This application is based on and claims priority under 35 USC 119 from Japanese Patent Application No. 2012-220075 filed Oct. 2, 2012.
The present invention relates to an authentication apparatus, an authentication method, and a non-transitory computer readable medium storing a program.
According to an aspect of the invention, there is provided an authentication apparatus including a detection unit that detects whether or not communication with a portable storage medium storing identification information for identifying a user is able to he performed; a reading unit that reads identification information stored in the storage medium when the detection unit detects that the communication is able to be performed; a time counting unit that counts an elapsed time from the time when the detection unit detects that the communication with the storage medium is unable to he performed to the time when the detection unit detects that the communication is able to be performed again; a determination unit that determines whether or not the elapsed time counted by the time counting unit matches a predefined time for the identification information read by the reading unit; and an authentication unit that authenticates the storage medium with which the detection unit detects that the communication is able to be performed when the determination unit determines that the elapsed time counted by the time counting unit matches the predefined time.
Exemplary embodiments of the present invention will be described in detail based on the following figures, wherein:
Hereinafter, an embodiment of the invention will be described.
Authentication Apparatus
As shown in
In other words, the authentication apparatus 12 has a constituent portion which is a computer capable of performing data reading, an information process such as authentication, and data communication with other devices.
Authentication Program
As shown in
The authentication program 20 is, for example, loaded to the memory 124 of the authentication apparatus 12 via the storage medium 132 (
The authentication program 20 performs an authentication process of the IC card 14 on the basis of the time when the IC card 14 is held over the IC card reading device 134 (
The detection unit 200 detects that the IC card 14 is held over the IC card reading device 134 (
In addition, the detection unit 200 detects that the IC card 14 is separated from the IC card reading device 134 (that is, a state in which communication is unable to be performed with the IC card 14).
In addition, when it is detected that the IC card 14 is held over or the IC card 14 is separated, the detection unit. 200 notifies the time counting unit 204 of performing a timing counting process described later, and notifies the display unit 210 of performing a time display process described later.
The information acquisition unit 202 acquires information stored in the IC card 14 which is held over the IC card reading device 134 (
The information stored in the IC card 14 includes identification information (for example, an ID of an owner) for identifying an owner of the IC card 14.
When the notification is received from the detection unit 200, the time counting unit 204 starts counting time, and, when the notification is received from the detection unit 200 again, the time counting unit 204 finishes counting time, so as to output a counted time (for example, a second number) from the start of the counting to the finish thereof to the determination unit 208, to initialize (for example, 0 seconds) the counted time, and to start counting time again.
In other words, in a case where the time counting unit 204 is notified that the IC card 14 is held over and is notified again that the IC card 14 is separated by the detection unit 200, a counted time which is output to the determination unit 208 indicates the time (hereinafter, referred to as a “held-over time”) when the IC card 14 is held over the IC card reading device 134.
In addition, in a case where the time counting unit 204 is notified that the IC card 14 is separated and is notified again that the IC card 14 is held over by the detection unit 200, a counted time which is output to the determination unit 208 indicates the time (hereinafter, referred to as a “separation time”) when the IC card 14 is separated from the IC card reading device 134.
In addition, the time counting unit 204 outputs a counted elapsed time to the display unit 210 during the time counting.
As shown in
The operation pattern indicates the number of operations in which an operation of an owner of the IC card 14 holding and separating the IC card 14 over and from the IC card reading device 134 is set to one operation, and a held-over time and a separation time in each operation.
For example, as shown in
The determination unit 208 performs a determination process (which will be described in detail with reference to
In addition, the determination unit 208 outputs a determination result to the display unit 210.
When a notification is received from the detection unit. 200, the display unit 210 performs control such that an elapsed time input from the time counting; unit 204 is displayed on the input and output device 126 (
Specifically, for example, the display unit 210 performs control such that an elapsed time input from the time counting unit 204 is displayed on the input and output device 126 as in the following (1) to (4).
(1) When the IC card. 14 is held over the IC card reading device 134, the time counting unit 204 starts counting a held-over time, and thus “0” which is an initial value is displayed as an elapsed time on the input and output device 126 (
(2) When one second has elapsed after the IC card. 14 is held over, “1” is displayed as an elapsed time on the input and output device 126 (
(3) When the IC card 14 is separated from the IC and reading device 134, the time counting unit 204 finishes counting the held-over time and starts counting a separation time, and thus “0” which is an initial value is displayed as an elapsed time on the input and output device 126 (
(4) When one second has elapsed after the IC card. 14 is separated, “1” is displayed as an elapsed time on the input and output device 126 (
In addition, as shown in
In addition, the display unit 210 performs control such that a message or the like corresponding to a determination result from the determination unit 208 is displayed on the input and output device 126 (
Determination on Process
Hereinafter, the determination process by each constituent element will he further described.
When the IC card 14 is held over the IC card reading device 134, the determination unit 208 acquires an ID stored in the IC card 14, input from the information acquisition unit. 202 in step 300 (S300).
In step 302 (S302), the determination unit 208 determines whether or not there is an ID matching the ID acquired in S300 in the operation pattern information stored in the operation pattern storage unit 206 by referring to the operation pattern storage unit 206.
If it is determined that there is a matched ID, the determination unit 208 proceeds to a process in S304, and, otherwise, the determination unit 208 proceeds to a process in S328.
In step 304 (S304), the determination unit 208 initializes the number of operations (for example, 0).
In step 306 (S306), the time counting unit 204 starts counting time (a held-over time).
In step 308 (S308), the determination unit 208 determines whether or not the detection unit 200 detects that there is no card (that is, the IC card 14 is separated from the IC card reading device 134).
If the determination unit 208 determined that the detection unit 200 detects that there is no card, the time counting unit 204 proceeds to a process in S310, and, otherwise, the detection unit 200 returns to the process in S308.
In step 310 (S310), the time counting unit 204 finishes counting time, and outputs the counted time (the held-over time) to the determination unit 208.
In step 312 (S312), the time counting unit 204 starts counting time (a separation time).
In step 314 (S314), the determination unit 208 determines whether or not the detection unit 200 detects that there is a card (that is, the IC card 14 is held over the IC card reading device 134).
If the determination unit 208 determines that the detection unit 200 detects that there is a card, the determination unit 208 proceeds to a process in S316, and, otherwise, the determination unit 208 returns to the process in S314.
In step 316 (S316), the determination unit 208 acquires an ID stored in the IC card 14 detected by the detection unit 200 in S314 from the information acquisition unit 202 and determines whether or not the ID matches the ID acquired in S300.
If the determination unit 208 determines that the ID matches the ID acquired in S300, the time counting unit 204 proceeds to a process in S318, and, otherwise, the determination unit 208 proceeds to a process in S328.
In step 318 (S318), the time counting unit 204 finishes counting time, and outputs the counted time (the separation time) to the determination unit 208.
In step 320 (S320), the determination unit 208 determines whether or not the number of operations is the same as the number of operations defined in an operation pattern corresponding to the ID acquired in S300 in the operation pattern information (
If it is determined that the number of operations is the same as the number of operations defined in the operation pattern, the determination unit 208 proceeds to a process in S324, and, otherwise, the determination unit 208 proceeds to a process in S322.
In step 322 (S322), the determination unit 208 adds one to the number of operations and proceeds to the process in S306.
In step 324 (S324), the determination unit 208 determines whether or not the held-over time and the separation time input from the time counting unit 204 in S310 and S318 match a held-over time and a separation time defined in the operation pattern corresponding to the ID acquired in S300 in the operation pattern information (
For example, in a case where the ID acquired in S300 indicates “1234”, the first to third held-over times acquired in S310 are respectively one second, three seconds, and five seconds, and the first to third separation times acquired in S318 are respectively two second, one second, and two seconds, it is determined that the acquired operation pattern matches the operation pattern (
If it is determined that the operation patterns match each other, the determination unit 208 proceeds to a process in S326, and, otherwise, the determination unit 208 proceeds to a process in S328.
In step 326 (S326), the determination unit 208 authenticates the IC card 14 (
In step 328 (S328), the determination unit 208 outputs a determination result of authentication failure to the display unit 210, and finishes the process.
In addition, in the determination process shown in
In the exemplary embodiment of the invention, the operation pattern stored in the operation pattern storage unit 206 (
The counted number is not limited to every second, and indicates a number counted at a random interval, for example, in a certain case, a counted number varies to 0, 1, . . . , every two seconds, and, in another case, a counted number varies to 0, 1, . . . every three seconds.
For example, in a predefined operation pattern, it is assumed that a counted number indicates 1 when the IC card 14 is held over the IC card reading device 134, and a counted number indicates 2 when the IC card 14 is separated therefrom.
For example, if a counted number displayed on the input and output device 126 indicates “1” under the control of the display unit 210, an owner of the IC card 14 separates the IC card 14 which is held over the IC card reading device 134, and if a counted number which is counted from 0 again indicates “2”, the owner holds the IC card 14 which is separated over the IC card reading device 134. In this case, the operation pattern by the owner of the IC card 14 matches a predefined operation pattern, and thus the IC card 14 is authenticated.
Although, in the exemplary embodiment of the invention, the IC card 14 is authenticated based on an ID for identifying an owner and an operation of holding or separating the IC card 14 (
For example, fingerprint information may be read from the finger of an authentication target person, and the authentication target person may be authenticated based on the fingerprint information and an operation of holding or separating the finger of the authentication target person over or from a fingerprint reading device.
In addition, for example, in a case where authentication for use of a smart phone or the like owned by each person is to be realized, the use of the smart phone may be authenticated based on an operation of putting or separating the finger of the owner on or from a touch panel of the smart phone without using identification information for identifying the owner of the smart phone.
The foregoing description of the exemplary embodiments of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations will be apparent to practitioners skilled in the art. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, thereby enabling others skilled in the art to understand the invention for various embodiments and with the various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the following claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2012-220075 | Oct 2012 | JP | national |
Number | Name | Date | Kind |
---|---|---|---|
4766294 | Nara et al. | Aug 1988 | A |
5857024 | Nishino et al. | Jan 1999 | A |
7134015 | Kulack et al. | Nov 2006 | B2 |
20010053299 | Matsunoshita et al. | Dec 2001 | A1 |
20030054805 | Fujisawa et al. | Mar 2003 | A1 |
20070234429 | Mizutani | Oct 2007 | A1 |
20080104667 | Terada | May 2008 | A1 |
20090300733 | Inomata et al. | Dec 2009 | A1 |
20110102274 | Fujisawa | May 2011 | A1 |
Number | Date | Country |
---|---|---|
2000-132260 | May 2000 | JP |
2008-158778 | Jul 2008 | JP |
A-2010-90582 | Apr 2010 | JP |
2011-013934 | Jan 2011 | JP |
2011-065484 | Mar 2011 | JP |
2011-185005 | Sep 2011 | JP |
Entry |
---|
Dec. 7, 2015 Office Action issued in Japanese Patent Application No. 2012-220075. |
Number | Date | Country | |
---|---|---|---|
20140096191 A1 | Apr 2014 | US |