Electronic storage apparatus, authentication apparatus and authentication method

ABSTRACT

An electronic storage apparatus comprises a biometrics information inputting section, a collation section for comparing and collating collation biometrics characteristic information and reference biometrics characteristic information with each other, an authentication result retention section for retaining, where it is recognized that the collation biometrics characteristic information is that of an owner, the result of the authentication, a secret information outputting section capable of outputting secret information of the owner stored in a secret information storage section to the outside, and an authentication result deletion section for deleting, when an unused state detection section detect that the secret information outputting section is in an unused state, the result of authentication retained by the authentication result retention section, whereby the security strength of a card type storage medium is raised and the electronic storage apparatus can be used more easily by a user.

This application is a continuation application, filed under 35 usc111(a), of International Application PCT/JP02/08836, filed Aug. 30,2002.

TECHNICAL FIELD

The present invention relates to an electronic storage apparatus, anauthentication apparatus and an authentication method suitable for useto authenticate that an object person of authentication is an owner of acard type storage medium.

BACKGROUND ART

In recent years, popularization of IC cards has been and is proceedingin various types of industry and business and various fields regardlessof whether they are of the contact type and the contactless type suchthat, for example, a contact type IC card is used as a credit card or acontactless type IC card is used as a commutation ticket for an electriccar. An IC card has an integrated circuit (IC: Integrated Circuit) builttherein and is advantageous in that, when compared with a magnetic cardof the type which stores information in a magnetic section thereof, thestorable data capacity is great, that forgery thereof is difficult, andso forth. Further, a contactless type IC card has a characteristic thatcontactless communication is possible, and so forth. Thus, IC cardshaving various functions can be implemented by incorporating circuitsfor implementing various functions into the IC cards.

It is to be noted that the contactless type IC card is formed byembedding contactless interface antenna in the form of a coil therein,and induced electromotive force is generated by radio waves transmittedfrom a transmission antenna of an IC card reader to convert the receivedradio waves into electric energy to drive the IC.

In such a conventional IC card as described above, generally a passwordauthentication method is used to authenticate that a user of the IC cardis a legal user. In particular, secret information (for example, an ID(Identification) number, a password and so forth) of an owner stored inan IC memory of an IC card is normally protected against accessingthereto (protect setting). Then, when a user tries to use the IC card, arequest to input a password is issued to the user, and, if an inputtedpassword is coincides with the password set in advance, then it isauthenticated that the user of the IC card is the owner of the IC card.

Then, only in the case wherein it is authenticated that the user of theIC card is the owner of the IC card in this manner, the IC card is setsuch that the secret information stored in the IC memory thereof can beread out from the IC card reader (protect cancellation), and the secretinformation is transmitted in accordance with a request from the IC cardreader. It is to be noted that cancellation of protect of an IC card issometimes called retention of a result of authentication in an IC card.

However, such a conventional password authentication method of an ICcard as described above has essential vulnerability in security that ahuman being itself cannot be identified. In other words, theconventional password authentication method has a subject in that, whereso-called “impersonation” is performed using a legal password acquiredby means of an illegal procedure such as leakage of a password, analysisof a password or the like, prevention of illegal use of an IC card by anillegal user is difficult.

Therefore, also for an IC card, it is demanded to enhance theauthentication strength in the personal identification by introducingbiometrics authentication which is a collation technique for identifyinga pattern of a fingerprint or the like which is part of the body.

However, since basically the size of a contact type IC card isprescribed by a standard or the like, for example, if a contact type ICcard is not formed such that the thickness thereof remains within apredetermined thickness (for example, 0.78 mm), then it cannot be usedwith an existing IC card reader or IC card reader/writer cannot. Thesize of a circuit and a device which can be incorporated in such acontact type IC card is limited, and in the present situation, it isdifficult to incorporate an intricate function such as a function forfingerprint authentication or the like in an IC card itself.

Further, also regarding an IC card of the contactless type (hereinafterreferred to as contactless type IC card), there is the possibility that,if a circuit part for implementing an authentication function isdisposed in the proximity of an antenna for a contactless interface,then noise may be generated and obstruct communication with the IC cardreader. Also, there is the possibility that, if many chips and so forthare provided in a card, then generation of electromotive force may beobstructed by an influence of the chips and sufficient electromotiveforce may not be obtained. Therefore, it is impractical to incorporate acircuit for implementing biometrics authentication in such a contactlesstype IC card as described above.

Further, after authentication of an owner of an IC card is performed byan authentication function, it is necessary to retain a result of theauthentication in the IC card at least until communication between theIC card and the IC card reader is started (in other words, it isnecessary to keep the IC card in a state wherein secret information canbe read out from the IC card using the IC card reader).

However, from the IC card which is in such a state wherein it retains aresult of authentication as just described, secret information can befreely read out using the IC card reader. Consequently, for example, ifthe IC card is lost while it is in the state wherein a result ofauthentication is retained therein, then there is the possibility thatthe IC card may be used by a person by whom the IC card is acquired.Therefore, there is a subject that, if a result of authentication of anIC card is retained for a long period time in the IC card, then thisincreases the vulnerability in security of the IC card.

It is to be noted that, while it is a possible idea to provide an ICcard with a timer function so that a result of authentication set in theIC card is deleted after a predetermined period of time elapses, thereis a subject that it is difficult to set the preset value for the timerto an optimum value. In particular, if the preset value of the timer isexcessively short, then a result of authentication is deleted beforecommunication between the IC card and the IC card reader starts and theIC card cannot be used. On the other hand, if the set value of the timeris excessively long, then the security of the IC card degrades similarlyas in the case wherein a timer is not set. In this manner, there is thepossibility that it becomes very difficult for the user to use the ICcard becomes.

The present invention has been made in view of such subjects asdescribed above, and it is an object of the present invention to providean electronic storage apparatus, an authentication apparatus and anauthentication method which raise the security strength of a card typestorage medium and can be used easily by a user.

DISCLOSURE OF THE INVENTION

In order to attain the object described above, according to the presentinvention, an electronic storage apparatus comprises a secretinformation storage section for storing secret information regarding anowner, a biometrics information inputting section for inputtingbiometrics information of an object person of authentication, anextraction section for extracting collation biometrics characteristicinformation from the biometrics information inputted from the biometricsinformation inputting section, a collation section for comparing andcollating the collation biometrics characteristic information extractedby the extraction section and reference biometrics characteristicinformation with each other, an authentication result retention sectionfor retaining, where it is recognized from a result of the collation bythe collation section that the collation biometrics characteristicinformation is that of the owner, the result of authentication, a secretinformation outputting section-capable of outputting the secretinformation stored in the secret information storage section to theoutside, a communication controlling section for causing, where theresult of authentication retained by the authentication result retentionsection indicates that the collation biometrics characteristicinformation is that of the owner, the secret information outputtingsection to output the secret information stored in the secretinformation storage section, an unused state detection section capableof detecting that the secret information outputting section is in anunused state, and an authentication result deletion section fordeleting, when the unused state detection section detect that the secretinformation outputting section is in an unused state, the result ofauthentication retained by the authentication result retention section.

The secret information outputting section may include a contact typeterminal and can output the secret information to the outside of theelectronic storage apparatus through the contact type terminal. Or, thesecret information outputting section may include a non-contact typecommunication function and can output the secret information to theoutside of the electronic storage apparatus by means of the non-contacttype communication function.

The electronic storage apparatus may be configured such that at leastthe secret information outputting section is provided on a card sectionhaving a shape of a card, and at least the biometrics informationinputting section is provided in a main body section connected forcommunication to the card section. Further, the electronic storageapparatus may be configured such that one end portion of the cardsection and the main body section are connected to each other by a hingesuch that the card section can be attached for folding with respect tothe main body section, and the unused state detection section detectsthat the card section is in an unused state by detecting a state whereinthe card section is folded.

Or, the electronic storage apparatus may be configured such that thecard section is removably attached to the main body section, and theunused state detection section detects that the card section is in anunused state by detecting that, after it is detected by the collationsection that the collation biometrics characteristic information is thatof the owner, the card section is removed from the main body sectiononce and then attached to the main body section again. Further, the cardsection may be configured for insertion into the main body section.

