WO2002086808A1 - Systeme et procede de protection d'informations - Google Patents
Systeme et procede de protection d'informations Download PDFInfo
- Publication number
- WO2002086808A1 WO2002086808A1 PCT/JP2002/003789 JP0203789W WO02086808A1 WO 2002086808 A1 WO2002086808 A1 WO 2002086808A1 JP 0203789 W JP0203789 W JP 0203789W WO 02086808 A1 WO02086808 A1 WO 02086808A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- assembly
- authentication
- protection system
- protected
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
Definitions
- the present invention relates to an information protection technology using wireless communication.
- multi-purpose IC cards can be integrated into mobile terminals such as mobile phones, PHS, personal digital assistants (PDAs), and notebook PCs, multiple IC card functions can be installed, or mechanisms that can be installed (such as IC cards).
- mobile terminals such as mobile phones, PHS, personal digital assistants (PDAs), and notebook PCs
- multiple IC card functions can be installed, or mechanisms that can be installed (such as IC cards).
- Providing software for executing functions in a form that can be downloaded to a predetermined server, etc., and downloading the software, or mounting a card-specific chip equipped with such software, etc. ) Is being studied to provide security measures for this terminal.
- Ic cards There are two main types of Ic cards: contact type and non-contact type. To use the data recorded on the card, a dedicated terminal is used for the contact type (hereinafter referred to as “reader / writer”).
- the password itself is not a means of identifying the owner, and if the password is leaked for any reason, there is a possibility that a malicious finder may access the terminal using the illegally obtained password.
- a method of emergency control of a mobile terminal from a remote location using a normal telephone when the mobile terminal is lost may be considered.
- the use of the signal generated by the push button operation prevents unauthorized use of the portable terminal.
- this method requires the presence of a base station capable of remote operation, which is not sufficient to prevent unauthorized use.
- the present invention has been made in view of the above-mentioned problems, and an object of the present invention is to securely manage unauthorized use of personal information and monetary information by a third party when integrating and managing the information.
- the purpose is to provide an information protection system for prevention.
- Another object of the present invention is to provide an information protection method for realizing such an information protection system. Disclosure of the invention
- An information protection system is an information protection system including a first assembly in which protected information is recorded and a second assembly in which authentication information is recorded, wherein the second assembly is Communication means for enabling non-contact transmission of information in response to a request from the first assembly, the first assembly receiving means for receiving access to the protected information, and Authentication means for receiving and authenticating from the second assembly, and access control means for permitting or prohibiting the access received by the reception means according to the authentication result by the authentication means.
- An information protection system includes a first assembly in which first authentication information for authenticating the owner and information to be protected are recorded, and a first assembly for authenticating the owner.
- An information protection system comprising: a second assembly on which second authentication information is recorded; and an information reading device for reading the protected information, wherein the first assembly is provided between the second assembly and the information reading device.
- the first assembly includes a first communication unit that enables transmission and reception of information in a non-contact manner
- the second assembly includes a second communication unit that enables transmission and reception of information in a non-contact manner with the one assembly.
- the information reading device comprises: A third communication means for enabling non-contact transmission and reception of information with the first assembly, wherein the first assembly further includes a second communication unit responsive to a signal from the information reading device. Receives the second authentication information, performs authentication based on the received second authentication information and the first authentication information, and permits or prohibits reading of the protected information by the information reading device according to an authentication result. Means.
- the authentication means may be provided in the second assembly or in both the first assembly and the second assembly.
- Each of the first assembly and the second assembly can be independently carried, or can be provided in a form embedded in a portable product.
- the communication means includes: wireless communication by electromagnetic induction; wireless communication by electromagnetic coupling; wireless communication by electrostatic coupling; wireless communication using microwave band frequencies; and communication using light as an information carrier medium;
- the communication can be performed by any of the above.
- the first assembly and the second assembly may be provided as IC modules each including an antenna for non-contact communication.
- Examples of the form of the first assembly include a form embedded in a card medium, a form embedded in a sheet-like medium, a form built in a portable terminal, a form built in a data carrier, and the like. Can be
- the second assembly is preferably one that is always carried by the person carrying the first assembly, and more preferably one that cannot easily be stolen by a third party.
- the first assembly can be embedded in a decorative article worn by the bearer, for example, a ring.
- the access control means if an authentication result indicating that access is permitted by the authentication means is obtained, until the predetermined time elapses from the access request, the protected information. Allow access to.
- first and second assemblies can be provided as integrated circuit assemblies.
- FIG. 1 is a block diagram showing an outline of an information protection system according to an embodiment of the present invention.
- FIG. 2 is a flowchart showing an authentication process in the CPU 31 of the IC assembly 30 in response to an access request to the IC assembly 30.
- FIG. 3 is an explanatory diagram of the multipurpose portable terminal 300 and the R badge 400.
- FIG. 4 is an explanatory diagram of an example in which a reader / writer 50 for a contactless IC card is provided in an automatic ticket gate.
- FIG. 5 is a diagram illustrating a configuration of a mobile terminal having an RFID interface.
- FIG. 6 is a diagram illustrating a configuration of a mobile terminal having a plurality of RFID interfaces.
- FIG. 7 is a diagram illustrating a software configuration of the mobile terminal.
- FIG. 8 is a diagram showing a configuration of an IC card.
- Fig. 9 is a diagram showing the mechanism of transmission and reception by electromagnetic induction.
- FIG. 10 is a flowchart showing the operation of receiving data.
- FIG. 11 is a flowchart showing the operation of transmitting data.
- FIG. 12 is a diagram showing the configuration of the individual information system.
- FIG. 13 is a diagram showing how individual information is stored in a mobile terminal.
- FIG. 14 is a flowchart showing the operation of the individual information system.
- FIG. 15 is a diagram showing the configuration of the user identification system.
- FIG. 16 is a diagram illustrating an example of a red badge.
- FIG. 17 is a diagram illustrating an example of a red badge.
- FIG. 18 is a diagram illustrating an example of a red badge.
- FIG. 19 is a diagram showing a configuration of an IC chip of a red badge.
- FIG. 20 is a flowchart showing the operation of registering the identification information.
- FIG. 21 is a flowchart showing an operation of determining whether or not the information is available from the identification information.
- Figure 22 shows the use of the red badge in the individual information system.
- FIG. 23 is a diagram illustrating a configuration of a portable recording element writing system.
- t Figure 2 5 is a flowchart showing the operation of the portable recording element writing systems
- t Figure 2 6 is a diagram using Retsudobajji in portable recording element writing system, first management system It is a figure showing a structure.
- FIG. 27 is a diagram illustrating a first operation of the use management system.
- Figure 28 is an example of the screen displayed on the mobile terminal.
- Figure 29 is a diagram of using the red badge in the first usage management system.
- FIG. 30 is a diagram illustrating a second configuration of the use management system.
- FIG. 31 is a diagram illustrating a second operation of the use management system.
- Figure 32 is an example of the screen displayed on the mobile terminal.
- FIG. 33 is a diagram of using a red badge in the second usage management system.
- FIG. 34 is a diagram showing how transmission and reception are performed between portable terminals. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 1 is a block diagram showing an outline of an information protection system according to an embodiment of the present invention.
- This information protection system is composed of a first IC assembly 30 and a second IC assembly 40.
- the first IC assembly includes a central processing unit (CPU) 31, a wireless communication interface unit 32, a collation data recording unit 33, a trigger signal receiving unit 34, and a protected information recording unit.
- the second IC assembly 40 includes a CPU 41, a wireless communication interface section 42, and a collation data recording section 43.
- the first and second IC assemblies 30 and 40 are provided with a read-only memory (ROM) (not shown) that stores application programs and control programs, an operating system (OS), and device drivers required for each assembly. ) And random access memory (RAM).
- ROM read-only memory
- OS operating system
- RAM random access memory
- the first IC assembly 30 and the second IC assembly 40 use wireless communication. So that data can be transmitted and received between them.
- wireless communication used in the present specification means communication in general without using electrical contact by metal terminals, and as an example, a non-contact automatic identification system (RFID: Radio Frequency) Wireless communication of the electromagnetic coupling method, the electromagnetic induction method, the microwave method, and the optical method used in Identification (Financial Communication).
- RFID Radio Frequency
- the CPU 31 controls each component of the first IC assembly 30, and the CPU 41 controls each component of the second IC assembly 40.
- Each of the wireless communication interface sections 32 and 42 has both a transmission function and a reception function.
- the wireless communication interface units 32 and 42 include, for example, an antenna and a coil used in the RFID technology, and transmit and receive data to and from each other.
- RF IDs use various modulation schemes, frequencies, and communication protocols
- the present invention is not limited to a specific scheme, and any scheme may be used.
- the number of wireless communication interface units provided in the IC assembly is not particularly limited, and a plurality of wireless communication interface units functioning with different modulation schemes may be provided as necessary. From the point of view of versatility, it is preferable to adopt a method that conforms to specifications that are being standardized in the field of contactless IC cards. In Japan, the Next Generation IC Card System Study Group (the Next Generation IC Card System Garden Group) and the IC Card System Utilization Council (Japan IC Card System Application Group 1) Are conducting standardization activities.
