The present disclosure relates to a server device, a method, and a program for managing restriction on usage of a restricted item.
Hitherto, for example, a system that can unlock a locked door of an entrance of a multi-unit residential building by an operation using a remote control device (for example, an intercom device) or the like installed in each unit included in the multi-unit residential building is known. However, in a multi-unit residential building in which such a system is provided, in a case where delivery personnel or the like pass through a door of an entrance of the multi-unit residential building, it is necessary for a resident of a delivery destination to be present in the multi-unit residential building to perform an operation of unlocking the door of the entrance.
Japanese Patent Publication No. 2021-088919 A discloses a system that can unlock a door of an entrance of a multi-unit residential building without an operation of a resident of a delivery destination when, for example, a delivery worker of a delivery company passes through the door of the entrance of the multi-unit residential building. In the system, a server device stores a service number set by the delivery company, and when an unlocking request including the service number input by the delivery worker is received by a door control device that controls opening and closing of the door, processing of performing authentication by comparison with the service number stored in the server device and unlocking the door is executed. However, in the system, the server device needs to always store the service number issued by the delivery company for authentication of the unlocking request.
An embodiment according to the present disclosure has been made from the background described above, and an object of the present disclosure is to flexibly manage restriction on usage of a restricted item by a person under restriction.
A server device according to the present disclosure is a server device comprising: at least one processor, wherein the at least one processor is configured to execute a computer readable instructions so as to: receive at least one of person-under-restriction related information related to a person under restriction whose usage of a restricted item is restricted or usage related information related to usage of the restricted item by the person under restriction instructed by an instructor; and generate authentication key information generated based on at least one of the received person-under-restriction related information or the received usage related information, the authentication key information being used to authenticate input key information generated based on predetermined input-key generation rule information and the authentication key information and input to the restricted item by the person under restriction, and to release restriction of the restricted item.
Further, a method according to the present disclosure is a method for causing a processor to execute a process the method comprising executing on a processor in a computer the steps of: receiving at least one of person-under-restriction related information related to a person under restriction whose usage of a restricted item is restricted or usage related information related to usage of the restricted item by the person under restriction instructed by an instructor; and generating authentication key information generated based on at least one of the received person-under-restriction related information or the received usage related information, the authentication key information being used to authenticate input key information generated based on predetermined input-key generation rule information and the authentication key information and input to the restricted item by the person under restriction, and to release restriction of the restricted item.
A computer program product embodying computer readable instructions stored on a non-transitory computer-readable storage medium cause a computer to execute a process by at least one processor so as to perform the steps of: receiving at least one of person-under-restriction related information related to a person under restriction whose usage of a restricted item is restricted or usage related information related to usage of the restricted item by the person under restriction instructed by an instructor; and generating authentication key information generated based on at least one of the received person-under-restriction related information or the received usage related information, the authentication key information being used to authenticate input key information generated based on predetermined input-key generation rule information and the authentication key information and input to the restricted item by the person under restriction, and to release restriction of the restricted item.
With the server device, the method, and the program according to the present disclosure, it is possible to flexibly manage restriction on usage of a restricted item by a person under restriction.
Note that the above effects are merely examples for convenience of description, and are not restrictive. In addition to or instead of the above effects, any effect described in the present disclosure or an effect obvious to those skilled in the art can be exhibited.
Hereinafter, a first embodiment of the present disclosure will be described in detail with reference to the drawings. Note that substantially the same or corresponding components, processing, and information in the drawings are denoted by the same reference numerals and names. Further, “information” and “data” are not strictly distinguished from each other. The term “person” means not only one natural person but also a plurality of natural persons, legal persons, organizations, companies, and the like. In addition, “usage” includes various meanings including not only actually holding and using a restricted item, such as entrance and exit through a door, using an item, lending and borrowing an item, or the like, but also being present in a space of the restricted item.
In addition, in the drawings, the number and types of components and data are exemplarily illustrated, and are increased or decreased or changed as appropriate. In addition, in the drawings, the order of communication among devices is exemplarily illustrated, and is appropriately changed. Further, in the drawings, components not related to the essential description of the invention may be omitted as appropriate. Furthermore, in the drawings, for convenience of illustration, some of names of components and various types of information such as “information” may be appropriately omitted.
The instructor terminal device 100-1 is held by an instructor and receives an operation input from the instructor. The person-under-restriction terminal device 100-3 is held by a person under restriction and receives an operation input from the person under restriction. The server device 200 manages restriction on usage of the restricted item 3 by the person under restriction. The person-under-restriction management device 300 manages and controls each person-under-restriction terminal devices 100-3 in a case where each of a plurality of persons under restriction holds the person-under-restriction terminal device 100-3. The communication network 14 connects the components in at least one of a wired manner and a wireless manner, and is implemented by the Internet, a WAN, a VPN, a LAN, or the like.
Hereinafter, when it is not necessary to distinguish the instructor terminal device 100-1, the restricted item terminal device 100-2, and the person-under-restriction terminal device 100-3, the instructor terminal device 100-1, the restricted item terminal device 100-2, and the person-under-restriction terminal device 100-3 are collectively referred to as a terminal device 100.
In the present embodiment, in a case where each of a plurality of persons under restriction holds the person-under-restriction terminal device 100-3 or in a case where a predetermined service is requested to the person under restriction, the system 1 can be suitably executed by the presence of the person-under-restriction management device 300 and the instructor terminal device 100-1, but the person-under-restriction management device 300 and the instructor terminal device 100-1 may be provided as necessary and do not have to be necessarily provided.
Restriction on usage of the restricted item 3 by the person under restriction in the system 1 will be described with specific examples. However, it is a matter of course that examples of the restriction on the usage are not limited to those described below, and can be similarly applied to other uses.
(A) a Case where the Restricted Item 3 is a Door of an Entrance of a Multi-Unit Residential Building (an Example of Package Delivery)
Typically, the restricted item 3 may be a door of an entrance of a multi-unit residential building, the person under restriction may be a delivery company or a delivery worker of the delivery company, and the instructor may be a resident of each unit of the multi-unit residential building and a requester who has directly or indirectly requested the delivery company to deliver a package. In such a case, input key information for unlocking the locked door of the entrance of the multi-unit residential building is transmitted as a four-digit number, for example, from the server device 200 directly or via the person-under-restriction management device 300 to the person-under-restriction terminal device 100-3 held and used by the delivery worker who delivers the package.
When the input key information is received from the server device 200, the person-under-restriction terminal device 100-3 outputs the received input key information to a display. The delivery worker views the input key information output to the person-under-restriction terminal device 100-3 and inputs the input key information to the restricted item terminal device 100-2. The restricted item terminal device 100-2 or the server device 200 performs authentication of the input key information. When the authentication succeeds, the locked door of the entrance of the multi-unit residential building is unlocked. As a result, the delivery worker can deliver the package to the unit of the requester who is the instructor by passing through the door of the entrance of the multi-unit residential building. On the other hand, when the authentication fails, the door of the entrance of the multi-unit residential building is not unlocked and remains locked. Therefore, the delivery worker cannot pass through the door of the entrance of the multi-unit residential building.
In this example, a case where the requester requests the delivery company to deliver the package is described. However, for example, the system 1 can be similarly used in a case where a product is purchased by a mail order such as a so-called e-commerce service and the product is delivered.
(B) A Case where the Restricted Item 3 is a Door of an Entrance of a Multi-Unit Residential Building (an Example of Housekeeping Service)
Typically, the restricted item 3 may be a door of an entrance of a multi-unit residential building, the person under restriction may be a housekeeping agent or a housekeeper from the housekeeping agent, and the instructor may be a resident of each unit of the multi-unit residential building and a requester who has requested the housekeeping agent to perform housekeeping. In such a case, input key information for unlocking the locked door of the entrance of the multi-unit residential building is transmitted as a four-digit number, for example, from the server device 200 directly or via the person-under-restriction management device 300 to the person-under-restriction terminal device 100-3 held and used by the housekeeper.
When the input key information is received from the server device 200, the person-under-restriction terminal device 100-3 outputs the received input key information to a display. The housekeeper views the input key information output to the person-under-restriction terminal device 100-3 and inputs the input key information to the restricted item terminal device 100-2. The restricted item terminal device 100-2 or the server device 200 performs authentication of the input key information. When the authentication succeeds, the locked door of the entrance of the multi-unit residential building is unlocked. As a result, the housekeeper can go to the unit of the requester who is the instructor by passing through the door of the entrance of the multi-unit residential building. On the other hand, when the authentication fails, the door of the entrance of the multi-unit residential building is not unlocked and remains locked. Therefore, the housekeeper cannot pass through the door of the entrance of the multi-unit residential building.
(C) A Case where the Restricted Item 3 is a Shared Bicycle
Typically, the restricted item 3 may be a shared bicycle that can be used by applying for use among a plurality of users registered in advance, and the person under restriction may be a user who desires to use the shared bicycle. In such a case, input key information for unlocking the shared bicycle is transmitted as a four-digit number, for example, from the server device 200 to the person-under-restriction terminal device 100-3 held and used by the user. In this case, the user himself/herself instructs usage of the shared bicycle that is the restricted item 3. That is, the person under restriction and the instructor are the same person. Similarly, the person-under-restriction terminal device 100-3 and the instructor terminal device 100-1 can be the same device.
When the input key information is received from the server device 200, the person-under-restriction terminal device 100-3 outputs the received input key information to a display. The user views the input key information output to the person-under-restriction terminal device 100-3 and inputs the input key information to the restricted item terminal device 100-2. The restricted item terminal device 100-2 or the server device 200 performs authentication of the input key information. Then, when the authentication succeeds, the locked shared bicycle is unlocked, and the user can use the shared bicycle. On the other hand, when the authentication fails, the shared bicycle is not unlocked and remains locked. Therefore, the usage of the shared bicycle by the user remains restricted.
