Communication system and method, information processing terminal and method, and information processing apparatus and method

ABSTRACT

The present invention relates to a communication system and method, an information processing terminal and method, and an information processing device and method which enable simple and secure restricted access. When a PDA  11  is brought close, a reader  2  of a personal computer  1  reads a device ID form an IC tag  12 . The personal computer  1  registers device IDs on a connection permission list, and permits only devices registered on the list to connect. When being instructed to perform accessing, the PDA  11  controls a communication unit to access the personal computer  1  and to transmits its device ID. The personal computer  1  determines whether or not the transmitted ID is registered on the connection permission list, and permits the connection when determining that the ID is registered. The present invention can be applied to various information processing devices such as a personal computer and a PDA.

TECHNICAL FIELD

[0001] The present invention relates to communication systems andmethods, information processing terminals and methods, and informationprocessing devices and methods, and in particular, to a communicationsystem and method, an information processing terminal and method, and aninformation processing device and method that enable simple and securerestricted access.

BACKGROUND ART

[0002] With the recent developments in communication technology, usershave come to obtain required information by using various communicationdevices to access a predetermined server, regardless of the location ofthe users and the time of day. Users can confirm required informationanytime by using, for example, cellular phones, PDAs (Personal DigitalAssistants), etc.

[0003] For the administrator of the server, it may be required torestrict free access to the server. In this case, for example, it iscommon that the IP addresses of devices which are allowed to access theserver are registered beforehand, and users accessing the server arerequested to input passwords.

[0004] By way of example, when predetermined information is deliveredonly to persons gathering for an event, access is restricted byregistering beforehand the addresses of devices used by those persons.

[0005] However, in order to restrict access, in the case of registeringbeforehand the IP addresses of all the devices for which the serverallows access, a problem occurs in that the operation is verycomplicated.

[0006] Although such a problem does not occur when the number of thedevices allowed to access is relatively small, when the number is aslarge as several hundred or several thousand, the operation ofregistering the IP addresses of all the devices becomes very difficult.

[0007] In addition, as described above, when access is restricted byrequesting users to input passwords notified to them beforehand, thereis a possibility that some users may forget their passwords. Also, evenif the users remember the passwords, they are inconvenienced by havingto input their passwords, which is a problem.

DISCLOSURE OF INVENTION

[0008] The present invention is made in view of the above circumstances,and enables simple and secure restricted access.

[0009] An information processing terminal for a first communicationsystem of the present invention comprises a providing means forproviding, by means of wireless communication, identificationinformation of the information processing terminal to an informationprocessing device positioned nearby, and a first communication means forperforming wired or wireless communication with the informationprocessing device. When an instruction to connect to the informationprocessing device is given, the first communication means transmits theidentification information to the information processing device, andperforms communication when communication is permitted by theinformation processing device based on the transmitted identificationinformation. An information processing device comprises an acquiringmeans for acquiring the identification information by wirelesscommunication from the information processing terminal, which ispositioned nearby, a second communication means for performing wired orwireless communication with the information processing terminal, and astorage means for storing the identification information acquired by theacquiring means. When the second communication means receives theidentification information from the information processing terminal, andit is determined that the received identification information isidentical to the identification information stored in the storage means,the second communication means performs communication with theinformation processing terminal.

[0010] A communication method for a first communication system of thepresent invention includes a providing step for providing identificationinformation of the information processing terminal by wirelesscommunication to an information processing device positioned nearby, anda first communication step for performing wired or wirelesscommunication with the information processing device. When aninstruction to connect to the information processing device is given,the identification information is transmitted to the informationprocessing device, and communication is performed when communication ispermitted by the information processing device based on the transmittedidentification information. The communication method includes anacquiring step for acquiring the identification information by wirelesscommunication from an information processing terminal positioned nearby,a second communication step for performing wired or wirelesscommunication with the information processing terminal, and a storagestep for storing the identification information acquired by theacquiring step. When the identification information is received from theinformation processing terminal, and it is determined that the receivedidentification information is identical to the identificationinformation stored by the storage step, the communication with theinformation processing terminal is performed.

[0011] A first information processing terminal of the present inventioncomprises a providing means for providing identification information ofthe information processing terminal by wireless communication to aninformation processing device positioned nearby, and a communicationmeans for performing wired or wireless communication with theinformation processing device. When an instruction to connect to theinformation processing device is given, the communication meanstransmits the identification information to the information processingdevice, and performs communication when communication is permitted bythe information processing device based on the transmittedidentification information.

[0012] The information processing terminal further comprises a storagemeans for storing communication information for performing communicationwith the information processing device. Based on the communicationinformation stored in the storage means, the communication meansaccesses the information processing device and transmits theidentification information.

[0013] An information processing method for a first informationprocessing terminal of the present invention includes a providing stepfor providing identification information of the information processingterminal by wireless communication to an information processing devicepositioned nearby, and a communication step for performing wired orwireless communication with the information processing device. When aninstruction to connect to the information processing device is given,the identification information is transmitted to the informationprocessing device, and communication is performed when communication ispermitted by the information processing device based on the transmittedidentification information.

[0014] A program of the present invention includes a provision controlstep for controlling provision of identification information of one sideby wireless communication to an information processing device positionednearby, and a communication control step for controlling wired orwireless communication with the information processing device, andcauses a computer to execute transmitting identification information tothe information processing device when an instruction to connect to theinformation processing device is given, and performing communicationwhen communication is permitted by the information processing devicebased on the transmitted identification information.

[0015] A first information processing device of the present inventioncomprises an acquiring means for acquiring first identificationinformation by wireless communication from an information processingterminal positioned nearby, a communication means for performing wiredor wireless communication with the information processing terminal, anda storage means for storing the first identification informationacquired by the acquiring means. When the communication means receivessecond identification information from the information processingterminal, and it is determined that the received second identificationinformation is identical to the first identification information storedin the storage means, the communication means performs communicationwith the information processing terminal.

[0016] The storage means can delete the first identification informationwhen a predetermined period passes after the first identificationinformation is stored.

[0017] An information processing method for a first informationprocessing device of the present invention includes an acquiring stepfor acquiring first identification information by wireless communicationfrom an information processing terminal positioned nearby, acommunication step for performing wired or wireless communication withthe information processing terminal, and a storage step for storing thefirst identification information acquired by the acquiring step. Whensecond identification information is received from the informationprocessing terminal, and it is determined that the received secondidentification information is identical to the first identificationinformation stored by the processing of the storage step, communicationwith the information processing terminal is performed.

[0018] A program of the present invention includes an acquisitioncontrol step for controlling acquisition by wireless communication offirst identification information from an information processing terminalpositioned nearby, a communication control step for controlling wired orwireless communication with the information processing terminal, and astorage control step for controlling storage of the first identificationinformation acquired by the processing of the acquisition control step,and causes a computer to execute performing communication with theinformation processing terminal when second identification informationis received from the information processing terminal and it isdetermined that the received second identification information isidentical to the first identification information stored by theprocessing of the storage control step.

[0019] An information processing terminal for a second communicationsystem of the present invention comprises an acquiring means foracquiring, from the information processing device positioned nearby,communication information for performing communication with theinformation processing device by wireless communication, and a password,and a first communication means for performing wired or wirelesscommunication with the information processing device. When aninstruction to connect to the information processing device is given,the first communication means accesses the information processing devicebased on the communication information acquired by the acquiring means,transmits the password to the information processing device, andperforms communication when communication is permitted by theinformation processing device based on the transmitted password. Aninformation processing device comprises a providing means for providingpredetermined information by wireless communication to an informationprocessing terminal positioned nearby, a second communication means forperforming wired or wireless communication to the information processingterminal, and a storage means for storing the communication informationfor performing communication by the second communication means, and thepassword. The providing means provides, as the information, thecommunication information and password stored in the storage means tothe information processing terminal. The second communication meansperforms communication with the information processing terminal whenreceiving the password transmitted from the information processingterminal, and it is determined that the received password is identicalto the password stored in the storage means.

[0020] A communication method for a second communication system of thepresent invention includes an acquiring step for acquiring, from aninformation processing device positioned nearby, communicationinformation for performing communication with the information processingdevice by wireless communication, and a password, and a firstcommunication step for performing wired or wireless communication withthe information processing device. When an instruction to connect to theinformation processing device is given, the information processingdevice is accessed based on the communication information acquired bythe processing of the acquiring step, the password is transmitted to theinformation processing device, and communication is performed whencommunication is permitted by the information processing device based onthe transmitted password. The method includes a providing step forproviding predetermined information by wireless communication to aninformation processing terminal positioned nearby, a secondcommunication step for performing wired or wireless communication to theinformation processing terminal, and a storage step for storing thecommunication information for performing communication by the processingof the second communication step and the password. The communicationinformation and password stored by the processing of the storage stepare provided as the information to the information processing terminal.When the password transmitted from the information processing terminalis received, and it is determined that the received password isidentical to the password stored by the processing of the storage step,communication with the information processing terminal is performed.

[0021] A second information processing terminal of the present inventioncomprises an acquiring means for acquiring, from the informationprocessing device positioned nearby, communication information forperforming communication with the information processing device bywireless communication, and a password and a communication means forperforming wired or wireless communication with the informationprocessing device. When an instruction to connect to the informationprocessing device is given, the communication means accesses theinformation processing device based on the communication informationacquired by the acquiring means, transmits the password to theinformation processing device, and performs communication whencommunication is permitted by the information processing device based onthe transmitted password.

[0022] A second information processing method of the present inventionfor an information processing terminal includes an acquiring step foracquiring, from an information processing device positioned nearby,communication information for performing communication with aninformation processing device by wireless communication and a password,and a communication step for communicating with the informationprocessing device by wire or wireless. When an instruction to connect tothe information processing device is given, the information processingdevice is accessed based on the communication information acquired bythe processing of the acquiring step, the password is transmitted to theinformation processing device, and communication is performed whencommunication is permitted by the information processing device based onthe transmitted password.

[0023] A program of the present invention includes an acquisitioncontrol step for controlling acquisition, from an information processingdevice positioned nearby, of communication information for performingcommunication with an information processing device by wirelesscommunication, and a password, and a communication control step forcontrolling wired or wireless communication with the informationprocessing device. The program causes a computer to execute accessingthe information processing device based on the communication informationacquired by the processing of the acquisition control step when aninstruction to connect to the information processing device is given,transmitting the password to the information processing device, andperforming communication when communication is permitted by theinformation processing device based on the transmitted password.

[0024] A second information processing device of the present inventioncomprises a providing means for providing predetermined information bywireless communication to an information processing terminal positionednearby, a communication means for performing communication with aninformation processing terminal by wire or wireless, and a storage meansfor storing communication information for performing communication bythe communication means and a first password. The providing meansprovides, as the information, the communication information and firstpassword stored in the storage means to the information processingterminal, and the communication means performs communication with theinformation processing terminal when receiving a second passwordtransmitted from the information processing terminal, and it isdetermined that the received second password is identical to the firstpassword.

[0025] The storage means can change the first password in apredetermined cycle.

[0026] An information processing method for a second informationprocessing device of the present invention includes a providing step forproviding predetermined information by wireless communication to aninformation processing terminal positioned nearby, a communication stepfor performing wired or wireless communication with the informationprocessing terminal, and a storage step for storing communicationinformation for performing communication by the communication step and afirst password. The communication information and first password storedby the processing of the storage step are provided as the information tothe information processing terminal, and when a second passwordtransmitted from the information processing terminal is received and itis determined that the received second password is identical to thefirst password, communication with the information processing terminalis performed.

[0027] A program of the present invention includes a provision controlstep for controlling provision by wireless communication ofpredetermined information to an information processing terminalpositioned nearby, a communication control step for controlling wired orwireless communication with the information processing terminal, and astorage control step for controlling storage of communicationinformation for performing communication by the processing of thecommunication control step and a first password. The program causes acomputer to execute providing, as the information, the communicationinformation and first password stored by the processing of the storagecontrol step to the information processing terminal, and performingcommunication with the information processing terminal when a secondpassword transmitted from the information processing terminal isreceived and it is determined that the received second password isidentical to the first password.