Further, according to the present invention, an authenticationapparatus, on which a card type storage medium including a secretinformation storage section for storing secret information of an owner,an output permission retention section capable of retaining an outputpermission for permitting outputting of the secret information, a secretinformation outputting section capable of outputting the secretinformation stored in the secret information storage section to theoutside, and a communication controlling section for causing, where theoutput permission is retained in the output permission retentionsection, the secret information outputting section to output the secretinformation stored in the secret information storage section can bemounted, for authenticating that an object person of authentication isthe owner of the card type storage medium, comprises a card type storagemedium attaching section capable of removably attaching the card typestorage medium thereto, a biometrics information inputting section forinputting biometrics information of the object person of authentication,an extraction section for extracting collation biometrics characteristicinformation from the biometrics information inputted through thebiometrics information inputting section, a collation section forcomparing and collating the collation biometrics characteristicinformation extracted by the extraction section and reference biometricscharacteristic information, an output permission setting section forcausing, where it is recognized from a result of the collation by thecollation section that the collation biometrics characteristicinformation is that of the owner, the output permission retentionsection of the card type storage medium to retain the output permission,an unused state detection section capable of detecting that the cardtype storage medium is in an unused state, and an authentication resultdeletion section for deleting, when the unused state detection sectiondetects that the card type storage medium is in an unused state, theoutput permission retained by the output permission retention section.

The unused state detection section may detect that the card type storagemedium is in an unused state by detecting that, after it is recognizedby the collation section that the collation biometrics characteristicinformation is that of the owner, the card type storage medium isremoved from the card type storage medium attaching section once andthen attached to the card type storage medium attaching section again.The card type storage medium may be configured for insertion into thecard type storage medium attaching section.

Further, according to the present invention, an authentication methodfor authenticating that an object person of authentication is an ownerof a card type storage medium in which secret information is storedcomprises a biometrics information inputting step of inputtingbiometrics information of the object person of authentication, anextraction step of extracting collation biometrics characteristicinformation from the biometrics information inputted at the biometricsinformation inputting step, a collation step of comparing and collatingthe collation biometrics characteristic information extracted at theextraction step and reference biometrics characteristic information, anauthentication result retention step of retaining, where it isrecognized from a result of the collation at the collation step that thecollation biometrics characteristic information is that of the owner,the result of the authentication, a secret information outputting stepcapable of outputting, where the result of the authentication retainedat the authentication result retention step indicates that the collationbiometrics characteristic information is that of the owner, the secretinformation to the outside, an unused state detection step capable ofdetecting that the card type storage medium is in an unused state, andan authentication result deletion step of deleting, where it is detectedat the unused state detection step that the card type storage medium isin an unused state, the result of the authentication retained at theauthentication result retention step.

According to the electronic storage apparatus, authentication apparatusand authentication method of the present invention, the followingeffects or advantages can be anticipated.

(1) Since collation biometrics characteristic information extracted frominputted biometrics information of an object person of authenticationand reference biometrics characteristic information are compared andcollated with each other and, if it is recognized that the collationbiometrics characteristic information is that of an owner, then theresult of the authentication is retained and secret information isoutputted to the outside, the secret information is outputted only whenit is recognized that the collation biometrics characteristicinformation is that of the owner. Consequently, the authenticationstrength in personal identification can be enhanced and “impersonation”by any other than the owner can be prevented, and illegal use of the ICcard by a person having no fair authority can be prevented to raise thesecurity strength.

(2) When it is detected that a card type storage medium is in an unusedstate, the retained authentication result is deleted. Consequently, evenif the electronic storage apparatus is lost or in a like case, any thirdparty who acquires the electronic storage apparatus cannot use theelectronic storage apparatus at all. Also this can enhance the security.

(3) Where secrete information is outputted to the outside of theelectronic storage apparatus through the contact type terminal, thesecret information can be outputted with certainty.

(4) Where secrete information is outputted to the outside of theelectronic storage apparatus by the contactless type communicationfunction, the secret information can be communicated readily with theoutside.

(5) Where at least the secret information outputting section is providedon the card section having a card shape and at least the biometricsinformation inputting section is provided on the main body sectionconnected for communication with the card section, it is possible to usethe main body section to input biometrics information and use the cardsection to communicate with the outside. Consequently, the availabilityis high.

(6) Where the one end portion of the card section and the main bodysection are connected to each other by the hinge such that the cardsection can be attached for folding with respect to the main bodysection and it is detected that the card section is in an unused stateby detecting a state wherein the card section is folded, the unusedstate of the card section can be recognized readily and with certaintywith a simple configuration.

(7) Also where the card section is removably attached to the main bodysection and it is detected that, after it is recognized that thecollation biometrics characteristic information is that of the owner,the card section is removed from the main body section once and thenattached to the main body section again, the unused state of the cardsection can be recognized readily and with certainty with a simpleconfiguration.

(8) Where the card section is configured for insertion into the mainbody section, the present apparatus can be configured simply.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing a functional configuration of an ICcard apparatus (electronic storage apparatus) with an authenticationfunction as a first embodiment of the present invention;

FIG. 2 is a perspective view schematically showing an appearance of theIC card apparatus with an authentication function as the firstembodiment of the present invention;

FIG. 3 is a perspective view schematically showing an appearance of theIC card apparatus with an authentication function as the firstembodiment of the present invention;

FIG. 4 is atop plan view showing the IC card apparatus with anauthentication function as the first embodiment of the present inventionin a developed state as viewed from a face of the side on which afingerprint sensor is mounted;

FIG. 5 is a view schematically showing a configuration of a springmechanism in the IC card apparatus with an authentication function asthe first embodiment of the present invention;

FIG. 6 is a schematic view showing a configuration of a spring mechanismin the IC card apparatus with an authentication function as the firstembodiment of the present invention;

FIG. 7 is a perspective view schematically showing a configuration ofhinge and lock mechanisms of the IC card apparatus with anauthentication function as the first embodiment of the presentinvention;

FIG. 8 is a side sectional view, partly broken, showing the hinge andlock mechanisms of the IC card apparatus with an authentication functionas the first embodiment of the present invention;

FIG. 9 is a perspective view showing the lock mechanism of the IC cardapparatus with an authentication function as the first embodiment of thepresent invention;

FIG. 10 is a flow chart illustrating an authentication process of a user(object person of authentication) by the IC card apparatus with anauthentication function as the first embodiment of the presentinvention;

FIG. 11 is a flow chart illustrating another authentication process of auser (object person of authentication) by the IC card apparatus with anauthentication function as the first embodiment of the presentinvention;

FIG. 12 is a block diagram showing a functional configuration of an ICcard apparatus (electronic storage apparatus) having an authenticationfunction as a second embodiment of the present invention;

FIG. 13 is a perspective view schematically showing an appearance of theIC card apparatus with an authentication function as the secondembodiment of the present invention; and

FIG. 14 is a perspective view schematically showing a configuration ofan IC card apparatus (authentication apparatus) with an authenticationfunction as a modification of the present invention.

BEST MODE FOR CARRYING OUT THE INVENTION

In the following, embodiments of the present invention are describedwith reference to the drawings.

(A) Description of the First Embobiment

FIG. 1 is a block diagram showing a functional configuration of an ICcard apparatus (electronic storage apparatus) with an authenticationfunction as a first embodiment of the present invention, and FIGS. 2 and3 are perspective views schematically showing an appearance of the ICcard apparatus. It is to be noted that FIG. 2 shows the present IC cardapparatus 1 a with an authentication function in an opened (used) state,and FIG. 3 shows the IC card apparatus 1 a in a closed (unused) state.

The IC card apparatus 1 a with an authentication function of the firstembodiment is an IC card (card type storage medium) having anauthentication function for authenticating, using biometrics informationof an object person of authentication, that the object person ofauthentication is an owner of the IC card apparatus 1 a with anauthentication function. Further, if it is authenticated that the objectperson of authentication is an owner of the IC card apparatus 1 a withan authentication function, then the IC card apparatus la can outputsecret information (login ID (Identification) and password) stored in asecret information storage section 12 (hereinafter described) using anIC card reader (not shown).