(D) A Case where the Restricted Item 3 is a Conference Booth
Typically, the restricted item 3 may be a conference booth that can be lent in a time unit for conference use or the like, and the person under restriction may be a user who intends to use the booth. In such a case, input key information for unlocking the conference booth is transmitted as a four-digit number, for example, from the server device 200 to the person-under-restriction terminal device 100-3 held and used by the user. The user himself/herself instructs usage of the conference booth that is the restricted item 3. The person under restriction is the user himself/herself. That is, the person under restriction and the instructor are the same person. Similarly, the person-under-restriction terminal device 100-3 and the instructor terminal device 100-1 can be the same device.
When the input key information is received from the server device 200, the person-under-restriction terminal device 100-3 outputs the received input key information to a display. The user views the input key information output to the person-under-restriction terminal device 100-3 and inputs the input key information to the restricted item terminal device 100-2. The restricted item terminal device 100-2 or the server device 200 performs authentication of the input key information. Then, when the authentication succeeds, the conference booth is unlocked, and the user can use the conference booth. On the other hand, when the authentication fails, the conference booth is not unlocked and remains locked. Therefore, the usage of the conference room remains restricted for the user.
In the above example, a case where the restricted item 3 is a door of an entrance of a multi-unit residential building, a shared bicycle, or a conference booth has been described. However, it is a matter of course that examples of the restricted item 3 are naturally not limited thereto, and the system 1 can be suitably applied to any item as long as usage thereof by the person under restriction needs to be restricted as represented by a door of an entrance of each unit of a multi-unit residential building, a door of a detached house, a space having a predetermined size and having at least one side partitioned by a wall or the like, such as a conference room, a hotel room, an entrance of an office building, or a coin locker, an entrance of such a space, and an item that can be lent, such as a rental car or a rental construction machine.
Hereinafter, a case in which the person under restriction is a delivery worker of a delivery company who is requested to deliver a package according to an instruction of the instructor, the instructor is a user who requests the delivery company to deliver the package, and the restricted item is the door 30 (
Each component of the system 1 will be described below.
Hereinafter, a configuration of the terminal device 100 including the instructor terminal device 100-1, the restricted item terminal device 100-2, and the person-under-restriction terminal device 100-3 illustrated in
As illustrated in
Examples of the output interface 111 include output devices such as a speaker and a display (not illustrated), and a connection terminal serving as an interface for connecting to the output devices. The output interface 111 functions as an output unit that receives an instruction from the processor 112 and outputs various types of information. In a case where the output interface 111 is a display, the output interface 111 functions as a display unit that performs various types of display for managing restriction on usage of the restricted item according to the present embodiment according to an instruction of the processor 112. Examples of such a display include a liquid crystal display or an organic EL display. In a case where the output interface 111 is a speaker, the output interface 111 functions as an audio output unit that outputs an audio signal for implementing the restriction on usage of the restricted item according to the present embodiment.
The processor 112 includes at least one central processing unit (CPU) or a combination of at least one CPU and a graphics processing unit (GPU) specialized for image processing, and a peripheral circuit thereof. The processor 112 functions as a control unit that controls other connected components based on various programs stored in the memory 113.
Specifically, the processors 112 of the instructor terminal device 100-1, the restricted item terminal device 100-2, and the person-under-restriction terminal device 100-3 execute a program for managing the restriction on usage of the restricted item according to the present embodiment. That is, these processors 112 execute a program for executing processing for implementing each function described in detail below.
The memory 113 is implemented by a read only memory (ROM), a random access memory (RAM), a nonvolatile memory, a hard disk device (HDD), or the like, and functions as a storage unit. A storage medium, a database, or the like that is attachable to and detachable from the terminal device 100 may be connected to the memory 113.
The ROM stores a predetermined instruction command for executing an application or an operating system (OS) according to the present embodiment as a program. The RAM is a memory in which data required for processing is written and from which data required for processing is read while the program stored in the ROM is processed by the processor 112. The nonvolatile memory is a memory that holds written data without power supply. The processor 112 writes data obtained by executing the program in the nonvolatile memory or reads written data from the nonvolatile memory.
For example, each of the memories 113 of the instructor terminal device 100-1, the restricted item terminal device 100-2, and the person-under-restriction terminal device 100-3 stores a program for implementing the restriction on usage of the restricted item according to the present embodiment.
The communication interface 114 includes a communication processing circuit and an antenna (not illustrated). The communication interface 114 is connected to the communication network 14 via the communication processing circuit and the antenna, and functions as a communication unit that transmits and receives data to and from other devices connected to the communication network 14.
Specifically, the communication interface 114 executes processing of transmitting and receiving necessary information and data to and from other components of the system 1 in order to manage the restriction on usage of the restricted item 3 according to the present embodiment.
The communication interface 114 executes communication processing for communicating information with the communication network 14 via the antenna by a broadband wireless communication method such as LTE or a narrowband wireless communication method such as IEEE802.11 or Bluetooth (registered trademark). The communication interface 114 may perform wired communication instead of or in addition to the wireless communication described above.
The input interface 116 includes an input device 117 such as a touch panel and a hard key as an example, and functions as an input unit that receives an operation input of the user of the terminal device 100.
Hereinafter, configurations of the server device 200 and the person-under-restriction management device 300 illustrated in
As illustrated in
The processor 212 includes at least one central processing unit (CPU) or a combination of at least one CPU and a graphics processing unit (GPU) specialized for image processing, and a peripheral circuit thereof. The processor 212 functions as a control unit that controls other connected components based on various programs stored in the memory 213.
Specifically, the processors 212 of the server device 200 and the person-under-restriction management device 300 execute a program for managing the restriction on usage of the restricted item according to the present embodiment. That is, these processors 212 execute a program for executing processing for implementing each function described in detail below.
In particular, in the server device 200, the processor 212 executes processing of receiving at least one of person-under-restriction related information related to the person under restriction whose usage of the door 30 of the entrance of the multi-unit residential building is restricted or usage related information related to the instructor who indirectly instructs the usage of the door 30 of the entrance of the multi-unit residential building by the delivery company (which means scheduling the usage of the door 30 of the entrance by making a delivery request).
Further, the processor 212 executes processing of generating authentication key information based on at least one of the received person-under-restriction related information or usage related information. When the input key information generated using predefined input-key generation rule information and the authentication key information is input to the restricted item terminal device 100-2 of the restricted item 3, the authentication key information is used to authenticate the input key information that is input and release the restriction of the restricted item 3.
The memory 213 is implemented by a RAM, a ROM, a nonvolatile memory, a HDD, or the like, and functions as a storage unit. The memory 213 stores a program for managing the restriction on usage of the restricted item 3 according to the present embodiment. The ROM stores a predetermined instruction command for executing the processing according to the present embodiment as a program. The RAM is a memory in which data required for processing is written and from which data required for processing is read while the program stored in the ROM is processed by the processor 212. The nonvolatile memory is a memory that holds written data without power supply. The processor 212 writes data obtained by executing the program in the nonvolatile memory or reads written data from the nonvolatile memory.
For example, the memories 213 of the server device 200 and the person-under-restriction management device 300 store a program for managing the restriction on usage of the restricted item 3 according to the present embodiment. In particular, in the server device 200, the memory 213 stores a program for executing processing of receiving at least one of the person-under-restriction related information related to the person under restriction whose usage of the door 30 of the entrance of the multi-unit residential building is restricted or the usage related information related to the instructor who indirectly instructs the usage of the door 30 of the entrance of the multi-unit residential building by the delivery company (which means scheduling the usage of the door 30 of the entrance by making a delivery request).
In addition, the memory 213 stores a program for executing processing of generating the authentication key information based on at least one of the received person-under-restriction related information or usage related information. As described above, when the input key information generated using the predefined input-key generation rule information and the authentication key information is input to the restricted item terminal device 100-2 of the restricted item 3, the authentication key information is used to authenticate the input key information that is input and release the restriction of the restricted item 3.
The communication interface 214 includes a communication processing circuit and an antenna (not illustrated). The communication interface 214 is connected to the communication network 14 via the communication processing circuit and the antenna, and functions as a communication unit that transmits and receives data to and from other devices connected to the communication network 14.
Specifically, the communication interface 214 executes processing of transmitting and receiving necessary information and data to and from other components of the system 1 in order to manage the restriction on usage of the restricted item 3 according to the present embodiment.
The communication interface 214 executes communication processing for communicating information with the communication network 14 via the antenna by a broadband wireless communication method such as LTE or a narrowband wireless communication method such as IEEE802.11 or Bluetooth (registered trademark). The communication interface 214 may perform wired communication instead of or in addition to the wireless communication described above.
The terminal device 100, the server device 200, the person-under-restriction management device 300, and the like included in the system 1 include the above-described components. Each of the devices reads a program stored in a memory included in each device and executes processing by a processor to control other components, thereby executing the following functions.
Examples of the instructor terminal device 100-1 include a portable terminal device such as a smartphone capable of communicating with the communication network 14, a tablet personal computer (PC), a notebook PC, a stationary PC, or the like. The instructor terminal device 100-1 is used by the instructor to request the delivery company to deliver the package, and transmits the request to the person-under-restriction management device 300 operated by the delivery company. In addition, the instructor terminal device 100-1 is used to input the usage related information including personal information of the instructor, an arbitrary character string (including a letter, a symbol, or a combination thereof) of an arbitrary number of digits selected by instruction input by the instructor, and the like, and transmits the input usage related information to the server device 200 and the person-under-restriction management device 300.
