WO2008038379A1 - Portable telephone and access control method - Google Patents
Portable telephone and access control method Download PDFInfo
- Publication number
- WO2008038379A1 WO2008038379A1 PCT/JP2006/319350 JP2006319350W WO2008038379A1 WO 2008038379 A1 WO2008038379 A1 WO 2008038379A1 JP 2006319350 W JP2006319350 W JP 2006319350W WO 2008038379 A1 WO2008038379 A1 WO 2008038379A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- mobile phone
- access table
- access
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Definitions
- the present invention relates to a mobile phone and an access control method of a communication system that performs owner authentication for a device using a personal wireless device.
- SPC is a concept of a safe space in which a control target device within a certain distance from an individual who has a key can operate, and specifically, “two-way wireless communication between paired objects is performed. It is a technology that makes it possible to perform functional authentication based on the distance between paired objects.
- This SPC technology can be expected to be used as a preventive measure against theft, unauthorized use, misplacement, etc. of cars, homes, safes, TVs, PCs, PDAs, cabinets and cards.
- the vehicle that is the service terminal ST receives the ID— ⁇ transmitted from the key terminal ⁇ , that is, while it is within the ID-K receivable area transmitted from the key terminal KT.
- a door and an engine of a car serving as a service terminal ST are controlled by the distance between the key terminal KT of the owner and the service terminal ST. To prevent theft, unauthorized use and misplacement of automobiles.
- the "device use restriction device” described in Patent Document 1 restricts the use of devices under certain conditions in order to prevent the use of devices by non-owners and non-administrators. .
- This “apparatus use restriction device” includes a transmission device and a reception device, and the transmission device transmits a unique code with a certain strength.
- the receiving device is installed in the device, and when the transmission code from the transmitting device cannot be received, the operation of the device is stopped. In this way, in this “device use restriction device”, the two terminals continue to send IDs at a constant strength to each other, and the function is stopped when the reception strength deteriorates.
- the “device use restriction device” described in Patent Document 2 notifies the user of a function stop. In other words, this “device use restriction device” stops the operation of the device and issues an alarm signal when it cannot receive the transmission code of the transmission device.
- the "communication system” described in Patent Document 3 measures the position of a terminal that can be accessed only within a predetermined area, and performs access control (wireless LAN) according to the position of the terminal.
- Such a communication system can perform the owner check in the same manner in relation to the car and the key, and the key and the entrance door.
- Patent Document 1 Japanese Patent Laid-Open No. 9-233542
- Patent Document 2 Patent No. 2931276
- Patent Document 3 Japanese Patent Laid-Open No. 2003-244884
- a mobile phone is used as a personal authentication device (personal terminal PT) as a wearable key unit (key terminal KT) and a car (service terminal ST) as a device to be controlled. ) And a communication system in the center.
- personal terminal PT personal authentication device
- key terminal KT wearable key unit
- service terminal ST service terminal
- a mobile phone personal terminal PT
- a wearable key unit key terminal KT
- a mobile phone personal terminal PT
- a car service terminal ST
- each terminal ID must be registered in advance! /, And mutual authentication is impossible! /.
- ID management center and pairing device 900 there is no ID management center and pairing device 900 as such an authentication infrastructure.
- a key terminal KT is registered in a personally owned mobile phone (personal terminal PT) or a car (service terminal ST). If you use it, you can only use it limitedly!
- the conventional access control method has the inconvenience that the key terminal ⁇ and the service terminal ST cannot be associated with each other and controlled.
- the rule when the key terminal ⁇ and the service terminal ST that is the device to be controlled are related is not clear.
- the responsibility for management of key terminals and service terminals ST differs between children and adults, but the rules for such cases are not clearly defined.
- the conventional access control method has a problem that the access control rule is unclear, so that flexible access control cannot be performed.
- An object of the present invention is to provide a mobile phone and an access control method capable of flexibly performing access control by associating each terminal with a mobile phone using an existing infrastructure and terminal device at low cost and safely. That is.
- the mobile phone of the present invention transmits a control target device whose function restriction is released by receiving a predetermined code signal, and a unique code signal for releasing the function restriction of the control target device.
- a mobile phone that performs access control between the control terminal and the control target device between the control terminal, a wireless communication unit that wirelessly communicates with the control terminal and the control target device, and the control terminal Via an access table creation means for creating an access table in which an ID is associated with an ID of the device to be controlled, an access table storage means for storing the access table created by the access table creation means, and the wireless communication means When the ID of the control terminal is input, the ID of the control target device associated with the ID of the control terminal is in the access table.
- Determining means for determining whether or not the control terminal associated with the control terminal when the determining means determines that the ID of the control target device associated with the ID of the control terminal is in the access table
- Control means for controlling the wireless communication means so as to transmit the ID held for the target device.