As shown in FIG. 1, the IC card apparatus 1 a with an authenticationfunction includes a biometrics information inputting section 4, anextraction section 5, a reference biometrics characteristic informationstorage section 6, a collation section 7, an authentication resultretention section 8, an authentication result deletion section 9, acommunication controlling section 10, an unused state detection section11, a secret information storage section 12, and a secret informationoutputting section 13.

Further, in the present embodiment, the biometrics information inputtingsection 4, extraction section 5, reference biometrics characteristicinformation storage section 6, collation section 7, authenticationresult retention section 8, authentication result deletion section 9,communication controlling section 10 and unused state detection 11 areprovided on a main body section 2 a, and the secret information storagesection 12 and secret information outputting section 13 are provided ona card section 3 a. The main body section 2 a and the card section 3 aare connected for opening and closing motion to each other through ahinge 17 (refer to FIGS. 2 and 3; details are hereinafter described).

It is to be noted that the components provided on the main body section2 a and the components provided on the card section 3 a are connected toeach other, for example, through FPC (Flexible Printed Circuits) wires.

The card section 3 a has a shape (card shape) same as or substantiallysame as that of a conventional IC card. The card section 3 a includes acommunication function similarly as in a conventional IC card.Therefore, the card section 3 a can output secret information stored inthe secret information storage section 12 through the secret informationoutputting section 13 using an existing IC card reader or IC cardreader/writer, and can write secret information into a memory not shownor the like using an IC card reader/writer. In particular, the size andthe communication standard (protocol) of the card of the card section 3a comply with a standard regarding existing IC cards.

The secret information storage section 12 has secret information(personal identification code) stored in advance therein regarding anowner of the IC card apparatus la with an authentication function. Thepersonal identification code stored as secret information includes, forexample, ID (Identification) information such as a login ID, a password,a personal identification number, a secret key and so forth.

The secret information outputting section 13 outputs the secretinformation stored in the secret information storage section 12 to theoutside, and is formed, for example, as a terminal (contact typeterminal) for communicating with an IC reader (not shown) or as a coilantenna (contactless type communication function). As shown in FIG. 2,in the IC card apparatus 1 a with an authentication function, acommunication terminal 31 formed as a contact type terminal is used asthe secret information outputting section 13.

The biometrics information inputting section 4 inputs (samples)biometrics information (organism information) of an object person ofauthentication (user). In the present embodiment, the biometricsinformation inputting section 4 is implemented by a fingerprintinputting apparatus (fingerprint sensor 41; refer to FIG. 2) forsampling, as image data, a fingerprint as biometrics information.

The extraction section 5 extracts collation biometrics characteristicinformation from the biometrics information inputted from the biometricsinformation inputting section 4. The collation biometrics characteristicinformation storage section 6 stores (preserves) the referencebiometrics characteristic information regarding an owner of the IC cardapparatus la with an authentication function in advance.

The collation section 7 compares and collates the collation biometricscharacteristic information extracted by the extraction section 5 and thereference biometrics characteristic information stored in the referencebiometrics characteristic information storage section 6 with each other.

The authentication result retention section 8 retains, if it isrecognized from a result of the collation by the collation section 7that the collation biometrics characteristic information is that of theowner, a result of the authentication. More particularly, theauthentication result retention section 8 sets a flag indicating thatthe collation biometrics characteristic information is that of theowner.

The authentication result deletion section 9 deletes, when the unusedstate detection section 11 detects that the secret informationoutputting section 13 is in an unused state, the result of theauthentication retained in the authentication result retention section8. More particularly, the authentication result deletion section 9resets the flag set in the authentication result retention section 8.

The communication controlling section 10 causes, if the result of theauthentication retained by the authentication result retention section 8indicates that the collation biometrics characteristic information isthat of the owner, the secret information outputting section 13 tooutput the secret information stored in the secret information storagesection 12. More particularly, the communication controlling section 10causes, if the flag indicating that the collation biometricscharacteristic information is that of the owner is set in theauthentication result retention section 8, the secret informationoutputting section 13 to output the personal identification code storedin the secret information storage section 12.

In the IC card apparatus 1 a with an authentication function, if it isauthenticated from the result of the collation between the collationbiometrics characteristic information and the reference biometricscharacteristic information by the collation section 7 that the collationbiometrics characteristic information extracted by the extractionsection 5 is that of the owner, then the flag indicating the result ofthe authentication is set in the authentication result retention section8. Then, the communication controlling section 10 issues (controls)transmission permission to the secret information outputting section 13so as to output the personal identification code (secret information)stored in the secret information storage section 12.

The unused state detection section 11 detects that the secretinformation outputting section 13 (card section 3 a) is in an unusedstate. In the first embodiment, the unused state detection section 11detects that the card section 3 a and the main body section 2 a areclosed to detect that the secret information outputting section 13 (cardsection 3 a) is placed into an unused state.

In the first embodiment, that the card section 3 a and the main bodysection 2 a are closed is detected by a folding detection section 18(refer to FIG. 2) hereinafter described thereby to detect that thesecret information outputting section 13 (card section 3 a) is placedinto an unused state. It is to be noted that the unused state detectionsection 11 is not limited to this, but the unused state detectionsection 11 may detect that a lock mechanism 15 (refer to FIG. 5)hereinafter described is unlocked thereby to detect that the cardsection 3a and the main body section 2 are closed, and variations andmodifications can be made without departing from the scope of thepresent invention.

The authentication result deletion section 9 deletes, when the unusedstate detection section 11 detects that the secret informationoutputting section 13 (card section 3 a) is in an unused state, theresult of authentication retained in the authentication result retentionsection 8. In particular, the authentication result deletion section 9deletes (resets) the flag retained in the authentication resultretention section 8 and indicating that collation biometricscharacteristic information is that of the owner.

Then, in the IC card apparatus 1 a with an authentication function,since the flag set in the authentication result retention section 8 isdeleted in such a manner as described, the secret information outputtingsection 13 cannot output the personal identification code (secretinformation) stored in the secret information storage section 12.

It is to be noted that, in the IC card apparatus la with anauthentication function, for example, a CPU (Central Processing Unit), aROM (Read Only Memory), a RAM (Random Access Memory) and so forth areconnected to each other by a bus line. In this instance, the functionsas the biometrics information inputting section 4, extraction section 5,collation section 7, authentication result deletion section 9,communication controlling section 10 and unused state detection section11 can be implemented by the CPU, and the functions as the referencebiometrics characteristic information storage section 6, authenticationresult retention section 8 and secret information storage section 12 canbe implemented by the ROM and/or the RAM. Further, the function as thesecret information outputting section 13 can be implemented by acommunication terminal 31 hereinafter described or a communicationantenna.

Now, a structure of the IC card apparatus 1 a with an authenticationfunction as the first embodiment of the present invention is describedwith reference to FIGS. 2 to 9. FIG. 4 is atop planview showing the ICcard apparatus with an authentication function as the first embodimentof the present invention in a developed state as viewed from a face ofthe side on which the fingerprint sensor 41 is mounted. FIGS. 5 and 6are schematic views showing a configuration of a spring mechanism of thefinger print sensor 41. It is to be noted that FIG. 5 shows the cardsection 3 a and the main body section 2 in a closed state, and FIG. 6shows the card section 3 a and the main body section 2 in an open state.

As shown in FIGS. 2 and 3, the IC card apparatus la with anauthentication function includes the main body section 2 a including thefingerprint sensor 41 and the card section 3 a including thecommunication terminal 31. The main body section 2 a and the cardsection 3 a are connected for opening and closing motion through thehinge 17 in such a manner as described above. In particular, an edge ofa face of the card section 3 a on which the communication terminal 31 isformed is connected for pivotal motion through the hinge 17 to an edgeof a face of the main body section 2 a on which the fingerprint sensor41 is formed. Thus, by closing the hinge 17, the face of the main bodysection 2 a on which the fingerprint sensor 41 is formed and the face ofthe card section 3 a on which the communication terminal 31 is formedcan be placed one on the other to cover each other (refer to FIG. 3),and by opening the hinge 17, the card section 3 a and the main bodysection 2 a can be developed so as to form a substantially same plane(refer to FIG. 2).