- the collation data recording sections 33 and 43 record data for collating the first and second IC assemblies. Access to the protected information recording unit 35, for example, access to data and programs stored in the protected information recording unit 35, is permitted only when the verification data meets predetermined conditions. .
- the collation data is data for uniquely identifying the owner of the IC assembly, and the content is not particularly limited.
- a unique code of a CPU, a product number, a credit code number, a combination of a plurality of these unique data, and an encrypted version thereof can be used as collation data.
- Protected information is any information or data that the IC assembly owner wants to protect, such as personal or financially valuable information, by restricting access and use by third parties. Information or data-may be evening. Examples include data recorded on conventional cards such as credit cards, cash cards, prepaid cards, various memberships, consultation tickets, health insurance cards, identification cards, public facility tickets, and other electronic money services. A variety of things can be considered, such as child transaction information, private address books and documents, and image data.
- FIG. 2 is a flowchart showing an authentication process in the CPU 31 of the IC assembly 30 in response to an access request to the IC assembly 30.
- the wireless communication interface unit 32 is connected to the trigger signal receiving unit 34 and receives a trigger signal described later.
- the CPU 31 determines that there is no access request to the IC assembly 30, and when the trigger signal is received, determines that there is an access request (S ll).
- the CPU 30 sends a request signal requesting the second IC assembly 40 to transmit collation data to the second IC assembly 40 in response to the trigger signal via the wireless communication interface 32.
- Send (S1 2).
- the second IC assembly 40 transmits the collation data stored in its own collation data recording unit 43 to the first IC assembly.
- the CPU 31 determines whether or not the verification data has been received through the wireless communication interface 3 (S13), and rejects the access if it has not been received. (S14). If the matching data has been received, the CPU 31 receives the matching data received from the second IC assembly 40 and I. The comparison process with the collation data stored in the collation data recording unit 33 of the assembly 30 is started (S15). In this example, this comparison is performed by the comparison unit 36.
- a predetermined condition it is determined whether a predetermined condition is satisfied. In this example, it is determined whether the data received from the IC assembly 40 matches the data for IC verification (S16), and if they match, the CPU 31 determines access. Permit (S17), and extract necessary information from the protected information recording unit. On the other hand, if the predetermined condition is not satisfied, the CPU 31 prohibits access to the data stored in the protected information recording unit 35 (S14).
- the recording units such as the collation data recording units 33 and 43 and the protected information recording unit 35 are realized by recording elements such as IC chips.
- the comparison of the collation data is performed in the first IC assembly 30, but the comparison can also be performed in the second IC chip assembly 40.
- the second IC assembly 40 notifies the first IC assembly 30 of the result of the comparison by wireless communication, and the CPU 31 records the protected information according to the result of the comparison. It is determined whether access to the part 35 is permitted.
- a comparison unit is provided in both the first IC assembly 30 and the second IC assembly 40, and different collation data are exchanged, and only when the predetermined condition is satisfied in both, the protected information recording unit is provided. It may be configured to allow access to 35. In particular, by adopting the latter double-comparison form, the data stored in the protected information recording section 35 can be more reliably protected.
- the present invention is not limited to a semiconductor integrated circuit.
- the first and / or second IC assembly may be manufactured using an opto-electronic integrated circuit (OE IC) or a bio-based chip.
- OE IC opto-electronic integrated circuit
- the IC assembly manufactured in this way can be embedded as a small chip in various objects.
- the IC assembly is embedded in an object that can be brought close to the owner, such as an ornament or clothing. These are collectively referred to as "R badges.”
- R badges personal information and information with monetary value integrated into a mobile terminal are collectively referred to as a “multi-purpose mobile terminal”.
- the first IC assembly is realized in the form of a multipurpose portable terminal 300 and the second IC assembly is realized in the form of an R pad 400.
- the multipurpose mobile terminal 300 is provided with a switch 301, and a trigger signal is generated when the terminal owner presses the switch 301.
- the trigger signal receiving section 34 (FIG. 1) instructs the wireless communication interface section 33 to start communication with the second IC assembly.
- the subsequent matching operation is as described with reference to FIG. By doing so, the matching data can be compared between the multi-purpose mobile terminal and the R badge, and the multipurpose mobile terminal can be used only when the result of the matching satisfies a predetermined condition. it can.
- Fig. 4 shows an example in which a reader / writer 50 for a non-contact type IC card is provided in an automatic ticket gate and a signal (precharge signal) transmitted from the reader / writer is used as a trigger signal.
- the signal transmitted from the reader / writer is similar to the signal used in the well-known R FID system.
- the access is permitted, and after this predetermined time, access is prohibited. It may be.
- the timer in one or both of the IC assemblies 30 and 40, it is possible to detect whether or not the above-described predetermined time has elapsed. In this way, the distance between IC assemblies 30 and 40 can be reduced. The present invention can be realized even when the distance is longer than the receivable distance.
- a case will be described as an example in which a ticket is integrated into the multipurpose portable terminal 300 and passes through an automatic ticket gate.
- the communicable distance between the multipurpose portable terminal 300 (IC assembly 30) and the IC assembly 40 is 10 cm.
- authentication is performed by holding the multipurpose terminal 300 in hand and approaching the reader / writer 50 of the automatic ticket gate. If the IC assembly 40 is mounted on a ring, for example, the distance between the IC assembly and the ring in the multipurpose terminal 300 is shorter than 10 cm, so that authentication can be performed without any problem. However, if the IC assembly 40 is mounted on a hat or earrings, the distance between the IC assembly 30 and the IC assembly 40 will typically be longer than 10 cm, making authentication impossible. .
- the multipurpose portable terminal 300 is brought closer to the hat or the earring to reduce the distance between the IC assembly 30 and the IC assembly 40 to 10 cm or less.
- Authentication between 0 and 0 is performed. This operation is performed, for example, in the example of FIG. 3, with the multi-purpose mobile terminal 300 held near the hat or the earring and pressing the switch 301 of the multi-purpose mobile terminal 300 to generate a trigger signal. Authentication is performed by sending a call.
- the multipurpose terminal 300 in a state where the multipurpose mobile terminal 300 is within a range that can respond to the precharge signal transmitted from the reader / writer 50, the multipurpose terminal 300 is brought close to the ear and the hat or By setting the distance from the IC assembly 40 mounted on the carrier to 10 cm or less, authentication can be performed and the ticket data recorded on the portable terminal 300 can be used. In this way, by setting a gap to allow a certain time lag, even if the distance between the actual use of the IC assembly 30 and the IC assembly 40 is relatively long, the communicable distance It is possible to adopt a short communication method.
- the information stored in the mobile terminal can be backed up on a dedicated server, or a log file of the specifications can be saved, so that the information can be downloaded if necessary and restored to the state before the loss. You may be able to.
- the owner can use the IC card as it is or You can choose to use it as a band terminal. Furthermore, by incorporating a well-known GPS function into the IC assembly 30, even if the IC assembly 30 is lost, the protection of the data recorded in the protected information recording section 35 can be further enhanced. .
- the mobile terminal 10 includes a transmission / reception unit 20 for transmitting and receiving data by a radio wave recognition method, a memory 30 including RAM and ROM, and a CPU (central control unit). It is roughly composed of a control unit 40 consisting of a processing device).
- the radio wave recognition method is a transmission / reception method represented by RFID etc., in which data is transmitted / received without making an electrical connection, and uses electromagnetic coupling, electromagnetic induction, microwaves, light, etc. .
- the mobile terminal 10 is a terminal such as a mobile phone, a PHS, a PDA (portable information terminal), and a notebook personal computer.
- the interface that transmits and receives signals using the radio wave recognition method is hereinafter referred to as an RFID interface.
- the control unit 40 is connected to the transmission / reception unit 20 and the memory 30 to control the transmission / reception unit 20 and the memory 30.
- the transmitting / receiving unit 20 has a transmitting unit (or a transmitting unit) and a receiving unit, and has a function of reading data from a recording element or the like having an RFID interface via the antenna 22 or a recording element or the like. It has a function of writing data to a device or a function of transmitting data to a reader having an RFID interface.
- the recording element is an IC chip or the like.
- the recording element will be described as an IC chip.
- the transmission / reception unit 20 includes a communication control unit 21 including a communication control IC and the like and an antenna 22.
- the communication control unit 21 is described below as a communication control IC.
- the communication control IC 21 of the transmission / reception unit 20 is connected to the control unit 40, and It receives commands to read data from the control unit 40 and sends and receives data via the antenna.
- the memory 30 is connected to the control unit 40, and stores a data storage part, a control program such as an OS (operating system) and a device driver for controlling the communication control IC 21 and an application program. I have it.
- a control program such as an OS (operating system) and a device driver for controlling the communication control IC 21 and an application program. I have it.
