.
- the user makes a contract with the business in advance via the management server system 30.
- the business operator uses the position specifying device 20 to specify and authenticate the position of the user's personal portable terminal 10 when the user places an order or delivers the product, and charges a usage fee.
- the user can reduce the time and effort for payment, and the convenience is improved.
- the convenience for the business operator is improved because the labor for payment is reduced.
- only Bluetooth may be installed instead of the position measuring device 20 and used instead.
- the configuration in this case can be the same as that of the above-described second embodiment, and detailed description thereof will be omitted.
- the user receives the parking card issued at the time of parking while using the shopping without taking out the cash, the credit card, or the personal mobile terminal 10 when the user stops at the attached parking lot by car and does the shopping.
- An example of a system will be described in which the parking card can be taken out without having to read the parking card to a machine or the like at the exit gate without leaving it at the cash register at the time of shopping.
- the description of the same points as those of the first to fourth embodiments will be omitted, and only the different points will be described.
- the position identification authentication technology of the present embodiment it is not always necessary to receive the parking card at the time of entering the warehouse, it is not necessary to pay at the cash register at the time of shopping, and it is necessary to present the parking card at the same time.
- users will be able to use parking cards and payments without being aware of parking cards and payments. Also, the operator does not need to pay at the cash register and check the parking card.
- the position measuring device 20 is installed at the entrance / exit gate and the cash register of each store.
- the user makes a contract with the business in advance via the management server system 30.
- the business operator uses the position measuring device 20 to measure and authenticate the position of the user's personal mobile terminal 10 when the user moves in and out and when paying at the cash register. Eliminate the exchange of cards. As a result, the convenience of the user and the business operator is improved because the transaction of money and parking cards and the processing at the cash register are reduced.
- Bluetooth may be installed in a cash register or the like and used instead.
- the configuration in this case can be the same as that of the above-described second embodiment and the like, and detailed description thereof will be omitted.
- the business operator installs the management terminal 50 in the main business area of the bus, etc., and installs the position identifying device 20 in the boarding / alighting area of the bus.
- the user passes through the position specifying device 20 when getting on, and the position specifying device 20 records the use start place.
- the position identifying device 20 allows the user having the personal portable terminal 10 to pass through by performing the position identification / authentication and records the place of getting off.
- the business notifies the management server system 30 of this data through the management terminal 50 at the business site.
- the management server system 30 can post-charge the bus usage fee to the user from the usage record and fee list for each user.
- the user may be notified of the boarding / alighting timing from GPS information or the like in cooperation with an application for notifying the boarding / alighting of the bus.
- the business operator installs the management terminal 50 in the driver's seat in the vehicle and installs the position specifying device 20 so that the position of the passenger seat in the vehicle can be specified.
- the user passes through the position specifying device 20 when getting on, and the position specifying device 20 records the use start place / time.
- the driver makes a bill in the taxi, and if there are multiple users, the user who wants to make the bill can make the payment.
- the driver can confirm the position specification / authentication result by using the management terminal 50 and make a bill from the personal mobile terminal 10 in the seat of the payer who wants to make a bill.
- a smartphone or the like may be installed instead of the position measuring device 20 and used as a substitute.
- the payment may be performed by displaying it and pressing it by the user, or the payment may be made after entering a 4-digit number in some cases.
- the payment amount may be set in advance in a fare table so that it is automatically charged based on the boarding distance and boarding time, or the special fare processing or the like can be set at the time of charging.
- Example 7 General post-payment system (Pay gate lock at parking lot with smartphone)
- Example 7 describes an example in which the user can use the payment at the parking lot without the trouble of payment. The description of the same points as those of the first to sixth embodiments will be omitted, and only the different points will be described.
- the position identifying device 20 is installed at the corresponding position in each parking lot space.
- the user applies for unlocking his / her own car from the app or the like using the personal mobile terminal 10 from inside the car.
- the position identifying device 20 can unlock the vehicle of the user at the corresponding position by identifying and authenticating the personal portable terminal 10 of the user.
- the position identifying device 20 is installed at the entry position of the parking lot.
- the position identifying device 20 permits the user's personal portable terminal 10 to locate and authenticate, and raises the bar at the place of entry.
- Example 8 describes an example of automating the confirmation of tickets purchased in advance. The description of the same points as those of the first to seventh embodiments will be omitted, and only the different points will be described.
- the position identifying device 20 is installed at a movie theater, an amusement park, an event venue, an entrance gate for a ski lift, a boarding / alighting place for ships, etc.
- the user can make reservations for movie theaters, amusement parks, events, ski lifts, and boarding at sites such as movie theaters, amusement parks, events, ski companies, ship operating companies, and agency sites. Do it in advance and transfer the reservation information to the installed location-specific authentication application using a two-dimensional barcode, or transfer the reservation information from the business operator's reservation application to the location-specific authentication application that is automatically installed after reservation. .
- the user pays while passing by receiving the position identification / authentication by the position identification device 20 using the personal mobile terminal 10. The fee set by the business operator in advance may be paid after the fact.
- the location information authentication application for the personal mobile terminal 10 is automatically activated by a two-dimensional barcode or the location information authentication application for the personal mobile terminal 10. Transfer the paid information.
- the personal mobile terminal 10 Upon receiving the information, the personal mobile terminal 10 sends the information to the management server system 30.
- the management server system 30 collates the information with the business company.
- the business management system 40 performs collation confirmation and confirms it, and then generates the location and usage period of the position identifying device 20 permitted by the user, and transmits the information to the management server system 30.
- Example 9 describes an example of automatically unlocking the key of a room reserved in advance by the hotel. The description of the same points as those in Examples 1 to 8 will be omitted, and only different points will be described.
- the hotel which is a business operator, installs the position identifying device 20 at the entrance of each guest room of the hotel and cooperates with the lock system.
- the user makes a hotel reservation on the hotel site or agency site, and transfers the reservation information to the installed location-specific authentication application with a two-dimensional barcode, or automatically from the hotel reservation application after making the reservation. Transfer the reservation information to the installed location-specific authentication application.
- the user approaches the location specifying device 20 installed at the guest room entrance of the hotel, which is booked using the personal mobile terminal 10, passes through the position specifying / authentication, and the location of the position specifying device 20 and If there is time, the position identifying device 20 unlocks the door.
- Payment may be made at the time of reservation in advance, or after the end of use or the like. This payment may be used in this system or another payment system.
- the location information authentication terminal and the management terminal 50 send the unlocked information to the management server system 30.
- the management server system 30 notifies the business company of the information through the business management system 40.
- the business operator installs the position identifying device 20 at the entrance or exit of a condominium, office, conference room, or the like that requires entry / exit management or at the door of a car. Further, the business operator sets in advance which location and in which period the user should use the position identifying device 20. The user can enter / leave the room at the permitted place / period by receiving the position identification / authentication by the position identification device 20 using the personal mobile terminal 10.