Then, when the owner tries to use the fingerprint sensor 41 of the mainbody section 2 a, the hinge 17 is developed so that the face on whichthe fingerprint sensor 41 is formed appears and the IC card apparatus 1a is placed into a usable state as shown in FIG. 2.

Further, as shown in FIG. 4, spring mechanisms 14 are individuallyprovided at the opposite ends of the hinge 17. Each of the springmechanisms 14 includes a helical torsion coil spring 141. An arm 141 aof the helical torsion coil spring 141 is embedded in the main bodysection 2 a, and the other arm 141 b of the helical torsion coil spring141 is embedded in the card section 3 a. Thus, the helical torsion coilspring 141 exerts a moment to the card section 3 a to close the cardsection 3 a and the main body section 2 a.

In particular, when the card section 3 a is in a closed state withrespect to the main body section 2 a as shown in FIG. 5, torsional loadis not applied to the helical torsion coil spring 141. On the otherhand, when the card section 3 a is in an open state with respect to themain body section 2 a as shown in FIG. 6, torsional load is applied tothe helical torsion coil spring 141. Consequently, when the card section3 a is in an open state, the helical torsion coil spring 141 exerts amoment to close the card section 3 a.

Further, the IC card apparatus 1 a with an authentication functionincludes a lock mechanism 15 for locking the card section 3 a and themain body section 2 a in a developed state so that, in a state whereinthe card section 3 a and the main body section 2 a are in an open state,the card section 3 a and the main body section 2 a may not be closed.

FIG. 7 is a perspective view schematically showing a configuration ofthe hinge 17 and the lock mechanism 15 of the IC card apparatus 1 a withan authentication function as the first embodiment of the presentinvention. FIG. 8 is a side elevational sectional view, partly broken,showing the hinge 17 and the lock mechanism 15. FIG. 9 is a perspectiveview showing the lock mechanism 15.

As shown in FIGS. 7 to 9, the lock mechanism 15 includes a lock claw 15a, lock holes 15 b and 15 c, and a spring 15 d. As shown in FIG. 8, thelock claw 15 a is formed as a triangle pole having a sectional shape ofa right triangle formed such that the hypotenuse thereof draws anoutwardly swollen arc. The lock claw 15 a is disposed such that the face(arc face) 151 a thereof formed in an arcuate shape is directed to theopposite side to the face of the main body section 2 a on which thefingerprint sensor 41 is formed and an edge defined by one of thevertices of the right triangle opposes to the lock hole 15 b.

Further, as shown in FIGS. 7 and 8, the spring 15 d is disposed on aface 152 a of the lock claw 15 a on the side remote from the lock hole15 b so as to press the lock claw 15 a toward the lock hole 15 b.

The lock hole 15 b is a hole for engaging with the lock claw 15 a in astate wherein the card section 3 a and the main body section 2 a aredeveloped, and is formed so as to open on a wall face (face on the sidewith which an end face of the card section 3 a contacts when the cardsection 3 a and the main body section 2 a are developed) of the mainbody section 2 a. The length of the lock hole 15 b in a widthwisedirection (depthwise direction in FIGS. 7 and 8) is somewhat longer thanthat of the lock claw 15 a in the same direction, and the length of thelock hole 15 b in a heightwise direction (upward and downward directionin FIGS. 7 and 8) is somewhat shorter than that of the lock claw 15 a inthe same direction. Thus, the lock claw 15 a pressed by the spring 15 dis contacted with the lock hole 15 b halfway of the arc face 151 a.

Consequently, when the lock claw 15 a is pressed against the lock hole15 b by the spring 15 d, the lock claw 15 a is fitted into the lock hole15 b halfway of the arc face 151 a of the lock claw 15 a and only an endportion of the lock claw 15 a projects from the lock hole 15 b.Therefore, the lock claw 15 a does not completely come out from the lockhole 15 b.

Similarly to the lock hole 15 b, also the lock hole 15 c is a hole forengaging with the lock claw 15 a in a state wherein the card section 3 aand the main body section 2 a are developed, and is formed so as to openon the wall face (face on the side with which the end face of the mainbody section 2 a contacts when the card section 3 a and the main bodysection 2 a are developed) of the card section 3 a. Also the length ofthe lock hole 15 c in a widthwise direction (depthwise direction inFIGS. 7 and 8) is somewhat longer than that of the lock claw 15 a in thesame direction, and the length of the lock hole 15 c in a height wisedirection (upward and downward direction in FIGS. 7 and 8) is somewhatshorter than that of the lock claw 15 a in the same direction. Thus, thelock claw 15 a pressed by the spring 15 d is contacted against the lockhole 15 c halfway of the arc face 151 a.

Consequently, when the lock claw 15 a is pressed against the lock hole15 b by the spring 15 d, the lock claw 15 a is fitted into the lock hole15 c halfway of the arc face 151 a and only an end portion of the lockclaw 15 a projects into the card section 3 a from the lock hole 15 c.Therefore, the lock claw 15 a does not completely come out from the lockhole 15 c.

Then, if the card section 3 a and the main body section 2 a aredeveloped, then the lock claw 15 a is pressed into the lock holes 15 band 15 c by the spring 15 d as shown in FIG. 8. Consequently, the lockclaw 15 a is engaged with the lock holes 15 b and 15 c, and the cardsection 3 a and the main body section 2 a are fixed in the developedstate (refer to FIG. 8).

Further, in the state wherein the card section 3 a and the main bodysection 2 a are developed, the lock claw 15 a is pressed toward the lockholes 15 b and 15 c by the spring 15 d. However, if a predetermined loador more is applied in a direction for folding the card section 3 a andthe main body section 2 a toward each other, then the face of the lockhole 15 c with which the arc face 151 a of the lock claw 15 a contactspresses the lock claw 15 a, and as a result, the lock claw 15 a is movedin a direction for compressing the spring 15 d to disengage the lockclaw 15 a from the lock hole 15 c.

It is to be noted that the force necessary to fold up the card section 3a and the main body section 2 a which are locked by the lock mechanism15 can be adjusted by variously modifying several coefficients (forexample, a spring constant, a size and so forth) of the spring 15 d, acurvature of the arc face 151 a of the lock claw 15 a and so forth.Further, a mechanism may be provided which moves the lock claw 15 a backinto the inside of the main body section 2 a against the spring 15 d ina state wherein the card section 3 a and the main body section 2 a arefolded.

Further, the IC card apparatus 1 a with an authentication functionincludes a holding mechanism 16 for holding, in a state wherein the cardsection 3 a and the main body section 2 a are closed, the card section 3a and the main body section 2 a so as not to separate from each other.In the present embodiment, as shown in FIG. 4, the holding mechanism 16is formed from a pair of permanent magnets 16 a and 16 b placed atpositions at which, in a state wherein the card section 3 a and the mainbody section 2 a are closed, they overlap with each other. It is to benoted that the holding mechanism 16 is not limited to such a pair of thepermanent magnets 16 a and 16 b as just described but can be carried outin various modified forms.

The folding detection section 18 detects a state wherein the cardsection 3 a and the main body section 2 a are opened or closed, andincludes a projection 18 a formed on a face of the main body section 2 aon which the fingerprint sensor 41 is formed or a face of the cardsection 3 a on which the communication terminal 31 is formed, so as toproject for back and forth movement from the face, and a sensor section(not shown) for detecting that the projection 18 a is pressed down orprojected.

The projection 18 a is biased by a spring not shown so that it projectsfrom the face of the main body section 2 a on which the fingerprintsensor 41 is formed, and is pressed down, when the card section 3 a andthe main body section 2 a are closed, by a face of the card section 3 aon which the communication terminal 31 is formed. Then, the sensorsection detects that the projection 18 a is pressed down (or theprojection 18 a is released from the card section 3 a and projected) andissues a notification of this to the CPU.

