Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication system

An authentication system and object technology, applied in the field of authentication systems, can solve the problem that the authentication execution device cannot obtain distance information, etc.

Inactive Publication Date: 2007-12-19
HITACHI LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if the distance information is sent to the authentication execution information through the second transmission and reception, the authentication execution device cannot obtain the distance information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system
  • Authentication system
  • Authentication system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment approach

[0059] FIG. 1 is a block diagram showing a configuration example of an authentication system according to a first embodiment of the present invention.

[0060] The authentication system of the first embodiment includes a server 100 , a network 200 , a base station 300 , an authentication execution device (reader) 400 , an authentication target device (tag) 600 , and a control target (gate) 701 . Furthermore, there is no limit to the number of base stations, readers, tags and gates, there may be more than one. Therefore, in the structural example shown in FIG. 1 , in addition to the base station 300, there are base stations 390 and 391; in addition to the reader 400, there are also readers 490, 491 and 492; Labels 690, 691 and 692.

[0061] The structure of the base station 300 and other base stations 390 and 391 may be the same. The structure of reader 400 and other readers 490, 491 and 492 may be the same. In addition, the structures of the tag 600 and the other tags 690, ...

Embodiment approach 1

[0136] In addition, it is possible to perform distance measurement with high accuracy compared with the conventional method using GPS. According to Embodiment 1 of the present invention, an accuracy of tens of centimeters can be realized compared to the accuracy of several meters of GPS. In addition, GPS is difficult to use indoors where radio waves from satellites cannot be received, but the first embodiment of the present invention can be easily used indoors.

[0137] In addition, in the first embodiment, unlike the conventional technology using an acceleration sensor, initial setting is not required.

[0138] Furthermore, in the existing method of ranging by a tag, at least 2 communications are required between the tag and the reader. In contrast, in the first embodiment, at least one communication between the tag and the reader is sufficient.

[0139] Moreover, when the authentication data 111 is set appropriately, when the tag 600 tries to unlock the door 701, it is pos...

no. 2 Embodiment approach

[0143] Next, a second embodiment of the present invention will be described. In the first embodiment described above, the distance between the tag and the reader was used as the authentication condition, but in the second embodiment, the authentication condition also includes the direction in which the tag exists.

[0144] The authentication system of the second embodiment includes a server 100 , a network 200 , a base station 300 , an authentication execution device (reader) 400 , an authentication target device (tag) 600 , and a control target (gate) 701 . In the second embodiment, the configurations of the server 100, the base station 30, and the reader 400 are different from those of the first embodiment described above. In addition, the same code|symbol is attached|subjected to the same structure as said 1st Embodiment, and description is abbreviate|omitted.

[0145] The server 100 is connected to the base station 300 through the network 200 . The base station 300 is co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To provide compact, low power consumption authenticating devices and authentication target device, and capable of simultaneous communication for acquiring an identifier, and acquiring distance information. Provided is an authentication system comprising an authenticating device and an authentication target device which communicates by using ultra wide band impulse signals, wherein the authentication system measures the distance between the authenticating device and the authentication target device by using ultra wide band impulse signal to exchange identification information of the authenticating device and identification information of the authentication target device between each device, wherein the authenticating device authenticates the authentication target device based on a combination of the measured distance between the authenticating device and the authentication target device, and the exchanged identification information of the authentication target device, and wherein the authenticating device generate control signal to control a control target based on the authentication results.

Description

technical field [0001] The present invention relates to an authentication system, and more particularly to an authentication system using distance information for authentication conditions. Background technique [0002] In a wireless network system such as a sensor network system, when a repeater or a base station is used as a reader (authentication execution device), if the distance where wireless communication can be performed is long (for example, 30m), the presence All tags within the communicable range are authenticated. For example, in the case of managing entry and exit, the door can be unlocked even at a distance of 30 m from the door, which is not very good in terms of safety. [0003] In order to improve security, a method of limiting the communication distance to a short distance at the time of authentication has been proposed (for example, refer to Patent Document 1 and Patent Document 2). [0004] On the other hand, since there are various authentication targe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K7/00G01S13/76H04Q7/38H04B5/48H04W8/26H04W12/06H04W24/00
CPCH04W12/06H04L63/08H04L63/107H04W24/00H04W8/26Y02D30/70H04W12/068
Inventor 寺田崇秀前木阳宫崎祐行
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products