- the position identifying device 20 and the management terminal 50 can notify the management system 40 for businesses of entry / exit information via the management server system 30.
- automatic unlocking of a condominium can be released at a higher speed, and labor is reduced.
- attendance management of employees can be performed. It can also be used as a conference room reservation.
- a security zone can be set. A security zone that can be changed over time can be set.
- it can greatly reduce the time and effort required for authentication in sharing cars.
- the authentication and the position identification may be separated. That is, it is possible to construct a system that only performs position identification and does not perform authentication, or conversely, a system that only performs authentication and does not perform position identification.
- Authentication system including payment Authentication system, PC, ATM
- the position identifying device 20 is installed in a device such as a PC or ATM that requires personal authentication.
- the place or the period in which the user can use the position identifying device 20 is set after the person or the business operator authenticates the person.
- the user can be authenticated by the position specifying device 20 using the personal mobile terminal 10 to be authenticated at the permitted place and period, and can log in by simply approaching the PC or using the ATM. You can complete the operation. It is possible to make purchases on a PC without inputting credit card information necessary for making purchases on the Internet, and to withdraw money at an ATM. In ATM, the comment to be sent may be changed according to the user.
- the face authentication can be carried out without trouble by combining with the personal mobile terminal 10, and the face authentication can be used without trouble for immigration examination, reception at a hospital or the like. In this way, a single terminal can be combined with a plurality of security such as face authentication technology and fingerprint authentication technology.
- FIG. 25 shows an example in which a smartphone terminal or the like is used as a BLE receiver and a plurality of BLE transmitters are arranged at three locations.
- a plurality of BLE transmitters are installed in a space where a position is desired to be specified, not limited to three, and a plurality of BLE transmitters are installed in one place.
- the BLE receiver can receive the radio waves of a plurality of BLE transmitters at one place.
- a time-stable radio wave intensity can be obtained. Therefore, if the installation positions of the BLE transmitters at a plurality of locations are known from the three-dimensional information, the positions of the BLE receivers themselves can be known on a plane or in space in the manner of measuring three points.
- FIG. 24 shows an example in which a smartphone terminal or the like is used as a BLE receiver and a plurality of BLE transmitters are arranged at two locations.
- a plurality of BLE transmitters are not limited to two places but are installed in a plurality of places, and as shown in FIG. 27, two BLE transmitters are selected and the BLE receiver existing area is selected.
- payment can be made at the cash register or the ticket gate without the user taking out the smartphone terminal or the like.
- each person moving with a smartphone terminal etc. can be captured and distinguished at high speed and with high accuracy, and individual authentication can be performed securely without contact and without hassle. can do.
- general and specific aspects of the present invention may be implemented using systems, methods and computer programs, or may be implemented using a combination of systems, methods and computer programs. [Example 13] (Personal identification and position measurement) (event admission)
- Example 13 describes an example of automating the event reception by authenticating the personal mobile terminal 10. It should be noted that description of the same points as those in Examples 1 to 12 will be omitted, and only different points will be described.
- the event participation application is installed on the user's smartphone, and the event reception application is installed on the tablet.
- the BLE receiver it is possible to perform position measurement with a degree of accuracy that is conventional. Participants who want to participate in the event, whether free or paid, must install the participant application and register for the event.
- the names and the like can be displayed on the tablet or the like in order from the participants who have approached when participating in the event on the day. For example, simply by asking the user to give his / her name, the receptionist can easily find the event participant name displayed in a small number and complete the reception. Further, when the reception process is performed by tapping the participant name, only the unaccepted participant can be continuously displayed.
- the reception can be completed faster than before, and the number of reception staff can be reduced.
- the position measuring device 20 can be installed in an exhibition, a large cultural event, a large commercial facility, or the like. As a result, the above-mentioned method automatically realizes the identification and position measurement of the participants, whether free of charge or for a fee, so that it is possible to respond unattended.
- the position specifying device the position specifying method, the position specifying program, the computer-readable recording medium, and the recorded device according to the embodiments and examples of the present invention, for example, a user at a cash register or a ticket gate, It can be suitably used for a system that allows payment without taking out a smartphone terminal or the like.
- Position specifying system 10 ... Personal mobile terminal 11 ... Personal terminal side transmitter 11A ... Personal terminal side communication unit 12 ... Personal terminal side control unit 13 ... Personal terminal side storage unit 14 ... Personal terminal side time unit 15 ... Personal Terminal side input / output unit 16 ... Personal terminal side calculation unit 20 ... Position specifying device 20B ... Automatic ticket gate 21 ... Position specifying side receiving unit 21A ... Position specifying side communication unit 210 ... Passage sensor units 2101 to 2105 ... Passage sensors 2111 to 2118 ... BLE beacon receivers 22, 22A, 22B ... First position specifying side receiving units 23, 23A, 23B ... Second position specifying side receiving units 24, 24A, 24B ... Partition plate 25 ... Position specifying side computing unit 26 ...