- the RF interface has various modulation methods, frequencies, communication protocols, and so on. Therefore, as shown in FIG. 6, corresponding communication control ICs 21 and antennas are prepared, and a plurality of control programs such as device drivers for controlling the communication control ICs 21 are provided in the mobile terminal 10. It can be configured so that it can be prepared and selected as needed.
- Some RF ID interfaces can be transmitted and received through the human body when one is worn on the body and one is held in the hand. In this way, it is possible to have a function to transmit and receive data via a conductive material.
- the present invention is not limited to the above, and it is possible to incorporate another type of RFID interface as needed.
- the portable terminal 10 includes a transmitting / receiving unit 20 corresponding to each RF ID interface and a device driver (device) for using each RF ID interface.
- a plurality of control programs 31 can be prepared, and various application programs 33 can be operated on the system management unit 32 composed of an OS (operating system), etc., and various functions can be provided.
- a data storage unit for storing data used in the application program 33 as necessary. have.
- the application program 33 and the device driver 31 can be downloaded from a network such as the Internet to add or update new functions.
- the IC card has the same configuration as that of the above-mentioned RF ID interface. As shown in FIG. 8, the IC card 50 is connected to the IC chip 51 and the antenna 22.
- the IC chip 51 which is a recording element, includes a control unit 40 including a communication control IC 21 and a CPU, and a memory 30, and transmits and receives data via an antenna 22.
- the memory 30 is connected to the control unit 40 and includes a part for storing data in the memory and software for controlling the communication control IC 21. Further, OS may be provided.
- the part for controlling the communication can be an integrated circuit.
- the above-described transmission / reception unit 20 of the RFID interface can be incorporated into any device, and a function of transmitting / receiving data via the RFID interface can be provided.
- the transmission / reception unit 20 will be described by dividing it into a reception unit 20 ′ and a transmission unit (transmission unit) 20 ′′.
- the communication control IC 21 includes a read control unit 211 that starts reading data in response to a read command from the control unit 40, and a control unit that receives the received data. 4 0, t read controller 2 1 1 and a data reception unit 2 1 2 to pass to the control unit 4 0 'from the occurrence of the power pulse as an originating request and that receive a read command antenna 2 2' from It has a function to send. Further, the data receiving section 212 has a function of decoding the data when the data from the transmitting section 20 "is received by the antenna 22 'and passing the decoded data to the control section 40'.
- the transmission unit 20 “includes a power storage unit 2 13 that stores capacity by electromagnetic induction, It has a data transmission unit 214 for transmitting data.
- the power storage unit 2 13 has a function of storing power when an antenna 22 2 ”receives a pulse as a transmission request from the reception unit 20 ′.
- the data transmission unit 2 14 includes a power storage unit 2 1. It has a function to transmit data from antenna 2 2 "using the energy stored in 3 as a power source.
- the transmission / reception unit 20 has both functions of the reception unit 20 ′ and the transmission unit (transmission unit) 20 ′′.
- the reception operation of the portable terminal 10 will be described with reference to the flowchart of FIG. 10, taking as an example a case where data is received from an IC terminal device having an RFID interface.
- the distance at which an IC card or device having an RFID interface and a portable terminal 10 can transmit and receive differs depending on whether it is a contact type, a proximity type, or a proximity type.
- the contact type, the proximity type, and the proximity type are used depending on the purpose, and transmission and reception are performed using a device driver selected by an application program (S100).
- S100 application program
- a read system call is called from the application program to the device driver
- a read command is sent from the device driver to the communication control IC 21 (S101).
- the communication control IC 21 Upon receiving the read command, the communication control IC 21 generates a power pulse as a transmission request from the antenna 2 2 (2 2 ′) via the read control unit 2 1 1.
- the IC card or device receives a power pulse as a transmission request, and stores the current generated by electromagnetic induction in the power storage unit 2 13 (S 200).
- the data is transmitted from the antenna 2 2 "using the power stored in the power storage unit 2 13 (S 2 0 1).
- the portable terminal 10 receives the data via the antenna 2 2 (2 2 ′) (S103), and the data decoded through the data receiving section 212 is sent to the device driver. Passed from the driver to the application program.
- a read command is sent to the communication control IC 21 (S210), and when the IC card or the device communication control IC 21 receives the read command, the read control unit 21 receives the read command.
- a pulse is generated as a transmission request from antenna 2 2 (2 2 ′) via 2 1 1 (S2 1 1).
- the mobile terminal 10 When the mobile terminal 10 receives the power pulse as a transmission request (S1 10), it uses the power pulse as an interrupt signal of the CPU and transmits data from the antenna 2 2 (2 2 ") (S 1 1 1).
- the current generated by the electromagnetic induction may be stored in power storage unit 2 13 and data may be transmitted using the power stored in power storage unit 2 13.
- the IC card or the device receives data via the antenna 22 (2 2 ′) (S2 12).
- the mobile terminal 10 has been described in which the transmitting and receiving unit has the function of the receiving unit and the function of the transmitting unit (transmitting unit). However, either the function of the receiving unit or the function of the transmitting unit (transmitting unit) is described. May be provided with only one.
- the data receiving side may receive polling as a transmission request and receive the data.
- the transmission / reception unit 20 is a unit that can be attached to and detached from the portable terminal 10 (for example, a card-type unit), and it is possible to mount various RFID interfaces.
- a recording element other than a semiconductor may be used and configured to have the same function as the IC chip.
- data can be transmitted and received to and from the IC card 50 using the mobile terminal 10 having the RFID interface as described above.
- data can be transmitted and received with devices equipped with an RFID interface.
- the mobile terminal 10 reads the unique data stored in the IC card 50 or the device, the application can be started. For example, when the information of the IC card 50 is read, it connects to the Internet. Alternatively, if information is read from a device that incorporates an RFID interface, a manual or the like can be displayed.
- the portable terminal 10 has functions such as a commuter pass (performed by an IC card), a ticket, a credit card, and a key.
- a card function such as a credit card is incorporated in the mobile terminal 10 will be described as an example.
- the same components as those in the above-described embodiment are denoted by the same reference numerals, and detailed description is omitted.
- Individual information in other embodiments are denoted by the same reference numerals, and detailed description is omitted.
- the system 11 is roughly composed of a portable terminal 10 and a receiving device 60 incorporating a transmitting / receiving unit 20 ′ (receiving unit) of an RFID interface.
- the receiving device 60 includes a transmitting / receiving unit 20 ′ and a control unit 40 ′, and has a function of reading individual information from the mobile terminal 10. In order to read the individual information by bringing the portable terminal 10 close to the receiving device 60, it is preferable to use the proximity type for the transmitting and receiving unit 20 '.
- the portable terminal 10 stores the individual information 340 in the data storage section 34 on the memory 30.
- individual information 340 is stored as individual information 340.
- the individual information 340 can store a plurality of card information (for example, A, B, and C in FIG. 13), and has a function of selecting a card to be used from the information. Furthermore, it is possible to prepare a plurality of application programs 33 according to the card, and to have a function corresponding to each force.
- card information for example, A, B, and C in FIG. 13
- the operation of the present embodiment will be described with reference to the flowchart of FIG. Select the card to be used on the mobile device 10 (S 12 0), and use the mobile device 10 To the receiving device 60.
- the receiving device 60 receives an instruction to read the force information 340, for example, by pressing a reading switch provided on the receiving device 60, it sends a reading command to the transmitting / receiving unit 20 (S 2 2 0). Therefore, the transmission / reception request for the card information 340 (individual information) of the card designated by the transmission / reception unit 20 is transmitted to the portable terminal 10 (S221).
- the portable terminal 10 Upon receiving the card information 340 transmission request, the portable terminal 10 transmits the selected card information 340 (S122). The receiving device 60 continues the process if the received card information 340 is the requested force information (S224), but ends the error if it is not the requested card information (S224). 2 2 5).
- the case where the mobile terminal 10 has a card function has been described, but it is also possible to have a function of a commuter pass or a ticket. In this case, it is preferable to use the proximity type as the transmission / reception unit 20 of the reception device 60 so that the transmission / reception unit 20 can read from a slightly distant position.
- the mobile terminal 10 It is also possible to provide the mobile terminal 10 with a key function. In this case, it is preferable to use the proximity type or the proximity type as the transmission / reception unit 20 of the reception device 60 so that the data can be read from a slightly distant position.
- identification information for identifying each individual of the mobile terminal 10 can be used.
- the management company that manages the electronic money recorded on the mobile terminal 10, credit card, membership, etc., via the Internet etc. Notify replacement. Therefore, it is possible to make the old mobile terminal 10 unusable and download it to the new mobile terminal 10 for use.
- the mobile terminal 10 can be provided with a plurality of functions.
- a user identification system that identifies a user of the portable terminal 10 using an IC chip that stores identification information will be described.
- the same components as those in the above-described embodiment are denoted by the same reference numerals, and detailed description is omitted.
- the one with the IC chip embedded in the one that you always wear or keep close to is called the red badge.
- the user identification system 12 is roughly composed of a portable terminal 10 and a portable recording element for storing identification information.
