WO2024090461A1 - Key system, electronic lock device, electronic key device, and information communication system - Google Patents

Key system, electronic lock device, electronic key device, and information communication system Download PDF

Info

Publication number
WO2024090461A1
WO2024090461A1 PCT/JP2023/038451 JP2023038451W WO2024090461A1 WO 2024090461 A1 WO2024090461 A1 WO 2024090461A1 JP 2023038451 W JP2023038451 W JP 2023038451W WO 2024090461 A1 WO2024090461 A1 WO 2024090461A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
information processing
processing device
electronic
hash value
Prior art date
Application number
PCT/JP2023/038451
Other languages
French (fr)
Japanese (ja)
Inventor
長谷部 淳
勝二 久保江
Original Assignee
株式会社ZK Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社ZK Corporation filed Critical 株式会社ZK Corporation
Publication of WO2024090461A1 publication Critical patent/WO2024090461A1/en

Links

Images

Definitions

  • One embodiment of the present invention relates to a key system that uses an electronic key device to operate an electronic lock device. Another embodiment of the present invention relates to an electronic lock device or an electronic key device included in the key system. Another embodiment of the present invention relates to an information and communication system used to send and receive data between multiple electronic devices.
  • one embodiment of the present invention has as its object to provide a key system with high security. Also, one embodiment of the present invention has as its object to provide an information and communication system with high security.
  • a key system includes a first information processing device included in an electronic lock device, and a second information processing device included in an electronic key device that operates the electronic lock device and communicatively connected to the first information processing device.
  • the first information processing device acquires combined data in which at least first data and second data different from the first data are combined
  • the first information processing device transmits the combined data to the second information processing device
  • the first information processing device calculates a first hash value that satisfies a predetermined condition based on the first nonce value and the combined data
  • the second information processing device calculates a second hash value that satisfies a predetermined condition based on the second nonce value and the received combined data
  • the first information processing device determines whether the first hash value and the second hash value match.
  • a specified operation may be executed on the electronic lock device.
  • the first data is one-time data, and the one-time data may be date data, time data, or date and time data.
  • the first data is one-time data, and the one-time data may be location data of the electronic lock device.
  • the second data is unique data, which may be an identifier for the electronic lock device.
  • the second data is unique data, and the unique data may be one selected from the identifiers of multiple electronic key devices registered in the first information processing device.
  • the second data may be user data unique to the user.
  • the user data may be biometric information of the user.
  • the user data may be identification information of an item possessed by the user.
  • the electronic lock device may be installed in a vehicle, and the second data may be vehicle data specific to the vehicle.
  • the vehicle data may be individual identification information of the vehicle.
  • the vehicle data may be vehicle model information of the vehicle.
  • the electronic lock device does not need to be operated.
  • the first calculation unit that calculates the first hash value and the second calculation unit that calculates the second hash value may each be configured with an ASIC.
  • An electronic lock device includes an acquisition unit that acquires combined data in which at least first data and second data different from the first data are combined after a communication connection with an electronic key device is initiated, a communication unit that transmits the combined data to the electronic key device, a calculation unit that calculates a first hash value that satisfies a predetermined condition based on a nonce value and the combined data, and a determination unit that determines whether the first hash value matches the second hash value transmitted from the electronic key device.
  • An electronic key device includes a communication unit that receives combined data that combines at least first data acquired by the electronic lock device and second data different from the first data after a communication connection with the electronic lock device is initiated, and a calculation unit that calculates a hash value that satisfies a predetermined condition based on a nonce value and the received combined data.
  • An information communication system includes a first information processing device included in a first electronic device that transmits first data, and a second information processing device included in a second electronic device that receives the first data, the first information processing device acquires combined data in which at least the first data and second data different from the first data are combined, the first information processing device calculates a first hash value that satisfies a predetermined condition based on the first nonce value and the combined data, the second information processing device calculates a second hash value that satisfies a predetermined condition based on the second nonce value and the combined data transmitted from the first electronic device to the second electronic device, and the second information processing device determines whether the first hash value and the second hash value match.
  • At least one of the first electronic device and the second electronic device may be a router. At least one of the first electronic device and the second electronic device may be an information communication terminal.
  • the key system according to one embodiment of the present invention calculates a hash value that is difficult to decrypt not only in the electronic lock device but also in the electronic key device, making it possible to operate the electronic lock device. Therefore, it is extremely difficult to operate the electronic lock device even if only the electronic lock device is hacked, and the key system has a high level of security. Furthermore, the information and communication system according to one embodiment of the present invention uses a hash value that is difficult to calculate when sending and receiving encrypted data. Therefore, the information and communication system has a high level of security.
  • FIG. 1 is a schematic diagram illustrating an overview of a key system according to one embodiment of the present invention.
  • FIG. 1 is a block diagram showing the configuration of a key system according to an embodiment of the present invention; 1 is a schematic diagram illustrating calculation of a hash value in a key system according to an embodiment of the present invention.
  • FIG. FIG. 2 is a sequence diagram illustrating processing executed by a first information processing device and a second information processing device in a key system according to an embodiment of the present invention.
  • 4 is a flowchart illustrating processing executed by a first information processing device and a second information processing device in a key system according to an embodiment of the present invention.
  • 1 is a schematic diagram illustrating an overview of a key system according to one embodiment of the present invention.
  • FIG. 1 is a schematic diagram illustrating an overview of an information communication system according to an embodiment of the present invention. 1 is a block diagram showing a configuration of an nth information processing device mounted in an nth electronic device of an information communication system according to an embodiment of the present invention. 1 is a sequence diagram illustrating processing executed in an s-th information processing device and a t-th information processing device in an information communication system according to an embodiment of the present invention.
  • FIG. 11 is a flowchart illustrating processing executed in an s-th information processing device and a t-th information processing device in an information communication system according to an embodiment of the present invention.
  • 1 is a schematic diagram illustrating an overview of an information communication system according to an embodiment of the present invention.
  • FIG. 1 is a schematic diagram illustrating an overview of a key system 1 according to one embodiment of the present invention.
  • FIG. 2 is a block diagram illustrating the configuration of a key system 1 according to one embodiment of the present invention.
  • the key system 1 includes a first information processing device 100 and a second information processing device 200.
  • the first information processing device 100 and the second information processing device 200 are mounted on an electronic lock device 10 and an electronic key device 20, respectively, for use.
  • the electronic lock device 10 is installed on the door of an automobile 1000 and controls the door so that it can be opened and closed.
  • the electronic key device 20 is a smart key for the automobile 1000.
  • the electronic lock device 10 can be connected to the electronic key device 20 by wireless communication.
  • a user uses the electronic key device 20 to operate the unlocking and locking of the electronic lock device 10.
  • the electronic lock device 10 is unlocked, the user can open the door of the automobile 1000.
  • the electronic lock device 10 is locked, the user can close the door of the automobile 1000.
  • the operation of unlocking and locking the electronic lock device 10 may be initiated by the user directly operating the electronic key device 20, or may be initiated by the electronic key device 20 approaching or touching the electronic lock device 10 at a predetermined distance.
  • the electronic lock device 10 may also have an insertion port, and the operation of unlocking and locking the electronic lock device 10 may be initiated by inserting the electronic key device 20 into the insertion port.
  • the key system 1 can operate the unlocking and locking of the doors of an automobile 1000, but the usage of the key system 1 is not limited to this.
  • the key system 1 can also operate the unlocking and locking of doors of a house or apartment building, etc.
  • the use of the key system 1 is not limited to unlocking and locking doors.
  • the key system 1 can also start the engine of the automobile 1000.
  • the first information processing device 100 is installed so as to be connected to a start switch that starts the engine of the automobile 1000.
  • the start switch is pressed by a user, the first information processing device 100 communicates with the electronic key device 20 and starts the engine of the automobile 1000 according to the processing of the key system 1.
  • the key system 1 can be used not only to unlock and lock the doors of the automobile 1000, but also to start the engine of the automobile 1000.
  • a key system 1 including a first information processing device 100 and a second information processing device 200 will be described, but the key system 1 may also include an electronic lock device 10 and an electronic key device 20.
  • the first information processing device 100 is communicatively connected to the second information processing device 200 via a network NW.
  • the network NW is wireless and may be, for example, the Internet, Bluetooth (registered trademark), or Wi-Fi (registered trademark), but the configuration of the network NW is not limited to these.
  • the network NW may also be wired.
  • the first information processing device 100 and the second information processing device 200 are connected by a cable or the like.
  • the first information processing device 100 includes an authentication unit 110, an acquisition unit 120, a first calculation unit 130, a determination unit 140, a first communication unit 150, and a first memory unit 160.
  • the second information processing device 200 includes an operation unit 210, a second calculation unit 230, a second communication unit 250, and a second memory unit 260.
  • Each of the first memory unit 160 and the second memory unit 260 is a storage capable of storing data or information.
  • the first memory unit 160 stores a first identifier 161 and a seed value 162.
  • the second memory unit 260 stores a second identifier 261.
  • a hard disk drive (HDD), a solid state drive (SSD), a read only memory (ROM), a random access memory (RAM), or a flash memory can be used.
  • the first identifier 161 is unique data for identifying the first information processing device 100.
  • the second identifier 261 is unique data for identifying the second information processing device 200.
  • the first information processing device 100 can be identified based on the first identifier 161
  • the second information processing device 200 can be identified based on the second identifier 261.
  • the seed value 162 is data used in the calculations performed by the first calculation unit 130 and the second calculation unit 230.
  • the seed value 162 is data registered in advance and may be registered by the user.
  • the data registered as the seed value 162 may be not only one but also multiple.
  • the first identifier 161 and the second identifier 261, which are unique data of the key system 1 can be registered as the seed value 162.
  • vehicle data unique to the vehicle can also be registered as the seed value 162.
  • the vehicle data is individual identification information of the vehicle (e.g., the vehicle registration number or the vehicle number, etc.) and classification information of the vehicle (e.g., the vehicle model, the vehicle name, the vehicle type, or the vehicle rank, etc.), but is not limited to these.
  • user data unique to the user who uses the electronic key device 20 can also be registered as the seed value 162.
  • User data includes, but is not limited to, the user's biometric information (e.g., iris pattern, vein pattern, fingerprint pattern, or face pattern) and identification information of an item possessed by the user (e.g., IC card identification number or information terminal identification number).
  • the authentication unit 110 determines whether the second identifier 261 is a registered identifier.
  • identifiers are registered in advance, and the electronic lock device 10 can be operated by authenticating the electronic key device 20 including the registered identifier by the authentication unit 110.
  • the registered identifier may be stored in the first storage unit 160. If the electronic lock device 10 is operated by multiple electronic key devices 20, multiple identifiers may be registered. Note that if the electronic lock device 10 is operated by multiple electronic key devices 20, multiple second identifiers 261 can also be registered as the seed value 162.
  • the acquisition unit 120 acquires data necessary for the calculations in the first calculation unit 130 and the second calculation unit 230. Specifically, the acquisition unit 120 acquires at least two different pieces of data from the seed value 162 and time data (or date data or date and time data), and combines the acquired data. That is, the acquisition unit 120 acquires combined data in which at least first data and second data different from the first data are combined. Specifically, the acquisition unit 120 acquires combined data in which time data and the first identifier 161 are combined. The acquisition unit 120 also selects one from a plurality of registered second identifiers 261 (which may be an approved second identifier 261), and acquires combined data in which time data and the selected second identifier 261 are combined.
  • a plurality of registered second identifiers 261 which may be an approved second identifier 261
  • the acquisition unit 120 can also acquire data other than the seed value 162.
  • the acquisition unit 120 can acquire the position data of the automobile 1000 (corresponding to the position data of the electronic lock device 10) or mileage data.
  • the position data of the automobile 1000 can be acquired by a Global Positioning System (GPS), a Global Navigation Satellite System (GNSS), a positioning device installed in the automobile 1000, or a network.
  • GPS Global Positioning System
  • GNSS Global Navigation Satellite System
  • the mileage data of the automobile 1000 can be acquired by an odometer or trip meter, etc.
  • the first identifier 161, the second identifier 261, the vehicle data, and the user data described above are unique data that do not change depending on the time or location acquired by the acquisition unit 120.
  • the time data, the date data, the date and time data, the location data, and the driving data described above are one-time data that change depending on the time or location acquired by the acquisition unit 120.
  • the combined data acquired by the acquisition unit 120 includes one-time data.
  • the acquisition unit 120 can also acquire location data as one-time data instead of time data or in addition to time data.
  • the combined data also becomes one-time data.
  • the combined data used as input values for the calculations of the first calculation unit 130 and the second calculation unit 230 changes every time the electronic lock device 10 is operated by the electronic key device 20, which prevents hacking and improves security.
  • FIG. 3 is a schematic diagram illustrating the calculation of a hash value in the key system 1 according to one embodiment of the present invention.
  • a nonce value and combined data e.g., combined data of the seed value 162 and time data
  • each of the first calculation unit 130 and the second calculation unit 230 calculates a hash value using a hash function (e.g., an algorithm such as SHA256).
  • SHA256 an algorithm such as SHA256
  • the calculated hash value is set to satisfy a common predetermined condition. Therefore, each of the first calculation unit 130 and the second calculation unit 230 repeatedly calculates the nonce value while varying it until a hash value that satisfies the predetermined condition is obtained.
  • the calculations of the first calculation unit 130 and the second calculation unit 230 use the same hash function and combined data. If the nonce value is different, a different hash value is obtained, but a specific condition is set for the calculated hash value, and by repeatedly performing calculations while varying the nonce value, the first hash value calculated by the calculation of the first calculation unit 130 and the second hash value calculated by the calculation of the second calculation unit 230 will be the same.
  • the determination unit 140 determines whether the first hash value and the second hash value match. Normally, the first hash value and the second hash value match. However, if data different from the combined data acquired by the acquisition unit 120 is acquired through hacking, and a calculation is performed using the hacked data, a hash value different from the first hash value is obtained. Therefore, by determining whether the first hash value and the second hash value match, it is possible to prevent hacking and improve security.
  • the operation unit 210 generates an operation request based on the user's operation of the electronic key device 20. Specifically, when the user presses the unlock switch of the electronic key device 20, the operation unit 210 generates an operation request to unlock the doors of the automobile 1000. Also, when the user presses the lock switch of the electronic key device 20, the operation unit 210 generates an operation request to lock the doors of the automobile 1000.
  • Each of the first calculation unit 130 and the second calculation unit 230 is configured with an ASIC (Application Specific Integrated Circuit).
  • the first calculation unit 130 and the second calculation unit 230 are circuit configurations specialized for hash calculations that calculate hash values while varying nonce values. Therefore, the calculation speed of the first calculation unit 130 and the second calculation unit 230 is fast, for example, the calculation speed is about several seconds to 30 seconds.
  • hash calculations using software often require several hours. Therefore, hacking the electronic lock device 10 requires time, and in reality, hacking the electronic lock device 10 is impossible.
  • the authentication unit 110, acquisition unit 120, judgment unit 140, and operation unit 210 can function by a central processing unit (CPU) or a microprocessor (MPU) executing a program.
  • CPU central processing unit
  • MPU microprocessor
  • the authentication unit 110, acquisition unit 120, and judgment unit 140 may be incorporated in an ASIC in the first information processing device 100
  • the operation unit 210 may be incorporated in an ASIC in the second information processing device 200.
  • Each of the first communication unit 150 and the second communication unit 250 is a communication interface capable of wirelessly transmitting or receiving data or information. Specifically, the first communication unit 150 transmits combined data required for the calculation in the second calculation unit 230. In addition, the second communication unit 250 transmits an operation request based on an operation instruction from a user, a second identifier 261 required for processing in the authentication unit 110, and a second hash value calculated by the second calculation unit 230. For example, a wireless LAN module, a Bluetooth module, or a Wi-Fi module can be used as each of the first communication unit 150 and the second communication unit 250.
  • FIG. 4 is a sequence diagram explaining the processing executed by the first information processing device 100 and the second information processing device 200 of the key system 1 according to one embodiment of the present invention.
  • FIG. 5 is a flowchart explaining the processing executed by the first information processing device 100 and the second information processing device 200 of the key system 1 according to one embodiment of the present invention.
  • the process shown in Figures 4 and 5 is started when the user uses the electronic key device 20 to instruct the electronic lock device 10 to operate. For example, the user presses an unlock button or a lock button provided on the electronic key device 20 to instruct the electronic lock device 10 to be unlocked or locked. That is, the process shown in Figures 4 and 5 is started in response to an instruction from the user using the electronic key device 20, and steps S110 to S200 are executed. Note that the process shown in Figures 4 and 5 may also be started when the electronic key device 20 approaches the electronic lock device 10 within a predetermined distance. Below, the process of each step will be explained in the order of steps S110 to S200 shown in Figure 5.
  • step S110 the operation unit 210 generates an operation request based on the user's operation instruction. For example, when the user presses the release button on the electronic key device 20, the operation unit 210 generates an operation request to unlock the electronic lock device 10. Also, when the user presses the lock button on the electronic key device 20, the operation unit 210 generates an operation request to lock the electronic lock device 10.
  • step S120 the second identifier 261 and the operation request generated in step S110 are sent from the second information processing device 200 to the first information processing device 100.
  • step S130 the authentication unit 110 determines whether the transmitted second identifier 261 is a registered identifier. If the second identifier 261 is a registered identifier (step S130: YES), the second identifier 261 is authenticated, and step S140 is executed. If the second identifier 261 is not a registered identifier (step S130: NO), the second identifier 261 is not authenticated, and the processing in the key system 1 ends.