The restricted item terminal device 100-2 is typically configured integrally with a door phone used to communicate with an intercom device provided in each unit of the multi-unit residential building, and is disposed to be electrically connected to the door 30 of the entrance of the multi-unit residential building. The restricted item terminal device 100-2 includes, in addition to the components illustrated in
In addition, in some cases, the restricted item terminal device 100-2 transmits the input key information input to the restricted item terminal device 100-2 to the server device 200 for authentication in the server device 200, and receives, from the server device 200, information indicating that the authentication has succeeded and an unlock instruction for unlocking the door 30 of the restricted item 3 once the authentication is performed. In some cases, the restricted item terminal device 100-2 receives input key information generated from the server device 200, compares the input key information with the input key information input to the restricted item terminal device 100-2 to perform authentication, and transmits, to the server device 200, information indicating that the unlock instruction for the door 30 of the restricted item 3 has been issued. In some cases, the restricted item terminal device 100-2 receives the authentication key information and the input-key generation rule information from the server device 200, generates the input key information by itself, performs authentication by comparing the generated input key information with the input key information input to the restricted item terminal device 100-2, and transmits, to the server device 200, information indicating that the unlock instruction for the door 30 of the restricted item 3 has been issued. In some cases, the restricted item terminal device 100-2 receives the authentication key information from the server device 200, receives the input-key generation rule information from the person-under-restriction terminal device 100-3, generates the input key information by itself, performs the authentication by comparing the generated input key information with the input key information input to the restricted item terminal device 100-2, and transmits, to the server device 200, information indicating that the unlock instruction for the door 30 of the restricted item 3 has been issued.
Once the unlock instruction is issued by any of the methods, the restricted item terminal device 100-2 transmits an unlock signal for permitting unlocking of the door 30 of the restricted item 3.
Examples of the person-under-restriction terminal device 100-3 include a portable terminal device such as a smartphone capable of communicating with the communication network 14, a tablet personal computer (PC), a notebook PC, a stationary PC, or the like. However, for example, in a case where the person-under-restriction terminal device 100-3 is held by the delivery worker, a portable terminal device, a tablet PC, or the like that is portable is preferable. Such a person-under-restriction terminal device 100-3 is carried and used by the delivery worker who is employed by the delivery company operating the person-under-restriction management device 300 and delivers a delivery item to a delivery location designated by the instructor according to an instruction of the delivery company.
The person-under-restriction terminal device 100-3 receives input of the person-under-restriction related information related to the person under restriction holding the person-under-restriction terminal device 100-3, and transmits the input person-under-restriction related information to the server device 200.
In addition, the person-under-restriction terminal device 100-3 receives the input key information used to unlock the door 30 from the server device 200, and outputs the received input key information to the display to show the input key information to the delivery worker. As a result, the delivery worker can input the input key information displayed on the person-under-restriction terminal device 100-3 to the restricted item terminal device 100-2. Here, the person-under-restriction terminal device 100-3 receives the input key information from the server device 200, but the input key information may be received via the person-under-restriction management device 300.
In addition, in some cases, the person-under-restriction terminal device 100-3 receives the input-key generation rule information from the server device 200, and further transmits the received input-key generation rule information to the server device 200 that performs authentication. In some cases, the person-under-restriction terminal device 100-3 receives the input-key generation rule information from the server device 200, and transmits the input-key generation rule information received through near field communication or the like to the restricted item terminal device 100-2 that performs authentication.
The server device 200 is, for example, a server device operated by an administrator who manages the restriction on usage of the restricted item 3. The server device 200 stores the input-key generation rule information indicating a logic for generating the input key information from the authentication key information in advance.
The server device 200 receives at least one of the person-under-restriction related information related to the delivery company who manages and operates the person-under-restriction management device 300 or the delivery worker who performs delivery according to the instruction of the delivery company, or the usage related information related to the instructor who makes the delivery request. Thereafter, the server device 200 generates the authentication key information used to generate the input key information by using at least one of the received person-under-restriction related information or the received usage related information. The generation of the authentication key information does not mean generation using only at least one of the person-under-restriction related information or the usage related information. That is, the authentication key information may be generated based on both the person-under-restriction related information and the usage related information, or may be generated based on information other than these pieces of information.
In addition, the server device 200 generates the input key information from the authentication key information by using the input-key generation rule information. In addition, the server device 200 transmits the generated input key information to the person-under-restriction terminal device 100-3. Furthermore, in some cases, the server device 200 receives the input key information input to the restricted item terminal device 100-2 from the restricted item terminal device 100-2 and compares the input key information with the input key information generated in advance, thereby authenticating the delivery worker who has input the input key information to the restricted item terminal device 100-2. In some cases, the server device 200 transmits the generated input key information to the restricted item terminal device 100-2 in order to perform authentication of the input key information input to the restricted item terminal device 100-2. In some cases, the server device 200 transmits the authentication key information and the input-key generation rule information to the restricted item terminal device 100-2 in order to perform authentication of the input key information input to the restricted item terminal device 100-2. In some cases, the server device 200 transmits the input key information and the input-key generation rule information to the person-under-restriction terminal device 100-3, receives the input key information input to the restricted item terminal device 100-2 from the restricted item terminal device 100-2, and receives the input-key generation rule information from the person-under-restriction terminal device 100-3, thereby authenticating the delivery worker who has input the input key information to the restricted item terminal device 100-2. In some cases, the server device 200 transmits the input key information and the input generation rule information to the person-under-restriction terminal device 100-3, and transmits the authentication key information to the restricted item terminal device 100-2 in order to perform authentication of the input key information input to the restricted item terminal device 100-2.
In a case where the server device 200 has performed authentication of the delivery worker who has input the input key information to the restricted item terminal device 100-2, the server device 200 transmits, to the restricted item terminal device 100-2, information indicating that the authentication has succeeded and the unlock instruction for the door 30 of the restricted item 3. In addition, the server device 200 transmits an unlock notification indicating that the door 30 has been unlocked to the instructor terminal device 100-1 that has directly or indirectly issued the delivery instruction to the delivery worker. In a case where the restricted item terminal device 100-2 has performed authentication of the delivery worker who has input the input key information, the server device 200 receives, from the restricted item terminal device 100-2, information indicating that the unlock instruction for the door 30 of the restricted item 3 has been issued. In addition, the server device 200 transmits the unlock notification indicating that the door 30 has been unlocked to the instructor terminal device 100-1 that has directly or indirectly issued the delivery instruction to the delivery worker.
The person-under-restriction management device 300 receives, from the instructor terminal device 100-1, the delivery request from the instructor, and executes processing necessary for causing the delivery worker to deliver the requested package to an address designated by the instructor. The person-under-restriction management device 300 transmits, to the server device 200, the person-under-restriction related information related to the delivery company who operates the person-under-restriction management device 300 and the delivery worker who delivers the package. Further, in a case where the delivery request is received from the instructor terminal device 100-1, the person-under-restriction management device 300 transmits the usage related information included in the delivery request to the server device 200.
In
As an example of the generation of the authentication key information, the person-under-restriction related information and the usage related information described in an arbitrary character string are converted into a numerical value having a predetermined fixed length using a hash function. Next, numerical values obtained by converting the respective pieces of information are added up to obtain the total value of the numerical values. Then, predetermined lower eight digits of the obtained total value are acquired as the authentication key information. The method for generating the authentication key information is merely an example, and it is a matter of course that the present disclosure is not limited to this example.
In addition, various types of person-under-restriction related information and usage related information are used in the generation of the authentication key information, and it is possible to set in advance which information among these pieces of information is to be used and the conversion method for each delivery company. For example, the memory 213 of the server device 200 stores a conversion table in which information to be used for generating the authentication key information and a conversion rule are associated with each piece of delivery company identification information in advance. Then, once the person-under-restriction related information is received, the processor 212 extracts the information to be used for generating the authentication key information and the conversion rule by referring to the conversion table based on the delivery company identification information included in the information. Then, the processor 212 reads necessary information from the person-under-restriction related information and the usage related information based on the extracted information used for generating the authentication key information, and generates the authentication key information according to the extracted conversion rule.
Next, the processor 212 of the server device 200 randomly selects, for example, one piece of input-key generation rule information from a plurality of predefined input-key generation rules. Then, the selected input-key generation rule information is stored in the key information table in association with the generated authentication key information.
Examples of the input-key generation rule include:
The input-key generation rule is merely an example, and it is a matter of course that the present disclosure is not limited thereto.
Next, the processor 212 of the server device 200 or the processor 112 of the restricted item terminal device 100-2 generates the input key information by applying the selected input-key generation rule information to the generated authentication key information. For example, in a case where the input-key generation rule information of “obtaining lower four digits of the value obtained by multiplying the generated authentication key information by the eight-digit number indicating a date when the authentication key is generated” is selected, the processor 212 of the server device 200 or the processor 112 of the restricted item terminal device 100-2 computes the authentication key information which is the eight-digit numerical value according to the rule, and finally obtains the four-digit numerical value as the input key information. The four-digit numerical value is merely an example of the input key information, and it is a matter of course that the input key information is not limited to this example. For example, the numerical value may be converted into an arbitrary character string or may be converted into a number of digits other than four digits.
As described above, in the present embodiment, since the authentication is not performed based only on the input key information, and the authentication key information is generated and used together, the authentication cannot be performed unless both pieces of key information are obtained, so that security can be further improved.
Referring to
The processor 212 converts each of the received person-under-restriction related information and the received usage related information into a numerical value having a fixed length by using a hash function. Then, the processor 212 adds up the numerical values after conversion, and generates, as the authentication key information, lower eight digits determined in advance in the obtained total value. The processor 212 stores the generated eight-digit numerical value in the key information table as the authentication key information. The method for generating the authentication key information is merely an example, and it is a matter of course that the present embodiment is not limited to this example.
Next, the processor 212 of the server device 200 randomly selects, for example, one piece of input-key generation rule information from a plurality of predefined input-key generation rules. Then, the selected input-key generation rule information is stored in the key information table in association with the generated authentication key information. Next, the processor 212 of the server device 200 or the processor 112 of the restricted item terminal device 100-2 generates the input key information (for example, a four-digit numerical value) by applying the selected input-key generation rule information to the generated authentication key information.