[0028] An information processing terminal for a third communicationsystem of the present invention comprises a first providing means forproviding identification information of the information processingterminal by wireless communication to an information processing devicepositioned nearby, a first acquiring means for acquiring, from theinformation processing device, communication information for performingcommunication with the information processing device and a password, anda first communication means for performing wired or wirelesscommunication with the information processing device. When aninstruction to connect to the information processing device is given,the first communication means accesses the information processing devicebased on the communication information acquired by the first acquiringmeans, transmits the identification information and the password to theinformation processing device, and performs communication whencommunication is permitted by the information processing device based onthe transmitted identification information and password. An informationprocessing device comprises an second providing means for providingpredetermined information by wireless communication to an informationprocessing terminal positioned nearby, a second acquiring means foracquiring the identification information from the information processingterminal by wireless communication, a first storage means for storingthe identification information acquired by the second acquiring means, asecond communication means for performing wired or wirelesscommunication with the information processing terminal, and a secondstorage means for storing the communication information for performingcommunication by the second communication means and the password. Thesecond providing means provides, as the information, the communicationinformation and password stored in the second storage means to theinformation processing terminal. The second communication means performscommunication with the information processing terminal when receivingthe identification information and password transmitted from theinformation processing terminal, and it is determined that the receivedidentification information is identical to the identificationinformation stored in the first storage means and it is determined thatthe received password is identical to the password stored in the secondstorage means.

[0029] A communication method for a third communication system of thepresent invention includes a first providing step for providingidentification information of an information processing terminal bywireless communication to an information processing device positionednearby, a first acquiring step for acquiring, from the informationprocessing device, communication information for performingcommunication with the information processing device and a password, anda first communication step for performing wired or wirelesscommunication with the information processing device. When aninstruction to connect to the information processing device is given,the information processing device is accessed based on the communicationinformation acquired by the processing of the first acquiring step, theidentification information and the password are transmitted to theinformation processing device, and communication is performed whencommunication is permitted based on the transmitted identificationinformation and password. An information processing method for aninformation processing device includes a second providing step forproviding predetermined information by wireless communication to aninformation processing terminal positioned nearby, a second acquiringstep for acquiring the identification information from the informationprocessing terminal by wireless communication, a first storage step forstoring the identification information acquired by the processing of thesecond acquiring step, a second communication step for performing wiredor wireless communication to the information processing terminal, and asecond storage step for storing the communication information forperforming communication by the processing of the second communicationstep and the password. The communication information and password storedby the processing of the second storage step are provided as theinformation to the information processing terminal, and when theidentification information and password transmitted from the informationprocessing terminal are received, and it is determined that the receivedidentification information is identical to the identificationinformation stored by the processing of the first storage step and it isdetermined that the received password is identical to the passwordstored by the processing of the second storage step, communication withthe information processing terminal is performed.

[0030] A third information processing terminal of the present inventioncomprises a providing means for providing identification information ofan information processing terminal by wireless communication to aninformation processing device positioned nearby, an acquiring means foracquiring, from the information processing device, the communicationinformation for performing communication with the information processingdevice by wireless communication, and a communication means forperforming wired or wireless communication with the informationprocessing device. When an instruction to connect to the informationprocessing device is given, the communication means accesses theinformation processing device based on the communication informationacquired by the acquiring means, transmits the identificationinformation and the password to the information processing device, andperforms communication when communication is permitted by theinformation processing device based on the transmitted identificationinformation and password.

[0031] An information processing method for a third informationprocessing terminal for the present invention includes a providing stepfor identification information of one side to an information processingdevice positioned nearby, an acquiring step for acquiring, from theinformation processing device, communication information for performingcommunication with an information processing device by wirelesscommunication, and a password, and a communication step for performingwired or wireless communication with information processing device. Whenan instruction to connect to the information processing device is given,the information processing device is accessed based on the communicationinformation acquired by the processing of the acquiring step, theidentification information and the password are transmitted to theinformation processing device, and communication is performed whencommunication is permitted by the information processing device based onthe transmitted identification information and password.

[0032] A program of the present invention comprises a provision controlstep for controlling provision by wireless communication ofidentification information of one side to an information processingdevice positioned nearby, an acquisition control step for controllingacquisition from an information processing device by wirelesscommunication of communication information for performing communicationwith the information processing device and a password, and acommunication control step for controlling wired or wirelesscommunication with the information processing device. The program causesa computer to execute accessing the information processing device basedon the communication information acquired by the processing of theacquisition control step when an instruction to connect to theinformation processing device is given, transmitting the identificationinformation and the password to the information processing device, andperforming communication when communication is permitted by theinformation processing device based on the transmitted identificationinformation and password.

[0033] A third information processing device of the present inventioncomprises a providing means for providing predetermined information bywireless communication to an information processing terminal positionednearby, an acquiring means for acquiring, from an information processingterminal, first identification information by wireless communication, afirst storage means for storing the first identification informationacquired by the acquiring means, a communication means for performingwired or wireless communication with the information processingterminal, and a second storage means for storing communicationinformation for performing communication by the communication means anda first password. The providing means provides, as the information, thecommunication information and first password stored in the secondstorage means to the information processing terminal, and thecommunication means performs communication with the informationprocessing terminal when receiving the second identification informationand second password transmitted from the information processingterminal, and it is determined that the received second identificationinformation is identical to the first identification information storedin the first storage means and it is determined that the received secondpassword is identical to the first password.

[0034] The first storage means can delete the first identificationinformation when a predetermined period passes after the firstidentification information is stored.

[0035] The second storage means can change the first password in apredetermined cycle.

[0036] An information processing method for a third informationprocessing device of the present invention for an information processingdevice includes a providing step for providing predetermined informationby wireless communication to an information processing terminalpositioned nearby, an acquiring step for acquiring first identificationinformation from an information processing terminal by wirelesscommunication, a first storage step for storing the first identificationinformation acquired by the processing of the acquiring step, acommunication step for performing wired or wireless communication withthe information processing terminal, and a second storage step forstoring communication information for performing communication by theprocessing of the communication step, and a first password. Thecommunication information and first password stored by the processing ofthe second storage step are provided as the information to theinformation processing terminal. When the second identificationinformation and second password transmitted from the informationprocessing terminal are received, and it is determined that the receivedsecond identification information is identical to the firstidentification information stored by the processing of the first storagestep and it is determined that the received second password is identicalto the first password, communication with the information processingterminal is performed.

[0037] A program of the present invention includes a provision controlstep for controlling provision of predetermined information by wirelesscommunication with an information processing terminal positioned nearby,an acquisition control step for controlling acquisition by wirelesscommunication of first identification information from an informationprocessing terminal, a storage control step for controlling storage ofthe first identification information acquired by the processing of theacquisition control step, a communication control step for controllingwired or wireless communication with the information processingterminal, and a second storage control step for controlling storage ofcommunication information for performing communication by the processingof the communication control step and the first password. The programexecutes a computer to execute providing, as the information, thecommunication information and first password stored by the processing ofthe second storage control step, and performing communication with theinformation processing terminal when the second identificationinformation and second password transmitted from the informationprocessing terminal are received, and it is determined that the receivedsecond identification information is identical to the firstidentification information stored by the processing of the first storagecontrol step and it is determined that the received second password isidentical to the first password.

[0038] In a first communication system and method of the presentinvention, when an information processing terminal provides, by wirelesscommunication, identification information of the terminal to aninformation processing device positioned nearby, performs communicationby wire or wireless, and is instructed to connect to the informationprocessing device, the identification information is transmitted to theinformation processing device, and communication is performed whencommunication is permitted by the information processing device based onthe transmitted identification. Also, the identification information isacquired from the information processing terminal, which is positionednearby, communication with the information processing terminal isperformed by wire or wireless, and the acquired identificationinformation is stored. When the identification information is receivedfrom the information processing terminal, and it is determined that thereceived identification information is identical to the storedidentification information, communication with the informationprocessing terminal is performed.

[0039] In a first information processing terminal, method, and programof the present invention, identification information of the terminal isprovided by wireless communication to an information processing devicepositioned nearby, and communication with the information processingdevice is performed by wire or wireless. Also, when an instruction toconnect to the information processing device is given, theidentification information is transmitted to the information processingdevice, and communication is performed when communication is permittedby the information processing device based on the transmittedidentification information.

[0040] In a first information processing device, method, and program ofthe present invention, first identification information is acquired bywireless communication from an information processing terminalpositioned nearby, communication with the information processingterminal is performed by wire or wireless, and the acquired firstidentification information is stored. Also, when second identificationinformation is received from the information processing terminal, and itis determined that the received second identification information isidentical to the first identification information, communication withthe information processing terminal is performed.

[0041] In a second communication system and method of the presentinvention, from an information processing device positioned nearby,communication information for performing communication with theinformation processing device by wireless communication and a passwordare acquired by an information processing terminal, and communicationwith the information processing device is performed by wire or wireless.Also, when an instruction to connect to the information processingdevice is given, the information processing device is accessed based onthe acquired communication information, the password is transmitted tothe information processing device, and communication is performed whenit is permitted by the information processing device based on thetransmitted password. In addition, the information processing deviceprovides predetermined information by wireless communication to aninformation processing terminal positioned nearby, and communicationwith the information processing terminal by wire or wireless, and thecommunication information for performing communication and the passwordare stored. The stored communication information and password areprovided to the information processing terminal. When the passwordtransmitted from the information processing terminal is received, and itis determined that the received password is identical to the storedpassword, communication with the information processing terminal isperformed.

[0042] In a second information processing terminal, method, and programof the present invention, from an information processing devicepositioned nearby, communication information for performingcommunication with the information processing device and a password areacquired by wireless communication, and communication with theinformation processing device is performed by wire or wireless. Also,when an instruction to connect to the information processing device isgiven, the information processing device is accessed based on theacquired communication information, the password is transmitted to theinformation processing device, and communication is performed when it ispermitted based on the transmitted password.

[0043] In a second information processing device, method, and program ofthe present invention, predetermined information is provided by wirelesscommunication to an information processing terminal positioned nearby,communication with the information processing terminal is performed bywire or wireless, and communication information for performingcommunication and a first password are stored. The stored communicationinformation and first password are provided to the informationprocessing terminal. When a second password transmitted from theinformation processing terminal is received, and it is determined thatthe received second password is identical to the first password,communication with the information processing terminal is performed.

[0044] In a third information processing terminal, method, and programof the present invention, identification information of an informationprocessing terminal is provided by wireless communication from theinformation processing terminal to an information processing devicepositioned nearby, communication information for performingcommunication with the information processing device is acquired fromthe information processing device by wireless communication, andcommunication with the information processing device is performed bywire or wireless. When an instruction to connect to the informationprocessing device is given, the information processing device isaccessed based on the acquired communication information, thecommunication information and the password are transmitted to theinformation processing device, and communication is performed whencommunication is permitted based on the transmitted communicationinformation and password. In addition, predetermined information isprovided by wireless communication from an information processing deviceto the information processing terminal, which is positioned nearby. Fromthe information processing terminal, identification information isacquired by wireless communication, and the acquired identificationinformation is stored. Wired or wireless communication with theinformation processing terminal is performed, and communicationinformation for performing communication and a password are stored.Also, the stored communication information and password are provided tothe information processing terminal. When communication information andpassword transmitted from the information processing terminal arereceived, and it is determined that the received identificationinformation is identical to the stored identification information and itis determined that the received password is identical to the storedpassword, communication with the information processing terminal isperformed.

[0045] In a third information processing terminal, method, and programof the present invention, identification information of the terminal isprovided by wireless communication to an information processing devicepositioned nearby, communication information for performingcommunication with the information processing device and a password areacquired from the information processing device, and communication withthe information processing device is performed by wire or wireless.Also, when an instruction to connect to the information processingdevice is given, the information processing device is accessed based onthe acquired identification information, the identification informationand the password are transmitted to the information processing device,and communication is performed when it is permitted by the informationprocessing device based on the transmitted identification informationand password.

[0046] In a third information processing device, method, and program ofthe present invention, predetermined information is provided by wirelesscommunication to an information processing terminal positioned nearby,first identification information is acquired from the informationprocessing terminal by wireless communication. The acquired firstidentification information is stored and communication with theinformation processing terminal is performed by wire or wireless, andcommunication information for performing communication and a firstpassword are stored. The stored communication information and firstpassword are provided to the information processing terminal. Whensecond identification information and a second password, transmittedfrom the information processing terminal, are received, and it isdetermined that the received second identification information isidentical to the stored first identification information and it isdetermined that the received second password is identical to the firstpassword, communication with the information processing terminal isperformed.

BRIEF DESCRIPTION OF THE DRAWINGS

[0047]FIG. 1 is an illustration of an example of a communication systemto which the present invention is applied.

[0048]FIG. 2 is a block diagram showing an example of the personalcomputer in FIG. 1.

[0049]FIG. 3 is a block diagram showing an example of the reader in FIG.2.

[0050]FIG. 4 is a block diagram showing an example of the PDA in FIG. 1.