Further, in the IC card apparatus 1 a with an authentication function, apower supply is connected to the IC card apparatus 1 a with anauthentication function in response to development of the card section 3a and the main body section 2 a, that is, in response to projection ofthe projection 18 a of the folding detection section 18, and as aresult, power is supplied to the fingerprint sensor 41, the CPU notshown and so forth. Further, the power supply to the IC card apparatus 1a with an authentication function is cut off in response to closing ofthe card section 3 a and the main body section 2 a, that is, in responseto pressing down of the projection 18 a of the folding detection section18, and as a result, the supply of power to the fingerprint sensor 41,the CPU now shown and so forth is cut off.

It is to be noted that the authentication result deletion section 9described above deletes a result of authentication retained in theauthentication result retention section 8 before supply of power to theCPU and so forth is cut off.

Further, the IC card apparatus 1 a with an authentication functionincludes a notification section for issuing, if it is authenticated bythe collation section 7 that an object person of authentication is anowner of the IC card apparatus 1 a with an authentication function, anotification of the result of the authentication to the user. Thenotification section is implemented, for example, by an LED, a liquidcrystal monitor or the like, and issues a notification to the user thatthe authentication results in success. It is to be noted that thenotification method of the notification section is not limited to thenotification to the user which depends upon a visual sense such as anLED, a liquid crystal monitor or the like. For example, a notificationmay be issued to the user by a technique which uses, for example,another sense such as a hearing sense to sound (voice), a touch senseand so forth, and variations and modifications can be made withoutdeparting from the scope of the present invention.

An authentication process of a user (object person of authentication) bythe IC card apparatus 1 a with an authentication function according tothe first embodiment of the present invention configured as describedabove is described with reference to a flow chart (steps A10 to A60)shown in FIG. 10.

If the user opens the card section 3 a of the IC card apparatus 1 a withan authentication function (step A10), then power is supplied to thefingerprint sensor 41, the CPU and so forth provided in the main bodysection 2 a, and as a result, the IC card apparatus 1 a with anauthentication function is rendered possible to perform authenticationof a fingerprint.

If the user touches at a finger thereof with the fingerprint sensor 41,then the fingerprint sensor (biometrics information inputting section 4)41 reads the fingerprint of the user (biometrics information inputtingstep), and the CPU (extraction section 5) extracts collation biometricscharacteristic information such as characteristic points based on imagedata of the read fingerprint (extraction step). Then, the CPU (collationsection 7) compares and collates the extracted collation biometricscharacteristic information and the reference biometrics characteristicinformation stored in the RAM with each other (reference biometricscharacteristic information storage section 6) (step A20; collation step)to decide whether or not the collation biometrics characteristicinformation is that of an owner (personal authentication) (step A30).

Where it is authenticated as a result of the personal authenticationthat the inputted fingerprint is that of the owner of the IC cardapparatus 1 a with an authentication function (refer to YES route atstep A30), the flag indicating that the inputted fingerprint is that ofthe owner of the IC card apparatus 1 a with an authentication functionis set in the RAM (authentication result retention section 8)(authentication result retention step). Further, a notification that theuser is authenticated is issued to the user.

Then, the user would insert the card section 3 a of the IC cardapparatus 1 a with an authentication function into the IC card reader.Thus, the CPU (communication controlling section 10) outputs thepersonal identification code stored in the RAM (secret informationstorage section 12) in response to a request from the IC card reader(step A40; secret information outputting step).

On the other hand, if it is authenticated as a result of the personalauthentication that the inputted fingerprint is not that of the owner ofthe IC card apparatus la with an authentication function (refer to NOroute at step A30), then an error notification or the like is issued tothe user and the processing returns to step A20.

The user would fold and store the card section 3 a after the IC cardapparatus 1 a with an authentication function is housed (step A50). TheCPU (unused state detection section 11) detects that the card section 3a is folded thereby to detect that the card section 3 a (communicationterminal 31) is placed into an unused state (unused state detectionstep), and the CPU (authentication result deletion section 9) deletesthe flag of the result of the authentication retained in the RAM (stepA60; authentication result deletion step). Thereafter, the power supplyto the IC card apparatus 1 a with an authentication function is cut off.

In the IC card apparatus 1 a with an authentication function, since theflag of the result of the authentication retained by the authenticationresult retention section 8 is not deleted until it is detected by theunused state detection section 11 that the card section 3 a is folded, aplurality of processes can be performed in response to a request fromthe IC card reader within a period after the execution of thefingerprint authentication till the folding of the card section 3 a.

FIG.11 is a flowchart (steps A10 to A60) illustrating anotherauthentication process of a user (object person of authentication) bythe IC card apparatus 1 a with an authentication function according tothe first embodiment of the present invention. It is to be noted thatthe flow chart shown in FIG. 11 includes steps A41, A42 and A43 insubstitution for the step A40 in the flow chart shown in FIG. 10.Further, since steps same as those in FIG. 10 indicate same orsubstantially same portions, detailed description thereof is omitted.

In particular, a personal identification code is transmitted from the ICcard apparatus 1 a with an authentication function in response to afirst request for a personal identification code from the IC reader(step A41), and thereafter, also in response to second and thirdrequests for a personal identification code, the user can transmit thepersonal identification code similarly without performing fingerprintauthentication (steps A42 and A43). Only if the fingerprintauthentication is performed only once after the IC card apparatus 1 awith an authentication function is opened, then the user can use the ICcard apparatus 1 a with an authentication function for a plurality ofapplications, and therefore the availability is high.

In this manner, with the IC card apparatus 1 a with an authenticationfunction according to the first embodiment of the present invention,since the fingerprint authentication function is provided for the ICcard (card section 3 a), that the user (object person of authentication)is an owner of the IC card apparatus la with an authentication functioncan be authenticated based on biometrics information (fingerprintinformation). Consequently, authentication strength of personalauthentication can be enhanced and “impersonation” by any other than theuser can be prevented, and illegal use of the IC card by a person havingno fair authority can be prevented to raise the security strength.

Further, since the IC card apparatus 1 a with an authentication functionincludes the card section 3 a having a shape (card shape) same orsubstantially same as a conventional IC card and including thecommunication terminal 31 whose size and communication standard complywith the standard regarding an existing IC card and the main bodysection 2 a including the fingerprint sensor 41, biometrics informationcan be inputted using the main body section 2 a while communication withthe outside can be performed using the card section 3 a. Therefore, theavailability is high.

In particular, according to the card section 3 a, an existing IC cardreader or IC card reader/writer can be used to output secret informationstored in the secret information storage section 12 to the IC cardreader or IC card reader/writer through the secret informationoutputting section 13, or to write the secret information into a memorynot shown or the like using the IC card reader/writer. Therefore, anexisting IC card reader/writer can be used as it as to raise thesecurity strength, which is economic.

Further, when it is detected by the folding detection section 18 thatthe card section 3 a and the main body section 2 a are folded (that is,the communication terminal 31 is in an unused state), an unused state ofthe card section 3 a is detected and the flag (result of authentication)retained in the RAM (authentication result retention section 8) isdeleted. Consequently, the unused state of the card section 3 a can berecognized easily and with certainty with a simple configuration.Further, also in a case wherein, for example, the IC card apparatus 1 awith an authentication function is lost in a state wherein it is foldedor the like, even if a third party acquires the IC card apparatus 1 awith an authentication function, the third party cannot use the IC cardapparatus 1 a with an authentication function. Consequently, thesecurity strength can be enhanced.

Further, since an end portion of the card section 3 a having an IC cardshape and the main body section 2 a having the fingerprintauthentication function are connected to each other by the hinge 17, thecard section 3 a can be attached for folding motion to the main bodysection 2 a, and the IC card apparatus 1 a with an authenticationfunction in an unused state can be configured in a small size.Therefore, the user can easily carry the IC card apparatus 1 a with anauthentication function, and the availability is enhanced. Further, bysuch a configuration as described above, if the folding detectionsection 18 is used, then also it can be easily detected that the mainbody section 2 a and the card section 3 a are folded.