In the present embodiment, as described above, a case where when the instructor requests the delivery of the delivery item, the delivery worker of the delivery company who has received the request visits the multi-unit residential building that is the restricted item 3 designated by the instructor, and unlocks the locked door 30 of the entrance of the multi-unit residential building will be described. Six processing patterns are conceivable depending on a difference in information transmitted to the person-under-restriction terminal device 100-3 held by the delivery worker who is the person under restriction whose usage (that is, passage) of the door 30 is limited and a device that performs authentication, and thus, each of the processing patterns will be described below. It is a matter of course that the six processing patterns are examples, and the processing patterns according to the present embodiment are not limited to only the six processing patterns.
(A) a Case where Only the Input Key Information is Transmitted to the Person-Under-Restriction Terminal Device 100-3
(A-1) A Case where Authentication is Performed by Server Device 200 (the Generated Input Key Information is Stored in the Server Device 200)
Here,
Referring to
Next, the processor 112 displays a selection screen for the method for generating the authentication key information on the display via the output interface 111. Here, as illustrated in (d) of
Referring to
Here, it is also possible to newly select an arbitrary character string having an arbitrary number of digits and use the character string as the usage related information associated with the instructor, in addition to selecting the usage related information from pieces of predetermined information. Such a character string may be in a text format, a word, a phrase, a symbol, a number, katakana, hiragana, kanji, an alphabet, other characters, or a combination thereof. Furthermore, in addition to the authentication of the authentication key information and the input key information, usage of a temporarily available one-time code and encryption processing may be selectable by the instructor. In this manner, as a one-time code or an arbitrary character string can be used as the usage related information used for generating the authentication key information, the security can be further improved.
The service content and the usage related information selected in
Referring back to
Once the request content is received from the instructor terminal device 100-1, the processor of the person-under-restriction management device 300 selects the delivery worker who is the person under restriction according to the request content, and transmits the delivery notification to the person-under-restriction terminal device 100-3 held by the delivery worker (S105). The delivery notification includes the delivery time information, the delivery location information, the delivery item identification information, and the like in addition to information such as the instructor identifier for specifying the instructor of the delivery destination and the name of the instructor. Meanwhile, the processor of the person-under-restriction management device 300 generates the usage related information and the person-under-restriction related information based on the received request content, the person-under-restriction identifier for identifying the selected delivery worker who is the person under restriction, and the like, and transmits the usage related information and the person-under-restriction related information to the server device 200 via the communication interface in association with the service identifier (S106).
The processor 212 of the server device 200 stores the received usage related information, person-under-restriction related information, and request content in the person-under-restriction information table illustrated in
The input key information may be transmitted to the person-under-restriction terminal device 100-3 via the person-under-restriction management device 300. Although not specifically described, for example, the input key information and the input-key generation rule information need to be associated with each delivery item delivered by each delivery worker or each service provided by the delivery worker. Therefore, these pieces of information are transmitted and received together with the service identifier or the restricted item identifier stored in the service information table of
The processor 112 of the person-under-restriction terminal device 100-3 that has received the input key information stores the received input key information in the memory 113 in association with the service identifier. Thereafter, the delivery worker who is the person under restriction holds the person-under-restriction terminal device 100-3 and visits the door 30 (the restricted item 3) of the entrance of the designated multi-unit residential building based on the delivery time information and the delivery location information designated by the delivery notification received from the person-under-restriction management device 300. It is a matter of course that, at this point of time, the door 30 of the entrance, which is the restricted item 3, remains locked, and the delivery worker, who is the person under restriction, cannot pass. Therefore, the person-under-restriction terminal device 100-3 receives the operation input of the delivery worker via the input interface 116, and outputs the input key information received in advance to the display via the output interface 111 (S112). Then, the delivery worker inputs the input key information to the restricted item terminal device 100-2 that is the restricted item 3 with reference to the output input key information.
The processor 112 of the restricted item terminal device 100-2 receives the operation input of the input key information performed with the numeric keypad via the input interface 116, and stores the received input key information in the memory 113 (S114). Then, the processor 112 of the restricted item terminal device 100-2 transmits the input key information to the server device 200 via the communication interface 114 (S116).
Once the input key information is received, the processor 212 of the server device 200 compares the received input key information with the input key information stored in the key information table in the processing of S108. When any one piece of input key information stored in the key information table matches the received input key information, the processor 212 of the server device 200 authenticates the received input key information (S118).
When the input key information is authenticated, the processor 212 of the server device 200 transmits, to the restricted item terminal device 100-2 that has transmitted the input key information, information indicating that the authentication has succeeded and the unlock instruction for the door 30 of the restricted item 3 via the communication interface 114 (S120). In a case where the input key information that is input does not match the input key information stored in the key information table, the authentication fails. In such a case, the processor 212 of the server device 200 transmits information indicating that the authentication has failed to the restricted item terminal device 100-2 to notify the delivery worker of the information indicating the failure via the restricted item terminal device 100-2.
Once the unlock instruction is received, the processor 112 of the restricted item terminal device 100-2 transmits the unlock signal for permitting unlocking of the door 30 of the restricted item 3 according to the received unlock instruction (S122). Once the unlock signal is received, the door 30 whose opening and closing has been restricted is unlocked, and processing of driving the motor to open the door 30 is executed (S124). As a result, the delivery worker who is the person under restriction whose passage through the door 30 that is the restricted item 3 has been restricted can pass through the door 30. The processor 112 of the restricted item terminal device 100-2 may be able to store, in the memory 113, a log indicating that the door 30 has been unlocked in S124. Further, the processor 112 of the restricted item terminal device 100-2 may transmit the log to the server device 200, and the server device 200 may store the log indicating that the door 30 has been unlocked in the memory 213, and may manage the log by the processor 212.
Following the transmission of the unlock instruction, the processor 212 of the server device 200 transmits the unlock notification indicating that the door 30 has been unlocked to the instructor terminal device 100-1 that has requested the delivery, based on the service identifier associated with the authenticated input key information (S126). As a result, the instructor can know that the restriction of the door 30 has been released. The unlock notification in S126 may be transmitted to the instructor terminal device 100-1 in response to the unlock instruction in S120.
Referring to
Next, the processor 212 determines whether or not the person-under-restriction related information, the usage related information, and the request content have been received together with the service identifier from the person-under-restriction management device 300 via the communication interface 214 (S402). In a case where the person-under-restriction related information and the usage related information have been received, the processor 212 stores the received person-under-restriction related information, usage related information, and request content in the person-under-restriction information table, the instructor information table, and the service information table, respectively, in association with the service identifier, and proceeds to the processing of S404. On the other hand, in a case where the person-under-restriction related information, the usage related information, and the request content have not been received, the processor 212 remains in the processing of S402.
The processor 212 generates the authentication key information by reading the person-under-restriction related information and the usage related information received in the processing of S402 from the tables (S404) Such specific generation processing is as described in the items 6(A) and 6(B) above. The processor 212 stores the generated authentication key information in the key information table in association with the service identifier.
The processor 212 randomly selects the input-key generation rule information of a position from among the plurality of pieces of input-key generation rule information, and stores the selected input key generation information in association with the authentication key information generated in the key information table. Then, the processor 212 generates the input key information from the generated authentication key information by using the selected input-key generation rule information (S406). Such specific generation processing is as described in the items 6(A) and 6(B) above. The processor 212 stores the generated input key information in the key information table in association with the previously generated authentication key information.
The processor 212 transmits the generated input key information to the person-under-restriction terminal device 100-3 held by the delivery worker who is the person under restriction specified by the service identifier via the communication interface 214 (S408).
The processor 212 determines whether or not the input key information input to the restricted item terminal device 100-2 by the delivery worker has been received from the restricted item terminal device 100-2 via the communication interface 214 (S410). In a case where the input key information has been received, the processor 212 proceeds to the processing of S414, and in a case where the input key information has not been received, the processor 212 remains in the processing of S410.
Once the input key information is received, the processor 212 compares the received input key information with the input key information in the key information table storing the input key information generated in the processing of S406 (S414) The processor 212 determines that the authentication has succeeded in a case where any one piece of input key information matches the received input key information as a result of the comparison, and the processor 212 determines that the authentication has failed in a case where no input key information matches the received input key information (S416) Then, the processor 212 proceeds to the processing of S418 in a case where the authentication has succeeded, and proceeds to the processing of S422 in a case where the authentication has failed.
The processor 212 transmits, to the restricted item terminal device 100-2 via the communication interface 214, information indicating that the authentication has succeeded and the unlock instruction for the door 30 of the restricted item 3 (S418). In addition, the processor 212 transmits, via the communication interface 214, the unlock notification indicating that the door 30 has been unlocked to the instructor terminal device 100-1 of the instructor who has requested the delivery, based on the service identifier associated with the input key information (S420).
On the other hand, in a case where the authentication in S414 has failed, the processor 212 transmits information indicating that the authentication has failed to the restricted item terminal device 100-2 (S422). In this way, the processing flow ends.
As described above, in the example of the processing illustrated in
(A-2) A Case where Authentication is Performed by the Restricted Item Terminal Device 100-2 (the Input Key Information is Transmitted to the Restricted Item Terminal Device 100-2 in Advance)
The processor 212 of the server device 200 transmits the input key information generated in the processing of S108 together with the service identifier to the restricted item terminal device 100-2 via the communication interface 214 (S140).
Next, the person-under-restriction terminal device 100-3 receives the operation input of the delivery worker via the input interface 116, and outputs the input key information received in advance to the display via the output interface 111 (S112). Then, the delivery worker inputs the input key information to the restricted item terminal device 100-2 that is the restricted item 3 with reference to the output input key information.
The processor 112 of the restricted item terminal device 100-2 receives the operation input of the input key information performed with the numeric keypad via the input interface 116, and stores the received input key information in the memory 113 (S114). Once the input key information is input, the processor 112 of the restricted item terminal device 100-2 compares the input key information with the input key information received in S140. In a case where both pieces of input key information match each other, the processor 112 of the restricted item terminal device 100-2 authenticates the received input key information (S142).
In a case where the input key information is authenticated, the processor 112 of the restricted item terminal device 100-2 transmits the unlock signal for permitting unlocking of the door 30 of the restricted item 3 (S122). Once the unlock signal is received, the door 30 whose opening and closing has been restricted is unlocked, and processing of driving the motor to open the door 30 is executed (S124). As a result, the delivery worker who is the person under restriction whose passage through the door 30 that is the restricted item 3 has been restricted can pass through the door 30.
In addition, the processor 112 of the restricted item terminal device 100-2 transmits, to the server device 200 via the communication interface 114, information indicating that the unlock instruction for the door 30 of the restricted item 3 has been issued, together with the service identifier (S144). Then, the processor 212 of the server device 200 that has received the information executes the processing of S126 illustrated in
Referring to
The processor 212 determines whether or not information indicating that the unlock instruction has been issued from the restricted item terminal device 100-2 via the communication interface 214 within a predetermined period (S442). In a case where the unlock notification information has been received within the predetermined period, the processor 212 transmits, to the instructor terminal device 100-1, the unlock notification indicating that the locked door 30 has been unlocked, similarly to S420 illustrated in
As described above, in the example of the processing illustrated in
(A-3) A Case where Authentication is Performed by the Restricted Item Terminal Device 100-2 (the Authentication Key Information and the Input-Key Generation Rule Information are Transmitted to the Restricted Item Terminal Device 100-2 in Advance)
The processor 212 of the server device 200 transmits, to the restricted item terminal device 100-2 via the communication interface 214, the authentication key information generated in the processing of S108 and the input-key generation rule information in association with the service identifier (S160).
Next, the person-under-restriction terminal device 100-3 receives the operation input of the delivery worker via the input interface 116, and outputs the input key information received in advance to the display via the output interface 111 (S112). Then, the delivery worker inputs the input key information to the restricted item terminal device 100-2 that is the restricted item 3 with reference to the output input key information.
Once the authentication key information and the input-key generation rule information are received from the server device 200, the processor 112 of the restricted item terminal device 100-2 generates the input key information by applying the received input-key generation rule information to the received authentication key information (S162). Next, the processor 112 of the restricted item terminal device 100-2 receives the operation input of the input key information performed with the numeric keypad via the input interface 116, and stores the received input key information in the memory 113 (S114). Once the input key information is input, the processor 112 of the restricted item terminal device 100-2 compares the input key information with the input key information generated in S162. In a case where both pieces of input key information match each other, the processor 112 of the restricted item terminal device 100-2 authenticates the received input key information (S164). The generation of the input key information in S162 may be performed based on the received authentication key information and input-key generation rule information in response to the unlock instruction based on the input key information in S114.
Since the subsequent processing is the same as the processing of S144 and S126 in
Referring to
Since the subsequent processing is the same as the processing of S442 and S420 in
As described above, in the example of the processing illustrated in
(A-4) A Case where Authentication is Performed by the Server Device 200 (a Case where it is not Necessary to Always Store the Generated Input Key Information in the Server Device 200)
Once the input key information input to the restricted item terminal device 100-2 is received from the restricted item terminal device 100-2 in the processing of S116, the processor 212 of the server device 200 reads the authentication key information and the input-key generation rule information stored in the key information table, and regenerates the input key information. Then, once the input key information is regenerated, the processor 212 of the server device 200 compares the received input key information with the regenerated input key information. In a case where both pieces of input key information match each other, the processor 212 of the server device 200 authenticates the received input key information (S180). The service identifier is required to receive the input key information and read the authentication key information and the like. Therefore, the service identifier may be simultaneously input to the restricted item terminal device 100-2 and transmitted together with the input key information, or the service identifier may be transmitted from the person-under-restriction terminal device 100-3 in advance.
Since the subsequent processing is the same as the processing of S120 to S126 in
Referring to
Since the subsequent processing is the same as the processing of S418 and S420 in
As described above, in the example of the processing illustrated in
(B) A Case where the Input Key Information and the Input-Key Generation Rule Information are Transmitted to the Person-Under-Restriction Terminal Device 100-3
(B-1) A Case where Authentication is Performed by the Server Device 200
Once the input-key generation rule information is selected in S108 and the input key information is generated, the processor 212 of the server device 200 transmits these pieces of information to the person-under-restriction terminal device 100-3 via the communication interface 214 in association with the service identifier (S200).
The processor 112 of the person-under-restriction terminal device 100-3 that has received the input key information and the input-key generation rule information stores the received input key information in the memory 113. Thereafter, the delivery worker who is the person under restriction holds the person-under-restriction terminal device 100-3 and visits the door 30 (the restricted item 3) of the entrance of the designated multi-unit residential building based on the delivery time information and the delivery location information designated by the delivery notification received from the person-under-restriction management device 300. Then, in a case where the processor 112 of the person-under-restriction terminal device 100-3 receives the operation input of the delivery worker via the input interface 116, and position information of the person-under-restriction terminal device 100-3 matches information regarding a location of the restricted item terminal device 100-2 or the person-under-restriction terminal device 100-3 is located within a predetermined range from the location, the processor 112 transmits the input-key generation rule information received in advance together with the service identifier to the server device 200 via the communication interface 114 (S202). Once the operation input of the delivery worker is received via the input interface 116, the processor 112 of the person-under-restriction terminal device 100-3 outputs the input key information received in advance to the display via the output interface 111 (S204). The delivery worker inputs the input key information to the restricted item terminal device 100-2 that is the restricted item 3 with reference to the output input key information (S114). The transmission of the input-key generation rule information in S202 is performed by “receiving the operation input of the delivery worker via the input interface 116”, but the operation input may be the same as the operation input in S204. That is, in the same case, it is possible to omit the effort for the operation input of the delivery worker. Further, the operation inputs may be different from each other. In this case, the security can be further improved. Further, automatic transmission of the input-key generation rule information may be performed in S202 instead of the operation input. For example, when a signal transmitted from the restricted item terminal device 100-2 via near field communication or non-contact wireless communication is received, corresponding information may be transmitted via the communication interface 114 of the person-under-restriction terminal device 100-3. In this case, the person under restriction who is the delivery worker does not need to recognize the input-key generation rule information, and the input-key generation rule information is transmitted to the restricted item terminal device 100-2. Therefore, it is possible to avoid a risk of leakage of the input-key generation rule information from the delivery worker. Further, even in a case where the person under restriction who is the delivery worker recognizes only the input key information, the authentication cannot be performed unless the input-key generation rule information can be transmitted to the server device 200. Therefore, the risk of leakage of the input key information from the delivery worker can be avoided, and the security can be further improved. In S202, the processor 112 of the person-under-restriction terminal device 100-3 receives the operation input of the delivery worker via the input interface 116 as a condition for transmitting the input-key generation rule information received in advance together with the service identifier to the server device 200 via the communication interface 114, and the position information of the person-under-restriction terminal device 100-3 matches the information regarding the location of the restricted item terminal device 100-2 or the person-under-restriction terminal device 100-3 is located within the predetermined range from the location. Here, as an example of a method for ensuring that the delivery worker is actually in front of the restricted item terminal device 100-2, the position information of the person-under-restriction terminal device 100-3 is used, but the method is not limited thereto. By adopting such a method, for example, even in a case where the delivery worker is at a location away from the restricted item terminal device 100-2, it is possible to prevent the input-key generation rule information from being transmitted from the person-under-restriction terminal device 100-3 to the server device 200 in response to the operation input via the input interface 116 of the person-under-restriction terminal device 100-3.
The processor 112 of the restricted item terminal device 100-2 receives the operation input of the input key information performed with the numeric keypad via the input interface 116, and stores the received input key information in the memory 113 (S114). Then, the processor 112 of the restricted item terminal device 100-2 transmits the input key information to the server device 200 via the communication interface 114 (S116).
Once the input key information input to the restricted item terminal device 100-2 is received from the restricted item terminal device 100-2 in the processing of S116, the processor 212 of the server device 200 specifies the authentication key information stored in the key information table based on the service identifier, and regenerates the input key information based on the authentication key information and the input-key generation rule information received in S202. Then, once the input key information is regenerated, the processor 212 of the server device 200 compares the received input key information with the regenerated input key information. In a case where both pieces of input key information match each other, the processor 212 of the server device 200 authenticates the received input key information (S206).
Since the subsequent processing is the same as the processing of S120 to S126 in
Referring to
Next, the processor 212 determines whether or not the input-key generation rule information has been received from the person-under-restriction terminal device 100-3 via the communication interface 214 (S482). In a case where it is determined that the input-key generation rule information has been received, the processor 212 proceeds to the processing of S410, and the processor 212 determines whether or not the input key information input to the restricted item terminal device 100-2 by the delivery worker has been received from the restricted item terminal device 100-2 via the communication interface 214 (S410). In a case where the input key information has been received, the processor 212 proceeds to the processing of S484, and in a case where the input key information has not been received, the processor 212 remains in the processing of S410.
The processor 212 regenerates the input key information based on the input-key generation rule information received in S482 and the authentication key information generated in S404. Then, the processor 212 compares the input key information input to the restricted item terminal device 100-2 with the regenerated input key information. In a case where both pieces of input key information match each other, the processor 112 of the restricted item terminal device 100-2 authenticates the received input key information (S484). In a case where both pieces of input key information match each other as a result of the comparison, the processor 212 determines that the authentication has succeeded, and in a case where both pieces of input key information do not match each other, the processor 212 determines that the authentication has failed (S416). Then, the processor 212 proceeds to the processing of S418 in a case where the authentication has succeeded, and proceeds to the processing of S422 in a case where the authentication has failed.
Since the subsequent processing is the same as the processing of S418 to S422 in
As described above, in the example of the processing illustrated in
(B-2) A Case where Authentication is Performed by the Restricted Item Terminal Device 100-2
Once the input key information and the like are transmitted to the person-under-restriction terminal device 100-3 in S220 via the communication interface 114, the processor 212 of the server device 200 transmits the authentication key information generated in S108 to the restricted item terminal device 100-2 together with the service identifier via the communication interface 114 (S222). The transmission of the input key information and the like in S220 and the transmission of the authentication key information in S222 may be performed at the same timing, or any one of the transmissions may be performed first.