[0051]FIG. 5 is a block diagram showing an example of the IC tag in FIG.4.

[0052]FIG. 6 is a flowchart illustrating a process of the personalcomputer in FIG. 2.

[0053]FIG. 7 is a flowchart illustrating a process of the PDA in FIG. 4.

[0054]FIG. 8 is a flowchart illustrating another process of the PDA inFIG. 4.

[0055]FIG. 9 is a flowchart illustrating another process of the personalcomputer in FIG. 2.

[0056]FIG. 10 is a flowchart illustrating still another process of thepersonal computer in FIG. 2.

[0057]FIG. 11 is a block diagram showing another example of the personalcomputer in FIG. 1.

[0058]FIG. 12 is a block diagram showing another example of the PDA inFIG. 1.

[0059]FIG. 13 is a flowchart illustrating a process of the PDA in FIG.12.

[0060]FIG. 14 is a flowchart illustrating a process of the personalcomputer in FIG. 11.

[0061]FIG. 15 is a flowchart illustrating another process of thepersonal computer in FIG. 11.

[0062]FIG. 16 is an illustration of examples of information transmittedand received between the personal computer and the PDA.

[0063]FIG. 17 is a block diagram showing still another example of thepersonal computer in FIG. 1.

[0064]FIG. 18 is a block diagram showing still another example of thePDA in FIG. 1.

[0065]FIG. 19 is a flowchart illustrating the PDA in FIG. 18.

[0066]FIG. 20 is a flowchart illustrating a process of the personalcomputer in FIG. 17.

[0067]FIG. 21 is a flowchart illustrating another process of thepersonal computer in FIG. 17.

[0068]FIG. 22 is a flowchart continued from FIG. 21 which illustratesthe other process of the personal computer in FIG. 17.

[0069]FIG. 23 is an illustration of an example of a communicationsystem.

[0070]FIG. 24 is a block diagram showing an example of the communicationunit in FIG. 23.

[0071]FIG. 25 is a flowchart illustrating the operation of thecommunication system in FIG. 23.

[0072]FIG. 26 is a flowchart illustrating another operation of thecommunication system in FIG. 23.

BEST MODE FOR CARRYING OUT THE INVENTION

[0073]FIG. 1 is an illustration of an example of a communication systemto which the present invention is applied.

[0074] When a PDA (Personal Digital Assistants) 11 is brought close to apersonal computer 1, the personal computer 1 acquires information storedon an IC tag 12 of the PDA 11 by using electromagnetic waves radiatedfrom a reader 2, as indicated by the dashed line in FIG. 1.

[0075] As the information stored on the IC tag 12, the personal computer1 acquires, for example, a device ID such as an IP address or aBluetooth™ address which is uniquely set in the PDA 11.

[0076] The personal computer 1 restricts access by using the device IDacquired by the reader 2.

[0077] Specifically, the personal computer 1 and the PDA 11 includecommunication units (a communication unit 29 (see FIG. 2), and acommunication unit 89 (see FIG. 4)) that perform wired or wirelesscommunication, respectively. When the PDA 11 requests the personalcomputer 1 to perform communication using its communication unit, thepersonal computer 1 requests the PDA 11 to first transmit the device ID.

[0078] In response to this request, the PDA 11 transmits its device IDto the personal computer 1 from the communication unit 89.

[0079] When receiving the device ID transmitted from the PDA 11, thepersonal computer 1 determines whether or not the received device ID isidentical to that acquired beforehand by the reader 2. If the personalcomputer 1 has determined that the received device ID is identical, itallows communication by the communication 29, that is, a connection.

[0080] Accordingly, if another device other than the PDA 11 requests aconnection to the personal computer 1, since the device ID is notrecorded in the personal computer 1 beforehand, the device cannotcommunicate with the personal computer 1.

[0081] By way of example, when the personal computer 1 is installed as aserver for delivering predetermined information in an event place,persons gathering in the place simply bring their own devices (devicehaving built-in tags) close to the personal computer 1, whereby, afterthat, they can access the personal computer 1 and can acquireinformation. In other words, persons who do not bring their own devicesclose the personal computer 1 cannot access the personal computer 1, andcannot acquire any information.

[0082]FIG. 2 is a block diagram showing an example of the personalcomputer 1 in FIG. 1.

[0083] A CPU (Central Processing Unit) 21 executes various processes inaccordance with programs stored in a ROM (Read Only Memory) 22 or astorage unit 28. A RAM 23 stores a program executed by the CPU 21 anddata, if necessary. The CPU 21, the ROM 22, and RAM 23 are connected toone another by a bus 24.

[0084] An input/output interface 25 is connected to the bus 24, and thereader 2 for reading information from the IC tag 12 built into the PDA11, as described above, and for example, a display unit 26 including anLCD (Liquid Crystal Display), an input unit 27 including a keyboard anda mouse which are used by a user, and the storage unit 28, whichincludes a hard disk, are connected to the input/output interface 25.

[0085] Also, a communication unit 29 that communicates with variousdevices, for example, by means of wireless communication such asBluetooth and wireless LAN (Local Area Network) or by wiredcommunication is connected to the input/output interface 25.

[0086] A drive 30 is also connected to the input/output interface 25. Inthe drive 30, a magnetic disk 31, an optical disk 32, a magneto-opticaldisk 33, a semiconductor memory 34, etc., can be loaded, if required. Aprogram, read from the magnetic disk 31 to the semiconductor memory 34,is supplied through the input/output interface 25 and is stored in, forexample, the storage unit 28.

[0087]FIG. 3 is a block diagram showing a detailed example of the readerin FIG. 2.

[0088] An IC 41 includes a CPU 61, a ROM 62, a RAM 63, an SCC (SerialCommunication Controller) 64, an SPU (Signal Processing Unit) 66, and abus 65 connecting the CPU 61 to the SPU 66 to one another.

[0089] The CPU 61 loads a control program stored in the ROM 62 into theRAM 63, and executes various processes based on control signals suppliedfrom the CPU 21 in FIG. 2. For example, when a device ID is transmittedfrom the IC tag 12 of the PDA 11, the CPU 61 supplies it to the CPU 21.

[0090] The SCC 64 uses the bus 65 to supply the CPU 61 with datasupplied from the CPU 21 in FIG. 2, and outputs, to the CPU 21, datasupplied through the bus 65.

[0091] When being supplied with predetermined data by the demodulator44, the SPU 66 performs BPSK (Binary Phase Shift Keying) demodulation(decoding to Manchester codes) on the data, and supplies the obtaineddata to the CPU 61. Also, when a command to be transmitted to the PDA 11is supplied by the bus 65, the SPU 66 performs BPSK modulation (codingto Manchester codes) on the command, and outputs the obtained data tothe modulator 42. In other words, the reader 2 can write predeterminedinformation on the IC tag 12 of the PDA 11, if required.

[0092] The modulator 42 performs, based on data supplied form the SPU66, ASK (Amplitude Shift Keying) on a carrier which is supplied from theoscillator circuit 43 and which has a predetermined frequency (e.g.,13.5 MHz), and outputs the generated modulated waves as electromagneticwaves from the antenna 45. The demodulator 44 demodulates modulatedwaves (ASK modulated waves) acquired by the antenna 45, and outputs thedemodulated data to the SPU 66.

[0093] The antenna 45 radiates predetermined electromagnetic waves,detects, based on a change in load thereon, for example, the IC tag 12of the PDA 11, and receives (reads) various types of data.

[0094]FIG. 4 is a block diagram showing an example of the PDA 11.

[0095] Since a CPU 81 to the communication unit 89 are basically similarto the CPU 21 to the communication unit 29 in the personal computer 1,detailed descriptions thereof are omitted, accordingly.

[0096] Based on a control program stored in the ROM 82, etc., the CPU 81controls the operation of the entirety of the PDA 11, and manages theinformation stored on the IC tag 12 so that, for example, a device IDcan be provided to the personal computer 1.

[0097] The CPU 81 stores, for example, in a storage unit 88, an IDidentical to the device ID stored in the IC tag 12 so that the device IDof the PDA 11 can be transmitted to the personal computer 1 when the CPU81 controls the communication unit 89 to access the personal computer 1.

[0098] Similarly to the communication unit 29 of the personal computer1, the communication unit 89 communicates with various devices bywireless, such as Bluetooth or wireless LAN or by wire.

[0099]FIG. 5 is a block diagram showing an example of the IC tag 12 inFIG. 4.

[0100] The IC tag 12 includes, for example, an antenna 112 and an IC 111in which components other than that are accommodated in a single chip,and uses electromagnetic induction to perform half-duplex communicationusing various types of data with, for example, the reader 2 of thepersonal computer 1. Those having a function similar to that of the ICtag 12 include, for example, Felica (registered trademark).

[0101] A CPU 121 controls, based on a control program stored in a ROM122, the operation of the entirety of the IC tag 12.

[0102] When data demodulated by an ASK demodulator 129 has a BPSKmodulated form, an SPU 126 performs demodulation (Manchester codedecoding) on the data based on a clock signal supplied from a PLL unit,which is not shown, and outputs the demodulated data to the CPU 121,etc., through a bus 125, if required.

[0103] The SPU 126 performs BPSK modulation (coding to Manchester codes)on data supplied through the bus 125, and outputs the modulated data toan ASK modulator 127.

[0104] When transmitting, for example, data such as a device ID to thereader 2 of the personal computer 1, the ASK modulator 127 turns on/offa predetermined switching element in response to data supplied from theSPU 126. Only when the switching element is in on-state does the ASKmodulator 127 change the load on the antenna 112 by connecting apredetermined load in parallel to the antenna 112.

[0105] The change in the load on the antenna 112 causes the ASKmodulator 127 to perform ASK modulation on modulated waves from thereader 2 which are being received by the antenna 112 and to transmit(change a terminal voltage of the antenna 45 of the reader 2) themodulated component to the reader 2 through the antenna 112.

[0106] The ASK demodulator 129 uses envelope detection to demodulatemodulated waves (ASK modulated waves) received by the antenna 112, andoutputs the demodulated data to the SPU 126. The antenna 112 resonatesdue to, for example, electromagnetic waves having a predeterminedfrequency which are radiated from the reader 2.

[0107] After rectifying an alternating current magnetic field excited bythe antenna 112, and stabilizing the obtained current, a power-supplygenerator 130 supplies the current as a direct-current power supply toeach component.

[0108] Next, the operation of the communication system in FIG. 1 isdescribed.

[0109] At first, a process of the personal computer 1 which acquires andevice ID from the PDA 11 and registers the device ID is described withreference to the flowchart in FIG. 6.

[0110] In step S1, based on an output from the reader 2, the CPU 21determines whether or not it has read an device ID from the IC tag 12 ofthe PDA 11, and is on standby until it determines that it has read.

[0111] For example, the reader 2 always radiates electromagnetic wavesfor detecting the IC tag 12, and reads the device ID of the PDA 11 whichis stored on the IC tag 12 (PDA 11) when the IC tag 12 is brought closeto the reader 2.

[0112] When the CPU 21 determines in step S1 that it has read the deviceID, it proceeds to step S2, and registers the device ID of the PDA 11 ona connection permission list.

[0113] The connection permission list is a list of device IDs read bythe reader 2 and is stored in the storage unit 28. Only devices havingthe device IDs registered on the list can connect to (access) thecommunication unit 29.

[0114] After that, the process returns to step S1, and the subsequentprocessing is repeatedly executed.

[0115] Next, a process of the PDA 11 which registers a device ID in thepersonal computer 1 is described with reference to the flowchart in FIG.7.

[0116] In step S11, the CPU 121 of the IC tag 12 determines whether ornot the IC tag 12 is positioned nearby to the reader 2, and is onstandby until the CPU 121 determines that the IC tag 12 is positionednearby.

[0117] As described above, since the electromagnetic waves for detectingthe IC tag 12 are radiated from the reader 2, when the waves arereceived by the antenna 112, the CPU 121 determines in step S1 that theIC tag 12 is positioned close to the reader 2. Proceeding to step S12,the CPU 112 provides the device ID stored in the flash memory 124.

[0118] The provided device ID is received by the reader 2 of thepersonal computer 1, and is registered on the connection permissionlist.

[0119] After that, the process returns to step S11, and repeatedlyexecutes the subsequent processing.

[0120] Next, a process of the PDA 11 which connects to the personalcomputer 1 (the communication unit 29) is described with reference tothe flowchart in FIG. 8.

[0121] In step S21, based on an output from the input unit 87, the CPU81 determines whether or not the PDA 11 is instructed to connect to thepersonal computer 1 by the user, and is on standby until it determinesthat the PDA 11 is instructed.