- Position specifying Side storage unit 27 ... Position specifying side time unit 28 ... Position specifying side control unit; 28A ... First display unit; 28B ... Second display unit; 28C ... Reader / writer; 28C1 ... Antenna; 2 C2 ... Communication unit 29 ... Door unit 30 ... Management server system 31 ... Server side communication unit 32 ... Server side computing unit 33 ... Server side storage unit 40 ... Business management system 41 ... Business communication unit 42 ... Business side Calculation unit 43 ... Business unit side input / output unit 44 ... Business unit side storage unit 50 ... Management terminal 51 ... Management terminal side communication unit 52 ... Management terminal side calculation unit 53 ... Management terminal side input / output unit 54 ... Management terminal side time unit 55 ... Management terminal side storage unit 60 ... Financial institution 70 ... Time distribution server 90 ... Activation signal transmitter USR ... User DA, DA1, DA2, DB, DB1, DB2 ... Passage determination area
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- General Physics & Mathematics (AREA)
- Remote Sensing (AREA)
- Quality & Reliability (AREA)
- Electromagnetism (AREA)
- Mobile Radio Communication Systems (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
- Telephone Function (AREA)
Abstract
Description
例えば、支払いの認証にかかわるセキュリティのために、ビーコン基地局と端末をそれぞれ承認する仕組みも開発されている(特許文献5)。しかしながら、位置の測定とは連動できていないため、支払い者を特定するために、レジマシーン等に顔を表示する等して商品を渡す等の相手を手動で特定している。その他にも、NFCや2次元バーコード等で支払い端末の認証を行う等の手法も提案されているが、いずれもタッチレスに位置測定と支払いとを連動するセキュリティ手法は報告されていない。
(BLEを用いた距離測定方法)
(BLEビーコン)
(BLEビーコンを用いた距離測定方法)
(BLEビーコンを用いた位置特定方法)
[実施形態1]
(位置特定システムの機能ブロック図)
(個人端末側発信部11の自動起動機能)
(起動信号発信機90)
[実施形態2]
[実施形態3]
(一方向通信における認証方法)
(ワンタイムパスワード)
[実施形態4]
[実施例1]
(事後支払いシステム)
(管理サーバシステム30)
(事業者用管理システム40)
(管理端末50)
(位置特定装置20)
(通過判定エリアDA、DB)
(通過判定エリアDA1、DA2、DB1、DB2)
(位置特定側制御部28)
(個人携帯端末10)
(金融機関60)
(事業者用管理端末50を用いた事後支払いシステムへの登録処理)
なお、管理サーバシステム30の認証を得ながら他の事業者用管理システム40へとアカウントを移動できるようにしてもよい。
(位置特定の手順)
(BLE受信機の電波強度から基準値を求める手順)
(暗号化・復号の手順)
(送受信の時間差の一致)
(送受信の時間差が所定範囲内)
(送信時刻と受信時刻)
(なりすましの検知方法)
[実施例2]
(事後支払いシステム全般)
[実施例3]
(事後支払いシステム全般)(無線充電)
[実施例4]
(事後支払いシステム全般)(ドライブスルー)
なお、実施形態4においても、位置測定装置20の代わりにBluetoothのみを設置して代用してもよい。この場合の構成は上述した実施形態2と同様のものが利用でき、詳細説明を省略する。
[実施例5]
(事後支払いシステム+認証)(車の認識とショッピングの連携)
[実施例6]
(事後支払いシステム全般)(バス・タクシーの支払い)
[実施例7]
(事後支払いシステム全般)(駐車場でのゲートロックをスマホで支払い)
[実施例8]
(事前支払いシステム全般)(イベントや映画館等の事前事後購入後のシステム、スキーリフト、船の乗車)
[実施例9]
(事前支払いシステム全般)(ホテル)
[実施例10]
(支払いを含むシステム)(認証システム、位置特定装置20をマンションやオフィス、会議室等の入退室管理を必要な入出場、もしくは車のドア)
[実施例11]
(支払いを含む認証システム)(認証システム、PC、ATM)
[実施例12]
(位置特定のみ)(自立走行ロボット(ドローン等)、屋内地図、座席指定、(三角測量))
[実施例13]
(本人認証および位置測定)(イベント入場)
10…個人携帯端末
11…個人端末側発信部
11A…個人端末側通信部
12…個人端末側制御部
13…個人端末側記憶部
14…個人端末側時刻部
15…個人端末側入出力部
16…個人端末側演算部
20…位置特定装置
20B…自動改札機
21…位置特定側受信部
21A…位置特定側通信部
210…通過センサ部
2101~2105…通過センサ
2111~2118…BLEビーコン受信機
22、22A、22B…第一位置特定側受信部
23、23A、23B…第二位置特定側受信部
24、24A、24B…区画板
25…位置特定側演算部
26…位置特定側記憶部
27…位置特定側時刻部
28…位置特定側制御部;28A…第1表示部;28B…第2表示部;28C…リーダライタ;28C1…アンテナ;28C2…通信部
29…扉部
30…管理サーバシステム
31…サーバ側通信部
32…サーバ側演算部
33…サーバ側記憶部
40…事業者用管理システム
41…事業者側通信部
42…事業者側演算部
43…事業者側入出力部
44…事業者側記憶部
50…管理端末
51…管理端末側通信部
52…管理端末側演算部
53…管理端末側入出力部
54…管理端末側時刻部
55…管理端末側記憶部
60…金融機関
70…時刻配信サーバ
90…起動信号発信機
USR…利用者
DA、DA1、DA2、DB、DB1、DB2…通過判定エリア
Claims (21)
- 位置を特定する対象となる個人が携帯する個人携帯端末と、
前記個人携帯端末の位置を特定する位置特定装置と、
を備える位置特定システムであって、
前記個人携帯端末は、
前記位置特定装置に対し、位置の特定に用いる位置特定信号を発信するための個人端末側発信部と、
前記個人端末側発信部を制御する個人端末側制御部と、
を備え、
前記位置特定装置は、
前記個人端末側発信部が発信した位置特定信号を受信するための、
前記個人携帯端末から第一距離だけ離間された第一位置に配置された複数の第一位置特定側受信部と、
前記第一位置と異なる位置であって、前記第一距離よりも長い第二距離だけ前記個人携帯端末から離間された第二位置に配置された複数の第二位置特定側受信部と、
前記複数の第一位置特定側受信部及び第二位置特定側受信部でそれぞれ受信した位置特定信号の強度差に基づいて、前記個人携帯端末の位置を特定するための位置特定側演算部と、
を備える位置特定システム。 - 請求項1に記載の位置特定システムであって、
前記位置特定側演算部は、前記複数の第一位置特定側受信部で受信した位置特定信号の電波強度と、前記複数の第二位置特定側受信部で受信した位置特定信号の電波強度との差と、予め設定された閾値との大小を比較する条件式を算出して、前記個人携帯端末の位置を特定するよう構成してなる位置特定システム。 - 請求項1又は2に記載の位置特定システムであって、
前記位置特定側演算部は、前記複数の第一位置特定側受信部で受信した位置特定信号の電波強度の平均値と、前記複数の第二位置特定側受信部で受信した位置特定信号の電波強度の平均値との差と、予め設定された閾値との大小を比較する条件式を算出して、前記個人携帯端末の位置を特定するよう構成してなる位置特定システム。 - 請求項1~3のいずれか一項に記載の位置特定システムであって、
前記個人端末側制御部は、前記個人携帯端末が前記位置特定装置に一定距離以内に接近したことを検出して、前記個人端末側発信部が前記位置特定装置に対し位置特定信号を発信するよう制御してなる位置特定システム。 - 請求項4に記載の位置特定システムであって、さらに、
前記位置特定装置から一定距離以上離れた位置に設置された、前記個人端末側発信部による前記位置特定装置への位置特定信号の発信動作を起動させる起動信号を、前記個人携帯端末に向けて発信するための起動信号発信機を備える位置特定システム。 - 請求項1~5のいずれか一項に記載の位置特定システムであって、
前記個人端末側発信部と前記位置特定側受信部とが、双方向通信可能であり、
前記位置特定側演算部が、前記位置特定側受信部で前記個人端末側発信部と通信を行うことにより、前記個人携帯端末の認証を行うよう構成してなる位置特定システム。 - 請求項6に記載の位置特定システムであって、