- a red badge 70 incorporating an IC chip 51 and an antenna 22 as a portable recording element will be described as an example.
- red badge 70 incorporating the IC chip 51
- a red badge 70 shares a main body such as a ring and a ring as an antenna 22 with an original purpose, and is provided with an IC chip 51 as shown in FIG.
- an IC chip 51 and an antenna 22 are built in a main body 61 such as a tie pin.
- a main body 61 such as a tie pin.
- a body with a built-in IC chip 51 and antenna 22 in a body 6 2 such as a cufflink, badge, brooch, pendant, contact lens, etc.
- a body 6 2 such as a cufflink, badge, brooch, pendant, contact lens, etc.
- an IC chip 51 and an antenna 22 are built in the main body such as a wallet and a pass case.
- a type that is built into something close to the body such as one with a built-in IC chip 51 and antenna 22 in the main body of a writing implement or writer.
- the IC chip 51 can be built in not only the examples described above but also various types, and the shapes of the antennas 22 are also various.
- the identification information is stored in the identification information storage section 35 of the memory 30 in the IC chip 51 built in the red badge 70. It is desirable that the identification information storage unit 35 be constituted by a non-rewritable recording element such as a ROM. Also, the identification information 350 is allocated so that it can be uniquely identified. The identification information 350 may be written so as to be unique when the red badge 70 is manufactured. Considering the case where a plurality of third-party red badges 70 exist near the mobile terminal 10, the mobile terminal 10 and the red badge 70 cannot be read with the identification information 350 unless they are in close proximity. It is more desirable to do. Proximity is the degree to which the portable terminal 10 in use and the red badge 70 worn by the user, such as wearing clothes, can transmit and receive.
- the red badge 70 it is preferable to use a proximity type or close contact type IC chip for the red badge 70. Furthermore, it is desired that the range in which the red badge 70 and the portable terminal 10 can transmit and receive is not more than several tens of centimeters. .,
- the red badge 70 is set to the R badge.
- the mobile terminal 10 is set to the registration mode for registering the identification information 350 of the red badge 70 (S130).
- the registration mode When entering this registration mode, the user must enter a password and biometrics (such as iris, voiceprint, and fingerprint) to enter the registration mode, and a third party cannot register.
- a read start command is transmitted from the control unit 40 to the communication control IC 21
- a transmission request hyperpulse is transmitted from the antenna 22, and the reading of the red badge 70 is started (S 1). 3 1).
- a predetermined time t is set in the timer of the portable terminal 10 (S132). Therefore, until the time t has elapsed (S134), it is repeatedly checked whether the identification information 350 has been received from the red badge 70 (S133).
- an error message is displayed on the screen of the mobile terminal 10 (S135).
- the received identification information is already registered identification information, an error message is displayed on the screen of the portable terminal 10 (S135).
- the identification information 350 is stored in the memory 30 of the portable terminal 10 and registered.
- the identification information 3 of the nearby red badge 70 The operation of confirming 50 will be described with reference to the flowchart of FIG.
- the default mode 1 described in the flowchart of FIG. 21 is canceled when the operation is started and the identification information 350 of the red badge 70 is read, and the normal operation is not performed.
- the default mode 2 since the default mode 2 may have been altered, the following description will be made assuming that it is necessary to confirm the identity by inputting a personal identification number, biometrics, and the like in order to cancel the default mode.
- an interrupt is generated in the CPU of the control unit 40 (S150) ).
- a read start command is sent from the control unit 40 to the communication control IC 21.
- the communication control IC 21 Upon receiving the command to start reading, the communication control IC 21 transmits a transmission request from the antenna 22 and starts reading. .
- the controller 40 sets a predetermined time t1 in the timer (S151), and checks whether the identification information 350 transmitted from the red badge 70 has been received (S152). It repeatedly checks whether the identification information 350 has been received until the time t1 elapses (S153). If the reception of the identification information 350 from the red badge 70 is not completed even after the time tl has elapsed, the default mode 1 is set (S166).
- the received identification information is compared with the identification information registered in advance in the memory 30, and if there is a corresponding one, the registered red badge 70 is close. Therefore, the portable terminal 10 can be used (S154). If none is found, it is not a registered red badge 70. Therefore, if the number of times that unregistered identification information is received is less than the specified number, the default mode 1 is set (S162), but the number of times that unregistered identification information is received is greater than the specified number. In this case, set the default mode 2 (S166).
- a predetermined time t 2 is set in the timer 1 (S 156). Until time t 2 elapses (S 1 5 8), processes such as call, mail reception, Internet access, etc. If not started (S207), the default mode 1 is set (S166).
- a predetermined time t3 is set Is set to (S159).
- S16 1 if the next processing such as call / mail reception and Internet access is started (S 16 0), read the badge 70 There is no need to continue work.
- t 3 is activated (S 159). If the next operation is not started within t 3 (S 161), the default mode 1 is set (S 16). 2).
- the function is stopped and the preset operation is performed.
- the preset operation For example, set the ringtone to maximum and issue a warning.
- a dial lock can be used.
- the default mode is set at the time of shipment of each mobile terminal 10, but the user can arbitrarily set an operation corresponding to each after the purchase.
- the user can change the password so that the user cannot use the mobile terminal 10 without using the security code before using the terminal.
- the mobile terminal 10 performs polling to receive the red badge 70, and receives the identification information 350. It is also possible to periodically check the presence or absence of Red Badge 3.
- functions such as a commuter pass, a ticket, a credit card, and a key are built in the mobile terminal 10 as in the user identification system 12 'shown in FIG. 22.
- the function is received by the receiving device 60, first, the user of the portable terminal 10 is checked with a red badge 70 to confirm whether the user is a valid user. It is also possible to do so.
- the use of the portable terminal 10 can be made possible by confirming the identification information of the portable recording element incorporated in the red badge, and only authorized users can be used.
- the portable recording element writing system 13 is composed of a portable terminal 10, a recording element 51, and an IC 50 incorporating an antenna 22. It is schematically configured. Here, a case will be described as an example where data is written to an IC card 50 incorporating the recording element 51 and the antenna 22.
- the recording element 51 is for recording identification information 350.
- an interrupt is generated in the CPU of the control unit 40 (S170).
- a read start command is sent from the control unit 40 to the communication control IC 21.
- the communication control IC 21 issues a read request (eg, a single pulse) from the antenna 22) to read the identification information 350 registered in the IC card 50. Start.
- the control unit 40 of the mobile terminal 10 sets a predetermined time t1 in the timer 1 (S177) and checks whether the identification information 350 transmitted from the IC card 50 has been received. (S172). The reception of the identification information 350 is repeatedly checked until the time t1 elapses (S173), and the reception of the identification information 350 from the IC card 50 is not completed even after the time t1 elapses. In this case, a display indicating that the card cannot be recognized is made (S180).
- the received identification information 350 is compared with the identification information registered in the memory 30 in advance, and if there is any corresponding information (S1774), the registration is performed. It is assumed that the IC card 50 has already been used. If there is no applicable one (S174), writing is not possible because it is not a registered IC card 50 Is displayed (S181).
- a write counter C is set (S175). If the write processing (S177) is performed and the write processing is not completed normally (S177), the write processing is performed again until the write counter C becomes 0 (S177). S 176). If writing is not possible even if the writing counter C becomes 0, a writing failure is displayed (S182).
- the portable terminal 10 having the RFID interface can write digital information such as a received digital ticket into the IC card 50. It is also possible to use a portable terminal 10 to carry out cashing from a bank such as the Internet and write it on the IC card 50.
- the portable recording element writing system 13 ′ shown in FIG. 25 when writing to the IC card 50, the user of the portable terminal 10 is explained as described in the third embodiment. It is also possible to confirm that the user is a legitimate user with a red badge 70.
- a first usage management system that manages the usage status of the mobile terminal 10 and the IC card 50 by using a line such as the INN Yuichi Net will be described.
- the same components as those in the above-described embodiment are denoted by the same reference numerals, and detailed description is omitted.
- the usage management system 14 includes a device 90 incorporating a recording element such as a portable terminal 10 or an IC card 50 and a transmitting / receiving unit of an RFID interface. And the management server 100 are connected via a communication line 110. Furthermore, a configuration may be adopted in which a financial institution 120 such as a bank terminal @ net bank is connected to the communication line 110.
- identification information 350 that uniquely identifies each individual is recorded in a non-rewritable manner.
- mobile terminals 10 is provided with a transmission / reception section 20 of an RFID interface, and has a function of transmitting identification information 350.
- the mobile terminal 10 includes a communication line transmitting unit 25, and has a function of connecting to the Internet or the like via the communication line.
- the device 90 will be described as an example in which a transmission / reception unit of an RFID interface is incorporated in a vending machine. From the device 90, it is possible to send and receive data to and from a mobile terminal 10 or IC card 50 equipped with an RFID interface, and the payment is recorded on the mobile terminal 10 or IC card 50. It has a function to receive payments from cash cards and the like.
- the device 90 includes a server connection unit 80 that performs transmission and reception with the management server 100 via the communication line 110. Further, in the device 90, a device number 91 assigned to each device is recorded.