- the access control method of the present invention includes a control target device whose function restriction is released by receiving a predetermined code signal, and a unique code signal for releasing the function restriction of the control target device.
- the determination step for determining whether the ID of the control target device is in the access table and in the determination step if the ID of the control target device associated with the ID of the control terminal is in the access table, And a control step of controlling the operation of the wireless communication step so as to transmit an ID held to the control target device associated with the control terminal when determined.
- the invention's effect it is possible to control access flexibly by associating terminals with a mobile phone using an existing infrastructure and terminal device at low cost and safely.
- FIG. 1 is a schematic configuration diagram showing a configuration example of a communication system to which an access control method according to an embodiment of the present invention is applied.
- FIG. 2 is a block diagram showing a configuration of a communication system to which an access control method according to an embodiment of the present invention is applied.
- FIG. 3 is a block diagram showing a configuration of a mobile phone used in the access control method according to the embodiment of the present invention.
- FIG. 4 is a diagram showing an access tape towel of a mobile phone used in an access control method according to an embodiment of the present invention.
- FIG. 5 is a diagram showing another access table of the mobile phone used in the access control method according to the embodiment of the present invention.
- FIG. 6 is an explanatory diagram of a terminal pairing method in the access control method according to the embodiment of the present invention.
- FIG. 7 is a sequence diagram showing an access control method according to an embodiment of the present invention.
- FIG. 9 is a schematic diagram for explaining an access control method of a conventional communication system. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 1 is a schematic configuration diagram showing a configuration example of a communication system to which an access control method according to an embodiment of the present invention is applied.
- a communication system 100 to which the access control method of this example is applied includes a key terminal KT, a personal terminal, a personal / service terminal PST, a service terminal ST, and the like.
- a key terminal KT as a control terminal includes a key, a ring, a card, and the like, and holds an authentication ID that is an authentication ID and a key policy !!
- the personal terminal ⁇ is a mobile phone, and holds an ID— ID which is an authentication ID and a personal policy !!
- the personal and service terminal PST is an equivalent of a laptop PC, and its authentication ID is ID—P.
- a service terminal ST as a control target device is composed of an access point (server) or the like, and holds an ID-S that is an authentication ID and a service policy SP.
- policies are set for the key terminal KT, personal terminal ⁇ , personal / service terminal PST, and service terminal ST, respectively.
- the key terminal KT always transmits ID-K to the personal terminal PT.
- the personal terminal PT determines whether or not the key terminal KT transmitting the ID—K is within a certain distance, and the ID—K of the specific key terminal KT in which the received ID is registered in advance. It is checked whether or not it is consistent, and whether or not it satisfies the other conditions.
- the personal terminal PT if the above check conditions are satisfied, the personal terminal PT always transmits its own ID-P to the service terminal ST. It should be noted that it is not preferable for security reasons to keep sending IDs to terminals that have no power relationship, in which SPC has a mechanism that does not directly show such IDs.
- the personal terminal PT power is received only when the ID—K transmitted from the key terminal KT of the specific person is received and the function is ON. ID-P is sent to the service terminal ST.
- the service terminal ST checks the ID—P sent from the personal terminal PT, and supports the service. Provide one screw.
- the personal and service terminal PST is not necessarily required to pass through, and may have a plurality of stages.
- a plurality of key terminals KT are assumed such as private use, office use, parent use, child use, supervisor use, and subordinate use, and provide a minimum service according to the key policy KP.
- the minimum service means information display (warning, etc.), function ONZOFF, etc.
- the key policy KP can set the received information type and the personal terminal PT to be connected. However, the key terminal KT often has a low function, so it is not always conscious of the connection destination. May be sent. The key policy KP is set at the time of shipment and may not be changed.
- the personal terminal PT provides the slave service according to the personal policy PP.
- the sub service refers to the sub service of the main service that notifies the result of the main service and operates the main service.
- Personal policy PP includes received information type, transmitted information type, connected key terminal KT, personal / service terminal PST and service terminal ST, release function type, release conditions (distance, fee, other context, etc.) Set.
- the personal and service terminal PST mediates the main service (see the service terminal ST) according to the personal and service policy PSP.
- Personal / Service Policy PSP sets the received information type, transmission information type, connected key terminal KTZ personal terminal PTZ personal / service terminal PSTZ service terminal ST, mediation content, mediation conditions (distance, other context, etc.) To do.
- the service terminal ST provides the main service according to the service policy SP.
- the main service is a service that is finally provided and is a personally owned device (car, house, etc.) or a public device (access point, etc.).
- the service policy SP is the key terminal KT and service terminal ST to be connected, the affiliation of the key terminal KT and the service terminal ST, the contents to be provided (function type, period, etc.), the provision target (range, number, priority, etc.) , Set provision conditions (charge, payment method, other context, etc.).