Further, by outputting a personal identification code to the outside ofthe IC card apparatus 1 a with an authentication function through thecommunication terminal 31 which is a contact type terminal, the personalidentification code can be outputted with certainty.

(B) Description of the Second Embodiment

FIG. 12 is a block diagram showing a functional configuration of an ICcard apparatus (electronic storage apparatus) with an authenticationfunction as a second embodiment of the present invention. FIG. 13 is aperspective view schematically showing an appearance of the IC cardapparatus with an authentication function.

Similarly to the IC card apparatus 1 a with an authentication functionaccording to the first embodiment, also the IC card apparatus 1 b withan authentication function according to the second embodiment is an ICcard (card type storage medium) having an authentication function forauthenticating, using biometrics information of an object person ofauthentication, that the object person of authentication is an owner ofthe IC card apparatus 1 b with an authentication function. If it isauthenticated that the object person of authentication is the owner ofthe IC card apparatus 1 b with an authentication function, then the ICcard apparatus 1 b with an authentication function can output secretinformation (login ID (Identification) and/or password) stored in a RAM(secret information storage section 12) thereof using an IC card reader(not shown).

As shown in FIG. 12, in the IC card apparatus 1 b with an authenticationfunction according to the second embodiment, a card section 3 b includesa communication controlling section 10 while a main body section 2 bincludes an output permission setting section 20, and an outputpermission retention section 19 is provided in the card section 3 b insubstitution for the authentication result retention section 8.Regarding a configuration other than the configuration just described,the IC card apparatus 1 b with an authentication function has afunctional configuration similar to that of the IC card apparatus 1 awith an authentication function according to the first embodiment. It isto be noted that, in FIG. 12, like reference characters referred tohereinabove denote same or substantially same elements, and descriptionthereof is omitted herein.

The output permission retention section 19 retains output permissionrepresenting that outputting of secret information stored in the secretinformation storage section 12 is permitted, and is implemented, forexample, by an IC memory. In particular, the output permission retentionsection 19 is implemented the output permission setting section 20hereinafter described which sets a flag indicating output permission inan IC memory of the card section 3 b.

In the IC card apparatus 1 b with an authentication function, if it isauthenticated as a result of collation by the collation section 7 thatthe collation biometrics characteristic information is that of an owner,then the result of the authentication is set as output permission to theoutput permission retention section 19 by the output permission settingsection 20. In particular, in the IC card apparatus 1 b with anauthentication function according to the second embodiment, the outputpermission retention section 19 has a function similar to that of theauthentication result retention section in the first embodiment.

Further, in the second embodiment, where the outputting permission isretained in the output permission retention section 19, thecommunication section 10 controls the secret information outputtingsection 13 to output secret information stored in the secret informationstorage section 12.

In the IC card apparatus 1 b with an authentication function, thefunction as the communication controlling section 10 is implemented by aCPU provided in an IC module (not shown) of the IC card (card section 3b), and the functions as the output permission retention section 19 andthe secret information storage section 12 are implemented similarly bythe memory (IC memory) provided in the IC module of the IC card.Further, the function as the secret information outputting section 13can be implemented by the communication terminal 31 or the communicationantenna of the IC card.

In particular, the card section 3 b includes an IC memory (secretinformation storage section 12) for storing secret information of anowner, an IC memory (output permission retention section 19) capable ofretaining output permission for permitting outputting of secretinformation, a connection terminal 31 (secret information outputtingsection 13) capable of outputting the secret information stored in theIC memory (secret information storage section 12) to the outsidetherethrough, and an IC module (communication controlling section 10)for causing, where the output permission is retained in the IC memory(output permission retention section 19), the connection terminal 31(secret information outputting section 13) to output the secretinformation stored in the IC memory (secret information storage section12).

Where it is recognized as a result of collation by the collation section7 that collation biometrics characteristic information is that of anowner, the output permission setting section 20 causes the outputpermission retention section 19 of the card section 3 b to retain theoutput permission (result of authentication) as a flag, and has afunction as an IC card writer for writing various information into an ICcard.

In the main body section 2 b, the functions as the biometricsinformation inputting section 4, extraction section 5, collation section7, authentication result deletion section 9, unused state detectionsection 11 and output permission setting section 20 can be implementedby the CPU, and the function as the reference biometrics characteristicinformation storage section 6 can be implemented by a ROM or a RAM.

The IC card apparatus 1 b with an authentication function according tothe second embodiment is configured such that the card section 3 can beinserted into the main body section 2 as shown in FIG. 13, andconsequently, the card section 3 can be removably loaded into the mainbody section 2. In particular, a card slot 42 into which the cardsection 3 b can be inserted is formed in the main body section 2 b suchthat the card section 3 b can be inserted (fitted) into the card slot42. Consequently, the card slot 42 functions as a card type storagemedium attaching section to which the card section (card type storagemedium) 3 b is removably attached.

It is to be noted that preferably such a configuration as additionalprovision of a lid not shown, rather tight fitting of the card section 3or the like is applied to the card slot 42 so that the card section 3 bdoes not come out even if the card section 3 b is merely directeddownwardly in a state wherein the card section 3 b is inserted in thecard slot 42.

Further, a contact section (not show) projecting so as to contact withthe communication section 31 of the inserted card section 3 b is formedat a position in the inside of the card slot 42 opposing to thecommunication terminal 31 of the card section 3 b. Thus, if the cardsection 3 b is inserted into the card slot 42, then the contact sectionis brought into contact with the communication terminal 31 of the cardsection 3 b, and as a result, various information can be communicatedwith the IC chip, IC memory (authentication result information retentionsection 8 or secret information storage section 12) or the like providedin the card section 3 b.

In particular, the output permission setting section 20 can set outputpermission to the IC memory of the card section 3 b through the contactsection and the communication terminal 31.

It is to be noted that, in the second embodiment, the shape (card shape)which is same as or substantially same as that of a conventional IC cardcan be applied as it is to the card section 3 b, and also the contactsection of the card slot 42 is configured based on the standard for sucha conventional IC card as just described.

Further, also regarding the communication standard, the card section 3 bsatisfies the standard for an existing IC card, and has a communicationfunction similar to that of a conventional IC card. Therefore, it ispossible to use an existing IC card reader or IC card reader/writer tooutput the secret information stored in the secret information storagesection 12 to the IC card reader or IC card reader/writer through thesecret information outputting section 13 and write the secretinformation into a memory not shown or the like using the IC cardreader/writer.

Further, various information can be transmitted and received alsobetween the card section 3 b and the main body section 2 b based on thecommunication standard (protocol) for such an existing IC cardreader/writer as described above.

Further, in the main body section 2 b, the CPU detects that the cardsection 3 b is inserted into the card slot 42 or that the card section 3b is removed from the card slot 42.

Then, the unused state detection section 11 detects that the cardsection 3 b is in a unused state by detecting that, after it isrecognized by the collation section 7 that the collation biometricscharacteristic information is that of the owner, the card section 3 b isremoved from the main body section 2 b once and then attached again tothe main body section 2 b.

Further, the IC card apparatus 1 b with an authentication functionincludes a power supply switch not shown. If the user uses the powersupply switch to switch on the power supply, then the power is suppliedto the fingerprint sensor 41, the CPU and so forth and the IC cardapparatus 1 b with an authentication function is placed into a usablestate.

In the IC card apparatus 1 b with an authentication function accordingto the second embodiment of the present invention having such aconfiguration as described above, if the user switches on the powersupply switch of the IC card apparatus 1 b with an authenticationfunction in a state wherein the card section 3 b is inserted in the cardslot 42, then the power is supplied to the fingerprint sensor 41, theCPU and so forth provided in the main body section 2 b, and it becomespossible to perform authentication of a fingerprint.