- the management server 100 receives both the identification information 350 of the portable terminal 10 and the IC card 50 and the usage information via the communication line 110 and manages the usage information indicating the usage details. It has a management unit.
- the communication line 110 is a dedicated line, the Internet, or the like. From the viewpoint of the reliability of information management, it is preferable that security is ensured.
- the prepaid card mode 100 0 0 to the product purchase mode 100 0 1 to the vending machine mode 100 2 Is selected (S300).
- the identification information 350 is transmitted to the vending machine 90 from the RFID interface of the mobile terminal 10
- a screen 100 3 during personal authentication is displayed on the mobile terminal 10 ( S301).
- the vending machine 90 and the portable terminal 10 are transmitted and received through the RFID interface.
- the vending machine 90 Upon receiving the identification information 350, the vending machine 90 transmits the identification information 350 of the portable terminal 10 and the device number 91 of the vending machine 90 to the management server 1000 in a super-connection section. Sent from 80 to check balance and collate with blacklist (S400). The management server 100 checks the personal data of the owner of the portable terminal 10 from the identification number 350. Further, a check of the blacklist is performed (S500).
- the blacklist once received may be stored in the vending machine 90, and the vending machine 90 may perform the check.
- the time required for transmission and reception with the management server 100 can be shortened, and the convenience can be improved.
- vending machine 90 and the management server 100 are transmitted and received from the server connection unit 80.
- the vending machine 900 if there is a problem with the personal data and the blacklist based on the result of the check in the management server 100 (S400), a purchase refusal is transmitted to the portable terminal 10.
- the portable terminal 10 displays a screen 1007 indicating that the terminal is unusable (S302).
- the purchase permission is transmitted to the mobile terminal 10.
- the product selection screen 1004 is displayed on the portable terminal 10 (S303).
- the vending machine 90 When the merchandise is selected by the vending machine 90 (S401), the vending machine 90 sends the merchandise withdrawal data to the portable terminal 10 (S402).
- the mobile terminal 10 performs a price subtraction process, and displays a processing screen 105 (S304). Further, at this time, if the processing of the withdrawal from the mobile terminal 10 is not performed normally (S402), a notification of NG is transmitted from the vending machine 90 to the management server 100 as usage information. Then, the personal data or the black list is updated (S501).
- the cash-out processing was normally performed from the mobile terminal 10 (S402), but if the goods were not properly paid out (S403), A notification of NG is transmitted from the vending machine 90 to the management server 100 as usage information, and the device number 91 of the vending machine 90 that did not operate normally is recorded (S502).
- the processing of the debit is normally performed from the mobile terminal 10 (S402), Further, when the commodity is successfully paid out (S403), the completion of the purchase processing is transmitted from the vending machine 90 to the portable terminal 10. On the mobile terminal 10, the balance is displayed on the screen 106. (S305). Further, purchase information is transmitted from the vending machine 90 to the management server 100 as usage information, and is recorded as a history (S503).
- the portable terminal 10 has been described, but the same can be applied to the IC card 50.
- the communication line transmitting section 25 of the portable terminal 10 connects to the management server 100 via the communication line 110. Based on the identification number 350 of the mobile terminal 10 and the usage information using the vending machine 90, it is possible to confirm which vending machine 90 was used from the device number 91, and You can also get a refund.
- the device number 91 of the vending machine 90 is received via the transmission / reception unit 20 of the RFID interface of the mobile terminal 10, and the usage information, the identification information 350 of the mobile terminal 10 and the device number 9 are received. Can be transmitted from the communication line transmitting section 25 of the portable terminal 10 to the management server 100 via the communication line 110.
- the mobile terminal 10 is used as a prepaid card.
- the mobile terminal 10 is used as a cash card, a debit card, a point card, a smart card credit card, or the like. .
- the information is encrypted and transmitted to the management server for security.
- the use history of the portable terminal 10 can be obtained by managing the identification information 350 uniquely assigned to the portable terminal 10 and the use information in association with each other.
- the mobile terminal 10 is equipped with a GPS (global positioning system) function. By acquiring location information and accurately grasping the position of the mobile terminal 10, it can be compared with the device number 91. This can prevent unauthorized use.
- GPS global positioning system
- a usage management system 14 ′ shown in FIG. At the time of use, as described in the third embodiment, it is possible to confirm whether the user of the portable terminal 10 is a valid user by using the red badge 70.
- the usage management system 15 includes a mobile terminal 10, an IC card 50, and a device 90 ′ that incorporates an RFID interface transmitting / receiving unit 20 ′.
- the server 100 is connected via the communication line 110.
- a financial institution 120 such as a bank terminal or a net bank is connected to the communication line 110.
- the device 90 ′ is a prepaid purchase device 90 ′ equipped with an RFID interface transmitting / receiving unit 20, in which the balance of the prepaid card is rewritten to the mobile terminal 10 or the IC card 50. Will be described as an example. Further, in the device 90 ', a device number 91 assigned to each device is recorded.
- the mode of the prepaid card 110 1 to the cash addition mode 110 1 is selected from the menu (S 310) .
- the personal terminal 10 displays a screen 1 10 2 during personal authentication. (S311).
- the prepaid purchase machine 90 Upon receiving the identification information 350, the prepaid purchase machine 90 'transmits the identification information 350 of the mobile terminal 10 from the server connection unit 80 to the management server 100, and checks the balance and the blacklist. Is collated (S410). The management server 100 checks personal data of the owner of the portable terminal 10 from the identification number 350. I do. Further, a blacklist is checked (S510). Hereinafter, it is assumed that the prepaid purchase machine 90 'and the management server 100 are transmitted and received from the server connection unit 80.
- the prepaid purchase machine 90 If there is a problem with the personal data and the blacklist (S410), the prepaid purchase machine 90 'sends a message indicating that it cannot be added to the mobile terminal 10.
- the portable terminal 10 displays a screen 1106 indicating that addition is impossible (S312).
- a purchase permission is transmitted to the portable terminal 10.
- the mobile terminal 10 displays an additional amount selection screen 1 103 (S3 13).
- the additional amount is selected (S411), the data of the additional amount is sent to the portable terminal 10 (S412).
- the balance is displayed on the screen 1108 of the mobile terminal 10 (S3 17) and added as usage information.
- the credit card is debited from a financial institution 120 such as a bank and added to the mobile terminal 10 .
- a financial institution 120 such as a bank
- cash is added to the prepaid purchase machine 90 ′ and added to the mobile terminal 10. Is also possible.
- vending machine 90 can be used as a prepaid card purchasing machine 90 '.
- mobile terminal 10 is used as a prepaid card
- cash cards, debit cards, credit cards, membership rights, medical examination tickets, health and health centers, identification cards, and tickets for amusement facilities can be used in the same way.
- the dedicated device 90 ′ having the RFID interface has been described as an example, but it is directly deducted from the financial institution 120 via the communication line 110 and added to the portable terminal 10.
- the processing may be performed, and the identification information 350 of the portable terminal 10 and the usage information may be transmitted to the management server 100.
- the mobile terminal 10 can be provided with a function such as a card, and further, all the usage states registered in the mobile terminal 10 can be managed from the identification number 350. .
- the user of the mobile terminal 10 when performing the addition process on the mobile terminal 10, the user of the mobile terminal 10 is legally authorized as described in the third embodiment. It is also possible to use a red badge 70 to confirm the correct user.
- transmission and reception can be performed using the RFID interface.
- digital information such as digital money, ringtones, and a standby screen can be transferred to the mobile terminal 10 of the other party.
- personal information such as a commuter pass, a credit card, and a driver's license can be registered in the mobile terminal.
- a mobile terminal passes to a malicious third party, it cannot be exploited without a corresponding red badge (IC chip).
- leakage of personal data stored in the mobile terminal can be prevented.
- transmission and reception can be performed with a contactless IC chip, and an IC card can be identified from a mobile terminal.
- writing can be performed, and an RFID system can be easily constructed.