  • the electronic lock device 10 may be operated by multiple electronic key devices 20. In such cases, it is necessary to distinguish between electronic key devices 20 that can operate the electronic lock device 10 and electronic key devices 20 that cannot operate the electronic lock device 10. Therefore, in step S130, the identifiers assigned to each of the multiple electronic key devices 20 are authenticated, so that only authenticated electronic key devices 20 can operate the electronic lock device 10.
  • step S140 the acquisition unit 120 acquires and combines the seed value 162 and the time data. That is, in step S140, the acquisition unit 120 acquires combined data in which the seed value 162 and the time data are combined.
  • the combined data may contain multiple seed values 162. It is also preferable that the combined data contains one-time data. If the combined data contains one-time data, different combined data is acquired each time step S140 is executed, thereby preventing hacking and improving security.
  • step S150 the combined data acquired in step S140 is transmitted from the first information processing device 100 to the second information processing device 200.
  • step S160 the first calculation unit 130 repeats a hash calculation that varies the nonce value, and calculates a first hash value that satisfies a predetermined condition based on the first nonce value and the combined data.
  • step S170 the second calculation unit 230 repeats a hash calculation that varies the nonce value, and calculates a second hash value that satisfies a predetermined condition based on the second nonce value and the combined data.
  • step S180 the second hash value calculated in step S170 is transmitted from the second information processing device 200 to the first information processing device 100.
  • step S190 the determination unit 140 determines whether the first hash value calculated in step S160 and the second hash value transmitted in step S180 match. If the first hash value matches the second hash value (step S190: YES), step S200 is executed. If the first hash value does not match the second hash value (step S190: NO), processing in the key system 1 ends.
  • the first calculation unit 130 and the second calculation unit 230 may set a time limit for determining the first hash value and the second hash value, taking advantage of the fact that the calculation speed is faster than software hacking. Specifically, when the first hash value and the second hash value do not match within a predetermined time (e.g., 30 seconds) from a predetermined reference time (e.g., when the communication connection is started, when the first communication unit 150 transmits the combined data, or when the first calculation unit 130 starts calculation) after the communication connection between the first information processing device and the second information processing device is started in step S120, the electronic lock device 10 is prevented from being operated. Therefore, in step S190, the determination unit 140 can also determine that the first hash value and the second hash value do not match when the second hash value is not acquired within the predetermined time.
  • a predetermined time e.g. 30 seconds
  • a predetermined reference time e.g., when the communication connection is started, when the first communication unit 150 transmits the combined data, or when the first calculation
  • step S200 a predetermined operation is performed on the electronic lock device 10 in accordance with the operation request sent in step S120.
  • step S200 is executed, processing in the key system 1 ends.
  • a hash value that is difficult to decrypt is calculated in each of the first information processing device 100 mounted on the electronic lock device 10 of the automobile 1000 and the second information processing device 200 mounted on the electronic key device 20, making it possible to operate the automobile 1000. Therefore, it is very difficult to operate the automobile 1000 by hacking only the electronic lock device 10, and the key system 1 has high security.
  • FIG. 6 is a schematic diagram illustrating an overview of a key system 1A according to one embodiment of the present invention.
  • FIG. 7 is a sequence diagram illustrating the processing executed by a first information processing device 100A and a second information processing device 200 of a key system 1A according to one embodiment of the present invention.
  • FIG. 8 is a flowchart illustrating the processing executed by a first information processing device 100A and a second information processing device 200 of a key system 1A according to one embodiment of the present invention.
  • an electronic lock device 10A equipped with a first information processing device 100A is connected to a camera 30A.
  • the electronic lock device 10A may also include a camera 30A.
  • the electronic lock device 10A is installed near the camera 30A, but the installation position of the electronic lock device 10A is not limited to this.
  • the electronic lock device 10A may be installed in the door.
  • a start switch 40A for starting the engine of the automobile 1000 is installed.
  • the processing of the key system 1A is used and the user's face is authenticated. Specifically, when the user presses the start switch 40A, the camera 30A captures a picture of the user's face. Facial authentication is performed based on the captured facial data, and the engine of the automobile 1000 can be started.
  • the authentication unit 110 not only performs authentication using an identifier, but also performs face authentication by determining whether the facial data captured by the camera 30A is the face of a pre-registered user. Specifically, the authentication unit 110 can perform face authentication based on feature points such as the eyes, nose, or mouth of the captured face. Once the captured facial data has been authenticated, the engine of the automobile 1000 can be started via the electronic lock device 10A.
  • step S135A is executed after step S130.
  • step S135A the authentication unit 110 determines whether the facial data captured by the camera 30A is the face of a pre-registered user. If the captured facial data is the face of a registered user (step S135A: YES), the facial data is authenticated and step S140 is executed. If the captured facial data is not the face of a registered user (step S135A: NO), the facial data is not authenticated and processing in the key system 1 ends.
  • the engine of the automobile 1000 can be started using biometric authentication such as facial recognition.
  • biometric authentication can improve security, it can also be hacked.
  • a determination is made based on a first hash value calculated by the first calculation unit 130 and a second hash value calculated by the second calculation unit 230. Since the second hash value cannot be calculated without the electronic key device 20, it is very difficult to hack the automobile 1000 and steal it. Therefore, the key system 1A can significantly prevent hacking and improve security.
  • the acquisition unit 120 may also acquire combined data including face data captured by the camera 30A.
  • the face data is generated each time the engine is started, and can therefore be used as one-time data.
  • a hash value that is difficult to decrypt is calculated in each of the first information processing device 100A mounted on the electronic lock device 10A of the automobile 1000 and the second information processing device 200 mounted on the electronic key device 20, and the engine of the automobile 1000 is started by the calculation. Therefore, it is very difficult to start the engine of the automobile 1000 by hacking only the electronic lock device 10A, and the key system 1A has high security.
  • the key system described in the first and second embodiments is a system that uses an electronic key device (there may be multiple electronic key devices) to operate an electronic lock device corresponding to the electronic key device.
  • the basic configuration of the first information processing device 100 and the second information processing device 200 can also be used in transmitting and receiving data between multiple electronic devices. In this case, highly secure data can be transmitted and received between the multiple electronic devices. Therefore, an information communication system 2 according to an embodiment of the present invention will be described with reference to Figs. 9 to 12.
  • the description of the configuration of the information communication system 2 may be omitted.
  • FIG. 9 is a schematic diagram illustrating an overview of an information communication system 2 according to an embodiment of the present invention.
  • the information and communication system 2 includes a first electronic device 2000-1, a second electronic device 2000-2, a third electronic device 2000-3, and a fourth electronic device 2000-4. Although four electronic devices 2000 are illustrated in FIG. 9 for convenience, the information and communication system 2 can be used among a plurality of electronic devices 2000 (hereinafter, the plurality of electronic devices 2000 may be described as an n-th electronic device 2000-n (n is an integer of 2 or more)).
  • the first electronic device 2000-1 to the fourth electronic device 2000-4 are connected to each other so as to be able to communicate with each other via a network NW.
  • the network NW may be wired or wireless.
  • some of the plurality of electronic devices 2000 may be connected to each other so as to be able to communicate with each other via a wire. If the network NW is wired, communication may be possible only among the electronic devices 2000 connected by wire.
  • the information and communication system 2 can be installed, for example, in an office, a home, or a factory, and can be used for encrypted communication.
  • the electronic device 2000 is any device capable of transmitting or receiving data or information.
  • the electronic device 2000 may be, but is not limited to, a server (first electronic device 2000-1) or an information communication terminal (second electronic device 2000-2) that transmits and receives data or information, a camera (third electronic device 2000-3) that transmits captured video data, or a sensor (fourth electronic device 2000-4) that transmits detected signal data.
  • the nth electronic device 2000-n is equipped with the nth information processing device 300-n described below.
  • the nth information processing device 300-n may be incorporated as part of the components that configure the functions of the nth electronic device 2000-n, or may be installed separately from the components that configure the functions of the nth electronic device 2000-n. In the latter case, the information communication system 2 can be used by inserting, attaching, or replacing the nth information processing device 300-n into the nth electronic device 2000-n. Note that, hereinafter, when the n nth information processing devices 300-n are not particularly distinguished from one another, they may be simply described as information processing devices 300.
  • FIG. 10 is a block diagram showing the configuration of the nth information processing device 300-n installed in the nth electronic device 2000-n of an information communication system 2 according to one embodiment of the present invention.
  • the nth information processing device 300-n includes an nth authentication unit 310-n, an nth acquisition unit 320-n, an nth calculation unit 330-n, an nth judgment unit 340-n, and an nth storage unit 360-n.
  • the nth storage unit 360-n also includes an nth identifier 361-n.
  • the nth authentication unit 310-n, the nth calculation unit 330-n, the nth judgment unit 340-n, and the nth storage unit 360-n are similar to the authentication unit 110, the first calculation unit 130, the judgment unit 140, and the first storage unit 160 of the first information processing device 100, respectively, and therefore will not be described here.
  • the nth information processing device 300-n may include a communication unit.
  • the nth acquisition unit 320-n acquires data to be transmitted to another information processing device (hereinafter referred to as "transmission data") and time data, and combines the acquired data.
  • transmission data another information processing device
  • the nth acquisition unit 320-n acquires combined data in which the transmission data and the time data are combined.
  • the transmission data is encrypted by combining it with the time data.
  • the nth acquisition unit 320-n can also acquire data other than time data.
  • the nth acquisition unit 320-n can also acquire the nth identifier 361-n or the identifier of an information processing device of another information processing device.
  • the nth acquisition unit 320-n can also acquire a portion of the data to be transmitted.
  • the nth acquisition unit 320-n combines at least one of the acquired data with the data to be transmitted to acquire encrypted combined data.
  • the nth identifier 361-n is unique data for identifying the nth information processing device 300-n.
  • a communication connection is established between multiple electronic devices 2000, so each of the multiple electronic devices 2000 can be identified through the registered nth identifier 361-n.
  • FIG. 11 is a sequence diagram explaining the processing executed by the sth information processing device 300-s and the tth information processing device 300-t in an information communication system 2 according to one embodiment of the present invention.
  • FIG. 12 is a flowchart explaining the processing executed by the tth information processing device 300-t in an information communication system 2 according to one embodiment of the present invention.
  • step S310 the sth identifier 361-s is transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t.
  • step S320 the tth authentication unit 310-t determines whether the transmitted sth identifier 361-s is a registered identifier. If the sth identifier 361-s is a registered identifier (step S320: YES), the sth identifier 361-s is authenticated, and step S330 is executed. If the sth identifier 361-s is not a registered identifier (step S320: NO), the sth identifier 361-s is not authenticated, and the processing in the information communication system 2 ends.
  • step S330 authenticated information is transmitted from the t-th electronic device 2000-t to the s-th electronic device 2000-s, indicating that the s-th identifier 361-s has been authenticated in the t-th electronic device 2000-t (i.e., indicating that a communication connection is possible between the s-th electronic device 2000-s and the t-th electronic device 2000-t).
  • the authenticated information may be generated by the t-th authentication unit 310-t.
  • step S340 the acquisition unit 320 acquires the transmission data and time data and forms an image.
  • step S350 the combined data is transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t.
  • step S360 the sth calculation unit 330-s repeats a hash calculation that varies the nonce value, and calculates the sth hash value that satisfies a predetermined condition based on the sth nonce value and the combined data.
  • step S370 the t-th calculation unit 330-t repeats the hash calculation that varies the nonce value, and calculates the t-th hash value that satisfies a predetermined condition based on the t-th nonce value and the combined data.
  • step S380 the sth hash value calculated in step S360 is transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t.
  • step S390 the tth determination unit determines whether the tth hash value calculated in step S370 and the sth hash value transmitted in step S380 match.
  • step S390: YES the tth hash value matches the sth hash value
  • step S400 is executed.
  • step S390: NO processing in the information and communication system 2 ends.
  • step S400 the t-th electronic device 2000-t decrypts the transmission data from the combined data. This allows the t-th electronic device 2000-t to obtain the transmission data. When decrypting the transmission data, necessary information may be obtained from the s-th electronic device 2000-s. In this case, the t-th hash value calculated in step S370 may be transmitted from the t-th electronic device 2000-t to the s-th electronic device 2000-s.
  • the s-th determination unit 340-s determines whether the s-th hash value and the t-th hash value match, and when the s-th hash value and the t-th hash value match, the necessary information is transmitted from the s-th electronic device 2000-s to the t-th electronic device 2000-t.
  • the transmission data transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t is encrypted as combined data. Furthermore, when the sth hash value calculated using the sth information processing device 300-s of the sth electronic device 2000-s matches the tth hash value calculated using the tth information processing device 300-t of the tth electronic device 2000-t, the combined data is decrypted and the transmission data is obtained. Since it is very difficult to calculate a hash value using software, the information communication system 2 has a high level of security.
  • the information processing device 300 of the information communication system 2 described in the third embodiment can also be used for encrypted communication in a network environment connected for communication via a router. Therefore, an information communication system 3 according to an embodiment of the present invention will be described with reference to Fig. 13. Note that, in the following, when the configuration of the information communication system 3 according to this embodiment is the same as that of the information communication system 2 according to the third embodiment, the description of the configuration of the information communication system 3 may be omitted.
  • FIG. 13 is a schematic diagram illustrating an overview of an information and communication system 3 according to one embodiment of the present invention.
  • the information communication system 3 includes information communication terminals 2100 (first information communication terminal 2100-1, second information communication terminal 2100-2, and third information communication terminal 2100-3) that do not include an information processing device 300, an information communication terminal 2200 that includes an information processing device 300, a router 2300 that does not include an information processing device 300, and a router 2400 that includes an information processing device 300.
  • the information communication terminals 2100 and 2200, and the routers 2300 and 2400 correspond to the electronic device 2000 described in the third embodiment.
  • the information communication terminal 2200 can make a communication connection using the information processing device 300.
  • the router 2400 can make a communication connection using the information processing device 300.
  • Each of the first information communication terminal 2100-1 and the information communication terminal 2200 is communicatively connected to the router 2300 via the network NW1.
  • Each of the second information communication terminal 2100-2 and the third information communication terminal 2100-3 is communicatively connected to the router 2400 via the network NW2.
  • the router 2300 is communicatively connected to the router 2400 via the network NW3.
  • the networks NW1 and NW2 are, for example, LANs.
  • the network NW3 is, for example, the Internet or a WAN.
  • the networks NW1, NW2, and NW3 may be wired or wireless.
  • the network environments in the information communication system 3 can be roughly divided into three types.
  • the first network environment NE1 is constructed by only the first information communication terminal 2100-1 or the first information communication terminal 2100-1 and the router 2300, and is a network environment in which the information processing device 300 cannot be used. In the first network environment NE1, the information processing device 300 cannot be used when communicating with the outside.
  • the second network environment NE2 is constructed by the information communication terminal 2200 or the information communication terminal 2200 and the router 2300, and is a network environment in which the information processing device 300 can be used.
  • the third network environment NE3 is constructed by the second information communication terminal 2100-2, the third information communication terminal 2100-3, and the router 2400, and is a network environment in which the information processing device 300 can be used.
  • the third network environment NE3 can also be said to be an in-house LAN in a company, etc.
  • the information processing device 300 can be used when establishing a communication connection with the outside.
  • the communication connections in the first network environment NE1 to the third network environment NE3 are described in detail below.
  • the first information communication terminal 2100-1 does not include the information processing device 300. Also, the router 2300 does not include the information processing device 300. Therefore, the first information communication terminal 2100-1 cannot transmit and receive encrypted data using the information processing device 300 when transmitting and receiving data with the second information communication terminal 2100-2, the third information communication terminal 2100-3, or the information communication terminal 2200. In this case, transmission and reception of data encrypted by a conventional method is performed. Note that, when multiple first network environments NE1 exist, the communication connection between the multiple first network environments NE1 is the same as described above.
  • the information communication terminal 2200 includes the information processing device 300. Therefore, when a plurality of second network environments NE2 exist, encrypted data can be transmitted and received between the information communication terminals 2200 using the information processing device 300. In data transmission and reception between the second network environments NE2, even if a malicious third party intercepts the data, the data cannot be easily decrypted.
  • Each of the second information communication terminal 2100-2 and the third information communication terminal 2100-3 does not include the information processing device 300. Therefore, in data transmission and reception between the second information communication terminal 2100-2 and the third information communication terminal 2100-3, it is not possible to transmit and receive encrypted data using the information processing device 300. In this case, transmission and reception of unencrypted data or data encrypted by a conventional method is performed.
  • the information communication terminal 2200 in the second network environment NE2 includes an information processing device 300.
  • the router 2400 in the third network environment NE3 also includes an information processing device 300.
  • data can be encrypted or decrypted by the information processing device 300 of the router 2400. Therefore, encrypted data can be transmitted and received between the information communication terminal 2200 and the second information communication terminal 2100-2 or the third information communication terminal 2100-3 using the information processing device 300.
  • transmitting and receiving data between the second network environment NE2 and the third network environment NE3 even if a malicious third party intercepts the data, the data cannot be easily decrypted.
  • encrypted data can be transmitted and received between the information communication terminals 2200 including the information processing device 300, or between the information communication terminal 2200 including the information processing device 300 and the router 2400 including the information processing device 300.
  • the information processing device 300 can be provided as a component (e.g., a chip). Therefore, by inserting, mounting, or replacing the information processing device 300 into the information communication terminal 2100, it is possible to use the information communication terminal 2100 as the information communication terminal 2200. Similarly, by inserting, mounting, or replacing the information processing device 300 into the router 2300, it is possible to use the router 2300 as the router 2400. In this way, in the information communication system 3, by introducing the information processing device 300 into the network environment, it is possible to transmit and receive encrypted data using the information processing device 300. As a result, in the information communication system 3, security can be increased according to the network environment.