Similarly as in the IC card apparatus 1 a with an authenticationfunction according to the first embodiment, if the user touches at afinger thereof with the fingerprint sensor 41 to perform fingerprintauthentication and it is authenticated that the inputted fingerprint isthat of the owner of the IC card apparatus 1 b with an authenticationfunction, then a flag indicating that the inputted fingerprint is thatof the owner of the IC card apparatus 1 b with an authenticationfunction is set. Thereafter, a notification that the fingerprint of theuser is authenticated successfully is issued to the user.

Then, the user would unload the card section 3 b from the card slot 42of the main body section 2 b and insert the card section 3 b into the ICcard reader. In the card section 3 b, the IC module (communicationcontrolling section 10) outputs a personal identification code stored inthe IC memory (secret information storage section 12) in response to arequest from the IC card reader.

After the IC card apparatus 1 b with an authentication function is used,the user places the used card section 3 b into the card slot 42. The CPU(unused state detection section 11) of the main body section 2 b detectsthat the card section 3 b is inserted in the card slot 42 thereby todetect that the card section 3 b (communication terminal 31) is placedinto a unused state. The CPU (authentication result deletion section 9)deletes the flag of output permission (result of authentication)retained in the IC memory (output permission retention section 19).

It is to be noted that, also in the IC card apparatus 1 b with anauthentication function according the second embodiment, the flag ofoutput permission (result of authentication) retained in the outputpermission retention section 19 is not deleted until after it isdetected by the unused state detection section 11 that the card section3 b is inserted in the card slot 42. Therefore, a plurality of processescan be performed in response to a request from the IC card reader withina period after the execution of fingerprint authentication till theinsertion of the card section 3 b into the card slot 42.

In this manner, also with the IC card apparatus 1 b with anauthentication function according to the second embodiment of thepresent invention, since the fingerprint authentication function isprovided for the IC card (card section 3 b), that the user (objectperson of authentication) is an owner of the IC card apparatus 1 b withan authentication function can be authenticated based on biometricsinformation (fingerprint information). Consequently, “impersonation” byany other than the user can be prevented, and illegal use of the IC cardby a person having no fair authority can be prevented to raise thesecurity strength.

Further, since the card section 3 b having an IC card shape is attachedsuch that it is inserted into the main body section 2 b having a shapesubstantially same as that of the card section 3 b, the size of the ICcard apparatus 1 b with an authentication function in an unused statecan be configured in a small size, and consequently, the user can carrythe IC card apparatus 1 b with an authentication function readily andthe availability is enhanced.

Furthermore, since an existing IC card can be used as the card section 3b, it is possible to use an existing IC card reader/writer as it is toraise the security strength of the same, which is economical andsuperior in availability. Further, also the structure of the main bodysection 2 b can be implemented at a comparatively low cost, and the ICcard apparatus 1 b with an authentication function is economical also inthis regard.

Further, since the unused state detection section 11 detects that thecard section 3 b is in a unused state by detecting that, after it isrecognized by the collation section 7 that collation biometricscharacteristic information is that of the owner, the card section 3 b isremoved from the main body section 2 b once and then attached again tothe main body section 2 b, an unused state of the card section 3 b canbe recognized readily and with certainty with a simple configuration.

Furthermore, since the card section 3 b is configured for insertion intothe main body section 2 b, also the IC card apparatus 1 b with anauthentication function can be configured simply.

(C) Others

The present invention is not limited to the embodiments described abovebut can be carried out in various modified forms without departing fromthe scope of the present invention.

For example, while, in the second embodiment described above, the cardsection 3 b is removably loaded into the main body section 2 b byinserting the card section 3 b into the card slot 42 formed in the mainbody section 2 b, the configuration for the removable loading is notlimited to this.

FIG. 14 is a perspective view schematically showing a configuration ofan IC card apparatus 1 c (authentication apparatus) with anauthentication function as another modification of the presentinvention. The IC card apparatus 1 c with an authentication functionshown in FIG. 14 includes a main body section 2 c and a card section 3b, and the card section 3 b is attached to a face of the main bodysection 2 c on the opposite side to a face on which a fingerprint sensor41 is formed. It is to be noted that, in FIG. 14, like referencecharacters referred to hereinabove denote same or substantially sameelements, and description thereof is omitted herein.

In the main body section 2 c, a contact section 43 is formed such thatit projects until it contacts with the communication terminal 31 of thecard section 3 b. If the card section 3 b is inserted into the card slot42, then the contact section 43 is brought into contact with thecommunication terminal 31 of the card section 3 b so that variousinformation can be communicated with an IC chip, a memory(authentication result retention section 8 or secret information storagesection 12) or the like provided in the card section 3 b.

Further, on peripheral portions of a face of the main body section 2 con which the contact section 43 is formed, pawl portions 44 and aholding portion 45 for attaching the card section 3 b to the face of themain body section 2 c are formed. The pawl portions 44 are provided onlongitudinal sides of the face of the main body section 2 c on which thecontact section 43 is formed and are made of a resilient material suchas, for example, a plastic material. The holding portion 45 is aprojection in the form of a plate provided on a lateral side on the sameface of the main body section 2 c and is provided to fix the cardsection 3 b so that the card section 3 b may not move in thelongitudinal direction of the face of the main body section 2 c on whichthe contact section 43 is formed.

In particular, in the IC card apparatus 1 c with an authenticationfunction having such a configuration as described above, the pawlportions 44 and the holding portion 45 function as a card type storagemedium attaching section by which the card section (card type storagemedium) 3 b is removably attached.

Also in the IC card apparatus 1 c with an authentication function havingsuch a configuration as described above, operation and effects similarto those of the IC card apparatus 1 b with an authentication function ofthe second embodiment can be achieved. Further, since the card section 3b having an IC card shape is attached in an overlapping relationship tothe main body section 2 c having a shape substantially same shape asthat of the card section 3 b, the size of the IC card apparatus 1 c withan authentication function in an unused state can be configured small,and consequently, it is easy for the user to carry the IC card apparatus1 c with an authentication function and the availability is enhanced.

Further, the configuration of the card type storage medium attachingsection is not limited to those described above, but any technique suchas, for example, a magnet, a bonding agent or a surface fastener may beused to attach the card section to the main body section and the cardtype storage medium attaching section can be carried out in variousmodified forms without departing from the scope of the presentinvention.

Furthermore, while, in the embodiments described above, the cardsections 3 a and 3 b include the communication terminal 31 in the formof a contact type terminal and communicate with an IC card reader, an ICcard reader/writer or the main body section 2 b or 2 c through thecommunication terminal 31, the method of communication is not limited tothis, but the card section may include a contactless type communicationfunction such as, for example, a contactless interface antenna in theform of a coil or the like such that it communicates with an externalapparatus such as an IC card reader or an IC card reader/writer usingthe contactless communication function or communicates with the mainbody section 2 b or 2 c. Consequently, the card section can communicatereadily with an IC card reader, an IC card reader/writer, the main bodysection 2 b or 2 c or the like.

For example, the IC card apparatus 1 a with an authentication functionof the first embodiment may be modified such that it includes acontactless type communication function in place of the communicationterminal 31 and, if a contactless IC card reader is tapped, after the ICcard apparatus 1 a with an authentication function is opened andfingerprint authentication is performed, with the card section in astate wherein the IC card apparatus 1 a with an authentication functionis open, then a personal identification code is transmitted from thecard section to the contactless IC card reader. Also, it is possible touse the energy of the tapping to close the IC card apparatus 1 a with anauthentication function. In this manner, the IC card apparatus 1 a withan authentication function can be used in a high degree of availability.

Further, in the first embodiment described above, the biometricsinformation inputting section 4, extraction section 5, referencebiometrics characteristic information storage section 6, collationsection 7, authentication result retention section 8, authenticationresult deletion section 9, communication controlling section 10 andunused state detection section 11 are provided on the main body section2, and the secret information storage section 12 and secret informationoutputting section 13 are provided on the card section 3. However, thearrangement of the components is not limited to this. In particular, theextraction section 5, reference biometrics characteristic informationstorage section 6, collation section 7, authentication result retentionsection 8, authentication result deletion section 9, communicationcontrolling section 10, unused state detection section 11 and secretinformation storage section 12 may be provided on any of the main bodysection and the card section. Further, the reference biometricscharacteristic information storage section 6 may be provided in any of acomputer system and so forth connected for communication to the IC cardapparatus with an authentication function.

Furthermore, while, in the embodiments described above, a fingerprint isused as biometrics information, the biometrics information is notlimited to this, but any other biometrics information such as, forexample, a palm print, a finger shape, a palm shape, voice, a retina, aniris, an image of the face, a dynamic signature, a blood vessel patternor a key stroke may be used.

Further, the structure between the main body section and the cardsection may be configured such that the card section 3 a and the mainbody section 2 a are connected for folding motion to each other throughthe hinge 17 as in the IC card apparatus 1 a with an authenticationfunction of the first embodiment and the card section 3 a is removablyloaded into the IC card apparatus 1 a with an authentication function.

Furthermore, the configuration of the lock mechanism 15 in the IC cardapparatus 1 a with an authentication function of the first embodiment isnot limited to that of the embodiment described above, and for example,a magnet or the like may be used to lock the card section 3 a and themain body section 2 a in a developed state. In this manner, theconfiguration can be carried out in various modified forms withoutdeparting from the scope of the present invention. As such aconfiguration of the lock mechanism 15 as described above, varioustechniques used popularly in portable telephone sets of the folding typeor portable telephone sets of the flap type maybe applied.

Further, in the IC card apparatus 1 a with an authentication function,the authentication result deletion section 9 may delete a result ofauthentication retained in the authentication result retention section 8immediately after the secret information outputting section 13 outputssecret information. In this instance, even if the user loses the IC cardapparatus 1 a with an authentication function immediately after use ofthe same, the result of authentication is deleted. Consequently, the ICcard apparatus 1 a with an authentication function is not used at all bya person who acquires this, and therefore, the security strength of theIC card apparatus la with an authentication function can be raised.

Furthermore, the IC card apparatus 1 b or 1 c with an authenticationfunction described above may be modified such that the authenticationresult deletion section 9 is provided in the card section 3 b such that,immediately after the secret information outputting section 13 outputssecret information, the authentication result deletion section 9 deletesthe output permission retained in the output permission retentionsection 19. In this instance, even if the card section 3 b of the ICcard apparatus 1 b or 1 c with an authentication function is lost beforeit is returned to the main body section 2 b or 2 c, since the outputpermission is deleted, the card section 3 b is not used at all by aperson who acquires the card section 3 b and the security strength canbe enhanced.

It is to be noted that, where the embodiments described above aredisclosed, they can be produced by those skilled in the art.

INDUSTRIAL APPLICABILITY

As described above, the electronic storage apparatus, authenticationapparatus and authentically method of the present invention are usefulto authenticate that an object person of authentication is an owner of acard type storage medium, and are particularly suitable for an IC cardin which secret information of an owner thereof is stored.

1. An electronic storage apparatus, comprising: a secret informationstorage section for storing secret information regarding an owner; abiometrics information inputting section for inputting biometricsinformation of an object person of authentication; an extraction sectionfor extracting collation biometrics characteristic information from thebiometrics information inputted from said biometrics informationinputting section; a collation section for comparing and collating thecollation biometrics characteristic information extracted by saidextraction section and reference biometrics characteristic informationwith each other; an authentication result retention section forretaining, where it is recognized from a result of the collation by saidcollation section that the collation biometrics characteristicinformation is that of the owner, the result of authentication; a secretinformation outputting section capable of outputting the secretinformation stored in said secret information storage section to theoutside; a communication controlling section for causing, where theresult of authentication retained by said authentication resultretention section indicates that the collation biometrics characteristicinformation is that of the owner, said secret information outputtingsection to output the secret information stored in said secretinformation storage section; an unused state detection section capableof detecting that said secret information outputting section is in anunused state; and an authentication result deletion section fordeleting, when said unused state detection section detect that saidsecret information outputting section is in an unused state, the resultof authentication retained by said authentication result retentionsection.
 2. The electronic storage apparatus as set forth in claim 1,wherein said secret information outputting section includes a contacttype terminal and can output the secret information to the outside ofsaid electronic storage apparatus through said contact type terminal. 3.The electronic storage apparatus as set forth in claim 1, wherein saidsecret information outputting section includes a non-contact typecommunication function, and can output the secret information to theoutside of said electronic storage apparatus by means of saidnon-contact type communication function.
 4. The electronic storageapparatus as set forth in claim 1, wherein at least said secretinformation outputting section is provided on a card section having ashape of a card, and at least said biometrics information inputtingsection is provided in a main body section connected for communicationto said card section.
 5. The electronic storage apparatus as set forthin claim 4, wherein one end portion of said card section and said mainbody section are connected to each other by a hinge such that said cardsection can be attached for folding with respect to said main bodysection, and said unused state detection section detects that said cardsection is in an unused state by detecting a state wherein said cardsection is folded.
 6. The electronic storage apparatus as set forth inclaim 4, wherein said card section is removably attached to said mainbody section, and said unused state detection section detects that saidcard section is in an unused state by detecting that, after it isdetected by said collation section that the collation biometricscharacteristic information is that of the owner, said card section isremoved from said main body section once and then attached to said mainbody section again.
 7. The electronic storage apparatus as set forth inclaim 6, wherein said card section is configured for insertion into saidmain body section.
 8. An authentication apparatus, on which a card typestorage medium including a secret information storage section forstoring secret information of an owner, an output authorizationretention section capable of retaining an output authorization forauthorizing outputting of the secret information, a secret informationoutputting section capable of outputting the secret information storedin said secret information storage section to the outside, and acommunication controlling section for causing, where the outputauthorization is retained in said output authorization retentionsection, said secret information outputting section to output the secretinformation stored in said secret information storage section can bemounted, for authenticating that an object person of authentication isthe owner of said card type storage medium, comprising: a card typestorage medium attaching section capable of removably attaching saidcard type storage medium thereto; a biometric information inputtingsection for inputting biometrics information of the object person ofauthentication; an extraction section for extracting collationbiometrics characteristic information from the biometrics informationinputted through said biometrics information inputting section; acollation section for comparing and collating the collation biometricscharacteristic information extracted by said extraction section andreference biometrics characteristic information; an output authorizationsetting section for causing, where it is recognized from a result of thecollation by said collation section that the collation biometricscharacteristic information is that of the owner, said output permissionretention section of said card type storage medium to retain the outputauthorization; an unused state detection section capable of detectingthat said card type storage medium is in an unused state; and anauthentication result deletion section for deleting, when said unusedstate detection section detects that said card type storage medium is inan unused state, the output retained by said output authorizationretention section.
 9. The authentication apparatus as set forth in claim8, wherein said unused state detection section detects that said cardtype storage medium is in an unused state by detecting that, after it isrecognized by said collation section that the collation biometricscharacteristic information is that of the owner, said card type storagemedium is removed from said card type storage medium attaching sectiononce and then attached to said card type storage medium attachingsection again.
 10. The authentication apparatus as set forth in claim 8,wherein said card type storage medium is configured for insertion intosaid card type storage medium attaching section.
 11. An authenticationmethod for authenticating that an object person of authentication is anowner of a card type storage medium in which secret information isstored, comprising: a biometrics information inputting step of inputtingbiometrics information of the object person of authentication; anextraction step of extracting collation biometrics characteristicinformation from the biometrics information inputted at the biometricsinformation inputting step; a collation step of comparing and collatingthe collation biometrics characteristic information extracted at theextraction step and reference biometrics characteristic information; anauthentication result retention step of retaining, where it isrecognized from a result of the collation at the collation step that thecollation biometrics characteristic information is that of the owner,the result of the authentication; a secret information outputting stepcapable of outputting, where the result of the authentication retainedat the authentication result retention step indicates that the collationbiometrics characteristic information is that of the owner, the secretinformation to the outside; an unused state detection step capable ofdetecting that the card type storage medium is in an unused state; andan authentication result deletion step of deleting, where it is detectedat the unused state detection step that the card type storage medium isin an unused state, the result of the authentication retained at theauthentication result retention step.