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002584251A JP4711039B2 (ja) | 2001-04-17 | 2002-04-17 | 複数の機能を有する多目的携帯端末の安全性確保の方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001-118795 | 2001-04-17 | ||
JP2001118795 | 2001-04-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002086808A1 true WO2002086808A1 (fr) | 2002-10-31 |
Family
ID=18969122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/003789 WO2002086808A1 (fr) | 2001-04-17 | 2002-04-17 | Systeme et procede de protection d'informations |
Country Status (3)
Country | Link |
---|---|
US (1) | US20020174336A1 (ja) |
JP (5) | JP4711039B2 (ja) |
WO (1) | WO2002086808A1 (ja) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004206677A (ja) * | 2003-07-31 | 2004-07-22 | Toyomaru Industry Co Ltd | 監視システム及びicタグを備えた装置 |
JP2004220402A (ja) * | 2003-01-16 | 2004-08-05 | Nec Corp | Eコマース認証システムおよび方法 |
JP2005135421A (ja) * | 2003-10-31 | 2005-05-26 | Lg Electronics Inc | 携帯端末機のsimカード制御装置及びその方法 |
JP2005152155A (ja) * | 2003-11-21 | 2005-06-16 | J Morita Tokyo Mfg Corp | 歯科用チェアユニットの安全装置 |
JP2005159958A (ja) * | 2003-11-28 | 2005-06-16 | Sony Corp | 無線情報通信システム,ユーザ端末,通信目的装置,無線情報通信方法,およびプログラム |
JP2005182506A (ja) * | 2003-12-19 | 2005-07-07 | Ytb:Kk | 処方箋ダウンロードシステム |
JP2005202650A (ja) * | 2004-01-15 | 2005-07-28 | Casio Comput Co Ltd | 認証システム |
JP2005215324A (ja) * | 2004-01-29 | 2005-08-11 | Vision Megane:Kk | Rfidチップ付き眼鏡及び眼鏡情報管理システム |
JP2005267273A (ja) * | 2004-03-18 | 2005-09-29 | Japan Tobacco Inc | 自動販売機および自動販売機システム |
JP2006113719A (ja) * | 2004-10-13 | 2006-04-27 | Sharp Corp | 携帯型電子機器およびその認証方法、該機器用収容器、通信システム、制御プログラム、および該プログラムを記録した記録媒体 |
JP2006119947A (ja) * | 2004-10-22 | 2006-05-11 | Nec Corp | 携帯端末の認証システム |
JP2006172040A (ja) * | 2004-12-15 | 2006-06-29 | Hitachi Information Systems Ltd | Rfid認証システムおよびrfid認証方法およびそのためのプログラム |
JP2006343968A (ja) * | 2005-06-08 | 2006-12-21 | Giga-Byte Technology Co Ltd | 無線認証ログインシステムの方法 |
JP2007148950A (ja) * | 2005-11-30 | 2007-06-14 | Hitachi Ltd | 情報処理装置 |
JP2007522580A (ja) * | 2004-02-12 | 2007-08-09 | プリサイス バイオメトリクス アクチボラゲット | 無線データ転送をするためのポータブルデータキャリア、外部装置、システムおよび方法 |
WO2007105553A1 (ja) * | 2006-03-13 | 2007-09-20 | Omron Corporation | 監視システム、その端末装置、主制御装置、端末装置の登録方法およびプログラム |
JP2008009734A (ja) * | 2006-06-29 | 2008-01-17 | Casio Comput Co Ltd | 端末装置及びプログラム |
JP2008211582A (ja) * | 2007-02-27 | 2008-09-11 | Nec Corp | 携帯端末装置、icカード認証制御方法及びプログラム |
JP2009110055A (ja) * | 2007-10-26 | 2009-05-21 | Panasonic Corp | 通信端末及びアクセス制御方法 |
JP2009521041A (ja) * | 2005-12-21 | 2009-05-28 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Rfidシステムにおける通信を制御する方法、rfid装置及びrfidシステム |
JP2009200638A (ja) * | 2008-02-19 | 2009-09-03 | Ntt Docomo Inc | 携帯端末及び通信方法 |
JP2009223772A (ja) * | 2008-03-18 | 2009-10-01 | Ntt Facilities Inc | 認証システム、可搬媒体、認証装置および認証方法 |
JP2010508572A (ja) * | 2006-10-30 | 2010-03-18 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | トラステッドプラットフォームモジュールを共有するためのシステム及び方法 |
JP2011516922A (ja) * | 2008-03-31 | 2011-05-26 | ジョンソン・アンド・ジョンソン・ビジョン・ケア・インコーポレイテッド | 導電性材料を含む眼科用レンズの形成方法 |
WO2016185868A1 (ja) * | 2015-05-18 | 2016-11-24 | ソニー株式会社 | 記憶装置、リーダライタ、アクセス制御システム、およびアクセス制御方法 |
JP2018157507A (ja) * | 2017-03-21 | 2018-10-04 | 株式会社デンソーウェーブ | 携帯端末 |
Families Citing this family (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7927212B2 (en) | 2001-08-03 | 2011-04-19 | Igt | Player tracking communication mechanisms in a gaming machine |
US8784211B2 (en) | 2001-08-03 | 2014-07-22 | Igt | Wireless input/output and peripheral devices on a gaming machine |
US7112138B2 (en) | 2001-08-03 | 2006-09-26 | Igt | Player tracking communication mechanisms in a gaming machine |
US8210927B2 (en) | 2001-08-03 | 2012-07-03 | Igt | Player tracking communication mechanisms in a gaming machine |
US7976384B2 (en) * | 2002-02-27 | 2011-07-12 | Igt | Contactless card reading in a gaming machine |
US20050114695A1 (en) * | 2002-04-19 | 2005-05-26 | Fujitsu Siemens Computers Gmbh | Anti-theft device for mobile electronic devices |
EP1387238B1 (en) * | 2002-07-30 | 2011-06-15 | Fujitsu Limited | Method and apparatus for reproducing information using a security module |
US7822688B2 (en) | 2002-08-08 | 2010-10-26 | Fujitsu Limited | Wireless wallet |
US7801826B2 (en) | 2002-08-08 | 2010-09-21 | Fujitsu Limited | Framework and system for purchasing of goods and services |
JP2004227046A (ja) * | 2003-01-20 | 2004-08-12 | Hitachi Ltd | 携帯情報機器 |
US7877605B2 (en) | 2004-02-06 | 2011-01-25 | Fujitsu Limited | Opinion registering application for a universal pervasive transaction framework |
US20070060358A1 (en) | 2005-08-10 | 2007-03-15 | Amaitis Lee M | System and method for wireless gaming with location determination |
US8092303B2 (en) | 2004-02-25 | 2012-01-10 | Cfph, Llc | System and method for convenience gaming |
US7637810B2 (en) | 2005-08-09 | 2009-12-29 | Cfph, Llc | System and method for wireless gaming system with alerts |
US7534169B2 (en) | 2005-07-08 | 2009-05-19 | Cfph, Llc | System and method for wireless gaming system with user profiles |
US8616967B2 (en) | 2004-02-25 | 2013-12-31 | Cfph, Llc | System and method for convenience gaming |
US7811172B2 (en) | 2005-10-21 | 2010-10-12 | Cfph, Llc | System and method for wireless lottery |
EP1571590A1 (de) * | 2004-03-03 | 2005-09-07 | Swisscom Mobile AG | Bestellverfahren für Mobilfunknetzteilnehmer |
EP1571591B1 (de) * | 2004-03-03 | 2017-09-27 | Swisscom AG | Verwendung eines RFID-Tags um mit einem Mobilgerät auf eine Hypertext-Seite zuzugreifen |
JP4391375B2 (ja) * | 2004-09-30 | 2009-12-24 | フェリカネットワークス株式会社 | 情報管理装置および方法、並びにプログラム |
US7613927B2 (en) * | 2004-11-12 | 2009-11-03 | Raritan Americas, Inc. | System for providing secure access to KVM switch and other server management systems |
JP5507811B2 (ja) * | 2005-02-15 | 2014-05-28 | ヴォウダフォン・グループ・ピーエルシー | 無線通信のための向上したセキュリティ |
US7708401B2 (en) * | 2005-04-19 | 2010-05-04 | Anton Sabeta | Ophthalmic lens characterization |
US7458510B1 (en) * | 2005-04-19 | 2008-12-02 | Sprint Spectrum L.P. | Authentication of automated vending machines by wireless communications devices |
JP2006352699A (ja) * | 2005-06-17 | 2006-12-28 | Sony Corp | 通信システム、通信装置および方法、並びにプログラム |
US10510214B2 (en) | 2005-07-08 | 2019-12-17 | Cfph, Llc | System and method for peer-to-peer wireless gaming |
US8070604B2 (en) | 2005-08-09 | 2011-12-06 | Cfph, Llc | System and method for providing wireless gaming as a service application |
US20070136792A1 (en) * | 2005-12-05 | 2007-06-14 | Ting David M | Accelerating biometric login procedures |
JP4539551B2 (ja) * | 2005-12-20 | 2010-09-08 | ソニー株式会社 | 情報処理システムおよび方法、情報処理装置および方法、並びにプログラム |