The processor 112 of the person-under-restriction terminal device 100-3 that has received the input key information and the input-key generation rule information stores the received input key information in the memory 113. Thereafter, the delivery worker who is the person under restriction holds the person-under-restriction terminal device 100-3 and visits the door 30 (the restricted item 3) of the entrance of the designated multi-unit residential building based on the delivery time information and the delivery location information designated by the delivery notification received from the person-under-restriction management device 300. In a case where the processor 112 of the person-under-restriction terminal device 100-3 receives the operation input of the delivery worker via the input interface 116, and position information of the person-under-restriction terminal device 100-3 matches information regarding a location of the restricted item terminal device 100-2 or the person-under-restriction terminal device 100-3 is located within a predetermined range from the location, the processor 112 transmits the input-key generation rule information received in advance together with the service identifier to the restricted item terminal device 100-2 via the communication interface 114 (S223). In this case, since the person under restriction who is the delivery worker himself/herself transmits the input-key generation rule information to the restricted item terminal device 100-2 without recognizing the input-key generation rule information, a risk that the input-key generation rule information leaks from the delivery worker can be avoided, so that the security can be further improved. Further, even in a case where the person under restriction who is the delivery worker recognizes only the input key information, the authentication cannot be performed unless the person under restriction can transmit the input-key generation rule information to the restricted item terminal device 100-2. Therefore, the risk of leakage of the input key information from the delivery worker can be avoided, and the security can be further improved. Once the authentication key information and the input-key generation rule information are received from the server device 200, the processor 112 of the restricted item terminal device 100-2 generates the input key information by applying the received input-key generation rule information to the received authentication key information (S224).
Once the operation input of the delivery worker is received via the input interface 116, the processor 112 of the person-under-restriction terminal device 100-3 outputs the input key information received in advance to the display via the output interface 111 (S112). The processor 112 of the restricted item terminal device 100-2 receives the operation input of the input key information performed with the numeric keypad via the input interface 116, and stores the received input key information in the memory 113 (S114). The transmission of the input-key generation rule information in S223 is performed by “receiving the operation input of the delivery worker via the input interface 116”, but the operation input may be the same as the operation input in S112. That is, in the same case, it is possible to omit the effort for the operation input of the delivery worker. Further, the operation inputs may be different from each other. In this case, the security can be further improved. Further, automatic transmission of the input-key generation rule information may be performed in S223 instead of the operation input. For example, when a signal transmitted from the restricted item terminal device 100-2 via near field communication or non-contact wireless communication is received, corresponding information may be transmitted via the communication interface 114 of the person-under-restriction terminal device 100-3. As one of the conditions for transmitting the input-key generation rule information to the restricted item terminal device 100-2 in S223, a case where the position information matches the information regarding the location of the restricted item terminal device 100-2 or the person-under-restriction terminal device 100-3 is located within the predetermined range from the location has been described, but the present disclosure is not limited thereto. For example, the input-key generation rule information may be transmitted from the person-under-restriction terminal device 100-3 to the restricted item terminal device 100-2 when the operation input is made by the delivery worker, and the person-under-restriction terminal device 100-3 becomes communicable with the restricted item terminal device 100-2 via the communication interface 114. Here, as an example of a method for ensuring that the delivery worker is actually in front of the restricted item terminal device 100-2, the position information of the person-under-restriction terminal device 100-3 is used, but the method is not limited thereto. By adopting such a method, for example, even in a case where the delivery worker is at a location away from the restricted item terminal device 100-2, it is possible to prevent the input-key generation rule information from being transmitted from the person-under-restriction terminal device 100-3 to the restricted item terminal device 100-2 in response to the operation input via the input interface 116 of the person-under-restriction terminal device 100-3.
Next, once the input key information is input, the processor 112 of the restricted item terminal device 100-2 compares the input key information input in S114 with the input key information generated in S224. In a case where both pieces of input key information match each other, the processor 112 of the restricted item terminal device 100-2 authenticates the received input key information (S226).
In a case where the input key information is authenticated, the processor 112 of the restricted item terminal device 100-2 transmits the unlock signal for permitting unlocking of the door 30 of the restricted item 3 (S122). Once the unlock signal is received, the door 30 whose opening and closing has been restricted is unlocked, and processing of driving the motor to open the door 30 is executed (S124). As a result, the delivery worker who is the person under restriction whose passage through the door 30 that is the restricted item 3 has been restricted can pass through the door 30.
In addition, the processor 112 of the restricted item terminal device 100-2 transmits, to the server device 200 via the communication interface 114, information indicating that the unlock instruction for the door 30 of the restricted item 3 has been issued, together with the service identifier (S144). Then, the processor 212 of the server device 200 that has received the information executes the processing of S126 illustrated in
Referring to
The processor 212 determines whether or not information indicating that the unlock instruction has been issued from the restricted item terminal device 100-2 via the communication interface 214 within a predetermined period (S442). In a case where the unlock notification information has been received within the predetermined period, the processor 212 transmits, to the instructor terminal device 100-1, the unlock notification indicating that the locked door 30 has been unlocked, similarly to S420 illustrated in
As described above, in the example of the processing illustrated in
As described above, in the present embodiment, various types of information can be used in the generation of the input key information used for authentication, and the restricted item can be flexibly managed.
In the first embodiment, a case where a system 1 includes an instructor terminal device 100-1, a person-under-restriction terminal device 100-3, a server device 200, and a person-under-restriction management device 300, and authentication is performed in the server device 200 or a restricted item terminal device 100-2 has been described. In a second embodiment, a case where the system 1 further includes a restricted item management device 400 remotely installed so as to be able to communicate with the restricted item terminal device 100-2 and the like via a communication network 14, and authentication is performed in the server device 200 or the restricted item management device 400 will be described. A configuration, processing, and a procedure of the present embodiment are similar to those of the first embodiment except for points specifically described below. Therefore, a detailed description of these matters is omitted.
A configuration of the restricted item management device 400 is not limited to the following example, but may be similar to a configuration of the server device 200 illustrated in
Hereinafter, different processing patterns will be described depending on a difference in device that performs authentication of a delivery worker who is a person under restriction whose usage (that is, passage) of the door 30 is restricted. It is a matter of course that the six processing patterns are examples, and the processing patterns according to the present embodiment are not limited to only the six processing patterns.
(A) a Case where Only Input Key Information is Transmitted to the Person-Under-Restriction Terminal Device 100-3
(A-1) A Case where Authentication is Performed by Server Device 200 (Generated Input Key Information is Stored in the Server Device 200)
Referring to
A processor 112 of the person-under-restriction terminal device 100-3 that has received the input key information stores the received input key information in a memory 113. Thereafter, the delivery worker who is the person under restriction holds the person-under-restriction terminal device 100-3 and visits the door 30 (the restricted item 3) of the entrance of the designated multi-unit residential building based on the delivery time information and the delivery location information designated by the delivery notification received from the person-under-restriction management device 300. Then, the person-under-restriction terminal device 100-3 receives an operation input of the delivery worker via an input interface 116, and outputs the input key information received in advance to a display via an output interface 111 (S112). The delivery worker inputs the input key information to the restricted item terminal device 100-2 that is the restricted item 3 with reference to the output input key information.
The processor 112 of the restricted item terminal device 100-2 receives the operation input of the input key information performed with the numeric keypad via the input interface 116, and stores the received input key information in the memory 113 (S114). Then, the processor 112 of the restricted item terminal device 100-2 transmits the input key information to the restricted item management device 400 via a communication interface 114 (S224). Once the input key information is received from the restricted item terminal device 100-2 via the communication interface, the processor of the restricted item management device 400 transmits the received input key information to the server device 200 (S264).
Once the input key information is received, the processor 212 of the server device 200 compares the received input key information with the input key information stored in a key information table in the processing of S108. When any one piece of input key information stored in the key information table matches the received input key information, the processor 212 of the server device 200 authenticates the received input key information (S266).
When the input key information is authenticated, the processor 212 of the server device 200 transmits, to the restricted item management device 400 that has transmitted the input key information, information indicating that the authentication has succeeded and an unlock instruction for the door 30 of the restricted item 3 via the communication interface 114 (S120). In a case where the input key information that is input does not match the input key information stored in the key information table, the authentication fails. In such a case, the processor 212 of the server device 200 transmits information indicating that the authentication has failed to the restricted item management device 400 to notify the delivery worker of the information indicating the failure via the restricted item terminal device 100-2.
Once the unlock instruction is received, the processor of the restricted item management device 400 transmits the received unlock instruction to the restricted item terminal device 100-2. Once the unlock instruction is received, the processor 112 of the restricted item terminal device 100-2 transmits an unlock signal for permitting unlocking of the door 30 of the restricted item 3 according to the received unlock instruction (S122). Once the unlock signal is received, the door 30 whose opening and closing has been restricted is unlocked, and processing of driving the motor to open the door 30 is executed (S124). As a result, the delivery worker who is the person under restriction whose passage through the door 30 that is the restricted item 3 has been restricted can pass through the door 30. The subsequent processing is executed in the same manner as in S126 in
As described above, in the example of the processing of
(A-2) A Case where Authentication is Performed by the Restricted Item Management Device 400 (the Input Key Information is Transmitted to the Restricted Item Management Device 400 in Advance)
The processor 212 of the server device 200 transmits the input key information generated in the processing of S108 together with a service identifier to the restricted item management device 400 via the communication interface 214 (S242).
Next, the person-under-restriction terminal device 100-3 receives the operation input of the delivery worker via the input interface 116, and outputs the input key information received in advance to the display via the output interface 111 (S112). Then, the delivery worker inputs the input key information to the restricted item terminal device 100-2 that is the restricted item 3 with reference to the output input key information.
The processor 112 of the restricted item terminal device 100-2 receives the operation input of the input key information performed with the numeric keypad via the input interface 116, and stores the received input key information in the memory 113 (S114). Then, the processor 112 of the restricted item terminal device 100-2 transmits the input key information to the restricted item management device 400 via the communication interface 114 (S224). Once the input key information is received, the processor of the restricted item management device 400 compares the input key information with the input key information received in S242. In a case where both pieces of input key information match each other, the processor of the restricted item management device 400 authenticates the received input key information (S246).
When the input key information is authenticated, the processor of the restricted item management device 400 transmits the unlock instruction for the door 30 of the restricted item 3 to the restricted item terminal device 100-2 via the communication interface (S270), and transmits information indicating that the unlock instruction for the door 30 of the restricted item 3 has been issued to the server device 200 (S272). Since the subsequent processing is the same as S122 to S126 in
As described above, in the example of the processing of
As described above, the processing pattern of
As described above, in the present embodiment, various types of information can be used in the generation of the input key information used for authentication, and the restricted item can be flexibly managed.
In the first embodiment, a case where a delivery request operation for a delivery item is performed by an instructor and the delivery item is delivered to the instructor has been described. In a third embodiment, a case where one user who is an instructor performs a delivery request operation for a delivery item to another user will be described. A typical example of such an example is a case where one user who is an instructor sends a gift to another user through an e-commerce service or the like. A configuration, processing, and a procedure of the present embodiment are similar to those of the first embodiment except for points specifically described below. Therefore, a detailed description of these matters is omitted.
Referring to
Once the request content is received from the instructor terminal device 100-4, a processor of the person-under-restriction management device 300 selects a delivery worker who is a person under restriction according to the request content, and transmits a delivery notification to a person-under-restriction terminal device 100-3 held by the delivery worker (S305). The delivery notification includes delivery time information, the delivery location information, delivery item identification information, and the like in addition to information such as an instructor identifier for specifying one user of the delivery destination and a name of the instructor. Meanwhile, the processor of the person-under-restriction management device 300 generates usage related information and person-under-restriction related information based on the received request content, a person-under-restriction identifier for identifying the selected delivery worker who is the person under restriction, and the like, and transmits the usage related information and the person-under-restriction related information to a server device 200 via a communication interface (S306).
Here, in a case where one user who is the instructor has not subscribed to a service or the like provided by the server device 200 in advance, personal information, address information, or the like of another user, which is the usage related information, may not be sufficiently included in the usage related information received in S306. In such a case, a processor 212 of the server device 200 specifies the usage related information necessary for generating authentication key information, such as the personal information and the address information of another user, by referring to a usage related information table based on the usage related information such as a delivery location received in S306 (307). Then, the processor 212 of the server device 200 reads at least one of the stored person-under-restriction related information or the stored usage related information, and generates the authentication key information from the read information (S108). Since the subsequent processing is the same as S110 to S124 in
The processor 212 of the server device 200 transmits an unlock instruction to a restricted item terminal device 100-2, and then transmits an unlock notification indicating that the unlock instruction for a door 30 has been issued to the user terminal device 100-5 as another user (S126). As a result, another user can know that restriction of the door 30 has been released. As a result, the processing sequence ends. In step S126, not only the unlock notification indicating that the unlock instruction for the door 30 has been issued may be transmitted to the user terminal device 100-5 as another user, but also the unlock notification indicating that the unlock instruction has been issued may be transmitted to the instructor terminal device 100-4. As a result, the restriction of the door 30 is released, and the instructor can know that a package has arrived for another user.
As described above, the processing pattern of
As described above, in the example of the processing of
In the first embodiment, a case where authentication key information and input key information are used for authentication of a person under restriction has been described. In a fourth embodiment, a case where authentication is performed using one-time code information based on the input key information and delivery time information generated based on the authentication key information will be described. A configuration, processing, and a procedure are similar to those of the first embodiment except for points specifically described below. Therefore, a detailed description of these matters is omitted.
A processor 212 of a server device 200 executes processing related to generation of the one-time code information. The one-time code information is code information validated at a predetermined time determined in advance, and the code information includes information regarding a time to be validated. For example, the processor 212 of the server device 200 refers to delivery time information of a delivery that has been requested and delivery company identification information that specifies a delivery company to which a delivery worker who is a person under restriction belongs, based on a request content received from a person-under-restriction management device 300. Then, the processor 212 of the server device 200 determines which one of predetermined time segments (for example, segment 1 for 9:00 to 12:00, segment 2 for 12:00 to 16:00, segment 3 for 16:00 to 18:00, and segment 4 for 18:00 to 20:00) the delivery time information corresponds to. Then, a coefficient corresponding to the specified time segment is multiplied by a value obtained by quantifying the delivery company identification information to acquire the one-time code information. Such time sections are not limited to the four sections, and for example, the time section may be further divided into finer units such as seconds, minutes, hours, days, weeks, or months, or into fewer divisions. In addition, information regarding a specific time actually designated may be used without applying such sections as described above.
That is, the server device 200 is the server device 200 including at least one processor 212, and the at least one processor 212 is configured to execute processing for receiving person-under-restriction related information related to the person under restriction whose usage of a restricted item 3 is restricted and including usage time information related to a time when the person under restriction provides a service, generating the one-time code information validated at a predetermined time specified by the usage time information based on the received person-under-restriction related information, and outputting the generated one-time code information to a person-under-restriction terminal device 100-3 held by the person under restriction via a communication interface 214.
Furthermore, the one-time code information is generated based on company identification information for specifying a company to which the person under restriction providing the service belongs, in addition to the usage time information. That is, the company identification information is not necessarily required in the generation of the one-time code information in the present embodiment, and information capable of identifying the person under restriction or the service provided by the company, other unique identification information, an arbitrary character string, or a combination thereof may be used.
Next, the processor 212 of the server device 200 reads at least one of the person-under-restriction related information or usage related information received and stored in advance in S106, and generates the authentication key information from the read information and the one-time code information generated in S407 (S408). Thereafter, the processor 212 of the server device 200 generates an input key based on the generated authentication key information and selected input-key generation rule information. Since the processing and the processing of S110 to S126 are the same as S110 to S126 of
As described above, the processing pattern of
As described above, in the example of the processing of
In the fourth embodiment, a case where one-time code information generated in advance is used to generate authentication key information and input key information has been described. In a fifth embodiment, authentication of the authentication key information and the input key information is performed, and one-time code information issued at a timing when a person under restriction actually comes in front of a restricted item 3 is used. That is, a case where it is ensured that the person under restriction is in front of a restricted item terminal device 100-2 that is the restricted item 3, and authentication using the input key information, that is, two-stage authentication, is performed will be described. A configuration, processing, and a procedure are similar to those of the fourth embodiment except for points specifically described below. Therefore, a detailed description of these matters is omitted.
A processor 212 of a server device 200 transmits the input key information generated in the processing of S108 to a person-under-restriction terminal device 100-3 via a communication interface 214 (S410).
A processor 112 of the person-under-restriction terminal device 100-3 that has received the input key information stores the received information in a memory 113. Thereafter, the delivery worker who is the person under restriction holds the person-under-restriction terminal device 100-3 and visits the door 30 (the restricted item 3) of the entrance of the designated multi-unit residential building based on the delivery time information and the delivery location information designated by the delivery notification received from the person-under-restriction management device 300. Then, the person-under-restriction terminal device 100-3 receives an operation input of the delivery worker via an input interface 116, and outputs the received input key information to a display via an output interface 111. Then, the delivery worker inputs the input key information via the input interface 116 of the person-under-restriction terminal device 100-3 with reference to the output input key information (S414). Once the input key information is input via the input interface 116, the processor 112 of the person-under-restriction terminal device 100-3 transmits the received input key information together with a one-time code issuance request to the server device 200 via a communication interface 114 (S416). The processor 212 of the server device 200 performs authentication based on the input key information received in S118 and the input key information generated in S108 (S118). Then, in a case where the authentication has succeeded, the processor 212 of the server device 200 generates the one-time code information in response to the one-time code issuance request received in S416, and stores the one-time code information in a memory 213 (S419). The processor 212 of the server device 200 transmits the generated one-time code information to the person-under-restriction terminal device 100-3 via the communication interface 114 (S420). The person-under-restriction terminal device 100-3 outputs the received one-time code information to a display via the output interface 111. The delivery worker inputs the input key information to the restricted item terminal device 100-2 that is the restricted item 3 via the input interface 116 with reference to the output one-time code information (S421).
The processor 112 of the restricted item terminal device 100-2 receives the one-time code information input using a numeric keypad via the input interface 116, and transmits the received one-time code information to the server device 200 via the communication interface 114 (S422).
The processor 212 of the server device 200 compares the one-time code information stored in the memory 213 with the one-time code information received in S421, and authenticates that the delivery worker who has performed the input is actually in front of the restricted item terminal device 100-2 that is the restricted item 3 in a case where the pieces of one-time code information match each other (S423).
Since the subsequent processing is the same as S120 to S126 in
In addition, as described above, the processing pattern of
In the present embodiment, the one-time code information is used as an example of a method for ensuring that the delivery worker is actually in front of the restricted item terminal device 100-2, but the present disclosure is not limited to this method.
As another method for ensuring that the delivery worker is actually in front of the restricted item terminal device 100-2, it is also possible to simultaneously perform the authentication using the one-time code information of
Furthermore, as another method for ensuring that the delivery worker is actually in front of the restricted item terminal device 100-2, a method of executing the steps of processing related to the authentication illustrated in
In addition, although the method of performing the authentication by the server device 200 has been described as the method using the recording medium information, the authentication may be performed by the restricted item terminal device 100-2 or the restricted item management device 400 as in the above-described embodiments.
As described above, in the example of the processing of
In the first embodiment, a case where person-under-restriction related information and usage related information in S106 are automatically transmitted from a person-under-restriction management device 300 to a server device 200 has been described with reference to
Once the transmission request is received, a processor of the person-under-restriction management device 300 extracts the person-under-restriction related information and the usage related information to be transmitted to the server device 200 by referring to a person-under-restriction related information table and a usage related information table based on any information that can specify the instructor identifier and the request content. Thereafter, the processor of the person-under-restriction management device 300 transmits the person-under-restriction related information and the usage related information to the server device 200 via a communication interface (S106).
Since the subsequent processing is the same as S108 to S126 in
As described above, the processing pattern of
As described above, in the present embodiment, various types of information can be used in the generation of the input key information used for authentication, and the restricted item can be flexibly managed. Furthermore, in the present embodiment, since the transmission request serving as a trigger for information transmission is transmitted from the server device 200, it is not necessary to set a process related to transmission of these pieces of information between the person-under-restriction management device 300 and the server device 200 in advance. More specifically, an operator of the server device 200 does not need to cooperate in service with a delivery company in advance, for example, so that a more flexible system design becomes possible.
In the first embodiment, a case where person-under-restriction related information and usage related information in S106 are transmitted from a person-under-restriction management device 300 to a server device 200 has been described with reference to
Once the person-under-restriction related information and the user related information are received, a processor 112 of the instructor terminal device 100-1 stores the person-under-restriction related information and the user related information in a memory 113, and automatically transmits the received person-under-restriction related information and user related information to the server device 200 via a communication interface 114 (S196).
Since the subsequent processing is the same as S108 to S126 in
As described above, the processing pattern of
As described above, in the present embodiment, various types of information can be used in the generation of the input key information used for authentication, and the restricted item can be flexibly managed. Further, in the present embodiment, since various types of information necessary for generating authentication key information are transmitted via the instructor terminal device 100-1, it is not necessary to set a process related to transmission of these pieces of information between the person-under-restriction management device 300 and the server device 200 in advance. More specifically, an operator of the server device 200 does not need to cooperate in service with a delivery company in advance, for example, so that a more flexible system design becomes possible.
In the first embodiment, a case where authentication key information and input key information are used for authentication of a person under restriction has been described. In an eighth embodiment, a case of identifying whether or not the person under restriction is a person permitted for usage by using signature-encrypted usage permit information in addition to the authentication key information and the input key information, that is, a case of performing two-stage authentication, will be described. In this example, processing using the signature-encrypted usage permit information is referred to as “identification”, and processing using the authentication key information and the input key information is referred to as “authentication”, however, there is no particular distinction in the meaning of the terms. A configuration, processing, and a procedure are similar to those of the first embodiment except for points specifically described below. Therefore, a detailed description of these matters is omitted.
Once a request content is received in S104, a processor of a person-under-restriction management device 300 generates the usage related information and the person-under-restriction related information based on the received request content, and transmits the usage related information and the person-under-restriction related information to the server device 200 via a communication interface in association with a service identifier (S172). At this time, the processor of the person-under-restriction management device 300 requests the server device 200 to issue the usage permit information together with or separately from the information. A processor 212 of the server device 200 transmits, to the person-under-restriction management device 300, information necessary for registration of identification information (information for specifying a person himself/herself, such as face information) for identifying a delivery worker who is the person under restriction, the information being necessary for issuance of the usage permit, as an identification information registration request (S173). The processor of the person-under-restriction management device 300 acquires the identification information for identifying the delivery worker who is the person under restriction, and transmits the identification information to the server device 200 (S174). A step of requesting registration of the identification information for identifying the delivery worker who is the person under restriction and a step of receiving the identification information are separate from each other, which is based on the assumption that it is not clear in S100 which delivery worker is in charge of delivery. In a case where the identification information of the delivery worker who can be in charge is registered in advance in the person-under-restriction management device 300, in S172, the usage related information and the person-under-restriction related information may be generated based on a person-under-restriction identifier or the like for identifying the delivery worker who can be in charge together with the request content received in S104, and may be transmitted to the server device 200 via the communication interface in association with the service identifier.
Once an issuance request for the use permit information is received, the processor 212 of the server device 200 generates the use permit information based on the usage related information and the person-under-restriction related information that are also received. As an example, the usage permit information includes information indicating a usage permission time (for example, a usage permission start time and a usage permission end time) of the restricted item 3 specified by delivery time information in association with the person-under-restriction identifier, delivery company identification information, package identification information, or a combination thereof included in the person-under-restriction related information. Here, in a restricted item terminal device 100-2, a public key necessary for signature verification for the usage permit information and a common key necessary for decryption of the usage permit information are set and stored in advance. Therefore, the processor 212 of the server device 200 encrypts the usage permit information by using the common key set in advance in the restricted item terminal device 100-2. Then, the processor 212 of the server device 200 generates a signature for the usage permit information encrypted using a secret key paired with the public key set in advance in the restricted item terminal device 100-2 (S175). Then, the processor 212 of the server device 200 transmits the encrypted usage permit information and signature to the restricted item terminal device 100-2 in association with the person-under-restriction identifier, the delivery company identification information, the package identification information, or a combination thereof (S176).
Further, the processor 212 of the server device 200 stores the usage related information, the person-under-restriction related information, and the request content received in S172 in the person-under-restriction information table illustrated in
Next, the processor 212 of the server device 200 transmits the input key information generated in the processing of S108 to a person-under-restriction terminal device 100-3 via a communication interface 214 (S110), and transmits the input key information to the restricted item terminal device 100-2 (S140).
Then, the delivery worker who is the person under restriction visits a door 30 (the restricted item 3) of an entrance of a designated multi-unit residential building. Then, the delivery worker uses a reader device connected to the restricted item terminal device 100-2 via an input interface 216 to read an ID card in which the person-under-restriction identifier, the delivery company identification information, the package identification information, or a combination thereof associated with the usage permit information is stored in advance to input any one of the person-under-restriction identifier, the delivery company identification information, the package identification information, or a combination thereof. That is, the restricted item terminal device 100-2 receives the input of these pieces of information (S177). The delivery worker may input these pieces of information by using a numeric keypad of the restricted item terminal device 100-2 according to a predetermined rule, for example.
When any one of the person-under-restriction identifier, the delivery company identification information, the package identification information, and a combination thereof is input, a processor 112 of the restricted item terminal device 100-2 searches for the usage permit information associated with the received information among the delivery company identification information, the package identification information, and a combination thereof from the encrypted usage permit information received in advance. Then, the processor 112 of the restricted item terminal device 100-2 verifies the signature for the searched usage permit information by using the public key set in advance for the restricted item terminal device 100-2. When the signature verification is established, the processor 112 of the restricted item terminal device 100-2 decrypts the encrypted usage permit information by using the common key set in advance for the restricted item terminal device 100-2. Once the usage permit information is decrypted, the processor 112 of the restricted item terminal device 100-2 compares the usage permission time (usage condition) included in the usage permit information with the current time, and in a case where the current time is within a time set as the usage permission time, the processor 112 allows the delivery worker to use the restricted item 3 and enables the input of the input key information (S178).
Since the subsequent processing is the same as S112 to S126 in
As described above, the processing pattern of
In
As described above, in the present embodiment, various types of information can be used in the generation of the input key information used for authentication, and the restricted item can be flexibly managed. Furthermore, in the present embodiment, since the usage permission is performed using the signature-encrypted usage permit information, the security can be further improved.
In each embodiment, a case where the person-under-restriction related information and the usage related information are automatically received from the person-under-restriction management device 300 to the server device 200 or are read from the memory and transmitted in response to the transmission request from the server device 200 has been described. However, the present disclosure is not limited thereto, and for example, the administrator who operates the person-under-restriction management device 300 may access a predetermined input form provided in advance from the server device 200, an instruction input for the input form by the administrator may be received, and the person-under-restriction information and the usage related information may be manually input by the administrator. For example, specifically describing using
In each embodiment, a case where the person-under-restriction related information and the usage related information are automatically received from the person-under-restriction management device 300 to the server device 200 or are read from the memory and transmitted in response to the transmission request from the server device 200 has been described. However, the present disclosure is not limited thereto, and for example, the instructor who holds the instructor terminal device 100-1 may access a predetermined input form provided in advance from the server device 200, an instruction input for the input form by the instructor may be received, and the person-under-restriction information and the usage related information may be manually input by the instructor. For example, specifically describing using
The present disclosure can be implemented not only by the devices explicitly described in the embodiments but also by software, hardware, or a combination thereof. Specifically, the processing and procedures described in the present specification can be implemented by implementing a logic corresponding to the processing in a medium such as an integrated circuit, a volatile memory, a nonvolatile memory, a magnetic disk, or an optical storage. Furthermore, the processing and procedures described in the present specification can be implemented as a computer program, and can be executed by various computers including a terminal device and a server device.
The processing and procedures described herein as being performed by a single device, software, component, and/or module may be performed by a plurality of devices, a plurality of pieces of software, a plurality of components, and/or a plurality of modules. Furthermore, in the present specification, various types of information described as being stored in a single memory and storage device can be stored in a distributed manner in a plurality of memories included in a single device or a plurality of memories arranged in a distributed manner in a plurality of devices. Furthermore, a plurality of pieces of software and hardware described in the present specification can be implemented by integrating the plurality of pieces of software and hardware into fewer components or by decomposing the plurality of pieces of software and hardware into more components.
Although the embodiments of the present invention have been described, the embodiments have been presented as examples, and are not intended to limit the scope of the invention. These novel embodiments can be implemented in various other forms, and various omissions, substitutions, and changes can be made without departing from the gist of the invention. These embodiments and modifications thereof are included in the scope and gist of the present invention, and are included in the invention described in the claims and the equivalent scope thereof.
Number | Date | Country | Kind |
---|---|---|---|
2022-026159 | Feb 2022 | JP | national |
The present application is a continuation application of International Application No. PCT/JP2023/006278, filed on Feb. 21, 2023, which is expressly incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2023/006278 | Feb 2023 | WO |
Child | 18809764 | US |