Abstract

This key system includes: a first information processing device included in an electronic lock device; and a second information processing device that is included in an electronic key device for operating the electronic lock device and is communicably connected to the first information processing device. After a communication connection is established between the first information processing device and the second information processing device, the first information processing device acquires combined data in which at least first data and second data different from the first data have been combined. The first information processing device transmits the combined data to the second information processing device. The first information processing device calculates a first hash value that satisfies a prescribed condition on the basis of a first nonce value and the combined data. The second information processing device calculates a second hash value that satisfies the prescribed condition on the basis of a second nonce value and the combined data. The first information processing device determines whether the first hash value and the second hash value match.

Description

鍵システム、電子錠装置、電子鍵装置、および情報通信システムKey system, electronic lock device, electronic key device, and information and communication system
 本発明の一実施形態は、電子鍵装置を用いて電子錠装置を操作する鍵システムに関する。また、本発明の一実施形態は、鍵システムに含まれる電子錠装置または電子鍵装置に関する。また、本発明の一実施形態は、複数の電子装置のデータの送受信において利用される情報通信システムに関する。 One embodiment of the present invention relates to a key system that uses an electronic key device to operate an electronic lock device. Another embodiment of the present invention relates to an electronic lock device or an electronic key device included in the key system. Another embodiment of the present invention relates to an information and communication system used to send and receive data between multiple electronic devices.
 近年、ユーザが所持するキーと自動車との間で無線による通信接続を行い、自動車のドアの解錠および施錠ならびにエンジンの起動を行うことを可能とするスマートキーシステムが多く用いられている(特許文献1参照)。例えば、スマートキーを所持したユーザが自動車に近づくと、スマートキーと自動車との間で電波を介した認証処理が行われ、自動車のドアの解錠および施錠ならびにエンジンの起動が可能となる。 In recent years, smart key systems have come into widespread use, which establish a wireless communication connection between a key held by a user and a vehicle, allowing the user to unlock and lock the vehicle's doors and start the engine (see Patent Document 1). For example, when a user holding a smart key approaches a vehicle, authentication processing is carried out between the smart key and the vehicle via radio waves, allowing the user to unlock and lock the vehicle's doors and start the engine.
特開2017-57627号公報JP 2017-57627 A
 しかしながら、スマートキーシステムでは、スマートキーが発する微弱な電波をハッキングし、不正に自動車のドアの解錠および施錠ならびにエンジンの起動を行って自動車を盗難する窃盗犯罪が増加している。最近では、中継器を介して信号を送信するリレーアタックという方法により、スマートキーが自動車の近くに存在しなくても自動車のドアおよびエンジンの操作がハッキングされ、自動車が盗難されている状況である。そのため、ハッキングの防止可能なセキュリティーの高い鍵システムが望まれている。 However, smart key systems have seen an increase in theft crimes in which thieves hack into the weak radio waves emitted by smart keys to illegally unlock and lock car doors and start the engine, resulting in the theft of cars. Recently, a method known as a relay attack has been used to transmit signals through a repeater, allowing the operation of car doors and engines to be hacked and cars to be stolen, even when the smart key is not near the car. For this reason, there is a demand for a highly secure key system that can prevent hacking.
 本発明の一実施形態は、上記問題に鑑み、高いセキュリティーを有する鍵システムを提供することを目的の一つとする。また、本発明の一実施形態は、高いセキュリティーを有する情報通信システムを提供することを目的の一つとする。 In view of the above problems, one embodiment of the present invention has as its object to provide a key system with high security. Also, one embodiment of the present invention has as its object to provide an information and communication system with high security.
 本発明の一実施形態に係る鍵システムは、電子錠装置に含まれる第1の情報処理装置と、電子錠装置を操作する電子鍵装置に含まれ、第1の情報処理装置と通信可能に接続する第2の情報処理装置と、を含み、第1の情報処理装置と第2の情報処理装置との通信接続が開始された後、第1の情報処理装置が、少なくとも第1のデータおよび第1のデータと異なる第2のデータが結合された結合データを取得し、第1の情報処理装置が、結合データを第2の情報処理装置に送信し、第1の情報処理装置が、第1のナンス値および結合データに基づき所定の条件を満たす第1のハッシュ値を算出し、第2の情報処理装置が、第2のナンス値および受信した結合データに基づき所定の条件を満たす第2のハッシュ値を算出し、第1の情報処理装置が、第1のハッシュ値と第2のハッシュ値とが一致するか否かを判定する。 A key system according to one embodiment of the present invention includes a first information processing device included in an electronic lock device, and a second information processing device included in an electronic key device that operates the electronic lock device and communicatively connected to the first information processing device. After a communication connection between the first information processing device and the second information processing device is initiated, the first information processing device acquires combined data in which at least first data and second data different from the first data are combined, the first information processing device transmits the combined data to the second information processing device, the first information processing device calculates a first hash value that satisfies a predetermined condition based on the first nonce value and the combined data, the second information processing device calculates a second hash value that satisfies a predetermined condition based on the second nonce value and the received combined data, and the first information processing device determines whether the first hash value and the second hash value match.
 第1のハッシュ値と第2のハッシュ値とが一致するとき、電子錠装置への所定の操作が実行されてもよい。 When the first hash value and the second hash value match, a specified operation may be executed on the electronic lock device.
 第1のデータはワンタイムデータであり、ワンタイムデータは、日付データ、時刻データ、または日時データであってもよい。 The first data is one-time data, and the one-time data may be date data, time data, or date and time data.
 第1のデータはワンタイムデータであり、ワンタイムデータは、電子錠装置の位置データであってもよい。 The first data is one-time data, and the one-time data may be location data of the electronic lock device.
 第2のデータは固有データであり、固有データは、電子錠装置の識別子であってもよい。 The second data is unique data, which may be an identifier for the electronic lock device.
 第2のデータは固有データであり、固有データは、第1の情報処理装置に登録されている複数の電子鍵装置の識別子から選ばれた1つであってもよい。 The second data is unique data, and the unique data may be one selected from the identifiers of multiple electronic key devices registered in the first information processing device.
 第2のデータは、ユーザに固有のユーザデータであってもよい。ユーザデータは、ユーザの生体情報であってもよい。ユーザデータは、ユーザが所持する物品の識別情報であってもよい。 The second data may be user data unique to the user. The user data may be biometric information of the user. The user data may be identification information of an item possessed by the user.
 電子錠装置は、車両に設置され、第2のデータは、車両に固有の車両データであってもよい。車両データは、車両の個体識別情報であってもよい。車両データは、車両の車種情報であってもよい。 The electronic lock device may be installed in a vehicle, and the second data may be vehicle data specific to the vehicle. The vehicle data may be individual identification information of the vehicle. The vehicle data may be vehicle model information of the vehicle.
 通信接続が開始された後の所定の基準時から所定時間内に第1のハッシュ値と第2のハッシュ値とが一致しないとき、電子錠装置が操作されなくてもよい。 If the first hash value and the second hash value do not match within a predetermined time from a predetermined reference time after the communication connection is started, the electronic lock device does not need to be operated.
 第1のハッシュ値を算出する第1の演算部および第2のハッシュ値を算出する第2の演算部の各々は、ASICで構成されてもよい。 The first calculation unit that calculates the first hash value and the second calculation unit that calculates the second hash value may each be configured with an ASIC.
 本発明の一実施形態に係る電子錠装置は、電子鍵装置との通信接続が開始された後に、少なくとも第1のデータおよび第1のデータと異なる第2のデータが結合された結合データを取得する取得部と、結合データを電子鍵装置に送信する通信部と、ナンス値および結合データに基づき所定の条件を満たす第1のハッシュ値を算出する演算部と、第1のハッシュ値と、電子鍵装置から送信される第2のハッシュ値とが一致するか否かを判定する判定部と、を含む。 An electronic lock device according to one embodiment of the present invention includes an acquisition unit that acquires combined data in which at least first data and second data different from the first data are combined after a communication connection with an electronic key device is initiated, a communication unit that transmits the combined data to the electronic key device, a calculation unit that calculates a first hash value that satisfies a predetermined condition based on a nonce value and the combined data, and a determination unit that determines whether the first hash value matches the second hash value transmitted from the electronic key device.
 本発明の一実施形態に係る電子鍵装置は、電子錠装置との通信接続が開始された後に、電子錠装置が取得した少なくとも第1のデータおよび第1のデータと異なる第2のデータが結合された結合データを受信する通信部と、ナンス値および受信した結合データに基づき所定の条件を満たすハッシュ値を算出する演算部と、を含む。 An electronic key device according to one embodiment of the present invention includes a communication unit that receives combined data that combines at least first data acquired by the electronic lock device and second data different from the first data after a communication connection with the electronic lock device is initiated, and a calculation unit that calculates a hash value that satisfies a predetermined condition based on a nonce value and the received combined data.
 本発明の一実施形態に係る情報通信システムは、第1のデータを送信する第1の電子装置に含まれる第1の情報処理装置と、第1のデータを受信する第2の電子装置に含まれる第2の情報処理装置と、を含み、第1の情報処理装置が、少なくとも第1のデータおよび第1のデータと異なる第2のデータが結合された結合データを取得し、第1の情報処理装置が、第1のナンス値および結合データに基づき所定の条件を満たす第1のハッシュ値を算出し、第2の情報処理装置が、第2のナンス値および第1の電子装置から第2の電子装置に送信された結合データに基づき所定の条件を満たす第2のハッシュ値を算出し、第2の情報処理装置が、第1のハッシュ値と第2のハッシュ値とが一致するか否かを判定する。 An information communication system according to one embodiment of the present invention includes a first information processing device included in a first electronic device that transmits first data, and a second information processing device included in a second electronic device that receives the first data, the first information processing device acquires combined data in which at least the first data and second data different from the first data are combined, the first information processing device calculates a first hash value that satisfies a predetermined condition based on the first nonce value and the combined data, the second information processing device calculates a second hash value that satisfies a predetermined condition based on the second nonce value and the combined data transmitted from the first electronic device to the second electronic device, and the second information processing device determines whether the first hash value and the second hash value match.
 第1の電子装置および第2の電子装置の少なくとも1つは、ルータであってもよい。第1の電子装置および第2の電子装置の少なくとも1つは、情報通信端末であってもよい。 At least one of the first electronic device and the second electronic device may be a router. At least one of the first electronic device and the second electronic device may be an information communication terminal.
 本発明の一実施形態に係る鍵システムは、電子錠装置だけでなく、電子鍵装置においても復号が困難なハッシュ値を算出し、電子錠装置の操作を可能とする。そのため、電子錠装置のみをハッキングしても電子錠装置を操作することは非常に困難であり、鍵システムは、高いセキュリティーを有する。また、本発明の一実施形態に係る情報通信システムは、暗号化されたデータの送受信に関して算出の困難なハッシュ値を利用する。そのため、情報通信システムは、高いセキュリティーを有する。 The key system according to one embodiment of the present invention calculates a hash value that is difficult to decrypt not only in the electronic lock device but also in the electronic key device, making it possible to operate the electronic lock device. Therefore, it is extremely difficult to operate the electronic lock device even if only the electronic lock device is hacked, and the key system has a high level of security. Furthermore, the information and communication system according to one embodiment of the present invention uses a hash value that is difficult to calculate when sending and receiving encrypted data. Therefore, the information and communication system has a high level of security.
本発明の一実施形態に係る鍵システムの概要を説明する模式図である。1 is a schematic diagram illustrating an overview of a key system according to one embodiment of the present invention. FIG. 本発明の一実施形態に係る鍵システムの構成を示すブロック図である。1 is a block diagram showing the configuration of a key system according to an embodiment of the present invention; 本発明の一実施形態に係る鍵システムにおいて、ハッシュ値の算出を説明する模式図である。1 is a schematic diagram illustrating calculation of a hash value in a key system according to an embodiment of the present invention. FIG. 本発明の一実施形態に係る鍵システムの第1の情報処理装置および第2の情報処理装置で実行される処理を説明するシーケンス図である。FIG. 2 is a sequence diagram illustrating processing executed by a first information processing device and a second information processing device in a key system according to an embodiment of the present invention. 本発明の一実施形態に係る鍵システムの第1の情報処理装置および第2の情報処理装置で実行される処理を説明するフローチャートである。4 is a flowchart illustrating processing executed by a first information processing device and a second information processing device in a key system according to an embodiment of the present invention. 本発明の一実施形態に係る鍵システムの概要を説明する模式図である。1 is a schematic diagram illustrating an overview of a key system according to one embodiment of the present invention. FIG. 本発明の一実施形態に係る鍵システムの第1の情報処理装置および第2の情報処理装置で実行される処理を説明するシーケンス図である。FIG. 2 is a sequence diagram illustrating processing executed by a first information processing device and a second information processing device in a key system according to an embodiment of the present invention. 本発明の一実施形態に係る鍵システムの第1の情報処理装置および第2の情報処理装置で実行される処理を説明するフローチャートである。4 is a flowchart illustrating processing executed by a first information processing device and a second information processing device in a key system according to an embodiment of the present invention. 本発明の一実施形態に係る情報通信システムの概要を説明する模式図である。1 is a schematic diagram illustrating an overview of an information communication system according to an embodiment of the present invention. 本発明の一実施形態に係る情報通信システムの第nの電子装置に搭載される第nの情報処理装置の構成を示すブロック図である。1 is a block diagram showing a configuration of an nth information processing device mounted in an nth electronic device of an information communication system according to an embodiment of the present invention. 本発明の一実施形態に係る情報通信システムにおいて、第sの情報処理装置および第tの情報処理装置で実行される処理を説明するシーケンス図である。1 is a sequence diagram illustrating processing executed in an s-th information processing device and a t-th information processing device in an information communication system according to an embodiment of the present invention. FIG. 本発明の一実施形態に係る情報通信システムにおいて、第sの情報処理装置および第tの情報処理装置で実行される処理を説明するフローチャートである。11 is a flowchart illustrating processing executed in an s-th information processing device and a t-th information processing device in an information communication system according to an embodiment of the present invention. 本発明の一実施形態に係る情報通信システムの概要を説明する模式図である。1 is a schematic diagram illustrating an overview of an information communication system according to an embodiment of the present invention.
 以下に、本発明の各実施形態について、図面を参照しつつ説明する。但し、本発明は、その要旨を逸脱しない範囲において様々な形態で実施することができ、以下の実施形態の記載内容に限定して解釈されるものではない。 Each embodiment of the present invention will be described below with reference to the drawings. However, the present invention can be embodied in various forms without departing from the spirit of the invention, and should not be interpreted as being limited to the description of the following embodiments.
 図面は、説明をより明確にするため、実際の態様に比べ、各部の幅、厚さ、形状等について模式的に表される場合があるが、あくまで一例であって、本発明の解釈を限定するものではない。また、本明細書と各図において、既出の図に関して説明したものと同様の機能を備えた要素には、同一の符号を付して、重複する説明を省略することがある。 In order to make the explanation clearer, the drawings may show the width, thickness, shape, etc. of each part in a schematic manner compared to the actual embodiment, but these are merely examples and do not limit the interpretation of the present invention. Furthermore, in this specification and each figure, elements with similar functions to those explained in the previous figures may be given the same reference numerals and duplicate explanations may be omitted.
 本明細書および図面において、同一または類似する複数の構成を総じて表記する際には、同一の符号または同一の符号に大文字のアルファベットを添えて表記する場合がある。一つの構成のうちの複数の部分をそれぞれ区別して表記する際には、同一の符号を用い、さらにハイフンと自然数を用いる場合がある。 In this specification and drawings, when multiple identical or similar components are collectively referred to, they may be referred to by the same reference symbol or by the same reference symbol with an uppercase alphabet. When multiple parts of a single component are to be distinguished from one another, the same reference symbol may be used, and a hyphen and a natural number may also be used.
 本明細書において、各構成に付記される「第1」、「第2」、または「第3」などの文字は、各構成を区別するために用いられる便宜的な標識であり、特段の説明がない限り、それ以上の意味を有さない。 In this specification, the letters "first," "second," or "third" attached to each component are convenient labels used to distinguish each component, and have no other meaning unless otherwise specified.
<第1実施形態>
 図1~図5を参照して、本発明の一実施形態に係る鍵システム1について説明する。
First Embodiment
A key system 1 according to one embodiment of the present invention will be described with reference to FIGS.
[1.鍵システム1の構成]
 図1~図3を参照して、鍵システム1の構成について説明する。
[1. Configuration of key system 1]
The configuration of a key system 1 will be described with reference to FIGS.
 図1は、本発明の一実施形態に係る鍵システム1の概要を説明する模式図である。図2は、本発明の一実施形態に係る鍵システム1の構成を示すブロック図である。 FIG. 1 is a schematic diagram illustrating an overview of a key system 1 according to one embodiment of the present invention. FIG. 2 is a block diagram illustrating the configuration of a key system 1 according to one embodiment of the present invention.
 図2に示すように、鍵システム1は、第1の情報処理装置100および第2の情報処理装置200を含む。第1の情報処理装置100および第2の情報処理装置200は、それぞれ、電子錠装置10および電子鍵装置20に搭載されて利用される。例えば、図1に示すように、電子錠装置10は、自動車1000のドアに設置され、ドアを開閉可能に制御する。電子鍵装置20は、自動車1000のスマートキーである。電子錠装置10は、無線通信によって、電子鍵装置20と接続することができる。この場合、ユーザは、電子鍵装置20を用いて、電子錠装置10の解錠および施錠を操作する。電子錠装置10が解錠されると、ユーザは、自動車1000のドアを開けることができる。一方、電子錠装置10が施錠されると、ユーザは、自動車1000のドアを閉じることができる。 As shown in FIG. 2, the key system 1 includes a first information processing device 100 and a second information processing device 200. The first information processing device 100 and the second information processing device 200 are mounted on an electronic lock device 10 and an electronic key device 20, respectively, for use. For example, as shown in FIG. 1, the electronic lock device 10 is installed on the door of an automobile 1000 and controls the door so that it can be opened and closed. The electronic key device 20 is a smart key for the automobile 1000. The electronic lock device 10 can be connected to the electronic key device 20 by wireless communication. In this case, a user uses the electronic key device 20 to operate the unlocking and locking of the electronic lock device 10. When the electronic lock device 10 is unlocked, the user can open the door of the automobile 1000. On the other hand, when the electronic lock device 10 is locked, the user can close the door of the automobile 1000.
 なお、電子錠装置10の解錠および施錠の操作は、ユーザが電子鍵装置20を直接操作することによって開始されてもよく、電子鍵装置20が電子錠装置10に所定の距離に近接するまたはタッチすることによって開始されてもよい。また、電子錠装置10が挿入口を有し、挿入口に電子鍵装置20を差し込むことによって、電子錠装置10の解錠および施錠の操作が開始されてもよい。 The operation of unlocking and locking the electronic lock device 10 may be initiated by the user directly operating the electronic key device 20, or may be initiated by the electronic key device 20 approaching or touching the electronic lock device 10 at a predetermined distance. The electronic lock device 10 may also have an insertion port, and the operation of unlocking and locking the electronic lock device 10 may be initiated by inserting the electronic key device 20 into the insertion port.
 図1に示すように、鍵システム1は、自動車1000のドアの解錠および施錠を操作することができるが、鍵システム1の利用態様はこれに限られない。例えば、鍵システム1は、住宅またはマンションなどのドアの解錠および施錠を操作することもできる。 As shown in FIG. 1, the key system 1 can operate the unlocking and locking of the doors of an automobile 1000, but the usage of the key system 1 is not limited to this. For example, the key system 1 can also operate the unlocking and locking of doors of a house or apartment building, etc.
 また、鍵システム1の利用態様は、ドアの解錠および施錠に限られない。例えば、鍵システム1は、自動車1000のエンジンを起動することもできる。具体的には、第1の情報処理装置100を自動車1000のエンジンを起動する起動スイッチと接続されるように設置する。ユーザによって起動スイッチが押されると、第1の情報処理装置100は、電子鍵装置20と通信接続し、鍵システム1の処理に従って自動車1000のエンジンを起動する。このように、鍵システム1は、自動車1000のドアの解錠および施錠だけでなく、自動車1000のエンジンの起動においても利用することができる。 Furthermore, the use of the key system 1 is not limited to unlocking and locking doors. For example, the key system 1 can also start the engine of the automobile 1000. Specifically, the first information processing device 100 is installed so as to be connected to a start switch that starts the engine of the automobile 1000. When the start switch is pressed by a user, the first information processing device 100 communicates with the electronic key device 20 and starts the engine of the automobile 1000 according to the processing of the key system 1. In this way, the key system 1 can be used not only to unlock and lock the doors of the automobile 1000, but also to start the engine of the automobile 1000.
 なお、以下では、第1の情報処理装置100および第2の情報処理装置200を含む鍵システム1について説明するが、鍵システム1は、電子錠装置10および電子鍵装置20を含む構成であってもよい。 Note that, below, a key system 1 including a first information processing device 100 and a second information processing device 200 will be described, but the key system 1 may also include an electronic lock device 10 and an electronic key device 20.
 図2に示すように、第1の情報処理装置100は、ネットワークNWを介して第2の情報処理装置200と通信可能に接続される。ネットワークNWは、無線であり、例えば、インターネット、Bluetooth(登録商標)、Wi-Fi(登録商標)であるが、ネットワークNWの構成はこれらに限られない。 As shown in FIG. 2, the first information processing device 100 is communicatively connected to the second information processing device 200 via a network NW. The network NW is wireless and may be, for example, the Internet, Bluetooth (registered trademark), or Wi-Fi (registered trademark), but the configuration of the network NW is not limited to these.
 また、ネットワークNWは、有線であってもよい。この場合、第1の情報処理装置100と第2の情報処理装置200とは、ケーブルなどによって接続される。 The network NW may also be wired. In this case, the first information processing device 100 and the second information processing device 200 are connected by a cable or the like.
 第1の情報処理装置100は、認証部110、取得部120、第1の演算部130、判定部140、第1の通信部150、および第1の記憶部160を含む。第2の情報処理装置200は、操作部210、第2の演算部230、第2の通信部250、および第2の記憶部260を含む。 The first information processing device 100 includes an authentication unit 110, an acquisition unit 120, a first calculation unit 130, a determination unit 140, a first communication unit 150, and a first memory unit 160. The second information processing device 200 includes an operation unit 210, a second calculation unit 230, a second communication unit 250, and a second memory unit 260.
 第1の記憶部160および第2の記憶部260の各々は、データまたは情報を格納することができるストレージである。第1の記憶部160には、第1の識別子161およびシード値162が格納されている。第2の記憶部260には、第2の識別子261が格納されている。第1の記憶部160および第2の記憶部260の各々として、例えば、ハードディスクドライブ(Hard Disk Drive:HDD)、ソリッドステートドライブ(Solid State Drive:SSD)、リードオンリーメモリ(Read Only Memory:ROM)、ランダムアクセスメモリ(Random Access Memory:RAM)、またはフラッシュメモリなどを用いることができる。 Each of the first memory unit 160 and the second memory unit 260 is a storage capable of storing data or information. The first memory unit 160 stores a first identifier 161 and a seed value 162. The second memory unit 260 stores a second identifier 261. As each of the first memory unit 160 and the second memory unit 260, for example, a hard disk drive (HDD), a solid state drive (SSD), a read only memory (ROM), a random access memory (RAM), or a flash memory can be used.
 第1の識別子161は、第1の情報処理装置100を識別するための固有データである。第2の識別子261は、第2の情報処理装置200を識別するための固有データである。すなわち、第1の識別子161に基づいて第1の情報処理装置100を識別することができ、第2の識別子261に基づいて第2の情報処理装置200を識別することができる。 The first identifier 161 is unique data for identifying the first information processing device 100. The second identifier 261 is unique data for identifying the second information processing device 200. In other words, the first information processing device 100 can be identified based on the first identifier 161, and the second information processing device 200 can be identified based on the second identifier 261.
 シード値162は、第1の演算部130および第2の演算部230で実行される演算に用いられるデータである。シード値162は、予め登録されるデータであり、ユーザによって登録されてもよい。また、シード値162として登録されるデータは、1つだけでなく、複数であってもよい。例えば、シード値162として、鍵システム1の固有データである第1の識別子161および第2の識別子261を登録しておくことができる。また、電子錠装置10が自動車または鉄道などの車両に設置される場合には、シード値162として、車両に固有の車両データを登録しておくこともできる。車両データは、車両の個体識別情報(例えば、自動車登録番号または車体番号など)および車両の分類情報(例えば、車種、車名、車型、または車格など)であるが、これらに限られない。また、シード値162として、電子鍵装置20を利用するユーザに固有のユーザデータを登録しておくこともできる。ユーザデータは、ユーザの生体情報(例えば、虹彩パターン、静脈パターン、指紋パターン、または顔パターンなど)およびユーザが所持する物品の識別情報(例えば、ICカードの識別番号または情報端末の識別番号など)であるが、これらに限られない。 The seed value 162 is data used in the calculations performed by the first calculation unit 130 and the second calculation unit 230. The seed value 162 is data registered in advance and may be registered by the user. The data registered as the seed value 162 may be not only one but also multiple. For example, the first identifier 161 and the second identifier 261, which are unique data of the key system 1, can be registered as the seed value 162. In addition, when the electronic lock device 10 is installed in a vehicle such as an automobile or a train, vehicle data unique to the vehicle can also be registered as the seed value 162. The vehicle data is individual identification information of the vehicle (e.g., the vehicle registration number or the vehicle number, etc.) and classification information of the vehicle (e.g., the vehicle model, the vehicle name, the vehicle type, or the vehicle rank, etc.), but is not limited to these. In addition, user data unique to the user who uses the electronic key device 20 can also be registered as the seed value 162. User data includes, but is not limited to, the user's biometric information (e.g., iris pattern, vein pattern, fingerprint pattern, or face pattern) and identification information of an item possessed by the user (e.g., IC card identification number or information terminal identification number).
 認証部110は、第2の識別子261が登録された識別子であるか否かを判定する。鍵システム1では、予め識別子が登録され、登録された識別子を含む電子鍵装置20が認証部110によって認証されることによって、電子錠装置10を操作することができる。登録される識別子は、第1の記憶部160に格納されていてもよい。複数の電子鍵装置20によって電子錠装置10が操作される場合、登録される識別子は、複数であってもよい。なお、複数の電子鍵装置20によって電子錠装置10が操作される場合、シード値162として、複数の第2の識別子261を登録しておくこともできる。 The authentication unit 110 determines whether the second identifier 261 is a registered identifier. In the key system 1, identifiers are registered in advance, and the electronic lock device 10 can be operated by authenticating the electronic key device 20 including the registered identifier by the authentication unit 110. The registered identifier may be stored in the first storage unit 160. If the electronic lock device 10 is operated by multiple electronic key devices 20, multiple identifiers may be registered. Note that if the electronic lock device 10 is operated by multiple electronic key devices 20, multiple second identifiers 261 can also be registered as the seed value 162.
 取得部120は、第1の演算部130および第2の演算部230での演算に必要なデータを取得する。具体的には、取得部120は、シード値162および時刻データ(または、日付データもしくは日時データ)から少なくとも2つの異なるデータを取得し、取得したデータを結合する。すなわち、取得部120は、少なくとも第1のデータおよび第1のデータと異なる第2のデータとが結合された結合データを取得する。具体的には、取得部120は、時刻データと第1の識別子161とが結合された結合データを取得する。また、取得部120は、登録されている複数の第2の識別子261から1つを選択(承認された第2の識別子261であってもよい。)し、時刻データと選択された第2の識別子261とが結合された結合データを取得する。 The acquisition unit 120 acquires data necessary for the calculations in the first calculation unit 130 and the second calculation unit 230. Specifically, the acquisition unit 120 acquires at least two different pieces of data from the seed value 162 and time data (or date data or date and time data), and combines the acquired data. That is, the acquisition unit 120 acquires combined data in which at least first data and second data different from the first data are combined. Specifically, the acquisition unit 120 acquires combined data in which time data and the first identifier 161 are combined. The acquisition unit 120 also selects one from a plurality of registered second identifiers 261 (which may be an approved second identifier 261), and acquires combined data in which time data and the selected second identifier 261 are combined.
 取得部120は、シード値162以外のデータを取得することもできる。例えば、取得部120は、自動車1000の位置データ(電子錠装置10の位置データに対応)または走行距離データを取得することもできる。自動車1000の位置データは、GPS(Global Positioning System)、GNSS(Global Navigation Satellite System)、自動車1000が搭載する測位デバイス、またはネットワークなどによって取得することができる。自動車1000の走行距離データは、オドメータまたはトリップメータなどによって取得することができる。 The acquisition unit 120 can also acquire data other than the seed value 162. For example, the acquisition unit 120 can acquire the position data of the automobile 1000 (corresponding to the position data of the electronic lock device 10) or mileage data. The position data of the automobile 1000 can be acquired by a Global Positioning System (GPS), a Global Navigation Satellite System (GNSS), a positioning device installed in the automobile 1000, or a network. The mileage data of the automobile 1000 can be acquired by an odometer or trip meter, etc.
 上述した第1の識別子161、第2の識別子261、車両データ、およびユーザデータは、取得部120が取得する時間または位置によって変動しない固有データである。一方、上述した時刻データ、日付データ、日時データ、位置データ、および走行データは、取得部120が取得する時間または位置によって変動するワンタイムデータである。取得部120が取得する結合データには、ワンタイムデータが含まれることが好ましい。例えば、取得部120は、ワンタイムデータとして、時刻データに代えて、または時刻データとともに、位置データを取得することもできる。取得部120が取得する結合データにワンタイムデータが含まれることにより、結合データもワンタイムデータとなる。その結果、電子錠装置10が電子鍵装置20によって操作されるたびに、第1の演算部130および第2の演算部230の演算の入力値として用いられる結合データが変動するため、ハッキングが防止され、セキュリティーを向上させることができる。 The first identifier 161, the second identifier 261, the vehicle data, and the user data described above are unique data that do not change depending on the time or location acquired by the acquisition unit 120. On the other hand, the time data, the date data, the date and time data, the location data, and the driving data described above are one-time data that change depending on the time or location acquired by the acquisition unit 120. It is preferable that the combined data acquired by the acquisition unit 120 includes one-time data. For example, the acquisition unit 120 can also acquire location data as one-time data instead of time data or in addition to time data. By including one-time data in the combined data acquired by the acquisition unit 120, the combined data also becomes one-time data. As a result, the combined data used as input values for the calculations of the first calculation unit 130 and the second calculation unit 230 changes every time the electronic lock device 10 is operated by the electronic key device 20, which prevents hacking and improves security.
 第1の演算部130および第2の演算部230の各々は、ハッシュ関数を用いてハッシュ値を算出する。図3は、本発明の一実施例に係る鍵システム1において、ハッシュ値の算出を説明する模式図である。図3に示すように、第1の演算部130および第2の演算部230の各々は、ナンス値および結合データ(例えば、シード値162と時刻データとの結合データ)が入力されると、ハッシュ関数(例えば、sha256などのアルゴリズムなど)を用いて演算し、ハッシュ値を算出する。ここで、算出されるハッシュ値には、共通の所定の条件が満たされるように設定されている。そのため、第1の演算部130および第2の演算部230の各々では、所定の条件を満たすハッシュ値が得られるまで、ナンス値を変動させながら繰り返し演算される。 Each of the first calculation unit 130 and the second calculation unit 230 calculates a hash value using a hash function. FIG. 3 is a schematic diagram illustrating the calculation of a hash value in the key system 1 according to one embodiment of the present invention. As shown in FIG. 3, when a nonce value and combined data (e.g., combined data of the seed value 162 and time data) are input, each of the first calculation unit 130 and the second calculation unit 230 calculates a hash value using a hash function (e.g., an algorithm such as SHA256). Here, the calculated hash value is set to satisfy a common predetermined condition. Therefore, each of the first calculation unit 130 and the second calculation unit 230 repeatedly calculates the nonce value while varying it until a hash value that satisfies the predetermined condition is obtained.
 第1の演算部130と第2の演算部230の演算では、同じハッシュ関数および結合データを用いられる。ナンス値が異なると、異なるハッシュ値が得られるが、算出されるハッシュ値に所定の条件が設定されており、ナンス値を変動させながら繰り返し演算を行うことにより、結果として、第1の演算部130の演算によって算出される第1のハッシュ値と第2の演算部230の演算によって算出される第2のハッシュ値とは同じになる。 The calculations of the first calculation unit 130 and the second calculation unit 230 use the same hash function and combined data. If the nonce value is different, a different hash value is obtained, but a specific condition is set for the calculated hash value, and by repeatedly performing calculations while varying the nonce value, the first hash value calculated by the calculation of the first calculation unit 130 and the second hash value calculated by the calculation of the second calculation unit 230 will be the same.
 判定部140は、第1のハッシュ値と第2のハッシュ値とが一致するか否かを判定する。通常であれば、第1のハッシュ値と第2のハッシュ値とは一致する。しかしながら、ハッキングにより取得部120が取得した結合データと異なるデータが取得され、ハッキングされたデータを用いて演算された場合には、第1のハッシュ値と異なるハッシュ値が得られる。そのため、第1のハッシュ値と第2のハッシュ値とが一致するか否かを判定することにより、ハッキングを防止し、セキュリティーを向上させることができる。 The determination unit 140 determines whether the first hash value and the second hash value match. Normally, the first hash value and the second hash value match. However, if data different from the combined data acquired by the acquisition unit 120 is acquired through hacking, and a calculation is performed using the hacked data, a hash value different from the first hash value is obtained. Therefore, by determining whether the first hash value and the second hash value match, it is possible to prevent hacking and improve security.
 操作部210は、ユーザによる電子鍵装置20の操作に基づき、操作要求を生成する。具体的には、ユーザによって電子鍵装置20の解錠スイッチが押されると、操作部210は、自動車1000のドアを解錠する操作要求を生成する。また、ユーザによって電子鍵装置20の施錠スイッチが押されると、操作部210は、自動車1000のドアを施錠する操作要求を生成する。 The operation unit 210 generates an operation request based on the user's operation of the electronic key device 20. Specifically, when the user presses the unlock switch of the electronic key device 20, the operation unit 210 generates an operation request to unlock the doors of the automobile 1000. Also, when the user presses the lock switch of the electronic key device 20, the operation unit 210 generates an operation request to lock the doors of the automobile 1000.
 第1の演算部130および第2の演算部230の各々は、ASIC(Application Specific Integrated Circuit)で構成される。すなわち、第1の演算部130および第2の演算部230は、ナンス値を変動させながらハッシュ値を算出するハッシュ演算に特化した回路構成である。そのため、第1の演算部130および第2の演算部230の演算速度は速く、例えば、その演算速度は、数秒~30秒程度である。一方、ソフトウェアを用いたハッシュ演算は、数時間を要することも少なくない。そのため、電子錠装置10のハッキングには時間を必要とし、現実的には、電子錠装置10をハッキングすることは不可能である。 Each of the first calculation unit 130 and the second calculation unit 230 is configured with an ASIC (Application Specific Integrated Circuit). In other words, the first calculation unit 130 and the second calculation unit 230 are circuit configurations specialized for hash calculations that calculate hash values while varying nonce values. Therefore, the calculation speed of the first calculation unit 130 and the second calculation unit 230 is fast, for example, the calculation speed is about several seconds to 30 seconds. On the other hand, hash calculations using software often require several hours. Therefore, hacking the electronic lock device 10 requires time, and in reality, hacking the electronic lock device 10 is impossible.
 認証部110、取得部120、判定部140、および操作部210は、中央演算処理装置(Central Processing Unit:CPU)またはマイクロプロセッサ(Micro Processing Unit:MPU)がプログラムを実行することにより機能することができる。但し、認証部110、取得部120、および判定部140は、第1の情報処理装置100内のASICに組み込まれていてもよく、操作部210は、第2の情報処理装置200内のASICに組み込まれていてもよい。 The authentication unit 110, acquisition unit 120, judgment unit 140, and operation unit 210 can function by a central processing unit (CPU) or a microprocessor (MPU) executing a program. However, the authentication unit 110, acquisition unit 120, and judgment unit 140 may be incorporated in an ASIC in the first information processing device 100, and the operation unit 210 may be incorporated in an ASIC in the second information processing device 200.
 第1の通信部150および第2の通信部250の各々は、データまたは情報を無線によって送信し、または受信することができる通信インターフェースである。具体的には、第1の通信部150は、第2の演算部230での演算で必要な結合データを送信する。また、第2の通信部250は、ユーザからの操作指示に基づく操作要求、認証部110での処理に必要な第2の識別子261、および第2の演算部230で算出された第2のハッシュ値を送信する。第1の通信部150および第2の通信部250の各々として、例えば、無線LANモジュール、Bluetoothモジュール、またはWi-Fiモジュールなどを用いることができる。 Each of the first communication unit 150 and the second communication unit 250 is a communication interface capable of wirelessly transmitting or receiving data or information. Specifically, the first communication unit 150 transmits combined data required for the calculation in the second calculation unit 230. In addition, the second communication unit 250 transmits an operation request based on an operation instruction from a user, a second identifier 261 required for processing in the authentication unit 110, and a second hash value calculated by the second calculation unit 230. For example, a wireless LAN module, a Bluetooth module, or a Wi-Fi module can be used as each of the first communication unit 150 and the second communication unit 250.
[2.鍵システム1における処理]
 図4および図5を参照して、本発明の一実施形態に係る鍵システム1において実行される処理について説明する。具体的には、以下では、電子鍵装置20を用いて電子錠装置10を操作するときに、第1の情報処理装置100および第2の情報処理装置200で実行される処理について説明する。
2. Processing in Key System 1
4 and 5, the process executed in the key system 1 according to an embodiment of the present invention will be described. Specifically, the process executed in the first information processing device 100 and the second information processing device 200 when the electronic lock device 10 is operated using the electronic key device 20 will be described below.
 図4は、本発明の一実施形態に係る鍵システム1の第1の情報処理装置100および第2の情報処理装置200で実行される処理を説明するシーケンス図である。図5は、本発明の一実施形態に係る鍵システム1の第1の情報処理装置100および第2の情報処理装置200で実行される処理を説明するフローチャートである。 FIG. 4 is a sequence diagram explaining the processing executed by the first information processing device 100 and the second information processing device 200 of the key system 1 according to one embodiment of the present invention. FIG. 5 is a flowchart explaining the processing executed by the first information processing device 100 and the second information processing device 200 of the key system 1 according to one embodiment of the present invention.
 図4および図5に示す処理は、ユーザが電子鍵装置20を用いて電子錠装置10の操作を指示することにより開始される。例えば、ユーザは、電子錠装置10の解錠または施錠の操作を指示するため、電子鍵装置20に設けられた解錠ボタンまたは施錠ボタンを押す。すなわち、電子鍵装置20を用いたユーザからの指示により、図4および図5に示す処理が開始され、ステップS110~ステップS200が実行される。なお、電子鍵装置20が電子錠装置10に所定の距離に近づくことによって、図4および図5に示す処理が開始されてもよい。以下では、図5に示されるステップS110~ステップS200の順に、各ステップの処理について説明する。 The process shown in Figures 4 and 5 is started when the user uses the electronic key device 20 to instruct the electronic lock device 10 to operate. For example, the user presses an unlock button or a lock button provided on the electronic key device 20 to instruct the electronic lock device 10 to be unlocked or locked. That is, the process shown in Figures 4 and 5 is started in response to an instruction from the user using the electronic key device 20, and steps S110 to S200 are executed. Note that the process shown in Figures 4 and 5 may also be started when the electronic key device 20 approaches the electronic lock device 10 within a predetermined distance. Below, the process of each step will be explained in the order of steps S110 to S200 shown in Figure 5.
 ステップS110では、操作部210が、ユーザの操作指示に基づき、操作要求を生成する。例えば、ユーザが電子鍵装置20の解除ボタンを押したとき、操作部210は、電子錠装置10を解錠する操作要求を生成する。また、ユーザが電子鍵装置20の施錠ボタンを押したとき、操作部210は、電子錠装置10を施錠する操作要求を生成する。 In step S110, the operation unit 210 generates an operation request based on the user's operation instruction. For example, when the user presses the release button on the electronic key device 20, the operation unit 210 generates an operation request to unlock the electronic lock device 10. Also, when the user presses the lock button on the electronic key device 20, the operation unit 210 generates an operation request to lock the electronic lock device 10.
 ステップS120では、第2の情報処理装置200から第1の情報処理装置100に、第2の識別子261およびステップS110において生成された操作要求が送信される。 In step S120, the second identifier 261 and the operation request generated in step S110 are sent from the second information processing device 200 to the first information processing device 100.
 ステップS130では、認証部110が、送信された第2の識別子261が登録された識別子であるか否かを判定する。第2の識別子261が登録された識別子であるとき(ステップS130:YES)、第2の識別子261が認証され、ステップS140が実行される。第2の識別子261が登録された識別子でないとき(ステップS130:NO)、第2の識別子261は認証されず、鍵システム1における処理は終了する。 In step S130, the authentication unit 110 determines whether the transmitted second identifier 261 is a registered identifier. If the second identifier 261 is a registered identifier (step S130: YES), the second identifier 261 is authenticated, and step S140 is executed. If the second identifier 261 is not a registered identifier (step S130: NO), the second identifier 261 is not authenticated, and the processing in the key system 1 ends.
 電子錠装置10は、複数の電子鍵装置20によって操作される場合がある。その場合、電子錠装置10を操作することができる電子鍵装置20と電子錠装置10を操作することができない電子鍵装置20とを区別する必要がある。そのため、ステップS130において、複数の電子鍵装置20のそれぞれに割り当てられた識別子を認証することにより、認証された電子鍵装置20のみが電子錠装置10を操作することができるようにする。 The electronic lock device 10 may be operated by multiple electronic key devices 20. In such cases, it is necessary to distinguish between electronic key devices 20 that can operate the electronic lock device 10 and electronic key devices 20 that cannot operate the electronic lock device 10. Therefore, in step S130, the identifiers assigned to each of the multiple electronic key devices 20 are authenticated, so that only authenticated electronic key devices 20 can operate the electronic lock device 10.
 ステップS140では、取得部120が、シード値162および時刻データを取得し、結合する。すなわち、ステップS140では、取得部120が、シード値162と時刻データとが結合された結合データを取得する。結合データに含まれるシード値162は、複数であってもよい。また、結合データには、ワンタイムデータが含まれていることが好ましい。結合データにワンタイムデータが含まれていると、ステップS140が実行されるたびに異なる結合データが取得されるため、ハッキングが防止され、セキュリティーを向上させることができる。 In step S140, the acquisition unit 120 acquires and combines the seed value 162 and the time data. That is, in step S140, the acquisition unit 120 acquires combined data in which the seed value 162 and the time data are combined. The combined data may contain multiple seed values 162. It is also preferable that the combined data contains one-time data. If the combined data contains one-time data, different combined data is acquired each time step S140 is executed, thereby preventing hacking and improving security.
 ステップS150では、第1の情報処理装置100から第2の情報処理装置200に、ステップS140において取得された結合データが送信される。 In step S150, the combined data acquired in step S140 is transmitted from the first information processing device 100 to the second information processing device 200.
 ステップS160では、第1の演算部130が、ナンス値を変動させるハッシュ演算を繰り返し、第1のナンス値および結合データに基づき所定の条件を満たす第1のハッシュ値を算出する。 In step S160, the first calculation unit 130 repeats a hash calculation that varies the nonce value, and calculates a first hash value that satisfies a predetermined condition based on the first nonce value and the combined data.
 ステップS170では、第2の演算部230が、ナンス値を変動させるハッシュ演算を繰り返し、第2のナンス値および結合データに基づき所定の条件を満たす第2のハッシュ値を算出する。 In step S170, the second calculation unit 230 repeats a hash calculation that varies the nonce value, and calculates a second hash value that satisfies a predetermined condition based on the second nonce value and the combined data.
 なお、ステップS160およびステップS170では、設定される所定の条件は共通である。 Note that the same predetermined conditions are set in steps S160 and S170.
 ステップS180では、第2の情報処理装置200から第1の情報処理装置100に、ステップS170において算出された第2のハッシュ値が送信される。 In step S180, the second hash value calculated in step S170 is transmitted from the second information processing device 200 to the first information processing device 100.
 ステップS190では、判定部140が、ステップS160において算出された第1のハッシュ値とステップS180において送信された第2のハッシュ値とが、一致するか否かを判定する。第1のハッシュ値が第2のハッシュ値と一致するとき(ステップS190:YES)、ステップS200が実行される。第1のハッシュ値が第2のハッシュ値と一致しないとき(ステップS190:NO)、鍵システム1における処理は終了する。 In step S190, the determination unit 140 determines whether the first hash value calculated in step S160 and the second hash value transmitted in step S180 match. If the first hash value matches the second hash value (step S190: YES), step S200 is executed. If the first hash value does not match the second hash value (step S190: NO), processing in the key system 1 ends.
 また、第1の演算部130および第2の演算部230は、ソフトウェアによるハッキングに比べて演算速度が速いことを利用し、第1のハッシュ値と第2のハッシュ値との判定に制限時間を設けてもよい。具体的には、ステップS120において第1の情報処理装置と第2の情報処理装置との通信接続が開始された後の所定の基準時(例えば、通信接続開始時、第1の通信部150による結合データの送信時、または第1の演算部130の演算開始時など)から所定時間(例えば、30秒)内に第1のハッシュ値と第2のハッシュ値とが一致しないときには、電子錠装置10が操作されないようにする。そのため、ステップS190では、判定部140は、所定時間内に第2のハッシュ値が取得されないとき、第1のハッシュ値と第2のハッシュ値とが一致しないと判定することもできる。 Furthermore, the first calculation unit 130 and the second calculation unit 230 may set a time limit for determining the first hash value and the second hash value, taking advantage of the fact that the calculation speed is faster than software hacking. Specifically, when the first hash value and the second hash value do not match within a predetermined time (e.g., 30 seconds) from a predetermined reference time (e.g., when the communication connection is started, when the first communication unit 150 transmits the combined data, or when the first calculation unit 130 starts calculation) after the communication connection between the first information processing device and the second information processing device is started in step S120, the electronic lock device 10 is prevented from being operated. Therefore, in step S190, the determination unit 140 can also determine that the first hash value and the second hash value do not match when the second hash value is not acquired within the predetermined time.
 ステップS200では、ステップS120において送信された操作要求に従い、電子錠装置10への所定の操作が実行される。ステップS200が実行されると、鍵システム1における処理は終了する。 In step S200, a predetermined operation is performed on the electronic lock device 10 in accordance with the operation request sent in step S120. When step S200 is executed, processing in the key system 1 ends.
 以上説明したように、鍵システム1では、例えば、自動車1000の電子錠装置10に搭載される第1の情報処理装置100および電子鍵装置20に搭載される第2の情報処理装置200のそれぞれにおいて、復号が困難なハッシュ値が算出されて自動車1000の操作が可能となる。そのため、電子錠装置10のみをハッキングして自動車1000を操作することは非常に困難であり、鍵システム1は、高いセキュリティーを有する。 As described above, in the key system 1, for example, a hash value that is difficult to decrypt is calculated in each of the first information processing device 100 mounted on the electronic lock device 10 of the automobile 1000 and the second information processing device 200 mounted on the electronic key device 20, making it possible to operate the automobile 1000. Therefore, it is very difficult to operate the automobile 1000 by hacking only the electronic lock device 10, and the key system 1 has high security.
<第2実施形態>
 図6~図8を参照して、本発明の一実施形態に係る鍵システム1Aについて説明する。なお、以下では、本実施形態に係る鍵システム1Aの構成が第1実施形態に係る鍵システム1の構成と同様であるとき、鍵システム1Aの構成の説明を省略する場合がある。
Second Embodiment
A key system 1A according to one embodiment of the present invention will be described with reference to Figures 6 to 8. In the following, when the configuration of the key system 1A according to this embodiment is similar to the configuration of the key system 1 according to the first embodiment, the description of the configuration of the key system 1A may be omitted.
 図6は、本発明の一実施形態に係る鍵システム1Aの概要を説明する模式図である。図7は、本発明の一実施形態に係る鍵システム1Aの第1の情報処理装置100Aおよび第2の情報処理装置200で実行される処理を説明するシーケンス図である。図8は、本発明の一実施形態に係る鍵システム1Aの第1の情報処理装置100Aおよび第2の情報処理装置200で実行される処理を説明するフローチャートである。 FIG. 6 is a schematic diagram illustrating an overview of a key system 1A according to one embodiment of the present invention. FIG. 7 is a sequence diagram illustrating the processing executed by a first information processing device 100A and a second information processing device 200 of a key system 1A according to one embodiment of the present invention. FIG. 8 is a flowchart illustrating the processing executed by a first information processing device 100A and a second information processing device 200 of a key system 1A according to one embodiment of the present invention.
 図6に示すように、第1の情報処理装置100Aが搭載された電子錠装置10Aは、カメラ30Aと接続されて設置されている。なお、電子錠装置10Aは、カメラ30Aを含む構成であってもよい。図6では、電子錠装置10Aがカメラ30A近傍に設置されているが、電子錠装置10Aの設置位置はこれに限られない。第1実施形態のように、電子錠装置10Aはドアに設置されていてもよい。また、自動車1000のエンジンを起動するための起動スイッチ40Aが設置されている。 As shown in FIG. 6, an electronic lock device 10A equipped with a first information processing device 100A is connected to a camera 30A. The electronic lock device 10A may also include a camera 30A. In FIG. 6, the electronic lock device 10A is installed near the camera 30A, but the installation position of the electronic lock device 10A is not limited to this. As in the first embodiment, the electronic lock device 10A may be installed in the door. Also, a start switch 40A for starting the engine of the automobile 1000 is installed.
 本実施形態では、自動車1000のエンジンを起動するとき、鍵システム1Aの処理を利用するとともに、ユーザの顔認証を行う。具体的には、ユーザが起動スイッチ40Aを押すと、カメラ30Aによってユーザの顔が撮影される。撮影された顔データに基づき顔認証が行われ、自動車1000のエンジンを起動することができる。 In this embodiment, when starting the engine of the automobile 1000, the processing of the key system 1A is used and the user's face is authenticated. Specifically, when the user presses the start switch 40A, the camera 30A captures a picture of the user's face. Facial authentication is performed based on the captured facial data, and the engine of the automobile 1000 can be started.
 本実施形態では、認証部110が、識別子による認証だけでなく、カメラ30Aで撮影された顔データが予め登録されたユーザの顔であるか否かを判定し、顔認証を行う。具体的には、認証部110は、撮影された顔の目、鼻、または口などの特徴点に基づき、顔認証を行うことができる。撮影された顔データが認証されると、電子錠装置10Aを介して、自動車1000のエンジンを起動することができる。 In this embodiment, the authentication unit 110 not only performs authentication using an identifier, but also performs face authentication by determining whether the facial data captured by the camera 30A is the face of a pre-registered user. Specifically, the authentication unit 110 can perform face authentication based on feature points such as the eyes, nose, or mouth of the captured face. Once the captured facial data has been authenticated, the engine of the automobile 1000 can be started via the electronic lock device 10A.
 続いて、鍵システム1Aの第1の情報処理装置100Aおよび第2の情報処理装置200で実行される処理について説明する。鍵システム1Aの処理では、ステップS130の後にステップS135Aが実行される。 Next, the processing executed by the first information processing device 100A and the second information processing device 200 of the key system 1A will be described. In the processing of the key system 1A, step S135A is executed after step S130.
 ステップS135Aでは、認証部110が、カメラ30Aで撮影された顔データが予め登録されたユーザの顔であるか否かを判定する。撮影された顔データが登録されたユーザの顔であるとき(ステップS135A:YES)、顔データが認証され、ステップS140が実行される。撮影された顔データが登録されたユーザの顔でないとき(ステップS135A:NO)、顔データは認証されず、鍵システム1における処理は終了する。 In step S135A, the authentication unit 110 determines whether the facial data captured by the camera 30A is the face of a pre-registered user. If the captured facial data is the face of a registered user (step S135A: YES), the facial data is authenticated and step S140 is executed. If the captured facial data is not the face of a registered user (step S135A: NO), the facial data is not authenticated and processing in the key system 1 ends.
 本実施形態では、顔認証などの生体認証を利用して自動車1000のエンジンを起動することができる。生体認証によってセキュリティーの向上を図ることはできるが、生体認証もハッキングされる可能性がある。しかしながら、鍵システム1Aでは、顔認証に加えて、第1の演算部130で算出された第1のハッシュ値および第2の演算部230で算出された第2のハッシュ値に基づく判定が行われる。電子鍵装置20がなければ第2のハッシュ値を算出することができないため、自動車1000をハッキングして盗難することは非常に困難である。そのため、鍵システム1Aでは、ハッキングが大幅に防止され、セキュリティーを向上させることができる。 In this embodiment, the engine of the automobile 1000 can be started using biometric authentication such as facial recognition. Although biometric authentication can improve security, it can also be hacked. However, in the key system 1A, in addition to facial recognition, a determination is made based on a first hash value calculated by the first calculation unit 130 and a second hash value calculated by the second calculation unit 230. Since the second hash value cannot be calculated without the electronic key device 20, it is very difficult to hack the automobile 1000 and steal it. Therefore, the key system 1A can significantly prevent hacking and improve security.
 なお、取得部120は、カメラ30Aで撮影された顔データを含む結合データを取得してもよい。顔データは、エンジンの起動操作のたびに生成されるため、ワンタイムデータとして利用することができる。 The acquisition unit 120 may also acquire combined data including face data captured by the camera 30A. The face data is generated each time the engine is started, and can therefore be used as one-time data.
 以上説明したように、鍵システム1Aでは、顔認証に加えて、自動車1000の電子錠装置10Aに搭載される第1の情報処理装置100Aおよび電子鍵装置20に搭載される第2の情報処理装置200のそれぞれにおいて、復号が困難なハッシュ値が算出されて自動車1000のエンジンが起動される。そのため、電子錠装置10Aのみをハッキングして自動車1000のエンジンを起動することは非常に困難であり、鍵システム1Aは、高いセキュリティーを有する。 As described above, in the key system 1A, in addition to facial authentication, a hash value that is difficult to decrypt is calculated in each of the first information processing device 100A mounted on the electronic lock device 10A of the automobile 1000 and the second information processing device 200 mounted on the electronic key device 20, and the engine of the automobile 1000 is started by the calculation. Therefore, it is very difficult to start the engine of the automobile 1000 by hacking only the electronic lock device 10A, and the key system 1A has high security.
<第3実施形態>
 第1実施形態および第2実施形態において説明した鍵システムは、電子鍵装置(電子鍵装置は複数であってもよい。)を用いて、電子鍵装置に対応する電子錠装置を操作するシステムである。しかしながら、第1の情報処理装置100および第2の情報処理装置200の基本構成は、複数の電子装置間のデータの送受信において利用することもできる。この場合、複数の電子装置間において、セキュリティーの高いデータの送受信が可能である。そこで、図9~図12を参照して、本発明の一実施形態に係る情報通信システム2について説明する。なお、以下では、本実施形態に係る情報通信システム2の構成が、第1実施形態に係る鍵システム1または第2実施形態に係る鍵システム1Aの構成と同様であるとき、情報通信システム2の構成の説明を省略する場合がある。
Third Embodiment
The key system described in the first and second embodiments is a system that uses an electronic key device (there may be multiple electronic key devices) to operate an electronic lock device corresponding to the electronic key device. However, the basic configuration of the first information processing device 100 and the second information processing device 200 can also be used in transmitting and receiving data between multiple electronic devices. In this case, highly secure data can be transmitted and received between the multiple electronic devices. Therefore, an information communication system 2 according to an embodiment of the present invention will be described with reference to Figs. 9 to 12. Note that, hereinafter, when the configuration of the information communication system 2 according to this embodiment is the same as the configuration of the key system 1 according to the first embodiment or the key system 1A according to the second embodiment, the description of the configuration of the information communication system 2 may be omitted.
[1.情報通信システム2の構成]
 図9は、本発明の一実施形態に係る情報通信システム2の概要を説明する模式図である。
[1. Configuration of information communication system 2]
FIG. 9 is a schematic diagram illustrating an overview of an information communication system 2 according to an embodiment of the present invention.
 図9に示すように、情報通信システム2は、第1の電子装置2000-1、第2の電子装置2000-2、第3の電子装置2000-3、および第4の電子装置2000-4を含む。図9では、便宜上、4個の電子装置2000が図示されているが、情報通信システム2は、複数の電子装置2000間で利用することが可能である(以下では、複数の電子装置2000を、第nの電子装置2000-n(nは2以上の整数)として説明する場合がある。)。第1の電子装置2000-1~第4の電子装置2000-4は、ネットワークNWを介して互いに通信可能に接続される。なお、ネットワークNWは、有線であってもよく、無線であってもよい。情報通信システム2では、複数の電子装置2000の一部が有線で通信可能に接続されていてもよい。ネットワークNWが有線である場合、有線で接続される電子装置2000間のみで通信可能であってもよい。 9, the information and communication system 2 includes a first electronic device 2000-1, a second electronic device 2000-2, a third electronic device 2000-3, and a fourth electronic device 2000-4. Although four electronic devices 2000 are illustrated in FIG. 9 for convenience, the information and communication system 2 can be used among a plurality of electronic devices 2000 (hereinafter, the plurality of electronic devices 2000 may be described as an n-th electronic device 2000-n (n is an integer of 2 or more)). The first electronic device 2000-1 to the fourth electronic device 2000-4 are connected to each other so as to be able to communicate with each other via a network NW. The network NW may be wired or wireless. In the information and communication system 2, some of the plurality of electronic devices 2000 may be connected to each other so as to be able to communicate with each other via a wire. If the network NW is wired, communication may be possible only among the electronic devices 2000 connected by wire.
 情報通信システム2は、例えば、オフィス、住宅、または工場などにおいて導入され、暗号化通信として利用することが可能である。 The information and communication system 2 can be installed, for example, in an office, a home, or a factory, and can be used for encrypted communication.
 電子装置2000は、データまたは情報を送信し、または受信することができる、あらゆる装置である。例えば、電子装置2000は、データまたは情報を送受信するサーバ(第1の電子装置2000-1)もしくは情報通信端末(第2の電子装置2000-2)、撮影された映像データを送信するカメラ(第3の電子装置2000-3)、または検出された信号データを送信するセンサ(第4の電子装置2000-4)などであるが、これらに限られない。 The electronic device 2000 is any device capable of transmitting or receiving data or information. For example, the electronic device 2000 may be, but is not limited to, a server (first electronic device 2000-1) or an information communication terminal (second electronic device 2000-2) that transmits and receives data or information, a camera (third electronic device 2000-3) that transmits captured video data, or a sensor (fourth electronic device 2000-4) that transmits detected signal data.
 第nの電子装置2000-nには、後述する第nの情報処理装置300-nが搭載される。第nの情報処理装置300-nは、第nの電子装置2000-nの機能を構成する部品の一部に組み込まれていてもよく、第nの電子装置2000-nの機能を構成する部品とは別に設置されていてもよい。後者の場合、第nの電子装置2000-nに第nの情報処理装置300-nを挿入し、装着し、または換装することにより、情報通信システム2を利用することができる。なお、以下では、n個の第nの情報処理装置300-nを特に区別しないとき、単に情報処理装置300として説明する場合がある。 The nth electronic device 2000-n is equipped with the nth information processing device 300-n described below. The nth information processing device 300-n may be incorporated as part of the components that configure the functions of the nth electronic device 2000-n, or may be installed separately from the components that configure the functions of the nth electronic device 2000-n. In the latter case, the information communication system 2 can be used by inserting, attaching, or replacing the nth information processing device 300-n into the nth electronic device 2000-n. Note that, hereinafter, when the n nth information processing devices 300-n are not particularly distinguished from one another, they may be simply described as information processing devices 300.
 図10は、本発明の一実施形態に係る情報通信システム2の第nの電子装置2000-nに搭載される第nの情報処理装置300-nの構成を示すブロック図である。 FIG. 10 is a block diagram showing the configuration of the nth information processing device 300-n installed in the nth electronic device 2000-n of an information communication system 2 according to one embodiment of the present invention.
 図10に示すように、第nの情報処理装置300-nは、第nの認証部310-n、第nの取得部320-n、第nの演算部330-n、第nの判定部340-n、および第nの記憶部360-nを含む。また、第nの記憶部360-nは、第nの識別子361-nを含む。第nの認証部310-n、第nの演算部330-n、第nの判定部340-n、および第nの記憶部360-nは、それぞれ、第1の情報処理装置100の認証部110、第1の演算部130、判定部140、および第1の記憶部160と同様であるため、ここでは説明を省略する。 As shown in FIG. 10, the nth information processing device 300-n includes an nth authentication unit 310-n, an nth acquisition unit 320-n, an nth calculation unit 330-n, an nth judgment unit 340-n, and an nth storage unit 360-n. The nth storage unit 360-n also includes an nth identifier 361-n. The nth authentication unit 310-n, the nth calculation unit 330-n, the nth judgment unit 340-n, and the nth storage unit 360-n are similar to the authentication unit 110, the first calculation unit 130, the judgment unit 140, and the first storage unit 160 of the first information processing device 100, respectively, and therefore will not be described here.
 なお、第nの電子装置2000-nが通信部を備えていないとき、第nの情報処理装置300-nは、通信部を含んでいてもよい。 Note that when the nth electronic device 2000-n does not have a communication unit, the nth information processing device 300-n may include a communication unit.
 第nの取得部320-nは、他の情報処理装置に送信するデータ(以下、「送信用データ」という。)および時刻データを取得し、取得したデータを結合する。すなわち、第nの取得部320-nは、送信用データと時刻データとが結合された結合データを取得する。換言すると、送信用データは、時刻データと結合化されることにより、暗号化される。 The nth acquisition unit 320-n acquires data to be transmitted to another information processing device (hereinafter referred to as "transmission data") and time data, and combines the acquired data. In other words, the nth acquisition unit 320-n acquires combined data in which the transmission data and the time data are combined. In other words, the transmission data is encrypted by combining it with the time data.
 第nの取得部320-nは、時刻データ以外のデータを取得することもできる。例えば、第nの取得部320-nは、第nの識別子361-nまたは他の情報処理装置の情報処理装置の識別子などを取得することもできる。また、第nの取得部320-nは、送信用データの一部を取得することもできる。第nの取得部320-nは、取得したデータの少なくとも1つと送信用データとを結合し、暗号化された結合データを取得する。 The nth acquisition unit 320-n can also acquire data other than time data. For example, the nth acquisition unit 320-n can also acquire the nth identifier 361-n or the identifier of an information processing device of another information processing device. The nth acquisition unit 320-n can also acquire a portion of the data to be transmitted. The nth acquisition unit 320-n combines at least one of the acquired data with the data to be transmitted to acquire encrypted combined data.
 第nの識別子361-nは、第nの情報処理装置300-nを識別するための固有のデータである。情報通信システム2では、複数の電子装置2000間で通信接続が行われるため、登録されている第nの識別子361-nを通じて複数の電子装置2000の各々を識別することができる。 The nth identifier 361-n is unique data for identifying the nth information processing device 300-n. In the information and communication system 2, a communication connection is established between multiple electronic devices 2000, so each of the multiple electronic devices 2000 can be identified through the registered nth identifier 361-n.
[2.情報通信システム2における処理]
 図11および図12を参照して、本発明の一実施形態に係る情報通信システム2において実行される処理について説明する。具体的には、以下では、第sの電子装置2000-sから第tの電子装置2000-tにデータが送信されるときに、第sの電子装置2000-sの第sの情報処理装置300-sおよび第tの電子装置2000-tの第tの情報処理装置300-tで実行される処理について説明する。
[2. Processing in Information and Communication System 2]
11 and 12, a process executed in the information communication system 2 according to an embodiment of the present invention will be described. Specifically, a process executed in the sth information processing device 300-s of the sth electronic device 2000-s and the tth information processing device 300-t of the tth electronic device 2000-t when data is transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t will be described below.
 図11は、本発明の一実施形態に係る情報通信システム2において、第sの情報処理装置300-sおよび第tの情報処理装置300-tで実行される処理を説明するシーケンス図である。図12は、本発明の一実施形態に係る情報通信システム2において、第tの情報処理装置300-tで実行される処理を説明するフローチャートである。 FIG. 11 is a sequence diagram explaining the processing executed by the sth information processing device 300-s and the tth information processing device 300-t in an information communication system 2 according to one embodiment of the present invention. FIG. 12 is a flowchart explaining the processing executed by the tth information processing device 300-t in an information communication system 2 according to one embodiment of the present invention.
 図11および図12に示す処理は、第sの電子装置2000-sにおいて、第tの電子装置2000-tに送信用データを送信する命令に基づいて開始される。以下では、図12に示されるステップS310~ステップS390の順に、各ステップの処理について説明する。 The processing shown in Figures 11 and 12 is started in the sth electronic device 2000-s based on a command to transmit transmission data to the tth electronic device 2000-t. Below, the processing of each step will be explained in the order of steps S310 to S390 shown in Figure 12.
 ステップS310では、第sの電子装置2000-sから第tの電子装置2000-tに、第sの識別子361-sが送信される。 In step S310, the sth identifier 361-s is transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t.
 ステップS320では、第tの認証部310-tが、送信された第sの識別子361-sが登録された識別子であるか否かを判定する。第sの識別子361-sが登録された識別子であるとき(ステップS320:YES)、第sの識別子361-sが認証され、ステップS330が実行される。第sの識別子361-sが登録された識別子でないとき(ステップS320:NO)、第sの識別子361-sは認証されず、情報通信システム2における処理は終了する。 In step S320, the tth authentication unit 310-t determines whether the transmitted sth identifier 361-s is a registered identifier. If the sth identifier 361-s is a registered identifier (step S320: YES), the sth identifier 361-s is authenticated, and step S330 is executed. If the sth identifier 361-s is not a registered identifier (step S320: NO), the sth identifier 361-s is not authenticated, and the processing in the information communication system 2 ends.
 ステップS330では、第tの電子装置2000-tから第sの電子装置2000-sに、第tの電子装置2000-tにおいて第sの識別子361-sが認証されたことを示す(すなわち、第sの電子装置2000-sと第tの電子装置2000-tとの間で通信接続可能であることを示す)認証済み情報が送信される。なお、認証済み情報は、第tの認証部310-tで生成されてもよい。 In step S330, authenticated information is transmitted from the t-th electronic device 2000-t to the s-th electronic device 2000-s, indicating that the s-th identifier 361-s has been authenticated in the t-th electronic device 2000-t (i.e., indicating that a communication connection is possible between the s-th electronic device 2000-s and the t-th electronic device 2000-t). Note that the authenticated information may be generated by the t-th authentication unit 310-t.
 ステップS340では、取得部320が、送信用データおよび時刻データを取得し、結像する。 In step S340, the acquisition unit 320 acquires the transmission data and time data and forms an image.
 ステップS350では、第sの電子装置2000-sから第tの電子装置2000-tに、結合データが送信される。 In step S350, the combined data is transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t.
 ステップS360では、第sの演算部330-sが、ナンス値を変動させるハッシュ演算を繰り返し、第sのナンス値および結合データに基づき所定の条件を満たす第sのハッシュ値を算出する。 In step S360, the sth calculation unit 330-s repeats a hash calculation that varies the nonce value, and calculates the sth hash value that satisfies a predetermined condition based on the sth nonce value and the combined data.
 ステップS370では、第tの演算部330-tが、ナンス値を変動させるハッシュ演算を繰り返し、第tのナンス値および結合データに基づき所定の条件を満たす第tのハッシュ値を算出する。 In step S370, the t-th calculation unit 330-t repeats the hash calculation that varies the nonce value, and calculates the t-th hash value that satisfies a predetermined condition based on the t-th nonce value and the combined data.
 なお、ステップS360およびステップS370では、設定される所定の条件は共通である。 Note that the same predetermined conditions are set in steps S360 and S370.
 ステップS380では、第sの電子装置2000-sから第tの電子装置2000-tに、ステップS360において算出された第sのハッシュ値が送信される。 In step S380, the sth hash value calculated in step S360 is transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t.
 ステップS390では、第tの判定部が、ステップS370において算出された第tのハッシュ値とステップS380において送信された第sのハッシュ値とが、一致するか否かを判定する。第tのハッシュ値が第sのハッシュ値と一致するとき(ステップS390:YES)、ステップS400が実行される。第tのハッシュ値が第sのハッシュ値と一致しないとき(ステップS390:NO)、情報通信システム2における処理は終了する。 In step S390, the tth determination unit determines whether the tth hash value calculated in step S370 and the sth hash value transmitted in step S380 match. When the tth hash value matches the sth hash value (step S390: YES), step S400 is executed. When the tth hash value does not match the sth hash value (step S390: NO), processing in the information and communication system 2 ends.
 ステップS400では、第tの電子装置2000-tにおいて、結合データから送信用データを復号する。これにより、第tの電子装置2000-tにおいて、送信用データを取得することができる。なお、送信用データを復号するとき、第sの電子装置2000-sから必要な情報を取得してもよい。この場合、第tの電子装置2000-tから第sの電子装置2000-sに、ステップS370において算出された第tのハッシュ値を送信してもよい。第sの判定部340-sが第sのハッシュ値と第tのハッシュ値とが一致するか否かを判定し、第sのハッシュ値と第tのハッシュ値とが一致するとき、第sの電子装置2000-sから第tの電子装置2000-tに必要な情報が送信される。 In step S400, the t-th electronic device 2000-t decrypts the transmission data from the combined data. This allows the t-th electronic device 2000-t to obtain the transmission data. When decrypting the transmission data, necessary information may be obtained from the s-th electronic device 2000-s. In this case, the t-th hash value calculated in step S370 may be transmitted from the t-th electronic device 2000-t to the s-th electronic device 2000-s. The s-th determination unit 340-s determines whether the s-th hash value and the t-th hash value match, and when the s-th hash value and the t-th hash value match, the necessary information is transmitted from the s-th electronic device 2000-s to the t-th electronic device 2000-t.
 以上説明したように、情報通信システム2では、第sの電子装置2000-sから第tの電子装置2000-tに送信される送信用データが結合データとして暗号化される。また、第sの電子装置2000-sの第sの情報処理装置300-sを用いて算出される第sのハッシュ値と第tの電子装置2000-tの第tの情報処理装置300-tを用いて算出される第tのハッシュ値とが一致するとき、結合データが復号されて送信用データが取得される。ソフトウェアによるハッシュ値の算出は非常に困難であるため、情報通信システム2は、高いセキュリティーを有する。 As described above, in the information communication system 2, the transmission data transmitted from the sth electronic device 2000-s to the tth electronic device 2000-t is encrypted as combined data. Furthermore, when the sth hash value calculated using the sth information processing device 300-s of the sth electronic device 2000-s matches the tth hash value calculated using the tth information processing device 300-t of the tth electronic device 2000-t, the combined data is decrypted and the transmission data is obtained. Since it is very difficult to calculate a hash value using software, the information communication system 2 has a high level of security.
<第4実施形態>
 第3実施形態において説明した情報通信システム2の情報処理装置300は、ルータを介して通信接続されるネットワーク環境における暗号化通信にも利用することができる。そこで、図13を参照して、本発明の一実施形態に係る情報通信システム3について説明する。なお、以下では、本実施形態に係る情報通信システム3の構成が、第3実施形態に係る情報通信システム2と同様であるとき、情報通信システム3の構成の説明を省略する場合がある。
Fourth Embodiment
The information processing device 300 of the information communication system 2 described in the third embodiment can also be used for encrypted communication in a network environment connected for communication via a router. Therefore, an information communication system 3 according to an embodiment of the present invention will be described with reference to Fig. 13. Note that, in the following, when the configuration of the information communication system 3 according to this embodiment is the same as that of the information communication system 2 according to the third embodiment, the description of the configuration of the information communication system 3 may be omitted.
 図13は、本発明の一実施形態に係る情報通信システム3の概要を説明する模式図である。 FIG. 13 is a schematic diagram illustrating an overview of an information and communication system 3 according to one embodiment of the present invention.
 図13に示すように、情報通信システム3は、情報処理装置300を含まない情報通信端末2100(第1の情報通信端末2100-1、第2の情報通信端末2100-2、および第3の情報通信端末2100-3)、情報処理装置300を含む情報通信端末2200、情報処理装置300を含まないルータ2300、および情報処理装置300を含むルータ2400を含む。情報通信端末2100および2200、ならびにルータ2300および2400は、第3実施形態において説明した電子装置2000に対応するものである。情報通信端末2200は、情報処理装置300を利用する通信接続を行うことができる。同様に、ルータ2400は、情報処理装置300を利用する通信接続を行うことができる。第1の情報通信端末2100-1および情報通信端末2200の各々は、ネットワークNW1を介してルータ2300と通信可能に接続されている。第2の情報通信端末2100-2および第3の情報通信端末2100-3の各々は、ネットワークNW2を介してルータ2400と通信可能に接続されている。ルータ2300は、ネットワークNW3を介してルータ2400と通信可能に接続されている。ネットワークNW1およびネットワークNW2は、例えば、LANである。また、ネットワークNW3は、例えば、インターネットまたはWANである。ネットワークNW1、ネットワークNW2、ネットワークNW3は、有線であってもよく、無線であってもよい。 13, the information communication system 3 includes information communication terminals 2100 (first information communication terminal 2100-1, second information communication terminal 2100-2, and third information communication terminal 2100-3) that do not include an information processing device 300, an information communication terminal 2200 that includes an information processing device 300, a router 2300 that does not include an information processing device 300, and a router 2400 that includes an information processing device 300. The information communication terminals 2100 and 2200, and the routers 2300 and 2400 correspond to the electronic device 2000 described in the third embodiment. The information communication terminal 2200 can make a communication connection using the information processing device 300. Similarly, the router 2400 can make a communication connection using the information processing device 300. Each of the first information communication terminal 2100-1 and the information communication terminal 2200 is communicatively connected to the router 2300 via the network NW1. Each of the second information communication terminal 2100-2 and the third information communication terminal 2100-3 is communicatively connected to the router 2400 via the network NW2. The router 2300 is communicatively connected to the router 2400 via the network NW3. The networks NW1 and NW2 are, for example, LANs. The network NW3 is, for example, the Internet or a WAN. The networks NW1, NW2, and NW3 may be wired or wireless.
 情報通信システム3におけるネットワーク環境を大別すると、概ね3つに分類される。第1のネットワーク環境NE1は、第1の情報通信端末2100-1のみまたは第1の情報通信端末2100-1およびルータ2300によって構築され、情報処理装置300を利用することができないネットワーク環境である。第1のネットワーク環境NE1では、外部と通信接続するときに情報処理装置300を利用することができない。第2のネットワーク環境NE2は、情報通信端末2200または情報通信端末2200およびルータ2300によって構築され、情報処理装置300を利用することができるネットワーク環境である。また、第3のネットワーク環境NE3は、第2の情報通信端末2100-2、第3の情報通信端末2100-3、およびルータ2400によって構築され、情報処理装置300を利用することができるネットワーク環境である。第3のネットワーク環境NE3は、企業などにおける社内LANということもできる。第2のネットワーク環境NE2および第3のネットワーク環境NE3では、外部と通信接続するときに情報処理装置300を利用することができる。以下、第1のネットワーク環境NE1~第3のネットワーク環境NE3における通信接続について詳細に説明する。 The network environments in the information communication system 3 can be roughly divided into three types. The first network environment NE1 is constructed by only the first information communication terminal 2100-1 or the first information communication terminal 2100-1 and the router 2300, and is a network environment in which the information processing device 300 cannot be used. In the first network environment NE1, the information processing device 300 cannot be used when communicating with the outside. The second network environment NE2 is constructed by the information communication terminal 2200 or the information communication terminal 2200 and the router 2300, and is a network environment in which the information processing device 300 can be used. The third network environment NE3 is constructed by the second information communication terminal 2100-2, the third information communication terminal 2100-3, and the router 2400, and is a network environment in which the information processing device 300 can be used. The third network environment NE3 can also be said to be an in-house LAN in a company, etc. In the second network environment NE2 and the third network environment NE3, the information processing device 300 can be used when establishing a communication connection with the outside. The communication connections in the first network environment NE1 to the third network environment NE3 are described in detail below.
[1.第1のネットワーク環境NE1を含む通信接続]
 第1の情報通信端末2100-1は情報処理装置300を含まない。また、ルータ2300も情報処理装置300を含まない。そのため、第1の情報通信端末2100-1は、第2の情報通信端末2100-2、第3の情報通信端末2100-3、または情報通信端末2200とのデータの送受信において、情報処理装置300を利用して暗号化されたデータを送受信することができない。この場合、従来の方法によって暗号化されたデータの送受信が実行される。なお、複数の第1のネットワーク環境NE1が存在する場合、複数の第1のネットワーク環境NE1間における通信接続は上述と同様である。
[1. Communication connection including first network environment NE1]
The first information communication terminal 2100-1 does not include the information processing device 300. Also, the router 2300 does not include the information processing device 300. Therefore, the first information communication terminal 2100-1 cannot transmit and receive encrypted data using the information processing device 300 when transmitting and receiving data with the second information communication terminal 2100-2, the third information communication terminal 2100-3, or the information communication terminal 2200. In this case, transmission and reception of data encrypted by a conventional method is performed. Note that, when multiple first network environments NE1 exist, the communication connection between the multiple first network environments NE1 is the same as described above.
[2.第2のネットワーク環境NE2同士の通信接続]
 情報通信端末2200は情報処理装置300を含む。そのため、複数の第2のネットワーク環境NE2が存在する場合、情報通信端末2200間では情報処理装置300を利用して暗号化されたデータを送受信することができる。第2のネットワーク環境NE2同士におけるデータの送受信においては、悪意のある第三者がデータを傍受しても、データを容易に復号することはできない。
[2. Communication connection between second network environments NE2]
The information communication terminal 2200 includes the information processing device 300. Therefore, when a plurality of second network environments NE2 exist, encrypted data can be transmitted and received between the information communication terminals 2200 using the information processing device 300. In data transmission and reception between the second network environments NE2, even if a malicious third party intercepts the data, the data cannot be easily decrypted.
[3.第3のネットワーク環境NE3内における通信接続]
 第2の情報通信端末2100-2および第3の情報通信端末2100-3の各々は、情報処理装置300を含まない。そのため、第2の情報通信端末2100-2と第3の情報通信端末2100-3とのデータの送受信において、情報処理装置300を利用して暗号化されたデータを送受信することができない。この場合、暗号化されないデータまたは従来の方法によって暗号化されたデータの送受信が実行される。
[3. Communication connection within the third network environment NE3]
Each of the second information communication terminal 2100-2 and the third information communication terminal 2100-3 does not include the information processing device 300. Therefore, in data transmission and reception between the second information communication terminal 2100-2 and the third information communication terminal 2100-3, it is not possible to transmit and receive encrypted data using the information processing device 300. In this case, transmission and reception of unencrypted data or data encrypted by a conventional method is performed.
[4.第2のネットワーク環境NE2と第3のネットワーク環境NE3との通信接続]
 第2のネットワーク環境NE2の情報通信端末2200は情報処理装置300を含む。また、第3のネットワーク環境NE3のルータ2400も情報処理装置300を含む。第3のネットワーク環境NE3では、ルータ2400の情報処理装置300により、データを暗号化し、または復号化することができる。そのため、情報通信端末2200と第2の情報通信端末2100-2または第3の情報通信端末2100-3との間では、情報処理装置300を利用して暗号化されたデータを送受信することができる。第2のネットワーク環境NE2と第3のネットワーク環境NE3との間におけるデータの送受信においては、悪意のある第三者がデータを傍受しても、データを容易に復号することはできない。
[4. Communication connection between the second network environment NE2 and the third network environment NE3]
The information communication terminal 2200 in the second network environment NE2 includes an information processing device 300. The router 2400 in the third network environment NE3 also includes an information processing device 300. In the third network environment NE3, data can be encrypted or decrypted by the information processing device 300 of the router 2400. Therefore, encrypted data can be transmitted and received between the information communication terminal 2200 and the second information communication terminal 2100-2 or the third information communication terminal 2100-3 using the information processing device 300. In transmitting and receiving data between the second network environment NE2 and the third network environment NE3, even if a malicious third party intercepts the data, the data cannot be easily decrypted.
 以上説明したように、情報通信システム3では、情報処理装置300を含む情報通信端末2200間、または情報処理装置300を含む情報通信端末2200と情報処理装置300を含むルータ2400との間で暗号化されたされたデータの送受信を実行することができる。情報処理装置300は部品(例えば、チップ)として提供することができる。そのため、情報通信端末2100に情報処理装置300を挿入し、装着し、または換装することにより、情報通信端末2100を情報通信端末2200として利用することが可能である。同様に、ルータ2300に情報処理装置300を挿入し、装着し、または換装することにより、ルータ2300をルータ2400として利用することができる。このように、情報通信システム3では、ネットワーク環境に情報処理装置300を導入することにより、情報処理装置300を利用して暗号化されたデータの送受信を実行することができる。その結果、情報通信システム3では、ネットワーク環境に応じてセキュリティーを高めることができる。 As described above, in the information communication system 3, encrypted data can be transmitted and received between the information communication terminals 2200 including the information processing device 300, or between the information communication terminal 2200 including the information processing device 300 and the router 2400 including the information processing device 300. The information processing device 300 can be provided as a component (e.g., a chip). Therefore, by inserting, mounting, or replacing the information processing device 300 into the information communication terminal 2100, it is possible to use the information communication terminal 2100 as the information communication terminal 2200. Similarly, by inserting, mounting, or replacing the information processing device 300 into the router 2300, it is possible to use the router 2300 as the router 2400. In this way, in the information communication system 3, by introducing the information processing device 300 into the network environment, it is possible to transmit and receive encrypted data using the information processing device 300. As a result, in the information communication system 3, security can be increased according to the network environment.
 本発明の実施形態として上述した各実施形態は、相互に矛盾しない限りにおいて、適宜組み合わせて実施することができる。また、各実施形態を基にして、当業者が適宜構成要素の追加、削除、または設計変更を行ったものも、本発明の要旨を備えている限り、本発明の範囲に含まれる。 The above-described embodiments of the present invention may be implemented in any suitable combination, provided they are not mutually inconsistent. Furthermore, any embodiment in which a person skilled in the art appropriately adds or deletes components or modifies the design is also included within the scope of the present invention, so long as it contains the gist of the present invention.
 また、上述した各実施形態によりもたらされる作用効果とは異なる他の作用効果であっても、本明細書の記載から明らかなもの、または、当業者において容易に予測し得るものについては、当然に本発明によりもたらされるものと理解される。 Furthermore, even if there are other effects and advantages different from those brought about by the above-mentioned embodiments, if they are clear from the description in this specification or can be easily predicted by a person skilled in the art, they are naturally understood to be brought about by the present invention.
1、1A:鍵システム
2、3:情報通信システム
10、10A:電子錠装置
20:電子鍵装置
30A:カメラ
40A:起動スイッチ
100、100A:第1の情報処理装置
110:認証部
120:取得部
130:第1の演算部
140:判定部
150:第1の通信部
160:第1の記憶部
161:第1の識別子
162:シード値
200:第2の情報処理装置
210:操作部
230:第2の演算部
250:第2の通信部
260:第2の記憶部
261:第2の識別子
300:情報処理装置
300-n:第nの情報処理装置
310-n:第nの認証部
320-n:第nの取得部
330-n:第nの演算部
340-n:第nの判定部
360-n:第nの記憶部
361-n:第nの識別子
1000:自動車
2000:電子装置
2100:情報処理装置を含まない情報通信端末
2200:情報処理装置を含む情報通信端末
2300:情報処理装置を含まないルータ
2400:情報処理装置を含むルータ
NE1:第1のネットワーク環境
NE2:第2のネットワーク環境
NE3:第3のネットワーク環境
NW、NW1、NW2、NW3:ネットワーク
 
1, 1A: Key system 2, 3: Information and communication system 10, 10A: Electronic lock device 20: Electronic key device 30A: Camera 40A: Start switch 100, 100A: First information processing device 110: Authentication unit 120: Acquisition unit 130: First calculation unit 140: Determination unit 150: First communication unit 160: First memory unit 161: First identifier 162: Seed value 200: Second information processing device 210: Operation unit 230: Second calculation unit 250: Second communication unit 260: Second memory unit 261: Second identifier 300: Information processing device 300-n: nth information processing device 3 10-n: nth authentication unit 320-n: nth acquisition unit 330-n: nth calculation unit 340-n: nth judgment unit 360-n: nth storage unit 361-n: nth identifier 1000: automobile 2000: electronic device 2100: information communication terminal not including an information processing device 2200: information communication terminal including an information processing device 2300: router not including an information processing device 2400: router including an information processing device NE1: first network environment NE2: second network environment NE3: third network environment NW, NW1, NW2, NW3: network

Claims (19)

  1.  電子錠装置に含まれる第1の情報処理装置と、
     前記電子錠装置を操作する電子鍵装置に含まれ、前記第1の情報処理装置と通信可能に接続する第2の情報処理装置と、を含み、
     前記第1の情報処理装置と前記第2の情報処理装置との通信接続が開始された後、前記第1の情報処理装置が、少なくとも第1のデータおよび前記第1のデータと異なる第2のデータが結合された結合データを取得し、
     前記第1の情報処理装置が、前記結合データを前記第2の情報処理装置に送信し、
     前記第1の情報処理装置が、第1のナンス値および前記結合データに基づき所定の条件を満たす第1のハッシュ値を算出し、
     前記第2の情報処理装置が、第2のナンス値および受信した前記結合データに基づき前記所定の条件を満たす第2のハッシュ値を算出し、
     前記第1の情報処理装置が、前記第1のハッシュ値と前記第2のハッシュ値とが一致するか否かを判定する、鍵システム。
    A first information processing device included in an electronic lock device;
    a second information processing device that is included in an electronic key device that operates the electronic lock device and is communicatively connected to the first information processing device;
    After a communication connection between the first information processing device and the second information processing device is started, the first information processing device acquires combined data in which at least first data and second data different from the first data are combined;
    The first information processing device transmits the combined data to the second information processing device;
    the first information processing device calculates a first hash value that satisfies a predetermined condition based on a first nonce value and the combined data;
    the second information processing device calculates a second hash value that satisfies the predetermined condition based on a second nonce value and the received combined data;
    The first information processing device determines whether the first hash value and the second hash value match.
  2.  前記第1のハッシュ値と前記第2のハッシュ値とが一致するとき、前記電子錠装置への所定の操作が実行される、請求項1に記載の鍵システム。 The key system of claim 1, wherein a predetermined operation is performed on the electronic lock device when the first hash value and the second hash value match.
  3.  前記第1のデータはワンタイムデータであり、
     前記ワンタイムデータは、日付データ、時刻データ、または日時データである、請求項1に記載の鍵システム。
    the first data is one-time data;
    The key system according to claim 1 , wherein the one-time data is date data, time data, or date and time data.
  4.  前記第1のデータはワンタイムデータであり、
     前記ワンタイムデータは、前記電子錠装置の位置データである、請求項1に記載の鍵システム。
    the first data is one-time data;
    The key system of claim 1 , wherein the one-time data is location data of the electronic lock device.
  5.  前記第2のデータは固有データであり、
     前記固有データは、前記電子錠装置の識別子である、請求項1に記載の鍵システム。
    the second data is unique data;
    The key system of claim 1 , wherein the unique data is an identifier of the electronic lock device.
  6.  前記第2のデータは固有データであり、
     前記固有データは、前記第1の情報処理装置に登録されている複数の電子鍵装置の識別子から選ばれた1つである、請求項1に記載の鍵システム。
    the second data is unique data;
    2. The key system according to claim 1, wherein the unique data is one selected from identifiers of a plurality of electronic key devices registered in the first information processing device.
  7.  前記第2のデータは、ユーザに固有のユーザデータである、請求項1に記載の鍵システム。 The key system of claim 1, wherein the second data is user data specific to a user.
  8.  前記ユーザデータは、前記ユーザの生体情報である、請求項7に記載の鍵システム。 The key system of claim 7, wherein the user data is biometric information of the user.
  9.  前記ユーザデータは、前記ユーザが所持する物品の識別情報である、請求項7に記載の鍵システム。 The key system of claim 7, wherein the user data is identification information of an item possessed by the user.
  10.  前記電子錠装置は、車両に設置され、
     前記第2のデータは、前記車両に固有の車両データである、請求項1に記載の鍵システム。
    The electronic lock device is installed in a vehicle,
    The key system of claim 1 , wherein the second data is vehicle data specific to the vehicle.
  11.  前記車両データは、前記車両の個体識別情報である、請求項10に記載の鍵システム。 The key system of claim 10, wherein the vehicle data is individual identification information of the vehicle.
  12.  前記車両データは、前記車両の分類情報である、請求項10に記載の鍵システム。 The key system of claim 10, wherein the vehicle data is classification information for the vehicle.
  13.  前記通信接続が開始された後の所定の基準時から所定時間内に前記第1のハッシュ値と前記第2のハッシュ値とが一致しないとき、前記電子錠装置が操作されない、請求項1に記載の鍵システム。 The key system of claim 1, wherein the electronic lock device is not operated when the first hash value and the second hash value do not match within a predetermined time from a predetermined reference time after the communication connection is started.
  14.  前記第1のハッシュ値を算出する第1の演算部および前記第2のハッシュ値を算出する第2の演算部の各々は、ASICで構成される、請求項1乃至請求項13のいずれか一項に記載の鍵システム。 The key system according to any one of claims 1 to 13, wherein each of the first calculation unit that calculates the first hash value and the second calculation unit that calculates the second hash value is configured with an ASIC.
  15.  電子鍵装置との通信接続が開始された後に、少なくとも第1のデータおよび前記第1のデータと異なる第2のデータが結合された結合データを取得する取得部と、
     前記結合データを前記電子鍵装置に送信する通信部と、
     ナンス値および前記結合データに基づき所定の条件を満たす第1のハッシュ値を算出する演算部と、
     前記第1のハッシュ値と、前記電子鍵装置から送信される第2のハッシュ値とが一致するか否かを判定する判定部と、を含む、電子錠装置。
    an acquisition unit that acquires combined data obtained by combining at least first data and second data different from the first data after a communication connection with the electronic key device is established;
    a communication unit that transmits the combined data to the electronic key device;
    a calculation unit that calculates a first hash value that satisfies a predetermined condition based on a nonce value and the combined data;
    an electronic lock device comprising: a determination unit that determines whether or not the first hash value matches a second hash value transmitted from the electronic key device.
  16.  電子錠装置との通信接続が開始された後に、前記電子錠装置が取得した少なくとも第1のデータおよび前記第1のデータと異なる第2のデータが結合された結合データを受信する通信部と、
     ナンス値および受信した前記結合データに基づき所定の条件を満たすハッシュ値を算出する演算部と、を含む、電子鍵装置。
    a communication unit that receives combined data obtained by combining at least first data acquired by the electronic lock device and second data different from the first data after a communication connection with the electronic lock device is started;
    a calculation unit that calculates a hash value that satisfies a predetermined condition based on the nonce value and the received combined data.
  17.  第1のデータを送信する第1の電子装置に含まれる第1の情報処理装置と、
     前記第1のデータを受信する第2の電子装置に含まれる第2の情報処理装置と、を含み、
     前記第1の情報処理装置が、少なくとも前記第1のデータおよび前記第1のデータと異なる第2のデータが結合された結合データを取得し、
     前記第1の情報処理装置が、第1のナンス値および前記結合データに基づき所定の条件を満たす第1のハッシュ値を算出し、
     前記第2の情報処理装置が、第2のナンス値および前記第1の電子装置から前記第2の電子装置に送信された前記結合データに基づき前記所定の条件を満たす第2のハッシュ値を算出し、
     前記第2の情報処理装置が、前記第1のハッシュ値と前記第2のハッシュ値とが一致するか否かを判定する、情報通信システム。
    a first information processing device included in a first electronic device that transmits the first data;
    a second information processing device included in a second electronic device that receives the first data;
    the first information processing device acquires combined data in which at least the first data and second data different from the first data are combined;
    the first information processing device calculates a first hash value that satisfies a predetermined condition based on a first nonce value and the combined data;
    the second information processing device calculates a second hash value that satisfies the predetermined condition based on a second nonce value and the combined data transmitted from the first electronic device to the second electronic device;
    The second information processing device determines whether the first hash value and the second hash value match.
  18.  前記第1の電子装置および前記第2の電子装置の少なくとも1つは、ルータである、請求項17に記載の情報通信システム。 The information and communication system according to claim 17, wherein at least one of the first electronic device and the second electronic device is a router.
  19.  前記第1の電子装置および前記第2の電子装置の少なくとも1つは、情報通信端末である、請求項17に記載の情報通信システム。 The information and communication system according to claim 17, wherein at least one of the first electronic device and the second electronic device is an information and communication terminal.
PCT/JP2023/038451 2022-10-27 2023-10-25 Key system, electronic lock device, electronic key device, and information communication system WO2024090461A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2022-172721 2022-10-27
JP2022172721 2022-10-27

Publications (1)

Publication Number Publication Date
WO2024090461A1 true WO2024090461A1 (en) 2024-05-02

Family

ID=90830860

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2023/038451 WO2024090461A1 (en) 2022-10-27 2023-10-25 Key system, electronic lock device, electronic key device, and information communication system

Country Status (1)

Country Link
WO (1) WO2024090461A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006009333A (en) * 2004-06-24 2006-01-12 Dainippon Printing Co Ltd Keyless entry system using cellular phone
JP2015231177A (en) * 2014-06-06 2015-12-21 日本電信電話株式会社 Device authentication method, device authentication system, and device authentication program
JP2019116784A (en) * 2017-12-27 2019-07-18 健 坪井 Electronic lock unit, home delivery confirmation method, and home delivery confirmation assistance system
JP2020528691A (en) * 2017-07-24 2020-09-24 エヌチェーン ホールディングス リミテッドNchain Holdings Limited Computer-enhanced systems and methods that enable secure storage of large blockchains across multiple storage nodes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006009333A (en) * 2004-06-24 2006-01-12 Dainippon Printing Co Ltd Keyless entry system using cellular phone
JP2015231177A (en) * 2014-06-06 2015-12-21 日本電信電話株式会社 Device authentication method, device authentication system, and device authentication program
JP2020528691A (en) * 2017-07-24 2020-09-24 エヌチェーン ホールディングス リミテッドNchain Holdings Limited Computer-enhanced systems and methods that enable secure storage of large blockchains across multiple storage nodes
JP2019116784A (en) * 2017-12-27 2019-07-18 健 坪井 Electronic lock unit, home delivery confirmation method, and home delivery confirmation assistance system

Similar Documents

Publication Publication Date Title
EP3426528B1 (en) Secure smartphone based access and start authorization system for vehicles
CN104412537B (en) Method, contrast means and remote-control key for pairing
US10911949B2 (en) Systems and methods for a vehicle authenticating and enrolling a wireless device
US9571284B2 (en) Controlling access to personal information stored in a vehicle using a cryptographic key
EP2672655B1 (en) Electronic key registration system
US9855918B1 (en) Proximity confirming passive access system for vehicle
US20180232971A1 (en) Systems And Methods For Managing Access To A Vehicle Or Other Object Using Environmental Data
US20210070252A1 (en) Method and device for authenticating a user to a transportation vehicle
WO2013114972A1 (en) Electronic-key registration method and electronic-key registration system
US20150291129A1 (en) Information processing system
CN106912046B (en) One-way key fob and vehicle pairing
JP2010146095A (en) Biometric authentication system
JP2005343430A (en) Vehicle control system
JP2010041411A (en) Communication system
CN108116367B (en) Keyless system matching method and keyless matching system
CN111063070B (en) Digital key sharing method, digital key verification method and digital key verification equipment
WO2024090461A1 (en) Key system, electronic lock device, electronic key device, and information communication system
Dolev et al. Peripheral authentication for autonomous vehicles
JP6276023B2 (en) Communication system, communication method, communication adapter, and server
CN117837121A (en) System and method for a secure keyless system
JP2007311960A (en) Method for testing mutual authentication device
JP6850314B2 (en) User authentication device and user authentication method
JP2020004044A (en) Authentication system and authentication method
US20230161859A1 (en) Control device and control method
US20230242076A1 (en) Fingerprint Data Reset System and Fingerprint Data Reset Method