- FIG. 2 is a block diagram showing a configuration of a communication system to which the access control method according to the embodiment of the present invention is applied.
- FIG. 3 is a block diagram showing a configuration of the mobile phone used in the access control method according to the embodiment of the present invention.
- a communication system 100 to which the access control method of this example is applied includes a key terminal KT, a personal terminal ⁇ , and a service terminal ST.
- the key terminal KT includes an ID and ID supplement information storage unit 110, a KP and access table storage unit 120, a determination unit 130, a control unit 140, a short-range wireless unit 150, and a minimum service.
- a providing unit 160 is provided.
- the personal terminal PT includes a short-range wireless unit 210, an operation unit 220, a determination unit 230, a PP and access table storage unit 240, an ID and ID supplemental information storage unit 250, an authentication unit 260, and a slave service providing unit. 270 and a control unit 280.
- the service terminal ST includes a short-range wireless unit 310, a service providing unit 320, an ID and ID supplementary information storage unit 330, an SP and access table storage unit 340, a determination unit 350, and a control unit 360.
- control unit 280 of the personal terminal PT includes an ID switching unit 281, an ID association unit 282, and an ID transmission restriction unit 283 as differences from the conventional PSC.
- the communication system 100 to which the access control method of this example is applied may include a service and personal terminal PST as shown in FIG.
- This service / personal terminal PST includes a short-range wireless unit 210, an operation unit 220, a determination unit 230, an ID / ID supplementary information storage unit 250, an authentication unit 260, and a control unit 280 that are the same as the personal terminal PT.
- the service / personal terminal PST includes a “service mediation unit” instead of the slave service providing unit 270 of the personal terminal PT, and a “PSP and access table storage unit” instead of the PP and access table storage unit 240.
- the key terminal KT and the service terminal ST are the same as in the SPC.
- Communication system 100 includes a mobile phone as personal terminal PT, PP and access table storage unit 240, and ID and ID supplemental information storage unit 250.
- Control unit 280 includes ID switching unit 281 and ID association unit. 282, ID transmission restriction unit 283 is different from SPC. [0072] That is, in the conventional SPC, many ID-Ks are sent to the service terminal ST from the key terminal KT that is the access partner, but the key terminal KT and the service terminal ST are not separated. The mutual relationship is not clear.
- the key terminal KT always sends ID—K, and the service terminal ST that has received ID—K from the key terminal KT has all its functions enabled! /, The
- the personal terminal PT (mobile phone) is controlled so as to pass the ID-P required when a predetermined condition is satisfied to the service terminal ST. is doing.
- the personal terminal PT (mobile phone) does not specify an ID with an expiry date or an individual with only attribute information for the ID-P passed to the service terminal ST. Control to pass ID only when necessary.
- the ID stored in the UIM (User Identity Module) built in the mobile phone as the personal terminal PT in advance, or Fe LiCa ( IDs stored in the registered trademark) are controlled to be assigned as the authentication infrastructure.
- the quality of service is improved by changing the control method.
- the ID switching unit 281 of the control unit 280 of the personal terminal PT switches the ID to be passed to the communication partner.
- the ID to be transmitted is selected from the access table and the received ID stored in the PP and access table storage unit 240, and the ID to be passed to the communication partner is switched.
- the received ID is associated (paired) with the transmission partner by the ID associating unit 282 of the control unit 280 of the personal terminal PT.
- the ID—K of the key terminal KT and the ID—S of the service terminal ST are linked and described in the access table stored in the PP and the access table storage unit 240.
- the access control method of this example uses a one-time password method.
- the electronic money should be used by a contactless IC such as FeliCa (registered trademark). It may be.
- the service terminal ST may charge the ID-P account via the backbone for charging the user for using the service terminal ST. ⁇ .
- the user is charged for the use of the service terminal ST, and thus the backbone infrastructure provider of electronic money using a contactless IC
- the key terminal KT and the service terminal ST may directly perform charging processing with electronic money.
- the service terminal ST is a public wireless LAN spot service
- a predetermined amount is set after settlement of electronic money by a contactless IC or the like at the service terminal ST and the key terminal KT. Control the wireless LAN so that it can be used within the range of the access point.
- the key terminal KT and the service terminal ST that is the control target device are associated with the mobile phone that is the personal terminal PT. I am doing so.
- the mobile terminal as the personal terminal PT is used to transfer the UIM ID and secret information, which are the existing authentication infrastructure, to the personal terminal PT ID— It is related to P.
- the personal terminal PT in the access control method of the present example communicates with the key terminal KT and the service terminal ST (control target device), and the access table describing the relationship between the PP and the access table.
- the key terminal KT ID—K stored in the table storage unit 240 and described in the access table is received, its own ID—P is sent to the service terminal ST.
- the access table stored in the PP and the access table storage unit 240 can be connected to a plurality of devices that can be connected as shown in FIG. You can set conditions, IDs, and record priorities, and define attribute information and expiration dates for IDs.
- a mobile phone which is a personal terminal PT without newly installing a pairing device is used as the pairing device.
- NFC Near Field Communication
- Bluetooth has a long communication distance, it is difficult for the pairing partners to split.
- NFC has a short communication distance, making it easy to identify the pairing partner! / ⁇ and !!
- an IC card such as UIM (User Identity Module) or a memory card can be used.
- UIM User Identity Module
- a memory card can be used.
- UIM User Identity Module
- a memory card can be used.
- UIM is troublesome to insert and remove, so it is effective to use a memory card.
- the RW (reader / writer) of the service terminal ST is used.
- Power Write the service policy SP and ID—S to the non-contact IC of the personal terminal PT, and read the personal policy PP and ID—P previously stored in the non-contact IC.
- the RW of the service terminal ST writes the service policy SP and ID—S to the personal terminal PT, and the RW of the personal terminal PT and the personal policy PP to the service terminal ST. Write ID—P (whichever comes first).
- the mobile phone which is the personal terminal PT, also has an RW function.
- step ST601 the memory card 600 is inserted into the personal terminal PT, and the memory card 600 is registered in the personal terminal PT.
- the CID that is the ID of the memory card 600 is set in the personal terminal PT (or the personal terminal PT ID—P is recorded in the memory card).
- step ST602 the memory card 600 is inserted into the key terminal KT, and the memory card 600 is registered in the key terminal KT.
- the key terminal KT does not have a slot for the memory card 600. In this case, it is set at the time of product purchase. Or you may set by the radio
- step ST602 ID—K of key terminal KT is recorded on memory card 600.
- the ID (CID) of the memory power 600 or the ID-P of the personal terminal PT is set in the key terminal KT in the memory of the key terminal KT.
- step ST603 the memory card 600 is inserted into the service terminal ST, and the Register the memory card 600 in the ibis terminal ST.
- the service terminal ST also reads and stores the CID (or ID-P) of the memory card 600.
- ID-S of service terminal ST is recorded in memory card 600.
- step ST604 the memory card 600 in which the ID—K of the key terminal KT and the ID—S of the service terminal ST are recorded is inserted into the personal terminal PT, and the ID is read from the memory card 600. Then, the ID—K of the key terminal KT and the ID—S of the service terminal ST are set in the personal terminal PT.
- step ST605 personal terminal PT obtains ID—K of key terminal KT, ID—S of service terminal ST, and CID of memory card 600 (or ID—P of personal terminal PT). Correlate and record in access table.
- the personal terminal PT performs access control using an access table in which the ID of each terminal is associated. That is, the personal terminal PT receives the ID—K of the key terminal KT and transmits the ID—P of the personal terminal PT to the service terminal ST. Further, the personal terminal PT receives the ID—S of the service terminal ST and transmits the ID—P of the personal terminal PT to the key terminal KT.
- the personal terminal PT exists in the distance permitted by the personal policy PP, which is permitted by the personal policy PP, and satisfies the other conditions required by the personal policy PP, and is designated as the personal policy PP.
- the function of the personal terminal PT is turned ON and the ID—S of the service terminal ST can be received, the ID—P is transmitted only to the service terminal ST permitted by the personal policy PP.
- the other conditions required by the personal policy PP include, for example, checking the context other than the distance and adjusting the contention when detecting a plurality of key terminals KT.
- the service terminal ST is an ID permitted by the service policy SP—P force that exists at a distance permitted by the service policy SP, satisfies other conditions required by the service policy SP, and is designated by the service policy SP. If the function of the service terminal ST is turned on and the personal terminal PT can detect the service, the service terminal ST ID-S is transmitted if possible.
- the other condition required by the service policy SP is to detect multiple personal terminals PT. Time competition adjustment, billing processing, etc.
- FIG. 7 is a sequence diagram showing an access control method according to an embodiment of the present invention.
- FIG. 7 in the upper part, processing for creating an access table as shown in FIGS. 4 and 5 is performed. In the lower row, access control is executed using the access table created in the upper row.
- the pairing method described above includes pairing between key terminal KT and personal terminal PT (step ST701), and pairing between personal terminal PT and service terminal ST. Perform (Step ST702).
- an access table is basically created on the mobile phone side which is the personal terminal PT.
- the access table on the key terminal KT side is a low-function one that only sends a signal.
- the access table on the service terminal ST side sets who the service is provided to.
- the access table on the mobile phone (personal terminal PT) side is a table including the relationship and control between the key terminal KT and the service terminal ST.
- the key terminal KT transmits ID—K and ID supplement information to the personal terminal PT according to the key policy KP (step ST703).
- service terminal ST transmits ID-S and ID supplement information to personal terminal PT in accordance with service policy SP (step ST704).
- the personal terminal PT sends the ID-P and ID supplement information to the service terminal ST (step ST705).
- the personal terminal PT functions as a normal mobile phone if there is no service.
- the service terminal ST confirms the ID—P and the ID supplement information sent from the personal terminal PT, releases the function restriction specified in the service policy SP, and starts providing the service.
- the service is sent from the service terminal ST to the personal terminal PT (step
- the service result is sent from the personal terminal PT to the key terminal KT (ST706).
- the key terminal KT that has received the service result from the personal terminal PT displays the service result in accordance with the key policy KP.
- the personal terminal PT (mobile phone) in the access control method of the present example is a personal terminal if there is a necessary service registered in advance only when the ID-K of the key terminal KT is received. Send the PT ID-P to the service terminal ST! /
- the personal terminal PT mobile phone
- the personal terminal PT ID-P is used as the service terminal ST. Please do not send to.
- an existing authentication infrastructure such as UIM, FeliCa (registered trademark), and one-time pad (OTP) is used as an authentication infrastructure
- a mobile phone personal Terminal PT
- the key terminal KT and the personal terminal PT (mobile phone), the personal terminal PT (mobile phone), and the automobile (service terminal ST) that is the control target device are used. Associated with one certificate.
- the key terminal KT, the personal terminal PT (mobile phone), and the vehicle (service terminal ST) that is the device to be controlled are also associated with the existing authentication infrastructure. As a result, according to the access control method of this example, there is no possibility that a security hole will occur independently of authentication between terminals as in the conventional SPC.
- the ID of a person who can talk to the mobile phone is recorded mainly on the mobile phone that is the personal terminal PT.
- wearable key units, entrance doors, automobiles, etc. were checked in parallel on the mobile phone table.
- the mobile phone is regarded as a pairing device.
- the wearable key unit and the ID of the front door and car are paired and stored as a set.
- the wearable key unit which has been parallel in the past, is associated with the ID of the front door or car.
- the access control method of this example employs a configuration in which the mobile phone has an access table in which the wearable key unit and the ID of the front door and the vehicle are recorded as a set.
- the mobile phone sends the ID—P to the front door or the car paired with the pair. .
- authentication of controlled devices that has been conventionally performed can be connected with a mobile phone.
- the personal terminal PT associates (pairs) the key terminal KT, the personal / service terminal PST, and the service terminal ST.
- the personal terminal PT communicates with the key terminal KT, the personal and service terminal PST, and the service terminal ST, and stores the respective relationships in the access table.
- the personal terminal PT When the personal terminal PT receives ID-K described in the access table, it transmits its own ID-P.
- the personal terminal PT transmits its own ID-P only when the transmission destination ID-PS or ID-S can be received.
- the personal terminal PT can restrict transmission of unnecessary ID-P, and can improve safety and reduce power consumption.
- a one-time pad token of a one-time pad (OTP) used for a banking phishing countermeasure may be used.
- One-time pad token is a server that synchronizes and automatically changes passwords such as numbers according to time and number of uses.
- the personal terminal PT associates the ID or secret information of the existing authentication infrastructure with ID—P, and the ID and secret information of the existing authentication infrastructure are It is used as a secret key corresponding to ID-P during authentication between personal terminal PT and personal / service terminal PST, and between personal terminal PT and service terminal ST.
- UIM UIM—ID, telephone number, and secret key in UIM are used as the existing authentication infrastructure.
- FeliCa (registered trademark) ID, private key in FeliCa, etc. are used as the existing authentication infrastructure.
- the existing authentication infrastructure includes a one-time pad (OTP)
- the key terminal KT may also serve as a token.
- the time-varying OTPi obtained from the key terminal KT is used as the secret key.
- the service terminal ST and the key terminal KT force soft token may be provided.
- a terminal that permits connection is registered in advance in the table of the mobile phone.
- the key terminal KT is a higher-level device
- the service terminal ST is a lower-level device and sets what is permitted.
- the personal and service terminal PST in the access control method of the present embodiment may set service mediation conditions. For example, try to limit the content, distance, and partners you mediate.
- a plurality of connectable devices may be set in the access tables of the personal terminal PT and the service terminal ST. AND, OR, N
- the release function and the release condition may be set in the access table of the key terminal KT, personal terminal ⁇ ⁇ ⁇ ⁇ ⁇ , and service terminal ST.
- the release conditions are position time, battery level, motion sensor, charged flag, etc.
- IDs and record priorities may be set in the access tables of the personal terminal PT and the service terminal ST. This setting is
- the ID have two types of characteristics: an attribute and a validity period.
- the ID has two types of characteristics, that is, the attribute and the valid period, so that the usage time can be allocated and the use function can be limited according to the type of the attribute. Will be able to.
- an attribute may be added to the personal ID (Yes, it may be only the attribute! /).
- an attribute and a validity period are defined in the ID.
- ID supplement information an attribute and a validity period
- functions can be provided according to the attributes of members, organizations, positions, etc. without individual identification.
- an ID that is valid for only one day can be issued as a paid service by defining an expiration date (specifying the expiration date of the ID) for the ID.
- an expiration date specifying the expiration date of the ID
- the behavior can be specified for unauthenticated IDs. When an unauthenticated ID is detected, a warning is notified (eg, collision prevention).
- the access control method of this example can realize owner authentication at low cost by using the existing infrastructure and the existing device.
- the ID of the existing existing infrastructure can be used as the ID to be switched, and it is not necessary to prepare the infrastructure like the infrastructure for SPC. Therefore, the communication system 100 can be configured at low cost.
- the access control method of this example associates individual authentications with a mobile phone, the ID is switched according to the service, and personal information is not passed except when necessary, which increases safety.
- the access control method of this example associates the key terminal KT and the service terminal ST with the personal terminal PT, it saves power that does not require the ID to be transmitted constantly. Can also improve safety. In other words, the SPC always outputs a code signal, but the access control method of this example outputs a necessary ID only when necessary. Also, in the access control method of this example, it is decided whether to issue an ID according to the situation, and the ID to be issued is switched according to the other party.
- the access control method according to the present invention can flexibly control access by associating each terminal with a mobile phone using an existing infrastructure and terminal device at a low cost and safely. It is useful as an access control method and a mobile terminal device for a communication system that performs authentication.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mechanical Engineering (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Lock And Its Accessories (AREA)
- Selective Calling Equipment (AREA)
Description
Claims
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2006/319350 WO2008038379A1 (en) | 2006-09-28 | 2006-09-28 | Portable telephone and access control method |
| EP06810797A EP2068535A4 (en) | 2006-09-28 | 2006-09-28 | PORTABLE PHONE AND ACCESS CONTROL METHOD |
| JP2008512074A JP4726950B2 (ja) | 2006-09-28 | 2006-09-28 | 携帯電話機及びアクセス制御方法 |
| US12/442,199 US20100022239A1 (en) | 2006-09-28 | 2006-09-28 | Portable telephone and access control method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2006/319350 WO2008038379A1 (en) | 2006-09-28 | 2006-09-28 | Portable telephone and access control method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008038379A1 true WO2008038379A1 (en) | 2008-04-03 |
Family
ID=39229827
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2006/319350 Ceased WO2008038379A1 (en) | 2006-09-28 | 2006-09-28 | Portable telephone and access control method |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20100022239A1 (ja) |
| EP (1) | EP2068535A4 (ja) |
| JP (1) | JP4726950B2 (ja) |
| WO (1) | WO2008038379A1 (ja) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2010028208A (ja) * | 2008-07-15 | 2010-02-04 | Ntt Communications Kk | サービス連携方法、サービス提供装置、及びプログラム |
| JP2010114727A (ja) * | 2008-11-07 | 2010-05-20 | Nec Corp | ペアリング装置、システム、方法、及びプログラム |
| JP2010245603A (ja) * | 2009-04-01 | 2010-10-28 | Nippon Telegr & Teleph Corp <Ntt> | 電話システムの主装置、電話機とともに使用されるコンピュータ、電話機とコンピュータとを連携させる方法 |
| JPWO2010131771A1 (ja) * | 2009-05-14 | 2012-11-08 | 日本電気株式会社 | 情報処理装置、外部機器拡張システム、外部機器拡張方法、外部機器拡張プログラムおよびプログラム記録媒体 |
| JP2015052222A (ja) * | 2013-09-06 | 2015-03-19 | 株式会社東海理化電機製作所 | 遠隔操作システム |
| JP2016506101A (ja) * | 2012-11-16 | 2016-02-25 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | 近傍ベースのマルチファクタ認証 |
| JP2017133286A (ja) * | 2016-01-29 | 2017-08-03 | シャーロック株式会社 | 電子錠システム |
Families Citing this family (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
| US9251332B2 (en) * | 2007-12-19 | 2016-02-02 | Proxense, Llc | Security system and method for controlling access to computing resources |
| WO2009102979A2 (en) | 2008-02-14 | 2009-08-20 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
| CA2665961C (en) * | 2009-05-12 | 2013-01-22 | Diversinet Corp. | Method and system for delivering a command to a mobile device |
| US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
| US9405898B2 (en) | 2013-05-10 | 2016-08-02 | Proxense, Llc | Secure element as a digital pocket |
| TW201536606A (zh) * | 2014-03-31 | 2015-10-01 | Hon Hai Prec Ind Co Ltd | 交通工具之控制系統及其控制方法 |
| US20150304851A1 (en) * | 2014-04-22 | 2015-10-22 | Broadcom Corporation | Portable authorization device |
| US10333980B2 (en) | 2014-11-19 | 2019-06-25 | Imprivata, Inc. | Personal device network for user identification and authentication |
| EP3227870B1 (en) * | 2014-12-02 | 2024-06-05 | Sensormatic Electronics, LLC | Dual level human identification and location system |
| US9384608B2 (en) | 2014-12-03 | 2016-07-05 | Tyco Fire & Security Gmbh | Dual level human identification and location system |
| US9563986B2 (en) * | 2014-12-31 | 2017-02-07 | Ebay Inc. | Systems and methods for multi-signal fault analysis |
| US11093905B2 (en) | 2014-12-31 | 2021-08-17 | Ebay Inc. | Systems and methods to utilize an electronic garage shelf |
| US10318930B2 (en) | 2014-12-31 | 2019-06-11 | Ebay Inc. | Systems and methods to utilize smart components |
| US10685334B2 (en) | 2014-12-31 | 2020-06-16 | Ebay Inc. | Systems and methods for an E-commerce enabled digital whiteboard |
| US10219154B1 (en) * | 2015-08-18 | 2019-02-26 | Richard J. Hallock | Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network |
| US11102648B2 (en) | 2015-08-18 | 2021-08-24 | Proteqsit Llc | System, method, and apparatus for enhanced personal identification |
| WO2018040641A1 (zh) * | 2016-08-31 | 2018-03-08 | 长城汽车股份有限公司 | 移动终端、车辆终端、虚拟钥匙分享方法及系统 |
| CN106453938B (zh) * | 2016-11-04 | 2019-04-09 | 华勤通讯技术有限公司 | 通过移动终端控制汽车的方法 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH09233542A (ja) * | 1996-02-20 | 1997-09-05 | Toyoki Sasakura | 機器の使用制限装置及び携帯電話機 |
| JPH1188499A (ja) * | 1997-09-04 | 1999-03-30 | Toyoki Sasakura | 機器の使用制限装置 |
| JP2003244884A (ja) | 2002-02-21 | 2003-08-29 | Hitachi Ltd | 回転電機の回転子 |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001169010A (ja) * | 1999-12-08 | 2001-06-22 | Sony Corp | 情報伝達システム及び方法 |
| JP3386430B2 (ja) * | 2000-02-23 | 2003-03-17 | 株式会社鷹山 | 認証開閉機能付鍵及びicカード |
| JP3857600B2 (ja) * | 2002-02-28 | 2006-12-13 | 株式会社東海理化電機製作所 | 車両用盗難防止システム |
| SE0202451D0 (sv) * | 2002-08-15 | 2002-08-15 | Ericsson Telefon Ab L M | Flexible Sim-Based DRM agent and architecture |
| GB2400196A (en) * | 2003-04-02 | 2004-10-06 | Nec Technologies | Restricting access to a mobile phone, laptop etc. using an authorization procedure involving a separate transceiver |
| JP4547159B2 (ja) * | 2004-01-08 | 2010-09-22 | 株式会社日立ハイテクノロジーズ | 処理装置 |
| US7545795B2 (en) * | 2004-08-05 | 2009-06-09 | Broadcom Corporation | Method for identification using bluetooth wireless key |
| EP1632828A1 (en) * | 2004-09-02 | 2006-03-08 | Axalto SA | DRM system for device communicating with a portable device |
| US20060170533A1 (en) * | 2005-02-03 | 2006-08-03 | France Telecom | Method and system for controlling networked wireless locks |
| WO2006090476A1 (ja) * | 2005-02-25 | 2006-08-31 | Super Wave Co., Ltd. | ワイヤレス認証方法及びワイヤレス認証システム |
| MY162279A (en) * | 2005-07-28 | 2017-05-31 | Inventio Ag | Method of controlling access to an area |
-
2006
- 2006-09-28 WO PCT/JP2006/319350 patent/WO2008038379A1/ja not_active Ceased
- 2006-09-28 JP JP2008512074A patent/JP4726950B2/ja not_active Expired - Fee Related
- 2006-09-28 US US12/442,199 patent/US20100022239A1/en not_active Abandoned
- 2006-09-28 EP EP06810797A patent/EP2068535A4/en not_active Withdrawn
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH09233542A (ja) * | 1996-02-20 | 1997-09-05 | Toyoki Sasakura | 機器の使用制限装置及び携帯電話機 |
| JPH1188499A (ja) * | 1997-09-04 | 1999-03-30 | Toyoki Sasakura | 機器の使用制限装置 |
| JP2931276B2 (ja) | 1997-09-04 | 1999-08-09 | 豊喜 笹倉 | 機器の使用制限装置 |
| JP2003244884A (ja) | 2002-02-21 | 2003-08-29 | Hitachi Ltd | 回転電機の回転子 |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2010028208A (ja) * | 2008-07-15 | 2010-02-04 | Ntt Communications Kk | サービス連携方法、サービス提供装置、及びプログラム |
| JP2010114727A (ja) * | 2008-11-07 | 2010-05-20 | Nec Corp | ペアリング装置、システム、方法、及びプログラム |
| JP2010245603A (ja) * | 2009-04-01 | 2010-10-28 | Nippon Telegr & Teleph Corp <Ntt> | 電話システムの主装置、電話機とともに使用されるコンピュータ、電話機とコンピュータとを連携させる方法 |
| JPWO2010131771A1 (ja) * | 2009-05-14 | 2012-11-08 | 日本電気株式会社 | 情報処理装置、外部機器拡張システム、外部機器拡張方法、外部機器拡張プログラムおよびプログラム記録媒体 |
| JP2016506101A (ja) * | 2012-11-16 | 2016-02-25 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | 近傍ベースのマルチファクタ認証 |
| JP2015052222A (ja) * | 2013-09-06 | 2015-03-19 | 株式会社東海理化電機製作所 | 遠隔操作システム |
| JP2017133286A (ja) * | 2016-01-29 | 2017-08-03 | シャーロック株式会社 | 電子錠システム |
Also Published As
| Publication number | Publication date |
|---|---|
| JP4726950B2 (ja) | 2011-07-20 |
| EP2068535A1 (en) | 2009-06-10 |
| JPWO2008038379A1 (ja) | 2010-01-28 |
| US20100022239A1 (en) | 2010-01-28 |
| EP2068535A4 (en) | 2011-01-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4726950B2 (ja) | 携帯電話機及びアクセス制御方法 | |
| US10289996B2 (en) | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions | |
| EP3063921B1 (en) | Authentication for application | |
| KR100705325B1 (ko) | 패스워드를 이용하는 rf-id 태그 리딩 시스템 및 그방법 | |
| US20130009756A1 (en) | Verification using near field communications | |
| KR20080078663A (ko) | 무선 인증을 위한 하나 이상의 장치-판독가능 매체, 시스템및 방법 | |
| JP2009534893A (ja) | 移動端末の近接通信モジュールへのセキュアなアクセスを保障する方法 | |
| ES3010167T3 (en) | Establishing authentication persistence | |
| JP2007523283A (ja) | 許可方法 | |
| CN103905191A (zh) | 应用于移动终端中的验证方法、移动终端和系统 | |
| US10277404B2 (en) | Communication system for the detection of a driving license | |
| KR101834367B1 (ko) | 음파 통신을 이용한 전자 태그 기반 결제 서비스 제공 시스템 및 방법 | |
| US20150264048A1 (en) | Information processing apparatus, information processing method, and recording medium | |
| KR101834365B1 (ko) | 전자 태그 기반 결제 서비스 제공 시스템 및 방법 | |
| EP2282563B1 (en) | Method for releasing a mobile communication card for the use of a servcie of a mobile communication network and user equipment for interaction with a mobile communication network | |
| KR20190115377A (ko) | 외부 전자 장치의 키를 공유하는 전자 장치 및 전자 장치의 동작 방법 | |
| KR101628615B1 (ko) | 보안운영체제를 이용한 안심서명 제공 방법 | |
| KR101909732B1 (ko) | 보안 서비스 시스템 및 방법 | |
| KR101628614B1 (ko) | 보안운영체제를 이용한 전자서명 처리 방법 | |
| KR102358598B1 (ko) | 비접촉 매체를 이용한 2채널 인증 방법 | |
| KR101505735B1 (ko) | 시간 검증을 이용한 엔에프씨카드 인증 방법 | |
| CN223377732U (zh) | 一种便携式固态硬盘 | |
| KR101513435B1 (ko) | 키 입력 보호 방법과 이를 위한 키 입력 보호 장치 | |
| Jansen et al. | Smart Cards and Mobile Device Authentication: An Overview and Implementation | |
| EP2693788A1 (en) | A method for communicating data and corresponding system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| ENP | Entry into the national phase |
Ref document number: 2008512074 Country of ref document: JP Kind code of ref document: A |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06810797 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 12442199 Country of ref document: US |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2006810797 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |