[go: up one dir, main page]

WO2006038290A1 - Wireless authenticating method and wireless authenticating system - Google Patents

Wireless authenticating method and wireless authenticating system Download PDF

Info

Publication number
WO2006038290A1
WO2006038290A1 PCT/JP2004/014747 JP2004014747W WO2006038290A1 WO 2006038290 A1 WO2006038290 A1 WO 2006038290A1 JP 2004014747 W JP2004014747 W JP 2004014747W WO 2006038290 A1 WO2006038290 A1 WO 2006038290A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication device
history information
action history
identification information
certificate authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2004/014747
Other languages
French (fr)
Japanese (ja)
Inventor
Hiroshi Yasuda
Toyoki Sasakura
Tomoyoshi Kaneko
Kenichi Miyamoto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WID CENTER
Super Wave Co Ltd
Original Assignee
WID CENTER
Super Wave Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WID CENTER, Super Wave Co Ltd filed Critical WID CENTER
Priority to JP2006539114A priority Critical patent/JPWO2006038290A1/en
Priority to PCT/JP2004/014747 priority patent/WO2006038290A1/en
Publication of WO2006038290A1 publication Critical patent/WO2006038290A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present invention relates to a wireless authentication method and a wireless authentication system in which a key side device and a device side device mutually authenticate with a radio signal.
  • a door is locked or unlocked wirelessly using radio waves without using a key (such as a keyless entry of an automobile)
  • the user carries a portable device corresponding to the key of the automobile.
  • the portable device using the portable device, the locking and unlocking of the door lock of the automobile is operated by a remote radio signal.
  • a predetermined ID is stored in the portable device, and the same ID is also incorporated in the unlocking device on the automobile side.
  • the unlocking device on the automobile side receives the ID transmitted by the wireless power of the portable device, compares it with the ID stored in the unlocking device, and unlocks if the ID matches.
  • a wireless authentication system that performs ID authentication wirelessly and remotely controls a controlled device such as a door lock device of an automobile based on the collation result is a portable device corresponding to a key.
  • the security operation is performed by regarding the person who owns as a legitimate user. Therefore, for example, if a portable device is acquired by a malicious third party due to loss or theft, the malicious third party can impersonate a legitimate user and unlock the car door lock. This is not preferable. For this reason, it is necessary to prevent impersonation and unauthorized operation by a third party to ensure security.
  • Such third-party fraudulent operations are not limited to automobile door locks, but remotely monitor devices such as home door locks, cameras, PDAs (Personal Digital Assistants), personal computers, and mobile phones.
  • devices such as home door locks, cameras, PDAs (Personal Digital Assistants), personal computers, and mobile phones.
  • PDAs Personal Digital Assistants
  • the portable device to be operated needs to be prevented. Therefore, it is necessary to ensure security in the same way when these devices are remotely monitored and operated by radio.
  • a portable device itself owned by a legitimate user is illegally acquired by a third party by stealing or the like, and an ID communicated wirelessly is stolen by some means.
  • a portable device (clone device) with the same ID may be produced and used illegally.
  • a clone device is another device that has the same function as the wireless authentication function (including ID) of a portable device owned by a legitimate user, and a malicious third party uses this clone device. Impersonate a legitimate user and misuse it. In this case, since the legitimate user has a legitimate portable device, it does not notice the existence of the clone device until the clone device is illegally used, and the illegal use by the clone device cannot be prevented.
  • An object of the present invention is to provide a wireless authentication method and a wireless authentication system that can prevent unauthorized use due to impersonation of a third party.
  • An object of the present invention is to provide a wireless authentication method and a wireless authentication system that can prevent unauthorized use by a clone device.
  • a first wireless authentication method of the present invention for achieving the above object is a wireless authentication method between a first communication device and a second communication device each having a wireless signal transmission / reception function.
  • the first communication device determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value, and identifies the second communication device from the second communication device. Is received, the received identification information is collated with the identification information stored in the internal storage means of the first communication device, a first authentication process is performed on the second communication device, and the first When the second communication device succeeds in authenticating the second communication device by the first authentication process, the communication device notifies the authentication result including the identification information to a remote certificate authority, and the certificate authority The identification information included in the result is stored in the certification authority.
  • the second authentication process is performed on the second communication device by comparing with the identification information stored in the storage unit, and the certificate authority authenticates the second communication device by the second authentication process. If successful, a release permission signal for releasing the use restriction of the device whose use is restricted by the first communication device is transmitted to the first communication device, and the first communication device When the release permission signal is received, the use restriction of the device is released.
  • the second communication device is a third communication device.
  • the transmission signal level from the communication device is equal to or higher than a predetermined value and the identification information for identifying the third communication device is received from the third communication device
  • the received identification information is converted into the second identification information.
  • the third authentication process for the third communication device is performed, and the second communication device performs the third authentication process, The communication with the first communication device is possible only while the authentication of the third communication device is successful.
  • a second wireless authentication method of the present invention is a wireless authentication method between a first communication device and a second communication device each having a radio signal transmission / reception function, wherein the first communication
  • the device determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value and receives the identification information identifying the second communication device from the second communication device
  • the device The received identification information is collated with the identification information stored in the internal storage means of the first communication device, and the first authentication process for the second communication device is performed.
  • the authentication of the second communication device is successful by the first authentication process, the authentication result is notified to a remote certificate authority, and the certificate authority sends the action history information to the second communication device. Request and receive the action history information from the second communication device.
  • the received action history information is collated with the action history information stored in the internal storage means of the certificate authority, and a second authentication process is performed on the second communication device.
  • the use restriction of the device whose use is restricted by the first communication device is released for the first communication device.
  • the first communication device receives the release permission signal and cancels the use restriction of the device.
  • the second communication device determines that a transmission signal level from the third communication device is equal to or higher than a predetermined value, and the third communication device.
  • the identification information for identifying the third communication device is received from the third communication device, the received identification information is collated with the identification information stored in the internal storage means of the second communication device.
  • the second communication device performs the third authentication process only while the third communication device is successfully authenticated by the third authentication process. It is possible to communicate with one communication device.
  • a third wireless authentication method of the present invention is a wireless authentication method between a first communication device and a second communication device each having a radio signal transmission / reception function, wherein the first communication
  • the apparatus determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value and receives identification information for identifying the second communication device from the second communication device
  • the received signal is received.
  • the identification information is collated with the identification information stored in the internal storage means of the first communication device, a first authentication process is performed on the second communication device, and the first authentication process performs the first authentication process.
  • the behavior history information of the second communication device is further received from the second communication device, and the received behavior history information is stored in the internal storage means.
  • the second authentication process is performed on the second communication device and the second authentication device is successfully authenticated by the second authentication process, the device whose use is restricted by the first communication device It is characterized by canceling the use restriction.
  • the second communication device determines that a transmission signal level from the third communication device is equal to or higher than a predetermined value, and the third communication device.
  • the identification information for identifying the third communication device is received from the third communication device, the received identification information is collated with the identification information stored in the internal storage means of the second communication device.
  • the second communication device communicates with the first communication device only while the third authentication device is successfully authenticated by the third authentication processing. It is possible.
  • the action history information includes history information related to communication of the second communication device with the first communication device. It is characterized by.
  • the action history information includes at least one of a time or a position at which the second communication device communicates with the first communication device. It is characterized by being information.
  • the second communication device creates the action history information at a predetermined timing, and stores the internal history of the second communication device. And the created action history information is transmitted to the certificate authority, and when the certificate authority receives the action history information, the action history information is stored in an internal storage unit of the certificate authority.
  • the action history information includes history information related to communication of the second communication device with the first communication device
  • the second communication device includes: The first action history information relating to communication with the first communication device is created and stored in the internal storage means of the second communication device, and the created first action history information is stored in the certificate authority.
  • the first communication device creates second action history information related to communication with the second communication device, stores the second action history information in the internal storage means of the first communication device, and creates the creation
  • the second action history information is sent to the certificate authority, and when the certificate authority receives the first action history information and the second action history information, it is determined whether or not the two information match. If it is determined and matches, the first action The gravel information or the second action history information, characterized in that to be stored in the internal storage unit of the authentication station.
  • the action history information includes history information related to communication of the second communication device with the first communication device
  • the first communication device includes: , Creating action history information related to communication with the second communication device, storing the action history information in the internal storage means of the first communication device, transmitting the created action history information to the certificate authority, and When the action history information is received, the action history information is stored in the internal storage means of the certificate authority.
  • the second communication apparatus creates action history information related to communication with the first communication apparatus, and the action history information is stored in the second wireless authentication method.
  • Action history information related to communication with the second communication device including information corresponding to the action history information created by the second communication device, which is stored in an internal storage unit of the communication device.
  • the action history information is stored in the internal storage means of the first communication device.
  • the second communication device creates the action history information at a predetermined timing, and transmits a transmission signal level from another communication device. Is determined to be greater than or equal to a predetermined value, the created action history information is transmitted to the other communication device, and the other communication device transfers the received action history information to the certificate authority, and the certificate authority Stores the received action history information as action history information of the second communication device in an internal storage unit of the certificate authority.
  • the configuration of the first wireless authentication system of the present invention to achieve the above object is a wireless authentication system having a first communication device, a second communication device, and a certificate authority,
  • the communication device includes first determination means for determining whether or not a transmission signal level from the second communication device is equal to or higher than a predetermined value, and identification information for identifying the second communication device as the second information
  • a first receiving means for receiving from the communication device a first storage means for storing identification information of the second communication device in advance;
  • the received identification information is collated with the identification information stored in the first storage unit to authenticate the second communication device.
  • First authentication means for performing processing, and first transmission means for notifying the authentication station of an authentication result including the identification information upon successful authentication of the second communication device by the first authentication means;
  • the second communication device stores the identification information of the second communication device in advance and transmits the identification information to the first communication device.
  • the certificate authority stores the identification information of the second communication device in advance, and the certificate authority storage means stores the identification information included in the authentication result.
  • the identification information stored in the means, and the second When the authentication of the second communication device by the certificate authority and the certificate authority authenticating means for performing authentication processing on the communication device succeeds, the first communication device uses the first communication device. And a certificate authority transmitting means for transmitting a release permission signal for releasing the use restriction of the device for which the device is restricted, and when the first communication device receives the release permission signal, It has the 1st cancellation
  • the first wireless authentication system preferably further includes a third communication device, and the third communication device stores identification information of the third communication device in advance. And a third transmission for transmitting the identification information to the second communication device And the second communication device further includes second determination means for determining whether or not a transmission signal level from the third communication device is equal to or higher than a predetermined value, and the third communication device.
  • a fourth receiving means for receiving identification information for identifying the communication apparatus from the third communication apparatus; a fourth storage means for previously storing the identification information for the third communication apparatus; When the second determination means determines that it is greater than or equal to a predetermined value, the received identification information is checked against the identification information stored in the fourth storage means to authenticate the third communication device. And a second release for releasing the restriction on communication with the first communication device only while the authentication of the third communication device by the second authentication means is successful. Means.
  • a second wireless authentication system is a wireless authentication system having a first communication device, a second communication device, and a certificate authority, wherein the first communication device includes the second communication device.
  • First determination means for determining whether or not the transmission signal level of the second communication apparatus is greater than or equal to a predetermined value, and first reception means for receiving identification information for identifying the second communication apparatus from the second communication apparatus And storing the identification information of the second communication device in advance, and determining that the first storage means and the first determination means are greater than or equal to a predetermined value, the received identification information
  • First authentication means for performing authentication processing on the second communication device by comparing with the identification information stored in the first storage means, and authentication of the second communication device by the first authentication means If successful, authentication including the identification information First transmitting means for notifying the certificate authority of the result, and the second communication device stores identification information of the second communication device and action history information of the second communication device.
  • a second storage unit, and a second transmission unit configured to transmit the identification information to the first communication device and transmit the action history information to the certificate authority.
  • a certificate authority storage unit storing action history information of the second communication device; and requesting action history information from the second communication device; and receiving the action history information from the second communication device; The received action history information is checked against the action history information stored in the certificate authority storage means to perform authentication processing for the second communication device, and the certificate authority authentication means performs the authentication process. If the authentication of the second communication device is successful, the first communication device against communication apparatus, control is used by said first communication device And a certificate authority transmission means for transmitting a release permission signal for releasing the use restriction of the limited device, and when the first communication device receives the release permission signal, the first communication device uses the device. It further has the 1st cancellation
  • the second wireless authentication system further includes a third communication device, and the third communication device stores identification information of the third communication device in advance.
  • Storage means and third transmission means for transmitting the identification information to the second communication device, wherein the second communication device further transmits a transmission signal level from the third communication device.
  • Second determination means for determining whether or not is greater than or equal to a predetermined value;
  • fourth reception means for receiving identification information for identifying the third communication apparatus from the third communication apparatus;
  • the fourth storage means for storing the identification information of the third communication device and the second determination means determine that the second determination means is greater than or equal to a predetermined value, the received identification information is stored in the fourth storage.
  • the third communication device in comparison with the identification information stored in the means A second authentication unit that performs authentication processing on the second communication unit, and a second communication unit that cancels communication restrictions with the first communication device only while the second authentication unit succeeds in authenticating the third communication device. And a second release means.
  • a third wireless authentication system of the present invention is a wireless authentication system comprising a first communication device and a second communication device, wherein the first communication device is the second communication device.
  • a first determination means for determining whether or not the transmission signal level from the second communication apparatus is equal to or higher than a predetermined value, and a first information receiving identification information for identifying the second communication apparatus from the second communication apparatus.
  • the action history information of the second communication device Information is received from the second communication device, the received action history information is collated with the action history information stored in the first storage means, and another authentication process is performed on the second communication device.
  • the first authentication means and when the second authentication device succeeds in the second authentication device by the first authentication means, the first communication device uses the first authentication device.
  • a first canceling unit that cancels the use restriction of the device that is restricted, and the second communication device includes identification information of the second communication device and action history information of the second communication device.
  • a second transmission means for transmitting the identification information to the first communication device.
  • the third wireless authentication system preferably further includes a third communication device, and the third communication device stores identification information of the third communication device in advance.
  • Storage means and third transmission means for transmitting the identification information to the second communication device, wherein the second communication device further transmits a transmission signal level from the third communication device.
  • Second determination means for determining whether or not is greater than or equal to a predetermined value;
  • fourth reception means for receiving identification information for identifying the third communication apparatus from the third communication apparatus;
  • the fourth storage means for storing the identification information of the third communication device and the second determination means determine that the second determination means is greater than or equal to a predetermined value, the received identification information is stored in the fourth storage.
  • the third communication device in comparison with the identification information stored in the means A second authentication unit that performs authentication processing on the second communication unit, and a second communication unit that cancels communication restrictions with the first communication device only while the second authentication unit succeeds in authenticating the third communication device. And a second release means.
  • the action history information includes history information related to communication of the second communication device with the first communication device. It is characterized by.
  • the behavior history information includes a time or position at which the second communication device communicates with the first communication device. Both of them are information including one of them.
  • the second communication device creates the action history information at a predetermined timing and stores the behavior history information in the second storage unit.
  • Action history information is transmitted to the certificate authority, and when the certificate authority receives the action history information, the certificate authority storage means stores the action history information.
  • the action history information is:
  • the second communication device has history information related to communication with the first communication device, and the second communication device creates first action history information related to communication with the first communication device.
  • the first communication history information is stored in the internal storage means of the second communication device and the created first action history information is transmitted to the certificate authority, and the first communication device communicates with the second communication device.
  • Second action history information relating to communication is created and stored in the internal storage means of the first communication device, and the created second action history information is transmitted to the certificate authority.
  • the first action history information and the second action history information are received, it is determined whether or not the information matches, and if they match, the first action history information or the second action history information is determined.
  • the action history information is stored in the certificate authority storage means. To.
  • the action history information includes history information related to communication of the second communication device with the first communication device
  • the first communication device includes: , Creating action history information related to communication with the second communication device, storing the action history information in the internal storage means of the first communication device, transmitting the created action history information to the certificate authority,
  • the certificate authority storage means stores the behavior history information.
  • the second communication device creates action history information related to communication with the first communication apparatus, and the action history information is transmitted to the second wireless authentication system.
  • the first communication device creates action history information related to communication with the second communication device including information corresponding to the action history information created by the second communication device.
  • the action history information is stored in the first storage means.
  • the second communication device creates the action history information at a predetermined timing, and a transmission signal level from another communication device is a predetermined value or more. If it is determined that there is, the created action history information is transmitted to the other communication device, the other communication device transfers the received action history information to the certificate authority, and the certificate authority receives the received action history information. Information is stored in the certificate authority storage means as action history information of the second communication device.
  • FIG. 1 is a diagram showing a first configuration example of a wireless authentication system in an embodiment of the present invention.
  • FIG. 2 is an overall schematic block diagram of an example in which a use restriction device that executes wireless authentication is applied to a mobile phone.
  • FIG. 3 is a schematic block diagram of an identification signal transmission / reception unit.
  • FIG. 4 is a schematic block diagram of a use restriction release unit.
  • FIG. 5 is a diagram showing a specific implementation example of the transmission unit 10 and the release unit 20.
  • FIG. 6 is a detailed configuration example of a “match” adder circuit.
  • FIG. 7 is an explanatory diagram of an identification signal and transmission timing.
  • FIG. 8 is an explanatory diagram of the configuration content of an identification number.
  • FIG. 9 is an explanatory diagram of a pulse compression signal and pulse compression processing.
  • FIG. 10 is an explanatory diagram of the relationship between the detection waveform of the received signal and the confirmation signal.
  • FIG. 11 is an explanatory diagram of a received signal level and a level determination section.
  • FIG. 12 is a diagram showing an example of an ID management table managed by Certificate Authority D.
  • FIG. 13 is a diagram showing a first authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. 1 (authentication processing procedure between wearable key unit C and portable terminal B).
  • FIG. 14 is a diagram showing a first authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. 1 (authentication between mobile terminal B, automobile door lock device A, and certificate authority D). Processing procedure).
  • FIG. 15 is a diagram showing a second authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. 1.
  • FIG. 16 is a conceptual diagram showing a situation where the clone device authenticates with the door lock device A and the certificate authority D.
  • FIG. 17 is a diagram showing an example of a database related to an action history of mobile terminal B.
  • FIG. 18 is a diagram showing a second configuration example of the wireless authentication system in the embodiment of the present invention.
  • FIG. 19 is a diagram showing a third authentication processing procedure according to the second configuration example of the wireless authentication system shown in FIG. 17.
  • FIG. 20 is a diagram for explaining a method of transmitting an action history via another mobile terminal that is a pair.
  • FIG. 21 is a diagram illustrating action history transmission processing via another form terminal.
  • the automobile door lock device will be described as an example of a controlled device that is a security target, but of course the present invention is not limited to this. It can be applied to all objects that can be remotely monitored and operated, such as locks, cameras, PDAs (Personal Digital Assistants), computers, and mobile phones.
  • PDAs Personal Digital Assistants
  • FIG. 1 is a diagram showing a first configuration example of the wireless authentication system in the embodiment of the present invention.
  • the wireless authentication system restricts the use of the door lock device A and door lock device A of the controlled device, the portable terminal B that can be used and the use restriction can be lifted, and the use of the portable terminal B.
  • a wearable key unit C that can lift its usage restrictions and a certificate authority D.
  • the certificate authority D can communicate with the mobile terminal B and the controlled device A.
  • the mobile terminal B is a mobile phone
  • the mobile terminal B is connected to the certificate authority D via a mobile phone line
  • the controlled device A is also connected to the certificate authority D via a communication line such as PHS.
  • the controlled device A is a device that does not move, such as a door lock device at home, it can be connected to the certificate authority D by wire.
  • the main role of the certificate authority D is to associate the portable terminal B with the wearable key unit C, and further associate the controlled device A with the portable terminal B so that they can be used.
  • controlled device A when controlled device A is in a state where the restriction on use is released by mobile device B, communication is performed for confirmation of both, and authentication is performed to confirm that controlled device A can be released. It also has a role to give.
  • Wireless authentication is performed between wearable unit C and mobile device B, and usage restrictions on mobile device B are removed.
  • the mobile terminal B and the controlled device A further perform wireless authentication.
  • the detailed operation of wireless authentication will be described in detail next.
  • the certificate authority D confirms the authentication result and determines that the authentication result is valid
  • the certificate authority D sends an unlocking permission signal to the door lock device A of the controlled vehicle, and the door lock device A receives it.
  • the use restriction is released and the door lock is unlocked.
  • Wireless authentication is realized by a use restriction device consisting of a pair of communication devices each having a unique ID.
  • One communication device hereinafter sometimes referred to as a base unit
  • the other communication device hereinafter sometimes referred to as a key unit
  • Both communication devices have unique IDs (identification information) and are associated with each other.
  • IDs are sent to each other at regular intervals to confirm the ID of the partner device.
  • one communication device makes the controlled device usable (full-time authentication). If the two devices are separated by a certain distance and cannot receive the signal from the other device at a certain level or more, the use restriction function of one communication device (base unit) makes the controlled device unusable. The other communication device (key unit) issues an alarm.
  • two wireless authentications are performed, and one is a wireless authentication between the wearable key unit C and the portable terminal B.
  • the wearable key unit C functions as a key unit
  • the mobile terminal B functions as a base unit.
  • the other is wireless authentication between the mobile terminal B and the car door lock device A.
  • the mobile terminal B functions as a key unit
  • the automobile door lock device A functions as a base unit. That is, the portable terminal B functions as a base unit with the wearable key unit C, and functions as a base unit with the door lock device A of the automobile.
  • FIG. 2 shows an overall schematic block diagram of an example in which a use restriction device that performs wireless authentication is applied to a mobile phone.
  • 10 is a small identification signal transmission / reception unit in card form
  • 20 Is a usage restriction release unit
  • 30 is a mobile phone.
  • the identification signal transmission / reception unit 10 (hereinafter abbreviated as “transmission unit 10”) is separated from the mobile phone 30 and is an independent card type.
  • the use restriction release unit 20 (hereinafter abbreviated as “release unit 20”) is a mobile phone. Built in 30. However, the release unit 20 should be attached to the outside of the mobile phone 30 integrally.
  • the mobile phone 30 is obtained by adding a use restriction circuit 30A as a use restriction means to a conventional general circuit.
  • the transmission unit 10 is used by the owner or user of the mobile phone 30 in a chest pocket or the like and placed in a certain distance range together with the mobile phone 30.
  • the transmission unit 10 can be any other format as long as it is convenient to carry keys.
  • wearable key unit C is a form of transmission unit 10
  • mobile phone 30 is a form of mobile terminal B. Therefore, FIG. 2 illustrates wireless authentication between wearable key unit C and portable terminal B.
  • the structure of the mobile phone 30 itself is also briefly described below.
  • the mobile phone 30 is provided with a transmission system 30B, a reception system 30C, a telephone number input system 30D, and a power supply unit 38.
  • the voice is converted into a voice signal by the microphone 33a, then amplified by the voice amplifier circuit 33b, modulated by the carrier wave signal by the modulation circuit 33c, and further, the modulated signal is amplified by the transmission amplifier 33d and transmitted / received.
  • Antenna 3 Ox is sent to the central office.
  • the transmission amplifier 33d is provided with a call switch 33k. When the call switch 33k is operated, a transmission mode is set.
  • the incoming call signal is amplified by the receiving amplifier 3 la, the number is recognized by the number recognition circuit 32a, and then the ring tone is generated from the ring tone generation circuit 32b through the hook switch 31c and from the speaker 31d.
  • the hook switch 31c is switched based on this ringing tone, the voice input mode is set.
  • the received signal amplified by the receiving amplifier 31a is demodulated as a voice signal by the voice demodulating circuit 3 lb. 31 Send to d and play as audio.
  • the operation input of the key operation disable switch 36b, the numeric keypad 'function key 37a, and the signal of the switch 37c are input to the AND gate 36a of the use restriction circuit 30A.
  • the switch 37c is operated by the output of the alarm release circuit 37b based on the password entered with the numeric keypad function key 37a, and the signals from the switches 36b and 37c and the release unit 20
  • the phone number input mode is set on condition that the use restriction release signal is established
  • the phone number input from the numeric keypad function key 37a is sent to the phone number input circuit 35 through the gate 36a, and the phone number generation circuit
  • the signal is transmitted from the transmitting / receiving antenna 30x through the modulation circuit 33c and the transmission amplifier 33d via 34.
  • the power supply of the power supply unit 38 is operated by a power switch (not shown) of the mobile phone 30, and power for supplying power to the circuits of each of the above systems.
  • the release unit 20 may be used in common, or the release unit 20 may be provided with another independent power source. When used in common, the power is always supplied to the release unit 20 even if the power switch of the mobile phone 30 is cut off. The reason will be explained later.
  • FIG. 3 shows a configuration example of the transmission unit 10.
  • the transmission unit 10 transmits a confirmation signal sent back from a transmitter 15b for transmitting an identification signal including a unique code signal set in advance from the transmission antenna 10T and a transmitter signal of the release unit 20 described later.
  • a receiver 1 la for receiving via 10R is provided.
  • the transmission system for transmitting the identification signal sends out the identification signal set in the identification code memory 13b by the command of the transmission / reception control timer 13a, and FSK modulation (250 MHz) is performed by the carrier wave in the FSK modulation circuit 15a.
  • the transmission signal of the identification signal is sent out from the rear transmitter 15b.
  • Reference numeral 14 denotes a power supply control circuit
  • 18 denotes a power supply unit.
  • the switch 18a is closed by a signal from the power supply control circuit 14 to supply power to each unit.
  • the receiving system that receives the confirmation signal, the following components are connected after the receiver 11a.
  • the received confirmation signal 250 MHz
  • the coincidence / adder circuit 11c reads the identification signal stored in advance in the identification code memory 13b and determines the coincidence point for each bit of the identification signal in order to determine whether the confirmation signal matches the identification signal. Addition process.
  • the output signal after the above addition processing is a threshold value.
  • the threshold processing unit l id compares the output signal with a threshold value (threshold value) set in advance by the threshold setting unit l id ′, and the output signal exceeds the threshold value. Then, a timing signal is sent to the signal presence / absence determination unit 12b.
  • the confirmation signal received by the receiver 11a described above is also sent to the signal level detection circuit 12a, and a signal indicating the signal level detected by this circuit is sent to the signal presence / absence determination unit 12b.
  • the confirmation signal from the aforementioned FSK demodulating circuit 1 lb and the identification code signal from the identification code memory 13b are also input to the signal presence / absence determination unit 12b.
  • the signal presence / absence determination unit 12b determines whether the confirmation signal matches the identification code signal, and receives the timing signal from the threshold processing unit id and receives the confirmation signal within a predetermined time t. It is determined whether the signal level of the signal is equal to or higher than a certain value, and an output signal is not generated as long as both of the above two determinations are established. An alarm signal is output to the alarm circuit 16.
  • FIG. 4 shows a configuration example of the release unit 20.
  • the basic structure of the release unit 20 is almost the same as that of the transmission unit 10 in FIG. 3, and the force is partially different, and the following description will focus on the different parts.
  • the presence / absence of a signal is determined by the signal presence / absence determination unit 22b based on the identification signal transmitted from the transmission unit 10, and the signal presence / absence determination unit 22b does not output any signal as long as the identification signal is received. Is the same as the transmission unit 10, but if there is no output signal, the use restriction release signal generation unit 26 always generates a use restriction release signal, and if no identification signal is received, the output signal from the signal presence / absence determination unit 22b The difference is that transmission of the release signal from the signal generator 26 is stopped.
  • the power of the power supply unit 28 is not controlled by the transmission / reception control timer 23a, and is always sent to each component, and the power switch is used regardless of whether the power supply of the mobile phone is shared or not. Do not shut off the power supply.
  • the transmission power S is always received by the release unit 20 at any time, and the presence or absence of the identification signal is determined based on the signal.
  • the release unit 20 In order to send back a confirmation signal from the transmission system of the release unit 20 at a constant interval after the judgment by the transmission / reception control timer command, the release unit 20 must always be turned on. Because there is.
  • constituent members are basically the same as those of the transmission unit 10 of FIG. 3, and the same constituent members are numbered in the 20s with the same suffix numbers and description thereof is omitted.
  • the identification signal from the transmission unit 10 is a signal including a preset unique code signal. As shown in FIG. null sequence) signal, followed by a unique code signal of the mobile phone number (hereinafter simply called the phone number).
  • the phone number hereinafter simply called the phone number.
  • M-sequence signals are included in the identification number other than the telephone number is that, as will be explained later, when the identification number is received, the received signal is that of the own mobile phone. This is to make the signal convenient for circuit processing.
  • this identification signal is transmitted as an intermittent signal that repeats every arbitrary time interval S seconds (for example, 2000 ms) in units of an M-sequence signal and a telephone number signal. This is to save power and to prevent the battery from being exhausted and to enable stable long-time transmission.
  • the M series signal may be a CZA code, P code, linear FM signal, or the like.
  • the telephone number as the unique code signal may be a signal indicating other ID numbers, other owners, and administrator information for devices other than mobile phones.
  • FIG. 7 shows the details of the configuration in which the same signal is sent back as a confirmation signal after a lapse of a certain time from the release unit 20, and the signal received by the transmission unit 10 is subjected to pulse compression processing by the coincidence adder circuit 11c of the transmission unit 10. Shown in When the received signal that has received the confirmation signal is demodulated by the FSK demodulator circuit ib, the first M-sequence signal of the confirmation signal is temporarily stored in the shift register l is not shown in FIG. Remembered.
  • the M-sequence signal written in the shift register l is matches and sent to the adder circuit 11c, where the M-sequence signal is called out of the stored data stored in the identification code memory 13b in advance.
  • the M-sequence signal is compared for each bit and the number of matching bits is added.
  • the signal subjected to the coincidence and addition process is output as a pulse compression signal.
  • the shift register 11 s has a 31-bit storage capability, but the identification code memory 13b stores both the M-sequence signal (31 bits) and the unique code signal (29 bits), so it stores 60 bits. Therefore, when processing both M-sequence signals, the data part of the M-sequence signal shall be called up.
  • FIG. 5 is a diagram illustrating a specific implementation configuration example of the transmission unit 10 and the release unit 20. Both the transmission unit 10 and the release unit 20 are realized by a communication module 100 centered on an MCU (Micro Controller Unit).
  • the communication module 100 configured as shown in Fig. 5 is connected to the multitask communication module (Multi
  • Task Communication Module MTC module.
  • 5 corresponds to the transmitter 15b of the transmission unit 10 of FIG. 3 and the transmitter 25b of the release unit 20 of FIG. 5 corresponds to the receiver 11a of the transmission unit 10 of FIG. 3 and the receiver 21a of the release unit 20 of FIG.
  • the cipher generation unit 104 in FIG. 5 performs a process of encrypting the identification codes and the like of the transmission unit 10 and the release unit 20 respectively.
  • the identification code is transmitted and received in an encrypted state.
  • the ID storage unit 105 in FIG. 5 corresponds to the identification code memory 13b in the transmission unit 10 in FIG.
  • the data storage unit 106 is necessary for an action history that is a communication history between the transmission unit 10 and the release unit 20 as described later. Store information.
  • the external output 107 and the LED display unit 108 in FIG. 5 operate as the alarm circuit 16 in the transmission unit 10 in FIG.
  • the release unit 20 may or may not be used for another purpose.
  • EXT-IF 109 in FIG. 5 is an interface with an external device, and operates as a use restriction release signal generator 26 in release unit 20 in FIG. Then, the MCU 101 in FIG. 5 executes processing performed by each part other than the parts described above, in the transmission unit 10 in FIG. 3 and the release unit 20 in FIG.
  • the identification signal is transmitted by FSK-modulating a 31-bit M-sequence signal followed by a 29-bit unique code signal indicating a unique telephone number.
  • the transmission from the cancellation unit 20 is the same as the identification signal.
  • a signal is sent back and received as a confirmation signal.
  • the transmission and reception timings are as shown in Fig. 7 (a)-(c).
  • the transmission timing is controlled by the control timer 13a so that the power is turned on at a constant time of, for example, 2000 ms from the first power-on after a certain time has elapsed.
  • the signal transmitted by the transmission unit 10 is received by the receiver 11a of the transmission unit 10 at the same time, the subsequent processing will not be performed, so an alarm signal is sent to the alarm circuit 16 based on the received signal. It does not act as the original received signal, and is distinguished from the confirmation signal
  • the confirmation signal sent back from the release unit 20 at a predetermined timing is received by the receiver 11a, it is demodulated by the FSK demodulator circuit ib and then subjected to pulse compression processing by the coincidence adder circuit 11c.
  • the M-sequence signal of symbol A shown in (a) of Fig. 9 is pulse-compressed in the confirmation signal.
  • the signal to be matched is added to the shift register l is as shown by symbol B. Because the data for each bit partially matches the value of each corresponding bit in the M-sequence signal storage data of the identification code memory before or after the pulse train of the M-sequence signal is completely written.
  • the value of the pulse compression signal always varies.
  • the threshold processing unit l id determines whether the pulse compression processing signal is a threshold (threshold value) preset by the threshold setting unit l id ', for example, 24 or more (Fig. 9 (b) If it is determined that the threshold is exceeded, the timing signal shown in Fig. 9 (c) is output to the signal presence / absence determination unit 12b.
  • the signal level of the received signal received by the receiver 1 la is detected by the signal level detection circuit 12a, and the signal presence / absence determination unit 12b determines whether the signal level is greater than a certain value. To do.
  • This signal level is determined by setting a certain voltage threshold for the received signal of the detection waveform shown in Fig. 10 (a), and if it is higher than this level, it is determined that a signal of a certain level or higher has been received.
  • the above determination is performed when the distance R between the transmission unit 10 and the release unit 20 increases when a signal transmitted with a constant strength is received.
  • the threshold value is determined according to a predetermined distance (e.g., lm) as one judgment method, and the received signal level falls below the threshold value. If this is the case, it is possible to detect that both are separated by a predetermined distance or more.
  • Figure 10 (a) is expressed in logarithmic scale.
  • the level of the received signal may be known by AZD converting the detected waveform of the received signal and measuring the voltage level of the received signal.
  • the determination of the signal level is performed by a fixed time t (example shown in the figure) corresponding to the unique code signal received after the timing signal after threshold processing for the M-sequence signal is sent from the threshold processing unit lid. Then, only 2.9ms) is performed symmetrically. The reason is to prevent detection of noise and signal levels from other telephones, and the determination can be made accurately by setting the fixed time specified by the timing signal as the determination section. It is.
  • the determination in the signal presence / absence determination unit 12b includes a unique code signal received after the timing signal is input and subjected to FSK modulation and stored in the identification code memory. It is done even if you agree with. Therefore, the signal presence / absence determination unit 12b receives a timing signal, receives a predetermined level of received signal after a certain period of time, and the received unique code signal matches the own unique code signal. If it is determined, the transmission unit 10 to the release unit 20 exist within a certain distance, and the signal presence / absence determination unit 12b outputs no signal.
  • the release unit 20 is separated from the transmission unit 10 by a certain distance or more. In this case, an output signal is output and the alarm circuit 16 is activated.
  • the alarm circuit 16 for example, when the transmitter unit 10 is put in the pocket by generating a voice message "don't leave” with a voice generator (not shown) to give a warning, A warning sound is given to indicate that the release unit 20 has been lost due to misplacement or theft.
  • the warning by the alarm circuit 16 is not only a method of giving the above voice message, but also a beeping sound, or a sound with it, and the display is displayed with a display, "Tekana! /," Any system can be used as long as the warning is given by some means, and even if a signal other than the confirmation signal of the identification code signal is received, the above-mentioned 3 Needless to say, since either or some of the two conditions are not satisfied, the signal presence / absence determination unit 12b does not output the output signal and does not affect the reception operation of the transmission unit.
  • the operation of the release unit 20 is as follows. As described above, in this unit 20, power is always supplied from the power supply unit 28 to each component regardless of whether the power switch of the mobile phone 30 is ON, OFF, or misaligned. At the same time as the signal is transmitted, it is received by the receiver 21a of the release unit 20.
  • the received discrimination signal power is demodulated by the SFSK demodulator circuit 21b, sent to the coincidence and adder circuit 21c, and the timing signal based on the M-sequence signal is sent from the threshold processing unit 21d to the signal presence / absence judgment unit 22b. It is. Further, the signal level of the received signal is detected by the signal level detection circuit 22a, and it is determined whether the signal level is equal to or higher than a certain level within a certain judgment time t when the timing signal is sent to the signal presence / absence judgment unit 22b. The determination is the same.
  • the signal presence / absence determination unit 22b during the determination time also determines whether the transmitted signal matches its own unique code signal stored in advance in the identification code memory 23b. Same as 10 However, the signal presence / absence determination unit 22b of the release unit 20 outputs any output signal when the above timing signal and the three conditions that the signal level is equal to or higher than the fixed signal level in both determinations and the unique code signal match. Is not output
  • the use restriction release signal is always output from the use restriction release signal generation unit 26, assuming that the release unit 20, and thus the mobile phone 30, is at the owner or user's hand without leaving the transmission unit. Has been. Therefore, the mobile phone 30 is always ready for use.
  • the signal from the signal presence / absence determination unit 22b is transmitted and received at that moment.
  • the control timer 23a is set, and the same signal as the received identification signal is read from the identification code memory 23b and transmitted via the FSK modulation circuit 25a and the transmitter 25b. This signal is received as a confirmation signal by the transmission unit 10 as described above.
  • the release unit 20 will transmit with the mobile phone 30.
  • the signal level becomes equal to or less than a certain level in the detection of the signal level, and the signal presence / absence determination unit 22b determines that it has received the identification signal.
  • an output signal is output from the signal presence / absence determination unit 22b, and the output of the cancellation signal generator 26 is stopped, so that the cellular phone 30 cannot be used.
  • the use restriction device of this embodiment is configured such that the owner or the user puts the transmission unit 10 in a pocket or the like and incorporates the release unit 20 into the mobile phone 30 at hand. Since the mobile phone 30 together with the release unit 20 is separated from the transmitter unit 10 by a certain distance or more, the use of the mobile phone 30 is restricted to prevent unintentional use, etc. Was given a warning by voice or the like so that the mobile phone 30 could immediately recognize that it was out of hand.
  • the same code signal (telephone number) is transmitted and received as the identification signal and the confirmation signal, but a unique ID is given to each of the transmission unit 10 and the release unit 20, and they are transmitted and received.
  • the transmission unit 10 stores the ID of the release unit 20 in addition to its own ID
  • the release unit 20 also stores the ID of the transmission unit 10 in addition to its own ID.
  • 10 transmits its own ID to the canceling unit 20, and the canceling unit 20 compares the received ID with the stored ID of the transmitting unit. It may be determined whether or not there is.
  • the cancellation unit 20 also transmits its own ID to the transmission unit 10, and the transmission unit 10 makes a pair of itself by comparing the received ID with the stored ID of the cancellation unit 20. Determine whether it is a release unit.
  • a mobile phone has been described as an example of a device subject to restriction of use.
  • various devices such as a word processor, a personal computer, various game machines, an automobile, and a safe are included. is there.
  • radio waves are used as a signal transmission medium.
  • wireless authentication between the wearable key unit and the mobile terminal, and between the mobile terminal and the door lock device of the automobile are performed.
  • Wireless authentication is performed.
  • wireless authentication between a mobile terminal and a car door lock device not only between the mobile terminal and the car door lock device. Wireless authentication by three parties including certificate authority will be implemented.
  • FIG. 12 is a diagram showing an example of an ID management table managed by the certificate authority D. As shown in FIG. 12, the certificate authority D has information associated with the IDs of the wearable key unit C, the portable terminal B, and the controlled device (automobile door lock device) A.
  • FIGS. 13 and 13 are diagrams showing a first authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG.
  • FIG. 13 shows an authentication processing procedure between wearable key unit C and mobile terminal B, which includes wearable key unit C force identification signal transmission / reception unit (transmission unit) 10 and functions as a key unit.
  • Use restriction release unit (release unit) 20 and functions as a base unit.
  • FIG. 14 shows an authentication processing procedure between the mobile terminal B, the automobile door lock device A, and the certification authority D.
  • the mobile terminal B includes the transmission unit 10 and functions as a key unit.
  • the door opening device A has a release unit 20 and functions as a base unit. That is, the mobile terminal B includes both the transmission unit 10 and the use restriction release unit 20.
  • the transmission unit 10 of the wearable key unit C sends M-sequence data (M-sequence) to the release unit 20 of the mobile terminal B at a predetermined time interval (for example, every 2 seconds) as a 4-power signal. Signal) by radio signal.
  • M-sequence data M-sequence data transmitted from the transmission unit 10
  • the release unit 20 of the portable terminal B compares it with the M-sequence data stored in its own internal memory (for example, a flash memory). This comparison is performed, for example, by a coincidence / adder circuit. As a result of the comparison, a numerical value indicating the number of matched bits of both M series data is output as a pulse signal.
  • the release unit 20 of the mobile terminal B receives an acknowledgment (ACK) for the call and the mobile terminal B stored in the internal memory.
  • Identification information (terminal identification information) IDb is transmitted by radio signal.
  • the release unit 20 of the mobile terminal B does not transmit the ACK signal and the terminal identification information IDb. In this case, as described above, the release unit 20 restricts the use of the mobile terminal B. The mobile device B is unusable. Further, the release unit 20 can display the fact on the display unit of the mobile terminal B.
  • the transmission unit 10 of the wearable key unit C Upon receiving the ACK signal and the terminal identification information IDb, the transmission unit 10 of the wearable key unit C receives the received terminal identification information IDb and the terminal identification information IDb stored in its own internal memory (for example, flash memory). Are matched (step S11).
  • both terminal identification information IDb is found as a result of collation, the transmission unit 10 recognizes that the release unit 20 is a release unit that makes a pair with itself, and stores it in its own internal memory. Identification information (key identification information) IDc of the wearable key unit C is transmitted. On the other hand, if both terminal identification information IDb is not matched as a result of the collation, it is recognized that the cancellation unit 20 is not a usage restriction cancellation unit paired with itself, and the key identification information IDa is not transmitted.
  • the release unit 20 of the portable terminal B Upon receiving the key identification information IDc transmitted from the transmission unit 10 of the wearable key unit C, the release unit 20 of the portable terminal B receives the received key identification information IDc and the key stored in its own internal memory. The identification information IDc is collated (step S12).
  • the release unit 20 recognizes that the transmission unit 10 is a transmission unit paired with itself, and uses the mobile terminal B. The restriction is released, and the portable terminal B is made communicable with the door lock device A (step S13).
  • the transmission unit 10 recognizes that it is not a pair with itself and does not lift the restrictions on the use of the mobile terminal B. Cannot communicate with A.
  • FIG. 14 it is assumed that the mobile terminal B is in a usable state according to the processing procedure of FIG. Further, in FIG. 14, the transmission unit 10 of the portable terminal B and the use restriction release unit 20 of the door lock device A of the automobile are inspected, and the certification authority D also participates in the authentication processing procedure.
  • the transmission unit 10 of the mobile terminal B transmits M-sequence data (M-sequence signal) as a call signal to the release unit 20 of the door lock device A of the vehicle at a predetermined time interval (for example, every 2 seconds). And then.
  • M-sequence signal M-sequence signal
  • the release unit 20 of the automobile door lock device A compares it with the M-sequence data stored in its own internal memory (for example, a flash memory). This comparison is performed, for example, by a coincidence adder circuit.
  • a numerical value indicating the number of matched bits of both M series data is output as a pulse signal. If the number of matched bits is equal to or greater than a predetermined threshold (for example, threshold 24 for 31-bit M-sequence data) and the reception level of M-sequence data is greater than or equal to a predetermined value, in other words, When the door lock device A and the mobile terminal B are within a predetermined range (for example, several meters), the limit release unit 20 of the car door lock device A receives an acknowledgment (ACK) to the call and the internal memory.
  • ACK acknowledgment
  • the door lock device identification information (door lock device identification information) IDa stored in is transmitted as a radio signal.
  • the release unit 20 of the door lock device A transmits an ACK signal and door lock device identification information IDa. do not do. In this case, as described above, the release unit 20 restricts the release operation of the door lock device A, and the door lock device can be kept locked.
  • the transmission unit 10 of the mobile terminal B Upon receiving the ACK signal and the door lock device identification information IDa, the transmission unit 10 of the mobile terminal B receives the received door lock device identification information IDa and the door lock stored in its own internal memory (for example, a flash memory). The device identification information IDa is collated (step S21).
  • the transmitting unit 10 of the mobile terminal B recognizes that the release unit 20 is a release unit that makes a pair with itself, It transmits its own identification information (terminal identification information) IDb stored in its internal memory, and further transmits to the certification authority D coincidence information (including IDc and IDb information) to the effect of matching.
  • the door lock device identification information IDa does not match as a result of the verification, it is recognized that the release unit 20 of the door lock device A of the car is not a release unit paired with itself, and the terminal identification information IDb is Do not send. Of course, the matching information is not transmitted.
  • the release unit 20 of the door lock device A of the automobile is When the transmitted terminal identification information IDb is received, the received terminal identification information IDb is collated with the terminal identification information IDb stored in its own internal memory (step S22).
  • both terminal identification information IDb is found as a result of the collation, the release unit 20 recognizes that the transmission / reception unit 10 is a transmission unit that is paired with itself, and the matching information (IDc) And IDb information) to certificate authority D. On the other hand, if the two terminal identification information IDb does not match, the transmitting unit 10 recognizes that it is not a pair with itself and does not transmit the matching information to the certificate authority D. Mobile terminal B remains unusable.
  • the certificate authority D is a computer device that can communicate with the transmission unit 10 of the portable terminal B and the release unit 20 of the door lock device A and that stores the management table of FIG.
  • the certificate authority D receives the matching information from the transmission unit 10 of the mobile terminal B and the release unit 20 of the automobile door lock device A, it confirms the contents of the matching information from the management table (FIG. 12) (step 23). ). For example, whether the two IDs included in the two matching information are the same, whether the two IDs of each matching information are the same as those associated in the management table, and so on.
  • the management table has flag information indicating that use restriction can be released and Z cannot be used. For example, if a theft report has been sent to the mobile terminal B, “No” is set.
  • the certificate authority D confirms the received match information in the management table. If no abnormality is detected, the certificate authority D determines that it is a valid authentication operation by a valid user and sends an unlock permission signal to the door lock device A of the car. Send. When the unlocking unit 20 of the door lock device A of the automobile receives the unlock permission signal, the use restriction of the door lock device A is canceled and the door is unlocked (step S24). The certificate authority D also sends an unlocking permission notification that the unlocking of the door lock device A is permitted to the mobile terminal B, and when the mobile terminal B receives the unlocking permission notification, Display on the display (step S25).
  • an abnormality is detected, such as a theft report, the unlocking signal is not sent, so the door lock device A remains locked.
  • an unlocking disapproval notice indicating that unlocking is not permitted is transmitted to mobile terminal B, and when mobile terminal B receives it, it displays that effect. As a result, the user can confirm whether or not the door lock device is unlocked.
  • the authentication by the certification authority D By processing the certificate authority D and determining the final use restriction release, even if the wearable key unit C and the mobile terminal B are stolen together, the certificate authority D is immediately notified of the theft. By doing so, unauthorized use by malicious third parties can be prevented.
  • the matching information is transmitted from both the vehicle door lock device A and the mobile terminal B to the certificate authority D.
  • the power of the vehicle door lock device A or the mobile terminal B V it is also possible to send the matching information to Certificate Authority D with only one force.
  • Authentication by the above management table is possible by matching information with only one of V and deviation.
  • FIG. 15 is a diagram showing a second authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG.
  • the second authentication processing procedure even when the clone device of the portable terminal B is used, a process for preventing unauthorized use using the clone device will be described. If wearable key unit C and mobile device B are stolen together, the legitimate user will not be able to find them by looking for them. Accordingly, by contacting the certificate authority D, unauthorized use can be prevented by the first authentication processing procedure described above. However, if a clone device having the same function as the mobile terminal B is created, a legitimate user does not notice its existence until the unauthorized use using the clone device is performed. Therefore, the authentication process may be normally performed by the certificate authority D, and the door lock device A of the automobile may be unlocked by the clone device.
  • FIG. 16 is a conceptual diagram showing a situation in which the clone device performs authentication with the door lock device A and the certificate authority D.
  • a clone device of an authentic mobile terminal B is created and the door lock device A of an automobile is unlocked
  • the clone device and the door lock device A are within a certain distance
  • the clone device is wirelessly connected to the door lock device A.
  • door lock device A determines that the ID sent by the clone device is the correct ID.
  • the certificate authority the existence of clone devices Since there is no power, even if the ID etc. is confirmed in the management table, the unauthorized use cannot be found and the unlocking is permitted, so the door lock device A is unlocked.
  • the clone device is manufactured so that it can be used even if the wearable key unit C is not nearby, and the release unit 20 of the portable terminal B in FIG. 14 is operated.
  • the authentication processing procedure between wearable queue C and portable terminal B is the same as that in FIG. 13, and therefore its illustration and description are omitted.
  • an authentication process between the mobile terminal B and the door lock device A of the automobile is performed.
  • the transmission unit 10 of the portable terminal B transmits M-sequence data (M-sequence signal) as a call signal to the release unit 20 of the door lock device A of the automobile by a radio signal at a predetermined time interval (for example, every 2 seconds). ing.
  • M-sequence signal M-sequence signal
  • the release unit 20 of the door lock device A of the automobile receives the M-sequence data transmitted from the transmission / reception unit 10 of the mobile terminal B
  • the release unit 20 compares it with the M-sequence data stored in its own internal memory (for example, flash memory). To do. This comparison is performed, for example, by a coincidence adding circuit.
  • a numerical value indicating the number of matched bits of both M series data is output as a pulse signal.
  • a predetermined threshold for example, threshold 24 for 31-bit M-sequence data
  • the reception level of M-sequence data is greater than or equal to a predetermined value, that is, a door lock device
  • a and mobile device B are within a certain range (for example, several meters)
  • the release unit 20 of the car door lock device A is acknowledged to the call (ACK) and stored in the internal memory.
  • the door lock device A identification information (door lock device identification information) IDa is transmitted by radio signal.
  • the release unit 20 of the door lock device A transmits an ACK signal and door lock device identification information IDa. do not do. In this case, as described above, the release unit 20 can restrict the use of the door lock device A, and the door lock device A can be kept locked.
  • the transmission unit 10 of the mobile terminal B Upon receiving the ACK signal and the door lock device identification information IDa, the transmission unit 10 of the mobile terminal B receives the received door lock device identification information IDa and its own internal memory (for example, flash memory). The door lock device identification information IDa stored in the memory is collated (step S31).
  • the transmitting unit 10 recognizes that the release unit 20 is a release unit that makes a pair with itself. Send the identification information (terminal identification information) IDb of mobile terminal B stored in the internal memory, and send the matching information (including IDa and IDb information) to the certificate authority D. .
  • the release unit 20 recognizes that it is not a pair with itself and does not transmit the terminal identification information IDb. Of course, no matching information is sent.
  • the release unit 20 of the door lock device A of the automobile receives the terminal identification information IDb transmitted from the transmission unit 10 of the portable terminal B, the received terminal identification information IDb and the received terminal identification information IDb are stored in its own internal memory.
  • the terminal identification information IDb is collated (step S32).
  • both terminal identification information IDb is found as a result of the collation, the canceling unit 20 recognizes that the transmitting unit 10 is a transmitting unit paired with itself, and the matching information (I (Including Da and IDb). On the other hand, if both terminal identification information IDb does not match, the transmitting unit 10 recognizes that it is not a transmitting / receiving unit paired with itself, and does not transmit matching information to the certificate authority.
  • the certificate authority D When the certificate authority D receives the matching information from the transmission unit 10 of the portable terminal B and the release unit 20 of the door lock device A of the automobile, it manages the contents of the matching information as described above. Confirm with the table (step S33). The certificate authority D confirms the received match information with the management table, and if no abnormality is detected, requests the mobile terminal B for an action history.
  • the action history is history information related to the operation of the mobile terminal B, and is preferably information related to the door lock device A communication.
  • the communication time with the unlocking unit 20 of the door lock device A in the past more specifically, information on the unlocking time (access time) and the communication with the releasing unit 20 Information about the place of time.
  • the mobile terminal B accumulates information related to its own action history and transmits it to the certificate authority D periodically or every access. Certificate Authority D registers the information related to the received action history as an action history database.
  • the action history sent from mobile device B is at least the previous time Includes newly created action history (unsent action history) after sending.
  • the certificate authority D confirms, for example, whether the action history power sent to register with the certificate authority D is from a genuine portable terminal by one of the following two confirmation methods.
  • the mobile terminal B transmits to the certificate authority D together with the past action history (for example, the previous time) in addition to the unsent action history.
  • the certificate authority D collates the transmitted past action history with the action history already accumulated in the certificate authority D, and determines whether there is a matching action history. If there is a matching action history, it is determined that the mobile terminal power is authentic, and if there is no matching action history, it is determined that the transmission is based on some fraud, such as transmission of clone device power. Certificate Authority D registers a new action history only when it is judged as an action history from a genuine mobile terminal.
  • the door lock apparatus A in addition to transmitting an action history (at least not transmitted) from the mobile terminal B, the door lock apparatus A also transmits an action history to the certificate authority D.
  • the action history is history information related to communication between the mobile terminal B and the door lock device A
  • the door lock device A can create the same history information as the mobile terminal B and store it. Then, the action history (at least not yet sent) is sent to Certification Authority D periodically or every access.
  • the certification authority D collates the action history transmitted from the mobile terminal B with the action history transmitted from the door lock device A, and determines whether or not they match.
  • Certificate Authority D registers a new action history only when it is determined to be an action history from a genuine mobile terminal.
  • both the mobile terminal B and the door lock device A transmit the past action history that has already been transmitted together with the newly created action history.
  • the certificate authority D collates the newly created action history from the mobile terminal B and the door lock device A, and compares the past action histories of both of them against the database registered in its own database. , Double check process.
  • the door lock device A since the behavior history of the mobile terminal B is a history related to communication with the door lock device A, the door lock device A should also create the same behavior history as the behavior history created by the mobile terminal B. Can do. Therefore, the mobile terminal B may transmit the action history created by the door lock device A to the certificate authority D without transmitting the action history to the certificate authority. Since the purpose of the wireless authentication system of the present invention is to prevent unauthorized access to the door lock device A, it is not assumed in the present invention that the door lock device A is accessed and the action history is wiretapped. Therefore, the action history transmitted from the door lock device A can be determined to be authentic, and can be registered in the certificate authority D without performing the confirmation process as described above.
  • FIG. 17 is a diagram showing an example of a database related to the action history of the mobile terminal B.
  • the action history information includes the telephone number, the self ID number (terminal identification information IDb), the door lock device ID number (IDa), the access time to the car (the communication with the door lock device release unit). Start time or end time), and position information (latitude / longitude information) at that time.
  • the position information may not be other identification information such as an identification number of the base station.
  • the information related to the action history is not limited to these. For example, when the portable terminal has a built-in thermometer, it may be the temperature at the time of communication with the door lock device.
  • Certificate Authority D Each time the mobile terminal B communicates with the release unit 20 of the door lock device A, the mobile terminal B creates and accumulates information related to the action history. In addition, information on the accumulated action history is transmitted to Certification Authority D periodically (for example, about once a day) or each time. Therefore, Certificate Authority D also has a database having the same information as in FIG. 17 for each mobile terminal.
  • the clone device has the same function as a genuine portable device, it cannot be used by a legitimate user, and therefore cannot perform the same action as a genuine portable device. Therefore, the behavior history is different from that of a genuine portable device, and the same behavior history as that of a genuine portable device cannot be created.
  • the clone device cannot create an action history until the door lock is successfully released, it cannot register the action history of the clone device with the certification authority. If the action history cannot be registered, the door lock cannot be released successfully, so that the clone device cannot release the door lock device after all.
  • the certificate authority requests the action history from the clone device, receives the action history from the clone device, and stores the action history in the certificate authority database. By comparing with, unauthorized use by a clone device can be detected.
  • the transmission unit 10 of the mobile terminal B transmits the requested action history.
  • the requested action history may be, for example, one recent action history or a plurality of action histories.
  • the certificate authority D collates with the received action history! And matches it (step S34). If there is a match, it is assumed that the authentication operation is performed by the authentic mobile device B with a valid user power. Send the unlocking permission signal to the door lock device A of the car. When the unlocking unit 20 of the door lock device A of the automobile receives the unlocking permission signal, it cancels the use restriction of the door lock device A and unlocks the door (step S35). Certificate Authority D also sends an unlock permission notification to the mobile terminal B that the unlocking of the door lock device A is permitted, and when the mobile terminal B receives the unlock permission notification, Is displayed on the display device (step S36).
  • unlocking permission signal is not transmitted, so that the door lock device A remains locked.
  • an unlocking disapproval notification indicating that unlocking has been permitted is transmitted to mobile terminal B, and when mobile terminal B receives it, it displays that effect.
  • the illegal use by the clone device is further performed by performing processing for checking the action history of the mobile terminal B. Can be prevented.
  • FIG. 18 is a diagram showing a second configuration example of the wireless authentication system in the embodiment of the present invention.
  • the wireless authentication system includes a door lock device A of a controlled vehicle, a portable terminal B that can restrict use and unlock the door lock device A, and a wearable key unit that can restrict use of the portable terminal.
  • C force is also configured.
  • the configuration does not have certificate authority D.
  • FIG. 19 is a diagram showing a third authentication processing procedure according to the second configuration example of the wireless authentication system shown in FIG.
  • the third authentication processing procedure is the same as that of the second authentication processing procedure shown in Fig. 15. Is Umono. Note that the authentication processing procedure between the wearable key unit C and the portable terminal B is the same as that shown in FIG.
  • FIG. 19 it is assumed that the mobile terminal B is ready for use in accordance with the processing procedure of FIG. 13, and the transmission unit 10 of the mobile terminal B and the door lock of the vehicle are the same as in the processing procedure of FIG. This is the authentication process between the release units 20 of device A.
  • the transmission unit 10 of the portable terminal B transmits M-sequence data (M-sequence signal) as a call signal to the release unit 20 of the door lock device A of the automobile by a radio signal at a predetermined time interval (for example, every 2 seconds). ing.
  • M-sequence signal M-sequence data
  • the release unit 20 of the door lock device A of the automobile receives the M-sequence data transmitted from the transmission unit 10, it compares it with the M-sequence data stored in its own internal memory (for example, a flash memory).
  • This comparison is performed by, for example, a coincidence / calo arithmetic circuit, and as a result of the comparison, a numerical value indicating the number of matched bits of both M series data is output as a pulse signal. If the number of matched bits is equal to or greater than a predetermined threshold (for example, threshold 24 for 31-bit M-sequence data) and the reception level of M-sequence data is greater than or equal to a predetermined value, that is, a door lock device When A and the mobile terminal B are within a predetermined range (for example, several meters), the release unit 20 of the car door lock device A receives an acknowledgment (ACK) for the call and is stored in the internal memory. Identification information of the door lock device A (door lock device identification information) IDa is transmitted by radio signal.
  • a predetermined threshold for example, threshold 24 for 31-bit M-sequence data
  • a predetermined value that is, a door lock device
  • the release unit 20 of the door lock device A transmits the ACK signal and the door lock device identification information IDa. do not do. In this case, as described above, the release unit 20 can restrict the use of the door lock device a, and the door lock device A can be kept locked.
  • the transmission / reception unit 10 of the portable terminal B Upon receiving the ACK signal and the door lock device identification information IDa, the transmission / reception unit 10 of the portable terminal B receives the received door lock device identification information IDa and the door lock device stored in its own internal memory (for example, a flash memory).
  • the identification information IDa is collated (step S41).
  • both door lock device identification information IDa is correct as a result of the collation, the transmitter 10 recognizes that the release unit 20 is a release unit that makes a pair with itself, and The mobile terminal B identification information (terminal identification information) IDb stored in the internal memory is transmitted. On the other hand If the door lock device identification information IDa is not correct, the release unit 20 recognizes that it is not a use restriction release unit that makes a pair with itself, and does not send the terminal identification information IDb.
  • the release unit 20 of the automobile door lock device A Upon receiving the terminal identification information IDb transmitted from the transmission unit 10 of the mobile terminal B, the release unit 20 of the automobile door lock device A receives the received terminal identification information IDb and the internal identification information stored in its own internal memory. The terminal identification information IDb is collated (step S42).
  • the release unit 20 recognizes that the transmission unit 10 is a transmission unit paired with itself.
  • the transmitting unit 10 recognizes that it is not a transmitting / receiving unit paired with itself, and the portable terminal B remains unusable.
  • the release unit 20 of the automobile door lock device A requests an action history from the portable terminal B.
  • the contents of the action history have been described above with reference to FIG.
  • the release unit 20 of the door lock device A accumulates the action history of the mobile terminal B. Since the action history is history information regarding communication between the mobile terminal B and the door lock device A as described above, the door lock device A and the mobile terminal B can create the same history information. Therefore, the door lock device A creates the same action history corresponding to the action history created by the mobile terminal B and stores it.
  • the transmission unit 10 of the mobile terminal B transmits the requested action history.
  • the unlocking unit 20 of the door lock device A collates with the received action history! (Step S43), and if it matches, the authenticating operation by a genuine mobile terminal with a legitimate user power is performed. If there is, the use restriction of the door lock device A is released, and the door lock is unlocked (step S44). At this time, the door lock device A sends an unlock notification to the mobile terminal B indicating that the door lock device A has been unlocked, and when the mobile terminal B receives the unlock notification, the mobile terminal B displays that notification. It may be displayed on the device (step S45).
  • the door lock device A when an abnormality is detected such that the behavior histories do not match, the door lock device A remains locked and is not unlocked.
  • an unlocking disapproval notice indicating that the mobile terminal B has not been unlocked is transmitted to the mobile terminal B, and when the mobile terminal B receives it, the mobile terminal B may display that fact.
  • the certificate authority is collated with the action history! Since the action history is collated by the door lock device A, unauthorized use by the clone device can be prevented even without a certificate authority.
  • the ID is encrypted and transmitted / received to prevent unauthorized acquisition of the ID due to wiretapping of the ID (IDa and IDb).
  • IDa and IDb Since the ID encryption key and its decryption key impose a heavy load on a computing device such as a CPU, a high-performance CPU is required to transmit and receive the ID encryption key.
  • the third authentication processing procedure it is not necessary to encrypt the ID. Therefore, there is an advantage that the burden on the CPU is greatly reduced. The reason is as follows. In the third authentication processing procedure, the action history is collated between the door lock device A and the portable terminal B in addition to the ID.
  • this behavior history is the behavior of the genuine mobile terminal itself, and the clone device cannot imitate the behavior of the genuine mobile terminal itself.
  • the action history is newly created every time the mobile terminal B and the door lock device A normally communicate, and the action history used for collation is updated as needed. In other words, the action history becomes information for identifying the mobile terminal B, which changes as needed, and thus has an effect substantially equivalent to encryption of the identification information of the mobile terminal B. Even if an action history is eavesdropped, the action history for verification is changed immediately thereafter, and unauthorized access based on the action history is impossible. Even if the ID of door lock device A or mobile terminal B is eavesdropped and received in plain text without being encrypted, the third authentication processing procedure does not match the action history. Unauthorized access is not allowed because it is necessary.
  • the authentication based on the action history has substantially the same effect as encrypting information for identifying the mobile terminal.
  • the normal encryption created according to the prescribed encryption law it may be decrypted, but the action history is the action of the mobile terminal itself, and it is encrypted according to some kind of law.
  • the action history is the action of the mobile terminal itself, and it is encrypted according to some kind of law.
  • it since it has its own character like encrypted information, there is no risk of decryption. Also, since encryption and decryption processes are unnecessary, the load on the arithmetic device is reduced.
  • a means is provided that is not intercepted by a malicious third party in the transmission of the action history from the mobile terminal to the certificate authority for storing (registering) the action history in the certificate authority. . Specifically, using another mobile terminal that is paired with the authentic mobile terminal, the action history of the authentic mobile terminal is transmitted to the certificate authority via another mobile terminal that is paired with the mobile terminal.
  • FIG. 20 is a diagram for explaining a method for transmitting an action history via another mobile terminal that is paired.
  • the authentic mobile terminal B and another mobile terminal E that is paired with each other fall within a predetermined range (several meters)
  • wireless authentication is performed, and the authentic mobile terminal B goes to another mobile terminal E that is paired.
  • Send a motion history is performed, and the authentic mobile terminal B goes to another mobile terminal E that is paired.
  • Send a motion history When another mobile terminal E receives the action history, it sends it to the certificate authority. Since the range in which a genuine mobile terminal B and another mobile terminal E paired with each other can communicate is very narrow (several meters), a malicious third party who has a clone device is close to a legitimate user. It is impossible to intercept it.
  • FIG. 21 is a diagram for explaining the action history transmission processing via another form terminal.
  • the identification signal transmission / reception unit 10 of the authentic mobile terminal B receives the M-sequence data as a four-signal signal to the identification signal transmission / reception unit 10 of another mobile terminal E paired at a predetermined time interval (for example, every 2 seconds). (M-sequence signal) is transmitted by radio signal.
  • the identification signal transmission / reception unit 10 of another mobile terminal E that is paired receives the M-sequence data transmitted from the genuine mobile terminal B, the M-sequence stored in its own internal memory (for example, flash memory) Compare with the data.
  • the M-sequence stored in its own internal memory for example, flash memory
  • This comparison is performed, for example, by a coincidence / adder circuit, and as a result of the comparison, a numerical force pulse signal representing the number of bits that coincide in both M series data is output. If the number of matched bits is equal to or greater than a predetermined threshold (e.g. threshold for 31-bit M-sequence data, value 24) and the reception level of M-sequence data is equal to or higher than a predetermined value, in other words, authenticity If the mobile terminal B and another mobile terminal E paired with each other are within a predetermined range (for example, several meters), the identification signal transmission / reception unit 10 of the other mobile terminal E paired will respond to the call. An acknowledgment (ACK) and door lock device identification information (terminal identification information) IDe stored in the internal memory are transmitted by radio signals.
  • ACK acknowledgment
  • terminal identification information terminal identification information
  • the identification signal transmission / reception unit 10 of another portable terminal E that is paired with the ACK signal and the terminal Do not send IDe IDe.
  • the transmitting unit 10 of the authentic mobile terminal B Upon receiving the ACK signal and the terminal identification information IDe, the transmitting unit 10 of the authentic mobile terminal B receives the received terminal identification information IDe and the terminal identification information IDe stored in its own internal memory (for example, a flash memory). Are matched (step S51).
  • its own internal memory for example, a flash memory
  • both terminal identification information IDe is found as a result of the collation, the transmitting unit 10 of the mobile terminal B recognizes that the mobile terminal E is a mobile terminal paired with itself, and The mobile terminal identification information (terminal identification information) stored in the internal memory IDb and the action history accumulated are transmitted to another mobile terminal E as a pair.
  • the terminal identification information IDe is not correct as a result of the collation, the mobile terminal E recognizes that it is not a mobile terminal paired with itself, and does not transmit the terminal identification information IDb and the action history.
  • the transmission unit 10 of another mobile terminal E that is paired with the mobile terminal B Upon receiving the terminal identification information IDb and the action history transmitted from the mobile terminal B, the transmission unit 10 of another mobile terminal E that is paired with the mobile terminal B stores the received terminal identification information IDb and its own internal memory. The terminal identification information IDb is checked (step S52).
  • the transmitting unit 10 of another paired mobile terminal E recognizes that the signal is a genuine mobile terminal B signal.
  • the received action history is transferred to Certificate Authority D.
  • both terminal identification information IDb does not match, it is determined that the signal is not a genuine mobile terminal B, and the action history is not transmitted.
  • the certificate authority D has a correspondence table between the authentic mobile terminal B and another mobile terminal E paired with it.
  • the certificate authority D determines that the corresponding table power is the action history of the authentic mobile terminal B, and the authenticity of the authentic mobile terminal B Accumulated as an action history (step S53).
  • mobile terminal E Since another mobile terminal E as a pair itself is a genuine mobile terminal and performs the same function as the function of mobile terminal B described above, mobile terminal E also stores its action history. Must be sent to Certificate Authority D. In this case, the mobile terminal B is not selected as the mobile terminal that is paired with the mobile terminal E, and another mobile terminal is selected. In other words, mobile terminal B and mobile terminal E are not in a paired relationship with respect to the transmission of the action history. This is because when a malicious third party manufactures a clone device for mobile terminal B, the mobile terminal E may happen to receive a call signal from mobile terminal E, which may identify the paired mobile terminal.
  • another mobile terminal E to be paired needs to come within a communicable range periodically, and it is preferable that communication is performed at least once a day, but once a week, 1 It does not matter even once a month. Furthermore, in order to prevent any other portable terminal E as a pair from being identified, it is preferable that the other portable terminal as a pair is changed as needed. Further, the other mobile terminal to be paired is not limited to the mobile terminal of another user, and may be, for example, another communication terminal owned by itself. For example, the charger of his / her portable terminal may be provided with a communication function capable of executing the authentication process of the above embodiment.
  • the present invention relates to a wireless authentication system that performs personal authentication using radio waves, and can be used as a personal authentication means for a device that requires security.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A wireless authenticating method used between first and second communication devices each having a radio signal transmitting/receiving function. The first communication device performs a first authentication by judging that the level of the signal transmitted from the second communication device is a predetermined value or more, receiving the identification information, and checking the identification information with the identification information stored in internal storage means. When the first communication device succeeds in the authentication of the second communication device, it reports the authentication result to a remote certificate authority. On receiving the authentication result, the certificate authority requests behavior history information from the second communication device. On receiving the behavior history information, the certificate authority performs a second authentication of checking it with the behavior history information stored in internal storage means of the certificate authority. If the certificate authority succeeds in the authentication of the second communication device, the certificate authority transmits a removal permission signal to remove the use restriction on a device the use of which is restricted by the first communication device to the first communication device. On receiving the removal permission signal, the first communication device removes the use restriction on the device.

Description

明 細 書  Specification

ワイヤレス認証方法及びワイヤレス認証システム  Wireless authentication method and wireless authentication system

技術分野  Technical field

[0001] 本発明は、キー側装置と機器側装置とが無線信号により相互に認証し合うワイヤレ ス認証方法及びワイヤレス認証システムに関する。  The present invention relates to a wireless authentication method and a wireless authentication system in which a key side device and a device side device mutually authenticate with a radio signal.

背景技術  Background art

[0002] 自動車のキーレスエントリーのように、鍵 (キー)を使わず、電波を用いてワイヤレス でドアロックを施錠又は解錠する場合に、ユーザは、自動車のキーに相当する携帯 装置を携帯し、該携帯装置を使用して遠隔力 無線信号により自動車のドアロックの 施錠及び解錠を操作する。さらに具体的には、携帯装置には、所定の IDが格納され 、さらに、自動車側の解錠装置にも同じ IDが組み込まれている。そして、自動車側の 解錠装置が、携帯装置力 無線で送信される IDを受信し、解錠装置内に格納されて いる IDと照合し、一致すれば、解錠する。  [0002] When a door is locked or unlocked wirelessly using radio waves without using a key (such as a keyless entry of an automobile), the user carries a portable device corresponding to the key of the automobile. Then, using the portable device, the locking and unlocking of the door lock of the automobile is operated by a remote radio signal. More specifically, a predetermined ID is stored in the portable device, and the same ID is also incorporated in the unlocking device on the automobile side. Then, the unlocking device on the automobile side receives the ID transmitted by the wireless power of the portable device, compares it with the ID stored in the unlocking device, and unlocks if the ID matches.

[0003] このように、ワイヤレスで IDの認証を行 、、その照合結果に基づ 、て、自動車のドア ロック装置などの被制御機器を遠隔操作するワイヤレス認証システムは、キーに相当 する携帯装置を所有している者を正当なユーザとみなしてセキュリティ動作を行う。従 つて、例えば、紛失や盗難などにより携帯装置が悪意の第三者に取得されてしまった 場合、その悪意の第三者は、正当なユーザになりすまして、自動車のドアロックを解 錠することができることになつてしまい、好ましくない。このため、第三者のなりすまし や不正な操作を防止し、セキュリティを確実にする必要がある。  [0003] As described above, a wireless authentication system that performs ID authentication wirelessly and remotely controls a controlled device such as a door lock device of an automobile based on the collation result is a portable device corresponding to a key. The security operation is performed by regarding the person who owns as a legitimate user. Therefore, for example, if a portable device is acquired by a malicious third party due to loss or theft, the malicious third party can impersonate a legitimate user and unlock the car door lock. This is not preferable. For this reason, it is necessary to prevent impersonation and unauthorized operation by a third party to ensure security.

[0004] このような第三者のなりすましゃ不正操作は、自動車のドアロックに限らず、自宅の ドアロック、カメラ、 PDA(Personal Digital Assistant),ノ ソコン、携帯電話などの機器 を遠隔で監視、操作する携帯装置についても同様に防止される必要がある。従って 、これらの機器に対して無線により遠隔で監視、操作する場合にも、同様に、セキユリ ティを確実にする必要がある。  [0004] Such third-party fraudulent operations are not limited to automobile door locks, but remotely monitor devices such as home door locks, cameras, PDAs (Personal Digital Assistants), personal computers, and mobile phones. Similarly, the portable device to be operated needs to be prevented. Therefore, it is necessary to ensure security in the same way when these devices are remotely monitored and operated by radio.

[0005] 一方、上述のように、正当なユーザが所有する携帯装置そのものを、第三者が盗み などで不正に取得する場合のほか、無線で通信される IDをなんらかの手段により盗 聴することで、同じ IDを有する携帯装置 (クローン装置)が製作され、不正使用される 可能性もある。クローン装置とは、正当なユーザが所有する携帯装置のワイヤレス認 証機能 (IDを含む)と同一の機能を有する別の装置であり、悪意の第三者がこのクロ ーン装置を用いることで、正当なユーザになりすまして、不正使用されてしまう。この 場合、正当なユーザの手元には、正規の携帯装置が存在するので、クローン装置が 不正使用されるまでクローン装置の存在に気づかず、クローン装置による不正使用 を防止することができない。 On the other hand, as described above, a portable device itself owned by a legitimate user is illegally acquired by a third party by stealing or the like, and an ID communicated wirelessly is stolen by some means. By listening, a portable device (clone device) with the same ID may be produced and used illegally. A clone device is another device that has the same function as the wireless authentication function (including ID) of a portable device owned by a legitimate user, and a malicious third party uses this clone device. Impersonate a legitimate user and misuse it. In this case, since the legitimate user has a legitimate portable device, it does not notice the existence of the clone device until the clone device is illegally used, and the illegal use by the clone device cannot be prevented.

発明の開示  Disclosure of the invention

[0006] 本発明の目的は、第三者のなりすましによる不正使用を防止することができるワイヤ レス認証方法及びワイヤレス認証システムを提供することにある。  An object of the present invention is to provide a wireless authentication method and a wireless authentication system that can prevent unauthorized use due to impersonation of a third party.

[0007] 本発明の目的は、クローン装置による不正使用を防止することができるワイヤレス認 証方法及びワイヤレス認証システムを提供することにある。  An object of the present invention is to provide a wireless authentication method and a wireless authentication system that can prevent unauthorized use by a clone device.

[0008] 上記目的を達成するための本発明の第一のワイヤレス認証方法は、それぞれが無 線信号の送受信機能を有する第一の通信装置と第二の通信装置間のワイヤレス認 証方法であって、前記第一の通信装置は、前記第二の通信装置からの送信信号レ ベルが所定値以上であると判定し、前記第二の通信装置から前記第二の通信装置 を識別する識別情報を受信すると、当該受信した識別情報を前記第一の通信装置 の内部記憶手段に記憶された識別情報と照合して、前記第二の通信装置に対する 第一の認証処理を実施し、前記第一の通信装置は、前記第一の認証処理により、前 記第二の通信装置の認証に成功すると、前記識別情報を含む認証結果を遠隔の認 証局に通知し、前記認証局は、前記認証結果に含まれる前記識別情報を前記認証 局の内部記憶手段に記憶される識別情報と照合し、前記第二の通信装置に対する 第二の認証処理を実施し、前記認証局は、前記第二の認証処理により、前記第二の 通信装置の認証に成功すると、前記第一の通信装置に対して、前記第一の通信装 置によって使用が制限されている機器の使用制限を解除するための解除許可信号 を送信し、前記第一の通信装置は、当該解除許可信号を受信すると、前記機器の使 用制限を解除することを特徴とする。  [0008] A first wireless authentication method of the present invention for achieving the above object is a wireless authentication method between a first communication device and a second communication device each having a wireless signal transmission / reception function. The first communication device determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value, and identifies the second communication device from the second communication device. Is received, the received identification information is collated with the identification information stored in the internal storage means of the first communication device, a first authentication process is performed on the second communication device, and the first When the second communication device succeeds in authenticating the second communication device by the first authentication process, the communication device notifies the authentication result including the identification information to a remote certificate authority, and the certificate authority The identification information included in the result is stored in the certification authority. The second authentication process is performed on the second communication device by comparing with the identification information stored in the storage unit, and the certificate authority authenticates the second communication device by the second authentication process. If successful, a release permission signal for releasing the use restriction of the device whose use is restricted by the first communication device is transmitted to the first communication device, and the first communication device When the release permission signal is received, the use restriction of the device is released.

[0009] 上記第一のワイヤレス認証方法は、好ましくは、前記第二の通信装置は、第三の通 信装置からの送信信号レベルが所定値以上であると判定し、前記第三の通信装置 から前記第三の通信装置を識別する識別情報を受信すると、当該受信した識別情 報を前記第二の通信装置の内部記憶手段に記憶された識別情報と照合して、前記 第三の通信装置に対する第三の認証処理を実施し、前記第二の通信装置は、前記 第三の認証処理により、前記第三の通信装置の認証に成功している間のみ、前記第 一の通信装置と通信可能であることを特徴とする。 [0009] Preferably, in the first wireless authentication method, the second communication device is a third communication device. When it is determined that the transmission signal level from the communication device is equal to or higher than a predetermined value and the identification information for identifying the third communication device is received from the third communication device, the received identification information is converted into the second identification information. Compared with the identification information stored in the internal storage means of the communication device, the third authentication process for the third communication device is performed, and the second communication device performs the third authentication process, The communication with the first communication device is possible only while the authentication of the third communication device is successful.

[0010] 本発明の第二のワイヤレス認証方法は、それぞれが無線信号の送受信機能を有す る第一の通信装置と第二の通信装置間のワイヤレス認証方法であって、前記第一の 通信装置は、前記第二の通信装置からの送信信号レベルが所定値以上であると判 定し、前記第二の通信装置から前記第二の通信装置を識別する識別情報を受信す ると、当該受信した識別情報を前記第一の通信装置の内部記憶手段に記憶された 識別情報と照合して、前記第二の通信装置に対する第一の認証処理を実施し、前 記第一の通信装置は、前記第一の認証処理により、前記第二の通信装置の認証に 成功すると、当該認証結果を遠隔の認証局に通知し、前記認証局は、前記第二の通 信装置に行動履歴情報を要求し、当該行動履歴情報を前記第二の通信装置から受 信すると、当該受信した行動履歴情報を前記認証局の内部記憶手段に記憶された 行動履歴情報と照合して、前記第二の通信装置に対する第二の認証処理を実施し 、前記認証局は、前記第二の認証処理により、前記第二の通信装置の認証に成功 すると、前記第一の通信装置に対して、前記第一の通信装置によって使用が制限さ れている機器の使用制限を解除するための解除許可信号を送信し、前記第一の通 信装置は、当該解除許可信号を受信すると、前記機器の使用制限を解除することを 特徴とする。  [0010] A second wireless authentication method of the present invention is a wireless authentication method between a first communication device and a second communication device each having a radio signal transmission / reception function, wherein the first communication When the device determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value and receives the identification information identifying the second communication device from the second communication device, the device The received identification information is collated with the identification information stored in the internal storage means of the first communication device, and the first authentication process for the second communication device is performed. When the authentication of the second communication device is successful by the first authentication process, the authentication result is notified to a remote certificate authority, and the certificate authority sends the action history information to the second communication device. Request and receive the action history information from the second communication device. Then, the received action history information is collated with the action history information stored in the internal storage means of the certificate authority, and a second authentication process is performed on the second communication device. Upon successful authentication of the second communication device by the second authentication process, the use restriction of the device whose use is restricted by the first communication device is released for the first communication device. When the release permission signal is transmitted, the first communication device receives the release permission signal and cancels the use restriction of the device.

[0011] 上記第二のワイヤレス認証方法は、好ましくは、前記第二の通信装置は、第三の通 信装置からの送信信号レベルが所定値以上であると判定し、前記第三の通信装置 から前記第三の通信装置を識別する識別情報を受信すると、当該受信した識別情 報を前記第二の通信装置の内部記憶手段に記憶された識別情報と照合して、前記 第三の通信装置に対する第三の認証処理を実施し、前記第二の通信装置は、前記 第三の認証処理により、前記第三の通信装置の認証に成功している間のみ、前記第 一の通信装置と通信可能であることを特徴とする。 In the second wireless authentication method, preferably, the second communication device determines that a transmission signal level from the third communication device is equal to or higher than a predetermined value, and the third communication device. When the identification information for identifying the third communication device is received from the third communication device, the received identification information is collated with the identification information stored in the internal storage means of the second communication device. And the second communication device performs the third authentication process only while the third communication device is successfully authenticated by the third authentication process. It is possible to communicate with one communication device.

[0012] 本発明の第三のワイヤレス認証方法は、それぞれが無線信号の送受信機能を有す る第一の通信装置と第二の通信装置間のワイヤレス認証方法であって、前記第一の 通信装置において、前記第二の通信装置からの送信信号レベルが所定値以上であ ると判定し、前記第二の通信装置から前記第二の通信装置を識別する識別情報を 受信すると、当該受信した識別情報を前記第一の通信装置の内部記憶手段に記憶 された識別情報と照合して、前記第二の通信装置に対する第一の認証処理を実施し 、前記第一の認証処理により、前記第二の通信装置の認証に成功した後、さらに、 前記第二の通信装置の行動履歴情報を前記第二の通信装置から受信し、当該受信 した行動履歴情報を前記内部記憶手段に記憶された行動履歴情報と照合して、前 記第二の通信装置に対する第二の認証処理を実施し、前記第二の認証処理により、 前記第二の通信装置の認証に成功すると、前記第一の通信装置によって使用が制 限されている機器の使用制限を解除することを特徴とする。  [0012] A third wireless authentication method of the present invention is a wireless authentication method between a first communication device and a second communication device each having a radio signal transmission / reception function, wherein the first communication When the apparatus determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value and receives identification information for identifying the second communication device from the second communication device, the received signal is received. The identification information is collated with the identification information stored in the internal storage means of the first communication device, a first authentication process is performed on the second communication device, and the first authentication process performs the first authentication process. After successful authentication of the second communication device, the behavior history information of the second communication device is further received from the second communication device, and the received behavior history information is stored in the internal storage means. Compared with history information, When the second authentication process is performed on the second communication device and the second authentication device is successfully authenticated by the second authentication process, the device whose use is restricted by the first communication device It is characterized by canceling the use restriction.

[0013] 上記第三のワイヤレス認証方法は、好ましくは、前記第二の通信装置は、第三の通 信装置からの送信信号レベルが所定値以上であると判定し、前記第三の通信装置 から前記第三の通信装置を識別する識別情報を受信すると、当該受信した識別情 報を前記第二の通信装置の内部記憶手段に記憶された識別情報と照合して、前記 第三の通信装置に対する第三の認証処理を実施し、前記第二の通信装置は、前記 第三の認証処理により、前記第三の通信装置の認証に成功している間のみ、前記第 一の通信装置と通信可能であることを特徴とする。  In the third wireless authentication method, preferably, the second communication device determines that a transmission signal level from the third communication device is equal to or higher than a predetermined value, and the third communication device. When the identification information for identifying the third communication device is received from the third communication device, the received identification information is collated with the identification information stored in the internal storage means of the second communication device. And the second communication device communicates with the first communication device only while the third authentication device is successfully authenticated by the third authentication processing. It is possible.

[0014] 好ましくは、上記第二及び第三のワイヤレス認証方法にお!、て、前記行動履歴情 報は、前記第二の通信装置の第一の通信装置との通信に関する履歴情報を有する ことを特徴とする。  [0014] Preferably, in the second and third wireless authentication methods, the action history information includes history information related to communication of the second communication device with the first communication device. It is characterized by.

[0015] 好ましくは、上記第二の第三のワイヤレス認証方法において、前記行動履歴情報 は、前記第二の通信装置が第一の通信装置と通信を行った時刻又は位置の少なく とも一方を含む情報であることを特徴とする。  [0015] Preferably, in the second third wireless authentication method, the action history information includes at least one of a time or a position at which the second communication device communicates with the first communication device. It is characterized by being information.

[0016] 好ましくは、上記第二のワイヤレス認証方法において、前記第二の通信装置は、所 定のタイミングで前記行動履歴情報を作成し、前記第二の通信装置の内部記憶手 段に記憶させるとともに、当該作成した行動履歴情報を前記認証局に送信し、前記 認証局は、前記行動履歴情報を受信すると、前記認証局の内部記憶手段に記憶さ せることを特徴とする。 [0016] Preferably, in the second wireless authentication method, the second communication device creates the action history information at a predetermined timing, and stores the internal history of the second communication device. And the created action history information is transmitted to the certificate authority, and when the certificate authority receives the action history information, the action history information is stored in an internal storage unit of the certificate authority.

[0017] 好ましくは、上記第二のワイヤレス認証方法において、前記行動履歴情報は、前記 第二の通信装置の第一の通信装置との通信に関する履歴情報を有し、前記第二の 通信装置は、前記第一の通信装置との通信に関する第一の行動履歴情報を作成し 、前記第二の通信装置の内部記憶手段に記憶させるとともに、当該作成した第一の 行動履歴情報を前記認証局に送信し、前記第一の通信装置は、前記第二の通信装 置との通信に関する第二の行動履歴情報を作成し、前記第一の通信装置の内部記 憶手段に記憶させるとともに、当該作成した第二の行動履歴情報を前記認証局に送 信し、前記認証局は、前記第一の行動履歴情報と前記第二の行動履歴情報を受信 すると、両情報が一致している力否か判定し、一致している場合、前記第一の行動履 歴情報又は前記第二の行動履歴情報を前記認証局の内部記憶手段に記憶させる ことを特徴とする。  [0017] Preferably, in the second wireless authentication method, the action history information includes history information related to communication of the second communication device with the first communication device, and the second communication device includes: The first action history information relating to communication with the first communication device is created and stored in the internal storage means of the second communication device, and the created first action history information is stored in the certificate authority. The first communication device creates second action history information related to communication with the second communication device, stores the second action history information in the internal storage means of the first communication device, and creates the creation The second action history information is sent to the certificate authority, and when the certificate authority receives the first action history information and the second action history information, it is determined whether or not the two information match. If it is determined and matches, the first action The gravel information or the second action history information, characterized in that to be stored in the internal storage unit of the authentication station.

[0018] 好ましくは、上記第二のワイヤレス認証方法において、前記行動履歴情報は、前記 第二の通信装置の第一の通信装置との通信に関する履歴情報を有し、前記第一の 通信装置は、前記第二の通信装置との通信に関する行動履歴情報を作成し、前記 第一の通信装置の内部記憶手段に記憶させるとともに、当該作成した行動履歴情報 を前記認証局に送信し、前記認証局は、前記行動履歴情報を受信すると、前記認証 局の内部記憶手段に記憶させることを特徴とする。  [0018] Preferably, in the second wireless authentication method, the action history information includes history information related to communication of the second communication device with the first communication device, and the first communication device includes: , Creating action history information related to communication with the second communication device, storing the action history information in the internal storage means of the first communication device, transmitting the created action history information to the certificate authority, and When the action history information is received, the action history information is stored in the internal storage means of the certificate authority.

[0019] 好ましくは、上記第三のワイヤレス認証方法において、前記第二の通信装置は、前 記第一の通信装置との通信に関する行動履歴情報を作成し、当該行動履歴情報を 前記第二の通信装置の内部記憶手段に記憶させ、前記第一の通信装置は、前記第 二の通信装置が作成する行動履歴情報と対応する情報を含む前記第二の通信装 置との通信に関する行動履歴情報を作成し、当該行動履歴情報を前記第一の通信 装置の内部記憶手段に記憶させることを特徴とする。  [0019] Preferably, in the third wireless authentication method, the second communication apparatus creates action history information related to communication with the first communication apparatus, and the action history information is stored in the second wireless authentication method. Action history information related to communication with the second communication device including information corresponding to the action history information created by the second communication device, which is stored in an internal storage unit of the communication device. And the action history information is stored in the internal storage means of the first communication device.

[0020] 好ましくは、上記第二のワイヤレス認証方法において、前記第二の通信装置は、所 定のタイミングで前記行動履歴情報を作成し、別の通信装置からの送信信号レベル が所定値以上であると判定すると、当該作成した行動履歴情報を前記別の通信装置 に送信し、前記別の通信装置は、受信した行動履歴情報を前記認証局に転送し、前 記認証局は、受信した行動履歴情報を前記第二の通信装置の行動履歴情報として 前記認証局の内部記憶手段に記憶させることを特徴とする。 [0020] Preferably, in the second wireless authentication method, the second communication device creates the action history information at a predetermined timing, and transmits a transmission signal level from another communication device. Is determined to be greater than or equal to a predetermined value, the created action history information is transmitted to the other communication device, and the other communication device transfers the received action history information to the certificate authority, and the certificate authority Stores the received action history information as action history information of the second communication device in an internal storage unit of the certificate authority.

[0021] 上記目的を達成するための本発明の第一のワイヤレス認証システムの構成は、第 一の通信装置、第二の通信装置及び認証局を有するワイヤレス認証システムであつ て、前記第一の通信装置は、前記第二の通信装置からの送信信号レベルが所定値 以上であるか否かを判定する第一の判定手段と、前記第二の通信装置を識別する 識別情報を前記第二の通信装置から受信する第一の受信手段と、あらかじめ前記第 二の通信装置の識別情報を記憶している第一の記憶手段と、  [0021] The configuration of the first wireless authentication system of the present invention to achieve the above object is a wireless authentication system having a first communication device, a second communication device, and a certificate authority, The communication device includes first determination means for determining whether or not a transmission signal level from the second communication device is equal to or higher than a predetermined value, and identification information for identifying the second communication device as the second information A first receiving means for receiving from the communication device; a first storage means for storing identification information of the second communication device in advance;

前記第一の判定手段が所定値以上であると判定した場合に、当該受信した識別情 報を前記第一の記憶手段に記憶された識別情報と照合して、前記第二の通信装置 に対する認証処理を実施する第一の認証手段と、前記第一の認証手段による前記 第二の通信装置の認証に成功すると、前記識別情報を含む認証結果を前記認証局 に通知する第一の送信手段とを有し、前記第二の通信装置は、あらかじめ前記第二 の通信装置の識別情報を記憶して 、る第二の記憶手段と、前記識別情報を前記第 一の通信装置に送信する第二の送信手段とを有し、前記認証局は、あらかじめ前記 第二の通信装置の識別情報を記憶して 、る認証局記憶手段と、前記認証結果に含 まれる前記識別情報を前記認証局記憶手段に記憶される識別情報と照合し、前記 第二の通信装置に対する認証処理を実施する認証局認証手段と、前記認証局手段 による前記第二の通信装置の認証に成功すると、前記第一の通信装置に対して、前 記第一の通信装置によって使用が制限されている機器の使用制限を解除するため の解除許可信号を送信する認証局送信手段とを有し、前記第一の通信装置は、さら に、当該解除許可信号を受信すると、前記機器の使用制限を解除する第一の解除 手段を有することを特徴とする。  When the first determination unit determines that the value is equal to or greater than a predetermined value, the received identification information is collated with the identification information stored in the first storage unit to authenticate the second communication device. First authentication means for performing processing, and first transmission means for notifying the authentication station of an authentication result including the identification information upon successful authentication of the second communication device by the first authentication means; The second communication device stores the identification information of the second communication device in advance and transmits the identification information to the first communication device. The certificate authority stores the identification information of the second communication device in advance, and the certificate authority storage means stores the identification information included in the authentication result. The identification information stored in the means, and the second When the authentication of the second communication device by the certificate authority and the certificate authority authenticating means for performing authentication processing on the communication device succeeds, the first communication device uses the first communication device. And a certificate authority transmitting means for transmitting a release permission signal for releasing the use restriction of the device for which the device is restricted, and when the first communication device receives the release permission signal, It has the 1st cancellation | release means which cancels | releases use restrictions of this.

[0022] 上記第一のワイヤレス認証システムは、好ましくは、さらに第三の通信装置を備え、 前記第三の通信装置は、あらかじめ前記第三の通信装置の識別情報を記憶して 、 る第三の記憶手段と、前記識別情報を前記第二の通信装置に送信する第三の送信 手段とを有し、前記第二の通信装置は、さらに、前記第三の通信装置からの送信信 号レベルが所定値以上であるか否かを判定する第二の判定手段と、前記第三の通 信装置を識別する識別情報を前記第三の通信装置から受信する第四の受信手段と 、あらかじめ前記第三の通信装置の識別情報を記憶している第四の記憶手段と、前 記第二の判定手段が所定値以上であると判定した場合に、前記受信した識別情報 を前記第四の記憶手段に記憶された識別情報と照合して、前記第三の通信装置に 対する認証処理を実施する第二の認証手段と、前記第二の認証手段による前記第 三の通信装置の認証に成功している間のみ、前記第一の通信装置との通信制限を 解除する第二の解除手段とを有することを特徴とする。 The first wireless authentication system preferably further includes a third communication device, and the third communication device stores identification information of the third communication device in advance. And a third transmission for transmitting the identification information to the second communication device And the second communication device further includes second determination means for determining whether or not a transmission signal level from the third communication device is equal to or higher than a predetermined value, and the third communication device. A fourth receiving means for receiving identification information for identifying the communication apparatus from the third communication apparatus; a fourth storage means for previously storing the identification information for the third communication apparatus; When the second determination means determines that it is greater than or equal to a predetermined value, the received identification information is checked against the identification information stored in the fourth storage means to authenticate the third communication device. And a second release for releasing the restriction on communication with the first communication device only while the authentication of the third communication device by the second authentication means is successful. Means.

本発明の第二のワイヤレス認証システムは、第一の通信装置、第二の通信装置及 び認証局を有するワイヤレス認証システムであって、前記第一の通信装置は、前記 第二の通信装置からの送信信号レベルが所定値以上であるか否かを判定する第一 の判定手段と、前記第二の通信装置を識別する識別情報を前記第二の通信装置か ら受信する第一の受信手段と、あらかじめ前記第二の通信装置の識別情報を記憶し て 、る第一の記憶手段と、前記第一の判定手段が所定値以上であると判定した場合 に、当該受信した識別情報を前記第一の記憶手段に記憶された識別情報と照合し て、前記第二の通信装置に対する認証処理を実施する第一の認証手段と、前記第 一の認証手段による前記第二の通信装置の認証に成功すると、前記識別情報を含 む認証結果を前記認証局に通知する第一の送信手段とを有し、前記第二の通信装 置は、前記第二の通信装置の識別情報と前記第二の通信装置の行動履歴情報を 記憶する第二の記憶手段と、前記識別情報を前記第一の通信装置に送信し、前記 行動履歴情報を前記認証局に送信する第二の送信手段を有し、前記認証局は、あ らかじめ前記第二の通信装置の行動履歴情報を記憶している認証局記憶手段と、 前記第二の通信装置に行動履歴情報を要求し、当該行動履歴情報を前記第二の 通信装置から受信すると、当該受信した行動履歴情報を前記認証局記憶手段に記 憶された行動履歴情報と照合して、前記第二の通信装置に対する認証処理を実施 する認証局認証手段と、前記認証局認証手段による前記第二の通信装置の認証に 成功すると、前記第一の通信装置に対して、前記第一の通信装置によって使用が制 限されている機器の使用制限を解除するための解除許可信号を送信する認証局送 信手段とを有し、前記第一の通信装置は、当該解除許可信号を受信すると、前記機 器の使用制限を解除する第一の解除手段をさらに有することを特徴とする。 A second wireless authentication system according to the present invention is a wireless authentication system having a first communication device, a second communication device, and a certificate authority, wherein the first communication device includes the second communication device. First determination means for determining whether or not the transmission signal level of the second communication apparatus is greater than or equal to a predetermined value, and first reception means for receiving identification information for identifying the second communication apparatus from the second communication apparatus And storing the identification information of the second communication device in advance, and determining that the first storage means and the first determination means are greater than or equal to a predetermined value, the received identification information First authentication means for performing authentication processing on the second communication device by comparing with the identification information stored in the first storage means, and authentication of the second communication device by the first authentication means If successful, authentication including the identification information First transmitting means for notifying the certificate authority of the result, and the second communication device stores identification information of the second communication device and action history information of the second communication device. A second storage unit, and a second transmission unit configured to transmit the identification information to the first communication device and transmit the action history information to the certificate authority. A certificate authority storage unit storing action history information of the second communication device; and requesting action history information from the second communication device; and receiving the action history information from the second communication device; The received action history information is checked against the action history information stored in the certificate authority storage means to perform authentication processing for the second communication device, and the certificate authority authentication means performs the authentication process. If the authentication of the second communication device is successful, the first communication device Against communication apparatus, control is used by said first communication device And a certificate authority transmission means for transmitting a release permission signal for releasing the use restriction of the limited device, and when the first communication device receives the release permission signal, the first communication device uses the device. It further has the 1st cancellation | release means which cancels | releases a restriction | limiting.

[0024] 上記第二のワイヤレス認証システムは、好ましくは、さらに、第三の通信装置を備え 、前記第三の通信装置は、あらかじめ前記第三の通信装置の識別情報を記憶してい る第三の記憶手段と、前記識別情報を前記第二の通信装置に送信する第三の送信 手段とを有し、前記第二の通信装置は、さらに、前記第三の通信装置からの送信信 号レベルが所定値以上であるか否かを判定する第二の判定手段と、前記第三の通 信装置を識別する識別情報を前記第三の通信装置から受信する第四の受信手段と 、あらかじめ前記第三の通信装置の識別情報を記憶している第四の記憶手段と、前 記第二の判定手段が所定値以上であると判定した場合に、前記受信した識別情報 を前記第四の記憶手段に記憶された識別情報と照合して、前記第三の通信装置に 対する認証処理を実施する第二の認証手段と、前記第二の認証手段による前記第 三の通信装置の認証に成功している間のみ、前記第一の通信装置との通信制限を 解除する第二の解除手段とを有することを特徴とする。  [0024] Preferably, the second wireless authentication system further includes a third communication device, and the third communication device stores identification information of the third communication device in advance. Storage means and third transmission means for transmitting the identification information to the second communication device, wherein the second communication device further transmits a transmission signal level from the third communication device. Second determination means for determining whether or not is greater than or equal to a predetermined value; fourth reception means for receiving identification information for identifying the third communication apparatus from the third communication apparatus; When the fourth storage means for storing the identification information of the third communication device and the second determination means determine that the second determination means is greater than or equal to a predetermined value, the received identification information is stored in the fourth storage. The third communication device in comparison with the identification information stored in the means A second authentication unit that performs authentication processing on the second communication unit, and a second communication unit that cancels communication restrictions with the first communication device only while the second authentication unit succeeds in authenticating the third communication device. And a second release means.

[0025] 本発明の第三のワイヤレス認証システムは、第一の通信装置と第二の通信装置と を備えるワイヤレス認証システムであって、前記第一の通信装置は、前記第二の通 信装置からの送信信号レベルが所定値以上であるか否かを判定する第一の判定手 段と、前記第二の通信装置を識別する識別情報を前記第二の通信装置から受信す る第一の受信手段と、あらかじめ前記第二の通信装置の識別情報及び行動履歴情 報を記憶している第一の記憶手段と、前記第一の判定手段が所定値以上であると判 定した場合に、当該受信した識別情報を前記第一の記憶手段に記憶された識別情 報と照合して、前記第二の通信装置に対する認証処理を実施し、当該認証による前 記第二の通信装置の認証に成功した後、さらに、前記第二の通信装置の行動履歴 情報を前記第二の通信装置から受信し、当該受信した行動履歴情報を前記第一の 記憶手段に記憶された行動履歴情報と照合して、前記第二の通信装置に対する別 の認証処理を実施する第一の認証手段と、前記第一の認証手段による前記第二の 通信装置に対する当該別の認証に成功すると、前記第一の通信装置によって使用 が制限されている機器の使用制限を解除する第一の解除手段とを有し、前記第二の 通信装置は、前記第二の通信装置の識別情報と前記第二の通信装置の行動履歴 情報を記憶する第二の記憶手段と、前記識別情報を前記第一の通信装置に送信す る第二の送信手段とを有することを特徴とする。 [0025] A third wireless authentication system of the present invention is a wireless authentication system comprising a first communication device and a second communication device, wherein the first communication device is the second communication device. A first determination means for determining whether or not the transmission signal level from the second communication apparatus is equal to or higher than a predetermined value, and a first information receiving identification information for identifying the second communication apparatus from the second communication apparatus When it is determined that the receiving means, the first storage means storing the identification information and the action history information of the second communication device in advance, and the first determining means are equal to or greater than a predetermined value, The received identification information is collated with the identification information stored in the first storage means, the authentication process for the second communication device is performed, and the authentication of the second communication device by the authentication is performed. After the success, the action history information of the second communication device Information is received from the second communication device, the received action history information is collated with the action history information stored in the first storage means, and another authentication process is performed on the second communication device. The first authentication means, and when the second authentication device succeeds in the second authentication device by the first authentication means, the first communication device uses the first authentication device. A first canceling unit that cancels the use restriction of the device that is restricted, and the second communication device includes identification information of the second communication device and action history information of the second communication device. And a second transmission means for transmitting the identification information to the first communication device.

[0026] 上記第三のワイヤレス認証システムは、好ましくは、さらに、第三の通信装置を備え 、前記第三の通信装置は、あらかじめ前記第三の通信装置の識別情報を記憶してい る第三の記憶手段と、前記識別情報を前記第二の通信装置に送信する第三の送信 手段とを有し、前記第二の通信装置は、さらに、前記第三の通信装置からの送信信 号レベルが所定値以上であるか否かを判定する第二の判定手段と、前記第三の通 信装置を識別する識別情報を前記第三の通信装置から受信する第四の受信手段と 、あらかじめ前記第三の通信装置の識別情報を記憶している第四の記憶手段と、前 記第二の判定手段が所定値以上であると判定した場合に、前記受信した識別情報 を前記第四の記憶手段に記憶された識別情報と照合して、前記第三の通信装置に 対する認証処理を実施する第二の認証手段と、前記第二の認証手段による前記第 三の通信装置の認証に成功している間のみ、前記第一の通信装置との通信制限を 解除する第二の解除手段とを有することを特徴とする。  The third wireless authentication system preferably further includes a third communication device, and the third communication device stores identification information of the third communication device in advance. Storage means and third transmission means for transmitting the identification information to the second communication device, wherein the second communication device further transmits a transmission signal level from the third communication device. Second determination means for determining whether or not is greater than or equal to a predetermined value; fourth reception means for receiving identification information for identifying the third communication apparatus from the third communication apparatus; When the fourth storage means for storing the identification information of the third communication device and the second determination means determine that the second determination means is greater than or equal to a predetermined value, the received identification information is stored in the fourth storage. The third communication device in comparison with the identification information stored in the means A second authentication unit that performs authentication processing on the second communication unit, and a second communication unit that cancels communication restrictions with the first communication device only while the second authentication unit succeeds in authenticating the third communication device. And a second release means.

[0027] 好ましくは、上記第二及び第三のワイヤレス認証システムにお 、て、前記行動履歴 情報は、前記第二の通信装置の第一の通信装置との通信に関する履歴情報を有す ることを特徴とする。  [0027] Preferably, in the second and third wireless authentication systems, the action history information includes history information related to communication of the second communication device with the first communication device. It is characterized by.

[0028] 好ましくは、上記第二及び第三のワイヤレス認証システムにお 、て、前記行動履歴 情報は、前記第二の通信装置が第一の通信装置と通信を行った時刻又は位置の少 なくとも一方を含む情報であることを特徴とする。  [0028] Preferably, in the second and third wireless authentication systems, the behavior history information includes a time or position at which the second communication device communicates with the first communication device. Both of them are information including one of them.

[0029] 好ましくは、上記第二のワイヤレス認証システムにおいて、前記第二の通信装置は 、所定のタイミングで前記行動履歴情報を作成し、前記第二の記憶手段に記憶させ るとともに、当該作成した行動履歴情報を前記認証局に送信し、前記認証局は、前 記行動履歴情報を受信すると、前記認証局記憶手段に記憶させることを特徴とする  [0029] Preferably, in the second wireless authentication system, the second communication device creates the action history information at a predetermined timing and stores the behavior history information in the second storage unit. Action history information is transmitted to the certificate authority, and when the certificate authority receives the action history information, the certificate authority storage means stores the action history information.

[0030] 好ましくは、上記第二のワイヤレス認証システムにお 、て、前記行動履歴情報は、 前記第二の通信装置の第一の通信装置との通信に関する履歴情報を有し、前記第 二の通信装置は、前記第一の通信装置との通信に関する第一の行動履歴情報を作 成し、前記第二の通信装置の内部記憶手段に記憶させるとともに、当該作成した第 一の行動履歴情報を前記認証局に送信し、前記第一の通信装置は、前記第二の通 信装置との通信に関する第二の行動履歴情報を作成し、前記第一の通信装置の内 部記憶手段に記憶させるとともに、当該作成した第二の行動履歴情報を前記認証局 に送信し、前記認証局は、前記第一の行動履歴情報と前記第二の行動履歴情報を 受信すると、両情報が一致している力否か判定し、一致している場合、前記第一の行 動履歴情報又は前記第二の行動履歴情報を前記認証局記憶手段に記憶させること を特徴とする。 [0030] Preferably, in the second wireless authentication system, the action history information is: The second communication device has history information related to communication with the first communication device, and the second communication device creates first action history information related to communication with the first communication device. The first communication history information is stored in the internal storage means of the second communication device and the created first action history information is transmitted to the certificate authority, and the first communication device communicates with the second communication device. Second action history information relating to communication is created and stored in the internal storage means of the first communication device, and the created second action history information is transmitted to the certificate authority. When the first action history information and the second action history information are received, it is determined whether or not the information matches, and if they match, the first action history information or the second action history information is determined. The action history information is stored in the certificate authority storage means. To.

[0031] 好ましくは、上記第二のワイヤレス認証システムにおいて、前記行動履歴情報は、 前記第二の通信装置の第一の通信装置との通信に関する履歴情報を有し、前記第 一の通信装置は、前記第二の通信装置との通信に関する行動履歴情報を作成し、 前記第一の通信装置の内部記憶手段に記憶させるとともに、当該作成した行動履歴 情報を前記認証局に送信し、前記認証局は、前記行動履歴情報を受信すると、前記 認証局記憶手段に記憶させることを特徴とする。  [0031] Preferably, in the second wireless authentication system, the action history information includes history information related to communication of the second communication device with the first communication device, and the first communication device includes: , Creating action history information related to communication with the second communication device, storing the action history information in the internal storage means of the first communication device, transmitting the created action history information to the certificate authority, When the behavior history information is received, the certificate authority storage means stores the behavior history information.

[0032] 好ましくは、上記第三のワイヤレス認証システムにおいて、前記第二の通信装置は 、前記第一の通信装置との通信に関する行動履歴情報を作成し、当該行動履歴情 報を前記第二の記憶手段に記憶させ、前記第一の通信装置は、前記第二の通信装 置が作成する行動履歴情報と対応する情報を含む前記第二の通信装置との通信に 関する行動履歴情報を作成し、当該行動履歴情報を前記第一の記憶手段に記憶さ せることを特徴とする。  [0032] Preferably, in the third wireless authentication system, the second communication device creates action history information related to communication with the first communication apparatus, and the action history information is transmitted to the second wireless authentication system. The first communication device creates action history information related to communication with the second communication device including information corresponding to the action history information created by the second communication device. The action history information is stored in the first storage means.

[0033] 好ましくは、上記第二のワイヤレス認証システムにおいて、前記第二の通信装置は 、所定のタイミングで前記行動履歴情報を作成し、別の通信装置からの送信信号レ ベルが所定値以上であると判定すると、当該作成した行動履歴情報を前記別の通信 装置に送信し、前記別の通信装置は、受信した行動履歴情報を前記認証局に転送 し、前記認証局は、受信した行動履歴情報を前記第二の通信装置の行動履歴情報 として前記認証局記憶手段に記憶させることを特徴とする。 図面の簡単な説明 [0033] Preferably, in the second wireless authentication system, the second communication device creates the action history information at a predetermined timing, and a transmission signal level from another communication device is a predetermined value or more. If it is determined that there is, the created action history information is transmitted to the other communication device, the other communication device transfers the received action history information to the certificate authority, and the certificate authority receives the received action history information. Information is stored in the certificate authority storage means as action history information of the second communication device. Brief Description of Drawings

[図 1]本発明の実施の形態におけるワイヤレス認証システムの第一の構成例を示す 図である。 FIG. 1 is a diagram showing a first configuration example of a wireless authentication system in an embodiment of the present invention.

[図 2]ワイヤレス認証を実行する使用制限装置を携帯電話に適用した例の全体概略 ブロック図である。  FIG. 2 is an overall schematic block diagram of an example in which a use restriction device that executes wireless authentication is applied to a mobile phone.

[図 3]識別信号送受信ユニットの概略ブロック図である。  FIG. 3 is a schematic block diagram of an identification signal transmission / reception unit.

[図 4]使用制限解除ユニットの概略ブロック図である。 FIG. 4 is a schematic block diagram of a use restriction release unit.

[図 5]送信ユニット 10及び解除ユニット 20の具体的な実現構成例を示す図である。  FIG. 5 is a diagram showing a specific implementation example of the transmission unit 10 and the release unit 20.

[図 6]—致'加算回路の詳細構成例である。  [FIG. 6] is a detailed configuration example of a “match” adder circuit.

[図 7]識別信号と送信タイミングの説明図である。  FIG. 7 is an explanatory diagram of an identification signal and transmission timing.

[図 8]識別番号の構成内容の説明図である。  FIG. 8 is an explanatory diagram of the configuration content of an identification number.

[図 9]パルス圧縮信号とパルス圧縮処理の説明図である。  FIG. 9 is an explanatory diagram of a pulse compression signal and pulse compression processing.

[図 10]受信信号の検波波形と確認信号の関係の説明図である。  FIG. 10 is an explanatory diagram of the relationship between the detection waveform of the received signal and the confirmation signal.

[図 11]受信信号レベルとレベル判定区間の説明図である。  FIG. 11 is an explanatory diagram of a received signal level and a level determination section.

[図 12]認証局 Dが管理する ID管理テーブルの例を示す図である。  FIG. 12 is a diagram showing an example of an ID management table managed by Certificate Authority D.

[図 13]図 1に示したワイヤレス認証システムの第一の構成例における第一の認証処 理手順を示す図である(ウェアラブルキーユニット Cと携帯端末 Bとの間の認証処理 手順)。  FIG. 13 is a diagram showing a first authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. 1 (authentication processing procedure between wearable key unit C and portable terminal B).

[図 14]図 1に示したワイヤレス認証システムの第一の構成例における第一の認証処 理手順を示す図である (携帯端末 B、自動車のドアロック装置 A及び認証局 D間の認 証処理手順)。  FIG. 14 is a diagram showing a first authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. 1 (authentication between mobile terminal B, automobile door lock device A, and certificate authority D). Processing procedure).

[図 15]図 1に示したワイヤレス認証システムの第一の構成例における第二の認証処 理手順を示す図である。  FIG. 15 is a diagram showing a second authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. 1.

[図 16]クローン装置がドアロック装置 Aと認証局 Dと認証を行う状況を示す概念図で ある。  FIG. 16 is a conceptual diagram showing a situation where the clone device authenticates with the door lock device A and the certificate authority D.

[図 17]携帯端末 Bの行動履歴に関するデータベースの例を示す図である。  FIG. 17 is a diagram showing an example of a database related to an action history of mobile terminal B.

[図 18]本発明の実施の形態におけるワイヤレス認証システムの第二の構成例を示す 図である。 [図 19]図 17に示したワイヤレス認証システムの第二の構成例による第三の認証処理 手順を示す図である。 FIG. 18 is a diagram showing a second configuration example of the wireless authentication system in the embodiment of the present invention. FIG. 19 is a diagram showing a third authentication processing procedure according to the second configuration example of the wireless authentication system shown in FIG. 17.

[図 20]対になる別の携帯端末を経由した行動履歴の送信方法を説明する図である。  FIG. 20 is a diagram for explaining a method of transmitting an action history via another mobile terminal that is a pair.

[図 21]別の形態端末を経由した行動履歴の送信処理について説明する図である。 発明を実施するための最良の形態  FIG. 21 is a diagram illustrating action history transmission processing via another form terminal. BEST MODE FOR CARRYING OUT THE INVENTION

[0035] 以下、図面を参照して本発明の実施の形態について説明する。しかしながら、かか る実施の形態例が、本発明の技術的範囲を限定するものではない。  Hereinafter, embodiments of the present invention will be described with reference to the drawings. However, the embodiment does not limit the technical scope of the present invention.

[0036] また、本実施の形態例では、自動車のドアロック装置を、セキュリティの対象となる 被制御機器の例として説明するが、もちろん、これに限られるものではなぐ本発明は 、 自宅のドアロック、カメラ、 PDA(Personal Digital Assistant),ノ ソコン、携帯電話な ど遠隔からの監視、操作を可能とする対象物すべてに適用可能である。  [0036] Further, in the present embodiment, the automobile door lock device will be described as an example of a controlled device that is a security target, but of course the present invention is not limited to this. It can be applied to all objects that can be remotely monitored and operated, such as locks, cameras, PDAs (Personal Digital Assistants), computers, and mobile phones.

[0037] 図 1は、本発明の実施の形態におけるワイヤレス認証システムの第一の構成例を示 す図である。図 1において、ワイヤレス認証システムは、被制御機器である自動車のド アロック装置 A、ドアロック装置 Aを使用制限及びその使用制限を解除可能な携帯端 末 B、さらに、その携帯端末 Bを使用制限及びその使用制限を解除可能なウェアラブ ルキーユニット C、及び認証局 Dから構成される。  FIG. 1 is a diagram showing a first configuration example of the wireless authentication system in the embodiment of the present invention. In Fig. 1, the wireless authentication system restricts the use of the door lock device A and door lock device A of the controlled device, the portable terminal B that can be used and the use restriction can be lifted, and the use of the portable terminal B. And a wearable key unit C that can lift its usage restrictions and a certificate authority D.

[0038] 認証局 Dは、携帯端末 Bと被制御機器 Aと通信可能である。携帯端末 Bが携帯電 話である場合、携帯端末 Bは、携帯電話回線により認証局 Dと接続し、被制御機器 A も例えば、 PHSなどの通信回線により認証局 Dと接続する。被制御機器 Aが自宅の ドアロック装置など移動しな 、装置である場合、有線による認証局 Dとの接続も可能 である。  The certificate authority D can communicate with the mobile terminal B and the controlled device A. When the mobile terminal B is a mobile phone, the mobile terminal B is connected to the certificate authority D via a mobile phone line, and the controlled device A is also connected to the certificate authority D via a communication line such as PHS. If the controlled device A is a device that does not move, such as a door lock device at home, it can be connected to the certificate authority D by wire.

[0039] 認証局 Dの主な役割は、携帯端末 Bとウェアラブルキーユニット Cとを関連付け、さ らに、被制御機器 Aと携帯端末 Bとを関連づけ、使用可能な状態にすることである。さ らに、被制御機器 Aが、携帯端末 Bによって使用制限解除の状態になる場合、両者 力もの確認のための通信が行われ、被制御機器 Aを解除して良 、かどうかの認証を 与える役割も有する。  [0039] The main role of the certificate authority D is to associate the portable terminal B with the wearable key unit C, and further associate the controlled device A with the portable terminal B so that they can be used. In addition, when controlled device A is in a state where the restriction on use is released by mobile device B, communication is performed for confirmation of both, and authentication is performed to confirm that controlled device A can be released. It also has a role to give.

[0040] まず、図 1の第一の構成における認証動作の概略を説明する。ウェアラブルキーュ ニット Cと携帯端末 Bとの間でワイヤレス認証が行われ、携帯端末 Bの使用制限が解 除された状態において、携帯端末 Bと被制御機器 Aがさらにワイヤレス認証を行う。ヮ ィャレス認証の詳しい動作については、次に詳細に説明する。そして、携帯端末 Bと 被制御機器 Aとのワイヤレス認証が正常に動作すると、認証局 Dにその認証結果が 送られる。認証局 Dは、認証結果を確認し、認証結果が正当であると判断すると、被 制御機器である自動車のドアロック装置 Aに解錠許可信号を送り、ドアロック装置 A は、それを受信することで、使用制限が解除され、ドアロックを解錠する。 First, an outline of the authentication operation in the first configuration of FIG. 1 will be described. Wireless authentication is performed between wearable unit C and mobile device B, and usage restrictions on mobile device B are removed. In the removed state, the mobile terminal B and the controlled device A further perform wireless authentication. The detailed operation of wireless authentication will be described in detail next. Then, when the wireless authentication between the mobile terminal B and the controlled device A operates normally, the authentication result is sent to the certificate authority D. When the certificate authority D confirms the authentication result and determines that the authentication result is valid, the certificate authority D sends an unlocking permission signal to the door lock device A of the controlled vehicle, and the door lock device A receives it. As a result, the use restriction is released and the door lock is unlocked.

[0041] ワイヤレス認証の動作について説明する。ワイヤレス認証は、それぞれ固有 IDを有 する一対の通信装置からなる使用制限装置により実現され、一方の通信装置 (以下 、ベースユニットと称す場合がある)は、被制御機器に使用制限可能に取り付けられ 、他方の通信装置 (以下、キーユニットと称す場合がある)は、ユーザが携帯する携帯 端末に取り付けられる。両通信装置は、それぞれ固有の ID (識別情報)を有し、あら 力じめ関連づけられている。両通信装置の距離が一定距離内になり、所定値以上の レベルで信号を受信すると、互いに一定時間毎に IDを送り合い、相手装置の IDを確 認する。正当な IDを正常に受信している間は、一方の通信装置 (ベースユニット)は 、被制御機器を使用可能状態にする (フルタイム認証)。両者が一定距離を離れ、相 手装置からの信号を一定レベル以上で受信できなくなると、一方の通信装置 (ベース ユニット)の使用制限機能により、被制御機器の使用ができない状態となり、また、他 方の通信装置 (キーユニット)は警報を発する。  [0041] The operation of wireless authentication will be described. Wireless authentication is realized by a use restriction device consisting of a pair of communication devices each having a unique ID. One communication device (hereinafter sometimes referred to as a base unit) is attached to a controlled device so that the use can be restricted. The other communication device (hereinafter sometimes referred to as a key unit) is attached to a portable terminal carried by the user. Both communication devices have unique IDs (identification information) and are associated with each other. When the distance between both communication devices is within a certain distance and a signal is received at a level equal to or higher than the predetermined value, IDs are sent to each other at regular intervals to confirm the ID of the partner device. While a valid ID is normally received, one communication device (base unit) makes the controlled device usable (full-time authentication). If the two devices are separated by a certain distance and cannot receive the signal from the other device at a certain level or more, the use restriction function of one communication device (base unit) makes the controlled device unusable. The other communication device (key unit) issues an alarm.

[0042] 本実施の形態例では、 2つのワイヤレス認証が実施され、一つは、ウェアラブルキ 一ユニット Cと携帯端末 Bとの間のワイヤレス認証である。このワイヤレス認証では、ゥ エアラブルキーユニット Cがキーユニットとして機能し、携帯端末 Bがベースユニットと して機能する。もう一つは、携帯端末 Bと自動車のドアロック装置 Aとの間のワイヤレス 認証である。このワイヤレス認証では、携帯端末 Bがキーユニットとして機能し、自動 車のドアロック装置 Aがベースユニットとして機能する。すなわち、携帯端末 Bは、ゥェ アラブルキーユニット Cとの間では、ベースユニットとして機能し、自動車のドアロック 装置 Aとの間では、ベースユニットとして機能することとなる。  [0042] In this embodiment, two wireless authentications are performed, and one is a wireless authentication between the wearable key unit C and the portable terminal B. In this wireless authentication, the wearable key unit C functions as a key unit, and the mobile terminal B functions as a base unit. The other is wireless authentication between the mobile terminal B and the car door lock device A. In this wireless authentication, the mobile terminal B functions as a key unit, and the automobile door lock device A functions as a base unit. That is, the portable terminal B functions as a base unit with the wearable key unit C, and functions as a base unit with the door lock device A of the automobile.

[0043] 図 2は、ワイヤレス認証を実行する使用制限装置を携帯電話に適用した例の全体 概略ブロック図を示している。 10はカード形式の小さな識別信号送受信ユニット、 20 は使用制限解除ユニット、 30は携帯電話である。識別信号送受信ユニット 10 (以下 送信ユニット 10と略称する)は、携帯電話 30とは分離して独立のカード形式のものと し、使用制限解除ユニット 20 (以下解除ユニット 20と略称する)は携帯電話 30に内蔵 されている。但し、解除ユニット 20は携帯電話 30の外側に一体に装着するようにして ちょい。 FIG. 2 shows an overall schematic block diagram of an example in which a use restriction device that performs wireless authentication is applied to a mobile phone. 10 is a small identification signal transmission / reception unit in card form, 20 Is a usage restriction release unit, and 30 is a mobile phone. The identification signal transmission / reception unit 10 (hereinafter abbreviated as “transmission unit 10”) is separated from the mobile phone 30 and is an independent card type. The use restriction release unit 20 (hereinafter abbreviated as “release unit 20”) is a mobile phone. Built in 30. However, the release unit 20 should be attached to the outside of the mobile phone 30 integrally.

[0044] 携帯電話 30は、従来の一般的なものの回路に使用制限手段として使用制限回路 30Aを付加したものである。送信ユニット 10は携帯電話 30の所有者又は使用者が 胸のポケット等に入れて携帯電話 30と共に一定の距離範囲内に置いて使用される。 送信ユニット 10はカード形式以外にも鍵など持ち運びに便利であれば他のどんな形 式のちのとしてちよい。  [0044] The mobile phone 30 is obtained by adding a use restriction circuit 30A as a use restriction means to a conventional general circuit. The transmission unit 10 is used by the owner or user of the mobile phone 30 in a chest pocket or the like and placed in a certain distance range together with the mobile phone 30. In addition to the card format, the transmission unit 10 can be any other format as long as it is convenient to carry keys.

[0045] 図 1との対応において、ウェアラブルキーユニット Cは、送信ユニット 10の一形態で あり、携帯電話 30は、携帯端末 Bの一形態である。従って、図 2では、ウェアラブルキ 一ユニット Cと携帯端末 Bとの間のワイヤレス認証についての説明となる。  In correspondence with FIG. 1, wearable key unit C is a form of transmission unit 10, and mobile phone 30 is a form of mobile terminal B. Therefore, FIG. 2 illustrates wireless authentication between wearable key unit C and portable terminal B.

[0046] 携帯電話 30そのものは、一般的なものである力も以下では簡単にその構成を説明 する。携帯電話 30には、送話系統 30B、受話系統 30C、電話番号入力系統 30D、 電源部 38が備えられている。送話系統 30Bでは、音声はマイクロフォン 33aで音声 信号に変換された後音声増幅回路 33bで増幅され、変調回路 33cで搬送波信号に より変調され、さらにその変調信号を送信アンプ 33dで増幅した後送受信アンテナ 3 Oxから電話局へ向け送信されるようになっている。送信アンプ 33dには通話スィッチ 33kが設けられ、この通話スィッチ 33kを操作すると送話モードが設定される。受話 系統 30Cでは、着信した起呼信号を受信アンプ 3 laで増幅し、番号認識回路 32aで 番号認識を行なった後着信音発生回路 32bから着信音がフックスイッチ 31cを通して スピーカ 31dから発せられ、通話はこの着信音に基づいてフックスイッチ 31cを切り換 えると音声入力モードとなり、受信アンプ 31aで増幅した受信信号を音声復調回路 3 lbで音声信号として復調し、その音声信号をフックスイッチ 31cを通してスピーカ 31 dへ送り音声として再生するようになって 、る。  [0046] The structure of the mobile phone 30 itself is also briefly described below. The mobile phone 30 is provided with a transmission system 30B, a reception system 30C, a telephone number input system 30D, and a power supply unit 38. In the transmission system 30B, the voice is converted into a voice signal by the microphone 33a, then amplified by the voice amplifier circuit 33b, modulated by the carrier wave signal by the modulation circuit 33c, and further, the modulated signal is amplified by the transmission amplifier 33d and transmitted / received. Antenna 3 Ox is sent to the central office. The transmission amplifier 33d is provided with a call switch 33k. When the call switch 33k is operated, a transmission mode is set. In the receiving system 30C, the incoming call signal is amplified by the receiving amplifier 3 la, the number is recognized by the number recognition circuit 32a, and then the ring tone is generated from the ring tone generation circuit 32b through the hook switch 31c and from the speaker 31d. When the hook switch 31c is switched based on this ringing tone, the voice input mode is set. The received signal amplified by the receiving amplifier 31a is demodulated as a voice signal by the voice demodulating circuit 3 lb. 31 Send to d and play as audio.

[0047] 電話番号入力系統 30Dでは、使用制限回路 30Aの ANDゲート 36aにキー操作無 効スィッチ 36bの操作入力、テンキー '機能キー 37a、スィッチ 37cの信号が入力され るように回路が接続されており、テンキー ·機能キー 37aで入力される暗証番号に基 づく警報解除回路 37bの出力によりスィッチ 37cを操作し、スィッチ 36bと 37cからの 信号及び解除ユニット 20からの使用制限解除信号の成立を条件に電話番号入力モ ードが設定されると、テンキー ·機能キー 37aから入力された電話番号がゲート 36aを 通り電話番号入力回路 35へ送られ、電話番号発生回路 34を介して変調回路 33c、 送信アンプ 33dを通り送受信アンテナ 30xから送信されるようになって ヽる。 [0047] In the telephone number input system 30D, the operation input of the key operation disable switch 36b, the numeric keypad 'function key 37a, and the signal of the switch 37c are input to the AND gate 36a of the use restriction circuit 30A. The switch 37c is operated by the output of the alarm release circuit 37b based on the password entered with the numeric keypad function key 37a, and the signals from the switches 36b and 37c and the release unit 20 When the phone number input mode is set on condition that the use restriction release signal is established, the phone number input from the numeric keypad function key 37a is sent to the phone number input circuit 35 through the gate 36a, and the phone number generation circuit The signal is transmitted from the transmitting / receiving antenna 30x through the modulation circuit 33c and the transmission amplifier 33d via 34.

[0048] なお、電源部 38の電源は携帯電話 30の電源スィッチ(図示省略)によって操作さ れ、上記各系統の回路へ電力を供給している力 この電源は後で構成例について説 明する解除ユニット 20に対して共通に用いてもょ 、し、あるいは解除ユニット 20には 別の独立電源を設けてもよい。上記共通に用いる場合は携帯電話 30の電源スィッチ が遮断されても常に解除ユニット 20へは電源が供給されるようにする。その理由につ いては後で説明する。 [0048] The power supply of the power supply unit 38 is operated by a power switch (not shown) of the mobile phone 30, and power for supplying power to the circuits of each of the above systems. The release unit 20 may be used in common, or the release unit 20 may be provided with another independent power source. When used in common, the power is always supplied to the release unit 20 even if the power switch of the mobile phone 30 is cut off. The reason will be explained later.

[0049] 図 3に、送信ユニット 10の構成例を示す。送信ユニット 10は、送信アンテナ 10Tか ら予め設定された固有のコード信号を含む識別信号を送信する送信器 15bと、後で 説明する解除ユニット 20の送信器カゝら送り返される確認信号を受信アンテナ 10Rを 介して受信する受信器 1 laとを備えて 、る。  FIG. 3 shows a configuration example of the transmission unit 10. The transmission unit 10 transmits a confirmation signal sent back from a transmitter 15b for transmitting an identification signal including a unique code signal set in advance from the transmission antenna 10T and a transmitter signal of the release unit 20 described later. A receiver 1 la for receiving via 10R is provided.

[0050] 識別信号を送信する送信系は、送受信制御タイマ 13aの指令で識別コードメモリ 1 3bに設定されている上記識別信号を送り出し、 FSK変調回路 15aで搬送波により F SK変調(250MHz)をした後送信器 15bから識別信号の送信信号を送り出すように している。  [0050] The transmission system for transmitting the identification signal sends out the identification signal set in the identification code memory 13b by the command of the transmission / reception control timer 13a, and FSK modulation (250 MHz) is performed by the carrier wave in the FSK modulation circuit 15a. The transmission signal of the identification signal is sent out from the rear transmitter 15b.

[0051] 14は電源制御回路、 18は電源部であり、電源制御回路 14からの信号によりスイツ チ 18aを閉じて各部への電力を供給する。  [0051] Reference numeral 14 denotes a power supply control circuit, and 18 denotes a power supply unit. The switch 18a is closed by a signal from the power supply control circuit 14 to supply power to each unit.

[0052] 上記確認信号を受信する受信系は、受信器 11aの後に次のような構成要素が接続 されている。まず受信した確認信号(250MHz)は FSK復調回路 l ibで FSK復調さ れ、一致'加算回路 11cへ送られる。そして一致'加算回路 11cでは予め識別コード メモリ 13bに記憶されて 、る識別信号を読み出して上記確認信号がこの識別信号と 一致しているかを判断するために識別信号の各ビット毎の一致点を加算処理する。  [0052] In the receiving system that receives the confirmation signal, the following components are connected after the receiver 11a. First, the received confirmation signal (250 MHz) is FSK demodulated by the FSK demodulator circuit ib and sent to the coincidence / adder circuit 11c. The coincidence / adder circuit 11c reads the identification signal stored in advance in the identification code memory 13b and determines the coincidence point for each bit of the identification signal in order to determine whether the confirmation signal matches the identification signal. Addition process.

[0053] 上記加算処理した出力信号 (パルス圧縮信号、これにつ ヽても後で説明する)は閾 値処理部 l idへ出力し、この閾値処理部 l idでは上記出力信号を、予め閾値設定 部 l id'で設定される閾値 (スレッシュホールド値)と比較し、上記出力信号が閾値を 超えて 、ればタイミング信号を信号有無判定部 12bへ送る。 [0053] The output signal after the above addition processing (pulse compression signal, which will be described later) is a threshold value. Output to the value processing unit l id, the threshold processing unit l id compares the output signal with a threshold value (threshold value) set in advance by the threshold setting unit l id ′, and the output signal exceeds the threshold value. Then, a timing signal is sent to the signal presence / absence determination unit 12b.

[0054] 一方、上述した受信器 11aで受信した確認信号は信号レベル検出回路 12aへも送 られており、この回路で検出された信号レベルを表わす信号が信号有無判定部 12b へ送られる。この信号有無判定部 12bへは、上記の他にも前述した FSK復調回路 1 lbからの確認信号と識別コードメモリ 13bからの識別コード信号も入力されている。  On the other hand, the confirmation signal received by the receiver 11a described above is also sent to the signal level detection circuit 12a, and a signal indicating the signal level detected by this circuit is sent to the signal presence / absence determination unit 12b. In addition to the above, the confirmation signal from the aforementioned FSK demodulating circuit 1 lb and the identification code signal from the identification code memory 13b are also input to the signal presence / absence determination unit 12b.

[0055] 上記信号有無判定部 12bは、上記確認信号と識別コード信号が一致しているかを 判定し、かつ閾値処理部 l idからのタイミング信号を受けた後一定時間 t内に受信す る確認信号の信号レベルが一定値以上であるかを判定し、上記 2つの判定が共に成 立する限り出力信号は発しないが、上記一致判定が成立するも信号レベルが一定値 以下と判定したときは警報回路 16へ警報信号を出力するようになっている。  [0055] The signal presence / absence determination unit 12b determines whether the confirmation signal matches the identification code signal, and receives the timing signal from the threshold processing unit id and receives the confirmation signal within a predetermined time t. It is determined whether the signal level of the signal is equal to or higher than a certain value, and an output signal is not generated as long as both of the above two determinations are established. An alarm signal is output to the alarm circuit 16.

[0056] 図 4に解除ユニット 20の構成例を示す。この解除ユニット 20は、図示のように、基本 構成は図 3の送信ユニット 10と大略同じである力 部分的には若干異なっており、以 下ではその異なる部分を中心に説明する。  FIG. 4 shows a configuration example of the release unit 20. As shown in the figure, the basic structure of the release unit 20 is almost the same as that of the transmission unit 10 in FIG. 3, and the force is partially different, and the following description will focus on the different parts.

[0057] 送信ユニット 10から送られた識別信号に基づいて信号有無判定部 22bで信号の有 無を判定し、識別信号を受信している限り信号有無判定部 22bは何ら信号を出力し ない点は送信ユニット 10と同じであるが、出力信号がなければ使用制限解除信号発 生部 26から常に使用制限解除信号を発生し、識別信号を受信しなくなると信号有無 判定部 22bからの出力信号で信号発生部 26から解除信号を送信するのを停止させ る点が異なっている。  [0057] The presence / absence of a signal is determined by the signal presence / absence determination unit 22b based on the identification signal transmitted from the transmission unit 10, and the signal presence / absence determination unit 22b does not output any signal as long as the identification signal is received. Is the same as the transmission unit 10, but if there is no output signal, the use restriction release signal generation unit 26 always generates a use restriction release signal, and if no identification signal is received, the output signal from the signal presence / absence determination unit 22b The difference is that transmission of the release signal from the signal generator 26 is stopped.

[0058] 又、電源部 28の電力は送受信制御タイマ 23aによる制御を受けず、各構成部に常 に送られており、携帯電話の電源を共有する場合でも、又共有しない場合でも電源 スィッチで電力の供給を遮断しな 、ようにして 、る。  [0058] In addition, the power of the power supply unit 28 is not controlled by the transmission / reception control timer 23a, and is always sent to each component, and the power switch is used regardless of whether the power supply of the mobile phone is shared or not. Do not shut off the power supply.

[0059] これは、後で説明するように送信ユニット 10から識別信号が送信されると、その送信 力 Sどんなときでも常に解除ユニット 20で受信し、その信号に基づいて識別信号の有 無を判断した後送受信制御タイマの指令で確認信号を解除ユニット 20の送信系から 常に一定間隔で送り返すためには解除ユニット 20の電源を常に ONにしておく必要 があるからである。 [0059] As described later, when an identification signal is transmitted from the transmission unit 10, the transmission power S is always received by the release unit 20 at any time, and the presence or absence of the identification signal is determined based on the signal. In order to send back a confirmation signal from the transmission system of the release unit 20 at a constant interval after the judgment by the transmission / reception control timer command, the release unit 20 must always be turned on. Because there is.

[0060] その他の構成部材は基本的に図 3の送信ユニット 10と同じであり、同じ構成部材に は 20番台で同じ末尾符号の番号を付して説明を省略する。  Other constituent members are basically the same as those of the transmission unit 10 of FIG. 3, and the same constituent members are numbered in the 20s with the same suffix numbers and description thereof is omitted.

[0061] 上記各構成部材の説明では送信ユニット 10からの識別信号は、予め設定された固 有のコード信号を含む信号としている力 図 8に示すように、この識別信号は M系列( Maximum length null sequence)信号とその後に続く携帯電話の電話番号(以下単に 電話番号という)の固有コード信号とから成る。識別番号に M系列信号を電話番号以 外にも含ませたのは、後で説明するように、識別番号を受信した際にその受信信号 が自己の携帯電話のものであるかを認識する特有の回路処理の際に都合のよい信 号とするためである。  [0061] In the description of each component above, the identification signal from the transmission unit 10 is a signal including a preset unique code signal. As shown in FIG. null sequence) signal, followed by a unique code signal of the mobile phone number (hereinafter simply called the phone number). The reason why M-sequence signals are included in the identification number other than the telephone number is that, as will be explained later, when the identification number is received, the received signal is that of the own mobile phone. This is to make the signal convenient for circuit processing.

[0062] なお、この識別信号は M系列信号と電話番号信号とを単位とし任意の時間間隔 S 秒 (例えば 2000ms)毎に繰り返す間欠的な信号として送信される。これは節電のた めであり、ノ ッテリの消耗を防止し安定して長時間の送信を可能にするためである。 M系列信号は、 CZAコード、 Pコード、リニア FM信号などとしてもよい。又、固有コ ード信号としての電話番号は携帯電話以外の機器では他の ID番号、その他の所有 者、管理者の情報を表わす信号などとしてもよい。  It should be noted that this identification signal is transmitted as an intermittent signal that repeats every arbitrary time interval S seconds (for example, 2000 ms) in units of an M-sequence signal and a telephone number signal. This is to save power and to prevent the battery from being exhausted and to enable stable long-time transmission. The M series signal may be a CZA code, P code, linear FM signal, or the like. In addition, the telephone number as the unique code signal may be a signal indicating other ID numbers, other owners, and administrator information for devices other than mobile phones.

[0063] M系列信号は、 2値擬似不規則信号の 1種であり、 2の n乗から 1を減じた長さ、即 ち(2"—1)の長さを持つ 1と 0からなる符号列(コード)であって、例えば n= 5であれば 31ビットの信号である。この M系列信号を一致.加算回路 11cへ送ると、図 9の Bで示 すパルス圧縮信号が得られる。このパルス圧縮では入力信号である M系列信号は 1 /31の信号圧縮が行なわれる。  [0063] The M-sequence signal is a kind of binary pseudo-random signal, and consists of 1 and 0 having a length obtained by subtracting 1 from 2 to the power of n, that is, a length of (2 "-1). For example, if n = 5, this is a 31-bit signal, and if this M-sequence signal is sent to the coincidence and adder circuit 11c, the pulse compression signal shown in Fig. 9B is obtained. In this pulse compression, the M-sequence signal that is the input signal is compressed by 1/31.

[0064] 又、上記固有コード信号は、携帯電話の販売台数分が必要であるが、 mビットの長 さの符号長さとすれば 2m種類が可能であり、例えば m= 30とすると約 10億種類の固 有コード信号が可能である。この実施形態では固有コード信号は電話番号として 、る 力 他の ID番号でもよいことは勿論である。上記 M系列信号と固有コード信号を予め 識別信号として識別コードメモリに格納しておけば、置き忘れや盗難時の無断使用を 効果的に防止することができる。 [0064] The unique code signal is required for the number of mobile phones sold. If the code length is m bits, there are 2 m types. For example, if m = 30, about 10 Billion kinds of unique code signals are possible. In this embodiment, the unique code signal may be a telephone number or other ID number. If the M-sequence signal and the unique code signal are stored in the identification code memory in advance as identification signals, unauthorized use in the event of misplacement or theft can be effectively prevented.

[0065] 上記した識別信号を送信ユニット 10から送信して解除ユニット 20で受信し、これに 基づいて解除ユニット 20から一定時間経過後に同じ信号を確認信号として送り返し 、これを送信ユニット 10で受信した信号を送信ユニット 10の一致'加算回路 11cでパ ルス圧縮処理をする構成の詳細を図 7に示す。上記確認信号を受信したその受信信 号が FSK復調回路 l ibで復調されると、その確認信号のうち先頭の M系列信号が、 図 4では図示省略しているシフトレジスタ l isに一時的に記憶される。 [0065] The above-described identification signal is transmitted from the transmission unit 10 and received by the release unit 20, FIG. 7 shows the details of the configuration in which the same signal is sent back as a confirmation signal after a lapse of a certain time from the release unit 20, and the signal received by the transmission unit 10 is subjected to pulse compression processing by the coincidence adder circuit 11c of the transmission unit 10. Shown in When the received signal that has received the confirmation signal is demodulated by the FSK demodulator circuit ib, the first M-sequence signal of the confirmation signal is temporarily stored in the shift register l is not shown in FIG. Remembered.

[0066] このシフトレジスタ l isに書き込まれた M系列信号は一致.加算回路 11cへ送られ、 そこで予め識別コードメモリ 13bに記憶されている記憶データのうち M系列信号が呼 び出され、両 M系列信号が各ビット毎に一致しているかを比較し、一致しているビット 数が加算される。 [0066] The M-sequence signal written in the shift register l is matches and sent to the adder circuit 11c, where the M-sequence signal is called out of the stored data stored in the identification code memory 13b in advance. The M-sequence signal is compared for each bit and the number of matching bits is added.

[0067] 上記一致'加算処理された信号は、パルス圧縮信号として出力される。なお、この 例ではシフトレジスタ 11 sは 31ビットの記憶能力を有するが、識別コードメモリ 13bは M系列信号(31ビット)と固有コード信号(29ビット)の両方を記憶するため、 60ビット の記憶容量を有し、従って上記両 M系列信号の処理の際には M系列信号のデータ 部分が呼び出されるものとする。  [0067] The signal subjected to the coincidence and addition process is output as a pulse compression signal. In this example, the shift register 11 s has a 31-bit storage capability, but the identification code memory 13b stores both the M-sequence signal (31 bits) and the unique code signal (29 bits), so it stores 60 bits. Therefore, when processing both M-sequence signals, the data part of the M-sequence signal shall be called up.

[0068] 図 5は、送信ユニット 10及び解除ユニット 20の具体的な実現構成例を示す図であ る。送信ユニット 10及び解除ユニット 20共に、 MCU(Micro Controller Unit)を中心と した通信モジュール 100による実現される。図 5の構成の通信モジュール 100を、マ ルチタスク通信モジュール (Multi  FIG. 5 is a diagram illustrating a specific implementation configuration example of the transmission unit 10 and the release unit 20. Both the transmission unit 10 and the release unit 20 are realized by a communication module 100 centered on an MCU (Micro Controller Unit). The communication module 100 configured as shown in Fig. 5 is connected to the multitask communication module (Multi

Task Communication Module: MTCモジュール)と称する。図 5の各部位と図 3及び 図 4の各部位との対応関係について説明する。図 5の送信部 102は、図 3の送信ュ ニット 10の送信器 15b及び図 4の解除ユニット 20の送信器 25bに対応する。図 5の 受信部 103は、図 3の送信ユニット 10の受信器 11a及び図 4の解除ユニット 20の受 信器 21aに対応する。図 5の暗号発生部 104は、図 3及び図 4に図示されていないが 、送信ユニット 10及び解除ユニット 20それぞれの識別コードなどを暗号ィ匕する処理 を行う。識別コードは、暗号化された状態で送受信される。図 5の ID格納部 105は、 図 3の送信ユニット 10の識別コードメモリ 13b及び図 4の解除ユニット 20の送信器 23 bに対応する。データ記憶部 106は、図 3及び図 4に図示されないが、後述するように 、送信ユニット 10及び解除ユニット 20との間の通信履歴である行動履歴など必要な 情報を格納する。図 5の外部出力 107及び LED表示部 108は、図 3の送信ユニット 1 0における警報回路 16として動作する。解除ユニット 20においては、別の用途に使 用されてもよぐまた、使用されなくともよい。図 5の EXT— IF109は、外部装置とのィ ンターフェースであって、図 4の解除ユニット 20における使用制限解除信号発生部 2 6として動作する。そして、図 5の MCU101は、図 3の送信ユニット 10及び図 4の解除 ユニット 20にお 、て、上記した部位以外の各部位が行う処理を実行する。 Task Communication Module: MTC module). The correspondence between each part in FIG. 5 and each part in FIGS. 3 and 4 will be described. 5 corresponds to the transmitter 15b of the transmission unit 10 of FIG. 3 and the transmitter 25b of the release unit 20 of FIG. 5 corresponds to the receiver 11a of the transmission unit 10 of FIG. 3 and the receiver 21a of the release unit 20 of FIG. Although not shown in FIGS. 3 and 4, the cipher generation unit 104 in FIG. 5 performs a process of encrypting the identification codes and the like of the transmission unit 10 and the release unit 20 respectively. The identification code is transmitted and received in an encrypted state. The ID storage unit 105 in FIG. 5 corresponds to the identification code memory 13b in the transmission unit 10 in FIG. 3 and the transmitter 23b in the release unit 20 in FIG. Although not shown in FIGS. 3 and 4, the data storage unit 106 is necessary for an action history that is a communication history between the transmission unit 10 and the release unit 20 as described later. Store information. The external output 107 and the LED display unit 108 in FIG. 5 operate as the alarm circuit 16 in the transmission unit 10 in FIG. The release unit 20 may or may not be used for another purpose. EXT-IF 109 in FIG. 5 is an interface with an external device, and operates as a use restriction release signal generator 26 in release unit 20 in FIG. Then, the MCU 101 in FIG. 5 executes processing performed by each part other than the parts described above, in the transmission unit 10 in FIG. 3 and the release unit 20 in FIG.

[0069] 上記の構成とした実施形態の携帯電話に適用した使用制限装置の作用について 以下送信ユニット 10の作用と、解除ユニット 20の作用に分けて説明する。まず、送信 ユニット 10から識別信号の送信を行なう場合、図示しない電源スィッチを投入すると 、直ちに送受信制御タイマ 13aがセットされ電源制御回路 14aを介してスィッチ 18aを 閉じて電源部 18から各部へ電源が供給される。  [0069] The operation of the use restriction device applied to the mobile phone of the embodiment having the above-described configuration will be described below separately for the operation of the transmission unit 10 and the operation of the release unit 20. First, when transmitting an identification signal from the transmission unit 10, when a power switch (not shown) is turned on, the transmission / reception control timer 13a is immediately set, the switch 18a is closed via the power control circuit 14a, and power is supplied from the power supply unit 18 to each unit. Supplied.

[0070] 図 7のタイムチャートの(a)、 (b)に示すように、電源の供給が ONになった後 2ms経 過すると制御タイマ 13aの指令により識別コードメモリ 13bから識別信号が読み出さ れ FSK変調回路 15aで変調された後送信器 15bから送信アンテナ 10Tを介して送 信が行なわれる。  [0070] As shown in (a) and (b) of the time chart of FIG. 7, when 2 ms elapses after the power supply is turned on, the identification signal is read from the identification code memory 13b by the command of the control timer 13a. After modulation by the FSK modulation circuit 15a, transmission is performed from the transmitter 15b via the transmission antenna 10T.

[0071] 上記識別信号の送信は、前述したように、 31ビットの M系列信号とそれに続く固有 の電話番号を示す 29ビットの固有コード信号を FSK変調して行なわれる。  [0071] As described above, the identification signal is transmitted by FSK-modulating a 31-bit M-sequence signal followed by a 29-bit unique code signal indicating a unique telephone number.

[0072] 上記送信ユニット 10からの識別信号の送信信号が所定レベル以上で解除ユニット 20で受信され、かつ識別信号が自己のものであるとして認識されると解除ユニット 20 から上記識別信号と同じ送信信号が送り返され、確認信号として受信される。この送 信と受信のタイミングは、図 7の(a)—(c)に示す通りであり、送信ユニット 10の電源は 、起動(2ms) +送信(6ms) +ラグタイム(2ms) +送り返し(6ms) +ラグタイム(2ms ) =合計 18msの間 ONとされる。  [0072] When the transmission signal of the identification signal from the transmission unit 10 is received by the cancellation unit 20 at a predetermined level or higher and the identification signal is recognized as its own, the transmission from the cancellation unit 20 is the same as the identification signal. A signal is sent back and received as a confirmation signal. The transmission and reception timings are as shown in Fig. 7 (a)-(c). The power supply of the transmission unit 10 is activated (2ms) + transmission (6ms) + lag time (2ms) + return ( 6ms) + lag time (2ms) = ON for a total of 18ms.

[0073] その後一定時間経過後最初の電源 ONから例えば 2000msとなる一定時間で ON となるように制御タイマ 13aで送信タイミングがコントロールされる。送信ユニット 10で 送信された信号が同時に送信ユニット 10の受信器 11aで受信されても後で説明する その後の処理が行なわれないためその受信信号に基づいて警報回路 16へ警報信 号が送られることはないなど本来の受信信号として作用せず、確認信号と区別される [0074] 一方、解除ユニット 20から所定のタイミングで送り返される上記確認信号が受信器 11aで受信されると、 FSK復調回路 l ibで復調された後一致'加算回路 11cでパル ス圧縮処理されることについては既に図 5を参照して説明した。このパルス圧縮処理 では確認信号のうち図 9の(a)に示す記号 Aの M系列信号がパルス圧縮処理される 力 一致'加算処理される信号は記号 Bで示すように、シフトレジスタ l isに M系列信 号のパルス列が完全に書き込まれる以前、又はその後においてもその途中で各ビッ ト毎のデータが識別コードメモリの M系列信号記憶データの対応する各ビットの値に 部分的に合致するためパルス圧縮信号はその値が常に変動する。 [0073] Thereafter, the transmission timing is controlled by the control timer 13a so that the power is turned on at a constant time of, for example, 2000 ms from the first power-on after a certain time has elapsed. Even if the signal transmitted by the transmission unit 10 is received by the receiver 11a of the transmission unit 10 at the same time, the subsequent processing will not be performed, so an alarm signal is sent to the alarm circuit 16 based on the received signal. It does not act as the original received signal, and is distinguished from the confirmation signal On the other hand, when the confirmation signal sent back from the release unit 20 at a predetermined timing is received by the receiver 11a, it is demodulated by the FSK demodulator circuit ib and then subjected to pulse compression processing by the coincidence adder circuit 11c. This has already been explained with reference to FIG. In this pulse compression processing, the M-sequence signal of symbol A shown in (a) of Fig. 9 is pulse-compressed in the confirmation signal. The signal to be matched is added to the shift register l is as shown by symbol B. Because the data for each bit partially matches the value of each corresponding bit in the M-sequence signal storage data of the identification code memory before or after the pulse train of the M-sequence signal is completely written. The value of the pulse compression signal always varies.

[0075] し力し、シフトレジスタ l isに自己の識別コードメモリ 13bに記憶されている M系列 信号と一致するデータが書き込まれると、一致'加算回路 11cで一致加算処理される ビット数がシフトレジスタ 13sの全ビット数 31について全て成立すればパルス圧縮信 号は 31となり M系列信号は完全一致と、あるいは少なくとも一致 '加算されるビット数 が 24以上であれば両 M系列信号は一致しているとみなすことができる。  [0075] When data matching the M-sequence signal stored in its own identification code memory 13b is written to the shift register l is, the number of bits subjected to the coincidence addition processing by the coincidence addition circuit 11c is shifted. If all 31 bits in register 13s are satisfied, the pulse compression signal is 31 and the M-sequence signal is completely coincident or at least coincides' If the number of added bits is 24 or more, both M-sequence signals are coincident. Can be considered.

[0076] そこで、閾値処理部 l idでは上記パルス圧縮処理信号が閾値設定部 l id'で予め 設定される閾値 (スレッシュホールド値)、例えば 24以上であるかを判断し(図 9 (b)参 照)、閾値を超えていると判断されると図 9 (c)図のようなタイミング信号を信号有無判 定部 12bへ出力する。  [0076] Therefore, the threshold processing unit l id determines whether the pulse compression processing signal is a threshold (threshold value) preset by the threshold setting unit l id ', for example, 24 or more (Fig. 9 (b) If it is determined that the threshold is exceeded, the timing signal shown in Fig. 9 (c) is output to the signal presence / absence determination unit 12b.

[0077] 又、前述したように受信器 1 laで受信した受信信号の信号レベルを信号レベル検 出回路 12aで検出し、その信号レベルが一定値以上力否かを信号有無判定部 12b で判定する。この信号レベルの判定は、図 10 (a)に示す検波波形の受信信号に対し ある電圧の閾値を設け、それ以上のレベルであれば一定レベル以上の信号を受信し たと判定する。  [0077] As described above, the signal level of the received signal received by the receiver 1 la is detected by the signal level detection circuit 12a, and the signal presence / absence determination unit 12b determines whether the signal level is greater than a certain value. To do. This signal level is determined by setting a certain voltage threshold for the received signal of the detection waveform shown in Fig. 10 (a), and if it is higher than this level, it is determined that a signal of a certain level or higher has been received.

[0078] 上記判定は、図 10 (a)に示すように、一定の強度で送信された信号を受信する際 に送信ユニット 10と解除ユニット 20の間の距離 Rが大きくなるとその距離の 2乗に反 比例して受信信号レベルが下がることに基づいており、その 1つの判定方法として所 定の距離 (例えば lm)に対応して上記閾値を定めておき、受信した信号レベルが閾 値以下になれば所定の距離以上両者は離れたことを検出することができる。なお、図 10 (a)は対数目盛で表わされて 、る。 [0078] As shown in FIG. 10 (a), the above determination is performed when the distance R between the transmission unit 10 and the release unit 20 increases when a signal transmitted with a constant strength is received. The threshold value is determined according to a predetermined distance (e.g., lm) as one judgment method, and the received signal level falls below the threshold value. If this is the case, it is possible to detect that both are separated by a predetermined distance or more. Figure 10 (a) is expressed in logarithmic scale.

[0079] 上記判定方法に代えて、上述した受信信号の検波波形を AZD変換して受信信号 の電圧レベルを測定することにより、受信信号のレベルを知るようにしてもよい。  [0079] Instead of the determination method described above, the level of the received signal may be known by AZD converting the detected waveform of the received signal and measuring the voltage level of the received signal.

[0080] 上記信号レベルの判定は、上述した M系列信号に対する閾値処理後のタイミング 信号を閾値処理部 lidから送られて来た後に受信する固有コード信号に対応する一 定時間 t (図示の例では 2. 9ms)のみを対称として行う。その理由は、ノイズや他の電 話器からの信号レベルを検出しないようにするためであり、タイミング信号によって特 定された一定時間を判定区間とすることにより判定を正確に行うことができるからであ る。  [0080] The determination of the signal level is performed by a fixed time t (example shown in the figure) corresponding to the unique code signal received after the timing signal after threshold processing for the M-sequence signal is sent from the threshold processing unit lid. Then, only 2.9ms) is performed symmetrically. The reason is to prevent detection of noise and signal levels from other telephones, and the determination can be made accurately by setting the fixed time specified by the timing signal as the determination section. It is.

[0081] 信号有無判定部 12bにおける判定は、上記信号レベルの判定以外にも、タイミング 信号が入力された後に受信され FSK変調された固有コード信号が識別コードメモリ に記憶されて 、る固有コード信号と一致して 、るかにっ 、ても行なわれる。従って、 信号有無判定部 12bでは、タイミング信号の入力があり、その後一定時間に所定レ ベルの受信信号を受信し、かつその受信した固有コード信号が自己の固有コード信 号に一致していることが判定されると、送信ユニット 10から解除ユニット 20は一定距 離内に存在することとなり、信号有無判定部 12bは何ら信号も出力しない。  In addition to the determination of the signal level, the determination in the signal presence / absence determination unit 12b includes a unique code signal received after the timing signal is input and subjected to FSK modulation and stored in the identification code memory. It is done even if you agree with. Therefore, the signal presence / absence determination unit 12b receives a timing signal, receives a predetermined level of received signal after a certain period of time, and the received unique code signal matches the own unique code signal. If it is determined, the transmission unit 10 to the release unit 20 exist within a certain distance, and the signal presence / absence determination unit 12b outputs no signal.

[0082] しかし、タイミング信号の入力があり、固有コード信号が自己のものと一致したとして も、信号レベルが一定レベル以下であれば解除ユニット 20が送信ユニット 10から一 定距離以上離れたこととなり、この場合は出力信号を出力して警報回路 16を作動さ せる。  [0082] However, even if there is a timing signal input and the unique code signal matches that of its own, if the signal level is below a certain level, the release unit 20 is separated from the transmission unit 10 by a certain distance or more. In this case, an output signal is output and the alarm circuit 16 is activated.

[0083] 警報回路 16では、例えば"置いてかないで"という音声メッセージを音声発生器(図 示省略)で発生させて警告を与えることにより、送信ユニット 10をポケットに入れてい る場合は、その警告音で解除ユニット 20が置き忘れ又は盗難などにより手元力も離 れたことにつ 、て警告を与える。  [0083] In the alarm circuit 16, for example, when the transmitter unit 10 is put in the pocket by generating a voice message "don't leave" with a voice generator (not shown) to give a warning, A warning sound is given to indicate that the release unit 20 has been lost due to misplacement or theft.

[0084] なお、警報回路 16による警告は上記音声メッセージを与える方式以外にもピーとい う警告音、あるいはこれと共に〃置 、てかな!/、で "と!、う表示を表示器に表示するなど 警告が何らかの手段で与えられる方式のものであればどの方式のものでもよ 、。又、 上記自己の識別コード信号の確認信号以外の信号を受信したとしても、上述した 3 つの条件のいずれか、又はいくつかが成立しないから、信号有無判定部 12bは出力 信号を出力することはなぐ送信ユニットの受信動作には何ら影響しないことは説明 するまでもないであろう。 [0084] Note that the warning by the alarm circuit 16 is not only a method of giving the above voice message, but also a beeping sound, or a sound with it, and the display is displayed with a display, "Tekana! /," Any system can be used as long as the warning is given by some means, and even if a signal other than the confirmation signal of the identification code signal is received, the above-mentioned 3 Needless to say, since either or some of the two conditions are not satisfied, the signal presence / absence determination unit 12b does not output the output signal and does not affect the reception operation of the transmission unit.

[0085] 次に、解除ユニット 20の作用は次の通りである。前述したように、このユニット 20で は携帯電話 30の電源スィッチが ON、 OFF 、ずれであるかに拘らず常に電源部 28 から各構成部材へ電力が供給されているから、送信ユニット 10から識別信号が送信 されるとほぼ同時に解除ユニット 20の受信器 21aで受信される。  Next, the operation of the release unit 20 is as follows. As described above, in this unit 20, power is always supplied from the power supply unit 28 to each component regardless of whether the power switch of the mobile phone 30 is ON, OFF, or misaligned. At the same time as the signal is transmitted, it is received by the receiver 21a of the release unit 20.

[0086] 受信された識別信号力 SFSK復調回路 21bで復調され、一致'加算回路 21cへ送ら れて閾値処理部 21dから M系列信号に基づくタイミング信号が信号有無判定部 22b へ送られる点も同じである。さらに、受信した信号の信号レベルを信号レベル検出回 路 22aで検出し、上記タイミング信号が信号有無判定部 22bへ送られて来る一定の 判定時間 t内に信号レベルが一定レベル以上であるかを判定することも同じである。  [0086] The received discrimination signal power is demodulated by the SFSK demodulator circuit 21b, sent to the coincidence and adder circuit 21c, and the timing signal based on the M-sequence signal is sent from the threshold processing unit 21d to the signal presence / absence judgment unit 22b. It is. Further, the signal level of the received signal is detected by the signal level detection circuit 22a, and it is determined whether the signal level is equal to or higher than a certain level within a certain judgment time t when the timing signal is sent to the signal presence / absence judgment unit 22b. The determination is the same.

[0087] 又、上記判定時間中に信号有無判定部 22bは送信されて来た信号が識別コードメ モリ 23bに予め記憶されている自己の固有コード信号と一致しているかを判定する点 も送信ユニット 10の場合と同じである。しかし、この解除ユニット 20の信号有無判定 部 22bでは上記タイミング信号と、 2つの判定で共に信号レベルが一定以上、固有コ ード信号が一致するという 3つの条件が揃っているときは何ら出力信号を出力しない  In addition, the signal presence / absence determination unit 22b during the determination time also determines whether the transmitted signal matches its own unique code signal stored in advance in the identification code memory 23b. Same as 10 However, the signal presence / absence determination unit 22b of the release unit 20 outputs any output signal when the above timing signal and the three conditions that the signal level is equal to or higher than the fixed signal level in both determinations and the unique code signal match. Is not output

[0088] 上記出力信号がない限り解除ユニット 20、従って携帯電話 30は送信ユニットから 離れることなく所有者又は使用者の手元にあるとして使用制限解除信号発生部 26か ら使用制限解除信号が常に出力されている。従って、携帯電話 30はいつでも使用 可能の状態に置かれて 、る。 [0088] Unless there is an output signal, the use restriction release signal is always output from the use restriction release signal generation unit 26, assuming that the release unit 20, and thus the mobile phone 30, is at the owner or user's hand without leaving the transmission unit. Has been. Therefore, the mobile phone 30 is always ready for use.

[0089] なお、識別信号を受信して信号有無判定部 22bで信号有無の判定処理に一定時 間(この例では 2ms)が経過すると、その瞬間に信号有無判定部 22bからの信号で送 受信制御タイマ 23aがセットされ、受信した識別信号と全く同一の信号が識別コード メモリ 23bから読み出され、 FSK変調回路 25a、送信器 25bを介して送信される。こ の信号が前述したように送信ユニット 10で確認信号として受信される。  [0089] When a certain time (2 ms in this example) elapses in the signal presence / absence determination unit 22b after receiving the identification signal, the signal from the signal presence / absence determination unit 22b is transmitted and received at that moment. The control timer 23a is set, and the same signal as the received identification signal is read from the identification code memory 23b and transmitted via the FSK modulation circuit 25a and the transmitter 25b. This signal is received as a confirmation signal by the transmission unit 10 as described above.

[0090] しかし、万一置き忘れや盗難のため解除ユニット 20が携帯電話 30と共に送信ュ- ット 10から一定距離以上離れると、上記信号レベルの検出において信号レベルが一 定以下となり信号有無判定部 22bは識別信号を受信して 、な 、と判定する。この判 定が行なわれると信号有無判定部 22bから出力信号が出力され解除信号発生部 26 力もの使用解除信号の出力が停止され、このため携帯電話 30は使用できなくなる。 [0090] However, in the unlikely event that it is left behind or stolen, the release unit 20 will transmit with the mobile phone 30. When the signal level is more than a certain distance from the base 10, the signal level becomes equal to or less than a certain level in the detection of the signal level, and the signal presence / absence determination unit 22b determines that it has received the identification signal. When this determination is made, an output signal is output from the signal presence / absence determination unit 22b, and the output of the cancellation signal generator 26 is stopped, so that the cellular phone 30 cannot be used.

[0091] 以上のように、この実施形態の使用制限装置は、送信ユニット 10を所有者又は使 用者がポケットなどに入れその手元の携帯電話 30に解除ユニット 20を組み込んで一 体のものとして使用するようにしたから、送信ユニット 10から解除ユニット 20と共に携 帯電話 30が一定距離以上離れると携帯電話 30の使用を制限して不測の無断使用 などを防止すると共に、所有者又は使用者には音声などによる警告が与えられ携帯 電話 30が手元力も離れたことについて直ちに認識できるようにしたのである。  [0091] As described above, the use restriction device of this embodiment is configured such that the owner or the user puts the transmission unit 10 in a pocket or the like and incorporates the release unit 20 into the mobile phone 30 at hand. Since the mobile phone 30 together with the release unit 20 is separated from the transmitter unit 10 by a certain distance or more, the use of the mobile phone 30 is restricted to prevent unintentional use, etc. Was given a warning by voice or the like so that the mobile phone 30 could immediately recognize that it was out of hand.

[0092] なお、上述の例では、識別信号と確認信号として同じコード信号 (電話番号)を送 受信し合ったが、送信ユニット 10と解除ユニット 20にそれぞれ固有の IDが与えられ、 それを送受信するような構成でも力まわない。すなわち、送信ユニット 10は、自己の I Dに加えて、解除ユニット 20の IDも記憶し、解除ユニット 20も、自己の IDに加えて送 信ユニット 10の IDも記憶しておぐそして、送信ユニット 10は、自己の IDを解除ュ- ット 20に送信し、解除ユニット 20は、受信した IDと、記憶している送信ユニットの IDと を比較することで、自己の対となる送信ユニットであるかどうかを判断するようにしても よい。解除ユニット 20も、同様に、自己の IDを送信ユニット 10に送信し、送信ユニット 10は、受信した IDと、記憶している解除ユニット 20の IDとを比較することで、自己の 対となる解除ユニットであるかどうかを判断する。  [0092] In the above example, the same code signal (telephone number) is transmitted and received as the identification signal and the confirmation signal, but a unique ID is given to each of the transmission unit 10 and the release unit 20, and they are transmitted and received. A configuration that does this will not help. That is, the transmission unit 10 stores the ID of the release unit 20 in addition to its own ID, and the release unit 20 also stores the ID of the transmission unit 10 in addition to its own ID. 10 transmits its own ID to the canceling unit 20, and the canceling unit 20 compares the received ID with the stored ID of the transmitting unit. It may be determined whether or not there is. Similarly, the cancellation unit 20 also transmits its own ID to the transmission unit 10, and the transmission unit 10 makes a pair of itself by comparing the received ID with the stored ID of the cancellation unit 20. Determine whether it is a release unit.

[0093] また、上記実施形態では使用制限の対象機器として携帯電話を例として説明した 力 対象機器としてはこの他にもワードプロセッサ、パーソナルコンピュータ、各種ゲ ーム機、自動車、金庫等各種の機器がある。又、信号伝達媒体として電波を用いる 場合につ 、て説明したが、これ以外に超音波や光等を用いてもよ!、。  Further, in the above-described embodiment, a mobile phone has been described as an example of a device subject to restriction of use. In addition to this, various devices such as a word processor, a personal computer, various game machines, an automobile, and a safe are included. is there. In addition, the case where radio waves are used as a signal transmission medium has been described above.

[0094] 上述したようなワイヤレス認証動作を利用して、本実施の形態例では、ウェアラブル キーユニットと携帯端末との間におけるワイヤレス認証と、携帯端末と自動車のドア口 ック装置との間のワイヤレス認証が実行される。ただし、携帯端末と自動車のドアロッ ク装置との間のワイヤレス認証では、携帯端末と自動車のドアロック装置間だけでなく 、認証局を含めた 3者によるワイヤレス認証が実施される。 [0094] By using the wireless authentication operation as described above, in the present embodiment, wireless authentication between the wearable key unit and the mobile terminal, and between the mobile terminal and the door lock device of the automobile are performed. Wireless authentication is performed. However, in wireless authentication between a mobile terminal and a car door lock device, not only between the mobile terminal and the car door lock device. Wireless authentication by three parties including certificate authority will be implemented.

[0095] 図 12は、認証局 Dが管理する ID管理テーブルの例を示す図である。図 12に示す ように、認証局 Dは、ウェアラブルキーユニット C、携帯端末 B、被制御機器(自動車 のドアロック装置) Aの IDを関連づけた情報を有する。  FIG. 12 is a diagram showing an example of an ID management table managed by the certificate authority D. As shown in FIG. 12, the certificate authority D has information associated with the IDs of the wearable key unit C, the portable terminal B, and the controlled device (automobile door lock device) A.

[0096] 図 13、 13は、図 1に示したワイヤレス認証システムの第一の構成例における第一の 認証処理手順を示す図である。図 13は、ウェアラブルキーユニット Cと携帯端末 Bと の間の認証処理手順であり、ウェアラブルキーユニット C力 識別信号送受信ユニット (送信ユニット) 10を備え、キーユニットとして機能し、携帯端末 Bが、使用制限解除 ユニット (解除ユニット) 20を備え、ベースユニットとして機能する。また、図 14は、携 帯端末 B、自動車のドアロック装置 A及び認証局 D間の認証処理手順であり、この場 合、携帯端末 Bが送信ユニット 10を備え、キーユニットとして機能し、自動車のドア口 ック装置 Aが解除ユニット 20を備え、ベースユニットとして機能する。すなわち、携帯 端末 Bは、送信ユニット 10と使用制限解除ユニット 20の両方を備えることとなる。  FIGS. 13 and 13 are diagrams showing a first authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. FIG. 13 shows an authentication processing procedure between wearable key unit C and mobile terminal B, which includes wearable key unit C force identification signal transmission / reception unit (transmission unit) 10 and functions as a key unit. Use restriction release unit (release unit) 20 and functions as a base unit. FIG. 14 shows an authentication processing procedure between the mobile terminal B, the automobile door lock device A, and the certification authority D. In this case, the mobile terminal B includes the transmission unit 10 and functions as a key unit. The door opening device A has a release unit 20 and functions as a base unit. That is, the mobile terminal B includes both the transmission unit 10 and the use restriction release unit 20.

[0097] まず、図 13において、ウェアラブルキーユニット Cの送信ユニット 10は、所定の時間 間隔 (例えば 2秒間隔)で携帯端末 Bの解除ユニット 20へ呼び力 4ナ信号として M系列 データ (M系列信号)を無線信号により送信して 、る。携帯端末 Bの解除ユニット 20 は、送信ユニット 10から送信される M系列データを受信すると、自己の内部メモリ(例 えば、フラッシュメモリ)に記憶された M系列データと比較する。この比較は、例えば 一致 ·加算回路によって行われ、比較の結果、両 M系列データの一致したビット数を 表す数値がパルス信号として出力される。一致したビット数が所定のしきい値 (例え ば 31ビットの M系列データに対してしきい値 24)以上であり、且つ M系列データの受 信レベルが所定値以上の場合、すなわち、ウェアラブルキーユニット Cと携帯端末 B が所定の範囲(例えば数メートル)内にいる場合には、携帯端末 Bの解除ユニット 20 は、呼びかけに対する確認応答 (ACK)と、内部メモリに記憶された携帯端末 Bの識 別情報 (端末識別情報) IDbとを無線信号により送信する。  First, in FIG. 13, the transmission unit 10 of the wearable key unit C sends M-sequence data (M-sequence) to the release unit 20 of the mobile terminal B at a predetermined time interval (for example, every 2 seconds) as a 4-power signal. Signal) by radio signal. When receiving the M-sequence data transmitted from the transmission unit 10, the release unit 20 of the portable terminal B compares it with the M-sequence data stored in its own internal memory (for example, a flash memory). This comparison is performed, for example, by a coincidence / adder circuit. As a result of the comparison, a numerical value indicating the number of matched bits of both M series data is output as a pulse signal. If the number of matched bits is equal to or greater than a predetermined threshold (e.g., threshold 24 for 31-bit M-sequence data) and the M-sequence data reception level is greater than or equal to a predetermined value, that is, wearable key When the unit C and the mobile terminal B are within a predetermined range (for example, several meters), the release unit 20 of the mobile terminal B receives an acknowledgment (ACK) for the call and the mobile terminal B stored in the internal memory. Identification information (terminal identification information) IDb is transmitted by radio signal.

[0098] 一方、一致したビット数が所定のしきい値未満又は受信レベルが所定値未満である 場合には、携帯端末 Bの解除ユニット 20は、 ACK信号及び端末識別情報 IDbを送 信しない。この場合、前述したように、解除ユニット 20は、携帯端末 Bの使用制限を行 つたままであり、携帯端末 Bは使用不能である。また、解除ユニット 20は、携帯端末 B の表示部にその旨表示させることができる。 On the other hand, when the number of matched bits is less than the predetermined threshold value or the reception level is less than the predetermined value, the release unit 20 of the mobile terminal B does not transmit the ACK signal and the terminal identification information IDb. In this case, as described above, the release unit 20 restricts the use of the mobile terminal B. The mobile device B is unusable. Further, the release unit 20 can display the fact on the display unit of the mobile terminal B.

[0099] ウェアラブルキーユニット Cの送信ユニット 10は、 ACK信号及び端末識別情報 IDb を受信すると、受信した端末識別情報 IDbと自己の内部メモリ(例えばフラッシュメモ リ)に記憶された端末識別情報 IDbとを照合する (ステップ S 11)。  [0099] Upon receiving the ACK signal and the terminal identification information IDb, the transmission unit 10 of the wearable key unit C receives the received terminal identification information IDb and the terminal identification information IDb stored in its own internal memory (for example, flash memory). Are matched (step S11).

[0100] 照合の結果、両端末識別情報 IDbがー致している場合には、送信ユニット 10は、 解除ユニット 20が自己と対をなす解除ユニットであると認識し、自己の内部メモリに記 憶されたウェアラブルキーユニット Cの識別情報 (キー識別情報) IDcを送信する。一 方、照合の結果、両端末識別情報 IDbがー致していない場合は、解除ユニット 20が 自己と対をなす使用制限解除ユニットではないと認識し、キー識別情報 IDaを送信し ない。  [0100] If both terminal identification information IDb is found as a result of collation, the transmission unit 10 recognizes that the release unit 20 is a release unit that makes a pair with itself, and stores it in its own internal memory. Identification information (key identification information) IDc of the wearable key unit C is transmitted. On the other hand, if both terminal identification information IDb is not matched as a result of the collation, it is recognized that the cancellation unit 20 is not a usage restriction cancellation unit paired with itself, and the key identification information IDa is not transmitted.

[0101] 携帯端末 Bの解除ユニット 20は、ウェアラブルキーユニット Cの送信ユニット 10から 送信されたキー識別情報 IDcを受信すると、受信したキー識別情報 IDcと、自己の内 部メモリに記憶されたキー識別情報 IDcとを照合する (ステップ S 12)。  [0101] Upon receiving the key identification information IDc transmitted from the transmission unit 10 of the wearable key unit C, the release unit 20 of the portable terminal B receives the received key identification information IDc and the key stored in its own internal memory. The identification information IDc is collated (step S12).

[0102] 照合の結果、両キー識別情報 IDcがー致して 、る場合には、解除ユニット 20は、送 信ユニット 10が自己と対をなす送信ユニットであると認識し、携帯端末 Bの使用制限 を解除し、携帯端末 Bをドアロック装置 Aとの通信可能状態にする (ステップ S13)。一 方、両キー識別情報 IDaがー致しない場合には、送信ユニット 10が自己と対をなす 送信ユニットでないと認識し、携帯端末 Bの使用制限を解除せず、携帯端末 Bはドア ロック装置 Aと通信不能状態のままである。  [0102] If the two key identification information IDc is found as a result of the verification, the release unit 20 recognizes that the transmission unit 10 is a transmission unit paired with itself, and uses the mobile terminal B. The restriction is released, and the portable terminal B is made communicable with the door lock device A (step S13). On the other hand, if the two-key identification information IDa does not match, the transmission unit 10 recognizes that it is not a pair with itself and does not lift the restrictions on the use of the mobile terminal B. Cannot communicate with A.

[0103] このように、キー識別情報 IDc及び端末識別情報 IDbが交換され、相互に一致する ことによって、携帯端末 Bのユーザは正当なユーザであることが認証され、携帯端末 Bは使用可能状態となる。  [0103] In this way, when the key identification information IDc and the terminal identification information IDb are exchanged and match each other, the user of the mobile terminal B is authenticated as a valid user, and the mobile terminal B is in the usable state. It becomes.

[0104] 次に、図 14の処理手順の説明に移る。図 14では、上記図 13の処理手順に従って 、携帯端末 Bが使用可能状態であることを前提としている。また、図 14では、携帯端 末 Bの送信ユニット 10、自動車のドアロック装置 Aの使用制限解除ユニット 20にカロえ 、認証局 Dも認証処理手順に加わる。  Next, the processing procedure of FIG. 14 will be described. In FIG. 14, it is assumed that the mobile terminal B is in a usable state according to the processing procedure of FIG. Further, in FIG. 14, the transmission unit 10 of the portable terminal B and the use restriction release unit 20 of the door lock device A of the automobile are inspected, and the certification authority D also participates in the authentication processing procedure.

[0105] まず、図 13と同様の処理手順により、携帯端末 Bと自動車のドアロック装置 A間の 認証処理が行われる。すなわち、携帯端末 Bの送信ユニット 10は、所定の時間間隔( 例えば 2秒間隔)で自動車のドアロック装置 Aの解除ユニット 20へ呼びかけ信号とし て M系列データ (M系列信号)を無線信号により送信して 、る。自動車のドアロック装 置 Aの解除ユニット 20は、送信ユニット 10から送信される M系列データを受信すると 、自己の内部メモリ(例えば、フラッシュメモリ)に記憶された M系列データと比較する 。この比較は、例えば一致'加算回路によって行われ、比較の結果、両 M系列データ の一致したビット数を表す数値がパルス信号として出力される。一致したビット数が所 定のしきい値(例えば 31ビットの M系列データに対してしきい値 24)以上であり、且 つ M系列データの受信レベルが所定値以上の場合、換言すると、自動車のドアロッ ク装置 Aと携帯端末 Bが所定の範囲 (例えば数メートル)内にいる場合には、自動車 のドアロック装置 Aの限解除ユニット 20は、呼びかけに対する確認応答 (ACK)と、内 部メモリに記憶されたドアロック装置の識別情報 (ドアロック装置識別情報) IDaとを無 線信号により送信する。 [0105] First, according to the same processing procedure as in FIG. Authentication processing is performed. That is, the transmission unit 10 of the mobile terminal B transmits M-sequence data (M-sequence signal) as a call signal to the release unit 20 of the door lock device A of the vehicle at a predetermined time interval (for example, every 2 seconds). And then. When receiving the M-sequence data transmitted from the transmission unit 10, the release unit 20 of the automobile door lock device A compares it with the M-sequence data stored in its own internal memory (for example, a flash memory). This comparison is performed, for example, by a coincidence adder circuit. As a result of the comparison, a numerical value indicating the number of matched bits of both M series data is output as a pulse signal. If the number of matched bits is equal to or greater than a predetermined threshold (for example, threshold 24 for 31-bit M-sequence data) and the reception level of M-sequence data is greater than or equal to a predetermined value, in other words, When the door lock device A and the mobile terminal B are within a predetermined range (for example, several meters), the limit release unit 20 of the car door lock device A receives an acknowledgment (ACK) to the call and the internal memory. The door lock device identification information (door lock device identification information) IDa stored in is transmitted as a radio signal.

[0106] 一方、一致したビット数が所定のしきい値未満又は受信レベルが所定値未満である 場合には、ドアロック装置 Aの解除ユニット 20は、 ACK信号及びドアロック装置識別 情報 IDaを送信しない。この場合、前述したように、解除ユニット 20は、ドアロック装置 Aの解除動作を制限し、ドアロック装置は施錠されたままの状態とすることができる。  On the other hand, when the number of matched bits is less than a predetermined threshold value or the reception level is less than a predetermined value, the release unit 20 of the door lock device A transmits an ACK signal and door lock device identification information IDa. do not do. In this case, as described above, the release unit 20 restricts the release operation of the door lock device A, and the door lock device can be kept locked.

[0107] 携帯端末 Bの送信ユニット 10は、 ACK信号及びドアロック装置識別情報 IDaを受 信すると、受信したドアロック装置識別情報 IDaと自己の内部メモリ(例えばフラッシュ メモリ)に記憶されたドアロック装置識別情報 IDaとを照合する (ステップ S21)。  [0107] Upon receiving the ACK signal and the door lock device identification information IDa, the transmission unit 10 of the mobile terminal B receives the received door lock device identification information IDa and the door lock stored in its own internal memory (for example, a flash memory). The device identification information IDa is collated (step S21).

[0108] 照合の結果、両ドアロック装置識別情報 IDaがー致している場合には、携帯端末 B の送信ユニット 10は、解除ユニット 20が自己と対をなす解除ユニットであると認識し、 自己の内部メモリに記憶された自己の識別情報 (端末識別情報) IDbを送信し、さら に、一致した旨の一致情報 (IDcと IDbの情報を含む)を認証局 Dに送信する。一方、 照合の結果、両ドアロック装置識別情報 IDaがー致していない場合は、自動車のドア ロック装置 Aの解除ユニット 20が自己と対をなす解除ユニットではないと認識し、端末 識別情報 IDbを送信しない。もちろん、一致情報も送信しない。  [0108] If the door lock device identification information IDa is found as a result of the collation, the transmitting unit 10 of the mobile terminal B recognizes that the release unit 20 is a release unit that makes a pair with itself, It transmits its own identification information (terminal identification information) IDb stored in its internal memory, and further transmits to the certification authority D coincidence information (including IDc and IDb information) to the effect of matching. On the other hand, if the door lock device identification information IDa does not match as a result of the verification, it is recognized that the release unit 20 of the door lock device A of the car is not a release unit paired with itself, and the terminal identification information IDb is Do not send. Of course, the matching information is not transmitted.

[0109] 自動車のドアロック装置 Aの解除ユニット 20は、携帯端末 Bの送信ユニット 10から 送信された端末識別情報 IDbを受信すると、受信した端末識別情報 IDbと、自己の 内部メモリに記憶された端末識別情報 IDbとを照合する (ステップ S22)。 [0109] The release unit 20 of the door lock device A of the automobile is When the transmitted terminal identification information IDb is received, the received terminal identification information IDb is collated with the terminal identification information IDb stored in its own internal memory (step S22).

[0110] 照合の結果、両端末識別情報 IDbがー致している場合には、解除ユニット 20は、 送受信ユニット 10が自己と対をなす送信ユニットであると認識し、その旨の一致情報 (IDcと IDbの情報を含む)を認証局 Dに送信する。一方、両端末識別情報 IDbがー 致しない場合には、送信ユニット 10が自己と対をなす送信ユニットでないと認識し、 一致情報も認証局 Dに送信しな 、。携帯端末 Bは使用不能状態のままである。  [0110] If both terminal identification information IDb is found as a result of the collation, the release unit 20 recognizes that the transmission / reception unit 10 is a transmission unit that is paired with itself, and the matching information (IDc) And IDb information) to certificate authority D. On the other hand, if the two terminal identification information IDb does not match, the transmitting unit 10 recognizes that it is not a pair with itself and does not transmit the matching information to the certificate authority D. Mobile terminal B remains unusable.

[0111] 認証局 Dは、携帯端末 Bの送信ユニット 10とドアロック装置 Aの解除ユニット 20と通 信可能、且つ上記図 12の管理テーブルを格納するコンピュータ装置である。認証局 Dは、携帯端末 Bの送信ユニット 10と自動車のドアロック装置 Aの解除ユニット 20とか らそれぞれ一致情報を受信すると、一致情報の内容を管理テーブル(図 12)により確 認する (ステップ 23)。例えば、 2つの一致情報にそれぞれ含まれる 2つの IDが同じも のかどう力、各一致情報の二つの IDが管理テーブルで関連づけられているものと同 じかどうかなどである。さらに、管理テーブルは、使用制限解除可 Z不可のフラグ情 報を有する。例えば、携帯端末 Bに盗難届けが出されている場合は、「不可」となる。 認証局においては、すべての IDが一元的に管理されているので、ここで使用制限解 除の許可 Z不許可を判定することにより、よりセキュリティが向上する。仮に、ウェアラ ブルキーユニット Cと携帯端末 Bがー緒に盗まれた場合は、悪意の第三者が正当な ユーザになりすまして、携帯端末 Bを使用可能状態にすることを防止することができる  [0111] The certificate authority D is a computer device that can communicate with the transmission unit 10 of the portable terminal B and the release unit 20 of the door lock device A and that stores the management table of FIG. When the certificate authority D receives the matching information from the transmission unit 10 of the mobile terminal B and the release unit 20 of the automobile door lock device A, it confirms the contents of the matching information from the management table (FIG. 12) (step 23). ). For example, whether the two IDs included in the two matching information are the same, whether the two IDs of each matching information are the same as those associated in the management table, and so on. Furthermore, the management table has flag information indicating that use restriction can be released and Z cannot be used. For example, if a theft report has been sent to the mobile terminal B, “No” is set. Since all the IDs are managed centrally in the certificate authority, security can be further improved by determining whether the use restriction is released or not. If wearable key unit C and mobile device B are stolen together, it is possible to prevent a malicious third party from impersonating a legitimate user and making mobile device B usable.

[0112] 認証局 Dは、受信した一致情報を管理テーブルで確認し、異常を検知しない場合 は、正当なユーザによる正当な認証動作であるとして、自動車のドアロック装置 Aに 解錠許可信号を送信する。自動車のドアロック装置 Aの解除ユニット 20は、解錠許可 信号を受信すると、ドアロック装置 Aの使用制限を解除し、ドアを解錠する (ステップ S 24)。なお、認証局 Dは、携帯端末 Bにも、ドアロック装置 Aの解錠が許可された旨の 解錠許可通知が送信され、携帯端末 Bは、解錠許可通知を受信すると、その旨を表 示装置に表示する (ステップ S25)。また、盗難届が出されているなど異常を検知した 場合は、解錠許可信号を送信しないので、ドアロック装置 Aは施錠されたままである。 また携帯端末 Bには、解錠が許可されなかった旨の解錠不許可通知が送信され、携 帯端末 Bは、それを受信すると、その旨表示する。これにより、ユーザは、ドアロック装 置が解錠されたかどうかを確認することができる。 [0112] The certificate authority D confirms the received match information in the management table. If no abnormality is detected, the certificate authority D determines that it is a valid authentication operation by a valid user and sends an unlock permission signal to the door lock device A of the car. Send. When the unlocking unit 20 of the door lock device A of the automobile receives the unlock permission signal, the use restriction of the door lock device A is canceled and the door is unlocked (step S24). The certificate authority D also sends an unlocking permission notification that the unlocking of the door lock device A is permitted to the mobile terminal B, and when the mobile terminal B receives the unlocking permission notification, Display on the display (step S25). If an abnormality is detected, such as a theft report, the unlocking signal is not sent, so the door lock device A remains locked. In addition, an unlocking disapproval notice indicating that unlocking is not permitted is transmitted to mobile terminal B, and when mobile terminal B receives it, it displays that effect. As a result, the user can confirm whether or not the door lock device is unlocked.

[0113] このように、本実施の形態例におけるワイヤレス認証システムでは、携帯端末 Bの送 信ユニット 10とドアロック装置 Aの解除ユニット 20との間の認証処理に加えて、認証 局 Dによる認証処理を行い、認証局 Dで最終的な使用制限解除を判断することで、 ウェアラブルキーユニット Cと携帯端末 Bとが一緒に盗まれた場合においても、認証 局 Dに対して速やかに盗難届を出すことにより、悪意の第三者による不正使用を防 止することができる。 As described above, in the wireless authentication system in the present embodiment, in addition to the authentication process between the transmission unit 10 of the mobile terminal B and the release unit 20 of the door lock device A, the authentication by the certification authority D By processing the certificate authority D and determining the final use restriction release, even if the wearable key unit C and the mobile terminal B are stolen together, the certificate authority D is immediately notified of the theft. By doing so, unauthorized use by malicious third parties can be prevented.

[0114] 上記処理手順では、一致情報は、自動車のドアロック装置 Aと携帯端末 Bの両方か ら認証局 Dに送信される例を示した力 自動車のドアロック装置 A又は携帯端末 Bの V、ずれか一方力 のみ一致情報を認証局 Dに送る形態でも力まわな 、。 V、ずれか一 方のみ力もの一致情報により、上記管理テーブルによる認証は可能である。  [0114] In the above processing procedure, the matching information is transmitted from both the vehicle door lock device A and the mobile terminal B to the certificate authority D. The power of the vehicle door lock device A or the mobile terminal B V However, it is also possible to send the matching information to Certificate Authority D with only one force. Authentication by the above management table is possible by matching information with only one of V and deviation.

[0115] 図 15は、図 1に示したワイヤレス認証システムの第一の構成例における第二の認証 処理手順を示す図である。第二の認証処理手順では、携帯端末 Bのクローン装置が 使用された場合であっても、そのクローン装置を用いた不正使用を防止する処理に っ 、て説明する。ウェアラブルキーユニット Cと携帯端末 Bとが一緒に盗まれた場合、 正当なユーザは、これらを探しても見つ力 ないので、盗まれたことに気づく。従って 、認証局 Dに連絡することで、上述の第一の認証処理手順により、不正使用を防止 することができる。しかしながら、携帯端末 Bと同じ機能を有するクローン装置が作成 されてしまった場合、正当なユーザは、クローン装置を使った不正使用が行われるま で、その存在に気づかない。従って、認証局 Dでも正常に認証処理がおこなわれて しまい、クローン装置により自動車のドアロック装置 Aが解錠されるおそれがある。  FIG. 15 is a diagram showing a second authentication processing procedure in the first configuration example of the wireless authentication system shown in FIG. In the second authentication processing procedure, even when the clone device of the portable terminal B is used, a process for preventing unauthorized use using the clone device will be described. If wearable key unit C and mobile device B are stolen together, the legitimate user will not be able to find them by looking for them. Accordingly, by contacting the certificate authority D, unauthorized use can be prevented by the first authentication processing procedure described above. However, if a clone device having the same function as the mobile terminal B is created, a legitimate user does not notice its existence until the unauthorized use using the clone device is performed. Therefore, the authentication process may be normally performed by the certificate authority D, and the door lock device A of the automobile may be unlocked by the clone device.

[0116] 図 16は、クローン装置がドアロック装置 Aと認証局 Dと認証を行う状況を示す概念 図である。真正な携帯端末 Bのクローン装置が作成し、自動車のドアロック装置 Aを 解錠使用するつ場合、クローン装置とドアロック装置 Aが一定距離内になると、クロー ン装置はドアロック装置 Aとワイヤレス認証を行い、ドアロック装置 Aは、クローン装置 が送信する IDを正しい IDと判断する。認証局においても、クローン装置の存在は分 力もないので、管理テーブルで IDなどを確認しても、不正使用を発見できず、解錠を 許可するので、ドアロック装置 Aは解錠されてしまう。なお、クローン装置は、ウェアラ ブルキーユニット Cがそばになくても使用可能なように製作され、上記図 14における 携帯端末 Bの解除ユニット 20の動作を行うものとする。なお、ウェアラブルキーュ-ッ ト Cと携帯端末 Bとの間の認証処理手順については、図 13と同じ手順であるので、そ の図示と説明を省略する。 FIG. 16 is a conceptual diagram showing a situation in which the clone device performs authentication with the door lock device A and the certificate authority D. When a clone device of an authentic mobile terminal B is created and the door lock device A of an automobile is unlocked, when the clone device and the door lock device A are within a certain distance, the clone device is wirelessly connected to the door lock device A. After authentication, door lock device A determines that the ID sent by the clone device is the correct ID. Even in the certificate authority, the existence of clone devices Since there is no power, even if the ID etc. is confirmed in the management table, the unauthorized use cannot be found and the unlocking is permitted, so the door lock device A is unlocked. Note that the clone device is manufactured so that it can be used even if the wearable key unit C is not nearby, and the release unit 20 of the portable terminal B in FIG. 14 is operated. Note that the authentication processing procedure between wearable queue C and portable terminal B is the same as that in FIG. 13, and therefore its illustration and description are omitted.

[0117] 図 15では、上記図 13の処理手順に従って、携帯端末 Bが使用可能状態であること を前提とし、図 14の処理手順と同様に、携帯端末 Bの送信ユニット 10、自動車のドア ロック装置 Aの解除ユニット 20及び認証局間の認証処理となる。  [0117] In FIG. 15, it is assumed that the mobile terminal B is ready for use in accordance with the processing procedure of FIG. 13, and the transmission unit 10 of the mobile terminal B and the door lock of the vehicle are the same as in the processing procedure of FIG. This is the authentication process between the cancellation unit 20 of device A and the certificate authority.

[0118] まず、携帯端末 Bと自動車のドアロック装置 A間の認証処理が行われる。すなわち、 携帯端末 Bの送信ユニット 10は、所定の時間間隔 (例えば 2秒間隔)で自動車のドア ロック装置 Aの解除ユニット 20へ呼びかけ信号として M系列データ(M系列信号)を 無線信号により送信している。自動車のドアロック装置 Aの解除ユニット 20は、携帯 端末 Bの送受信ユニット 10から送信される M系列データを受信すると、自己の内部メ モリ(例えば、フラッシュメモリ)に記憶された M系列データと比較する。この比較は、 例えば一致'加算回路によって行われ、比較の結果、両 M系列データの一致したビ ット数を表す数値がパルス信号として出力される。一致したビット数が所定のしき 、値 (例えば 31ビットの M系列データに対してしきい値 24)以上であり、且つ M系列デー タの受信レベルが所定値以上の場合、すなわち、ドアロック装置 Aと携帯端末 Bが所 定の範囲(例えば数メートル)内にいる場合には、自動車のドアロック装置 Aの解除ュ ニット 20は、呼びかけに対する確認応答 (ACK)と、内部メモリに記憶されたドアロッ ク装置 Aの識別情報 (ドアロック装置識別情報) IDaとを無線信号により送信する。  First, an authentication process between the mobile terminal B and the door lock device A of the automobile is performed. In other words, the transmission unit 10 of the portable terminal B transmits M-sequence data (M-sequence signal) as a call signal to the release unit 20 of the door lock device A of the automobile by a radio signal at a predetermined time interval (for example, every 2 seconds). ing. When the release unit 20 of the door lock device A of the automobile receives the M-sequence data transmitted from the transmission / reception unit 10 of the mobile terminal B, the release unit 20 compares it with the M-sequence data stored in its own internal memory (for example, flash memory). To do. This comparison is performed, for example, by a coincidence adding circuit. As a result of the comparison, a numerical value indicating the number of matched bits of both M series data is output as a pulse signal. When the number of matched bits is equal to or greater than a predetermined threshold (for example, threshold 24 for 31-bit M-sequence data) and the reception level of M-sequence data is greater than or equal to a predetermined value, that is, a door lock device When A and mobile device B are within a certain range (for example, several meters), the release unit 20 of the car door lock device A is acknowledged to the call (ACK) and stored in the internal memory. The door lock device A identification information (door lock device identification information) IDa is transmitted by radio signal.

[0119] 一方、一致したビット数が所定のしきい値未満又は受信レベルが所定値未満である 場合には、ドアロック装置 Aの解除ユニット 20は、 ACK信号及びドアロック装置識別 情報 IDaを送信しない。この場合、前述したように、解除ユニット 20は、ドアロック装置 Aの使用制限を行い、ドアロック装置 Aは施錠されたままの状態とすることができる。  On the other hand, when the number of matched bits is less than a predetermined threshold value or the reception level is less than a predetermined value, the release unit 20 of the door lock device A transmits an ACK signal and door lock device identification information IDa. do not do. In this case, as described above, the release unit 20 can restrict the use of the door lock device A, and the door lock device A can be kept locked.

[0120] 携帯端末 Bの送信ユニット 10は、 ACK信号及びドアロック装置識別情報 IDaを受 信すると、受信したドアロック装置識別情報 IDaと自己の内部メモリ(例えばフラッシュ メモリ)に記憶されたドアロック装置識別情報 IDaとを照合する (ステップ S31)。 [0120] Upon receiving the ACK signal and the door lock device identification information IDa, the transmission unit 10 of the mobile terminal B receives the received door lock device identification information IDa and its own internal memory (for example, flash memory). The door lock device identification information IDa stored in the memory is collated (step S31).

[0121] 照合の結果、両ドアロック装置識別情報 IDaがー致している場合には、送信ュ-ッ ト 10は、解除ユニット 20が自己と対をなす解除ユニットであると認識し、自己の内部メ モリに記憶された携帯端末 Bの識別情報 (端末識別情報) IDbを送信し、さら〖こ、一 致した旨の一致情報 (IDaと IDbの情報を含む)を認証局 Dに送信する。一方、照合 の結果、両ドアロック装置識別情報 IDaがー致していない場合は、解除ユニット 20が 自己と対をなす解除ユニットではないと認識し、端末識別情報 IDbを送信しない。も ちろん、一致情報も送信しない。  [0121] If the two door lock device identification information IDa is found as a result of the collation, the transmitting unit 10 recognizes that the release unit 20 is a release unit that makes a pair with itself. Send the identification information (terminal identification information) IDb of mobile terminal B stored in the internal memory, and send the matching information (including IDa and IDb information) to the certificate authority D. . On the other hand, if the two-door lock device identification information IDa does not match as a result of the collation, the release unit 20 recognizes that it is not a pair with itself and does not transmit the terminal identification information IDb. Of course, no matching information is sent.

[0122] 自動車のドアロック装置 Aの解除ユニット 20は、携帯端末 Bの送信ユニット 10から 送信された端末識別情報 IDbを受信すると、受信した端末識別情報 IDbと、自己の 内部メモリに記憶された端末識別情報 IDbとを照合する (ステップ S32)。  [0122] When the release unit 20 of the door lock device A of the automobile receives the terminal identification information IDb transmitted from the transmission unit 10 of the portable terminal B, the received terminal identification information IDb and the received terminal identification information IDb are stored in its own internal memory. The terminal identification information IDb is collated (step S32).

[0123] 照合の結果、両端末識別情報 IDbがー致している場合には、解除ユニット 20は、 送信ユニット 10が自己と対をなす送信ユニットであると認識し、その旨の一致情報 (I Daと IDbを含む)を認証局に送信する。一方、両端末識別情報 IDbがー致しない場 合には、送信ユニット 10が自己と対をなす送受信ユニットでないと認識し、一致情報 も認証局に送信しない。  [0123] If both terminal identification information IDb is found as a result of the collation, the canceling unit 20 recognizes that the transmitting unit 10 is a transmitting unit paired with itself, and the matching information (I (Including Da and IDb). On the other hand, if both terminal identification information IDb does not match, the transmitting unit 10 recognizes that it is not a transmitting / receiving unit paired with itself, and does not transmit matching information to the certificate authority.

[0124] 認証局 Dは、携帯端末 Bの送信ユニット 10と自動車のドアロック装置 Aの解除ュ- ット 20とからそれぞれ一致情報を受信すると、上述したように、一致情報の内容を管 理テーブルにより確認する (ステップ S33)。認証局 Dは、受信した一致情報を管理テ 一ブルで確認し、異常を検知しない場合は、続いて、携帯端末 Bに対して行動履歴 を要求する。  [0124] When the certificate authority D receives the matching information from the transmission unit 10 of the portable terminal B and the release unit 20 of the door lock device A of the automobile, it manages the contents of the matching information as described above. Confirm with the table (step S33). The certificate authority D confirms the received match information with the management table, and if no abnormality is detected, requests the mobile terminal B for an action history.

[0125] 行動履歴は、携帯端末 Bの動作に関する履歴情報であって、好ましくは、ドアロック 装置 A通信に関する情報である。例えば、過去におけるドアロック装置 Aの解除ュ- ット 20と通信を行った時刻、さらに具体的には、解錠された時刻(アクセス時刻)の情 報や、解除ユニット 20と通信を行った時の場所に関する情報などである。  [0125] The action history is history information related to the operation of the mobile terminal B, and is preferably information related to the door lock device A communication. For example, the communication time with the unlocking unit 20 of the door lock device A in the past, more specifically, information on the unlocking time (access time) and the communication with the releasing unit 20 Information about the place of time.

[0126] 携帯端末 Bは、自己の行動履歴に関する情報を蓄積し、定期的又はアクセス毎に 認証局 Dに送信する。認証局 Dは、受信した行動履歴に関する情報を行動履歴デー タベースとして登録しておく。携帯端末 Bから送信される行動履歴は、少なくとも前回 の送信後新たに作成された行動履歴 (未送信の行動履歴)を含む。 [0126] The mobile terminal B accumulates information related to its own action history and transmits it to the certificate authority D periodically or every access. Certificate Authority D registers the information related to the received action history as an action history database. The action history sent from mobile device B is at least the previous time Includes newly created action history (unsent action history) after sending.

[0127] 認証局 Dは、例えば、次の 2つの確認手法のいずれかにより、認証局 Dに登録する ために送られてきた行動履歴力 真正な携帯端末からのものであるかを確認する。  [0127] The certificate authority D confirms, for example, whether the action history power sent to register with the certificate authority D is from a genuine portable terminal by one of the following two confirmation methods.

[0128] 第一は、携帯端末 Bは、未送信の行動履歴に加えて、過去 (例えば前回)の行動履 歴を一緒に認証局 Dに送信する。認証局 Dは、送信された過去の行動履歴と、認証 局 Dにすでに蓄積されて 、る行動履歴とを照合し、一致する行動履歴が有るか否か を判断する。一致する行動履歴があれば、真正な携帯端末力 の送信と判定し、一 致する行動履歴がなければ、クローン装置力 の送信などなんらかの不正に基づい た送信と判定する。認証局 Dは、真正な携帯端末からの行動履歴と判断した場合の み、新たな行動履歴を登録する。  [0128] First, the mobile terminal B transmits to the certificate authority D together with the past action history (for example, the previous time) in addition to the unsent action history. The certificate authority D collates the transmitted past action history with the action history already accumulated in the certificate authority D, and determines whether there is a matching action history. If there is a matching action history, it is determined that the mobile terminal power is authentic, and if there is no matching action history, it is determined that the transmission is based on some fraud, such as transmission of clone device power. Certificate Authority D registers a new action history only when it is judged as an action history from a genuine mobile terminal.

[0129] 第二は、携帯端末 Bから行動履歴 (少なくとも未送信のもの)を送信することに加え て、ドアロック装置 Aからも行動履歴を認証局 Dに送信する。行動履歴は、上述のよう に、携帯端末 Bとドアロック装置 Aとの通信に関する履歴情報であるので、ドアロック 装置 Aは、携帯端末 Bと同じ履歴情報を作成することができ、それを蓄積し、定期的 またはアクセス毎に行動履歴 (少なくとも未送信のもの)を認証局 Dに送信する。認証 局 Dは、携帯端末 Bから送信された行動履歴と、ドアロック装置 Aから送信された行動 履歴とを照合し、一致するか否かを判断する。両行動履歴が一致すれば、真正な携 帯端末からの送信と判定し、一致しなければ、クローン装置力 の送信などなんらか の不正に基づいた送信と判定する。認証局 Dは、真正な携帯端末からの行動履歴と 判断した場合のみ、新たな行動履歴を登録する。  [0129] Second, in addition to transmitting an action history (at least not transmitted) from the mobile terminal B, the door lock apparatus A also transmits an action history to the certificate authority D. As described above, since the action history is history information related to communication between the mobile terminal B and the door lock device A, the door lock device A can create the same history information as the mobile terminal B and store it. Then, the action history (at least not yet sent) is sent to Certification Authority D periodically or every access. The certification authority D collates the action history transmitted from the mobile terminal B with the action history transmitted from the door lock device A, and determines whether or not they match. If both behavior histories match, it is determined that the transmission is from a genuine mobile terminal, and if they do not match, it is determined that the transmission is based on some injustice such as transmission of clone device power. Certificate Authority D registers a new action history only when it is determined to be an action history from a genuine mobile terminal.

[0130] もちろん、上記第一及び第二の確認手法を組み合わせた確認処理が行われてもよ い。この場合、携帯端末 Bとドアロック装置 Aの両方から、新しく作成された行動履歴 とともに、送信済みの過去の行動履歴が送信される。認証局 Dは、携帯端末 Bとドア ロック装置 Aからの新しく作成された行動履歴とを照合するとともに、両者力ゝらの過去 の行動履歴それぞれを、自己のデータベースに登録されたデータベースと照合し、 二重の確認処理を行う。  [0130] Of course, a confirmation process combining the first and second confirmation methods may be performed. In this case, both the mobile terminal B and the door lock device A transmit the past action history that has already been transmitted together with the newly created action history. The certificate authority D collates the newly created action history from the mobile terminal B and the door lock device A, and compares the past action histories of both of them against the database registered in its own database. , Double check process.

[0131] 若しくは、携帯端末 Bの行動履歴は、ドアロック装置 Aとの通信に関する履歴なので 、ドアロック装置 Aも携帯端末 Bが作成する行動履歴と同じ行動履歴を作成すること ができる。従って、携帯端末 Bからは、行動履歴を認証局に送信せずに、ドアロック装 置 Aが作成した行動履歴を、ドアロック装置 Aが認証局 Dに送信するようにしてもょ ヽ 。ドアロック装置 Aへの不正アクセス禁止力 本発明のワイヤレス認証システムの目的 であるので、ドアロック装置 Aにアクセスして行動履歴を盗聴することは、本発明では 想定されない。従って、ドアロック装置 Aから送信される行動履歴は真正なものと判断 することができ、上述のような確認処理を行うことなぐ認証局 Dに登録することができ る。 [0131] Alternatively, since the behavior history of the mobile terminal B is a history related to communication with the door lock device A, the door lock device A should also create the same behavior history as the behavior history created by the mobile terminal B. Can do. Therefore, the mobile terminal B may transmit the action history created by the door lock device A to the certificate authority D without transmitting the action history to the certificate authority. Since the purpose of the wireless authentication system of the present invention is to prevent unauthorized access to the door lock device A, it is not assumed in the present invention that the door lock device A is accessed and the action history is wiretapped. Therefore, the action history transmitted from the door lock device A can be determined to be authentic, and can be registered in the certificate authority D without performing the confirmation process as described above.

[0132] 図 17は、携帯端末 Bの行動履歴に関するデータベースの例を示す図である。図 17 の例では、行動履歴に関する情報は、電話番号、自己 ID番号 (端末識別情報 IDb) 、ドアロック装置 ID番号 (IDa)、車へのアクセス時刻(ドアロック装置の解除ユニットと 通信を行った開始時刻又は終了時刻など)、そのときの位置情報 (緯度'経度情報) を有する。位置情報は、基地局の識別番号など他の識別情報でも力まわない。行動 履歴に関する情報は、これらに限らず、例えば、携帯端末が温度計を内蔵している 場合は、ドアロック装置との通信時の温度であってもよ 、。  FIG. 17 is a diagram showing an example of a database related to the action history of the mobile terminal B. In the example shown in Fig. 17, the action history information includes the telephone number, the self ID number (terminal identification information IDb), the door lock device ID number (IDa), the access time to the car (the communication with the door lock device release unit). Start time or end time), and position information (latitude / longitude information) at that time. The position information may not be other identification information such as an identification number of the base station. The information related to the action history is not limited to these. For example, when the portable terminal has a built-in thermometer, it may be the temperature at the time of communication with the door lock device.

[0133] 携帯端末 Bは、ドアロック装置 Aの解除ユニット 20と通信を行うごとに、上記行動履 歴に関する情報を作成し、蓄積する。さらに、蓄積した行動履歴に関する情報を定期 的(例えば、一日一回程度)又はその都度認証局 Dに送信する。従って、認証局 Dも 図 17と同様の情報を有するデータベースを各携帯端末ごとに有する。  [0133] Each time the mobile terminal B communicates with the release unit 20 of the door lock device A, the mobile terminal B creates and accumulates information related to the action history. In addition, information on the accumulated action history is transmitted to Certification Authority D periodically (for example, about once a day) or each time. Therefore, Certificate Authority D also has a database having the same information as in FIG. 17 for each mobile terminal.

[0134] クローン装置は、真正な携帯装置と同一の機能を有するものの、正当なユーザによ つて使用されるわけではないので、真正な携帯装置と同一行動はとれない。従って、 その行動履歴は、真正な携帯装置と異なるものとなり、また、真正な携帯装置と同一 の行動履歴を作り出すことはできない。また、クローン装置は、ドアロックの解除に成 功するまで行動履歴を作成することはできな 、ので、クローン装置の行動履歴を認 証局に登録することもできない。行動履歴を登録できなければ、ドアロックの解除に 成功しないので、結局、クローン装置は、ドアロック装置を解除することはできないこと になる。クローン装置は、過去において、ドアロック装置の解除に成功していないので 、仮に行動履歴が作成されていたとしても、それは、人為的なものであり、それが、実 際の行動履歴と全く一致することは考えられない。従って、悪意の第三者がクローン 装置を使ってドアロック装置の解除を試みる場合、認証局が、クローン装置に行動履 歴を要求し、クローン装置からの行動履歴を受信し、それを認証局のデータベースに 保存されている行動履歴と照合することにより、クローン装置による不正使用を発見 することができる。 [0134] Although the clone device has the same function as a genuine portable device, it cannot be used by a legitimate user, and therefore cannot perform the same action as a genuine portable device. Therefore, the behavior history is different from that of a genuine portable device, and the same behavior history as that of a genuine portable device cannot be created. In addition, since the clone device cannot create an action history until the door lock is successfully released, it cannot register the action history of the clone device with the certification authority. If the action history cannot be registered, the door lock cannot be released successfully, so that the clone device cannot release the door lock device after all. Since the clone device has not succeeded in releasing the door lock device in the past, even if an action history is created, it is artificial, and it is exactly the same as the actual action history. I can't imagine doing it. Therefore, malicious third parties When attempting to release the door lock device using the device, the certificate authority requests the action history from the clone device, receives the action history from the clone device, and stores the action history in the certificate authority database. By comparing with, unauthorized use by a clone device can be detected.

[0135] 図 15に戻って、携帯端末 Bの送信ユニット 10は、要求された行動履歴を送信する。  Returning to FIG. 15, the transmission unit 10 of the mobile terminal B transmits the requested action history.

要求される行動履歴は、例えば、直近の行動履歴一つでもよいし、複数の行動履歴 でもよい。  The requested action history may be, for example, one recent action history or a plurality of action histories.

[0136] 認証局 Dは、受信した行動履歴と蓄積されて!、るものと照合し (ステップ S34)、一 致していれば、正当なユーザ力 の真正な携帯装置 Bによる認証動作であるとして、 自動車のドアロック装置 Aに解錠許可信号を送信する。自動車のドアロック装置 Aの 解除ユニット 20は、解錠許可信号を受信すると、ドアロック装置 Aの使用制限を解除 し、ドアを解錠する (ステップ S35)。なお、認証局 Dは、携帯端末 Bにも、ドアロック装 置 Aの解錠が許可された旨の解錠許可通知が送信され、携帯端末 Bは、解錠許可 通知を受信すると、その旨を表示装置に表示する (ステップ S36)。また、行動履歴が 一致しないなど異常を検知した場合は、解錠許可信号を送信しないので、ドアロック 装置 Aは施錠されたままである。また携帯端末 Bには、解錠が許可されな力つた旨の 解錠不許可通知が送信され、携帯端末 Bは、それを受信すると、その旨表示する。  [0136] The certificate authority D collates with the received action history! And matches it (step S34). If there is a match, it is assumed that the authentication operation is performed by the authentic mobile device B with a valid user power. Send the unlocking permission signal to the door lock device A of the car. When the unlocking unit 20 of the door lock device A of the automobile receives the unlocking permission signal, it cancels the use restriction of the door lock device A and unlocks the door (step S35). Certificate Authority D also sends an unlock permission notification to the mobile terminal B that the unlocking of the door lock device A is permitted, and when the mobile terminal B receives the unlock permission notification, Is displayed on the display device (step S36). In addition, when an abnormality is detected such that the action histories do not match, the unlocking permission signal is not transmitted, so that the door lock device A remains locked. In addition, an unlocking disapproval notification indicating that unlocking has been permitted is transmitted to mobile terminal B, and when mobile terminal B receives it, it displays that effect.

[0137] このように、第二の認証処理手順によれば、第一の認証処理手順に加えて、さらに 、携帯端末 Bの行動履歴を照合する処理を実施することで、クローン装置による不正 使用を防止することができる。  [0137] Thus, according to the second authentication processing procedure, in addition to the first authentication processing procedure, the illegal use by the clone device is further performed by performing processing for checking the action history of the mobile terminal B. Can be prevented.

[0138] 図 18は、本発明の実施の形態におけるワイヤレス認証システムの第二の構成例を 示す図である。図 18において、ワイヤレス認証システムは、被制御機器である自動車 のドアロック装置 A、ドアロック装置 Aを使用制限及び解錠可能な携帯端末 B、さらに 、その携帯端末を使用制限可能なウェアラブルキーユニット C力も構成される。すな わち、図 1との比較において、認証局 Dを有さない構成である。  FIG. 18 is a diagram showing a second configuration example of the wireless authentication system in the embodiment of the present invention. In FIG. 18, the wireless authentication system includes a door lock device A of a controlled vehicle, a portable terminal B that can restrict use and unlock the door lock device A, and a wearable key unit that can restrict use of the portable terminal. C force is also configured. In other words, in comparison with Fig. 1, the configuration does not have certificate authority D.

[0139] 図 19は、図 18に示したワイヤレス認証システムの第二の構成例による第三の認証 処理手順を示す図である。第三の認証処理手順は、図 15に示した第二の認証処理 手順にぉ ヽて認証局で行われた行動履歴の照合を、自動車のドアロック装置 Aで行 うものである。なお、ウェアラブルキーユニット Cと携帯端末 Bとの間の認証処理手順 については、図 13と同じ手順であるので、その図示と説明を省略する。 FIG. 19 is a diagram showing a third authentication processing procedure according to the second configuration example of the wireless authentication system shown in FIG. The third authentication processing procedure is the same as that of the second authentication processing procedure shown in Fig. 15. Is Umono. Note that the authentication processing procedure between the wearable key unit C and the portable terminal B is the same as that shown in FIG.

[0140] 図 19では、上記図 13の処理手順に従って、携帯端末 Bが使用可能状態であること を前提とし、図 14の処理手順と同様に、携帯端末 Bの送信ユニット 10、自動車のドア ロック装置 Aの解除ユニット 20間の認証処理となる。  [0140] In FIG. 19, it is assumed that the mobile terminal B is ready for use in accordance with the processing procedure of FIG. 13, and the transmission unit 10 of the mobile terminal B and the door lock of the vehicle are the same as in the processing procedure of FIG. This is the authentication process between the release units 20 of device A.

[0141] まず、携帯端末 Bと自動車のドアロック装置 A間の認証処理が行われる。すなわち、 携帯端末 Bの送信ユニット 10は、所定の時間間隔 (例えば 2秒間隔)で自動車のドア ロック装置 Aの解除ユニット 20へ呼びかけ信号として M系列データ(M系列信号)を 無線信号により送信している。自動車のドアロック装置 Aの解除ユニット 20は、送信 ユニット 10から送信される M系列データを受信すると、自己の内部メモリ(例えば、フ ラッシュメモリ)に記憶された M系列データと比較する。この比較は、例えば一致'カロ 算回路によって行われ、比較の結果、両 M系列データの一致したビット数を表す数 値がパルス信号として出力される。一致したビット数が所定のしき 、値 (例えば 31ビッ トの M系列データに対してしきい値 24)以上であり、且つ M系列データの受信レベル が所定値以上の場合、すなわち、ドアロック装置 Aと携帯端末 Bが所定の範囲 (例え ば数メートル)内にいる場合には、自動車のドアロック装置 Aの解除ユニット 20は、呼 びかけに対する確認応答 (ACK)と、内部メモリに記憶されたドアロック装置 Aの識別 情報 (ドアロック装置識別情報) IDaとを無線信号により送信する。  First, an authentication process between the mobile terminal B and the door lock device A of the automobile is performed. In other words, the transmission unit 10 of the portable terminal B transmits M-sequence data (M-sequence signal) as a call signal to the release unit 20 of the door lock device A of the automobile by a radio signal at a predetermined time interval (for example, every 2 seconds). ing. When the release unit 20 of the door lock device A of the automobile receives the M-sequence data transmitted from the transmission unit 10, it compares it with the M-sequence data stored in its own internal memory (for example, a flash memory). This comparison is performed by, for example, a coincidence / calo arithmetic circuit, and as a result of the comparison, a numerical value indicating the number of matched bits of both M series data is output as a pulse signal. If the number of matched bits is equal to or greater than a predetermined threshold (for example, threshold 24 for 31-bit M-sequence data) and the reception level of M-sequence data is greater than or equal to a predetermined value, that is, a door lock device When A and the mobile terminal B are within a predetermined range (for example, several meters), the release unit 20 of the car door lock device A receives an acknowledgment (ACK) for the call and is stored in the internal memory. Identification information of the door lock device A (door lock device identification information) IDa is transmitted by radio signal.

[0142] 一方、一致したビット数が所定のしきい値未満又は受信レベルが所定値未満である 場合には、ドアロック装置 Aの解除ユニット 20は、 ACK信号及びドアロック装置識別 情報 IDaを送信しない。この場合、前述したように、解除ユニット 20は、ドアロック装置 aの使用制限を行い、ドアロック装置 Aは施錠されたままの状態とすることができる。  [0142] On the other hand, when the number of matched bits is less than the predetermined threshold value or the reception level is less than the predetermined value, the release unit 20 of the door lock device A transmits the ACK signal and the door lock device identification information IDa. do not do. In this case, as described above, the release unit 20 can restrict the use of the door lock device a, and the door lock device A can be kept locked.

[0143] 携帯端末 Bの送受信ユニット 10は、 ACK信号及びドアロック装置識別情報 IDaを 受信すると、受信したドアロック装置識別情報 IDaと自己の内部メモリ(例えばフラッシ ュメモリ)に記憶されたドアロック装置識別情報 IDaとを照合する (ステップ S41)。  [0143] Upon receiving the ACK signal and the door lock device identification information IDa, the transmission / reception unit 10 of the portable terminal B receives the received door lock device identification information IDa and the door lock device stored in its own internal memory (for example, a flash memory). The identification information IDa is collated (step S41).

[0144] 照合の結果、両ドアロック装置識別情報 IDaがー致している場合には、送信ュ-ッ ト 10は、解除ユニット 20が自己と対をなす解除ユニットであると認識し、自己の内部メ モリに記憶された携帯端末 Bの識別情報 (端末識別情報) IDbを送信する。一方、照 合の結果、両ドアロック装置識別情報 IDaがー致していない場合は、解除ユニット 20 が自己と対をなす使用制限解除ユニットではないと認識し、端末識別情報 IDbを送 信しない。 [0144] If both door lock device identification information IDa is correct as a result of the collation, the transmitter 10 recognizes that the release unit 20 is a release unit that makes a pair with itself, and The mobile terminal B identification information (terminal identification information) IDb stored in the internal memory is transmitted. On the other hand If the door lock device identification information IDa is not correct, the release unit 20 recognizes that it is not a use restriction release unit that makes a pair with itself, and does not send the terminal identification information IDb.

[0145] 自動車のドアロック装置 Aの解除ユニット 20は、携帯端末 Bの送信ユニット 10から 送信された端末識別情報 IDbを受信すると、受信した端末識別情報 IDbと、自己の 内部メモリに記憶された端末識別情報 IDbとを照合する (ステップ S42)。  [0145] Upon receiving the terminal identification information IDb transmitted from the transmission unit 10 of the mobile terminal B, the release unit 20 of the automobile door lock device A receives the received terminal identification information IDb and the internal identification information stored in its own internal memory. The terminal identification information IDb is collated (step S42).

[0146] 照合の結果、両端末識別情報 IDbがー致している場合には、解除ユニット 20は、 送信ユニット 10が自己と対をなす送信ユニットであると認識する。一方、両端末識別 情報 IDbがー致しない場合には、送信ユニット 10が自己と対をなす送受信ユニットで ないと認識し、携帯端末 Bは使用不能状態のままである。  As a result of the collation, when both terminal identification information IDb matches, the release unit 20 recognizes that the transmission unit 10 is a transmission unit paired with itself. On the other hand, if both terminal identification information IDb does not match, the transmitting unit 10 recognizes that it is not a transmitting / receiving unit paired with itself, and the portable terminal B remains unusable.

[0147] 自動車のドアロック装置 Aの解除ユニット 20は、端末識別情報 IDbがー致すると、 携帯端末 Bに対して行動履歴を要求する。行動履歴の内容については、上記図 17 を参照しつつ上述した。第三の認証処理手順では、ドアロック装置 Aの解除ユニット 2 0が、携帯端末 Bの行動履歴を蓄積する。行動履歴は、上述のように、携帯端末 Bとド アロック装置 Aとの通信に関する履歴情報であるので、ドアロック装置 Aと携帯端末 B とは、同じ履歴情報を作成することができる。従って、ドアロック装置 Aは、携帯端末 B が作成する行動履歴と対応関係にある同じ行動履歴を作成し、それを記憶しておく。  [0147] When the terminal identification information IDb matches, the release unit 20 of the automobile door lock device A requests an action history from the portable terminal B. The contents of the action history have been described above with reference to FIG. In the third authentication processing procedure, the release unit 20 of the door lock device A accumulates the action history of the mobile terminal B. Since the action history is history information regarding communication between the mobile terminal B and the door lock device A as described above, the door lock device A and the mobile terminal B can create the same history information. Therefore, the door lock device A creates the same action history corresponding to the action history created by the mobile terminal B and stores it.

[0148] 携帯端末 Bの送信ユニット 10は、要求された行動履歴を送信する。ドアロック装置 Aの解除ユニット 20は、受信した行動履歴と蓄積されて!、るものと照合し (ステップ S 43)、一致していれば、正当なユーザ力 の真正な携帯端末による認証動作であると して、ドアロック装置 Aの使用制限を解除し、ドアロックを解錠する (ステップ S44)。こ のとき、ドアロック装置 Aから携帯端末 Bに、ドアロック装置 Aの解錠が行われた旨の 解錠通知が送信され、携帯端末 Bは、解錠通知を受信すると、その旨を表示装置に 表示してもよい (ステップ S45)。また、行動履歴が一致しないなど異常を検知した場 合は、解錠されず、ドアロック装置 Aは施錠されたままである。また携帯端末 Bには、 解錠されなかった旨の解錠不許可通知が送信され、携帯端末 Bは、それを受信する と、その旨表示してもよい。  [0148] The transmission unit 10 of the mobile terminal B transmits the requested action history. The unlocking unit 20 of the door lock device A collates with the received action history! (Step S43), and if it matches, the authenticating operation by a genuine mobile terminal with a legitimate user power is performed. If there is, the use restriction of the door lock device A is released, and the door lock is unlocked (step S44). At this time, the door lock device A sends an unlock notification to the mobile terminal B indicating that the door lock device A has been unlocked, and when the mobile terminal B receives the unlock notification, the mobile terminal B displays that notification. It may be displayed on the device (step S45). In addition, when an abnormality is detected such that the behavior histories do not match, the door lock device A remains locked and is not unlocked. In addition, an unlocking disapproval notice indicating that the mobile terminal B has not been unlocked is transmitted to the mobile terminal B, and when the mobile terminal B receives it, the mobile terminal B may display that fact.

[0149] このように、第三の認証処理手順によれば、認証局にお!、て行動履歴の照合を行 わず、ドアロック装置 Aにより行動履歴の照合を行うので、認証局なしでも、クローン 装置による不正使用を防止することができる。 [0149] As described above, according to the third authentication processing procedure, the certificate authority is collated with the action history! Since the action history is collated by the door lock device A, unauthorized use by the clone device can be prevented even without a certificate authority.

[0150] また、ドアロック装置 Aと携帯端末 Bとの間の ID照合において、 ID (IDaと IDb)の盗 聴による IDの不正取得を防止するために、 IDは暗号化されて送受信される。 IDの暗 号ィ匕及びその復号ィ匕は、 CPUのような演算装置に大きな負荷を与えるため、 IDを暗 号ィ匕して送受信するためには、高性能な CPUを必要とする。一方で、上記第三の認 証処理手順では、必ずしも IDを暗号ィ匕する必要はなぐ平文で送信してもカゝまわな い。従って、 CPUの負担が大きく軽減されるメリットがある。その理由は、以下の通り である。第三の認証処理手順では、ドアロック装置 Aと携帯端末 Bとの間で、 IDにカロ えて、行動履歴の照合が行われる。この行動履歴は、上述のように、真正な携帯端末 の行動そのものであり、クローン装置は、真正な携帯端末の行動そのものまで真似す ることはできない。そして、行動履歴は、携帯端末 Bとドアロック装置 Aとが正常に通 信を行う毎に新たに作成され、照合のために用いられる行動履歴は随時更新される 。すなわち、行動履歴は、携帯端末 Bを識別する情報となり、それが随時変更するの で、実質的に、携帯端末 Bの識別情報の暗号化と等価の効果を有する。たとえ行動 履歴を盗聴しても、その後すぐに照合用の行動履歴は変更されるので、その行動履 歴による不正アクセスは不可能である。また、ドアロック装置 Aや携帯端末 Bの IDが 暗号ィ匕されずに平文で送受信されるのを盗聴し、それを取得したとしても、第三の認 証処理手順では、行動履歴による照合が必要であるため、不正アクセスは認められ ない。 [0150] In ID verification between the door lock device A and the portable terminal B, the ID is encrypted and transmitted / received to prevent unauthorized acquisition of the ID due to wiretapping of the ID (IDa and IDb). . Since the ID encryption key and its decryption key impose a heavy load on a computing device such as a CPU, a high-performance CPU is required to transmit and receive the ID encryption key. On the other hand, in the third authentication processing procedure, it is not necessary to encrypt the ID. Therefore, there is an advantage that the burden on the CPU is greatly reduced. The reason is as follows. In the third authentication processing procedure, the action history is collated between the door lock device A and the portable terminal B in addition to the ID. As described above, this behavior history is the behavior of the genuine mobile terminal itself, and the clone device cannot imitate the behavior of the genuine mobile terminal itself. The action history is newly created every time the mobile terminal B and the door lock device A normally communicate, and the action history used for collation is updated as needed. In other words, the action history becomes information for identifying the mobile terminal B, which changes as needed, and thus has an effect substantially equivalent to encryption of the identification information of the mobile terminal B. Even if an action history is eavesdropped, the action history for verification is changed immediately thereafter, and unauthorized access based on the action history is impossible. Even if the ID of door lock device A or mobile terminal B is eavesdropped and received in plain text without being encrypted, the third authentication processing procedure does not match the action history. Unauthorized access is not allowed because it is necessary.

[0151] このように、行動履歴による認証は、実質的に、携帯端末を識別する情報を暗号ィ匕 していることと同等の効果を有する。し力も、所定の暗号化の法則に従って作成され る通常の暗号化であれば、それが復号されるおそれがあるが、行動履歴は、携帯端 末の行動そのものであって、なんらかの法則に従って暗号化されるのではなぐそれ 自体で暗号情報のようは性格を有するものであるので、解読のおそれもない。そして 、暗号化及び復号化の処理も不要なため、演算装置の負荷軽減につながる。  [0151] As described above, the authentication based on the action history has substantially the same effect as encrypting information for identifying the mobile terminal. However, if the normal encryption created according to the prescribed encryption law is used, it may be decrypted, but the action history is the action of the mobile terminal itself, and it is encrypted according to some kind of law. However, since it has its own character like encrypted information, there is no risk of decryption. Also, since encryption and decryption processes are unnecessary, the load on the arithmetic device is reduced.

[0152] ところで、上述した第二及び第三の認証処理手順における行動履歴の照合により、 クローン装置による不正使用をほぼ完全に排除できると考えられるが、可能性として 、悪意の第三者が常に真正の携帯端末の近くにいて、第二の認証処理手順におい て、真正な携帯端末が認証局に送信する行動履歴を傍受し、クローン装置にその行 動履歴データを組み込むことも考えられる。例えば、大統領 (正当なユーザ)を護衛 する SP (悪意の第三者)のように一緒に行動する人物であれば、絶対に不可能とは 言い切れない。なお、第三の認証処理手順においても、行動履歴を相手側に登録 するための送信は行われな 、ので、行動履歴の盗聴は不可能である。 [0152] By the action history verification in the second and third authentication procedures described above, it is considered that illegal use by the clone device can be almost completely eliminated. The malicious third party is always near the authentic mobile terminal, and in the second authentication processing procedure, the action history transmitted by the authentic mobile terminal to the certificate authority is intercepted, and the action history data is sent to the clone device. It is also possible to incorporate. For example, a person acting together like an SP (malicious third party) escorting the president (a legitimate user) is definitely not impossible. Even in the third authentication processing procedure, no action history is eavesdropped because no action history is transmitted to the other party.

[0153] 以下の実施の形態例では、認証局に行動履歴を蓄積 (登録)させるための携帯端 末から認証局への行動履歴の送信において、悪意の第三者に傍受されない手段を 提供する。具体的には、真正な携帯端末と対になるもう一つの携帯端末を用いて、 対になる別の携帯端末を経由して真正な携帯端末の行動履歴を認証局に送信する  [0153] In the following embodiment, a means is provided that is not intercepted by a malicious third party in the transmission of the action history from the mobile terminal to the certificate authority for storing (registering) the action history in the certificate authority. . Specifically, using another mobile terminal that is paired with the authentic mobile terminal, the action history of the authentic mobile terminal is transmitted to the certificate authority via another mobile terminal that is paired with the mobile terminal.

[0154] 図 20は、対になる別の携帯端末を経由した行動履歴の送信方法を説明する図で ある。真正な携帯端末 Bと対になる別の携帯端末 Eとが、所定範囲 (数メートル)内に 入ると、ワイヤレス認証を行い、真正な携帯端末 Bは、対になる別の携帯端末 Eに行 動履歴を送信する。別の携帯端末 Eは、行動履歴を受信すると、それを認証局に送 信する。真正な携帯端末 Bと対になる別の携帯端末 Eとが通信できる範囲は非常に 狭い (数メートル)であるので、仮に、クローン装置を有する悪意の第三者が正当なュ 一ザの近くにいても、それを傍受することは不可能である。また、悪意の第三者は、 真正な携帯端末 Bの対となる別の携帯端末 Eがどれであるかが分力 ないので、対と なる別の携帯端末 E力もの送信電波も傍受することはできない。従って、認証局への 行動履歴を、悪意の第三者に傍受されずに送信することができ、行動履歴も同一な クローン装置の製作を防止することができる。 FIG. 20 is a diagram for explaining a method for transmitting an action history via another mobile terminal that is paired. When the authentic mobile terminal B and another mobile terminal E that is paired with each other fall within a predetermined range (several meters), wireless authentication is performed, and the authentic mobile terminal B goes to another mobile terminal E that is paired. Send a motion history. When another mobile terminal E receives the action history, it sends it to the certificate authority. Since the range in which a genuine mobile terminal B and another mobile terminal E paired with each other can communicate is very narrow (several meters), a malicious third party who has a clone device is close to a legitimate user. It is impossible to intercept it. In addition, since a malicious third party has no power to identify another mobile terminal E that is a pair of the authentic mobile terminal B, it is also necessary to intercept transmitted radio waves from another mobile terminal E. I can't. Therefore, the action history to the certificate authority can be transmitted without being intercepted by a malicious third party, and the production of a clone device with the same action history can be prevented.

[0155] 図 21は、別の形態端末を経由した行動履歴の送信処理について説明する図であ る。真正な携帯端末 Bの識別信号送受信ユニット 10は、所定の時間間隔 (例えば 2 秒間隔)で対となる別の携帯端末 Eの識別信号送受信ユニット 10へ呼び力 4ナ信号と して M系列データ (M系列信号)を無線信号により送信して 、る。対となる別の携帯 端末 Eの識別信号送受信ユニット 10は、真正な携帯端末 Bから送信される M系列デ ータを受信すると、自己の内部メモリ(例えば、フラッシュメモリ)に記憶された M系列 データと比較する。この比較は、例えば一致'加算回路によって行われ、比較の結果 、両 M系列データの一致したビット数を表す数値力パルス信号として出力される。一 致したビット数が所定のしき 、値 (例えば 31ビットの M系列データに対してしき 、値 2 4)以上であり、且つ M系列データの受信レベルが所定値以上の場合、換言すると、 真正な携帯端末 Bと対となる別の携帯端末 Eとが所定の範囲 (例えば数メートル)内 にいる場合には、対となる別の携帯端末 Eの識別信号送受信ユニット 10は、呼びか けに対する確認応答 (ACK)と、内部メモリに記憶されたドアロック装置の識別情報( 端末識別情報) IDeとを無線信号により送信する。 FIG. 21 is a diagram for explaining the action history transmission processing via another form terminal. The identification signal transmission / reception unit 10 of the authentic mobile terminal B receives the M-sequence data as a four-signal signal to the identification signal transmission / reception unit 10 of another mobile terminal E paired at a predetermined time interval (for example, every 2 seconds). (M-sequence signal) is transmitted by radio signal. When the identification signal transmission / reception unit 10 of another mobile terminal E that is paired receives the M-sequence data transmitted from the genuine mobile terminal B, the M-sequence stored in its own internal memory (for example, flash memory) Compare with the data. This comparison is performed, for example, by a coincidence / adder circuit, and as a result of the comparison, a numerical force pulse signal representing the number of bits that coincide in both M series data is output. If the number of matched bits is equal to or greater than a predetermined threshold (e.g. threshold for 31-bit M-sequence data, value 24) and the reception level of M-sequence data is equal to or higher than a predetermined value, in other words, authenticity If the mobile terminal B and another mobile terminal E paired with each other are within a predetermined range (for example, several meters), the identification signal transmission / reception unit 10 of the other mobile terminal E paired will respond to the call. An acknowledgment (ACK) and door lock device identification information (terminal identification information) IDe stored in the internal memory are transmitted by radio signals.

[0156] 一方、一致したビット数が所定のしきい値未満又は受信レベルが所定値未満である 場合には、対となる別の携帯端末 Eの識別信号送受信ユニット 10は、 ACK信号及 び端末識別情報 IDeを送信しな ヽ。  [0156] On the other hand, when the number of matched bits is less than a predetermined threshold value or the reception level is less than a predetermined value, the identification signal transmission / reception unit 10 of another portable terminal E that is paired with the ACK signal and the terminal Do not send IDe IDe.

[0157] 真正な携帯端末 Bの送信ユニット 10は、 ACK信号及び端末識別情報 IDeを受信 すると、受信した端末識別情報 IDeと自己の内部メモリ(例えばフラッシュメモリ)に記 憶された端末識別情報 IDeとを照合する (ステップ S51)。  [0157] Upon receiving the ACK signal and the terminal identification information IDe, the transmitting unit 10 of the authentic mobile terminal B receives the received terminal identification information IDe and the terminal identification information IDe stored in its own internal memory (for example, a flash memory). Are matched (step S51).

[0158] 照合の結果、両端末識別情報 IDeがー致して 、る場合には、携帯端末 Bの送信ュ ニット 10は、携帯端末 Eが自己と対をなす携帯端末であると認識し、自己の内部メモ リに記憶された携帯端末の識別情報 (端末識別情報) IDbと蓄積されて 、る行動履 歴を、対となる別の携帯端末 Eに送信する。一方、照合の結果、両端末識別情報 ID eがー致していない場合は、携帯端末 Eが自己と対をなす携帯端末ではないと認識 し、端末識別情報 IDb及び行動履歴を送信しない。  [0158] If both terminal identification information IDe is found as a result of the collation, the transmitting unit 10 of the mobile terminal B recognizes that the mobile terminal E is a mobile terminal paired with itself, and The mobile terminal identification information (terminal identification information) stored in the internal memory IDb and the action history accumulated are transmitted to another mobile terminal E as a pair. On the other hand, if the terminal identification information IDe is not correct as a result of the collation, the mobile terminal E recognizes that it is not a mobile terminal paired with itself, and does not transmit the terminal identification information IDb and the action history.

[0159] 対となる別の携帯端末 Eの送信ユニット 10は、携帯端末 Bから送信された端末識別 情報 IDbと行動履歴を受信すると、受信した端末識別情報 IDbと、自己の内部メモリ に記憶された端末識別情報 IDbとを照合する (ステップ S52)。  [0159] Upon receiving the terminal identification information IDb and the action history transmitted from the mobile terminal B, the transmission unit 10 of another mobile terminal E that is paired with the mobile terminal B stores the received terminal identification information IDb and its own internal memory. The terminal identification information IDb is checked (step S52).

[0160] 照合の結果、両端末識別情報 IDbがー致している場合には、対となる別の携帯端 末 Eの送信ユニット 10は、真正な携帯端末 Bからの信号であることを認識し、受信し た行動履歴を認証局 Dに転送する。一方、両端末識別情報 IDbがー致しない場合に は、真正な携帯端末 Bからの信号ではないと判断し、行動履歴は送信しない。  [0160] If the terminal identification information IDb is matched as a result of the collation, the transmitting unit 10 of another paired mobile terminal E recognizes that the signal is a genuine mobile terminal B signal. The received action history is transferred to Certificate Authority D. On the other hand, if both terminal identification information IDb does not match, it is determined that the signal is not a genuine mobile terminal B, and the action history is not transmitted.

[0161] 認証局 Dには、真正な携帯端末 Bとそれと対となる別の携帯端末 Eの対応テーブル を有しており、認証局 Dは、対となる別の携帯端末 Eからの行動履歴を受信すると、 対応テーブル力 真正な携帯端末 Bの行動履歴であると判断し、真正な携帯端末 B の行動履歴として蓄積する (ステップ S53)。 [0161] The certificate authority D has a correspondence table between the authentic mobile terminal B and another mobile terminal E paired with it. When the certificate authority D receives the action history from another paired mobile terminal E, the certificate authority D determines that the corresponding table power is the action history of the authentic mobile terminal B, and the authenticity of the authentic mobile terminal B Accumulated as an action history (step S53).

[0162] 対となる別の携帯端末 Eは、それ自体、真正な携帯端末として、上述した携帯端末 Bの機能と同様の機能を実行する端末であるので、携帯端末 Eも、その行動履歴を 認証局 Dに送信する必要がある。この場合、携帯端末 Eの対となる携帯端末には、携 帯端末 Bを選択されず、さらなる別の携帯端末が選択される。すなわち、行動履歴の 送信に関して、携帯端末 Bと携帯端末 Eは、互いに対となる関係にはならない。悪意 の第三者が携帯端末 Bのクローン装置の製作した場合、携帯端末 Eからの呼びかけ 信号をたまたま受信してしまうことで、対となる携帯端末を特定されるおそれがあるか らである。 [0162] Since another mobile terminal E as a pair itself is a genuine mobile terminal and performs the same function as the function of mobile terminal B described above, mobile terminal E also stores its action history. Must be sent to Certificate Authority D. In this case, the mobile terminal B is not selected as the mobile terminal that is paired with the mobile terminal E, and another mobile terminal is selected. In other words, mobile terminal B and mobile terminal E are not in a paired relationship with respect to the transmission of the action history. This is because when a malicious third party manufactures a clone device for mobile terminal B, the mobile terminal E may happen to receive a call signal from mobile terminal E, which may identify the paired mobile terminal.

[0163] また、対となる別の携帯端末 Eは、定期的に通信可能範囲に来ることが必要であり 、少なくとも 1日 1回程度通信が行われることが好ましいが、 1週間に一度、 1ヶ月に一 度でもかまわない。さらに、対となる別の携帯端末 Eが万が一特定されることを防ぐた めに、対となる別の携帯端末は、随時変更されることが好ましい。また、対となる別の 携帯端末は、他のユーザの携帯端末に限られず、例えば、自己が所有する別の通 信端末でもよい。例えば、自己の携帯端末の充電器に上記実施の形態の認証処理 を実行可能な通信機能を持たせるようにしてもょ ヽ。  [0163] Further, another mobile terminal E to be paired needs to come within a communicable range periodically, and it is preferable that communication is performed at least once a day, but once a week, 1 It does not matter even once a month. Furthermore, in order to prevent any other portable terminal E as a pair from being identified, it is preferable that the other portable terminal as a pair is changed as needed. Further, the other mobile terminal to be paired is not limited to the mobile terminal of another user, and may be, for example, another communication terminal owned by itself. For example, the charger of his / her portable terminal may be provided with a communication function capable of executing the authentication process of the above embodiment.

産業上の利用可能性  Industrial applicability

[0164] 本発明は、無線電波を用いて本人認証を行うワイヤレス認証システムに関し、セキ ユリティが必要な機器に対する本人認証手段として利用することができる。 The present invention relates to a wireless authentication system that performs personal authentication using radio waves, and can be used as a personal authentication means for a device that requires security.

[0165] 被制御機器のキーとなる携帯装置のクローン装置が作成され、不正使用されても、 被制御機器に対するアクセスを防止することができる。従って、本人認証を確実かつ 安全に行うことができる。 [0165] Even if a clone device of a portable device that is a key of the controlled device is created and used illegally, access to the controlled device can be prevented. Therefore, identity authentication can be performed reliably and safely.

Claims

請求の範囲  The scope of the claims [1] それぞれが無線信号の送受信機能を有する第一の通信装置と第二の通信装置間の ワイヤレス認証方法であって、  [1] A wireless authentication method between a first communication device and a second communication device each having a radio signal transmission / reception function, 前記第一の通信装置は、前記第二の通信装置からの送信信号レベルが所定値以上 であると判定し、前記第二の通信装置から前記第二の通信装置を識別する識別情 報を受信すると、当該受信した識別情報を前記第一の通信装置の内部記憶手段に 記憶された識別情報と照合して、前記第二の通信装置に対する第一の認証処理を 実施し、  The first communication device determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value, and receives identification information for identifying the second communication device from the second communication device. Then, the received identification information is collated with the identification information stored in the internal storage means of the first communication device, and the first authentication process for the second communication device is performed, 前記第一の通信装置は、前記第一の認証処理により、前記第二の通信装置の認証 に成功すると、前記識別情報を含む認証結果を遠隔の認証局に通知し、 前記認証局は、前記認証結果に含まれる前記識別情報を前記認証局の内部記憶 手段に記憶される識別情報と照合し、前記第二の通信装置に対する第二の認証処 理を実施し、  When the first communication device succeeds in the authentication of the second communication device by the first authentication process, the first communication device notifies the authentication result including the identification information to a remote certificate authority, and the certificate authority Collating the identification information included in the authentication result with the identification information stored in the internal storage means of the certificate authority, and performing a second authentication process on the second communication device; 前記認証局は、前記第二の認証処理により、前記第二の通信装置の認証に成功す ると、前記第一の通信装置に対して、前記第一の通信装置によって使用が制限され ている機器の使用制限を解除するための解除許可信号を送信し、  When the certificate authority succeeds in authenticating the second communication device by the second authentication process, the use of the first communication device is restricted by the first communication device. Send a release permission signal to release the device usage restriction, 前記第一の通信装置は、当該解除許可信号を受信すると、前記機器の使用制限を 解除することを特徴とするワイヤレス認証方法。  The wireless authentication method according to claim 1, wherein when the first communication device receives the release permission signal, the first communication device releases the use restriction of the device. [2] 請求項 1において、  [2] In claim 1, 前記第二の通信装置は、第三の通信装置力 の送信信号レベルが所定値以上であ ると判定し、前記第三の通信装置から前記第三の通信装置を識別する識別情報を 受信すると、当該受信した識別情報を前記第二の通信装置の内部記憶手段に記憶 された識別情報と照合して、前記第三の通信装置に対する第三の認証処理を実施し 前記第二の通信装置は、前記第三の認証処理により、前記第三の通信装置の認証 に成功している間のみ、前記第一の通信装置と通信可能であることを特徴とするワイ ャレス認証方法。  The second communication device determines that the transmission signal level of the third communication device power is equal to or higher than a predetermined value, and receives identification information identifying the third communication device from the third communication device. The received identification information is collated with the identification information stored in the internal storage means of the second communication device, and a third authentication process is performed on the third communication device. The wireless authentication method can communicate with the first communication device only while the third communication device is successfully authenticated by the third authentication process. [3] それぞれが無線信号の送受信機能を有する第一の通信装置と第二の通信装置間の ワイヤレス認証方法であって、 [3] Between a first communication device and a second communication device each having a wireless signal transmission / reception function A wireless authentication method, 前記第一の通信装置は、前記第二の通信装置からの送信信号レベルが所定値以上 であると判定し、前記第二の通信装置から前記第二の通信装置を識別する識別情 報を受信すると、当該受信した識別情報を前記第一の通信装置の内部記憶手段に 記憶された識別情報と照合して、前記第二の通信装置に対する第一の認証処理を 実施し、  The first communication device determines that the transmission signal level from the second communication device is equal to or higher than a predetermined value, and receives identification information for identifying the second communication device from the second communication device. Then, the received identification information is collated with the identification information stored in the internal storage means of the first communication device, and the first authentication process for the second communication device is performed, 前記第一の通信装置は、前記第一の認証処理により、前記第二の通信装置の認証 に成功すると、当該認証結果を遠隔の認証局に通知し、  When the first communication device succeeds in the authentication of the second communication device by the first authentication process, the first communication device notifies the remote authentication station of the authentication result, 前記認証局は、前記第二の通信装置に行動履歴情報を要求し、当該行動履歴情報 を前記第二の通信装置から受信すると、当該受信した行動履歴情報を前記認証局 の内部記憶手段に記憶された行動履歴情報と照合して、前記第二の通信装置に対 する第二の認証処理を実施し、  When the certificate authority requests action history information from the second communication device and receives the action history information from the second communication device, the certificate authority stores the received action history information in the internal storage unit of the certificate authority. A second authentication process is performed on the second communication device by collating with the action history information 前記認証局は、前記第二の認証処理により、前記第二の通信装置の認証に成功す ると、前記第一の通信装置に対して、前記第一の通信装置によって使用が制限され ている機器の使用制限を解除するための解除許可信号を送信し、  When the certificate authority succeeds in authenticating the second communication device by the second authentication process, the use of the first communication device is restricted by the first communication device. Send a release permission signal to release the device usage restriction, 前記第一の通信装置は、当該解除許可信号を受信すると、前記機器の使用制限を 解除することを特徴とするワイヤレス認証方法。  The wireless authentication method according to claim 1, wherein when the first communication device receives the release permission signal, the first communication device releases the use restriction of the device. [4] 請求項 3において、  [4] In claim 3, 前記第二の通信装置は、第三の通信装置力 の送信信号レベルが所定値以上であ ると判定し、前記第三の通信装置から前記第三の通信装置を識別する識別情報を 受信すると、当該受信した識別情報を前記第二の通信装置の内部記憶手段に記憶 された識別情報と照合して、前記第三の通信装置に対する第三の認証処理を実施し 前記第二の通信装置は、前記第三の認証処理により、前記第三の通信装置の認証 に成功している間のみ、前記第一の通信装置と通信可能であることを特徴とするワイ ャレス認証方法。  The second communication device determines that the transmission signal level of the third communication device power is equal to or higher than a predetermined value, and receives identification information identifying the third communication device from the third communication device. The received identification information is collated with the identification information stored in the internal storage means of the second communication device, and a third authentication process is performed on the third communication device. The wireless authentication method can communicate with the first communication device only while the third communication device is successfully authenticated by the third authentication process. [5] それぞれが無線信号の送受信機能を有する第一の通信装置と第二の通信装置間の ワイヤレス認証方法であって、前記第一の通信装置にお 、て、 前記第二の通信装置からの送信信号レベルが所定値以上であると判定し、前記第 二の通信装置から前記第二の通信装置を識別する識別情報を受信すると、当該受 信した識別情報を前記第一の通信装置の内部記憶手段に記憶された識別情報と照 合して、前記第二の通信装置に対する第一の認証処理を実施し、 [5] A wireless authentication method between a first communication device and a second communication device each having a wireless signal transmission / reception function, wherein the first communication device includes: When it is determined that the transmission signal level from the second communication device is equal to or higher than a predetermined value and the identification information for identifying the second communication device is received from the second communication device, the received identification information is In comparison with the identification information stored in the internal storage means of the first communication device, the first authentication process for the second communication device is performed, 前記第一の認証処理により、前記第二の通信装置の認証に成功した後、さらに、前 記第二の通信装置の行動履歴情報を前記第二の通信装置から受信し、当該受信し た行動履歴情報を前記内部記憶手段に記憶された行動履歴情報と照合して、前記 第二の通信装置に対する第二の認証処理を実施し、  After successful authentication of the second communication device by the first authentication process, the behavior history information of the second communication device is further received from the second communication device, and the received behavior is Collating history information with action history information stored in the internal storage means, and performing a second authentication process for the second communication device, 前記第二の認証処理により、前記第二の通信装置の認証に成功すると、前記第一の 通信装置によって使用が制限されている機器の使用制限を解除することを特徴とす るワイヤレス認証方法。  A wireless authentication method, wherein when the second communication device is successfully authenticated by the second authentication process, the use restriction of the device whose use is restricted by the first communication device is released. [6] 請求項 5において、  [6] In claim 5, 前記第二の通信装置は、第三の通信装置力 の送信信号レベルが所定値以上であ ると判定し、前記第三の通信装置から前記第三の通信装置を識別する識別情報を 受信すると、当該受信した識別情報を前記第二の通信装置の内部記憶手段に記憶 された識別情報と照合して、前記第三の通信装置に対する第三の認証処理を実施し 前記第二の通信装置は、前記第三の認証処理により、前記第三の通信装置の認証 に成功している間のみ、前記第一の通信装置と通信可能であることを特徴とするワイ ャレス認証方法。  The second communication device determines that the transmission signal level of the third communication device power is equal to or higher than a predetermined value, and receives identification information identifying the third communication device from the third communication device. The received identification information is collated with the identification information stored in the internal storage means of the second communication device, and a third authentication process is performed on the third communication device. The wireless authentication method can communicate with the first communication device only while the third communication device is successfully authenticated by the third authentication process. [7] 請求項 3乃至 6のいずれかにおいて、 [7] In any one of claims 3 to 6, 前記行動履歴情報は、前記第二の通信装置の第一の通信装置との通信に関する 履歴情報を有することを特徴とするワイヤレス認証方法。  The wireless authentication method, wherein the action history information includes history information related to communication of the second communication device with a first communication device. [8] 請求項 3乃至 6のいずれかにおいて、 [8] In any one of claims 3 to 6, 前記行動履歴情報は、前記第二の通信装置が第一の通信装置と通信を行った時 刻又は位置の少なくとも一方を含む情報であることを特徴とするワイヤレス認証方法  The wireless history authentication method, wherein the action history information is information including at least one of a time and a position when the second communication device communicates with the first communication device. [9] 請求項 3又は 4において、 前記第二の通信装置は、所定のタイミングで前記行動履歴情報を作成し、前記第二 の通信装置の内部記憶手段に記憶させるとともに、当該作成した行動履歴情報を前 記認証局に送信し、 [9] In claim 3 or 4, The second communication device creates the action history information at a predetermined timing, stores the action history information in the internal storage unit of the second communication device, and transmits the created action history information to the certificate authority. 前記認証局は、前記行動履歴情報を受信すると、前記認証局の内部記憶手段に記 憶させることを特徴とするワイヤレス認証方法。  When the certificate authority receives the action history information, the certificate authority stores the action history information in an internal storage unit of the certificate authority. [10] 請求項 3又は 4において、  [10] In claim 3 or 4, 前記行動履歴情報は、前記第二の通信装置の第一の通信装置との通信に関する履 歴情報を有し、  The action history information includes history information related to communication of the second communication device with the first communication device, 前記第二の通信装置は、前記第一の通信装置との通信に関する第一の行動履歴情 報を作成し、前記第二の通信装置の内部記憶手段に記憶させるとともに、当該作成 した第一の行動履歴情報を前記認証局に送信し、  The second communication device creates first action history information related to communication with the first communication device, stores the first action history information in the internal storage unit of the second communication device, and creates the created first Send action history information to the certificate authority, 前記第一の通信装置は、前記第二の通信装置との通信に関する第二の行動履歴情 報を作成し、前記第一の通信装置の内部記憶手段に記憶させるとともに、当該作成 した第二の行動履歴情報を前記認証局に送信し、  The first communication device creates second action history information related to communication with the second communication device, stores the second action history information in the internal storage unit of the first communication device, and creates the second Send action history information to the certificate authority, 前記認証局は、前記第一の行動履歴情報と前記第二の行動履歴情報を受信すると 、両情報が一致しているか否力判定し、一致している場合、前記第一の行動履歴情 報又は前記第二の行動履歴情報を前記認証局の内部記憶手段に記憶させることを 特徴とするワイヤレス認証方法。  When the certificate authority receives the first action history information and the second action history information, the certificate authority determines whether or not both pieces of information match, and if they match, the first action history information Alternatively, the second action history information is stored in an internal storage unit of the certificate authority. [11] 請求項 3又は 4において、 [11] In claim 3 or 4, 前記行動履歴情報は、前記第二の通信装置の第一の通信装置との通信に関する履 歴情報を有し、  The action history information includes history information related to communication of the second communication device with the first communication device, 前記第一の通信装置は、前記第二の通信装置との通信に関する行動履歴情報を作 成し、前記第一の通信装置の内部記憶手段に記憶させるとともに、当該作成した行 動履歴情報を前記認証局に送信し、  The first communication device creates action history information related to communication with the second communication device, stores the action history information in an internal storage unit of the first communication device, and stores the created action history information in the first communication device. To the certificate authority, 前記認証局は、前記行動履歴情報を受信すると、前記認証局の内部記憶手段に記 憶させることを特徴とするワイヤレス認証方法。  When the certificate authority receives the action history information, the certificate authority stores the action history information in an internal storage unit of the certificate authority. [12] 請求項 5又は 6において、 [12] In claim 5 or 6, 前記第二の通信装置は、前記第一の通信装置との通信に関する行動履歴情報を 作成し、当該行動履歴情報を前記第二の通信装置の内部記憶手段に記憶させ、 前記第一の通信装置は、前記第二の通信装置が作成する行動履歴情報と対応す る情報を含む前記第二の通信装置との通信に関する行動履歴情報を作成し、当該 行動履歴情報を前記第一の通信装置の内部記憶手段に記憶させることを特徴とす るワイヤレス認証方法。 The second communication device stores action history information related to communication with the first communication device. Creating and storing the action history information in the internal storage means of the second communication device, wherein the first communication device includes information corresponding to the action history information created by the second communication device. A wireless authentication method, characterized in that action history information relating to communication with a second communication device is created, and the action history information is stored in an internal storage unit of the first communication device. [13] 請求項 3又は 4において、  [13] In claim 3 or 4, 前記第二の通信装置は、所定のタイミングで前記行動履歴情報を作成し、別の通信 装置力 の送信信号レベルが所定値以上であると判定すると、当該作成した行動履 歴情報を前記別の通信装置に送信し、  When the second communication device creates the behavior history information at a predetermined timing and determines that the transmission signal level of another communication device power is equal to or higher than a predetermined value, the second communication device transmits the created behavior history information to the another communication history information. To the communication device, 前記別の通信装置は、受信した行動履歴情報を前記認証局に転送し、  The another communication device transfers the received action history information to the certificate authority, 前記認証局は、受信した行動履歴情報を前記第二の通信装置の行動履歴情報とし て前記認証局の内部記憶手段に記憶させることを特徴とするワイヤレス認証方法。  The certificate authority stores the received action history information as action history information of the second communication device in an internal storage unit of the certificate authority. [14] 第一の通信装置、第二の通信装置及び認証局を有するワイヤレス認証システムであ つて、 [14] A wireless authentication system having a first communication device, a second communication device, and a certificate authority, 前記第一の通信装置は、  The first communication device is: 前記第二の通信装置からの送信信号レベルが所定値以上であるか否かを判定する 第一の判定手段と、  First determination means for determining whether or not a transmission signal level from the second communication device is equal to or higher than a predetermined value; 前記第二の通信装置を識別する識別情報を前記第二の通信装置から受信する第一 の受信手段と、  First receiving means for receiving identification information for identifying the second communication device from the second communication device; あらかじめ前記第二の通信装置の識別情報を記憶している第一の記憶手段と、 前記第一の判定手段が所定値以上であると判定した場合に、当該受信した識別情 報を前記第一の記憶手段に記憶された識別情報と照合して、前記第二の通信装置 に対する認証処理を実施する第一の認証手段と、  When the first storage unit that stores the identification information of the second communication device in advance and the first determination unit determines that the value is equal to or greater than a predetermined value, the received identification information is First authentication means for performing authentication processing for the second communication device in comparison with the identification information stored in the storage means, 前記第一の認証手段による前記第二の通信装置の認証に成功すると、前記識別情 報を含む認証結果を前記認証局に通知する第一の送信手段と、  A first transmission unit for notifying the certification authority of an authentication result including the identification information when the second communication device is successfully authenticated by the first authentication unit; を有し、  Have 前記第二の通信装置は、  The second communication device is あらかじめ前記第二の通信装置の識別情報を記憶している第二の記憶手段と、 前記識別情報を前記第一の通信装置に送信する第二の送信手段を有し、 前記認証局は、 Second storage means for storing identification information of the second communication device in advance; A second transmission unit configured to transmit the identification information to the first communication device; あらかじめ前記第二の通信装置の識別情報を記憶している認証局記憶手段と、 前記認証結果に含まれる前記識別情報を前記認証局記憶手段に記憶される識別情 報と照合し、前記第二の通信装置に対する認証処理を実施する認証局認証手段と、 前記認証局手段による前記第二の通信装置の認証に成功すると、前記第一の通信 装置に対して、前記第一の通信装置によって使用が制限されている機器の使用制 限を解除するための解除許可信号を送信する認証局送信手段とを有し、 前記第一の通信装置は、さらに、当該解除許可信号を受信すると、前記機器の使用 制限を解除する第一の解除手段を有することを特徴とするワイヤレス認証システム。  A certificate authority storage unit that stores identification information of the second communication device in advance; and the identification information included in the authentication result is collated with the identification information stored in the certificate authority storage unit; A certificate authority authenticating means for performing an authentication process on the communication apparatus; and when the second communication apparatus is successfully authenticated by the certificate authority means, the first communication apparatus uses the first communication apparatus. And a certificate authority transmitting means for transmitting a release permission signal for releasing the use restriction of the device for which the device is restricted, and the first communication device further receives the release permission signal, and receives the release permission signal. A wireless authentication system comprising a first releasing means for releasing the restriction. [15] 請求項 14において、  [15] In claim 14, さらに、第三の通信装置を備え、  Furthermore, a third communication device is provided, 前記第三の通信装置は、  The third communication device is: あらかじめ前記第三の通信装置の識別情報を記憶している第三の記憶手段と、 前記識別情報を前記第二の通信装置に送信する第三の送信手段とを有し、 前記第二の通信装置は、さらに、  A third storage means for storing the identification information of the third communication device in advance; a third transmission means for transmitting the identification information to the second communication device; The device further 前記第三の通信装置からの送信信号レベルが所定値以上であるか否かを判定する 第二の判定手段と、  Second determination means for determining whether or not a transmission signal level from the third communication device is equal to or higher than a predetermined value; 前記第三の通信装置を識別する識別情報を前記第三の通信装置から受信する第四 の受信手段と、  A fourth receiving means for receiving identification information for identifying the third communication device from the third communication device; あらかじめ前記第三の通信装置の識別情報を記憶している第四の記憶手段と、 前記第二の判定手段が所定値以上であると判定した場合に、前記受信した識別情 報を前記第四の記憶手段に記憶された識別情報と照合して、前記第三の通信装置 に対する認証処理を実施する第二の認証手段と、  A fourth storage means for storing the identification information of the third communication device in advance; and if the second determination means is determined to be greater than or equal to a predetermined value, the received identification information is received as the fourth identification information. A second authentication means for performing authentication processing on the third communication device by collating with the identification information stored in the storage means; 前記第二の認証手段による前記第三の通信装置の認証に成功している間のみ、前 記第一の通信装置との通信制限を解除する第二の解除手段とを有することを特徴と するワイヤレス認証システム。  And a second canceling unit that cancels the restriction on communication with the first communication device only while the authentication of the third communication device by the second authentication unit is successful. Wireless authentication system. [16] 第一の通信装置、第二の通信装置及び認証局を有するワイヤレス認証システムであ つて、 [16] A wireless authentication system having a first communication device, a second communication device, and a certificate authority About 前記第一の通信装置は、 The first communication device is: 前記第二の通信装置からの送信信号レベルが所定値以上であるか否かを判定する 第一の判定手段と、 First determination means for determining whether or not a transmission signal level from the second communication device is equal to or higher than a predetermined value; 前記第二の通信装置を識別する識別情報を前記第二の通信装置から受信する第一 の受信手段と、 First receiving means for receiving identification information for identifying the second communication device from the second communication device; あらかじめ前記第二の通信装置の識別情報を記憶している第一の記憶手段と、 前記第一の判定手段が所定値以上であると判定した場合に、当該受信した識別情 報を前記第一の記憶手段に記憶された識別情報と照合して、前記第二の通信装置 に対する認証処理を実施する第一の認証手段と、 When the first storage unit that stores the identification information of the second communication device in advance and the first determination unit determines that the value is equal to or greater than a predetermined value, the received identification information is First authentication means for performing authentication processing for the second communication device in comparison with the identification information stored in the storage means, 前記第一の認証手段による前記第二の通信装置の認証に成功すると、前記識別情 報を含む認証結果を前記認証局に通知する第一の送信手段とを有し、 A first transmission means for notifying the certificate authority of an authentication result including the identification information when the second communication device is successfully authenticated by the first authentication means; 前記第二の通信装置は、 The second communication device is 前記第二の通信装置の識別情報と前記第二の通信装置の行動履歴情報を記憶す る第二の記憶手段と、 Second storage means for storing identification information of the second communication device and action history information of the second communication device; 前記識別情報を前記第一の通信装置に送信し、前記行動履歴情報を前記認証局 に送信する第二の送信手段を有し、 A second transmission means for transmitting the identification information to the first communication device and transmitting the action history information to the certificate authority; 肯 IJ記認証局は、 The IJ certificate authority あらかじめ前記第二の通信装置の行動履歴情報を記憶している認証局記憶手段と、 前記第二の通信装置に行動履歴情報を要求し、当該行動履歴情報を前記第二の 通信装置から受信すると、当該受信した行動履歴情報を前記認証局記憶手段に記 憶された行動履歴情報と照合して、前記第二の通信装置に対する認証処理を実施 する認証局認証手段と、 A certificate authority storage unit that stores action history information of the second communication device in advance; and requesting action history information from the second communication device, and receiving the action history information from the second communication device. A certificate authority authenticating means for performing authentication processing on the second communication device by comparing the received action history information with the action history information stored in the certificate authority storage means; 前記認証局認証手段による前記第二の通信装置の認証に成功すると、前記第一の 通信装置に対して、前記第一の通信装置によって使用が制限されている機器の使 用制限を解除するための解除許可信号を送信する認証局送信手段とを有し、 前記第一の通信装置は、当該解除許可信号を受信すると、前記機器の使用制限を 解除する第一の解除手段をさらに有することを特徴とするワイヤレス認証システム。 [17] 請求項 16において、 When the authentication of the second communication device by the certificate authority authentication means is successful, the use restriction of the device whose use is restricted by the first communication device is removed from the first communication device. A certificate authority transmitting means for transmitting the release permission signal, and the first communication device further comprises a first release means for releasing the restriction on use of the device when the release permission signal is received. A featured wireless authentication system. [17] In claim 16, さらに、第三の通信装置を備え、  Furthermore, a third communication device is provided, 前記第三の通信装置は、  The third communication device is: あらかじめ前記第三の通信装置の識別情報を記憶している第三の記憶手段と、 前記識別情報を前記第二の通信装置に送信する第三の送信手段とを有し、 前記第二の通信装置は、さらに、  A third storage means for storing the identification information of the third communication device in advance; a third transmission means for transmitting the identification information to the second communication device; The device further 前記第三の通信装置からの送信信号レベルが所定値以上であるか否かを判定する 第二の判定手段と、  Second determination means for determining whether or not a transmission signal level from the third communication device is equal to or higher than a predetermined value; 前記第三の通信装置を識別する識別情報を前記第三の通信装置から受信する第四 の受信手段と、  A fourth receiving means for receiving identification information for identifying the third communication device from the third communication device; あらかじめ前記第三の通信装置の識別情報を記憶している第四の記憶手段と、 前記第二の判定手段が所定値以上であると判定した場合に、前記受信した識別情 報を前記第四の記憶手段に記憶された識別情報と照合して、前記第三の通信装置 に対する認証処理を実施する第二の認証手段と、  A fourth storage means for storing the identification information of the third communication device in advance; and if the second determination means is determined to be greater than or equal to a predetermined value, the received identification information is received as the fourth identification information. A second authentication means for performing authentication processing on the third communication device by collating with the identification information stored in the storage means; 前記第二の認証手段による前記第三の通信装置の認証に成功している間のみ、前 記第一の通信装置との通信制限を解除する第二の解除手段とを有することを特徴と するワイヤレス認証システム。  And a second canceling unit that cancels the restriction on communication with the first communication device only while the authentication of the third communication device by the second authentication unit is successful. Wireless authentication system. [18] 第一の通信装置と第二の通信装置とを備えるワイヤレス認証システムであって、 前記第一の通信装置は、 [18] A wireless authentication system comprising a first communication device and a second communication device, wherein the first communication device comprises: 前記第二の通信装置からの送信信号レベルが所定値以上であるか否かを判定する 第一の判定手段と、  First determination means for determining whether or not a transmission signal level from the second communication device is equal to or higher than a predetermined value; 前記第二の通信装置を識別する識別情報を前記第二の通信装置から受信する第一 の受信手段と、  First receiving means for receiving identification information for identifying the second communication device from the second communication device; あらかじめ前記第二の通信装置の識別情報及び行動履歴情報を記憶している第一 の記憶手段と、  First storage means for storing identification information and action history information of the second communication device in advance; 前記第一の判定手段が所定値以上であると判定した場合に、当該受信した識別情 報を前記第一の記憶手段に記憶された識別情報と照合して、前記第二の通信装置 に対する認証処理を実施し、当該認証による前記第二の通信装置の認証に成功し た後、さらに、前記第二の通信装置の行動履歴情報を前記第二の通信装置から受 信し、当該受信した行動履歴情報を前記第一の記憶手段に記憶された行動履歴情 報と照合して、前記第二の通信装置に対する別の認証処理を実施する第一の認証 手段と、 When the first determination unit determines that the value is equal to or greater than a predetermined value, the received identification information is collated with the identification information stored in the first storage unit to authenticate the second communication device. And successfully authenticate the second communication device by the authentication. Thereafter, the behavior history information of the second communication device is received from the second communication device, and the received behavior history information is collated with the behavior history information stored in the first storage means. A first authentication means for performing another authentication process for the second communication device; 前記第一の認証手段による前記第二の通信装置に対する当該別の認証に成功する と、前記第一の通信装置によって使用が制限されている機器の使用制限を解除する 第一の解除手段とを有し、 When the second authentication to the second communication device is successfully performed by the first authentication means, the use restriction of the device whose use is restricted by the first communication device is canceled. Have 前記第二の通信装置は、 The second communication device is 前記第二の通信装置の識別情報と前記第二の通信装置の行動履歴情報を記憶す る第二の記憶手段と、 Second storage means for storing identification information of the second communication device and action history information of the second communication device; 前記識別情報を前記第一の通信装置に送信する第二の送信手段とを有することを 特徴とするワイヤレス認証システム。 A wireless authentication system comprising: a second transmission unit configured to transmit the identification information to the first communication device. 請求項 18において、  In claim 18, さらに、第三の通信装置を備え、  Furthermore, a third communication device is provided, 前記第三の通信装置は、  The third communication device is: あらかじめ前記第三の通信装置の識別情報を記憶している第三の記憶手段と、 前記識別情報を前記第二の通信装置に送信する第三の送信手段とを有し、 前記第二の通信装置は、さらに、 A third storage means for storing the identification information of the third communication device in advance; a third transmission means for transmitting the identification information to the second communication device; The device further 前記第三の通信装置からの送信信号レベルが所定値以上であるか否かを判定する 第二の判定手段と、 Second determination means for determining whether or not a transmission signal level from the third communication device is equal to or higher than a predetermined value; 前記第三の通信装置を識別する識別情報を前記第三の通信装置から受信する第四 の受信手段と、 A fourth receiving means for receiving identification information for identifying the third communication device from the third communication device; あらかじめ前記第三の通信装置の識別情報を記憶している第四の記憶手段と、 前記第二の判定手段が所定値以上であると判定した場合に、前記受信した識別情 報を前記第四の記憶手段に記憶された識別情報と照合して、前記第三の通信装置 に対する認証処理を実施する第二の認証手段と、 A fourth storage means for storing the identification information of the third communication device in advance; and if the second determination means is determined to be greater than or equal to a predetermined value, the received identification information is received as the fourth identification information. A second authentication means for performing authentication processing on the third communication device by collating with the identification information stored in the storage means; 前記第二の認証手段による前記第三の通信装置の認証に成功している間のみ、前 記第一の通信装置との通信制限を解除する第二の解除手段とを有することを特徴と するワイヤレス認証システム。 And a second release means for releasing the restriction on communication with the first communication device only while the authentication of the third communication device by the second authentication means is successful. Wireless authentication system. [20] 請求項 16乃至 19のいずれかにおいて、  [20] In any one of claims 16 to 19, 前記行動履歴情報は、前記第二の通信装置の第一の通信装置との通信に関する 履歴情報を有することを特徴とするワイヤレス認証システム。  The wireless authentication system, wherein the action history information includes history information related to communication of the second communication device with a first communication device. [21] 請求項 16乃至 19のいずれかにおいて、 [21] In any one of claims 16 to 19, 前記行動履歴情報は、前記第二の通信装置が第一の通信装置と通信を行った時 刻又は位置の少なくとも一方を含む情報であることを特徴とするワイヤレス認証シス テム。  The wireless history authentication system, wherein the action history information is information including at least one of a time and a position when the second communication device communicates with the first communication device. [22] 請求項 16又は 17において、  [22] In claim 16 or 17, 前記第二の通信装置は、所定のタイミングで前記行動履歴情報を作成し、前記第二 の記憶手段に記憶させるとともに、当該作成した行動履歴情報を前記認証局に送信 し、  The second communication device creates the action history information at a predetermined timing, stores the action history information in the second storage unit, and transmits the created action history information to the certificate authority. 前記認証局は、前記行動履歴情報を受信すると、前記認証局記憶手段に記憶させ ることを特徴とするワイヤレス認証システム。  When the certificate authority receives the action history information, the certificate authority is stored in the certificate authority storage unit. [23] 請求項 16又は 17において、 [23] In claim 16 or 17, 前記行動履歴情報は、前記第二の通信装置の第一の通信装置との通信に関する履 歴情報を有し、  The action history information includes history information related to communication of the second communication device with the first communication device, 前記第二の通信装置は、前記第一の通信装置との通信に関する第一の行動履歴情 報を作成し、前記第二の通信装置の内部記憶手段に記憶させるとともに、当該作成 した第一の行動履歴情報を前記認証局に送信し、  The second communication device creates first action history information related to communication with the first communication device, stores the first action history information in the internal storage unit of the second communication device, and creates the created first Send action history information to the certificate authority, 前記第一の通信装置は、前記第二の通信装置との通信に関する第二の行動履歴情 報を作成し、前記第一の通信装置の内部記憶手段に記憶させるとともに、当該作成 した第二の行動履歴情報を前記認証局に送信し、  The first communication device creates second action history information related to communication with the second communication device, stores the second action history information in the internal storage unit of the first communication device, and creates the second Send action history information to the certificate authority, 前記認証局は、前記第一の行動履歴情報と前記第二の行動履歴情報を受信すると 、両情報が一致しているか否力判定し、一致している場合、前記第一の行動履歴情 報又は前記第二の行動履歴情報を前記認証局記憶手段に記憶させることを特徴と するワイヤレス認証システム。  When the certificate authority receives the first action history information and the second action history information, the certificate authority determines whether or not both pieces of information match, and if they match, the first action history information Alternatively, a wireless authentication system, wherein the second action history information is stored in the certificate authority storage means. [24] 請求項 16又は 17において、 前記行動履歴情報は、前記第二の通信装置の第一の通信装置との通信に関する履 歴情報を有し、 [24] In claim 16 or 17, The action history information includes history information related to communication of the second communication device with the first communication device, 前記第一の通信装置は、前記第二の通信装置との通信に関する行動履歴情報を作 成し、前記第一の通信装置の内部記憶手段に記憶させるとともに、当該作成した行 動履歴情報を前記認証局に送信し、  The first communication device creates action history information related to communication with the second communication device, stores the action history information in an internal storage unit of the first communication device, and stores the created action history information in the first communication device. To the certificate authority, 前記認証局は、前記行動履歴情報を受信すると、前記認証局記憶手段に記憶させ ることを特徴とするワイヤレス認証システム。  When the certificate authority receives the action history information, the certificate authority is stored in the certificate authority storage unit. [25] 請求項 18又は 19において、  [25] In claim 18 or 19, 前記第二の通信装置は、前記第一の通信装置との通信に関する行動履歴情報を 作成し、当該行動履歴情報を前記第二の記憶手段に記憶させ、  The second communication device creates action history information related to communication with the first communication device, stores the action history information in the second storage means, 前記第一の通信装置は、前記第二の通信装置が作成する行動履歴情報と対応す る情報を含む前記第二の通信装置との通信に関する行動履歴情報を作成し、当該 行動履歴情報を前記第一の記憶手段に記憶させることを特徴とするワイヤレス認証 システム。  The first communication device creates behavior history information related to communication with the second communication device including information corresponding to the behavior history information created by the second communication device, and the behavior history information is stored in the behavior history information. A wireless authentication system, characterized by being stored in a first storage means. [26] 請求項 16又は 17において、 [26] In claim 16 or 17, 前記第二の通信装置は、所定のタイミングで前記行動履歴情報を作成し、別の通信 装置力 の送信信号レベルが所定値以上であると判定すると、当該作成した行動履 歴情報を前記別の通信装置に送信し、  When the second communication device creates the behavior history information at a predetermined timing and determines that the transmission signal level of another communication device power is equal to or higher than a predetermined value, the second communication device transmits the created behavior history information to the another communication history information. To the communication device, 前記別の通信装置は、受信した行動履歴情報を前記認証局に転送し、  The another communication device transfers the received action history information to the certificate authority, 前記認証局は、受信した行動履歴情報を前記第二の通信装置の行動履歴情報とし て前記認証局記憶手段に記憶させることを特徴とするワイヤレス認証システム。  The wireless certification system, wherein the certification authority stores the received behavior history information in the certification authority storage unit as behavior history information of the second communication device.
PCT/JP2004/014747 2004-10-06 2004-10-06 Wireless authenticating method and wireless authenticating system Ceased WO2006038290A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2006539114A JPWO2006038290A1 (en) 2004-10-06 2004-10-06 Wireless authentication method and wireless authentication system
PCT/JP2004/014747 WO2006038290A1 (en) 2004-10-06 2004-10-06 Wireless authenticating method and wireless authenticating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/014747 WO2006038290A1 (en) 2004-10-06 2004-10-06 Wireless authenticating method and wireless authenticating system

Publications (1)

Publication Number Publication Date
WO2006038290A1 true WO2006038290A1 (en) 2006-04-13

Family

ID=36142380

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2004/014747 Ceased WO2006038290A1 (en) 2004-10-06 2004-10-06 Wireless authenticating method and wireless authenticating system

Country Status (2)

Country Link
JP (1) JPWO2006038290A1 (en)
WO (1) WO2006038290A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009081488A (en) * 2007-09-25 2009-04-16 Panasonic Corp Authentication object apparatus, portable radio apparatus, authentication control method, and program
JP2009169894A (en) * 2008-01-21 2009-07-30 Katsuyoshi Nagashima Computer server authentication center, portable terminal, and method for transmitting authentication content from computer server authentication center
US7924139B2 (en) 2005-02-25 2011-04-12 Shionoya Yasuo Wireless authentication method and wireless authentication system
JP2014032667A (en) * 2012-07-31 2014-02-20 Dr Ing Hcf Porsche Ag Method and system for authenticating user in remote access to at least one automobile system of automobile
JP2015076018A (en) * 2013-10-10 2015-04-20 株式会社オートネットワーク技術研究所 Communication system and verification method
US9270123B2 (en) 2010-08-30 2016-02-23 Sony Corporation Wireless power feeding system
JP2017076325A (en) * 2015-10-16 2017-04-20 株式会社デンソー Transmitter management system
US9641502B2 (en) 2009-01-23 2017-05-02 Microsoft Technology Licensing, Llc Passive security enforcement
US10834533B2 (en) 2017-03-27 2020-11-10 Lac Co., Ltd. Processing device, processing method, and program
JP2021064254A (en) * 2019-10-16 2021-04-22 日本電気通信システム株式会社 Management system and authentication information providing method
WO2023157385A1 (en) * 2022-02-15 2023-08-24 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Information processing method, information processing device, and control program

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5576213B2 (en) * 2010-08-25 2014-08-20 株式会社東海理化電機製作所 Security system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001358827A (en) * 2000-06-16 2001-12-26 Mitsubishi Electric Corp Terminal use authentication method, authentication card and mobile terminal
JP2002271874A (en) * 2001-03-09 2002-09-20 Sharp Corp Data communication system and terminal network controller
WO2003058936A1 (en) * 2001-12-28 2003-07-17 Super Wave Co., Ltd. Wireless authentication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003160209A (en) * 2001-11-27 2003-06-03 Nippon Telegr & Teleph Corp <Ntt> Article management system and method, article management program, and recording medium recording the program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001358827A (en) * 2000-06-16 2001-12-26 Mitsubishi Electric Corp Terminal use authentication method, authentication card and mobile terminal
JP2002271874A (en) * 2001-03-09 2002-09-20 Sharp Corp Data communication system and terminal network controller
WO2003058936A1 (en) * 2001-12-28 2003-07-17 Super Wave Co., Ltd. Wireless authentication system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7924139B2 (en) 2005-02-25 2011-04-12 Shionoya Yasuo Wireless authentication method and wireless authentication system
JP2009081488A (en) * 2007-09-25 2009-04-16 Panasonic Corp Authentication object apparatus, portable radio apparatus, authentication control method, and program
JP2009169894A (en) * 2008-01-21 2009-07-30 Katsuyoshi Nagashima Computer server authentication center, portable terminal, and method for transmitting authentication content from computer server authentication center
US10389712B2 (en) 2009-01-23 2019-08-20 Microsoft Technology Licensing, Llc Passive security enforcement
US9641502B2 (en) 2009-01-23 2017-05-02 Microsoft Technology Licensing, Llc Passive security enforcement
US9270123B2 (en) 2010-08-30 2016-02-23 Sony Corporation Wireless power feeding system
JP2014032667A (en) * 2012-07-31 2014-02-20 Dr Ing Hcf Porsche Ag Method and system for authenticating user in remote access to at least one automobile system of automobile
JP2015076018A (en) * 2013-10-10 2015-04-20 株式会社オートネットワーク技術研究所 Communication system and verification method
JP2017076325A (en) * 2015-10-16 2017-04-20 株式会社デンソー Transmitter management system
US10834533B2 (en) 2017-03-27 2020-11-10 Lac Co., Ltd. Processing device, processing method, and program
JP2021064254A (en) * 2019-10-16 2021-04-22 日本電気通信システム株式会社 Management system and authentication information providing method
JP7343164B2 (en) 2019-10-16 2023-09-12 日本電気通信システム株式会社 Management system and authentication information provision method
WO2023157385A1 (en) * 2022-02-15 2023-08-24 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Information processing method, information processing device, and control program

Also Published As

Publication number Publication date
JPWO2006038290A1 (en) 2008-05-15

Similar Documents

Publication Publication Date Title
JP4848360B2 (en) Wireless authentication method and wireless authentication system
US9848288B2 (en) Bluetooth pairing system, method, and apparatus
US12024122B2 (en) Method and device for authenticating a user to a transportation vehicle
JP4524306B2 (en) Authorization method
US7882541B2 (en) Authentication system in information processing terminal using mobile information processing device
CN101315710B (en) Mobile based identification in security and asset management systems
WO2006038290A1 (en) Wireless authenticating method and wireless authenticating system
US20060149971A1 (en) Apparatus, method, and system to determine identity and location of a user with an acoustic signal generator coupled into a user-authenticating fingerprint sensor
JP2012028854A (en) Portable device
WO2021200421A1 (en) Communication system and communication method
JP2006060392A (en) Unauthorized-use preventive system and identification method for information terminal device
JP6702840B2 (en) Wireless communication correctness determination system
JP5104292B2 (en) Authentication apparatus, authentication method, and program
JP2006053808A (en) Worker authentication management system
JP5584071B2 (en) Electronic key system
JP2012028853A (en) Portable device
JP2013149022A (en) Computer system for performing access authority control
JP2018026141A (en) Information processing apparatus, information processing method, and computer program
JP2005350926A (en) Security system and security setting canceling method
KR100872391B1 (en) Authentication method
Larsen Secure access control using mobile bluetooth devices
JP2009169894A (en) Computer server authentication center, portable terminal, and method for transmitting authentication content from computer server authentication center
CN116964648A (en) Method and apparatus for providing authorization to access a vehicle
JP2017155420A (en) Unauthorized communication establishment prevention system
WO2004029818A1 (en) Authentication system and authentication method therefor

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006539114

Country of ref document: JP

122 Ep: pct application non-entry in european phase