前記個人携帯端末が、さらに、
予め付与された固有の識別情報を保持するための個人端末側記憶部を備えており、
前記個人端末側制御部が、前記個人端末側発信部で前記位置特定側受信部と通信を行う際に、前記個人端末側記憶部に保持された固有の識別情報と、該識別情報毎に固有の一回のみ使用可能なワンタイムパスワードを発行可能であり、
前記位置特定側演算部が、前記位置特定側受信部で前記個人端末側発信部から受信した前記識別情報及びワンタイムパスワードを認証するよう構成してなる位置特定システム。 - 請求項7に記載の位置特定システムであって、
前記個人携帯端末が、さらに、
時刻に関する情報を生成するための個人端末側時刻部を備えており、
前記個人端末側記憶部が、
前記個人携帯端末と位置特定装置との間で予め交換された、該個人携帯端末に付与された識別情報に固有の共通鍵と、
前記ワンタイムパスワードの生成に利用する所定の関数を保持しており、
前記位置特定装置が、さらに、
前記個人携帯端末に付与された識別情報と、該識別情報毎に固有の共通鍵とを関連付けて保持するための位置特定側記憶部と、
時刻に関する情報を生成するための位置特定側時刻部を備えており、
前記個人携帯端末が、前記位置特定装置に前記識別情報及びワンタイムパスワードを送信するに際して、前記個人端末側制御部が、前記ワンタイムパスワードを発行する際の発行時刻に関する情報を前記個人端末側時刻部で取得し、前記個人端末側記憶部に保持された所定の関数に適用し、さらに前記個人端末側記憶部に保持された共通鍵でもって暗号化して、前記ワンタイムパスワードを発行するよう構成しており、
前記位置特定側演算部が、
前記位置特定側受信部で、前記個人端末側発信部から前記識別情報及びワンタイムパスワードを受信する際の受信時刻を、前記位置特定側時刻部より取得すると共に、
受信した前記識別情報から、該識別情報に対応する共通鍵を前記位置特定側記憶部より探索し、得られた共通鍵を用いて前記ワンタイムパスワードを復号化し、関数化された発行時刻に関する情報を取得し、
一の受信時刻において取得された発行時刻に関する情報と、前記一の受信時刻に関する情報との差分を、
別の受信時刻において取得された発行時刻に関する情報と、前記別の受信時刻に関する情報との差分と比較して、その差が
所定の時間内であれば、前記個人携帯端末を認証し、
所定の時間内でなければ、前記個人携帯端末を認証しないよう構成してなる位置特定システム。 - 請求項8に記載の位置特定システムであって、
前記位置特定側演算部が、前記一の受信時刻において取得された発行時刻に関する情報と、前記一の受信時刻に関する情報との差分を認証基準情報として前記位置特定側記憶部に保存し、
別の受信時刻において取得された発行時刻に関する情報と、前記別の受信時刻に関する情報との差分を、前記位置特定側記憶部に保存された認証基準情報と比較することで、前記個人携帯端末の認証を行うよう構成してなる位置特定システム。 - 請求項9に記載の位置特定システムであって、
前記位置特定側記憶部に保存された認証基準情報を、一定時間経過後に削除するよう構成してなる位置特定システム。 - 請求項6~10のいずれか一項に記載の位置特定システムであって、
前記位置特定側演算部が、前記個人携帯端末を認証した場合に、決済を行うよう構成してなる位置特定システム。 - 請求項1~11に記載の位置特定システムであって、
前記位置特定装置は、さらに、
前記位置特定側演算部で測定された前記個人携帯端末の位置に応じて、前記個人携帯端末を携帯する個人の移動を規制する動作を制御するための位置特定側制御部を備える位置特定システム。 - 請求項12に記載の位置特定システムであって、
前記位置特定装置が、個人携帯端末を携帯する個人の通過を規制する開閉式の扉部を有するゲートであり、
前記位置特定側制御部が、前記扉部の開閉を制御してなる位置特定システム。 - 請求項1~13に記載の位置特定システムであって、
前記個人端末側発信部及び位置特定側受信部との通信の方式が、BLE、RFID又はWi-Fiである位置特定システム。 - 請求項1~14に記載の位置特定システムであって、
前記個人携帯端末が、公共交通機関の乗車券として機能し、前記位置特定装置が、前記個人携帯端末を携帯する個人の乗車券の認証と決済を行うよう構成されてなる位置特定システム。 - 位置を特定する対象となる個人が携帯する個人携帯端末と、
前記個人携帯端末の位置を特定する位置特定装置と、
を備える位置特定システムであって、
前記個人携帯端末は、
前記位置特定装置に対し、双方向通信を行うための個人端末側発信部と、
前記個人端末側発信部を制御するための個人端末側制御部と、
予め付与された固有の識別情報と、
前記個人携帯端末と位置特定装置との間で予め交換された、該個人携帯端末に付与された識別情報に固有の共通鍵と、
前記ワンタイムパスワードの生成に利用する所定の関数と
を保持するための個人端末側記憶部と、
時刻に関する情報を生成するための個人端末側時刻部と、
を備え、
前記位置特定装置は、
前記個人端末側発信部と双方向通信を行うための位置特定側受信部と、
前記位置特定側受信部で前記個人端末側発信部と通信を行うことにより、前記個人携帯端末の認証を行うための前記位置特定側演算部と、
前記個人携帯端末に付与された識別情報と、該識別情報毎に固有の共通鍵とを関連付けて保持するための位置特定側記憶部と、
時刻に関する情報を生成するための位置特定側時刻部と、
を備え、
前記個人端末側制御部が、前記個人端末側発信部で前記位置特定側受信部と通信を行う際に、前記個人端末側記憶部に保持された固有の識別情報と、該識別情報毎に固有の一回のみ使用可能なワンタイムパスワードを発行可能であり、
前記位置特定側演算部が、前記位置特定側受信部で前記個人端末側発信部から受信した前記識別情報及びワンタイムパスワードを認証するよう構成しており、
前記個人携帯端末が、前記位置特定装置に前記識別情報及びワンタイムパスワードを送信するに際して、前記個人端末側制御部が、前記ワンタイムパスワードを発行する際の発行時刻に関する情報を前記個人端末側時刻部で取得し、前記個人端末側記憶部に保持された所定の関数に適用し、さらに前記個人端末側記憶部に保持された共通鍵でもって暗号化して、前記ワンタイムパスワードを発行するよう構成しており、
前記位置特定側演算部が、
前記位置特定側受信部で、前記個人端末側発信部から前記識別情報及びワンタイムパスワードを受信する際の受信時刻を、前記位置特定側時刻部より取得すると共に、
受信した前記識別情報から、該識別情報に対応する共通鍵を前記位置特定側記憶部より探索し、得られた共通鍵を用いて前記ワンタイムパスワードを復号化し、関数化された発行時刻に関する情報を取得し、
一の受信時刻において取得された発行時刻に関する情報と、前記一の受信時刻に関する情報との差分を、
別の受信時刻において取得された発行時刻に関する情報と、前記別の受信時刻に関する情報との差分と比較して、その差が
所定の時間内であれば、前記個人携帯端末を認証し、
所定の時間内でなければ、前記個人携帯端末を認証しないよう構成してなる位置特定システム。 - 位置を特定する対象となる個人が携帯する個人携帯端末の位置を特定する位置特定装置であって、
前記個人携帯端末が前記位置特定装置に対し、個人端末側発信部から発信した、位置の特定に用いる位置特定信号を受信するための、
前記個人携帯端末から第一距離だけ離間された第一位置に配置された複数の第一位置特定側受信部と、
前記第一位置と異なる位置であって、前記第一距離よりも長い第二距離だけ前記個人携帯端末から離間された第二位置に配置された複数の第二位置特定側受信部と、
前記複数の第一位置特定側受信部及び第二位置特定側受信部でそれぞれ受信した位置特定信号の強度差に基づいて、前記個人携帯端末の位置を特定するための位置特定側演算部と、
を備える位置特定装置。 - 位置を特定する対象となる個人が携帯する個人携帯端末と、
前記個人携帯端末の位置を特定する位置特定装置と、
を備える位置特定システムにおいて、前記個人携帯端末の位置を特定する位置特定方法であって、
個人携帯端末を携帯する個人が前記位置特定装置に一定距離以内に接近したことを、前記個人携帯端末が検出して、個人端末側制御部が個人端末側発信部の起動させる工程と、
前記個人携帯端末が、個人端末側発信部から、前記位置特定装置に対し、位置の特定に用いる位置特定信号を発信する工程と、
前記位置特定装置が、前記個人端末側発信部が発信した位置特定信号を、
前記個人携帯端末から第一距離だけ離間された第一位置に配置された複数の第一位置特定側受信部と、
前記第一位置と異なる位置であって、前記第一距離よりも長い第二距離だけ前記個人携帯端末から離間された第二位置に配置された複数の第二位置特定側受信部で、それぞれ受信する工程と、
前記複数の第一位置特定側受信部及び第二位置特定側受信部でそれぞれ受信した位置特定信号の強度差に基づいて、位置特定側演算部が前記個人携帯端末の位置を特定する工程と、
を含む位置特定方法。 - 請求項18に記載の位置特定方法であって、さらに、
前記個人端末側発信部が位置特定信号を発信する工程に先立ち、
前記個人端末側発信部が、前記位置特定側受信部に対し、個人端末側記憶部に保持された固有の識別情報と、該識別情報毎に固有の一回のみ使用可能なワンタイムパスワードを送信する工程と、
前記位置特定側演算部が、前記識別情報及びワンタイムパスワードに基づいて、前記個人携帯端末の認証を行う工程
を含んでおり、
前記個人携帯端末が、前記位置測定機に前記識別情報及びワンタイムパスワードを送信する工程は、
前記個人端末側制御部が、前記ワンタイムパスワードを発行する際の発行時刻に関する情報を個人端末側時刻部で取得し、前記個人端末側記憶部に保持された所定の関数に適用し、さらに前記個人端末側記憶部に保持された共通鍵でもって暗号化して、前記ワンタイムパスワードを発行するものであり、
前記位置特定側演算部が、前記識別情報及びワンタイムパスワードに基づいて、前記個人携帯端末の認証を行う工程は、
前記位置測定側演算部が、
前記位置測定側通信部で、前記個人端末側発信部から前記識別情報及びワンタイムパスワードを受信する際の受信時刻を、位置測定側時刻部より取得すると共に、
受信した前記識別情報から、該識別情報に対応する共通鍵を前記位置測定側記憶部より探索し、得られた共通鍵を用いて前記ワンタイムパスワードを復号化し、関数化された発行時刻に関する情報を取得し、
一の受信時刻において取得された発行時刻に関する情報と、前記一の受信時刻に関する情報との差分を、
別の受信時刻において取得された発行時刻に関する情報と、前記別の受信時刻に関する情報との差分と比較して、その差が
所定の時間内であれば、前記個人携帯端末を認証し、
所定の時間内でなければ、前記個人携帯端末を認証しない
ものである位置測定方法。 - 位置を特定する対象となる個人が携帯する個人携帯端末と、
前記個人携帯端末の位置を特定する位置特定装置と、
を備える位置特定システムにおいて、前記個人携帯端末の位置を特定する位置特定プログラムであって、
個人携帯端末を携帯する個人が前記位置特定装置に一定距離以内に接近したことを、前記個人携帯端末が検出して、個人端末側制御部が個人端末側発信部の起動させる工程と、
前記個人携帯端末が、個人端末側発信部から、前記位置特定装置に対し、位置の特定に用いる位置特定信号を発信する機能と、
前記位置特定装置が、前記個人端末側発信部が発信した位置特定信号を、
前記個人携帯端末から第一距離だけ離間された第一位置に配置された複数の第一位置特定側受信部と、
前記第一位置と異なる位置であって、前記第一距離よりも長い第二距離だけ前記個人携帯端末から離間された第二位置に配置された複数の第二位置特定側受信部で、それぞれ受信する機能と、
前記複数の第一位置特定側受信部及び第二位置特定側受信部でそれぞれ受信した位置特定信号の強度差に基づいて、位置特定側演算部が前記個人携帯端末の位置を特定する機能と、
をコンピュータに実現させるための位置特定プログラム。 - 請求項20に記載のプログラムを記録したコンピュータで読み取り可能な記録媒体又は記録した機器。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19872754.7A EP3869218A4 (en) | 2018-10-15 | 2019-10-11 | POSITION IDENTIFICATION SYSTEM, POSITION IDENTIFICATION DEVICE, POSITION IDENTIFICATION METHOD, POSITION IDENTIFICATION PROGRAM, COMPUTER READABLE RECORDING MEDIA AND RECORDED EQUIPMENT |
CN201980003680.3A CN112912752B (zh) | 2018-10-15 | 2019-10-11 | 位置特定系统、位置特定装置、位置特定方法、位置特定程序、及电脑可读取的记录介质、以及记录的设备 |
US17/285,382 US11968592B2 (en) | 2018-10-15 | 2019-10-11 | Position determination system, position determination apparatus, position determination method, position determination program, and computer-readable storage medium and storage device |
CA3116691A CA3116691A1 (en) | 2018-10-15 | 2019-10-11 | Position identifying system, position identifying device, position identifying method, position identifying program, computer readable recording medium, and recorded equipment |
PCT/JP2019/040332 WO2020080314A1 (ja) | 2018-10-15 | 2019-10-11 | 位置特定システム、位置特定装置、位置特定方法、位置特定プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器 |
SG11202103770SA SG11202103770SA (en) | 2018-10-15 | 2019-10-11 | Position determination system, position determination apparatus, position determination method, position determination program, and computer-readable storage medium and storage device |
JP2020504031A JP6751863B1 (ja) | 2018-10-15 | 2019-10-11 | 位置特定システム、位置特定装置、位置特定方法、位置特定プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器 |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2018194488 | 2018-10-15 | ||
JP2018-194488 | 2018-10-15 | ||
PCT/JP2019/040332 WO2020080314A1 (ja) | 2018-10-15 | 2019-10-11 | 位置特定システム、位置特定装置、位置特定方法、位置特定プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020080314A1 true WO2020080314A1 (ja) | 2020-04-23 |
Family
ID=80736164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2019/040332 WO2020080314A1 (ja) | 2018-10-15 | 2019-10-11 | 位置特定システム、位置特定装置、位置特定方法、位置特定プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器 |
Country Status (7)
Country | Link |
---|---|
US (1) | US11968592B2 (ja) |
EP (1) | EP3869218A4 (ja) |
JP (1) | JP6751863B1 (ja) |
CN (1) | CN112912752B (ja) |
CA (1) | CA3116691A1 (ja) |
SG (1) | SG11202103770SA (ja) |
WO (1) | WO2020080314A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022230852A1 (ja) | 2021-04-28 | 2022-11-03 | PaylessGate株式会社 | シミュレーション装置、受信装置、シミュレーション方法、配置方法、及びプログラム |
JP7374399B1 (ja) * | 2022-05-10 | 2023-11-06 | 三菱電機株式会社 | 入場許否判定システム、入場許否判定装置、プログラム及び入場許否判定方法 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7234707B2 (ja) * | 2019-03-12 | 2023-03-08 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置およびプログラム |
JP6686242B1 (ja) * | 2019-07-17 | 2020-04-22 | 楽天株式会社 | 情報提供システム及び情報提供方法 |
CA3168681A1 (en) * | 2020-01-27 | 2021-08-05 | Cubic Corporation | Tracking transportation for hands-free gate |
JP7422593B2 (ja) * | 2020-04-02 | 2024-01-26 | キヤノン株式会社 | 認証システム、被認証装置、認証装置、画像形成装置および交換部品 |
US20220136832A1 (en) * | 2020-10-30 | 2022-05-05 | Invensense, Inc. | Method and system for magnetic-based collaborative positioning |
US20220147933A1 (en) * | 2020-11-06 | 2022-05-12 | Moovila, Inc. | Systems and methods for characterizing work by working eqiupment based on proximity to a worker's computing device |
US11783649B2 (en) * | 2021-08-24 | 2023-10-10 | Wai Kin CHEUNG | Cloud door lock control system with identification of time varied 2D codes |
US11737023B2 (en) * | 2021-09-20 | 2023-08-22 | Dell Products L.P. | Information handling system and peripheral wireless pairing by device positioning and adaptive power control |
US11804091B2 (en) * | 2022-02-14 | 2023-10-31 | Wai Kin CHEUNG | Cloud door lock control system with identification of time varied 2D codes and images |
US20240098671A1 (en) * | 2022-09-20 | 2024-03-21 | Qualcomm Incorporated | Timing and synchronization techniques for secure networks |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040022214A1 (en) * | 2002-06-04 | 2004-02-05 | Goren David P. | Method for locating mobile units based on received signal strength ratio |
JP2005165976A (ja) * | 2003-12-05 | 2005-06-23 | Toshiba Solutions Corp | サービス提供システム、方法、プログラム及び商品販売システム |
JP2007538265A (ja) * | 2005-08-17 | 2007-12-27 | ラディアント テクノロジーズ,インク. | 距離比率を用いた移動通信端末機の位置決め方法及びシステム |
JP2008104029A (ja) | 2006-10-19 | 2008-05-01 | Sony Corp | 位置記憶装置、無線端末、位置記憶システム、位置登録方法、位置更新方法およびプログラム |
JP2010282322A (ja) * | 2009-06-03 | 2010-12-16 | Seiko Epson Corp | 認証システム及び認証方法 |
JP2012521557A (ja) | 2009-03-23 | 2012-09-13 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | フィンガープリント法を用いた位置検出システム及び位置検出方法 |
JP2012181595A (ja) * | 2011-02-28 | 2012-09-20 | Mitsubishi Electric Information Systems Corp | 認証システム、認証システムの認証方法、測位装置および測位プログラム |
JP2015200504A (ja) | 2014-04-04 | 2015-11-12 | 株式会社ジークス | ユーザー端末位置特定装置 |
JP2017501620A (ja) | 2013-09-06 | 2017-01-12 | ペイパル インコーポレイテッド | 追加デバイスをbluetooth(ブルートゥース)低エネルギー(ble)ビーコンにチェックインさせることを可能とするためのシステム及び方法 |
JP2017017491A (ja) | 2015-06-30 | 2017-01-19 | 株式会社野村総合研究所 | ロケーション判定方法 |
Family Cites Families (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5850270U (ja) | 1981-09-28 | 1983-04-05 | 株式会社ボッシュオートモーティブ システム | 開閉弁 |
JPS6290104U (ja) | 1985-11-27 | 1987-06-09 | ||
FI105596B (fi) * | 1996-05-27 | 2000-09-15 | Nokia Networks Oy | Menetelmä matkaviestimen sijainnin selvittämiseksi |
JPH1041936A (ja) | 1996-07-19 | 1998-02-13 | Nec Commun Syst Ltd | 端末機器の使用者認証装置 |
US5796827A (en) | 1996-11-14 | 1998-08-18 | International Business Machines Corporation | System and method for near-field human-body coupling for encrypted communication with identification cards |
JP3943339B2 (ja) | 2000-02-25 | 2007-07-11 | 株式会社エヌ・ティ・ティ・ドコモ | 移動通信システムにおける移動機の位置推定方法及びシステム |
US6981157B2 (en) | 2000-08-30 | 2005-12-27 | Lucent Technologies Inc. | Method and apparatus for ensuring security of users of short range wireless enable devices |
CA2704039C (en) * | 2001-03-30 | 2013-11-12 | M&Fc Holding, Llc | Enhanced wireless packet data communication system, method, and apparatus applicable to both wide area networks and local area networks |
JP2003078962A (ja) | 2001-09-04 | 2003-03-14 | Funai Electric Co Ltd | ネットワーク接続装置 |
US6664925B1 (en) | 2002-05-02 | 2003-12-16 | Microsoft Corporation | Method and system for determining the location of a mobile computer |
US7839289B2 (en) * | 2004-08-26 | 2010-11-23 | Avante International Technology, Inc. | Object monitoring, locating, and tracking system and method employing RFID devices |
JP2006074487A (ja) | 2004-09-02 | 2006-03-16 | Mizuho Information & Research Institute Inc | 認証管理方法及び認証管理システム |
US7822981B2 (en) | 2004-10-19 | 2010-10-26 | Panasonic Corporation | Communication apparatus and authenticating method |
JP4678184B2 (ja) | 2004-12-22 | 2011-04-27 | 日本電気株式会社 | 情報配信システム、及び情報配信方法とこれに用いられる装置 |
CN101253797B (zh) | 2005-08-30 | 2011-09-28 | 松下电器产业株式会社 | 无线设备监视系统 |
JP2007124466A (ja) | 2005-10-31 | 2007-05-17 | Matsushita Electric Ind Co Ltd | ダイバーシティシステム及びそのプログラム |
EP1811719A1 (en) | 2006-01-24 | 2007-07-25 | BRITISH TELECOMMUNICATIONS public limited company | Internetwork key sharing |
JP4907455B2 (ja) | 2007-03-12 | 2012-03-28 | パナソニック株式会社 | 携帯無線装置、無線認証システム、無線認証制御方法、及びそのプログラム |
JP2008224489A (ja) * | 2007-03-14 | 2008-09-25 | Yamatake Corp | 位置推定装置 |
BRPI1013062A2 (pt) | 2009-05-19 | 2016-04-05 | Security First Corp | sistemas e métodos para proteger dados na nuvem |
US8200244B2 (en) * | 2010-05-24 | 2012-06-12 | Nice Systems Ltd. | Method and system for mobile station location |
US9057210B2 (en) * | 2011-03-17 | 2015-06-16 | Unikey Technologies, Inc. | Wireless access control system and related methods |
US8618932B2 (en) * | 2011-03-18 | 2013-12-31 | Microsoft Corporation | Device location detection |
WO2012153530A1 (ja) | 2011-05-10 | 2012-11-15 | 三洋電機株式会社 | 端末装置 |
WO2013076823A1 (ja) | 2011-11-22 | 2013-05-30 | 学校法人日本大学 | 携帯端末の認証システム及びその方法 |
JP5811809B2 (ja) | 2011-11-28 | 2015-11-11 | 沖電気工業株式会社 | マルチホップ通信システム、通信装置及び通信プログラム |
US20140133656A1 (en) | 2012-02-22 | 2014-05-15 | Qualcomm Incorporated | Preserving Security by Synchronizing a Nonce or Counter Between Systems |
US9544075B2 (en) | 2012-02-22 | 2017-01-10 | Qualcomm Incorporated | Platform for wireless identity transmitter and system using short range wireless broadcast |
KR101384103B1 (ko) * | 2012-04-20 | 2014-04-10 | 주식회사에어플러그 | 단말기와 무선망 접속점간의 상호간 통신특성에 대한 정보가 무선망 접속에 이용되게 하는 방법과 장치 |
JP5829574B2 (ja) | 2012-05-14 | 2015-12-09 | 株式会社エヌ・ティ・ティ・データ | 認証システム、認証装置、認証方法、及びプログラム |
JP2014020887A (ja) * | 2012-07-18 | 2014-02-03 | Hitachi Ltd | 無線端末の測位システム、及び方法 |
WO2014090793A1 (en) | 2012-12-11 | 2014-06-19 | Koninklijke Kpn N.V. | Communication between a mobile device and telecommunications network |
US8948782B2 (en) * | 2012-12-21 | 2015-02-03 | Qualcomm Incorporated | Proximity determination based on distance ratios |
JP6185748B2 (ja) * | 2013-04-26 | 2017-08-23 | 株式会社Nttドコモ | 位置情報演算装置、中継装置及び通信システム |
JP5866534B2 (ja) * | 2013-07-11 | 2016-02-17 | パナソニックIpマネジメント株式会社 | 画像計測装置及び画像計測方法 |
US9763086B2 (en) | 2013-08-27 | 2017-09-12 | Qualcomm Incorporated | Owner access point to control the unlocking of an entry |
JP6366060B2 (ja) * | 2014-08-01 | 2018-08-01 | 哲也 芦塚 | 探索装置および通信システム |
US10115253B2 (en) * | 2014-08-15 | 2018-10-30 | Collateral Opportunities, Llc | Electronic location identiication and tracking system with beacon clustering |
CN104243484B (zh) | 2014-09-25 | 2016-04-13 | 小米科技有限责任公司 | 信息交互方法及装置、电子设备 |
JP6565155B2 (ja) | 2014-09-30 | 2019-08-28 | ダイキン工業株式会社 | 測位装置のキャリブレーション方法及びキャリブレーションシステム |
US9763063B2 (en) * | 2014-10-06 | 2017-09-12 | Derek D. Kumar | Secure broadcast beacon communications |
WO2016103498A1 (ja) | 2014-12-26 | 2016-06-30 | 株式会社野村総合研究所 | ロケーション判定システムおよびロケーション判定プログラム |
JP2016124477A (ja) * | 2015-01-07 | 2016-07-11 | 株式会社デンソー | 通信システム、位置判定方法 |
US10250341B2 (en) * | 2015-02-19 | 2019-04-02 | Nec Corporation | Monitoring apparatus, wireless communication system, failure factor deciding method, and non-transitory computer readable medium having program stored thereon |
JP2016200561A (ja) | 2015-04-14 | 2016-12-01 | 株式会社リコー | 測定装置、測定システムおよびプログラム |
CN106296186B (zh) | 2015-05-25 | 2020-07-03 | 阿里巴巴集团控股有限公司 | 信息交互方法、装置及系统 |
JP6541065B2 (ja) | 2015-05-28 | 2019-07-10 | パナソニックIpマネジメント株式会社 | 位置検出システム及び位置検出方法 |
US9924319B2 (en) * | 2015-07-14 | 2018-03-20 | Assa Abloy Ab | Tracking for badge carrier |
JP6597110B2 (ja) * | 2015-09-18 | 2019-10-30 | 富士通株式会社 | 無線通信プログラム、無線通信方法、無線基地局および無線通信システム |
JP6615587B2 (ja) | 2015-11-11 | 2019-12-04 | 株式会社富士通アドバンストエンジニアリング | 位置決定プログラム、位置決定方法、および位置決定装置 |
US9949301B2 (en) | 2016-01-20 | 2018-04-17 | Palo Alto Research Center Incorporated | Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks |
JP6590280B2 (ja) | 2016-01-29 | 2019-10-16 | 国立研究開発法人情報通信研究機構 | 見守りシステム |
JP5991793B1 (ja) | 2016-02-29 | 2016-09-14 | 株式会社unerry | プログラム、情報処理装置およびシステム |
JP2017158009A (ja) | 2016-03-01 | 2017-09-07 | 富士通株式会社 | 情報処理装置、情報処理方法および情報処理プログラム |
JP6774001B2 (ja) | 2016-03-15 | 2020-10-21 | 富士ゼロックス株式会社 | 制御装置、位置確認システム及びプログラム |
US10074225B2 (en) * | 2016-04-18 | 2018-09-11 | Accenture Global Solutions Limited | Validation in secure short-distance-based communication and enforcement system according to visual object flow |
JP2017198567A (ja) | 2016-04-28 | 2017-11-02 | 株式会社リコー | 情報処理装置、情報処理方法およびプログラム |
JP2017203756A (ja) | 2016-05-13 | 2017-11-16 | 清水建設株式会社 | 測位システム、測位方法、受信装置およびプログラム |
JP6597976B2 (ja) | 2016-06-24 | 2019-10-30 | サイレックス・テクノロジー株式会社 | 周辺デバイス中継装置、および画像表示システム |
JP6394650B2 (ja) | 2016-07-08 | 2018-09-26 | マツダ株式会社 | 認証システム、故障診断ツール、車載通信システム及び認証方法 |
JP6373905B2 (ja) * | 2016-07-21 | 2018-08-15 | 加藤電機株式会社 | 個体の位置追跡システム |
JP6811428B2 (ja) * | 2016-11-30 | 2021-01-13 | パナソニックIpマネジメント株式会社 | 電気錠システム及び電気錠装置 |
US10051435B2 (en) * | 2016-12-12 | 2018-08-14 | Denso International America, Inc. | Mobile device location system |
US10313339B1 (en) | 2016-12-12 | 2019-06-04 | Amazon Technologies, Inc. | Secure activation of authentication devices based on communications received via designated communication channels |
KR102689221B1 (ko) | 2017-02-13 | 2024-07-30 | 삼성전자 주식회사 | 차량용 스마트 키 인증 방법 및 장치 |
US10382892B2 (en) * | 2017-04-28 | 2019-08-13 | Hewlett Packard Enterprise Development Lp | Bluetooth device locator |
CN107995683B (zh) * | 2017-12-13 | 2021-01-26 | 北京小米移动软件有限公司 | 定位系统、室内定位方法、服务器及存储介质 |
JP6501330B1 (ja) | 2018-10-30 | 2019-04-17 | 株式会社ジゴワッツ | 車両制御システム |
-
2019
- 2019-10-11 WO PCT/JP2019/040332 patent/WO2020080314A1/ja unknown
- 2019-10-11 SG SG11202103770SA patent/SG11202103770SA/en unknown
- 2019-10-11 JP JP2020504031A patent/JP6751863B1/ja active Active
- 2019-10-11 US US17/285,382 patent/US11968592B2/en active Active
- 2019-10-11 CA CA3116691A patent/CA3116691A1/en active Pending
- 2019-10-11 EP EP19872754.7A patent/EP3869218A4/en active Pending
- 2019-10-11 CN CN201980003680.3A patent/CN112912752B/zh active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040022214A1 (en) * | 2002-06-04 | 2004-02-05 | Goren David P. | Method for locating mobile units based on received signal strength ratio |
JP2005165976A (ja) * | 2003-12-05 | 2005-06-23 | Toshiba Solutions Corp | サービス提供システム、方法、プログラム及び商品販売システム |
JP2007538265A (ja) * | 2005-08-17 | 2007-12-27 | ラディアント テクノロジーズ,インク. | 距離比率を用いた移動通信端末機の位置決め方法及びシステム |
JP2008104029A (ja) | 2006-10-19 | 2008-05-01 | Sony Corp | 位置記憶装置、無線端末、位置記憶システム、位置登録方法、位置更新方法およびプログラム |
JP2012521557A (ja) | 2009-03-23 | 2012-09-13 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | フィンガープリント法を用いた位置検出システム及び位置検出方法 |
JP2010282322A (ja) * | 2009-06-03 | 2010-12-16 | Seiko Epson Corp | 認証システム及び認証方法 |
JP2012181595A (ja) * | 2011-02-28 | 2012-09-20 | Mitsubishi Electric Information Systems Corp | 認証システム、認証システムの認証方法、測位装置および測位プログラム |
JP2017501620A (ja) | 2013-09-06 | 2017-01-12 | ペイパル インコーポレイテッド | 追加デバイスをbluetooth(ブルートゥース)低エネルギー(ble)ビーコンにチェックインさせることを可能とするためのシステム及び方法 |
JP2015200504A (ja) | 2014-04-04 | 2015-11-12 | 株式会社ジークス | ユーザー端末位置特定装置 |
JP2017017491A (ja) | 2015-06-30 | 2017-01-19 | 株式会社野村総合研究所 | ロケーション判定方法 |
Non-Patent Citations (2)
Title |
---|
HE, SUININGTIANYANG HUS-H. GARY CHAN: "Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems", 2015, ACM, article "Contour-based trilateration for indoor fingerprinting localization" |
See also references of EP3869218A4 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022230852A1 (ja) | 2021-04-28 | 2022-11-03 | PaylessGate株式会社 | シミュレーション装置、受信装置、シミュレーション方法、配置方法、及びプログラム |
JP7374399B1 (ja) * | 2022-05-10 | 2023-11-06 | 三菱電機株式会社 | 入場許否判定システム、入場許否判定装置、プログラム及び入場許否判定方法 |
WO2023218531A1 (ja) * | 2022-05-10 | 2023-11-16 | 三菱電機株式会社 | 入場許否判定システム、入場許否判定装置、プログラム及び入場許否判定方法 |
Also Published As
Publication number | Publication date |
---|---|
US11968592B2 (en) | 2024-04-23 |
EP3869218A1 (en) | 2021-08-25 |
CN112912752A (zh) | 2021-06-04 |
SG11202103770SA (en) | 2021-05-28 |
JP6751863B1 (ja) | 2020-09-09 |
CA3116691A1 (en) | 2020-04-23 |
US20210321223A1 (en) | 2021-10-14 |
CN112912752B (zh) | 2024-06-25 |
EP3869218A4 (en) | 2022-08-03 |
JPWO2020080314A1 (ja) | 2021-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6751863B1 (ja) | 位置特定システム、位置特定装置、位置特定方法、位置特定プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器 | |
US10074222B2 (en) | Secure short-distance-based communication and validation system for zone-based validation | |
CA2901683C (en) | Secure short-distance-based communication and access control system | |
US10009745B2 (en) | Validation in secure short-distance-based communication and enforcement system according to visual objects | |
US9922294B2 (en) | Secure short-distance-based communication and enforcement system | |
US10074225B2 (en) | Validation in secure short-distance-based communication and enforcement system according to visual object flow | |
US20160055697A1 (en) | Restricted area access control system | |
US11704955B2 (en) | Radio frequency antenna and system for presence sensing and monitoring | |
US20160055689A1 (en) | Secure short-distance-based communication and access control system | |
TWI748262B (zh) | 位置特定系統、位置特定裝置、位置特定方法、位置特定程式及電腦可讀取之記錄媒體 | |
US11709923B2 (en) | Systems and methods for location-based automated authentication | |
TWI745891B (zh) | 認證系統、認證終端、使用者終端、認證方法、及程式產品 | |
US20210248853A1 (en) | Tracking transportation for hands-free gate | |
US9306749B2 (en) | Method of biometric authentication, corresponding authentication system and program | |
US20240126850A1 (en) | Authentication system, authentication method and program | |
US20240211562A1 (en) | Authentication system, authentication method and program | |
US20240223555A1 (en) | Authentication system, authentication method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2020504031 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19872754 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 3116691 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019872754 Country of ref document: EP Effective date: 20210517 |