[0122] When determining in step S21 that the PDA 11 is instructed toconnect to the personal computer 1, the CPU 81 proceeds to step S22, andcontrols the communication unit 89 to access the personal computer 1 andto transmit the device ID of the PDA 11.

[0123] When the storage unit 88 stores, for example, an address forcommunicating with the personal computer 1, communication-methodidentifying information (communication information), etc., the CPU 81accesses the personal computer 1 based thereon, and transmits the deviceID from the communication unit 89. Obviously, information for accessingthe personal computer 1 may also be input by the user.

[0124] The device ID transmitted from the communication unit 89 bywireless or by wire is received by the communication unit 29 of thepersonal computer 1. It is determined whether or not the device ID isregistered on the connection permission list.

[0125] In step S23, based on the information received by thecommunication unit 89, the CPU 81 determines whether or not the personalcomputer 1 has notified the PDA 11 of permission of the link.

[0126] When determining in step S23 that the personal computer 1 has notnotified the personal computer 1 of permission of the connection (theconnection is rejected), the CPU 81 returns to step S21 and repeatedlyexecutes the subsequent processing.

[0127] When conversely determining in step S23 that the personalcomputer 1 has notified the PDA 11 of permission of the connection, theCPU 81 proceeds to step S24, and controls the communication unit 89 toestablish communication with the personal computer 1 and to transmit andreceive predetermined information. After that, the process returns tostep S21, and the subsequent processing is repeatedly executed.

[0128] Next, a process of the personal computer 1 which is executedcorrespondingly to the process in FIG. 8 is described with reference tothe flowchart in FIG. 9.

[0129] In step S31, based on an output from the communication unit 29,the CPU 21 determines whether or not a connection to the personalcomputer 1 is requested by the PDA 11, and is on standby until the CPU21 determines that a connection to the personal computer 1 is requested.

[0130] When determining in step S31 that the connection to the personalcomputer 1 is requested, the CPU 21 proceeds to step S32, and acquiresthe device ID received by the communication unit 29. As is describedwith reference to the flowchart in FIG. 8, when a connection to thepersonal computer 1 is requested, the device ID of the PDA 11 istransmitted from the PDA 11.

[0131] In step S33, by referring to the connection permission liststored in the storage unit 28, the CPU 21 determines whether or not thetransmitted device ID is registered on the connection permission list,that is, whether to permit the connection.

[0132] When determining in step S33 that the transmitted device ID isnot registered on the connection permission list, the CPU 21 proceeds tostep S34, and notifies the device having transmitted the device ID thatthe personal computer 1 cannot permit the connection.

[0133] When conversely determining in step S33 that the transmitteddevice ID is not registered on the connection permission list, the CPU21 proceeds to step S35, and controls the communication unit 29 tonotify the PDA 11 that the personal computer 1 permits the connection.For example, the device ID of the PDA 11 is registered as describedabove, the PDA 11 is notified that the connection is permitted.

[0134] In step S36, communication is established, for example, with thePDA 11, to which a connection is permitted, and predeterminedinformation is transmitted and received.

[0135] Since the IC tag 12 is used to provide the device ID, asdescribed above, the user (user who wishes a connection to the personalcomputer 1) of the PDA 11 can register the device ID by simply bringingthe PDA 11 close to the personal computer 1.

[0136] Also, only devices having device IDs registered on the connectionpermission list are permitted to connect. Thus, users who do not bringtheir devices close to the personal computer 1 can be prevented fromaccessing the personal computer 1.

[0137] Next, a process of the personal computer 1 which manages thedevice IDs registered on the connection permission list is describedwith reference to the flowchart in FIG. 10.

[0138] In step S51, the CPU 21 refers to the connection permission listand determines whether or not the connection permission list includes adevice ID in which a predetermined time has passed since itsregistration.

[0139] When determining in step S51 that the connection permission listdoes not include any device ID in which the predetermined time haspassed, the CPU 21 repeatedly executes the subsequent processing.Conversely, when determining that the connection permission listincludes a device ID in which the predetermined time has passed, the CPU21 proceeds to step S52 and deletes the device ID.

[0140] Accordingly, even a user who brought his or her device close tothe personal computer 1 and registered its device ID in the past cannotestablish a connection to the personal computer 1 after a certain timepasses since the device ID is registered. Therefore, regardingpermission of a connection, also temporal restriction can be set.

[0141] In the foregoing, the personal computer 1 is provided with thereader 2, and the PDA 11 is provided with the IC tag 12. Conversely,also by providing the personal computer 1 with an IC tag (IC tag 141(see FIG. 11), and providing the PDA 11 with a reader (reader 151 (seeFIG. 12), connections from various devices can be restricted.

[0142] For example, in this case, an IC tag 141 of the personal computer1 stores information (communication information) such as the address ofthe personal computer 1 and a URL (Uniform Resource Locator), and apassword. When being positioned close to the personal computer 1, areader 151 of the PDA 11 reads the information from the IC tag 141.

[0143] When being instructed to connect to the personal computer 1, thePDA 11 uses the address read by the reader 151 to access the personalcomputer 1 and transmits the password.

[0144] The personal computer 1 determines whether or not the transmittedpassword is identical to a password provided by the IC tag 141. Whendetermining that both are identical, the personal computer 1 permits thePDA 11 to connect.

[0145] Accordingly, similarly to the above-described case, only a userwho brings his or her device (a device in which the reader 151 isprovided) can access the personal computer 1.

[0146]FIG. 11 is a block diagram showing another example of the personalcomputer 1 in which the IC tag 141 is provided.

[0147] Since the CPU 21 to semiconductor memory 34 shown in FIG. 11 areidentical to those shown in FIG. 2, detailed description thereof areomitted, if required.

[0148] In order that information, such as an address, and a password,may be provided to the PDA 11 in a close position, the CPU 21 stores theinformation in the IC tag 141. Also, the CPU 21 uses, for example, thestorage unit 28 to store a password identical to the password stored onthe IC tag 141 so that the CPU 21 can determine whether or not thepassword posted from the communication unit 29 through the PDA 11 isvalid.

[0149] When the reader 151 of the PDA 11 is positioned nearby and theradiated electromagnetic waves are received, the IC tag 141 provides thereader 151 with the information, such as the address of the personalcomputer 1, and the password. The IC tag 141 is similar in structure tothe IC tag 12 shown in FIG. 5, and the information, such as the addressof the personal computer 1, and the password, are stored in a flashmemory.

[0150]FIG. 12 is a block diagram showing an example of the PDA 11, inwhich the reader 151 is provided.

[0151] Since the CPU 81 to communication unit 89 shown in FIG. 12 areidentical to those shown in FIG. 4, detailed descriptions thereof areomitted, accordingly.

[0152] When being positioned close to the personal computer 1 anddetecting the IC tag 141, the reader 151 reads and supplies, to the CPU81, the information, such as the address, and the password which arestored on the IC tag 141.

[0153] Next, a process of the PDA 11 which establishes, based on theinformation read from the IC tag 141, a connection to the personalcomputer 1 is described with reference to the flowchart in FIG. 13.

[0154] In step S61, based on an output from the reader 151, the CPU 81determines whether or not data has been read from the IC tag 141, and ison standby until the CPU 81 determines that the data has been read.

[0155] When the PDA 11 is brought close to the personal computer 1, thedata stored on the IC tag 141 is read and supplied to the CPU 81 by thereader 151.

[0156] When determining in step S61 that the data has been read from theIC tag 141, the CPU 81 proceeds to step S62, and extracts the addressand password of the personal computer 1 from the read data.

[0157] The extracted address and password are stored, for example, inthe RAM 82 or the storage unit 88 in step S63.

[0158] In step S64, the CPU 81 determines whether or not the PDA 11 isinstructed by the user to connect to the personal computer 1, and is onstandby until the CPU 81 determines that the PDA 11 is instructed.

[0159] When determining in step S64 that the PDA 11 is instructed toconnect to the personal computer 1, the CPU 81 proceeds to step S65, andaccesses the personal computer 1 by controlling the communication unit89 based on the information such as the address which is read by thereader 151 and is stored.

[0160] In step S66, the CPU 81 determines whether or not the PDA 11 isrequested to transmit a password by the personal computer 1, and is onstandby until the CPU 81 determines that the PDA 11 is requested.

[0161] When determining in step S66 that the PDA 11 is requested totransmit the password, the CPU 81 proceeds to step S67, and transmitsthe stored password from the communication unit 89 to the personalcomputer 1.

[0162] In step S68, the CPU 81 determines whether or not the PDA 11 ispermitted to connect. If the CPU 81 has determined that the PDA 11 isnot permitted to connect, it returns to step S61 and repeatedly executesthe subsequent processing.

[0163] As described later, the personal computer 1 determines whether ornot a password transmitted from the PDA 11 is identical to a passwordmanaged by the personal computer 1. Only when it is determined that bothare identical does the personal computer 1 permit the PDA 11 to connect.

[0164] In step S68, alternatively, if the CPU 81 has determined that thePDA 11 is permitted to connect, it proceeds to step S69, and establishesa connection and uses the communication unit 89 to transmit and receivevarious types of information.

[0165] Next, a process of the personal computer 1 which is executedcorrespondingly to the process in FIG. 13 is described with reference tothe flowchart in FIG. 14.

[0166] In step S81, a CPU of the IC tag 141 determines whether or notthe reader 151 of the PDA 11 is positioned nearby, and is on standbyuntil the CPU determines that the reader 151 is positioned nearby.

[0167] When determining in step S81 that the reader 151 of the PDA 11 ispositioned nearby, the CPU of the IC tag 141 proceeds to step S82, andprovides the PDA 11 (the reader 151) with the information, such as theaddress, and the password which are stored in the flash memory.

[0168] In step S83, based on an output from the communication unit 29,the CPU 21 determines whether or not a connection to the personalcomputer 1 is requested to the PDA 11 thereby, and is on standby untilthe CPU 21 determines that the connection to the personal computer 1 isrequested.

[0169] When determining in step S83 that the connection to the personalcomputer 1 is requested by the PDA 11, the CPU 21 proceeds to step S84,and requests the PDA 11 to transmit a password.

[0170] In step S85, the CPU 21 determines whether or not the passwordhas been transmitted, and is on standby until the CPU 21 determines thatthe password has been transmitted. As described with reference to theflowchart in FIG. 13, in response to this request, the password providedby the IC tag 141 is transmitted from the PDA 11.

[0171] When determining in step S85 that the password has beentransmitted, the CPU 21 proceeds to step S86, and determines whether ornot the transmitted password is identical to the password (a passwordidentical to that provided from the IC tag 141) stored in the storageunit 28 or the like, that is, whether or not the password is valid. Whendetermining in step S85 that the password is not valid, the CPU 21proceeds to step S87 and notifies the PDA 11 that the personal computer1 cannot permit the PDA 11 to connect. After that, the process returnsto step S81, and repeatedly execute the subsequent processing.

[0172] In step S86, alternatively, if the CPU 21 has determined that thepassword is valid, it proceeds to step S88, and notifies the PDA 11 thatthe personal computer 1 permits the PDA 11 to connect.

[0173] After that, in step S89, the connection is established and thecommunication unit 29 is used to transmit and receive various types ofinformation.

[0174] As described above, for example, also by providing the personalcomputer 1 with the IC tag 141, and providing the PDA 11 with the reader151, links from those other than users who bring their devices close tothe personal computer 1 can be restricted.

[0175] In addition, it can be determined, based on a password, whetheror not a user who brings a device close to the personal computer 1requests a connection to the personal computer 1. Thus, even if a userwho does not bring a device close to the personal computer 1 acquires anaddress or the like, only it does not enable the user to establish aconnection to the personal computer 1.

[0176] Next, a process of the personal computer 1 which manages thepassword stored on the IC tag 141 is described with reference to theflowchart in FIG. 15.

[0177] In step S101, the CPU 21 determines whether or not apredetermined time has passed, and is on standby until the CPU 21determines that the time has passed. When determining in step S102 thatthe predetermined time has passed, the CPU 21 proceeds to step S102, andchanges the password stored in the flash memory of the IC tag 141.

[0178] After that, the process returns to step S101, and repeatedlyexecutes the subsequent processing.

[0179] Accordingly, similarly to the process described with reference toFIG. 10, for a user who has acquired a password or the like by bringinghis or her own device close to the personal computer 1, it is impossibleto establish a connection to the personal computer 1 after a certaintime has passed since registration.

[0180] In the above example, for the personal computer 1 and the PDA 11,either a reader or an IC tag is provided. By providing both, it is moreensured that connections from various devices are restricted.

[0181]FIG. 16 is a schematic illustration of the personal computer 1 andPDA 11 shown in FIG. 1, and shows examples of information transmittedand received as electromagnetic waves when both devices are providedwith IC tags and readers.

[0182] When the personal computer 1 and the PDA 11 are positioned closeto each other, as shown in FIG. 16, the device ID of the PDA 11 istransmitted (read by the reader 2) from the IC tag 12 of the PDA 11 tothe reader 2 of the personal computer 1.

[0183] Also, from the IC tag 141 of the personal computer 1, informationsuch as an address which is necessary for a connection, and a passwordare transmitted (read by the reader 151) to the reader 151 of the PDA11.

[0184] Based on the pieces of information, the connection to thepersonal computer 1 is restricted.

[0185] Specifically, the device ID acquired by the personal computer 1is registered on a connection permission list as described above, andwhen a connection to the PDA 11 is actually requested, it is determinedwhether or not the device ID transmitted from the PDA 11 is registeredon the connection permission list. The address acquired by the PDA 11 isused for the PDA 11 to access the personal computer 1. The password istransmitted to the personal computer 1, and it is determined whether ornot the password is identical to the password managed by the personalcomputer 1.

[0186] Only a device which has a device ID registered on the connectionpermission list and which has transmitted a password identical to apassword provided by the personal computer 1 is permitted to connect tothe personal computer 1.

[0187]FIG. 17 is a block diagram showing an example of the personalcomputer 1, in which the reader 2 and the IC tag 141 are provided.

[0188] The structure shown in FIG. 17 is a combination of the structuresshown in FIG. 2 and FIG. 17.

[0189] In other words, the device ID of the PDA 11 which is read by thereader 2 is transferred to, for example, the storage unit 28, and isregistered on the connection permission list.

[0190] The IC tag 141 stores information (communication information)such as an address which is necessary for another device to connect tothe personal computer 1. The information is read by the reader 151 ofthe PDA 11.

[0191] The storage unit 28, or the like, stores a password identical toa password stored on the IC tag 141, and the password is used todetermine identity with the password received by the communication unit29.

[0192]FIG. 18 is a block diagram showing an example of the PDA 11, inwhich the IC tag 12 and the reader 151 are provided.

[0193] The structure shown in FIG. 18 is a combination of the structuresshown in FIG. 4 and FIG. 12.

[0194] In other words, the device ID of the PDA 11 is stored on the ICtag 12 and is read by the reader 2 of the PDA 11. Also, an ID that isidentical to the device ID stored on the IC tag 12 is provided also inthe storage unit 88 or the like, and is transmitted from thecommunication unit 89 to the personal computer 1.

[0195] The reader 151 reads and supplies, to the CPU 81, the address andthe password from the IC tag 141 of the personal computer 1. Thepassword is transmitted from the communication unit 89 to the personalcomputer 1 and is used for authentication.

[0196] Next, a process of the PDA 11 which connects to the personalcomputer 1 is described with reference to the flowchart in FIG. 19.

[0197] This process is a combination of the processes described withreference to FIG. 7, FIG. 8, and FIG. 13.

[0198] In other words, processing from step S111 to step S113 is similarto that from step S61 to step S63 in FIG. 13.

[0199] In step S111, based on an output from the reader 151, the CPU 81determines whether or not the reader 151 has read data from the IC tag141 of the personal computer 1. If the CPU 81 has determined that thereader 151 has read data, it proceeds to step S112. In step S112, theCPU 81 extracts the address and password of the personal computer 1 fromthe data read from the reader 151.

[0200] The extracted address and password are stored, for example, inthe RAM 82 or the storage unit 88 in step S113.

[0201] In step S114, similarly to step S12 in FIG. 12, the CPU 81provides the reader 2 of the personal computer 1 with the device IDstored on the IC tag 12. In other words, the reader 2 reads the deviceID.

[0202] In step S115, the CPU 81 determines whether or not the PDA 11 isinstructed to connect to the personal computer 1, and is on standbyuntil the CPU 81 determines that the PDA 11 is instructed.

[0203] When determining in step S115 that the PDA 11 is instructed toconnect to the personal computer 1, the CPU 81 proceeds to step S116,and accesses the personal computer 1 based on the stored informationsuch as the address, and transmits the device ID from the communicationunit 89.

[0204] The personal computer 1 determines whether or not the transmitteddevice ID is registered on the connection permission list. The PDA 11 isnotified of the result.

[0205] In step S117, the CPU 81 determines whether or not the personalcomputer 1 has notified the PDA 11 that the transmitted device ID isregistered on the connection permission list. If the CPU 81 hasdetermined that the personal computer 1 has not notified the PDA 11(determination of no registration has been posted), the CPU 81 proceedsto step S111 and repeatedly executes the subsequent processing.

[0206] In step S117, alternatively, if the CPU 81 has determined thatpersonal computer 1 has notified the PDA 11 of the determination thatthe device ID is registered on the connection permission list, the CPU81 proceeds to step S181.

[0207] Processing from step S118 to step S121 is similar to that fromstep S66 to step S69 in FIG. 13.

[0208] In step S118, the CPU 81 determines whether or not the PDA 11 isrequested by the personal computer 1 to transmit the password, and is onstandby until the CPU 81 determines that the CPU 81 is requested.

[0209] When determining in step S118 that the PDA 11 is requested totransmit the password, the CPU 81 proceeds to step S119, and transmitsthe stored password from the communication unit 89 to the personalcomputer 1.

[0210] In step S120, the CPU 81 determines whether or not the personalcomputer 1 has permitted the PDA 11 to connect. If the CPU 81 hasdetermined that the personal computer 1 has not permitted, it returns tostep S111, and repeatedly executes the subsequent processing.Conversely, if the CPU 81 has determined that the personal computer 1has permitted the PDA 11, it proceeds to step S121, and establishes aconnection and uses the communication unit 89 to transmit and receiveinformation.

[0211] Next, a process of the personal computer 1 which is executedcorrespondingly to the process in FIG. 19 is described with reference tothe flowchart in FIG. 20.

[0212] The process shown in FIG. 20 is basically a combination of theprocesses described with reference to FIG. 6, FIG. 9, and FIG. 14.

[0213] In step S131, a CPU of the IC tag 141 determines whether thereader 151 of the PDA 11 is positioned nearby. If the CPU has determinedthat the reader 151 is positioned nearby, it proceeds to step S132, andprovides the PDA 11 (the reader 151) with the information stored in theflash memory, such as the address, and the password.

[0214] In step S133, the CPU 21 controls the reader 2 to read the deviceID stored on the IC tag 12 of the PDA 11. The CPU 21 proceeds to stepS134, and registers the device ID on the connection permission list.

[0215] In step S135, the CPU 21 determines whether or not a connectionto the personal computer 1 is requested by the PDA 11. If the CPU 21 hasdetermined that the personal computer 1 is requested, it proceeds tostep S136 and acquires the device ID transmitted from the PDA 11.

[0216] In step S137, by referring to the connection permission list, theCPU 21 determines whether or not the transmitted device ID is registeredon the connection permission list, that is, whether or not to permit thePDA 11 to connect.

[0217] When determining in step S137 that the transmitted device ID isnot registered on the connection permission list, the CPU 21 proceeds tostep S138, and notifies the device having transmitted the device ID thata connection cannot be permitted. After that, the process returns tostep S131 and repeatedly executes the subsequent processing.

[0218] Conversely, when determining in step S137 that the transmitteddevice ID is registered on the connection permission list, the CPU 21proceeds to step S139, and notifies the PDA 11 that the device ID isregistered on the connection permission list.

[0219] Processing from step S140 to step S144 is similar to processingin step 84 to step 86, step S88, and step S89.

[0220] Specifically, in step S140, the CPU 21 requests the PDA 11 totransmit a password.

[0221] In step S141, the CPU 21 determines whether or not the passwordis transmitted. If the CPU 21 has determined that the password istransmitted, it proceeds to step S142.

[0222] In step S142, by referring to the password provided from the ICtag 141, the CPU 21 determines whether or not the transmitted passwordis valid. If the CPU 21 has determined that the transmitted password isnot valid, it proceeds to step S138, and notifies the PDA 11 that thepersonal computer 1 cannot permit the PDA 11 to connect.

[0223] When conversely determining in step S142 that the password isvalid, the CPU 21 proceeds to step S143 and notifies the PDA 11 that thepersonal computer 1 permits the PDA 11 to connect.

[0224] After that, in step S144, the connection between the personalcomputer 1 and the PDA 11 is established and various types ofinformation are transmitted and received.

[0225] As described above, also by providing each of the personalcomputer 1 and the PDA 11 with an IC tag and a reader, connections fromthose other than a user who brings a device close to the personalcomputer 1 can be restricted, and authentication therefor (determinationof whether or not the device is permitted to connect) is more complex,thus enabling unauthorized connections.

[0226] The above has mainly described a case in which the PDA 11requests a connection to the personal computer 1 and the personalcomputer 1 authenticates the PDA 11. However, obviously, the personalcomputer 1 may conversely request a connection to the PDA 11. In thiscase, not only the PDA 11 authenticates the personal computer 1 byexecuting the above process of the personal computer 1, but also boththe personal computer 1 and PDA 11 authenticate each other, whereby itmay be determined whether or not each is permitted to connect.

[0227] Next, a process in a case in which each of the personal computer1 and the PDA 11 is provided with a reader and an IC tag and either onecan request the other one is described with reference to the flowchartsin FIG. 21 and FIG. 22. Although FIG. 21 and FIG. 22 show a process ofthe personal computer 1, the PDA 11 also performs a similar process.

[0228] In step S151, the CPU 21 determines, based on an output from thereader 2, whether or not the reader 2 has read data from the IC tag 12of the PDA 11, and is on standby until the CPU 21 determines that thereader 2 has read. When the PDA 11 is brought close, and the CPU 21determines in step S151 that the PDA 11 has read the data, it proceedsto step S152, and extracts the device ID and address of the PDA 11 whichare stored on the IC tag 12 of the PDA 11.

[0229] In step S153, the CPU 21 provides the PDA 11 with the device IDand password of the personal computer 1 which are stored on the IC tag141. In other words, the reader 151 of the PDA 11 is used to read datastored on the IC tag 141.

[0230] In step S154, the CPU 21 compares the device ID of the personalcomputer 1 and the device ID of the PDA 11 read from the IC tag 12. Whenthe device IDs each consist of a number having predetermined digits, itis determined whether or not the device ID of the personal computer 1 isgreater.

[0231] In the process in FIG. 21 and FIG. 22, the device IDs are used todetermine which device of the personal computer 1 and PDA 11 is torequest a connection to the other. One device in which a greater deviceID is set can request a connection to the other device.

[0232] In other words, when determining in step S154 that the device IDof the personal computer 1 is greater, the CPU 21 proceeds to step S155,and determines whether or not a connection to the personal computer 1 isrequested by the user.

[0233] When determining in step S155 that the connection to the personalcomputer 1 is requested, the CPU 21 proceeds to step S156, and accessesthe PDA 11 based on the address acquired from the IC tag 12 of the PDA11 and requests a connection to the PDA 11.

[0234] In step S157, the CPU 21 determines whether or not the personalcomputer 1 is requested by the PDA 11 to transmit the password providedfrom the PDA 11, and is on standby until the CPU 21 determines that thepersonal computer 1 is requested.

[0235] When determining in step S157 that the personal computer 1 isrequested to transmit the password, the CPU 21 proceeds to step S158,and transmits the password acquired from the IC tag 12 of the PDA 11from the communication unit 29. The PDA 11 performs authentication(determination of whether or not the transmitted password is identicalto the password provided by the PDA 11) based on the transmittedpassword, and posts the result.

[0236] In step S159, the CPU 21 determines whether or not the passwordis authenticated (whether or not the communication unit 29 has receiveda notification of authentication). If the CPU 21 has determined that thepassword has not been authenticated, it returns to step S151 since thePDA 11 refuses the connection, and executes the subsequent processing.

[0237] When conversely determining in step S159 that the password isauthenticated, the CPU 21 proceeds to step S160, and conversely requeststhe PDA 11 to transmit the password read from the IC tag 141.

[0238] In step S161, the CPU 21 determines whether or not the PDA 11 hastransmitted the password, and is on standby until the CPU 21 determinesthat the PDA 11 has transmitted the password.

[0239] When determining in step S161 that the password has beentransmitted, the CPU 21 proceeds to step S162, and determines whether ornot the transmitted password is valid. Specifically, the CPU 21determines whether or not the password received by the communicationunit 29 is identical to the password provided by the IC tag 141.

[0240] When determining in step S162 that the password transmitted fromthe PDA 11 is not valid, the CPU 21 proceeds to step S163, and notifiesthe PDA 11 of authentication failure and stops the connection to the PDA11. After that, the CPU 21 returns to step S151, and executes thesubsequent processing.

[0241] When determining in step S162 that the password is valid, the CPU21 proceeds to step S164, and notifies the PDA 11 of authenticationsuccess. In step S165, the CPU 21 establishes the connection to the PDA11. After that, predetermined information is transmitted and receivedbetween the personal computer 1 and the PDA 11.

[0242] In step S154, conversely, if the CPU 21 has determined that thedevice ID of the personal computer 1 is not greater than (less than) thedevice ID read from the IC tag 12 of the PDA 11, it proceeds to stepS166.

[0243] This case causes the PDA 11 to request a connection to thepersonal computer 1. In step S166, the CPU 21 determines whether or notthe PDA 11 has requested the connection to the personal computer 1, andis on standby until the CPU 21 determines that the PDA 11 has requesteda connection to the personal computer 1.

[0244] When determining in step S166 that the PDA 11 has requested theconnection to the personal computer 1, it proceeds to step S167, andrequests the PDA 11 to transmit the password (the password provided fromthe personal computer 1) read from the IC tag 141.

[0245] In step S168, the CPU 21 determines whether or not the PDA 11 hastransmitted the password, and is on standby until the PDA 11 hastransmitted the password. When determining in step S168 that the PDA 11has transmitted the password, the CPU 21 proceeds to step S169, anddetermines, by confirming the password transmitted from the PDA 11 andthe password provided from the IC tag 141, whether or not thetransmitted password is valid (whether or not both passwords areidentical).

[0246] When determining in step S169 that the password is not valid, theCPU 21 proceeds to step S170, and notifies the PDA 11 of authenticationfailure. After that, the process returns to step S151, and repeatedlyexecutes the subsequent processing.

[0247] When conversely determining that the password is valid, the CPU21 notifies the personal computer 1 of authentication success in stepS171, and proceeds to step S172. The CPU 21 uses the communication unit29 to transmit the password read from the IC tag 12 of the PDA 11.

[0248] The PDA 11 performs authentication based on the transmittedpassword, and notifies the personal computer 1 of the result.

[0249] In step S173, the CPU 21 determines whether or not the PDA 11 hasauthenticated the password. If the CPU 21 has determined that the PDA 11has not authenticated the password, it returns to step S151, andrepeatedly executes the subsequent processing.

[0250] When determining in step S173 that the PDA 11 has authenticatedthe password, the CPU 21 proceeds to step S174. The CPU 21 establishes aconnection to the PDA 11, and transmits and receives various types ofinformation.

[0251] As described above, based on device IDs, by determining devicethat initiates connection requests, the connection requests can beprevented from conflicting.

[0252] Obviously, even if each of the personal computer 1 and the PDA 11is provided with readers and IC tags, both devices are controlled toexecute device ID management as described with reference to FIG. 10, andalso to execute password change as described with reference to FIG. 15,etc.

[0253] In the foregoing, the reader 2 (IC tag 141) of the personalcomputer 1 and the IC tag 12 (reader 151) of the PDA 11 are used totransmit and receive information such as a device ID, an address, and apassword in the form of electromagnetic waves. However, in a case inwhich the function is achieved by bringing both devices close to eachother, for example, various communication methods such as, for example,IrDA can be used.

[0254] Although in the foregoing the tag and the reader are constitutedby separate modules, both may be constituted by a single module.

[0255] In the foregoing, establishment of communication by Bluetooth isperformed based on, for example, information such as device IDs which istransmitted and received between the reader 2 provided in the personalcomputer 1 and the IC tag 12 provided in the PDA 11. However, even ifthe personal computer 1 and the PDA 11 each are not provided with amodule that uses electromagnetic induction to perform short distancewireless communication, by controlling the output power of radio wavesfrom a communication unit (e.g., the communication unit 89 of the PDA11), communication can be initiated only between close devices.

[0256] A communication system that specifies another terminal incommunication and initiates communication between close devices bycontrolling the output power of radio waves output from a wirelesscommunication unit is described below.

[0257]FIG. 23 is an illustration of an example of the communicationsystem.

[0258] By way of example, in the case of specifying another device incommunication using Bluetooth and establishing communication with thedevice, the PDA 11 firstly suppresses the output power of thecommunication unit 89 (e.g., a Bluetooth module) and controls radiatedradio waves to reach, for example, within a several centimeter range.

[0259] In such a state in which a very weak power mode for suppressingthe output power of radio waves is set, the communication unit 89repeatedly performs “Inquiry”, and searches for a terminal positioned ina range (e.g., within a several centimeter range) in which the radiowaves reach.

[0260] When the PDA 11 is brought close to or put on the personalcomputer 1 by the user, and the radio waves radiated by thecommunication unit 89 are received by the communication unit 29 (amodule for performing communication in accordance with the samespecifications as the communication unit 89) of the personal-computer 1,the communication unit 29 responds to the Inquiry. Thus, thecommunication unit 89 establishes a communication link by performing“Inquiry, Page” (calling) with the communication unit 29. Theestablished communication link is effective in a very narrow rangereachable by radio waves from the communication unit 89 in which thevery weak power mode is set.

[0261] Accordingly, after the communication unit 89 temporarily breaksthe communication link and changes the very weak power mode to a normalpower mode in order to enable communication with the communication unit29, even if there is some distance therebetween, the communication unit89 re-establishes a communication link with the communication unit 29,based on already acquired information (information acquired by the“Inquiry, Page” in a short distance).

[0262] The re-established communication link is effective in a range ofseveral tens of meters, etc., in which radio waves reach, similarly tocommunication in accordance with Bluetooth, and enables Bluetoothcommunication, even if the distance between the personal computer 1 andthe PDA 11 is sufficiently large.

[0263] As described above, even if the personal computer 1 and the PDA11 are not provided with wireless modules using electromagneticinduction, by controlling the output power of the communication unit,simply bringing the PDA 11 close to the personal computer 1 by the usercan establish Bluetooth communication between those terminals so thatvarious types of information, such as a device ID, an address, and apassword, can be transmitted and received.

[0264] In other words, in this case, when the PDA 11, in which the veryweak power mode is set, is brought close to the personal computer 1,Bluetooth communication in accordance with the very weak power mode isestablished, and in the communication, for example, a device ID istransmitted from the PDA 11 (the communication unit 89) and isregistered in the personal computer 1 (the communication unit 29).

[0265] After that, when the PDA 11 is instructed to connect to thepersonal computer 1 by the user, the normal power mode is set as thepower mode in the communication unit 89 of the PDA 11, andauthentication using a device ID is performed between the PDA 11 and thepersonal computer 1 is performed. Subsequently, Bluetooth communicationin accordance with the normal power mode is established.

[0266] Accordingly, even if a plurality of devices that can performcommunication using Bluetooth are positioned around the personalcomputer 1, users who can establish connections to the personal computer1 by using their own device are only those who have recorded the deviceID in the personal computer 1 by bringing their own device close to thepersonal computer 1 and performing communication in accordance with thevery weak power mode.

[0267] As described above, in the case of using information such as apassword in authentication, an address and a password are transmittedand received between the personal computer 1 and the PDA 11 when thecommunication in accordance with the very weak power mode isestablished. After that, authentication based on the password isperformed, and when the authentication is completed, communication inaccordance with the normal power mode is initiated.

[0268] Also, when the communication in accordance with the very weakpower mode is established, an exterior image of a device that initiatescommunication, or an image indicating data to be transferred aretransmitted and received, and are displayed by each device, whereby theuser can confirm processing (e.g., processing performed whencommunication in accordance with the normal power mode is established)beforehand which is performed between two devices between whichcommunication is established.

[0269] When the power mode of the communication unit 89 can beseamlessly switched, the set power mode may be switched from the veryweak power mode to the normal power mode without temporarily breakingthe communication link established when the very weak power mode is set.

[0270]FIG. 24 is a block diagram showing a detailed example of thecommunication unit 89 in FIG. 23.

[0271] The communication unit 89 includes a Bluetooth module or awireless LAN module.

[0272] A radio controller 201 controls a change-over switch 204. Theradio controller 201 connects a switch 204A to contact a whentransmitting information to an external terminal, while it connects theswitch 204A to contact b when receiving information from the externalterminal.

[0273] Based on control by the CPU 81 which is performed by using theinput/output interface 85 (FIG. 4), the radio controller 201 controls areachable range (output power) of radio waves radiated from an antenna207 by controlling the gain of a power amplifier 205.

[0274] Specifically, when being instructed by the CPU 81 to be set tohave the very weak power mode, the radio controller 201 controls thegain of the power amplifier 205 so that the reachable range of the radiowaves radiated from the antenna 207 is narrowed. Also, when anotherterminal in communication can be specified and the very weak power modeis instructed to switch to the normal power mode, the radio controller201 controls the gain of the power amplifier 205 so that the reachablerange of the output radio waves is broadened.

[0275] A baseband controller 202 controls a baseband signal in atransmitted/received signal. A modem processor 203 performs, on anoutput from the baseband controller 202, FGSK modulation processing andspread spectrum processing based on a hopping frequency, and outputs theobtained signal from the antenna 207 through the power amplifier 205.The modem processor 203 performs inverse spread spectrum processing andGFSK demodulation processing on an output from an LNA (Low NoiseAmplifier) 206, and outputs the obtained signal to the basebandcontroller 202.

[0276] Since the structure of the communication unit 29 provided in thepersonal computer 1 is similar to that of the communication unit 89shown in FIG. 24, a description thereof is omitted.

[0277] As described above, in the communication system shown in FIG. 23,the personal computer 1 and the PDA 11 are not provided with a reader,an IC tag, etc.

[0278] Next, the operation of the communication system in FIG. 23 isdescribed with reference to the flowchart in FIG. 25. FIG. 25illustrates processing which establishes communication in accordancewith Bluetooth by using a device ID and which corresponds to FIG. 6 toFIG. 9.

[0279] By way of example, when the user instructs the PDA 11 to initiatecommunication in accordance with Bluetooth, the communication unit 89 ofthe PDA 11 is activated based on control by the CPU 81. In step S201,the communication unit 89 sets the very weak power mode therein as itspower mode. The communication unit 89 proceeds to step S202, andsearches for a close terminal by repeatedly executing the Inquiry.

[0280] In the Inquiry executed in step S202, an IQ packet (Inquirypacket) is repeatedly broadcasted in a range of, for example, severalcentimeters from the antenna 207 because the very weak power mode is setto suppress the reachable range of the radio waves.

[0281] In addition, in step S221, the communication unit 29 of thepersonal computer 1 is set to be in a state of repeatedly executing anInquiry scan and a Page scan, and is on standby until it receivesInquiry and Page requests from another terminal.

[0282] When the user brings the PDA 11 close to the personal computer 1,and the communication unit 29 of the personal computer 1 is positionedin the reachable range of the radio waves from the communication unit 89of the PDA 11, the IQ packet broadcasted from the communication unit 89is received by the communication unit 29 in step S222.

[0283] When receiving the IQ packet broadcasted by the communicationunit 89, the communication unit 29 proceeds to step S223, and transmitsan FHS packet to the communication unit 89. The FHS packet includes, as(Bluetooth slave) attribute information of the personal computer 1,information representing the Bluetooth address and Bluetooth clock ofthe personal computer 1.

[0284] When receiving the FHS packet transmitted from the communicationunit 29 in step S203, the communication unit 89 proceeds to step S204,and requests a link to the communication unit 29.

[0285] In other words, when an ID packet is transmitted from thecommunication unit 89 to the communication unit 29, and an ID packetidentical to the above ID packet is sent back from the communicationunit 29 to the communication unit 89, an FHS packet which includes theBluetooth address and Bluetooth clock of the communication unit 89 istransmitted from the communication unit 89 to the communication unit 29.

[0286] When, in step S224, the FHS packet transmitted from thecommunication unit 89 is received by the communication unit 29,synchronization in frequency domain (frequency hopping pattern) and timedomain (time slot) is established between the communication unit 89 andthe communication unit 29, thus establishing a data link (communicationlink) (State 1).

[0287] For example, when a data link in accordance with Bluetooth isestablished between the communication unit 29 and the communication unit89 for the first time, in step S205, the communication unit 89 transmitsa PIN (Personal Identification Number) code to the communication unit29, and mutual authentication is performed.

[0288] In step S225, the PIN code transmitted from the communicationunit 89 is received by the communication unit 29. After that, variouslink keys based on the PIN code and random numbers are set between thecommunication unit 89 and the communication unit 29.

[0289] The transmission and reception of the PIN code may be performedafter the PIN code is encrypted by using a public key provided from thecommunication unit 29 to the communication unit 89. In other words, inthis case, the communication unit 29 manages a secret key correspondingto the public key provided to the communication unit 89 by itself. Thiscan enhance security, and it is more ensured that communication inaccordance with Bluetooth can be executed only between the personalcomputer 1 and the PDA 11.

[0290] In step S206, the communication unit 89 transmits the device IDset in the PDA 11 to the communication unit 29.

[0291] In step S226, the device ID transmitted from the communicationunit 89 is received by the communication unit 29, and, in step S227, isregistered on the connection permission list managed by the personalcomputer 1.

[0292] The device ID registered in the personal computer 1 is used forauthentication which is performed when communication in accordance withthe normal power mode is initiated.

[0293] Because the communication link established as described above iseffective in the range of several centimeters which is reached by theradio waves from the communication unit 89, in which the very weak powermode is set, in step S206, the communication unit 89 requests thecommunication unit 29 to temporarily break the data link so thatcommunication with the communication unit 29 is possible, even if thereis some distance therebetween. At this time, the information acquired inthe steps, such as the Bluetooth address of the communication unit 29and the PIN code, is stored in the communication unit 89.

[0294] When receiving the request in step S228, similarly to thecommunication unit 89, the communication unit 29 stores informationwhich has been acquired, such as the Bluetooth address of thecommunication unit 89 and the PIN code, and breaks the data link (State2).

[0295] When the PDA 11 is instructed to connect to the personal computer1 again, the communication unit 89 sets, based on control by the CPU101, the mode of output power to the normal power mode. This causesBluetooth radio waves from the communication unit 89 to reach, forexample, a range of several tens of centimeters.

[0296] Proceeding to step S209, based on the information stored justbefore the data link is broken, the communication unit 89 specifies thepersonal computer 1 as the other terminal in communication, andtransmits the device ID and requests a connection to the communicationunit 29.

[0297] When this request is received by the communication unit 29 instep S229, the CPU 21 proceeds to step S230, and determines whether ornot the device ID transmitted by the communication unit 89 (the PDA 11)is registered on the connection permission list. When determining thatthe device ID is registered, the CPU 21 permits the PDA 11 to connect.

[0298] In other words, based on the information which is transmitted andreceived in communication in accordance with the very weak power mode,and is stored, both terminals are set, thus activating a state having adata link established between the communication unit 89 and thecommunication unit 29, that is, a state in which communication inaccordance with Bluetooth can be performed, for example, in a range ofseveral tens of centimeters which is reached by the radio waves from thecommunication unit 89, in which the normal power mode is set. (State 3)

[0299] As described above, even if the personal computer 1 and the PDA11 are not provided with a reader and an IC tag, the user can register aset device ID of the PDA 11 in the personal computer 1 by simplybringing the PDA 11 close to the personal computer 1, and initiatescommunication in accordance with the normal power mode with the personalcomputer 1.

[0300] Although in the foregoing a device ID is transmitted from the PDA11 to the personal computer 1 when communication in accordance with thevery weak power mode is established, as FIG. 16 shows, information, suchas an address and a password, is transmitted from the personal computer1 to the PDA 11, and access is controlled based on the transmittedinformation.

[0301] Next, processing in which, when communication in accordance withthe very weak power mode is established, not only the information suchas the above device ID, but also an exterior image indicating a deviceto be connected is transmitted and received and the image is displayed,is described with reference to the flowchart in FIG. 26.

[0302] In this example, when the communication in accordance with thevery weak power mode is established, an exterior image of the personalcomputer 1 which is prepared beforehand can be transmitted from thepersonal computer 1 to the PDA 11.

[0303] Processing in steps S241 to S246 by the PDA 11, and processing insteps S261 to S267 by the personal computer 1 are similar to that insteps S201 to S206 in FIG. 25 and that in steps S221 to S227,respectively.

[0304] Specifically, the very weak power mode is used to establish adata link communicatable within a range of, for example, severalcentimeters, and the device ID transmitted from the communication unit89 in the PDA 11 is received by the communication unit 29 in thepersonal computer 1.

[0305] When receiving the PIN code, in step S268, the communication unit29 transmits, to the communication unit 89, the exterior image of thepersonal computer 1 which is prepared beforehand.

[0306] In step S247, the exterior image transmitted from thecommunication unit 29 is received by the communication unit 89, and isstored in the storage unit 88, or the like, of the PDA 11.

[0307] In step S248, the communication unit 89 requests thecommunication unit 29 to break the data link in accordance with the veryweak power mode, and temporarily breaks the data link.

[0308] After that, when the PDA 11 is instructed to connect to thepersonal computer 1 by the user, the communication unit 89 proceeds tostep S249, and sets the normal power mode based on control by the CPU81.

[0309] In step S250, based on the stored image data, the CPU 81 controlsthe display unit 86 to display the exterior image of the personalcomputer 1. This enables the user to confirm beforehand a terminal asthe other side in communication to which the data link in accordancewith the normal power mode is established.

[0310] For example, in step S251, when the PDA 11 is instructed by theuser to connect to the personal computer 1, whose exterior image isdisplayed on the display unit 86, the communication unit 89 proceeds tostep S252, and transmits the device ID and requests a link to thecommunication unit 29 in accordance with the normal power mode.

[0311] When the request is received by the communication unit 29 in stepS270, and device ID authentication is completed, the data link inaccordance with the normal power mode is established (State 3).

[0312] As described above, based on the data transmitted when the datalink in accordance with the very weak power mode is established, theexterior image of the terminal is displayed, whereby it is more ensuredthat communication with the terminal as the other side in communicationwhich is desired by the user can be established.

[0313] Although in the foregoing an exterior image is transmitted asinformation representing a device as the other side in communicationwhen communication in accordance with the very weak power mode isestablished, not only the image, but also various types ofcharacteristic information, such as the name of the device as the otherside in communication, may be displayed for the user.

[0314] In addition, audio information concerning the device as the otherside in communication is transmitted, and audio guidance based thereonis output, whereby, even if a device which receives the audioinformation includes no display unit, information concerning the deviceto be connected can be presented for the user beforehand.

[0315] Although the above consecutive processing can be executed byhardware, it can be executed by software.

[0316] In the case of using software to execute the consecutiveprocessing, programs constituting the software are installed from anetwork or recording media into, for example, a computer built intodedicated hardware, or a general-purpose personal computer in which, byinstalling various programs, various functions can be executed.

[0317] As FIG. 2 shows, the recording media include, not only packagemedia constituted by a magnetic disk 31 (including a floppy disk), anoptical disk 32 (CD-ROM (Compact Disk-Read Only Memory) and a DVD(Digital Versatile Disk), a magneto-optical disk 33 (including MD(registered trademark (Mini-Disk)), etc., which are distributedseparately from the device body in order to provide programs to users,but also the ROM 22, in which a program is recorded, and a hard diskincluded in the storage unit 28, which are provided to users in a stateincorporated beforehand in the device body.

[0318] In this Specification, the steps that describe programs recordedon the recording media obviously include time-series processes performedin described order, and also include processes executed in parallel orseparately.

[0319] Also, in this Specification, the system means the entirety of andevice constituted by a plurality of devices.

INDUSTRIAL APPLICABILITY

[0320] According to the present invention, simple and secure restrictedaccess can be performed.

1. A communication system comprising an information processing terminaland an information-processing device, wherein: the informationprocessing terminal comprises: providing means for providing, bywireless communication, identification information of the informationprocessing terminal to the information processing device, which ispositioned nearby; and first communication means for performing wired orwireless communication with the information processing device; wherein,when an instruction to connect to the information processing device isgiven, said first communication means transmits the identificationinformation to the information processing device, and performscommunication when communication is permitted by the informationprocessing device based on the transmitted identification information;and the information processing device comprises: acquiring means foracquiring the identification information by wireless communication fromthe information processing terminal, which is positioned nearby; secondcommunication means for performing wired or wireless communication withthe information processing terminal; and storage means for storing theidentification information acquired by said acquiring-means; wherein,when said second communication means receives the identificationinformation from the information processing terminal, and it isdetermined that the received identification information is identical tothe identification information stored in said storage means, said secondcommunication means performs communication with the informationprocessing terminal.
 2. A communication method for a communicationsystem comprising an information processing terminal and an informationprocessing device, wherein: an information processing method for theinformation processing terminal includes: a providing step for providingidentification information of the information processing terminal bywireless communication to the information processing device, which ispositioned nearby; and a first communication step for performing wiredor wireless communication with the information processing device;wherein, when an instruction to connect to the information processingdevice is given, the identification information is transmitted to theinformation processing device, and communication is performed whencommunication is permitted by the information processing device based onthe transmitted identification information; and an informationprocessing method for the information processing device includes: anacquiring step for acquiring the identification information by wirelesscommunication from the information processing terminal, which ispositioned nearby; a second communication step for performing wired orwireless communication with the information processing terminal; and astorage step for storing the identification information acquired by theprocessing of said acquiring step; wherein, when the identificationinformation is received from the information processing terminal, and itis determined that the received identification information is identicalto the identification information stored by the processing of saidstorage step, communication with the information processing terminal isperformed.
 3. An information processing terminal comprising: providingmeans for providing identification information of the informationprocessing terminal by wireless communication to an informationprocessing device positioned nearby; and communication means forperforming wired or wireless communication with the informationprocessing device, wherein, when an instruction to connect to theinformation processing device is given, said communication meanstransmits the identification information to the information processingdevice, and performs communication when communication is permitted bythe information processing device based on the transmittedidentification information.
 4. An information processing terminalaccording to claim 3, further comprising storage means for storingcommunication information for performing communication with theinformation processing device, wherein, based on the communicationinformation stored in said storage means, said communication meansaccesses the information processing device and transmits theidentification information.
 5. An information processing methodincluding: a providing step for providing identification information ofone side by wireless communication to an information processing devicepositioned nearby; and a communication step for performing wired orwireless communication with the information processing device, wherein,when an instruction to connect to the information processing device isgiven, the identification information is transmitted to the informationprocessing device, and communication is performed when communication ispermitted by the information processing device based on the transmittedidentification information.
 6. A program including: a provision controlstep for controlling provision of identification information of one sideby wireless communication to an information processing device positionednearby; and a communication control step for controlling wired orwireless communication with the information processing device, whereinsaid program causes a computer to execute transmitting theidentification information to the information processing device when aninstruction to connect to the information processing device is given,and performing communication when communication is permitted by theinformation processing device based on the transmitted identificationinformation.
 7. An information processing device comprising: acquiringmeans for acquiring first identification information by wirelesscommunication from an information processing terminal positioned nearby;communication means for performing wired or wireless communication withthe information processing terminal; and storage means for storing thefirst identification information acquired by said acquiring means,wherein, when said communication means receives second identificationinformation from the information processing terminal, and it isdetermined that the received second identification information isidentical to the first identification information stored in said storagemeans, said communication means performs communication with theinformation processing terminal.
 8. An information processing deviceaccording to claim 7, wherein said storage means deletes the firstidentification information when a predetermined period passes after thefirst identification information is stored.
 9. An information processingmethod including an acquiring step for acquiring first identificationinformation by wireless communication from an information processingterminal positioned nearby; a communication step for performing wired orwireless communication with the information processing terminal; and astorage step for storing the first identification information acquiredby the processing of said acquiring step, wherein, when secondidentification information is received from the information processingterminal, and it is determined that the received second identificationinformation is identical to the first identification information storedby the processing of said storage step, communication with theinformation processing terminal is performed.
 10. A program including:an acquisition control step for controlling acquisition by wirelesscommunication of first identification information from an informationprocessing terminal positioned nearby; a communication control step forcontrolling wired or wireless communication with the informationprocessing terminal; and a storage control step for controlling storageof the first identification information acquired by the processing ofsaid acquisition control step, wherein said program causes a computer toexecute performing communication with the information processingterminal when second identification information is received from theinformation processing terminal and it is determined that the receivedsecond identification information is identical to the firstidentification information stored by the processing of said storagecontrol step.
 11. A communication system comprising an informationprocessing terminal and an information processing device, wherein: theinformation processing terminal comprises: acquiring means foracquiring, from the information processing device, which is positionednearby, communication information for performing communication with theinformation processing device by wireless communication, and a password;and first communication means for performing wired or wirelesscommunication with the information processing device; wherein, when aninstruction to connect to the information processing device is given,said first communication means accesses the information processingdevice based on the communication information acquired by said acquiringmeans, transmits the password to the information processing device, andperforms communication when communication is permitted based on thetransmitted password by the information processing device; and theinformation processing device comprises: providing means for providingpredetermined information by wireless communication to the informationprocessing terminal, which is positioned nearby; second communicationmeans for performing wired or wireless communication to the informationprocessing terminal; and storage means for storing the communicationinformation for performing communication by said second communicationmeans, and the password, wherein: said providing means provides, as theinformation, the communication information and password stored in saidstorage means to the information processing terminal; and said secondcommunication means performs communication with the informationprocessing terminal when said second communication means receives thepassword transmitted from the information processing terminal and it isdetermined that the received password is identical to the passwordstored in said storage means.
 12. A communication method for acommunication system comprising an information processing terminal andan information processing device, wherein: an information processingmethod for the information processing terminal includes: an acquiringstep for acquiring, from the information processing device, which ispositioned nearby, communication information for performingcommunication with the information processing device by wirelesscommunication, and a password; and a first communication step forperforming wired or wireless communication with the informationprocessing device; wherein, when an instruction to connect to theinformation processing device is given, the information processingdevice is accessed based on the communication information acquired bythe processing of said acquiring step, the password is transmitted tothe information processing device, and communication is performed whencommunication is permitted by the information processing device based onthe transmitted password; and an information processing method for theinformation processing device includes: a providing step for providingpredetermined information by wireless communication to the informationprocessing terminal, which is positioned nearby; a second communicationstep for performing wired or wireless communication to the informationprocessing terminal; and a storage step for storing the communicationinformation for performing communication by the processing of saidsecond communication step, and the password; wherein: the communicationinformation and password stored by the processing of said storage stepare provided as the information to the information processing terminal;and when the password transmitted from the information processingterminal is received, and it is determined that the received password isidentical to the password stored by the processing of said storage step,communication with the information processing terminal is performed. 13.An information processing terminal comprising: acquiring means foracquiring, from an information processing device positioned nearby,communication information for performing communication with theinformation processing device by wireless communication, and a password;and communication means for performing wired or wireless communicationwith the information processing device, wherein, when an instruction toconnect to the information processing device is given; saidcommunication means accesses the information processing device based onthe communication information acquired by said acquiring means,transmits the password to the information processing device, andperforms communication when communication is permitted by theinformation processing device based on the transmitted password.
 14. Aninformation processing method including: an acquiring step foracquiring, from an information processing device positioned nearby,communication information for performing communication with theinformation processing device by wireless communication, and a password;and a communication step for performing wired or wireless communicationwith the information processing device, wherein, when an instruction toconnect to the information processing device is given, the informationprocessing device is accessed based on the communication informationacquired by the processing of the said acquiring step, the password istransmitted to the information processing device, and communication isperformed when communication is permitted by the information processingdevice based on the transmitted password.
 15. A program including: anacquisition control step for controlling acquisition, from aninformation processing device positioned nearby, of communicationinformation for performing communication with the information processingdevice by wireless communication, and a password; and a communicationcontrol step for controlling wired or wireless communication with theinformation processing device, wherein said program causes a computer toexecute accessing the information processing device based on thecommunication information acquired by the processing of said acquisitioncontrol step when an instruction to connect to the informationprocessing device is given, transmitting the password to the informationprocessing device, and performing communication when communication ispermitted by the information processing device based on the transmittedpassword.
 16. An information processing device comprising: providingmeans for providing predetermined information by wireless communicationto an information processing terminal positioned nearby; communicationmeans for performing wired or wireless communication with theinformation processing terminal; and storage means for storingcommunication information for performing communication by saidcommunication means and a first password, wherein: said providing meansprovides, as the information, the communication information and firstpassword stored in said storage means to the information processingterminal; and said communication means performs communication with theinformation processing terminal when said communication means receives asecond password transmitted from the information processing terminal andit is determined that the received second password is identical to thefirst password.
 17. An information processing device according to claim16, wherein said storage means changes the first password in apredetermined cycle.
 18. An information processing method including: aproviding step for providing predetermined information by wirelesscommunication to an information processing terminal positioned nearby; acommunication step for performing wired or wireless communication withthe information processing terminal; and a storage step for storingcommunication information for performing communication by the processingof said communication means, and a first password, wherein: thecommunication information and first password stored by the processing ofsaid storage step are provided as the information to the informationprocessing terminal; and when a second password transmitted from theinformation processing terminal is received, and it is determined thatthe received second password is identical to the first password,communication with the information processing terminal is performed. 19.A program including: a provision control step for controlling provisionby wireless communication of predetermined information to an informationprocessing terminal positioned nearby; a communication control step forcontrolling wired or wireless communication with the informationprocessing terminal, and a storage control step for controlling storageof communication information for performing communication by theprocessing of said communication control step and a first password,wherein: said program causes a computer to execute: providing, as theinformation., the communication information and first password stored bythe processing of said storage control step to the informationprocessing terminal; and performing communication with the informationprocessing terminal when a second password transmitted from theinformation processing terminal is received, and it is determined thatthe received second password is identical to the first password.
 20. Acommunication system comprising an information processing terminal andan information processing device, wherein: the information processingterminal comprises: first providing means for providing identificationinformation of the information processing terminal by wirelesscommunication to the information processing device, which is positionednearby; first acquiring means for acquiring, from the informationprocessing device, communication information for performingcommunication with the information processing device by wirelesscommunication, and a password; and first communication means forperforming wired or wireless communication with the informationprocessing device, wherein, when an instruction to connect to theinformation processing device is given, said first communication meansaccesses the information processing device based on the communicationinformation acquired by said first acquiring means, transmits theidentification information and the password to the informationprocessing device, and performs communication when communication ispermitted by the information processing device based on the transmittedidentification information and password; and the information processingdevice comprises: second providing means for providing predeterminedinformation by wireless communication to the information processingterminal, which is positioned nearby; second acquiring means foracquiring the identification information from the information processingterminal by wireless communication; first storage means for storing theidentification information acquired by said second acquiring means;second communication means for performing wired or wirelesscommunication with the information processing terminal; and secondstorage means for storing the communication information for performingcommunication by said second communication means and the password,wherein: said second providing means provides, as the information, thecommunication information and password stored in said second storagemeans to the information processing terminal; and said secondcommunication means performs communication with the informationprocessing terminal when said second communication means receives theidentification information and password transmitted from the informationprocessing terminal, and it is determined that the receivedidentification information is identical to the identificationinformation stored in said first storage means and it is determined thatthe received password is identical to the password stored in said secondstorage means.
 21. A communication method for a communication systemcomprising an information processing terminal and an informationprocessing device, wherein: an information processing method for theinformation processing terminal includes: a first providing step forproviding identification information of the information processingterminal by wireless communication to the information processing device,which is positioned nearby; a first acquiring step for acquiring, fromthe information processing device, communication information forperforming communication with the information processing device bywireless communication, and a password; and a first communication stepfor performing wired or wireless communication with the informationprocessing device, wherein, when an instruction to connect to theinformation processing device is given, the information processingdevice is accessed based on the communication information acquired bythe processing of said first acquiring step, the identificationinformation and the password are transmitted to the informationprocessing device, and communication is performed when communication ispermitted based on the transmitted identification information andpassword; and an information processing method for the informationprocessing device includes: a second providing step for providingpredetermined information by wireless communication to the informationprocessing terminal, which is positioned nearby; a second acquiring stepfor acquiring the identification information from the informationprocessing terminal by wireless communication; a first storage step forstoring the identification information acquired by the processing ofsaid second acquiring step; a second communication step for performingwired or wireless communication to the information processing terminal;and a second storage step for storing the communication information forperforming communication by the processing of said second communicationstep, and the password, wherein: the communication information andpassword stored by the processing of said second storage step areprovided as the information to the information processing terminal; andcommunication with the information processing terminal is performed whenthe identification information and password transmitted from theinformation processing terminal are received, and it is determined thatthe received identification information is identical to theidentification information stored by the processing of said firststorage step and it is determined that the received password isidentical to the password stored by the processing of said secondstorage step.
 22. An information processing terminal comprising:providing means for providing identification information of theinformation processing terminal by wireless communication to aninformation processing device positioned nearby; acquiring means foracquiring, from the information processing device, communicationinformation for performing communication with the information processingdevice by wireless communication and a password; and communication meansfor performing wired or wireless communication with the informationprocessing device, wherein, when an instruction to connect to theinformation processing device is given, said communication meansaccesses the information processing device based on the communicationinformation acquired by said acquiring means, transmits theidentification information and the password to the informationprocessing device, and performs communication when communication ispermitted by the information processing device based on the transmittedidentification information and password.
 23. An information processingmethod including: a providing step for providing identificationinformation of one side to an information processing device positionednearby; an acquiring step for acquiring, from the information processingdevice, communication information for performing communication with theinformation processing device by wireless communication, and a password;and a communication step for performing wired or wireless communicationwith information processing device, wherein, when an instruction toconnect to the information processing device is given, the informationprocessing device is accessed based on the communication informationacquired by the processing of said acquiring step, the identificationinformation and the password are transmitted to the informationprocessing device, and communication is performed when communication ispermitted by the information processing device based on the transmittedidentification information and password.
 24. A program including: aprovision control step for controlling provision by wirelesscommunication of identification information of one side to aninformation processing device positioned nearby; an acquisition controlstep for controlling acquisition by wireless communication from theinformation processing device of communication information forperforming communication with the information processing device, and apassword; and a communication control step for controlling wired orwireless communication with the information processing device, whereinsaid program causes a computer to execute accessing the informationprocessing device based on the communication information acquired by theprocessing of said acquisition control step when an instruction toconnect to the information processing device is given, transmitting theidentification information and the password to the informationprocessing device, and performing communication when communication ispermitted by the information processing device based on the transmittedidentification information and password.
 25. An information processingdevice comprising: providing means for providing predeterminedinformation by wireless communication to an information processingterminal positioned nearby; acquiring means for acquiring, from theinformation processing terminal, first identification information bywireless communication; first storage means for storing the firstidentification information acquired by said acquiring means;communication means for performing wired or wireless communication withthe information processing terminal; and second storage means forstoring communication information for performing communication by saidcommunication means, and a first password, wherein: said providing meansprovides, as the information, the communication information and firstpassword stored in said second storage means to the informationprocessing terminal; and when said communication means receives thesecond identification information and second password transmitted fromthe information processing terminal, and it is determined that thereceived second identification information is identical to the firstidentification information stored in said first storage means and it isdetermined that the received second password is identical to the firstpassword, said communication means performs communication with theinformation processing terminal.
 26. An information processing deviceaccording to claim 25, wherein said first storage means deletes thefirst identification information when a predetermined period passesafter the first identification information is stored.
 27. An informationprocessing device according to claim 25, wherein said second storagemeans changes the first password in a predetermined cycle.
 28. Aninformation processing method including: a providing step for providingpredetermined information by wireless communication to an informationprocessing terminal positioned nearby; an acquiring step for acquiringfirst identification information from the information processingterminal by wireless communication; a first storage step for storing thefirst identification information acquired by the processing of saidacquiring step; a communication step for performing wired or wirelesscommunication with the information processing terminal; and a secondstorage step for storing communication information for performingcommunication by the processing of said communication step, and a firstpassword, wherein: the communication information and first passwordstored by the processing of said second storage step are provided as theinformation to the information processing terminal; and when the secondidentification information and second password transmitted from theinformation processing terminal are received, and it is determined thatthe received second identification information is identical to the firstidentification information stored by the processing of said firststorage step and it is determined that the received second password isidentical to the first password, communication with the informationprocessing terminal is performed.
 29. A program including: a provisioncontrol step for controlling provision of predetermined information bywireless communication with an information processing terminalpositioned nearby; an acquisition control step for controllingacquisition by wireless communication of first identificationinformation from the information processing terminal; a first storagecontrol step for controlling storage of the first identificationinformation acquired by the processing of said acquisition control step;a communication control step for controlling wired or wirelesscommunication with the information processing terminal; and a secondstorage control step for controlling storage of communicationinformation for performing communication by the processing of saidcommunication control step and the first password, wherein: said programexecutes a computer to execute: providing, as the information, thecommunication information and first password stored by the processing ofsaid second storage control step; and performing communication with theinformation processing terminal when the second identificationinformation and second password transmitted from the informationprocessing terminal are received, and it is determined that the receivedsecond identification information is identical to the firstidentification information stored by the processing of the first storagecontrol step and it is determined that the received second password isidentical to the first password.