US7549576B2 (en) | 2006-05-05 | 2009-06-23 | Cfph, L.L.C. | Systems and methods for providing access to wireless gaming devices |
US7644861B2 (en) | 2006-04-18 | 2010-01-12 | Bgc Partners, Inc. | Systems and methods for providing access to wireless gaming devices |
US7623295B2 (en) * | 2006-04-18 | 2009-11-24 | Anton Sabeta | Optical device characterization |
US8939359B2 (en) | 2006-05-05 | 2015-01-27 | Cfph, Llc | Game access device with time varying signal |
US8292741B2 (en) | 2006-10-26 | 2012-10-23 | Cfph, Llc | Apparatus, processes and articles for facilitating mobile gaming |
US9306952B2 (en) | 2006-10-26 | 2016-04-05 | Cfph, Llc | System and method for wireless gaming with location determination |
US8645709B2 (en) | 2006-11-14 | 2014-02-04 | Cfph, Llc | Biometric access data encryption |
US9411944B2 (en) | 2006-11-15 | 2016-08-09 | Cfph, Llc | Biometric access sensitivity |
US8510567B2 (en) | 2006-11-14 | 2013-08-13 | Cfph, Llc | Conditional biometric access in a gaming environment |
WO2008059742A1 (en) * | 2006-11-14 | 2008-05-22 | Semiconductor Energy Laboratory Co., Ltd. | Article management system |
US20100065625A1 (en) * | 2006-11-22 | 2010-03-18 | Anton Sabeta | Optical device having a data carrier |
US20100259719A1 (en) * | 2006-11-22 | 2010-10-14 | Anton Sabeta | Method and System for Determining the Orientation of an Ophthalmic Lens |
US8628019B2 (en) * | 2007-01-03 | 2014-01-14 | Actividentity, Inc. | Configurable digital badge holder |
JP5073312B2 (ja) * | 2007-02-16 | 2012-11-14 | 株式会社日立製作所 | Icタグシステム |
US8319601B2 (en) | 2007-03-14 | 2012-11-27 | Cfph, Llc | Game account access device |
US9183693B2 (en) | 2007-03-08 | 2015-11-10 | Cfph, Llc | Game access device |
US8581721B2 (en) | 2007-03-08 | 2013-11-12 | Cfph, Llc | Game access device with privileges |
JP5040620B2 (ja) * | 2007-11-29 | 2012-10-03 | ソニー株式会社 | 通信システム並びに通信装置 |
JP5500779B2 (ja) * | 2008-04-01 | 2014-05-21 | キヤノン株式会社 | 無線通信装置およびその制御方法、プログラム |
US8044565B2 (en) * | 2008-08-29 | 2011-10-25 | Federal-Mogul Ingnition Company | Composite ceramic electrode and ignition device therewith |
JP5433280B2 (ja) * | 2009-04-07 | 2014-03-05 | 日立オムロンターミナルソリューションズ株式会社 | 情報処理装置、携帯型端末、および機能制御プログラム |
US9092768B2 (en) * | 2010-01-11 | 2015-07-28 | R4 Technologies, Llc | Machine retrofits and interactive soda fountains |
JP5396295B2 (ja) * | 2010-01-28 | 2014-01-22 | 東日本旅客鉄道株式会社 | 端末装置及び登録方法 |
DE102010047257A1 (de) * | 2010-03-03 | 2011-09-08 | Patrick Ams | Mobilfunkbasiertes Transaktionssystem |
US8956231B2 (en) | 2010-08-13 | 2015-02-17 | Cfph, Llc | Multi-process communication regarding gaming information |
US8974302B2 (en) | 2010-08-13 | 2015-03-10 | Cfph, Llc | Multi-process communication regarding gaming information |
US10453055B2 (en) * | 2012-02-12 | 2019-10-22 | Cytherean Mandelbrot LLC | Method for secure electronic tender |
KR101196751B1 (ko) * | 2012-04-23 | 2012-11-07 | 엘지전자 주식회사 | 이동 단말기 및 그것의 제어 방법 |
CN104126189A (zh) * | 2012-07-16 | 2014-10-29 | 美新纳瑞私人有限公司 | 交易的授权 |
JP6135079B2 (ja) * | 2012-09-14 | 2017-05-31 | 株式会社リコー | 伝送システム、伝送管理システムおよびプログラム |
JP6384137B2 (ja) * | 2014-03-03 | 2018-09-05 | 大日本印刷株式会社 | 情報処理装置、情報処理方法、情報処理プログラム、及び情報処理システム |
DE102014104755A1 (de) * | 2014-04-03 | 2015-10-08 | Bundesdruckerei Gmbh | Verfahren zum Authentifizieren eines Benutzers eines Mobilgerätes |
DE102014209459A1 (de) * | 2014-05-19 | 2015-11-19 | Siemens Aktiengesellschaft | Verfahren zur Authentifizierung für mobile Geräte mit Zugangskontrolle |
GB201506135D0 (en) * | 2015-04-10 | 2015-05-27 | Mastercard International Inc | Vending machine transactions |
JP6797653B2 (ja) * | 2016-12-05 | 2020-12-09 | 株式会社東芝 | 入出場管理装置、入出場管理システム、入出場管理方法、およびプログラム |
CN106971437B (zh) * | 2017-03-30 | 2019-07-23 | 东华大学 | 一种常开式快速通过闸机系统 |
JP6922767B2 (ja) * | 2018-02-02 | 2021-08-18 | オムロン株式会社 | ゲート装置 |
US11210676B2 (en) | 2019-07-01 | 2021-12-28 | Capital One Services, Llc | System and method for augmented reality display of account information |
US10748364B1 (en) * | 2019-07-16 | 2020-08-18 | Sensormatic Electronics, LLC | Methods and systems for access control |
US10888940B1 (en) | 2019-12-20 | 2021-01-12 | Capital One Services, Llc | Systems and methods for saw tooth milling to prevent chip fraud |
US11049822B1 (en) | 2019-12-20 | 2021-06-29 | Capital One Services, Llc | Systems and methods for the use of fraud prevention fluid to prevent chip fraud |
US10817768B1 (en) | 2019-12-20 | 2020-10-27 | Capital One Services, Llc | Systems and methods for preventing chip fraud by inserts in chip pocket |
US10977539B1 (en) | 2019-12-20 | 2021-04-13 | Capital One Services, Llc | Systems and methods for use of capacitive member to prevent chip fraud |
US10810475B1 (en) | 2019-12-20 | 2020-10-20 | Capital One Services, Llc | Systems and methods for overmolding a card to prevent chip fraud |
US11715103B2 (en) | 2020-08-12 | 2023-08-01 | Capital One Services, Llc | Systems and methods for chip-based identity verification and transaction authentication |
US11544517B2 (en) * | 2020-10-03 | 2023-01-03 | MHG IP Holdings, LLC | RFID antenna |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0360543A (ja) * | 1989-07-28 | 1991-03-15 | Nec Corp | 自動車電話端末装置 |
JPH04155471A (ja) * | 1990-10-19 | 1992-05-28 | Oki Electric Ind Co Ltd | 取引認証方式 |
JPH04306760A (ja) * | 1991-04-03 | 1992-10-29 | Nippon Telegr & Teleph Corp <Ntt> | カード類の所有者確認方法 |
JPH06320891A (ja) * | 1993-05-17 | 1994-11-22 | Ohbayashi Corp | Idカードの防護方法 |
JPH0964967A (ja) * | 1995-08-21 | 1997-03-07 | Saitama Nippon Denki Kk | 携帯電話機のダイヤルロックシステム |
JPH0998480A (ja) * | 1995-09-29 | 1997-04-08 | Sanyo Electric Co Ltd | 携帯通信装置 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5212810A (en) * | 1989-06-19 | 1993-05-18 | Nec Corporation | Terminal equipment of a vehicle radio telephone system |
US5802558A (en) * | 1994-09-30 | 1998-09-01 | Intel Corporation | Method and apparatus for upgrading reprogrammable memory contents in a PCMCIA card |
JP2000003336A (ja) * | 1998-06-16 | 2000-01-07 | Nec Corp | 携帯型データ通信端末装置におけるユーザ認証方法及びユーザ認証システム |
JP2000306005A (ja) * | 1999-02-18 | 2000-11-02 | Matsushita Electric Ind Co Ltd | 電子バリュー活用システム、電子バリュー活用方法およびサーバ装置並びに記録媒体 |
US6577229B1 (en) * | 1999-06-10 | 2003-06-10 | Cubic Corporation | Multiple protocol smart card communication device |
US6412068B1 (en) * | 1999-07-07 | 2002-06-25 | Dell Products, L.P. | Card management bus and method |
US20020013831A1 (en) * | 2000-06-30 | 2002-01-31 | Arto Astala | System having mobile terminals with wireless access to the internet and method for doing same |
-
2002
- 2002-04-17 JP JP2002584251A patent/JP4711039B2/ja not_active Expired - Lifetime
- 2002-04-17 US US10/124,524 patent/US20020174336A1/en not_active Abandoned
- 2002-04-17 WO PCT/JP2002/003789 patent/WO2002086808A1/ja active Application Filing
-
2008
- 2008-05-07 JP JP2008145098A patent/JP4789092B2/ja not_active Expired - Lifetime
-
2011
- 2011-05-02 JP JP2011102899A patent/JP2011192294A/ja active Pending
- 2011-05-02 JP JP2011102900A patent/JP2011210268A/ja not_active Withdrawn
- 2011-05-02 JP JP2011102898A patent/JP2011210267A/ja active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0360543A (ja) * | 1989-07-28 | 1991-03-15 | Nec Corp | 自動車電話端末装置 |
JPH04155471A (ja) * | 1990-10-19 | 1992-05-28 | Oki Electric Ind Co Ltd | 取引認証方式 |
JPH04306760A (ja) * | 1991-04-03 | 1992-10-29 | Nippon Telegr & Teleph Corp <Ntt> | カード類の所有者確認方法 |
JPH06320891A (ja) * | 1993-05-17 | 1994-11-22 | Ohbayashi Corp | Idカードの防護方法 |
JPH0964967A (ja) * | 1995-08-21 | 1997-03-07 | Saitama Nippon Denki Kk | 携帯電話機のダイヤルロックシステム |
JPH0998480A (ja) * | 1995-09-29 | 1997-04-08 | Sanyo Electric Co Ltd | 携帯通信装置 |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004220402A (ja) * | 2003-01-16 | 2004-08-05 | Nec Corp | Eコマース認証システムおよび方法 |
JP2004206677A (ja) * | 2003-07-31 | 2004-07-22 | Toyomaru Industry Co Ltd | 監視システム及びicタグを備えた装置 |
JP2005135421A (ja) * | 2003-10-31 | 2005-05-26 | Lg Electronics Inc | 携帯端末機のsimカード制御装置及びその方法 |
JP2005152155A (ja) * | 2003-11-21 | 2005-06-16 | J Morita Tokyo Mfg Corp | 歯科用チェアユニットの安全装置 |
JP2005159958A (ja) * | 2003-11-28 | 2005-06-16 | Sony Corp | 無線情報通信システム,ユーザ端末,通信目的装置,無線情報通信方法,およびプログラム |
JP4539082B2 (ja) * | 2003-11-28 | 2010-09-08 | ソニー株式会社 | 無線情報通信方法 |
JP2005182506A (ja) * | 2003-12-19 | 2005-07-07 | Ytb:Kk | 処方箋ダウンロードシステム |
JP2005202650A (ja) * | 2004-01-15 | 2005-07-28 | Casio Comput Co Ltd | 認証システム |
JP2005215324A (ja) * | 2004-01-29 | 2005-08-11 | Vision Megane:Kk | Rfidチップ付き眼鏡及び眼鏡情報管理システム |
JP2007522580A (ja) * | 2004-02-12 | 2007-08-09 | プリサイス バイオメトリクス アクチボラゲット | 無線データ転送をするためのポータブルデータキャリア、外部装置、システムおよび方法 |
JP4792405B2 (ja) * | 2004-02-12 | 2011-10-12 | プリサイス バイオメトリクス アクチボラゲット | 無線データ転送をするためのポータブルデータキャリア、外部装置、システムおよび方法 |
US7961913B2 (en) | 2004-02-12 | 2011-06-14 | Precise Biometrics Ab | Portable data carrier, external arrangement, system and methods for wireless data transfer |
JP2005267273A (ja) * | 2004-03-18 | 2005-09-29 | Japan Tobacco Inc | 自動販売機および自動販売機システム |
JP2006113719A (ja) * | 2004-10-13 | 2006-04-27 | Sharp Corp | 携帯型電子機器およびその認証方法、該機器用収容器、通信システム、制御プログラム、および該プログラムを記録した記録媒体 |
JP4725076B2 (ja) * | 2004-10-22 | 2011-07-13 | 日本電気株式会社 | 携帯端末の認証システムおよび携帯端末 |
JP2011090693A (ja) * | 2004-10-22 | 2011-05-06 | Nec Corp | 携帯端末の認証システムおよび携帯端末 |
JP2006119947A (ja) * | 2004-10-22 | 2006-05-11 | Nec Corp | 携帯端末の認証システム |
JP2006172040A (ja) * | 2004-12-15 | 2006-06-29 | Hitachi Information Systems Ltd | Rfid認証システムおよびrfid認証方法およびそのためのプログラム |
JP2006343968A (ja) * | 2005-06-08 | 2006-12-21 | Giga-Byte Technology Co Ltd | 無線認証ログインシステムの方法 |
JP2007148950A (ja) * | 2005-11-30 | 2007-06-14 | Hitachi Ltd | 情報処理装置 |
US9524405B2 (en) | 2005-12-21 | 2016-12-20 | Koninklijke Philips N.V. | Collaborating RFID devices |
JP2009521041A (ja) * | 2005-12-21 | 2009-05-28 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Rfidシステムにおける通信を制御する方法、rfid装置及びrfidシステム |
JP2007249303A (ja) * | 2006-03-13 | 2007-09-27 | Omron Corp | 監視システム、その端末装置、主制御装置、端末装置の登録方法およびプログラム |
US8400276B2 (en) | 2006-03-13 | 2013-03-19 | Omron Corporation | Monitoring system, terminal device and main control device thereof, and method and program for registering terminal device |
WO2007105553A1 (ja) * | 2006-03-13 | 2007-09-20 | Omron Corporation | 監視システム、その端末装置、主制御装置、端末装置の登録方法およびプログラム |
JP2008009734A (ja) * | 2006-06-29 | 2008-01-17 | Casio Comput Co Ltd | 端末装置及びプログラム |
JP2010508572A (ja) * | 2006-10-30 | 2010-03-18 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | トラステッドプラットフォームモジュールを共有するためのシステム及び方法 |
JP2008211582A (ja) * | 2007-02-27 | 2008-09-11 | Nec Corp | 携帯端末装置、icカード認証制御方法及びプログラム |
JP2009110055A (ja) * | 2007-10-26 | 2009-05-21 | Panasonic Corp | 通信端末及びアクセス制御方法 |
JP2009200638A (ja) * | 2008-02-19 | 2009-09-03 | Ntt Docomo Inc | 携帯端末及び通信方法 |
JP2009223772A (ja) * | 2008-03-18 | 2009-10-01 | Ntt Facilities Inc | 認証システム、可搬媒体、認証装置および認証方法 |
JP2011516922A (ja) * | 2008-03-31 | 2011-05-26 | ジョンソン・アンド・ジョンソン・ビジョン・ケア・インコーポレイテッド | 導電性材料を含む眼科用レンズの形成方法 |
WO2016185868A1 (ja) * | 2015-05-18 | 2016-11-24 | ソニー株式会社 | 記憶装置、リーダライタ、アクセス制御システム、およびアクセス制御方法 |
US10602361B2 (en) | 2015-05-18 | 2020-03-24 | Sony Corporation | Storage device, reader writer, access control system, and access control method |
JP2018157507A (ja) * | 2017-03-21 | 2018-10-04 | 株式会社デンソーウェーブ | 携帯端末 |
Also Published As
Publication number | Publication date |
---|---|
JP2009003927A (ja) | 2009-01-08 |
JP4789092B2 (ja) | 2011-10-05 |
JP2011192294A (ja) | 2011-09-29 |
JP4711039B2 (ja) | 2011-06-29 |
US20020174336A1 (en) | 2002-11-21 |
JP2011210267A (ja) | 2011-10-20 |
JP2011210268A (ja) | 2011-10-20 |
JPWO2002086808A1 (ja) | 2004-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4711039B2 (ja) | 複数の機能を有する多目的携帯端末の安全性確保の方法 | |
US9208634B2 (en) | Enhanced smart card usage | |
KR100815148B1 (ko) | 근거리 무선통신을 이용한 결제보안 시스템 및 방법 | |
US10783514B2 (en) | Method and apparatus for use in personalizing identification token | |
US20190392427A1 (en) | Digital transaction system and method with a virtual companion card | |
JP2005528662A (ja) | 生体認証使用者確認を使用する使用者装着可能な無線トランザクション装置 | |
CA2651821A1 (en) | System and method for activating telephone-based payment instrument | |
EP3105727A1 (en) | Management of indentities in a transaction infrastructure | |
AU2022279536A1 (en) | Detecting unauthorized usage | |
Fancher | Smart cards | |
AU2022283711A1 (en) | System and method for secure transacting | |
AU2022291488A1 (en) | Apparatus and method for communicating with a digital transaction processing unit (dtpu) | |
KR20010009217A (ko) | 화폐 지불 수단과 결합된 이동 통신용 단말기 및 그것을 위한서비스 방법 | |
WO2013001133A1 (en) | Bank-card fraud detection and prevention for bank automats | |
KR101713956B1 (ko) | 금융카드 | |
KR20070061348A (ko) | 개인 인증을 하는 스마트 카드 장치, 스마트 카드 처리단말 시스템 및 개인 인증 방법 | |
KR20060125033A (ko) | 지문인식을 이용한 아이씨카드 활성화/비활성화 장치 | |
KR101025621B1 (ko) | 무선단말기내 선불카드기능 충전 방법 | |
KR200393978Y1 (ko) | 지문인식을 이용한 아이씨카드 활성화/비활성화 장치 | |
KR20190007196A (ko) | 카드 소유자의 신원 확인을 이용하여 카드 동작 및 디지털 지갑 교환 제어를 위한 장치 및 방법 | |
GB2571305A (en) | Security of contactless cards and data tags | |
WO2017127881A1 (en) | Apparatus and method for directly communicating with a digital transaction processing unit (dtpu) | |
OA17840A (en) | Management of identifies in a transaction infrastructure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002584251 Country of ref document: JP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase |