Service support device, service support method, and non-transitory computer-readable recording medium

ABSTRACT

A service support device includes an information processing device. The information processing device is configured to deliver key information to a mobile terminal. The mobile terminal corresponds to each of a plurality of business operators that provide a user of a vehicle with a predetermined service using the vehicle. The key information is information for unlocking the vehicle, starting the vehicle, or unlocking and starting the vehicle when a predetermined transmission signal is transmitted toward the vehicle. The information processing device is configured to, when the mobile terminal corresponding to a first business operator among the plurality of business operators uses the key information, make coordination such that the mobile terminal corresponding to a second business operator among the plurality of business operators does not use the key information.

INCORPORATION BY REFERENCE

The disclosure of Japanese Patent Application No. 2017-205678 filed onOct. 24, 2017 including the specification, drawings and abstract isincorporated herein by reference in its entirety.

BACKGROUND 1. Technical Field

The disclosure relates to a service support device, a service supportmethod, and a non-transitory computer-readable recording medium.

2. Description of Related Art

For example, a key information management system is disclosed (see, forexample, Japanese Unexamined Patent Application Publication No.2006-118122 (JP 2006-118122 A). In the key information managementsystem, a mobile terminal receives key information that is transmittedfrom a server, and then the mobile terminal is usable as an electronickey.

SUMMARY

When key information that allows a vehicle to be unlocked or started fora limited time is delivered to a mobile terminal of a third party otherthan a user of the vehicle, it is conceivable that various services canbe provided to the user of the vehicle. For example, there is a carsharing service that assists in renting a vehicle between individuals(consumer to consumer (C2C)) (hereinafter, referred to as C2C carsharing service). The C2C car sharing service is provided in thefollowing way. In a time period during which a user does not use thevehicle, key information that allows a vehicle to be unlocked andstarted for a limited time is delivered to a mobile terminal of a personwho wants to temporarily rent the vehicle. There is also, for example, adelivery service that allows the trunk of a vehicle to be designated asa delivery address for a package (hereinafter, referred to as trunkdelivery service). The trunk delivery service is provided in thefollowing way. Key information that allows the trunk of a vehicle to beunlocked for a limited time is delivered to a mobile terminal of adelivery person of a delivery company.

However, if there is a plurality of business operators that provide theabove-described services using a vehicle, mobile terminals of thebusiness operators are possibly able to acquire available keyinformation at the same time. For this reason, there is room forimprovement from the viewpoint of the security of a vehicle.

The disclosure provides a service support device, a service supportmethod, and a non-transitory computer-readable recording medium, whichare able to improve the security of a vehicle when a plurality ofbusiness operators each provides a service using the vehicle based onkey information that is delivered to a mobile terminal.

A first aspect of the disclosure provides a service support device. Theservice support device includes an information processing device. Theinformation processing device is configured to deliver key informationto a mobile terminal. The mobile terminal corresponds to each of aplurality of business operators that provide a user of a vehicle with apredetermined service using the vehicle. The key information isinformation for unlocking the vehicle, starting the vehicle, orunlocking and starting the vehicle when a predetermined transmissionsignal is transmitted toward the vehicle. The information processingdevice is configured to, when the mobile terminal corresponding to afirst business operator among the plurality of business operators usesthe key information, make coordination such that the mobile terminalcorresponding to a second business operator among the plurality ofbusiness operators does not use the key information.

According to this aspect, when a plurality of business operators eachprovides a service using the vehicle, the service support device is ableto make coordination such that only the mobile terminal corresponding tothe first business operator is able to use the key information at thesame time. Therefore, when a plurality of business operators eachprovides a service using the vehicle, it is possible to improve thesecurity of the vehicle.

In the above aspect, the information processing device may be configuredto limit the key information that is delivered to the mobile terminalcorresponding to the first business operator such that the keyinformation is available only in a first period, and limit the keyinformation that is delivered to the mobile terminal corresponding tothe second business operator such that the key information is availableonly in a second period that does not conflict with the first period.

According to this aspect, the service support device is able to preventa conflict between a period during which the mobile terminalcorresponding to the first business operator uses the key informationand a period during which the mobile terminal corresponding to thesecond business operator uses the key information. Therefore, theservice support device is specifically able to make coordination suchthat only the mobile terminal corresponding to the first businessoperator is able to use the key information at the same time.

In the above aspect, the predetermined service may be any one of adelivery service that allows a luggage compartment of the vehicle to bedesignated as a delivery address for a package, a pickup service thatallows the luggage compartment to be designated as a pickup address fora package, and a collection service that allows the luggage compartmentto be designated as a collection address for an article, the informationprocessing device may be configured to deliver the key information toeach of a plurality of mobile terminals of workers who conduct work fordelivery of the package, pickup of the package, or collection of thearticle, the work corresponding to the predetermined service, and theinformation processing device is configured to, when a workercorresponding to the first business operator, among the workers, isdoing the work based on usage of the key information by the mobileterminal of the worker corresponding to the first business operator,disable usage of the key information acquired by the mobile terminal ofa worker corresponding to the second business operator, among theworkers, until the worker corresponding to the first business operatorfinishes the work.

According to this aspect, the service support device is able to disableusage of the key information acquired by the mobile terminal of theworker of the second business operator until the worker of the firstbusiness operator that provides a trunk delivery service, or the like,finishes work, such as delivery. Therefore, the service support deviceis specifically able to enable only the mobile terminal of the workercorresponding to the first business operator among the plurality ofbusiness operators that provide a trunk delivery service, or the like,to use the key information at the same time.

In the above aspect, the predetermined service may be any one of adelivery service that allows a luggage compartment of the vehicle to bedesignated as a delivery address for a package, a pickup service thatallows the luggage compartment to be designated as a pickup address fora package, and a collection service that allows the luggage compartmentto be designated as a collection address for an article, the informationprocessing device is configured to deliver the key information to eachof a plurality of mobile terminals of workers who conduct work fordelivery of the package, pickup of the package, or collection of thearticle, the work corresponding to the predetermined service, theinformation processing device may be configured to, when a mobileterminal of a worker corresponding to the first business operator, amongthe workers, has reached an area within a predetermined range from thevehicle, deliver the key information to the mobile terminal of theworker corresponding to the first business operator, the informationprocessing device may be configured to, when a mobile terminal of aworker corresponding to the second business operator, among the workers,has reached the area within the predetermined range from the vehicle ina situation in which the worker corresponding to the first businessoperator is doing the work based on usage of the key information by themobile terminal of the worker corresponding to the first businessoperator, deliver the key information to the mobile terminal of theworker corresponding to the second business operator at a time when theworker corresponding to the first business operator has finished thework.

According to this aspect, the service support device is able to disabledelivery of the key information to the mobile terminal of the worker ofthe second business operator, who has reached near the vehicle, untilthe worker of the first business operator that provides a trunk deliveryservice, or the like, finishes work, such as delivery of a package to atrunk of the vehicle. Therefore, the service support device isspecifically able to enable only the mobile terminal of the workercorresponding to the first business operator among the plurality ofbusiness operators that provide a trunk delivery service, or the like,to use the key information at the same time.

In the above aspect, the predetermined service may be any one of adelivery service that allows a luggage compartment of the vehicle to bedesignated as a delivery address for a package, a pickup service thatallows the luggage compartment to be designated as a pickup address fora package, and a collection service that allows the luggage compartmentto be designated as a collection address for an article, the informationprocessing device may be configured to deliver the key information toeach of a plurality of mobile terminals of workers who conduct work fordelivery of the package, pickup of the package, or collection of thearticle, the work corresponding to the predetermined service, theinformation processing device may be configured to limit the number oftimes the key information is available to a predetermined number oftimes, and the information processing device may be configured to, whena mobile terminal of a worker corresponding to the first businessoperator, among the workers, has used up the key information thepredetermined number of times, deliver the key information to the mobileterminal of a worker corresponding to the second business operator,among the workers.

According to this aspect, the service support device is able to set thenumber of time (for example, twice for unlocking and locking, or thelike) of usage of the key information required of each of the workers ofthe plurality of business operators that provide a trunk deliveryservice, or the like, to do work, such as delivery of a package to atrunk of the vehicle, to the predetermined number of times. For thisreason, the service support device is able to disable delivery of thekey information to the mobile terminal of the worker of the secondbusiness operator, who has reached near the vehicle, until the worker ofthe first business operator finishes work, such as delivery of a packageto the trunk of the vehicle. Therefore, the service support device isspecifically able to enable only the mobile terminal of the workercorresponding to the first business operator among the plurality ofbusiness operators that provide a trunk delivery service, or the like,to use the key information at the same time.

In the above aspect, the information processing device may be configuredto bidirectionally relay information between the mobile terminal of theworker corresponding to the first business operator and the mobileterminal of the worker corresponding to the second business operator.

According to this aspect, the service support device is able to allowthe first and second business operators that provide a trunk deliveryservice, or the like, to directly make contact with each other. For thisreason, for example, when there are a package of the first businessoperator and a package of the second business operator and the samedelivery time period is designated for these packages, it is possible toallow a worker of the first business operator and a worker of the secondbusiness operator to adjust specific delivery time. Therefore, theservice support device is able to improve the convenience, and the like,of a plurality of business operators that provide a trunk deliveryservice, or the like.

In the above aspect, the information processing device may be configuredto, when a use schedule of the vehicle, associated with thepredetermined service corresponding to the first business operator, isset up in a first period, keep a period that conflicts with the firstperiod such that a use schedule of the vehicle, associated with thepredetermined service corresponding to the second business operator, isnot set up in the period.

According to this aspect, the service support device is able to preventa conflict between a time period during which the vehicle is used for aservice that is provided by the first business operator and a timeperiod during which the vehicle is used for a service that is providedby the second business operator. Therefore, the service support deviceis specifically able to make coordination such that only the mobileterminal corresponding to the first business operator is able to use thekey information at the same time.

In the above aspect, the predetermined service may include a deliveryservice that allows a luggage compartment of the vehicle to bedesignated as a delivery address for a product that is ordered on awebsite corresponding to electric commerce, and the informationprocessing device may be configured to, when a first time period hasbeen already designated as a delivery time period for the product withthe delivery service corresponding to the first business operator,disable the user of the vehicle from selecting a time period thatconflicts with the first time period on the same date on the website asa delivery time period for a product with the delivery servicecorresponding to the second business operator.

According to this aspect, at the time when the user of the vehicleplaces an order for a product on an EC site, the service support deviceis able to disable selection of a time period that conflicts with adelivery time period that has been already designated for a product bythe first business operator as a delivery time period for a product bythe second business operator. Therefore, the service support device isspecifically able to enable only the mobile terminal of a workercorresponding to the first business operator among the plurality ofbusiness operators that provide a trunk delivery service for deliveringa product purchased on an EC site to use the key information at the sametime.

In the above aspect, the user of the vehicle may be a regular user ofthe vehicle.

According to this aspect, it is possible to improve the security of thevehicle for a service intended for a regular user of the vehicle.

In the above aspect, the service support device may include acommunication device configured to bidirectionally carry outcommunication with each of the vehicle, the mobile terminal, and anexternal device through a predetermined communication network.

In the above aspect, the key information further may include informationfor locking the vehicle.

In the above aspect, the predetermined transmission signal may includethe key information.

A second aspect of the disclosure is implemented by a service supportmethod that is executed by a service support device. The service supportmethod includes: delivering key information to a mobile terminal, themobile terminal corresponding to each of a plurality of businessoperators that provide a user of a vehicle with a predetermined serviceusing the vehicle, the key information being information for unlockingthe vehicle, starting the vehicle, or unlocking and starting the vehiclewhen a predetermined transmission signal is transmitted toward thevehicle, and, when the mobile terminal corresponding to a first businessoperator among the plurality of business operators uses the keyinformation, making coordination such that the mobile terminalcorresponding to a second business operator among the plurality ofbusiness operators does not use the key information.

A third aspect of the disclosure provides a non-transitorycomputer-readable recording medium storing a service support programcausing an information processing device to execute instructions for:delivering key information to a mobile terminal, the mobile terminalcorresponding to each of a plurality of business operators that providea user of a vehicle with a predetermined service using the vehicle, thekey information being information for unlocking the vehicle, startingthe vehicle, or unlocking and starting the vehicle when a predeterminedtransmission signal is transmitted toward the vehicle; and when themobile terminal corresponding to a first business operator among theplurality of business operators uses the key information, makingcoordination such that the mobile terminal corresponding to a secondbusiness operator among the plurality of business operators does not usethe key information.

According to the above aspects, it is possible to provide a servicesupport device, a service support method, and a non-transitorycomputer-readable recording medium, which are able to improve thesecurity of a vehicle when a plurality of business operators eachprovides a service using the vehicle based on key information that isdelivered to a mobile terminal.

BRIEF DESCRIPTION OF THE DRAWINGS

Features, advantages, and technical and industrial significance ofexemplary embodiments of the disclosure will be described below withreference to the accompanying drawings, in which like numerals denotelike elements, and wherein:

FIG. 1 is a diagram that shows an example of the overall configurationof an authentication key management system;

FIG. 2 is a block diagram that mainly shows an example of componentsrelated to locking and unlocking of a vehicle in the authentication keymanagement system;

FIG. 3 is a block diagram that mainly shows an example of componentsrelated to a key sharing service in the authentication key managementsystem;

FIG. 4 is a block diagram that mainly shows an example of componentsrelated to a trunk delivery service in the authentication key managementsystem;

FIG. 5 is a block diagram that mainly shows an example of componentsrelated to a C2C car sharing service in the authentication keymanagement system;

FIG. 6 is a block diagram that mainly shows an example of componentsrelated to a B2C car sharing service in the authentication keymanagement system;

FIG. 7 is a flowchart that schematically shows an example of acoordination process that is executed by a center server;

FIG. 8 is a flowchart that schematically shows another example of thecoordination process that is executed by the center server;

FIG. 9 is a flowchart that schematically shows further another exampleof the coordination process that is executed by the center server; and

FIG. 10 is a flowchart that schematically shows yet another example ofthe coordination process that is executed by the center server.

DETAILED DESCRIPTION OF EMBODIMENTS

Hereinafter, an embodiment of the disclosure will be described withreference to the accompanying drawings.

Overall Configuration of Authentication Key Management System

FIG. 1 is a diagram that shows an example of the overall configurationof an authentication key management system according to the presentembodiment.

The authentication key management system 1 includes vehicles 10, mobileterminals 20, a center server 30, and service management servers 40.

Each vehicle 10 is able to carry out wireless communication within arelatively close range (a range to such an extent that communication isavailable between the inside of a vehicle cabin and the outside of thevehicle cabin) to the mobile terminals 20 (hereinafter, referred to asnear-field communication) in conformity with predetermined communicationstandards. Each vehicle 10 is an object of which doors are locked orunlocked and that is started (ignition is turned on) based on atransmission signal (an authentication request, a lock request, or anunlock request, which will be described later) from one of the mobileterminals 20. The doors of each vehicle 10 may include not onlypassenger doors but also a luggage compartment door (for example, atrunk lid, a back door, or the like) for accessing a trunk (luggagecompartment). Turning on the ignition (IG-ON) of each vehicle 10 mayinclude not only startup of an engine in the vehicle 10 that uses theengine as a main power source but also power on of an electric motor inthe vehicle 10 that uses an electric motor as a main power source.Hereinafter, in the present embodiment, description will be made on theassumption that each vehicle 10 uses an engine 117 (described later) asa main power source, a start (IG-ON) of each vehicle 10 corresponds to astartup of the engine 117 and a stop (IG-OFF) of each vehicle 10corresponds to a stop of the engine 117.

The vehicles 10 are communicably connected to the center server 30through a predetermined communication network (for example, a mobiletelephone network having a large number of base stations as terminals,the Internet, or the like). Each vehicle 10 transmits locationinformation to the center server 30, as will be described later.

The vehicles 10 include a privately-owned vehicle 10A and a vehicle 10Bowned by a B2C car sharing service provider.

The mobile terminals 20 are communicably connected to the center server30 through a predetermined communication network (for example, a mobiletelephone network having a large number of base stations as terminals,the Internet, or the like). Each mobile terminal 20 is able to unlock orlock the intended vehicle 10 by acquiring authentication key information(an example of key information; hereinafter, referred to asauthentication key) that is delivered from the center server 30 andtransmitting the acquired authentication key by relatively close-rangewireless communication in response to a predetermined operation of auser. Each mobile terminal 20 may be, for example, a general cellularphone, a smartphone, or a tablet terminal. Each mobile terminal 20 mayimplement the above-described function by launching a predeterminedapplication program (hereinafter, referred to as key application) thatis installed onto a built-in processing device 23, as will be describedlater. Each mobile terminal 20 may be a portable special-purposeterminal specialized to acquire an authentication key from the centerserver 30, and to unlock the doors of the intended vehicle 10 and startthe intended vehicle 10 with the use of the acquired authentication key.The mobile terminals 20 include mobile terminals 20Aa, 20Ab, 20Ac, 20Adcorresponding to the vehicle 10A, and a mobile terminal 20Bcorresponding to the vehicle 10B.

The mobile terminal 20Aa is a mobile terminal owned by an owner (owneruser) among regular users of the vehicle 10A. The mobile terminal 20Aamay be bidirectionally communicable with the mobile terminal 20Ab byrelatively close-range wireless communication.

The mobile terminal 20Ab is a mobile terminal owned by each of theregular users other than the owner user of the vehicle 10A (for example,including a member of a family of the owner user, a close friend of theowner user, and the like; hereinafter, referred to as child users).

The child users may include a user who does not drive the vehicle 10Aand a user who is not permitted to drive the vehicle 10A (for example, achild under 18 years of age of the owner user, or the like). Forexample, when only a trunk delivery service (described later) is used,the regular users do not need to drive the vehicle 10A.

The mobile terminal 20Ac is owned by a delivery person of a businessoperator that provides a trunk delivery service (described later)(hereinafter, simply referred to as delivery service provider). Themobile terminal 20Ac is communicably connected to the center server 30and a delivery management server 50 (described later) through apredetermined communication network (for example, a mobile telephonenetwork having a large number of base stations as terminals, theInternet, or the like).

The mobile terminal 20Ad is a mobile terminal owned by a renter of thevehicle 10A in a C2C car sharing service (described later). The mobileterminal 20Ad is communicably connected to the center server 30 and aC2C car sharing management server 70 (described later) through apredetermined network (for example, a mobile telephone network having alarge number of base stations as terminals, the Internet, or the like).

The mobile terminal 20B is a mobile terminal owned by a renter of thevehicle 10B in a B2C car sharing service (described later). The mobileterminal 20B is communicably connected to the center server 30 and a B2Ccar sharing management server 80) through a predetermined communicationnetwork (for example, a mobile telephone network having a large numberof base stations as terminals, the Internet, or the like).

The center server 30 is communicably connected to the vehicles 10, themobile terminals 20, and the service management servers 40.

The center server 30 (an example of a service support device) managesissuance of an authentication key of each vehicle 10. For example, thecenter server 30 issues an authentication key and delivers theauthentication key to the intended mobile terminal 20 in response to apredetermined condition.

The center server 30 also acquires location information of each vehicle10 from the vehicle 10. Thus, the center server 30 is able to get thelocation of each vehicle 10.

The center server 30 also operates a car sharing service for sharing thevehicle 10A among the plurality of regular users including the owneruser of the vehicle 10A. Specifically, the center server 30 operates anauthentication key sharing service (key sharing service) that each ofthe registered regular users, including the owner user, is allowed toacquire the authentication key of the vehicle 10A into his or her ownmobile terminal 20 (the mobile terminal 20Aa or the mobile terminal20Ab).

The center server 30 also executes a registration process for theregular users of the vehicle 10A to use a service using the vehicle 10A(the key sharing service, the trunk delivery service, the C2C carsharing service, or the like). Specifically, the center server 30registers permission for the regular users of the vehicle 10A to use aservice using the vehicle 10A. The permission is permission to deliveran authentication key to a predetermined mobile terminal 20(hereinafter, referred to as authentication key arrangement permission)as one of a key sharing management unit 327 (described later) and theservice management servers 40 transmits an authentication keyarrangement request (described later) to the center server 30.

The center server 30 also manages the use statuses of the vehicle 10Aamong a plurality of services (that is, a plurality of businessoperators), such as the trunk delivery service (described later) and theC2C car sharing service (described later).

The service management servers 40 manage operations of various servicesthat are provided by using the vehicles 10. The service managementservers 40 include the delivery management server 50 and an electroniccommerce (EC) server 60 that correspond to the trunk delivery service,the C2C car sharing management server 70 that corresponds to the C2C carsharing service, and the B2C car sharing management server 80 thatcorresponds to the B2C car sharing service.

The trunk delivery service may include a delivery service for dealingwith products ordered on an EC site (described later) as delivery itemsand a delivery service for dealing with articles other than the productsordered on the EC site as delivery items. The latter trunk deliveryservice is, for example, a service that allows the regular users of thevehicle 10A to change the delivery address to the trunk of the vehicle10A when a notification that a package addressed to home is scheduled tobe delivered has been provided from the delivery management server 50 tothe regular user through an electric mail, an account of a socialnetworking service (SNS), or a specific application program that islaunched on the mobile terminal 20Aa or the mobile terminal 20Ab.Hereinafter, in the present embodiment, the former trunk deliveryservice will be mainly described. The operations of components relatedto the trunk delivery service (described later) are also applicable tothe operations of components related to the latter trunk deliveryservice where appropriate.

The delivery management server 50 is communicably connected to themobile terminal 20Ac and the center server 30 through a predeterminedcommunication network. The delivery management server 50 managesoperations of a logistics system associated with the trunk deliveryservice from receipt of a package to delivery of the package to thetrunk of the vehicle 10A.

The delivery service provider that operates the delivery managementserver 50 may provide the regular users of the vehicle 10A with not onlythe trunk delivery service but also a pickup service that allows thetrunk to be designated as a pickup address for a package (hereinafter,referred to as trunk pickup service). That is, the delivery managementserver 50 may manage operations of the trunk pickup service instead ofor in addition to the trunk delivery service. In this case, a packagethat is a pickup item may be a product that is returned to an operatorof the EC site (or a shop opened on the EC site) corresponding to the ECserver 60 (that is, a product purchased on the EC site) or may be adelivery package irrelevant to the EC site. The trunk pickup service maybe realized as a pickup service at the time when a business operatorthat provides a service for temporarily keeping an article from acustomer (for example, a business operator, such as a commerciallaundry) picks up a package from the regular user of the vehicle 10A. Inthis case, a collection management server that manages operations of thetrunk pickup service, which may be included in the service managementservers 40, as well as the delivery management server 50, may beprovided by a commercial laundry provider. That is, the collectionmanagement server may be provided instead of or in addition to thedelivery management server 50. A business operator that provides aservice for collecting a predetermined article (an article, such as junkand a second-hand book that a customer desires to sell) from a customer(for example, a recycle service provider, an antique buyer, or the like)provides the regular users of the vehicle 10A with a collection servicethat allows the trunk to be designated as a collection address for anarticle that is a collection item (hereinafter, referred to as trunkcollection service). In this case, a collection management server thatmanages operations of the trunk collection service, which may beincluded in the service management servers 40, as well as the deliverymanagement server 50, may be provided by a recycle service provider, orthe like. That is, the collection management server may be providedinstead of or in addition to the delivery management server 50.

The EC server 60 is communicably connected to the center server 30 andthe delivery management server 50 through a predetermined communicationnetwork, and operates a predetermined website (EC site) that sells itemsor services. Specifically, the EC server 60 displays the trunk of thevehicle 10A as a choice for delivery address on an order page of the ECsite for the pre-registered regular users of the vehicle 10A and thedelivery service provider (the delivery service provider correspondingto the delivery management server 50). Thus, the regular users of thevehicle 10A are allowed to get delivery of purchased products to thetrunk of the vehicle 10A even when the regular users are not at home.

The C2C car sharing management server 70 is communicably connected tothe mobile terminal 20Ad and the center server 30. The C2C car sharingmanagement server 70 manages operations of the C2C car sharing service,such as receiving registration of a rentable date and time of thevehicle 10A from the owner user, receiving a reservation for use from aperson who wants to rent the vehicle 10A, and arrangements for theauthentication key of the vehicle 10A. The C2C car sharing managementserver 70 may manage operations of a C2C trunk sharing service forrenting the cabin or trunk of the privately-owned vehicle 10A as atemporary luggage storage, a delivery address for a package, or thelike.

The B2C car sharing management server 80 is communicably connected tothe mobile terminal 20B and the center server 30. The B2C car sharingmanagement server 80 manages operations of the B2C car sharing service,such as receiving a reservation for the use of the vehicle 10B andmaking arrangements for a parking location of the vehicle 10B and theauthentication key of the vehicle 10B. The B2C car sharing managementserver 80 may manage operations of a B2C trunk sharing service forrenting the cabin or trunk of the vehicle 10B as a temporary luggagestorage or a delivery address for a package.

The service management servers 40 may include a company car managementserver that operates a car sharing service (company car managementservice) that the vehicle 10 that is a company car of a company isintended for a reservation for use and an employee of the company is aborrower, instead of or in addition to the B2C car sharing managementserver 80. At this time, when there is an idle time period of thevehicle 10 that is a company car, the company car management server mayoperate a C2C car sharing service that the vehicle 10 that is a companycar is intended for rent. The delivery management server 50 and the ECserver 60 may operate a trunk delivery service that allows the trunk ofthe vehicle 10 that is a company car of a company to be designated as adelivery address for a package that is delivered to the company.

Detailed Components Related to Locking and Unlocking of Vehicle andStarting of Vehicle

Next, components related to locking and unlocking of each vehicle 10 andstarting of each vehicle 10 in the authentication key management system1 will be described with reference to FIG. 2.

FIG. 2 is a block diagram that mainly shows an example of componentsrelated to locking and unlocking of each vehicle 10 and starting of eachvehicle 10 in the authentication key management system 1. Each vehicle10 includes a lock/unlock and start device 11, a key unit 12, a GPSmodule 13, and a data communication module (DCM) 14.

The lock/unlock and start device 11 is installed on the vehicle 10, andlocks or unlocks the doors of the vehicle 10 in response to a locksignal or unlock signal that is transmitted from the key unit 12 asradio waves of a radio-frequency (RF) band (for example, 300 MHz to 3GHz) (hereinafter, referred to as RF radio waves). The lock/unlock andstart device 11 starts the vehicle 10 in response to an exchange ofradio waves of a low-frequency (LF) band (for example, 30 Hz to 300 kHz)(hereinafter, referred to as LF radio waves) and RF radio waves with thekey unit 12 with a trigger set to a depressing operation of a startswitch (not shown) provided in the cabin of the vehicle 10. Thelock/unlock and start device 11 includes an LF radio wave transmitter111, an RF radio wave receiver 112, a collation electronic control unit(ECU) 113, a body ECU 114, door lock motors 115, an engine ECU 116, andthe engine 117 that is a driving force source of the vehicle 10.

The lock/unlock and start device 11 is activated by electric power thatis supplied from an auxiliary battery (not shown) mounted on the vehicle10.

The LF radio wave transmitter 111 is incorporated in, for example, acenter console or a door handle in the cabin, and transmits LF radiowaves under control of the collation ECU 113.

The RF radio wave receiver 112 is provided in, for example, a trim in aluggage compartment of the vehicle 10, and receives RF radio waves undercontrol of the collation ECU 113.

The collation ECU 113 is an electronic control unit that controlslocking and unlocking of the doors of the vehicle 10 and starting of thevehicle 10 based on an exchange of signals with the key unit 12. Thecollation ECU 113 is implemented by hardware, software, or a combinationof hardware and software. For example, the collation ECU 113 is mainlyformed of a microcomputer including a central processing unit (CPU), arandom access memory (RAM), a read only memory (ROM), an auxiliarystorage device, a real time clock (RTC), and a communication interface.The collation ECU 113 implements various control processes by executingvarious programs stored in the ROM or the auxiliary storage device onthe CPU. Hereinafter, the same applies to a key ECU 124 (describedlater).

The collation ECU 113 receives an unlock signal and a lock signal thatare transmitted from the key unit 12 as RF radio waves with the use ofthe RF radio wave receiver 112.

When the collation ECU 113 has received the unlock signal or the locksignal, the collation ECU 113 authenticates the source (key unit 12) ofthe unlock signal or lock signal based on key information (hereinafter,referred to as internal key information) included in the unlock signalor the lock signal. For example, when internal key information that isregistered in advance in an internal memory, such as the auxiliarystorage device, matches the internal key information included in theunlock signal or the lock signal, the collation ECU 113 determines thatauthentication is successful. On the other hand, when those pieces ofinternal key information do not match each other, the collation ECU 113determines that authentication has failed.

For example, the collation ECU 113 may transmit LF radio waves,including “challenge” generated by a predetermined method by utilizingthe internal key information of the internal memory, from the LF radiowave transmitter 111 toward the key unit 12, and may performchallenge-response authentication based on “response” that has beenreturned from the key unit 12 and that is received by the RF radio wavereceiver 112.

When authentication is successful, the collation ECU 113 transmits anunlock instruction (upon reception of the unlock signal) or a lockinstruction (upon reception of the lock signal) to the body ECU 114through an in-vehicle network, such as a controller area network (CAN).

As will be described later, in the unlock signal, only part of the doorsof the vehicle 10 can be designated as a door to be unlocked. In thiscase, the collation ECU 113 designates the door(s) to be unlocked withthe unlock instruction. Thus, the body ECU 114 is able to unlock part ofthe doors by activating only the door lock motor(s) 115 corresponding tothe designated part of the doors.

When the start switch has been depressed, the collation ECU 113authenticates the key unit 12 by exchanging signals with the key unit 12with the use of the LF radio wave transmitter 111 and the RF radio wavereceiver 112.

For example, the collation ECU 113 transmits an LF-band request signalfor requesting a reply of the internal key information from the LF radiowave transmitter 111 toward the key unit 12. When the response signalincluding the internal key information has been received from the keyunit 12 by the RF radio wave receiver 112, the collation ECU 113determines whether authentication is successful or authentication hasfailed based on matching between the internal key information registeredin the internal memory in advance and the internal key informationincluded in the response signal, as in the case of locking or unlockingof the doors.

For example, the collation ECU 113 may perform challenge-responseauthentication, as in the case of locking or unlocking of the doors.

When authentication is successful, the collation ECU 113 transmits aninstruction to start the engine 117 to the engine ECU 116 through thein-vehicle network, such as the CAN.

The body ECU 114 is an electronic control unit that controls actuationof each of the door lock motors 115 that are communicably connected tothe body ECU 114 via one-to-one communication lines, or the like. Thebody ECU 114 outputs a control instruction to cause the door lock motors115 to perform unlocking action in response to the unlock instructionfrom the collation ECU 113. The body ECU 114 also outputs a controlinstruction to cause the door lock motors 115 to perform locking actionin response to the lock instruction from the collation ECU 113.

Each of the door lock motors 115 is a known electric actuator thatunlocks or locks a corresponding one of the doors of the vehicle 10 inresponse to a control instruction from the body ECU 114.

The engine ECU 116 is an electronic control unit that controls the driveof the engine 117. Specifically, the engine ECU 116 controls the driveof various actuators, such as a starter and an injector, mounted on theengine 117. When a start instruction has been input from the collationECU 113, the engine ECU 116 causes the engine 117 to start by outputtinga control instruction to the various actuators, such as the starter andinjector of the engine 117.

The key unit 12 is disposed in the cabin of the vehicle 10. The key unit12 transmits any one of the unlock signal and the lock signal as RFradio waves to the lock/unlock and start device 11 in response to acorresponding one of the unlock request and the lock request, which istransmitted from the mobile terminal 20. In addition, at the time whenthe start switch provided in the cabin of the vehicle 10 has beendepressed, the key unit 12 exchanges signals with the lock/unlock andstart device 11 in response to an LF-band signal that is transmittedfrom the lock/unlock and start device 11. The key unit 12 includes an LFradio wave receiver 121, an RF radio wave transmitter 122, acommunication device 123, and the key ECU 124.

The key unit 12 may be disposed at a location at which the key unit 12is difficult to be visually recognized from users seated on respectiveseats of the vehicle 10 (for example, inside a glove box or centerconsole box, or the like). The key unit 12 may be fixed to the vehicle10 or may be not fixed. The key unit 12 may be actuated by a built-inbutton battery, or the like, or may be actuated by electric power thatis supplied from an auxiliary battery mounted on the vehicle 10.

The LF radio wave receiver 121 receives LF radio waves under control ofthe key ECU 124.

The RF radio wave transmitter 122 transmits RF radio waves under controlof the key ECU 124.

The communication device 123 is any device that carries out near-fieldcommunication with the mobile terminals 20 under control of the key ECU124. The communication device 123 may be, for example, a BLEcommunication module that carries out communication with the mobileterminals 20 in conformity with the BLE communication standards. The BLEis an abbreviation of Bluetooth low energy. Bluetooth is a registeredtrademark. Hereinafter, description will be made on the assumption thatthe communication standards employed in the communication device 123adhere to BLE communication.

The communication device 123 may be a communication device that adheresto close-range communication standards for a significantly shortcommunicable range, such as near-field communication (NFC) standards. Inthis case, the communication device 123 may be incorporated at alocation close to a body surface outside the cabin of the vehicle 10(that is, for example, a location inside a door handle). Thus, even whena communicable range of the communication device 123 is significantlyshort, the key unit 12 (key ECU 124) is able to carry out communicationwith the mobile terminals 20 outside the cabin.

The key ECU 124 is an electronic control unit that executes a controlprocess of transmitting any one of the lock signal and the unlock signalto the lock/unlock and start device 11 in response to a correspondingone of the lock request and the unlock request, which is received fromthe mobile terminal 20.

The key ECU 124 receives an authentication request including anauthentication key associated with the key unit 12 from the mobileterminal 20 through the communication device 123.

When an authentication request including the authentication keyassociated with the key unit 12 has been received from the mobileterminal 20, the key ECU 124 authenticates the mobile terminal 20 basedon the authentication key. When the authentication is successful, thekey ECU 124 reconstitutes the internal key information stored in theinternal memory, such as the auxiliary storage device, into a usablestate. The internal key information is stored in a state where theinternal key information is not usable as a use for authentication inthe lock/unlock and start device 11, such as an inaccessible state andan encrypted state. For this reason, when authentication of the mobileterminal 20 is successful, the key ECU 124, for example, changes accesspermission to the internal memory for changing the key information intoan accessible state or decodes the encrypted internal key informationbased on the authentication key. Thus, the key ECU 124 is able totransmit an unlock signal or lock signal, including the internal keyinformation, to the lock/unlock and start device 11 by accessing thenormally inaccessible internal key information, or transmit an unlocksignal or lock signal, including the decoded internal key information,to the lock/unlock and start device 11. For this reason, the lock/unlockand start device 11 is able to perform appropriate authentication basedon the internal key information included in the unlock signal or thelock signal. Even if there occurs a situation in which a third party inbad faith illegally gets hold of the key unit 12, since the internal keyinformation in the key unit 12 is, for example, inaccessible orencrypted, it is possible to reduce occurrence of a theft of the vehicle10.

The key ECU 124 also receives an unlock request and a lock request fromthe mobile terminals 20 through the communication device 123. Whenauthentication of the mobile terminal 20 is successful (specifically,after authentication of the mobile terminal 20 is successful, BLEcommunication is continuously established) and the key ECU 124 hasreceived an unlock request or a lock request from the mobile terminal20, the key ECU 124 transmits an unlock signal or lock signal, includinglock/unlock key information, to the lock/unlock and start device 11through the RF radio wave transmitter 122.

Thus, after an authentication process in the lock/unlock and startdevice 11, the doors of the vehicle 10 are unlocked or locked.

As described above, at the time when the start switch provided in thecabin of the vehicle 10 has been depressed, the key ECU 124 exchangessignals with the lock/unlock and start device 11 in response to anLF-band signal that is transmitted from the lock/unlock and start device11.

For example, when the request signal has been received from thelock/unlock and start device 11 by the LF radio wave receiver 121, thekey ECU 124 transmits a response signal including the internal keyinformation stored in the internal memory, or the like, toward thelock/unlock and start device 11 through the RF radio wave transmitter122.

For example, when LF radio waves including “challenge” have beenreceived from the lock/unlock and start device 11 by the LF radio wavereceiver 121, the key ECU 124 generates “response” based on the internalkey information, and transmits the “response” to the lock/unlock andstart device 11 through the RF radio wave transmitter 122.

Thus, after the authentication process in the lock/unlock and startdevice 11, the engine 117 is started.

Permission related to the function of locking or unlocking the vehicle10 or starting the vehicle 10 may be defined in the authentication key.The permission is assigned by the center server 30.

For example, when the authentication key has the permission to unlockonly part of the doors of the vehicle 10, the key ECU 124 transmits anunlock signal, including information that designates the door(s) to beunlocked, to the key unit 12 through the RF radio wave transmitter 122.Thus, as described above, only part of the doors of the vehicle 10 maybe unlocked.

For example, when the authentication key has no permission to start theengine 117, the key ECU 124 just needs to be configured not to exchangesignals with the lock/unlock and start device 11 even when an LF-bandsignal from the lock/unlock and start device 11 based on a depressingoperation of the start switch has been received by the LF radio wavereceiver 121. Thus, it is possible to prohibit startup of the engine 117in accordance with the permission of the authentication key.

The GPS module 13 receives GPS signals that are transmitted from threeor more, desirably four or more satellites above the vehicle 10, andmeasures the location of the vehicle 10. The GPS module 13 iscommunicably connected to the DCM 14, or the like, through thein-vehicle network, such as a one-to-one communication line and the CAN.The measured location information of the vehicle 10 is input to the DCM14, or the like.

The DCM 14 is a communication device that bidirectionally carries outcommunication with the center server 30 through a predeterminedcommunication network. The DCM 14 transmits the current locationinformation of the vehicle 10, which is input from the GPS module 13, tothe center server 30 at prescribed timing or in response to a request,or the like, from the center server 30. The DCM 14 transmits variouspieces of vehicle information to the center server 30. Examples of thevarious pieces of vehicle information include information that the doorsof the vehicle 10 have been unlocked based on the authentication key orthe vehicle 10 has been started based on the authentication key. Thevarious pieces of vehicle information are acquired through thein-vehicle network, such as the CAN, at prescribed timing or in responseto a request, or the like, from the center server 30.

Each of the mobile terminals 20 includes a communication device 21, acommunication device 22, a processing device 23, and a touch paneldisplay (hereinafter, simply referred to as display) 24.

The communication device 21 is any device that carries out near-fieldcommunication with the vehicle 10 in accordance with the samecommunication standards as the communication device 123. As describedabove, the communication device 21 is, for example, a BLE communicationmodule in the case of the present embodiment.

The communication device 22 is any device that carries out communicationwith the center server 30, the service management servers 40, and thelike, through a predetermined communication network. The communicationdevice 22 is, for example, a mobile communication module that conformsto communication standards, such as long term evolution (LTE), 4thgeneration (4G) and 5th generation (5G).

The processing device 23 executes various control processes in themobile terminal 20. The functions of the processing device 23 may beimplemented by hardware, software, or a combination of hardware andsoftware. The processing device 23 includes, for example, a CPU, a RAM,a ROM, an auxiliary storage device, an RTC, various interfaces forcommunication, and the like. The processing device 23 includes, forexample, a communication processing unit 231, a communication processingunit 232, an authentication key acquisition unit 233, an authenticationrequesting unit 234, and a lock/unlock requesting unit 235, asfunctional units that are implemented by executing one or more programsstored in the ROM or the auxiliary storage device on the CPU. Theprocessing device 23 also includes, for example, a storage unit 230 thatis implemented as a storage area in the auxiliary storage device. Aprocess of saving (storing) various data in the storage unit 230 isimplemented by a predetermined program stored in the ROM or theauxiliary storage device.

The communication processing unit 231 bidirectionally carries outnear-field communication with the key unit 12 with the use of thecommunication device 21, and transmits or receives various signals.

The communication processing unit 232 establishes connection with apredetermined communication network with the use of the communicationdevice 22, and transmits or receives various signals, such as datasignals and control signals, with the center server 30, the servicemanagement servers 40, and the like.

The authentication key acquisition unit 233, for example, acquires anauthentication key from the center server 30 and saves the acquiredauthentication key in the storage unit 230 in response to apredetermined operation of the user to a predetermined graphical userinterface (GUI) that is displayed on the display 24. Hereinafter,description will be made on the assumption that various operations tothe mobile terminal 20 are made by operations to GUI that is displayedon the display 24 in synchronization with the operation of the keyapplication.

For example, the authentication key acquisition unit 233 of the mobileterminal 20Aa transmits an authentication key acquisition request to thecenter server 30 via the communication processing unit 232. Thus, thecenter server 30 receives the authentication key acquisition request,and, when the center server 30 determines that the authentication keyacquisition request is a regular authentication key acquisition request,issues an authentication key. The authentication key acquisition unit233 acquires the authentication key that is delivered from the centerserver 30 via the communication processing unit 232.

For example, the authentication key acquisition unit 233 of the mobileterminal 20Ab acquires an authentication key that is delivered from thecenter server 30 to the mobile terminal 20Ab via the communicationprocessing unit 232 in response to a key sharing request (describedlater) that is transmitted from the mobile terminal 20Aa to the centerserver 30.

The authentication key acquisition unit 233 of the mobile terminal 20Abby itself may transmit an authentication key acquisition request to thecenter server 30 via the communication processing unit 232. In thiscase, when the center server 30 has received the authentication keyacquisition request from the mobile terminal 20Ab, the center server 30just needs to make an inquiry to the mobile terminal 20Aa of the owneruser about whether to allow delivery of the authentication key.

For example, the authentication key acquisition unit 233 of the mobileterminal 20Ac transmits an authentication key acquisition request toacquire an authentication key to the delivery management server 50. Forexample, the authentication key acquisition unit 233 of the mobileterminal 20Ad transmits an authentication key acquisition request toacquire an authentication key to the C2C car sharing management server70. For example, the authentication key acquisition unit 233 of themobile terminal 20B transmits an authentication key acquisition requestto acquire an authentication key to the B2C car sharing managementserver 80. Thus, each of the delivery management server 50, the C2C carsharing management server 70, and the B2C car sharing management server80 transmits an authentication key arrangement request to the centerserver 30 in response to reception of an authentication key acquisitionrequest, and the center server 30 issues an authentication key inresponse to reception of the authentication key arrangement request. Theauthentication key acquisition unit 233 acquires the authentication keythat is delivered from the center server 30 via the communicationprocessing unit 232.

The authentication key acquisition unit 233 of each of the mobileterminals 20Ac, 20Ad, 20B may transmit an authentication key acquisitionrequest to the center server 30 through the communication processingunit 232. In this case, the center server 30 may determine whether theauthentication key acquisition request is a regular authentication keyacquisition request by making an inquiry to a corresponding one of thedelivery management server 50, the C2C car sharing management server 70,and the B2C car sharing management server 80.

The authentication requesting unit 234 transmits an authenticationrequest to authenticate the mobile terminal 20 to the key unit 12 of thevehicle 10 via the communication processing unit 231. The mobileterminal 20 serves as a remote operating unit for locking or unlockingthe doors of the vehicle 10. For example, when the authenticationrequesting unit 234 has found a key unit corresponding to anauthentication key, specifically, when an advertising packetcorresponding to the key unit 12 has been received by the communicationprocessing unit 231, the authentication requesting unit 234 may transmitan authentication request to the key unit 12. For example, theauthentication requesting unit 234 may transmit an authenticationrequest to the key unit 12 in response to a predetermined operation ofthe user.

The lock/unlock requesting unit 235 transmits an unlock requestincluding an authentication key or a lock request including anauthentication key to the key unit 12 via the communication processingunit 231 in response to a predetermined operation of the user. Thus,even when an unlock request or a lock request has been transmitted tothe key unit 12 before an authentication request is transmitted by theauthentication requesting unit 234, the doors of the vehicle 10 may belocked or unlocked based on the authentication process in the key unit12. For example, the GUI that is an operation screen of the display 24may contain an unlock button for issuing a request to unlock the vehicle10 and a lock button for issuing a request to lock the vehicle 10, alock request may be transmitted with the touch of the lock button, andan unlock request may be transmitted with the touch of the unlockbutton. A lock request and an unlock request may be transmitted as aresult of an operation to a predetermined hardware operating unitprovided in the mobile terminal 20.

For example, the functions of the authentication key acquisition unit233, authentication requesting unit 234, and lock/unlock requesting unit235 may be configured to be available to the user by launching apredetermined application program that is installed on the ROM,auxiliary storage device, or the like, of the processing device 23.Hereinafter, description will be made on the assumption that thefunctions of the authentication key acquisition unit 233, authenticationrequesting unit 234, and lock/unlock requesting unit 235 of theprocessing device 23 become available to the user by launching the keyapplication installed on the processing device 23 (the auxiliary storagedevice or the ROM).

The center server 30 includes a communication device 31 and a processingdevice 32.

The functions of the center server 30 may be implemented by a pluralityof servers in a distributed manner. Hereinafter, this also applies tothe delivery management server 50, the EC server 60, the C2C car sharingmanagement server 70, and the B2C car sharing management server 80.

The communication device 31 is any device that bidirectionally carriesout communication with each of the vehicles 10, the mobile terminals 20,and the service management servers 40 through a predeterminedcommunication network.

The processing device 32 (an example of an information processingdevice) executes various control processes in the center server 30. Thefunctions of the processing device 32 may be implemented by hardware,software, or a combination of hardware and software. The processingdevice 32 is mainly formed of one or plurality of server computers eachincluding, for example, a CPU, a RAM, a ROM, an auxiliary storagedevice, an RTC, a predetermined communication interface, and the like.Hereinafter, this also applies to a processing device 52 (describedlater) of the delivery management server 50, a processing device 62(described later) of the EC server 60, a processing device 72 (describedlater) of the C2C car sharing management server 70, and a processingdevice 82 (described later) of the B2C car sharing management server 80.The processing device 32 includes, for example, a communicationprocessing unit 321, a condition determination unit 322, and anauthentication key issuance unit 323 as functional units that areimplemented by executing one or more programs saved in the ROM or theauxiliary storage device on the CPU. The processing device 32 alsoincludes, for example, a storage unit 320 that is implemented as astorage area defined in the auxiliary storage device of thecorresponding server computer, an external storage device that isconnected to the corresponding server computer, or other storagedevices. A process of saving (storing) various data in the storage unit320 is implemented by a program stored in the ROM or the auxiliarystorage device. Hereinafter, this also applies to storage units 520,620, 720, 820 (described later).

The communication processing unit 321 controls the communication device31, and exchanges various signals, such as control signals andinformation signals, with each of the vehicles 10, the mobile terminals20, and the service management servers 40.

The condition determination unit 322 determines whether anauthentication key acquisition request is a regular authentication keyacquisition request in response to reception of the authentication keyacquisition request, received by the communication processing unit 321,from the mobile terminal 20. The condition determination unit 322 alsodetermines whether an authentication key arrangement request is aregular authentication key arrangement request in response to receptionof the authentication key arrangement request from any one of theservice management servers 40.

When the condition determination unit 322 determines that theauthentication key acquisition request is a regular authentication keyacquisition request or determines that the authentication keyarrangement request is a regular authentication key arrangement request,the authentication key issuance unit 323 (an example of a keyinformation delivery unit) identifies the specifications of anauthentication key to be issued, and issues an authentication keycorresponding to the identified specifications. For example, theauthentication key issuance unit 323 identifies the vehicle 10 intendedto be locked or unlocked with an authentication key or identifies thekey unit 12, or the like, corresponding to the intended vehicle 10. Forexample, the authentication key issuance unit 323 also identifies thepermission of the authentication key on an effective (available) periodof the authentication key and the number of times the authentication keyis available. For example, the authentication key issuance unit 323 alsoidentifies the permission of the authentication key for unlocking thevehicle 10 or starting the vehicle 10, such as which door is allowed tobe locked or unlocked and whether the vehicle 10 is allowed to bestarted. For example, the authentication key issuance unit 323 alsoidentifies the permission of the authentication key on temporary keysharing, such as whether the authentication key is allowed to be sharedwith another one of the mobile terminals 20 through temporary keysharing (described later), a period during which the authentication keyis allowed to be shared with another one of the mobile terminals 20, andthe number of times the authentication key is allowed to be shared withanother one of the mobile terminals 20. Hereinafter, the permission ofthe authentication key on an available period, the available number oftimes, and the like, the permission of the authentication key forunlocking the vehicle 10 or starting the vehicle 10, and the permissionof the authentication key on temporary key sharing are collectivelysimply referred to as various types of permission of the authenticationkey. The authentication key issuance unit 323 delivers theauthentication key issued for the intended mobile terminal 20 via thecommunication processing unit 321.

Details of Components Related to Key Sharing Service

Next, components related to the key sharing service in theauthentication key management system 1 will be described with referenceto FIG. 3.

FIG. 3 is a block diagram that mainly shows an example of componentsrelated to the key sharing service in the authentication key managementsystem 1. Hereinafter, for FIG. 3, components related to the key sharingservice in the authentication key management system 1 will be mainlydescribed, and the overlap description of components that overlap withthe above-described components related to locking and unlocking of thevehicle 10 and starting of the vehicle 10 is omitted as much aspossible. Hereinafter, the same applies to the description of FIG. 4 toFIG. 6.

As described above, the processing device 23 of the mobile terminal 20Aaowned by the owner user of the vehicle 10A includes the communicationprocessing unit 231, the communication processing unit 232, theauthentication key acquisition unit 233, the authentication requestingunit 234, and the lock/unlock requesting unit 235. The processing device23 of the mobile terminal 20Aa further includes a user registrationrequesting unit 236, a service registration requesting unit 237, aservice use status requesting unit 238, and a key sharing requestingunit 239 as functional units that are implemented by executing one ormore programs stored in the ROM or the auxiliary storage device on theCPU.

In the present embodiment, description will be made on the assumptionthat the functions of the user registration requesting unit 236, serviceregistration requesting unit 237, service use status requesting unit 238and key sharing requesting unit 239 of the mobile terminal 20Aa becomeavailable to the owner user when the key application is launched anduser authentication based on bidirectional communication with the centerserver 30 is successful. Description will be made on the assumption thatthe user authentication is performed on the center server 30 based on anID prescribed for the owner user (hereinafter, referred to as owner userID) and a password corresponding to the owner user ID.

The user registration requesting unit 236 requests registration of aregular user of the vehicle 10A, who uses various services using thevehicle 10A (the key sharing service, the trunk delivery service, andthe C2C car sharing service), to the center server 30 in response to apredetermined operation of the owner user. For example, the userregistration requesting unit 236 transmits a user registration requestincluding the owner user ID, the password, and attribute informationthat identifies a child user to be registered (for example, a name, anage, a relation with the owner user, and the like) to the center server30 via the communication processing unit 232.

When a notification that registration of the child user has completed(user registration completion notification) has been received from thecenter server 30 by the communication processing unit 232, the userregistration requesting unit 236 saves an ID of the child user(hereinafter, referred to as child user ID) and a password, included inthe user registration completion notification, in the storage unit 230.At this time, the user registration requesting unit 236 may transmit thechild user ID and the password to the mobile terminal 20Ab owned by theregistered child user via the communication processing unit 231 inresponse to a predetermined operation of the owner user.

The service registration requesting unit 237 requests registration ofthe regular user of the vehicle 10A with various services using thevehicle 10A to the center server 30 in response to a predeterminedoperation of the owner user. That is, as described above, the serviceregistration requesting unit 237 requests registration of authenticationkey arrangement permission of the key sharing management unit 327 andservice management servers 40 corresponding to various services, for theregular user of the vehicle 10A to use various services. For example,the service registration requesting unit 237 transmits the owner userID, the password, information that identifies the vehicle 10A that isused in various services, information that identifies an intendedservice, and a service registration request including the ID of theregular user who uses the intended service (the owner user ID or thechild user ID) to the center server 30 via the communication processingunit 232. Hereinafter, the owner user ID and the child user ID may becollectively referred to as regular user IDs. Thus, the serviceregistration requesting unit 237 is able to register a child user whouses the key sharing service with the center server 30.

The service registration requesting unit 237 receives a notificationthat registration with a service based on the service registrationrequest has completed from at least one of the center server 30 and theservice management servers 40 with the use of the communicationprocessing unit 232. The service registration requesting unit 237 causesthe display 24 to display the fact that registration of the regular userof the vehicle 10A with a specific service based on a predeterminedoperation of the owner user has completed. Thus, the owner user isinformed of the fact that registration of the regular user with thespecific service has completed.

The service use status requesting unit 238 requests information relatedto the use statuses of various services, including the key sharingservice, with which the regular user of the vehicle 10A has registeredin association with the owner user ID (service use status information),to the center server 30 in response to a predetermined operation of theowner user. For example, the service use status requesting unit 238transmits a service use status request including the owner user ID andthe password to the center server 30 via the communication processingunit 232. When the service use status information has been received fromthe center server 30 by the communication processing unit 232, theservice use status requesting unit 238 displays the service use statusinformation on the display 24. Thus, the owner user is able tomonistically see information related to the use statuses of variousservices that the regular users register in the center server 30 inassociation with the owner user ID.

The key sharing requesting unit 239 requests delivery of anauthentication key for locking or unlocking the vehicle 10A or startingthe vehicle 10A to the child user registered with the key sharingservice, to the center server 30 in response to a predeterminedoperation of the owner user. For example, the key sharing requestingunit 239 transmits a key sharing request to the center server 30 via thecommunication processing unit 232. The key sharing request includes theowner user ID and its password, information related to the vehicle 10Ato be locked or unlocked with the use of the authentication key, andinformation about the intended child user whom the authentication key isdelivered to or shared with (for example, the child user ID). At thistime, the key sharing request may include use period information relatedto an available period of the authentication key to be delivered (forexample, a use start date and time, a use end date and time, or thelike), which is set by a predetermined operation of the owner user. Thekey sharing request may also include permission information related tovarious types of permission of authentication keys, which may bedesignated in response to a predetermined operation of the owner user.The various types of permission of the authentication keys include thepermission of an authentication key on an available period, theavailable number of times, or the like, the permission of anauthentication key for unlocking the vehicle or starting the vehicle,the permission of an authentication key on temporary key sharing(described later), and the like. Thus, as will be described later, whenthe owner user sets appropriate permission information in the case wherean authentication key available at the same time is shared between theplurality of mobile terminals 20, usage of the vehicle 10A by a userother than the owner user is limited. For this reason, it is possible toimprove the security of the vehicle 10A.

The key sharing requesting unit 239 may request delivery ofauthentication keys of which available periods conflict with each otherto the center server 30 in response to a predetermined operation of theowner user while the mobile terminals 20 (that is, each of which is atleast one of the mobile terminals 20Aa, 20Ab) of the plurality ofregular users of the vehicle 10A are set for the mobile terminals 20 towhich the authentication keys are delivered. That is, in the key sharingrequest, a plurality of regular users to which authentication keys aredelivered may be designated, and the plurality of regular users mayinclude the owner user. In the key sharing request, available periods ofauthentication keys for a plurality of regular users to be designatedmay conflict with each other. Thus, an authentication key of the vehicle10A available at the same time may be shared between the plurality ofregular users. For this reason, for example, when two or more personsget on the vehicle 10A and go on a trip or go camping, each of thepassengers is allowed to, for example, lock or unlock the vehicle 10Awithout lending or borrowing the mobile terminal 20 in which theauthentication key is saved, so it is possible to improve convenience ofthe users.

The key sharing requesting unit 239 may share the already deliveredauthentication key with another one of the mobile terminals 20 (that is,the mobile terminal 20 onto which the key application is installed) inresponse to a predetermined operation of the owner user (hereinafter, amanner of sharing the authentication key is referred to as temporary keysharing). At this time, another one of the mobile terminals 20 may bethe mobile terminal 20Ab of the child user or may be the mobile terminal20 of a user other than the child user, that is, a user who temporarilyuses the vehicle 10A.

For example, the key sharing requesting unit 239 transmits theauthentication key (specifically, a copy of the authentication key) toanother one of the mobile terminals 20 through the communicationprocessing unit 231. Thus, even when two or more persons suddenly decideto get on the vehicle 10A to go on a trip, or the like, the owner userof the vehicle 10A is allowed to share the authentication key withanother user. In addition, the mobile terminal 20Aa is directly able toshare the authentication key available to another one of the mobileterminals 20 at the same time. For this reason, for example, even whenthe mobile terminal 20Aa is located in a place of a poor communicationcondition in a wireless mobile communication network or outside acommunication range, the owner user of the vehicle 10A is allowed toshare the authentication key with another user.

At this time, the key sharing requesting unit 239 may transmit anauthentication key to another one of the mobile terminals 20 through thecommunication processing unit 231, and the authentication key haslimited permission on an available period or the available number oftimes or limited permission for unlocking the vehicle 10A or startingthe vehicle 10A. Each type of permission is set based on a predeterminedoperation of the owner user or defined in advance. Specifically, forexample, an authentication key with permission that limits an availableperiod to 30 minutes, or the like, or that limits the available numberof times to once, or the like, or an authentication key with permissionthat limits doors to be locked or unlocked to doors for getting on oroff the vehicle 10A only or that prohibits the vehicle 10A from startingmay be transmitted to another one of the mobile terminals 20.Hereinafter, this also applies to the case of temporary key sharing thatis performed via the center server 30. Thus, it is possible to improvethe security of the vehicle 10A in temporary key sharing.

When temporary key sharing is performed, the key sharing requesting unit239 may cause the center server 30 to deliver an authentication key toanother one of the mobile terminals 20 as in the case of normal keysharing. At this time, the key sharing requesting unit 239 may cause thecenter server 30 to deliver the authentication key of the vehicle 10A toanother one of the mobile terminals 20 by transmitting a temporary keysharing request, including information that identifies the deliveredauthentication key (for example, an issued ID embedded in theauthentication key, or the like) and information that designates anotherone of the mobile terminals 20 to which the key authentication key isdelivered, to the center server 30 through the communication processingunit 232.

For example, when another one of the mobile terminals 20 is the mobileterminal 20Ab of the child user, the key sharing requesting unit 239 maytransmit a temporary key sharing request including the child user ID tothe center server 30 through the communication processing unit 232.

For example, the key sharing requesting unit 239 also acquirespredetermined identification information (for example, a QR code(registered trademark) corresponding to the user of another one of themobile terminals 20, who is registered in the center server 30 as aninstalled user of the key application) from the another one of themobile terminals 20 through the communication processing unit 231, orthe like. The key sharing requesting unit 239 may transmit a temporarykey sharing request that designates another one of the mobile terminals20, which is identified based on the identification information, as adelivery destination to the center server 30.

The mobile terminal 20Aa may acquire the identification information withanother method. For example, the mobile terminal 20Aa may acquireidentification information corresponding to the user of another one ofthe mobile terminals 20 by recognizing identification information thatis displayed on the display 24 of the another one of the mobileterminals 20 with the use of an onboard camera function. For example,the mobile terminal 20Aa may also acquire identification informationtransmitted from the user of another one of the mobile terminals 20 to amail address or SNS account of the owner user.

For example, the key sharing requesting unit 239 also transmits acandidate terminal information request to the center server 30 throughthe communication processing unit 232 in response to a predeterminedoperation of the owner user. The candidate terminal information requestis to request candidate terminal information related to a candidateterminal that is a candidate of another one of the mobile terminals 20and that is located around a current location of the mobile terminal20Aa. When the candidate terminal information has been received from thecenter server 30 by the communication processing unit 232, the keysharing requesting unit 239 also causes the display 24 to display thecandidate terminal information. At this time, the candidate terminalinformation that is returned from the center server 30 may includeinformation that identifies a candidate terminal on which a specificoperation or action is being performed among the candidate terminals.Thus, the owner user of the vehicle 10A is allowed to identify anotherone of the mobile terminals 20, intended for key sharing, from among thecandidate terminals that are displayed on the display 24 of the mobileterminal 20Aa as the user of the another one of the mobile terminals 20performs a specific operation or action on the another one of the mobileterminals 20. The key sharing requesting unit 239 may transmit atemporary key sharing request that designates the another one of themobile terminals 20, identified from among the candidate terminals, as adelivery destination to the center server 30 in response to apredetermined operation of the owner user.

The key sharing requesting unit 239 may also transmit link informationbased on a uniform resource locator (URL) scheme for launching the keyapplication and causing another one of the mobile terminals 20 toacquire an authentication key from the center server 30 (hereinafter,simply referred to as link information) to a mail address or SNS accountof the user of the another one of the mobile terminals 20 through thecommunication processing unit 232 in response to a predeterminedoperation of the owner user. At this time, the key sharing requestingunit 239 transmits a temporary key sharing request that designates theacquired authentication key to the center server 30 through thecommunication processing unit 232 in response to a predeterminedoperation of the owner user, and acquires link information that isreturned from the center server 30 in response to the temporary keysharing request. Thus, the key sharing requesting unit 239 is able todeliver an authentication key from the center server 30 to another oneof the mobile terminals 20.

Temporary key sharing may be configured to be executable from the mobileterminal 20Ab of the child user, to which the authentication key hasbeen already delivered. That is, the functions of the key sharingrequesting unit 239, related to temporary key sharing, may be includedin the functions of the key application that is installed onto theprocessing device 23 of the mobile terminal 20Ab of the child user.Thus, even in the case where two or more persons except the owner userget on the vehicle 10A, it is not necessary to lend or borrow the mobileterminal 20Ab of the child user who has already acquired theauthentication key among the two or more persons, so it is possible tofurther improve the convenience of the child user of the vehicle 10A.Hereinafter, description will be made on the assumption that temporarykey sharing is available from the mobile terminal 20Ab of the childuser.

As described above, the processing device 32 of the center server 30includes the communication processing unit 321, the conditiondetermination unit 322, the authentication key issuance unit 323, andthe storage unit 320. The processing device 32 of the center server 30also includes a location information management unit 324, a schedulemanagement unit 325, a registration management unit 326, and the keysharing management unit 327.

When the communication processing unit 321 has received anauthentication key acquisition request from any one of the mobileterminals 20Aa, 20Ab, the condition determination unit 322 performsauthentication based on the regular user ID and password included in theauthentication key acquisition request. For example, the conditiondetermination unit 322 compares the regular user ID and passwordregistered in the storage unit 320 with the regular user ID and passwordincluded in the authentication key acquisition request. When theregistered regular user ID and password match the regular user ID andpassword included in the authentication key acquisition request, thecondition determination unit 322 determines that authentication issuccessful, that is, the authentication key acquisition request is aregular authentication key acquisition request.

The condition determination unit 322 also determines whether anauthentication key arrangement request that is transferred from the keysharing management unit 327 (described later) is a regularauthentication key arrangement request. For example, when authenticationis successful based on authentication information (for example, the IDand the password) included in the authentication key arrangement requestfrom the key sharing management unit 327, the condition determinationunit 322 may determine that the authentication key arrangement requestis a regular authentication key arrangement request.

When the condition determination unit 322 determines that theauthentication key acquisition request is a regular authentication keyacquisition request or the authentication key arrangement request is aregular authentication key arrangement request, the authentication keyissuance unit 323 issues an authentication key, and delivers theauthentication key to the intended mobile terminal 20 through thecommunication processing unit 321.

The location information management unit 324 acquires locationinformation from the vehicle 10A via the communication processing unit321, and keeps track of a travel status of the vehicle 10A by monitoringthe location information of the vehicle 10A in real time. Thus, forexample, the location information management unit 324 is able to informthe owner user of the location information of the vehicle 10A lent tothe child user via the communication processing unit 321. For example,the location information management unit 324 is able to inform themobile terminal 20Ab of the child user of information, such as whetherthe vehicle 10A scheduled to be lent to the child user is heading towarda designated location (home, or the like) and how long does it take toget to the designated location, via the communication processing unit321.

The schedule management unit 325 manages the use statuses of the vehicle10A in various services. For example, the schedule management unit 325periodically acquires a use schedule of the vehicle 10A in the keysharing service, specifically, information related to an available dateand time of the authentication key that is delivered by the key sharingservice, from the key sharing management unit 327. The schedulemanagement unit 325 also acquire a use schedule of the vehicle 10A ineach of the trunk delivery service and the C2C car sharing service fromthe delivery management server 50 and the C2C car sharing managementserver 70 via the communication processing unit 321. The schedulemanagement unit 325 generates information related to a use schedule ofthe vehicle 10A over a plurality of services (vehicle use scheduleinformation) based on the acquired use schedule of the vehicle 10A inthe various services, and updates old vehicle use schedule informationsaved in the storage unit 320. That is, the schedule management unit 325(an example of a coordination unit) prevents a conflict of a useschedule of the vehicle 10A among a plurality of services, a pluralityof business operators that provide various services, and a plurality ofregular users of the vehicle 10A, as will be described later, bysequentially updating the vehicle use schedule information.

The registration management unit 326 registers the regular user (childuser) who uses various services in response to a user registrationrequest that is received from the mobile terminal 20Aa of the owner userby the communication processing unit 321. For example, the registrationmanagement unit 326 compares the owner user ID and password included inthe user registration request from the mobile terminal 20Aa with theowner user ID and password saved in the storage unit 320. When the owneruser ID and password included in the user registration request match thesaved owner user ID and password, the registration management unit 326determines that the user registration request is a regular userregistration request, that is, authentication is successful. Theregistration management unit 326 registers the child user ID included inthe regular user registration request in a user and service registrationinformation database (DB) in the storage unit 320 as a regular user whois allowed to use various services.

The registration management unit 326 performs registration of theregular user of the vehicle 10A with various services in response to aservice registration request that is received from the mobile terminal20Aa of the owner user by the communication processing unit 321. Thatis, the registration management unit 326 registers authentication keyarrangement permission of the key sharing management unit 327 andservice management servers 40 corresponding to various services inresponse to the service registration request. The authentication keyarrangement permission is permission for the user of the vehicle 10A touse the various services. For example, the registration management unit326 determines whether the service registration request is a regularservice registration request by executing an authentication processsimilar to the above-described process based on the owner user ID andpassword included in the service registration request from the mobileterminal 20Aa. When the service registration request is a regularservice registration request, the registration management unit 326 alsodetermines whether the regular user ID included in the serviceregistration request has been already registered in the user and serviceregistration information DB. When the regular user ID included in theservice registration request has been already registered in the user andservice registration information DB, the registration management unit326 registers an intended service, which is identified by the serviceregistration request, in the user and service registration informationDB in the storage unit 320 as a service available to the regular usercorresponding to the regular user ID.

Specifically, the registration management unit 326 constructs the userand service registration information DB that associates service uniqueinformation, vehicle unique information, the regular user ID, andservice link information with the owner user ID. The service unitinformation identifies an intended service. The vehicle uniqueinformation identifies the vehicle 10A. The regular user ID identifiesthe regular user who uses a service. The service link informationassociates the vehicle unique information and the regular user ID,corresponding to the vehicle 10A, with the intended service.

The service unique information is, for example, a service ID that isdefined for each service. Specifically, for example, when there is aplurality of business operators that provide the C2C car sharingservice, a service ID unique to each of the business operators isdefined. For example, when the same business operator provides aplurality of C2C car sharing services, an ID unique to each of theservices that the same business operator provides. When the trunkdelivery service is provided by a combination between a plurality ofdelivery service providers and a plurality of EC business operators, aunique service ID may be defined for each combination of a deliveryservice provider and an EC business operator, or an intended service maybe identified by a combination of a unique service ID that is definedfor each of a plurality of delivery service providers and a uniqueservice ID that is defined for each of the plurality of EC businessoperators.

The vehicle unique information may be any information as long as thevehicle unique information is able to identify the vehicle 10A to belocked or unlocked or to be started with an authentication key. Thevehicle unique information may be, for example, identificationinformation, such as a vehicle ID and a VIN, that is defined for eachvehicle 10A. The vehicle unique information may be, for example,identification information, such as a key unit ID, that is defined foreach in-vehicle device, such as the key unit 12, that is related tolocking or unlocking of doors or starting of the vehicle 10A based on anauthentication key and that is mounted on the vehicle 10A. Hereinafter,description will be made on the assumption that the vehicle uniqueinformation is a key unit ID.

The service link information is information that is required to causethe authentication key issuance unit 323 to issue an authentication keyand deliver the authentication key to the intended mobile terminal 20 asany one of the key sharing management unit 327, the delivery managementserver 50 and EC server 60, and the C2C car sharing management server 70that respectively manage various services transmits an authenticationkey arrangement request. That is, the authentication key issuance unit323 is able to identify the vehicle 10A to be locked or unlocked or tobe started with an authentication key and issue an appropriateauthentication key by receiving an authentication key arrangementrequest including service link information from any one of the keysharing management unit 327, the delivery management server 50 and ECserver 60, and the C2C car sharing management server 70.

The service link information may be any information as long as theservice link information is able to associate an intended service withthe vehicle 10A and a user who uses the service in the center server 30.Examples of the service link information may include a login ID of aregular user on each of user-oriented websites for various servicescorresponding to the key sharing management unit 327, the deliverymanagement server 50, the EC server 60, and the C2C car sharingmanagement server 70 (hereinafter, referred to as service login ID forthe sake of convenience). In this case, the service registrationrequesting unit 237 of the mobile terminal 20Aa transmits a serviceregistration request including the service login IDs of a regular userto be registered, corresponding to various services, to the centerserver 30 via the communication processing unit 232. When a regular userto be registered has not acquired service login IDs corresponding tovarious services yet, the processing device 23 of the mobile terminal20Aa may launch a predetermined browser and cause the regular user toacquire service login IDs of websites for the various services. Thus,when a user (a regular user of the vehicle 10A) logs onto a website atthe time of requesting an intended service, the delivery managementserver 50 or the C2C car sharing management server 70 is able to find aservice login ID corresponding to service link information and easilyarrange for an authentication key related to provision of the service.Hereinafter, description will be made on the assumption that the servicelink information related to the trunk delivery service and the C2C carsharing service is the above-described service login ID.

In the case of a regular user who regularly uses the plurality ofvehicles 10A, the center server 30 is able to identify the regular userbut is not able to identify the vehicle 10A with only the service loginID. For this reason, the service link information includes not only aservice login ID but also information for indirectly identifying thevehicle 10A (for example, information obtained by encrypting vehicleunique information in a predetermined manner, or the like).

When the registration management unit 326 has completed registrationwith various services, the registration management unit 326 provides anotification of the completion to the mobile terminal 20Aa or the mobileterminal 20Ab, corresponding to a regular user to be registered, via thecommunication processing unit 321. When the registration management unit326 has completed registration with various services, the registrationmanagement unit 326 also provides a service registration completionnotification including service link information to any one of the keysharing management unit 327 and the service management servers 40, whichmanages operations of the registered service.

A notification of completion of registration with various services tothe mobile terminal 20Aa or the mobile terminal 20Ab may be transmittedfrom any one of the service management servers 40, which has received aservice registration completion notification.

When the communication processing unit 321 has received a service usestatus request from the mobile terminal 20Aa, the registrationmanagement unit 326 generates service use status information based onthe user and service registration information DB of the storage unit520, the vehicle use schedule information that is managed by theschedule management unit 325, and the like, and delivers the service usestatus information to the mobile terminal 20Aa via the communicationprocessing unit 321.

The key sharing management unit 327 manages operations of the keysharing service.

For example, the key sharing management unit 327 arranges for anauthentication key to the mobile terminal 20Aa or mobile terminal 20Abcorresponding to a regular user ID that is designated by a key sharingrequest in response to the key sharing request that is received from themobile terminal 20Aa of the owner user by the communication processingunit 321. Specifically, the key sharing management unit 327 compares theowner user ID and password included in the key sharing request with theowner user ID and password saved in the storage unit 320. When the owneruser ID and password included in the key sharing request match the savedowner user ID and password, the key sharing management unit 327determines that the key sharing request is a regular key sharingrequest. The key sharing management unit 327 also makes an inquiry tothe schedule management unit 325, and determines whether there isinconsistency between use period information included in the key sharingrequest and the latest vehicle use schedule information, that is,whether there is a date and time conflict in relation to usage of thevehicle 10A among a plurality of services, a plurality of businessoperators that provide services, and a plurality of regular users. Whenthere is no date and time conflict, the key sharing management unit 327transfers an authentication key arrangement request to theauthentication key issuance unit 323. The authentication key arrangementrequest includes information related to a regular user and the vehicle10A, and permission information, which are identified from informationincluded in the key sharing request. The regular user corresponds to themobile terminal 20Aa or the mobile terminal 20Ab, which is a deliverydestination of an authentication key. The vehicle 10A is to be locked orunlocked or to be started with the authentication key. The permissioninformation includes information about an available period of theintended mobile terminal 20Aa or mobile terminal 20Ab, the number oftimes the intended mobile terminal 20Aa or mobile terminal 20Ab isavailable, unlockable doors of the intended mobile terminal 20Aa ormobile terminal 20Ab, whether the intended mobile terminal 20Aa ormobile terminal 20Ab is allowed to start the vehicle 10A, and the like.Thus, the authentication key issuance unit 323 is able to identify theregular user ID corresponding to the mobile terminal 20Aa or mobileterminal 20Ab, which is a delivery destination of an authentication key,and the vehicle 10A to be locked or unlocked or to be started with anauthentication key, and issue an appropriate authentication key.

The key sharing management unit 327 also checks, for example, attributeinformation (for example, an age, whether the user has a driver'slicense, and the like) of the user of the mobile terminal 20Aa or mobileterminal 20Ab, which is a delivery destination of an authentication keyand which is designated by the key sharing request. The attributeinformation is stored in the storage unit 320. When the user of themobile terminal 20Aa or mobile terminal 20Ab, which is a deliverydestination of an authentication key (the regular user of the vehicle10A), is a user that is determined not to be able to drive the vehicle10A, the key sharing management unit 327 issues an authentication key,with permission not allowing the user to start the vehicle 10A, to themobile terminal 20 of the user. Examples of the user who is not allowedto drive the vehicle 10A include a user who has not reached a minimumdriving age for a driver's license, and a user who has no driver'slicense. Specifically, the key sharing management unit 327 transfers anauthentication key arrangement request to the authentication keyissuance unit 323, and the authentication key arrangement requestincludes permission information that corresponds to the mobile terminal20Aa or mobile terminal 20Ab, corresponding to the user who isdetermined to be not allowed to drive the vehicle 10A, and that includesan instruction to prohibit the vehicle 10A from starting. Thus, sincethe authentication key issuance unit 323 is able to deliver anauthentication key with permission to prohibit the vehicle 10A fromstarting, to the mobile terminal 20Aa or mobile terminal 20Ab of theuser who is not allowed to drive the vehicle 10A, it is possible toimprove the security of the vehicle 10A in the key sharing service.

For example, the key sharing management unit 327 delivers theauthentication key of the vehicle 10A to another one of the mobileterminals 20, designated by the temporary key sharing request, based onthe temporary key sharing request that is received from the mobileterminal 20Aa of the owner user by the communication processing unit321. Specifically, the key sharing management unit 327 identifies an IDof an installed user (hereinafter, referred to as installed user ID)corresponding to another one of the mobile terminals 20, which is adelivery destination, based on an installed user information DB of thekey application, stored in the storage unit 320. The key sharingmanagement unit 327 transfers the authentication key arrangement requestincluding the identified installed user ID and information correspondingto the authentication key designated by the temporary key sharingrequest (for example, an issued ID of the authentication key included inthe temporary key sharing request, or the like) to the authenticationkey issuance unit 323. Thus, the authentication key issuance unit 323 isable to identify another one of the mobile terminals 20, which is adelivery destination, based on the installed user ID, the issued ID ofthe authentication key, and the like, and deliver the authentication keyto the another one of the mobile terminals 20 via the communicationprocessing unit 321.

The functions of the key sharing management unit 327 may be transferredto a server outside the center server 30 (key sharing managementserver), as well as the other services using the vehicle 10A. The keysharing management server may be included in the service managementservers 40.

As described above, the mobile terminal 20Ab owned by the child userincludes the communication processing unit 231, the communicationprocessing unit 232, the authentication key acquisition unit 233, theauthentication requesting unit 234, the lock/unlock requesting unit 235,and the storage unit 230.

In the present embodiment, description will be made on the assumptionthat the function of the authentication key acquisition unit 233 of themobile terminal 20Ab becomes available to the child user as the keyapplication is launched and user authentication based on bidirectionalcommunication with the center server 30 is successful. Description willbe made on the assumption that the user authentication is performed onthe center server 30 based on the child user ID and the password.Description will be made on the assumption that the functions of theauthentication requesting unit 234, lock/unlock requesting unit 235, andthe like, of the mobile terminal 20Ab become available to the child useras the key application is launched.

As described above, the authentication key acquisition unit 233 acquiresan authentication key that is delivered from the center server 30 inresponse to a key sharing request that is transmitted from the mobileterminal 20Aa to the center server 30 via the communication processingunit 232. Thus, the mobile terminal 20Ab is able to lock or unlock thedoors of the vehicle 10A and start the vehicle 10A based on thefunctions of the communication processing unit 231, authenticationrequesting unit 234 and lock/unlock requesting unit 235. That is, withthe key sharing service, the child user who owns the mobile terminal20Ab is allowed to directly use the vehicle 10A, for example, lock orunlock the vehicle 10A or drive the vehicle 10, with the use of themobile terminal 20Ab without handing over a key to or from the owneruser. Similarly, the owner user is allowed to lend the vehicle 10A tothe child user without handing over a key to or from the child user. Forthis reason, it is possible to improve convenience in lending orborrowing the vehicle 10A between the owner user and child user of thevehicle 10A with the key sharing service in the authentication keymanagement system 1.

As described above, the authentication key acquisition unit 233 acquiresan authentication key that is delivered from the center server 30 inresponse to a temporary key sharing request that is transmitted from themobile terminal 20Aa to the center server 30 via the communicationprocessing unit 232. This also applies to the case where anauthentication key is delivered to the mobile terminal 20 other than themobile terminal 20Ab of the child user in response to a temporary keysharing request. Thus, the other mobile terminals 20 including themobile terminal 20Ab are able to lock or unlock the doors of the vehicle10A and start the vehicle 10A based on the functions of thecommunication processing unit 231, authentication requesting unit 234and lock/unlock requesting unit 235. That is, for example, when two ormore persons including another regular user get on the vehicle 10A andgo out, and even when the child user who owns the mobile terminal 20Abhas not acquired an authentication key in advance, the child user is notrequired to borrow the mobile terminal 20Aa or mobile terminal 20Ab towhich the authentication key has been delivered, and is allowed todirectly use the vehicle 10A, for example, lock or unlock the vehicle10A or drive the vehicle 10A, with the use of the mobile terminal 20Ab.Similarly, even when the owner user has not made the mobile terminal20Ab of the child user acquire an authentication key in advance, theowner user does not need to lend the own mobile terminal 20Aa to thechild user. For this reason, it is possible to improve the convenienceof users in the case where two or more persons including a regular userof the vehicle 10A get on the vehicle 10A and use the vehicle 10A withtemporary key sharing in the authentication key management system 1.

Details of Components Related to Trunk Delivery Service

Next, components related to the trunk delivery service in theauthentication key management system 1 will be described with referenceto FIG. 4.

FIG. 4 is a block diagram that mainly shows an example of componentsrelated to the trunk delivery service in the authentication keymanagement system 1. Hereinafter, for FIG. 4, components related to thetrunk delivery service in the authentication key management system 1will be mainly described, and the overlap description of components thatoverlap with the components related to the above-described key sharingservice is omitted as much as possible.

As described above, the processing device 23 of the mobile terminal 20Aaowned by the owner user of the vehicle 10A includes the communicationprocessing unit 232, the user registration requesting unit 236, theservice registration requesting unit 237, and the service use statusrequesting unit 238.

As described above, the user registration requesting unit 236 requestsregistration of the regular user (child user) of the vehicle 10A, whouses various services including the trunk delivery service, to thecenter server 30 in response to a predetermined operation of the owneruser.

As described above, the service registration requesting unit 237requests registration of each registered regular user (the owner user orthe child user) with various services including the trunk deliveryservice to the center server 30 in response to a predetermined operationof the owner user.

For example, the service registration requesting unit 237 transmits aservice registration request for using the trunk delivery service to thecenter server 30. The service registration request includes a servicelogin ID of a website for users who use the service of the deliverymanagement server 50 (hereinafter, referred to as delivery site) and aservice login ID of an EC site as service link information. The servicelogin IDs correspond to the regular user of the vehicle 10A, who is tobe registered.

As described above, the service use status requesting unit 238 requestsinformation related to the use statuses of various services, includingthe trunk delivery service, by the regular users of the vehicle 10A, whohave been registered in association with the owner user ID (service usestatus information), to the center server 30 in response to apredetermined operation of the owner user.

The delivery management server 50 includes a communication device 51 andthe processing device 52.

The communication device 51 is any device that bidirectionally carriesout communication with each of the mobile terminals 20, the centerserver 30, and the EC server 60 through a predetermined communicationnetwork.

The processing device 52 includes, for example, a communicationprocessing unit 521, a service cooperation registration unit 522, adelivery accepting unit 523, and a delivery management unit 524 asfunctional units that are implemented by executing one or more programsstored in the ROM or the auxiliary storage device on the CPU. Theprocessing device 52 also includes a storage unit 520 that isimplemented as a storage area, such as the auxiliary storage device ofthe server computer.

The communication processing unit 521 controls the communication device51, and exchanges various signals, such as control signals andinformation signals, with each of the mobile terminals 20, the centerserver 30, and the EC server 60.

The service cooperation registration unit 522 registers information forcooperation between the center server 30 and the delivery managementserver 50, related to usage of the trunk delivery service by the regularusers of the vehicle 10A, in response to a service registrationcompletion notification that is received from the center server 30 bythe communication processing unit 521.

For example, the service cooperation registration unit 522 adds a flagto a service login ID (service link information) included in a serviceregistration completion notification in a user management DB formanaging users on the delivery site constructed in the storage unit 520.The flag indicates that the user corresponding to the service login IDis a user of the trunk delivery service. At the same time, the servicecooperation registration unit 522 registers the service login IDincluded in the service registration completion notification in the usermanagement DB of the storage unit 520 in association with a servicelogin ID of the website corresponding to the EC server 60 (that is, ECsite). The service login ID of the EC site is included in the serviceregistration completion notification. Thus, when an order including aservice login ID has been received from the EC server 60 by thecommunication processing unit 521, the delivery management server 50 isable to identify the corresponding service login ID of the deliverysite. The delivery management server 50 is able to cause the centerserver 30 to deliver an authentication key to the mobile terminal 20Acof a delivery person, as will be described later, by transmitting anauthentication key arrangement request including the identified servicelogin ID to the center server 30.

The delivery accepting unit 523 receives information related to arequest to deliver a package (delivery request information), includingthe service login ID of the EC site, from the EC server 60 via thecommunication processing unit 521. The service login ID corresponds toan orderer of a product on the EC site. The delivery request informationthat is received from the EC server 60 includes not only basicinformation, such as a name, address and telephone number of an ordererof a delivery address but also information related to a designateddelivery address (delivery address information), information related toa designated delivery date and time (delivery date and timeinformation), and the like.

The delivery management unit 524 manages operations of processes fromreceipt to delivery related to a delivery request received by thedelivery accepting unit 523.

For example, as the delivery management unit 524 receives a notificationthat a package has arrived at a sales office that is in charge of aparking location of the vehicle 10A designated by the delivery addressinformation of a delivery request, the delivery management unit 524determines a date and time of departure for delivery of the package, adelivery person in charge, and the like, in accordance with thedesignated delivery time period.

Subsequently, the delivery management unit 524 makes an inquiry aboutthe location information of the vehicle 10A to the center server 30 viathe communication processing unit 521 before departure of the package(for example, 10 minutes before scheduled departure time). At this time,the inquiry includes a service login ID (that is, service linkinformation) of the regular user of the vehicle 10A on the deliverysite. The regular user of the vehicle 10A is a user of the trunkdelivery service. This also applies to an inquiry about locationinformation (described later). The delivery management unit 524 acquiresthe current location information of the vehicle 10A from the centerserver 30 via the communication processing unit 521, and determineswhether delivery is possible based on matching with the designatedparking location, a relationship with an area in charge, and the like.

Subsequently, when the delivery management unit 524 determines that thepackage is deliverable, the delivery management unit 524 transmits anotification that the package is deliverable to the trunk of the vehicle10A (deliverable notification), to the mobile terminal 20Ac of adelivery person via the communication processing unit 521.

Subsequently, as the communication processing unit 521 receives anauthentication key acquisition request from the mobile terminal 20Acthat has received the deliverable notification, the delivery managementunit 524 determines whether the authentication key acquisition requestis a regular authentication key acquisition request. Specifically, thedelivery management unit 524 may carry out the determination bycomparing information related to a package to be delivered (hereinafter,delivery item information for the sake of convenience) with variouspieces of information related to the package, registered in the storageunit 520. The delivery item information includes, for example, adelivery person, a delivery address (for example, a name or legal nameof a recipient, or the like), the type of the package, a delivery timeperiod, and a delivery place, which may be included in theauthentication key acquisition request. As the delivery management unit524 determines that the authentication key acquisition request is aregular authentication key acquisition request, the delivery managementunit 524 transmits an authentication key arrangement request to thecenter server 30 via the communication processing unit 521. At thistime, the authentication key arrangement request includes informationfor identifying the mobile terminal 20Ac of the delivery person. Theinformation for identifying a delivery person may be, for example, anauthentication ID for a delivery person to get user authentication inthe center server 30 in order to use the functions of the keyapplication, corresponding to the authentication key acquisition unit233, and the like, of the mobile terminal 20Ac (hereinafter, referred toas delivery person ID for the sake of convenience). Thus, the mobileterminal 20Ac of the delivery person is able to acquire anauthentication key from the center server 30.

Subsequently, as the delivery management unit 524 receives an inquiryabout the current location information of the vehicle 10A from themobile terminal 20Ac of the delivery person who has left for deliveryfrom a sales office via the communication processing unit 521, thedelivery management unit 524 makes an inquiry about the current locationinformation of the vehicle 10A to the center server 30. The deliverymanagement unit 524 acquires the current location information of thevehicle 10A from the center server 30 via the communication processingunit 521, and transmits (forwards) the current location information ofthe vehicle 10A to the mobile terminal 20Ac of the delivery person.Thus, the on-the-road delivery person is allowed to compare the currentlocation information of the vehicle 10A with the information related tothe parking location of the vehicle 10A, designated by the deliveryaddress information, and determine whether to deliver the package orbring back the package.

Lastly, as the delivery management unit 524 receives a delivery endnotification that is received from the mobile terminal 20Ac of thedelivery person who has finished delivery of the package via thecommunication processing unit 521, the delivery management unit 524basically ends management of operations related to the trunk deliveryservice for the package. At this time, the delivery management unit 524may provide a notification of end of delivery to the regular user of thevehicle 10A, who is a client (a purchaser of a product on the EC site)through an electric mail or a predetermined application that runs incooperation with the delivery site and that is installed onto the mobileterminal 20Aa or the mobile terminal 20Ab.

As described above, when a door (trunk lid, or the like) for accessingthe trunk of the vehicle 10A is unlocked and then locked, the DCM 14 ofthe vehicle 10A may determine that the delivery person has finisheddelivery, and may provide a notification of end of delivery to thecenter server 30. Thus, when the center server 30 has received thenotification, the center server 30 is allowed to transmit a delivery endnotification to the delivery management server 50. That is, the deliveryend notification may be transmitted from the center server 30 to thedelivery management server 50.

The EC server 60 includes a communication device 61 and the processingdevice 62.

The communication device 61 is any device that bidirectionally carriesout communication with each of the mobile terminals 20, the centerserver 30, and the delivery management server 50 through a predeterminedcommunication network.

The processing device 52 includes, for example, a communicationprocessing unit 621, a web resource transmission unit 622, a servicecooperation registration unit 623, and an order receipt processing unit624 as functional units that are implemented by executing one or moreprograms stored in the ROM or the auxiliary storage device on the CPU.The processing device 62 also includes the storage unit 620 that isimplemented as a storage area, such as the auxiliary storage device ofthe server computer.

The communication processing unit 621 controls the communication device61, and exchanges various signals, such as control signals andinformation signals, with each of the mobile terminals 20, the centerserver 30, and the delivery management server 50.

The web resource transmission unit 622 transmits resources to a browserof any one of terminals in a predetermined manner based on variouspieces of information. The resources correspond to webpages to bedisplayed on a browser of the any one of the terminals of users whobrowse the EC site. The various pieces of information are resources ofthe EC site, and are saved in the storage unit 620. The terminals of theusers include the mobile terminals 20Aa, 20Ab. The webpages that may bedisplayed on the EC site include a top page of the EC site, webpagescorresponding to individual items that are carried on the EC site, anorder input page that a user inputs various pieces of information at thetime of ordering individual items, and the like. For example, the webresource transmission unit 622 transmits hypertext markup language(HTML) documents corresponding to the webpages and information under theHTML documents, such as images and moving images, to be displayed on thewebpages, in parallel with each other.

The service cooperation registration unit 623 registers information forcooperation between the center server 30 and the EC server 60, relatedto usage of the trunk delivery service by the regular users of thevehicle 10A, in response to a service registration completionnotification that is received from the center server 30 by thecommunication processing unit 621. For example, the service cooperationregistration unit 623 adds a flag to a service login ID included in theservice registration completion notification in the user management DBfor managing users on the EC site constructed in the storage unit 620.The flag indicates that the user corresponding to the service login IDis a user of the trunk delivery service. At the same time, the servicecooperation registration unit 623 registers the service login IDincluded in the service registration completion notification in the usermanagement DB in association with a service login ID of the web site(that is, delivery site) corresponding to the delivery management server50. The service login ID of the delivery site is included in the serviceregistration completion notification. Thus, for example, when thecommunication processing unit 621 has received an inquiry, or the like,about an ordered item, including the service login ID of the deliverysite, from the delivery management server 50, the EC server 60 is ableto identify the corresponding service login ID of the EC site.

The order receipt processing unit 624 receives an order of a productfrom a user based on various input operations corresponding to the orderof the product from the user on the EC site. At this time, when thetrunk of the vehicle 10A has been selected as a delivery address on anorder input page on the EC site, the order receipt processing unit 624makes an inquiry about vehicle use schedule information to the centerserver 30 via the communication processing unit 621. Thus, the orderreceipt processing unit 624 is able to acquire the latest vehicle useschedule information via the communication processing unit 621, so, forexample, when a designated delivery date and time already conflicts withanother schedule, the order receipt processing unit 624 is able to takeaction, such as requesting a change of a delivery date and time. Thatis, the schedule management unit 325 of the center server 30 is able toprevent a user from selecting dates and times at which a first businessoperator is scheduled to use a service (for example, the trunk deliveryservice) at the time of allowing the user to select a delivery date andtime of the trunk delivery service by the second business operator onthe EC site by sequentially updating the latest vehicle use scheduleinformation. At this time, the content of a link of a web applicationprogrammable interface (API) corresponding to vehicle use scheduleinformation may be displayed on the EC site. Thus, a user is allowed todesignate a time period without a conflict with another service based onvehicle use schedule information as a delivery date and time, and, sincevehicle use schedule information is displayed on the EC site via theWebAPI, the vehicle use schedule information is not transmitted to theEC site, so it is desirable from the viewpoint of protection of privacyof a regular user of the vehicle 10A.

As described above, a trunk delivery service intended for items otherthan products ordered on the EC site is also conceivable. In this case,similarly, the delivery management server 50 just needs to acquire thelatest vehicle use schedule information from the center server 30. Thus,when a delivery date and time of a package to the trunk of the vehicle10A designated by a regular user of the vehicle 10A conflicts withanother schedule, the delivery management server 50 is able to takeaction, such as requesting a change of the delivery date and time.

As described above, the processing device 32 of the center server 30includes the communication processing unit 321, the conditiondetermination unit 322, the authentication key issuance unit 323, thelocation information management unit 324, the schedule management unit325, the registration management unit 326, an authentication key usecoordination unit 328, and the storage unit 320.

When the condition determination unit 322 has received an authenticationkey arrangement request from the delivery management server 50 via thecommunication processing unit 321, the condition determination unit 322determines whether the authentication key arrangement request is aregular authentication key arrangement request. For example, thecondition determination unit 322 determines whether the authenticationkey arrangement request is a regular authentication key arrangementrequest based on the service login ID of the delivery site, included inthe authentication key arrangement request, and predeterminedauthentication information (for example, an ID and a password, or thelike) corresponding to the delivery management server 50.

When the condition determination unit 322 determines that theauthentication key arrangement request is a regular authentication keyarrangement request, the authentication key issuance unit 323 identifiesthe vehicle 10A corresponding to the authentication key arrangementrequest based on the user and service registration information DB of thestorage unit 320. The authentication key issuance unit 323 issues anauthentication key with limited permission that limits the number oftimes the authentication key is available (for example, the number oftimes the authentication key is available is one) and that only allowsthe trunk lid to be locked or unlocked for a limited time (for example,usable within only a time length of several minutes to several tens ofminutes from delivery of the authentication key). Thus, it is possibleto prevent a delivery person from using the vehicle 10A withoutpermission and improve security. The authentication key issuance unit323 delivers an authentication key to the mobile terminal 20Ac of adelivery person via the communication processing unit 321. The deliveryperson is identified by the authentication key arrangement request.

For example, any method, such as a known mathematical method and amethod using bidirectional communication between the center server 30and the vehicle 10, may be employed as a method of limiting theavailable period of an authentication key, the number of times anauthentication key is available, or the like.

The location information management unit 324 transmits a locationinformation request to the vehicle 10A via the communication processingunit 321 in response to an inquiry about the current location of thevehicle 10A from the delivery management server 50. The inquiry isreceived by the communication processing unit 321. Thus, the DCM 14 ofthe vehicle 10A returns the location information of the vehicle 10A,which is input from the GPS module 13, to the center server 30 inresponse to the location information request from the center server 30.The location information management unit 324 is able to acquire thecurrent location information of the vehicle 10A via the communicationprocessing unit 321. The location information management unit 324returns the current location information acquired from the vehicle 10Ato the delivery management server 50 via the communication processingunit 321.

The schedule management unit 325 returns the latest vehicle use scheduleinformation saved in the storage unit 320 to the EC server 60 via thecommunication processing unit 321 in response to an inquiry from the ECserver 60. The inquiry is received by the communication processing unit321.

As described above, the registration management unit 326 registers aregular user (child user) who uses various services including the trunkdelivery service in response to a user registration request that isreceived from the mobile terminal 20Aa of the owner user by thecommunication processing unit 321. As described above, the registrationmanagement unit 326 also registers the regular user of the vehicle 10Awith the trunk delivery service in response to a service registrationrequest that is received from the mobile terminal 20Aa of the owner userby the communication processing unit 321. As described above, when theregistration management unit 326 has completed registration with variousservices including the trunk delivery service, the registrationmanagement unit 326 also provides a notification of completion ofregistration to the mobile terminal 20Aa or the mobile terminal 20Ab,corresponding to the regular user to be registered, via thecommunication processing unit 321. When the registration management unit326 has completed registration with the trunk delivery service, theregistration management unit 326 transmits a service registrationcompletion notification including service link information to thedelivery management server 50 and the EC server 60 that manageoperations of the service intended for registration via thecommunication processing unit 321. The authentication key usecoordination unit 328 (an example of a coordination unit) makescoordination for preventing simultaneous use of an authentication keythat can be delivered to mobile terminals 20 (mobile terminals 20Ac,20Ad) over a plurality of service providers. For example, when aplurality of delivery service providers each provides a trunk deliveryservice, it is presumable that the delivery service providers go todeliver packages in a close time period. For example, it is alsopresumable that a renter who has a reservation to rent the vehicle 10Athrough the C2C car sharing service just after a time period duringwhich a delivery service provider that provides a trunk delivery servicedelivers a package. In such cases, when the mobile terminal 20corresponding to the first business operator uses an authentication key,the authentication key use coordination unit 328 makes coordination suchthat the mobile terminal 20 corresponding to the second businessoperator does not use the authentication key. Details will be describedlater (see FIG. 7 to FIG. 10).

As described above, the processing device 23 of the mobile terminal 20Acof a delivery person includes the communication processing unit 231, thecommunication processing unit 232, the authentication key acquisitionunit 233, the authentication requesting unit 234, and the lock/unlockrequesting unit 235.

In the present embodiment, description will be made on the assumptionthat the functions of the authentication key acquisition unit 233,authentication requesting unit 234, and lock/unlock requesting unit 235of the mobile terminal 20Ac become available to the delivery person whenthe key application is launched.

The authentication key acquisition unit 233 transmits an authenticationkey acquisition request to the delivery management server 50 via thecommunication processing unit 232 in response to a predeterminedoperation of the delivery person. At this time, the authentication keyacquisition request includes the above-described delivery iteminformation saved in the storage unit 230 in advance. Thus, the deliverymanagement server 50 transmits an authentication key arrangement requestto the center server 30 in response to the authentication keyacquisition request, and the center server 30 delivers an authenticationkey to the mobile terminal 20Ac in response to the authentication keyarrangement request, with the result that the mobile terminal 20Acacquires the authentication key. Thus, since the mobile terminal 20Ac isable to lock or unlock the trunk lid of the vehicle 10A based on thefunctions of the communication processing unit 231, authenticationrequesting unit 234 and lock/unlock requesting unit 235, the deliveryperson is allowed to deliver a requested package to the trunk of thevehicle 10A, lock the trunk of the vehicle 10A as it was, and leave.

As will be described later, delivery persons of delivery serviceproviders can deliver a package to the trunk of the vehicle 10A in aclose time period. For this reason, to smoothly determine the order, andthe like, of delivery, for example, the key application of the mobileterminal 20Ac may have a function of allowing delivery persons ofdelivery service providers that have relatively close time periods ofdelivery to the trunk of the same vehicle 10A to make contact with eachother. At this time, when the center server 30 relays information ofboth in synchronization with the key applications of the deliverypersons of the delivery service providers, specifically, the deliverypersons of the delivery service providers are allowed to exchangeinformation with each other, so it is possible to improve theconvenience of delivery persons.

Details of Components Related to C2C Car Sharing Service

Next, components related to the C2C car sharing service in theauthentication key management system 1 will be described with referenceto FIG. 5.

FIG. 5 is a block diagram that mainly shows an example of componentsrelated to the C2C car sharing service in the authentication keymanagement system 1. Hereinafter, for FIG. 5, components related to theC2C car sharing service in the authentication key management system 1will be mainly described, and the overlap description of components thatoverlap with the components related to the above-described key sharingservice, and the like, is omitted as much as possible.

As described above, the processing device 23 of the mobile terminal 20Aaowned by the owner user of the vehicle 10A includes the communicationprocessing unit 232, the user registration requesting unit 236, theservice registration requesting unit 237, and the service use statusrequesting unit 238.

As described above, the user registration requesting unit 236 requestsregistration of the regular user (child user) of the vehicle 10A, whouses various services including the C2C car sharing service, to thecenter server 30 in response to a predetermined operation of the owneruser.

As described above, the service registration requesting unit 237requests registration of each registered regular user (the owner user orthe child user) with various services including the C2C car sharingservice to the center server 30 in response to a predetermined operationof the owner user.

For example, the service registration requesting unit 237 transmits aservice registration request for using the C2C car sharing service tothe center server 30. The service registration request includes aservice login ID of a website for users who use the C2C car sharingservice corresponding to the C2C car sharing management server 70(hereinafter, referred to as C2C car sharing site) as service linkinformation. The service login ID corresponds to the regular user of thevehicle 10A, who is to be registered.

As described above, the service use status requesting unit 238 requestsinformation related to the use statuses of various services, includingthe C2C car sharing service, by the regular user of the vehicle 10A tothe center server 30 in response to a predetermined operation of theowner user. The regular user of the vehicle 10A has been registered inassociation with the owner user ID (service use status information).

The C2C car sharing management server 70 includes a communication device71 and the processing device 72.

The communication device 71 is any device that bidirectionally carriesout communication with each of the mobile terminals 20 and the centerserver 30 through a predetermined communication network.

The processing device 72 includes, for example, a communicationprocessing unit 721, a service cooperation registration unit 722, areservation management unit 723, and a vehicle management unit 724 asfunctional units that are implemented by executing one or more programsstored in the ROM or the auxiliary storage device on the CPU. Theprocessing device 72 also includes the storage unit 720 that isimplemented as a storage area, such as the auxiliary storage device ofthe server computer.

Description will be made on the assumption that information thatidentifies the vehicle 10A for rent has been already registered (saved)in the storage unit 720 through the C2C car sharing site by the regularuser (owner user) of the vehicle 10A in association with a service loginID.

The communication processing unit 721 controls the communication device71, and exchanges various signals, such as control signals andinformation signals, with each of the mobile terminals 20 and the centerserver 30.

The service cooperation registration unit 722 registers information forcooperation between the center server 30 and the C2C car sharingmanagement server 70, related to usage of the C2C car sharing service bythe regular user of the vehicle 10A, in response to a serviceregistration completion notification that is received from the centerserver 30 by the communication processing unit 721.

For example, the service cooperation registration unit 722 adds a flagto a service login ID included in a service registration completionnotification in the user management DB for managing users on the C2C carsharing site constructed in the storage unit 720. The flag indicatesthat the user corresponding to the service login ID is a letter of thevehicle 10A in the C2C car sharing service. Thus, the C2C car sharingmanagement server 70 is able to cause the center server 30 to deliver anauthentication key to the mobile terminal 20Ad of a renter, as will bedescribed later, by transmitting an authentication key arrangementrequest including a service login ID corresponding to the regular userof the vehicle 10A, who is a letter, to the center server 30.

The reservation management unit 723 manages reservations for the use ofthe vehicle 10A. The reservations are made through the C2C car sharingsite, or the like.

For example, the reservation management unit 723 receives registrationof a rentable date and time of the vehicle 10A from the regular user ofthe vehicle 10A through the C2C car sharing site, or the like, andregisters (saves) the received rentable date and time in the storageunit 720. At this time, the reservation management unit 723 makes aninquiry about vehicle use schedule information to the center server 30via the communication processing unit 721. Thus, the reservationmanagement unit 723 is able to acquire the latest vehicle use scheduleinformation via the communication processing unit 721. For this reason,for example, when the rentable date and time received from the regularuser of the vehicle 10A already conflicts with another schedule, the C2Ccar sharing management server 70 is able to take action, such asrequesting a change of the rentable date and time and registering arentable date and time except the conflicting time excluded from thereceived rentable date and time.

For example, the reservation management unit 723 also receives areservation for the use of the vehicle 10A within the rentable date andtime of the vehicle 10A. The rentable date and time of the vehicle 10Ais saved in the storage unit 720. As the reservation management unit 723receives a reservation for the use of the vehicle 10A from a user who isa renter through the C2C car sharing site, the reservation managementunit 723 updates information pertaining to a rental schedule of thevehicle 10A (rental schedule information). The rental scheduleinformation is saved in the storage unit 720.

For example, when the communication processing unit 721 has received anauthentication key acquisition request from the mobile terminal 20Ad ofthe renter of the vehicle 10A, the reservation management unit 723determines whether the authentication key acquisition request is aregular authentication key acquisition request. Specifically, thereservation management unit 723 may carry out the determination based onthe service login ID and password of the C2C car sharing site, includedin the authentication key acquisition request, and a relation with areservation date and time (for example, whether the date and time ofreceipt of the authentication key acquisition request falls within thereservation date and time, whether a period of time from the date andtime of receipt of the authentication key acquisition request to a startdate and time is shorter than a predetermined time, or the like). Whenthe authentication key acquisition request is a regular authenticationkey acquisition request, the reservation management unit 723 transmitsan authentication key arrangement request to the center server 30 viathe communication processing unit 721. At this time, the authenticationkey arrangement request includes information for identifying the mobileterminal 20Ad of the renter of the vehicle 10A. The information foridentifying the renter of the vehicle 10A may be, for example, anauthentication ID to get user authentication (hereinafter, referred toas renter ID for the sake of convenience) in the center server 30 inorder for the renter of the vehicle 10A to use the function of theauthentication key acquisition unit 233 of the mobile terminal 20Ad.Thus, the mobile terminal 20Ad of the renter of the vehicle 10A is ableto acquire an authentication key from the center server 30.

The vehicle management unit 724 manages the vehicle 10A for rent.

For example, the vehicle management unit 724 makes an inquiry about thecurrent location information of the vehicle 10A to the center server 30via the communication processing unit 721 before a reservation date andtime of the vehicle 10A (for example, a period from several tens ofminutes before to just before). The vehicle management unit 724 acquiresthe current location information of the vehicle 10A via thecommunication processing unit 721. The current location information isreturned from the center server 30 in response to the inquiry. Thus,before a scheduled rental date and time (reservation date and time) ofthe vehicle 10A, it is possible to determine, for example, whether thevehicle 10A has returned to a designated place. For this reason, whenthe vehicle 10A has not returned to a designated place, the C2C carsharing management server 70 is able to take action, such as issuing analarm to the regular user who is the letter of the vehicle 10A to returnto the designated place through an electric mail or a predeterminedapplication that cooperates with the C2C car sharing site and that isinstalled onto the mobile terminal 20Aa or the mobile terminal 20Ab.

As described above, the processing device 32 of the center server 30includes the communication processing unit 321, the conditiondetermination unit 322, the authentication key issuance unit 323, thelocation information management unit 324, the schedule management unit325, the registration management unit 326, the authentication key usecoordination unit 328, and the storage unit 320.

When the communication processing unit 321 has received anauthentication key arrangement request from the C2C car sharingmanagement server 70, the condition determination unit 322 determineswhether the authentication key arrangement request is a regularauthentication key arrangement request. For example, the conditiondetermination unit 322 determines whether the authentication keyarrangement request is a regular authentication key arrangement requestbased on service link information (a service login ID of the C2C carsharing site, or the like) included in the authentication keyarrangement request or predetermined authentication information (forexample, an ID and a password, or the like) corresponding to the C2C carsharing management server 70.

When the condition determination unit 322 determines that theauthentication key arrangement request is a regular authentication keyarrangement request, the authentication key issuance unit 323 identifiesthe vehicle 10A corresponding to the authentication key arrangementrequest based on the user and service registration information DB of thestorage unit 320. The authentication key issuance unit 323 issues anauthentication key for a limited time (for example, an authenticationkey available only within a reservation date and time of the vehicle10A, included in the authentication key arrangement request, and bufferperiods before and after the reservation date and time). Theauthentication key issuance unit 323 delivers the authentication key tothe mobile terminal 20Ad of the renter of the vehicle 10A via thecommunication processing unit 321. The renter is identified by theauthentication key arrangement request.

The C2C car sharing service may include, for example, a service forrenting only the trunk of the vehicle 10A (C2C trunk sharing service).In the case of a vehicle trunk rental service, the authentication keyissuance unit 323 just needs to issue an authentication key with limitedpermission that only allows the trunk lid to be locked or unlocked.Thus, it is possible to limit an object for rent in C2C car sharing tothe trunk only. Thus, for example, a trunk delivery service for allowinga person to rent the trunk of the vehicle 10A for rent during a trip andget delivery of purchased products for use during the trip to the rentedtrunk may be realized.

The location information management unit 324 transmits a locationinformation request to the vehicle 10A via the communication processingunit 321 in response to an inquiry about the current location of thevehicle 10A. The inquiry is received from the C2C car sharing managementserver 70 by the communication processing unit 321. Thus, the locationinformation management unit 324 is able to acquire the current locationinformation from the vehicle 10A via the communication processing unit321. The location information management unit 324 returns the currentlocation information acquired from the vehicle 10A to the C2C carsharing management server 70 via the communication processing unit 321.

The schedule management unit 325 transmits the latest vehicle useschedule information to the vehicle 10A via the communication processingunit 321 in response to the inquiry about the current location of thevehicle 10A. The inquiry is received from the C2C car sharing managementserver 70 by the communication processing unit 321.

As described above, the registration management unit 326 registers aregular user (child user) who uses various services including the C2Ccar sharing service in response to a user registration request that isreceived from the mobile terminal 20Aa of the owner user by thecommunication processing unit 321. As described above, the registrationmanagement unit 326 also registers the regular user of the vehicle 10Awith the C2C car sharing service in response to a service registrationrequest that is received from the mobile terminal 20Aa of the owner userby the communication processing unit 321. As described above, when theregistration management unit 326 has completed registration with variousservices including the C2C car sharing service, the registrationmanagement unit 326 also provides a notification of completion ofregistration to the mobile terminal 20Aa or the mobile terminal 20Ab,corresponding to the regular user to be registered, via thecommunication processing unit 321. When the registration management unit326 has completed registration with the C2C car sharing service, theregistration management unit 326 transmits a service registrationcompletion notification including service link information to the C2Ccar sharing management server 70 that manages operations of the serviceintended for registration.

As described above, the processing device 23 of the mobile terminal 20Adof the renter of the vehicle 10A includes the communication processingunit 231, the communication processing unit 232, the authentication keyacquisition unit 233, the authentication requesting unit 234, thelock/unlock requesting unit 235, and the storage unit 230.

The authentication key acquisition unit 233 transmits an authenticationkey acquisition request to the C2C car sharing management server 70 viathe communication processing unit 232 in response to a predeterminedoperation of the renter of the vehicle 10A. At this time, theauthentication key acquisition request includes a service login ID ofthe C2C car sharing site. The service login ID corresponds to the renterof the vehicle 10A. Thus, the C2C car sharing management server 70transmits an authentication key arrangement request to the center server30 in response to the authentication key acquisition request, and thecenter server 30 delivers an authentication key to the mobile terminal20Ad in response to the authentication key arrangement request, with theresult that the mobile terminal 20Ad acquires the authentication key.Thus, the mobile terminal 20Ad is able to lock or unlock the doors ofthe vehicle 10A based on the functions of the communication processingunit 231, authentication requesting unit 234 and lock/unlock requestingunit 235. That is, with the C2C car sharing service, the renter of thevehicle 10A, who owns the mobile terminal 20Ad, is allowed to directlyuse the vehicle 10A, for example, lock or unlock the vehicle 10A ordrive the vehicle 10A, with the use of the mobile terminal 20Ad withouthanding over a key to or from the regular users of the vehicle 10A.Similarly, each regular user of the vehicle 10A is allowed to rent thevehicle 10A to a person other than the regular users without handingover a key. For this reason, it is possible to improve convenience inrenting the vehicle 10A between each regular user of the vehicle 10A anda person other than the regular users with the C2C car sharing servicein the authentication key management system 1.

Details of Components Related to B2C Car Sharing Service

Next, components related to the B2C car sharing service in theauthentication key management system 1 will be described with referenceto FIG. 6.

FIG. 6 is a block diagram that mainly shows an example of componentsrelated to the B2C car sharing service in the authentication keymanagement system 1. Hereinafter, for FIG. 6, components related to theB2C car sharing service in the authentication key management system 1will be mainly described, and the overlap description of components thatoverlap with the components related to the above-described key sharingservice, and the like, is omitted as much as possible.

The B2C car sharing management server 80 includes a communication device81 and the processing device 82.

The communication device 81 is any device that bidirectionally carriesout communication with each of the mobile terminal 20B and the centerserver 30 through a predetermined communication network.

The processing device 82 includes, for example, a communicationprocessing unit 821, a reservation management unit 822, and a vehiclemanagement unit 823 as functional units that are implemented byexecuting one or more programs stored in the ROM or the auxiliarystorage device on the CPU. The processing device 82 also includes thestorage unit 820 that is implemented as a storage area, such as theauxiliary storage device of the server computer.

The communication processing unit 821 controls the communication device81, and exchanges various signals, such as control signals andinformation signals, with each of the mobile terminal 20B and the centerserver 30.

The reservation management unit 822 manages reservations for the use ofthe vehicle 10B. The reservations are made through the B2C car sharingsite, or the like.

For example, the reservation management unit 822 receives a reservationfor the use of the vehicle 10B from a user who wants to rent the vehicle10B (hereinafter, referred to as rent user) through a web site that isoperated by a business operator of the B2C car sharing management server80, or the like (hereinafter, referred to as B2C car sharing site forthe sake of convenience). The reservation management unit 822 savesinformation about the received reservation for the use of the vehicle10A (use reservation information) in the storage unit 820. At this time,the use reservation information includes, for example, information thatidentifies the intended vehicle 10A, information related to a usereservation date and time (a start date and time and an end date andtime), a service login ID of the rent user on the B2C car sharing site,and the like.

For example, each time the reservation management unit 822 receives areservation for the use of the vehicle 10B, the reservation managementunit 822 updates information related to a use schedule of the vehicle10B (vehicle use schedule information), saved in the storage unit 820.Thus, the B2C car sharing management server 80 is able to show availabledates and times for reservation to the rent user by causing the B2C carsharing site to display the use schedule of the vehicle 10B.

For example, when the communication processing unit 821 has received anauthentication key acquisition request from the mobile terminal 20B, thereservation management unit 822 determines whether the authenticationkey acquisition request is a regular authentication key acquisitionrequest. Specifically, the reservation management unit 822 may carry outthe determination based on the service login ID and password of the B2Ccar sharing site and a relation with a reservation date and time (forexample, whether the date and time of receipt of the authentication keyacquisition request falls within the reservation date and time, whethera period of time from the date and time of receipt of the authenticationkey acquisition request to a start date and time is shorter than apredetermined time, or the like). The service login ID and password ofthe B2C car sharing site corresponds to the rent user, and is includedin the authentication key acquisition request. When the authenticationkey acquisition request is a regular authentication key acquisitionrequest, the reservation management unit 822 transmits an authenticationkey arrangement request to the center server 30 via the communicationprocessing unit 821. At this time, the authentication key arrangementrequest includes information for identifying the mobile terminal 20B ofthe rent user who rents the vehicle 10B. The information for identifyingthe rent user who rents the vehicle 10B may be, for example, anauthentication ID to get user authentication (hereinafter, referred toas rent user ID for the sake of convenience) in the center server 30 inorder for the rent user who rents the vehicle 10B to use the functionsof the key application, corresponding to the authentication keyacquisition unit 233, and the like, of the mobile terminal 20B. Thus,the mobile terminal 20B of the rent user who rents the vehicle 10B isable to acquire an authentication key from the center server 30.

The vehicle management unit 823 manages the vehicle 10B for rent.

For example, the vehicle management unit 823 makes an inquiry about thevehicle 10B parked around (for example, within several hundreds ofmeters, or the like, from) a place designated in a reservation to thecenter server 30 via the communication processing unit 821 before areservation date and time of the vehicle 10B for a rent user (forexample, several tens of minutes before). The vehicle management unit823 acquires the location information of the vehicle 10B parked aroundthe designated place via the communication processing unit 821. Thelocation information is returned from the center server 30 in responseto the inquiry. Thus, before the date and time at which the renterstarts using the vehicle 10B, the vehicle management unit 823 is able toidentify one or plurality of vehicles 10B parked around the designatedplace, and determine, for example, which vehicle 10B to rent.

For example, the vehicle management unit 823 makes an inquiry about thelocation information of the vehicle 10B in a designated area to thecenter server 30 via the communication processing unit 821 in responseto a request to search for a vehicle 10B in the designated area from therent user on the B2C car sharing site. The vehicle management unit 823acquires the location information of the vehicle 10B in the designatedarea via the communication processing unit 821. The location informationis returned from the center server 30 in response to the inquiry. Thus,the vehicle management unit 823 is, for example, able to show thelocation information of the intended vehicle 10B to the rent user whowants to immediately rent the vehicle 10B in the designated area on theB2C car sharing site.

As described above, the processing device 32 of the center server 30includes the communication processing unit 321, the conditiondetermination unit 322, the authentication key issuance unit 323, andthe storage unit 320.

When the communication processing unit 321 has received anauthentication key arrangement request from the B2C car sharingmanagement server 80, the condition determination unit 322 determineswhether the authentication key arrangement request is a regularauthentication key arrangement request. For example, the conditiondetermination unit 322 determines whether the authentication keyarrangement request is a regular authentication key arrangement requestbased on whether the rent user ID included in the authentication keyarrangement request is the authentication ID registered in the storageunit 320 or predetermined authentication information (for example, an IDand a password, or the like) corresponding to the B2C car sharingmanagement server 80.

When the condition determination unit 322 determines that theauthentication key arrangement request is a regular authentication keyarrangement request, the authentication key issuance unit 323 issues anauthentication key for a limited time (for example, an authenticationkey available only within a reservation date and time of the vehicle10B, included in the authentication key arrangement request, and bufferperiods before and after the reservation date and time). Theauthentication key issuance unit 323 delivers the authentication key tothe mobile terminal 20B of the rent user who rents the vehicle 10B viathe communication processing unit 321. The rent user is identified bythe authentication key arrangement request.

As described above, the processing device 23 of the mobile terminal 20Bof the rent user who rents the vehicle 10B includes the communicationprocessing unit 231, the communication processing unit 232, theauthentication key acquisition unit 233, the authentication requestingunit 234, the lock/unlock requesting unit 235, and the storage unit 230.

The authentication key acquisition unit 233 transmits an authenticationkey acquisition request to the B2C car sharing management server 80 viathe communication processing unit 232 in response to a predeterminedoperation of the rent user who rents the vehicle 10B. At this time, theauthentication key acquisition request includes a service login ID ofthe B2C car sharing site, or the like. The service login ID correspondsto the rent user who rents the vehicle 10B. Thus, the B2C car sharingmanagement server 80 transmits an authentication key arrangement requestto the center server 30 in response to the authentication keyacquisition request, and the center server 30 delivers an authenticationkey to the mobile terminal 20B in response to the authentication keyarrangement request, with the result that the mobile terminal 20Bacquires the authentication key. Thus, the mobile terminal 20B is ableto lock or unlock the doors of the vehicle 10B based on the functions ofthe communication processing unit 231, authentication requesting unit234 and lock/unlock requesting unit 235. That is, with the B2C carsharing service, the rent user who rents the vehicle 10B and owns themobile terminal 20B is allowed to directly use the vehicle 10B, forexample, lock or unlock the vehicle 10B or drive the vehicle 10B, withthe use of the mobile terminal 20B without handing over a key to or fromthe business operator, or the like, of the vehicle 10B. For this reason,it is possible to improve convenience of the rent user who rents thevehicle 10B with the B2C car sharing service in the authentication keymanagement system 1.

Characteristic Operations of Center Server

Next, the characteristic operations of the center server 30, that is,the process flow of the authentication key use coordination unit 328,will be described with reference to FIG. 7 to FIG. 10.

FIG. 7 is a flowchart that schematically shows an example of acoordination process that is executed by the authentication key usecoordination unit 328. A process according to this flowchart isrepeatedly executed at predetermined processing intervals. Hereinafter,this also applies to the flowcharts of FIG. 8 to FIG. 10.

In step S702, the authentication key use coordination unit 328determines whether the communication processing unit 321 has received anauthentication key arrangement request from the service managementservers 40 (such as the delivery management server 50 and the C2C carsharing management server 70), that various service providers operate.

In step S704, the authentication key use coordination unit 328determines whether an authentication key associated with a service thatis provided by a first business operator different from a businessoperator corresponding to the authentication key arrangement request hasbeen delivered to the mobile terminal 20 of a person (third party)different from the regular users of the vehicle 10A. When anauthentication key has been delivered to the mobile terminal 20associated with a service that is provided by the first businessoperator (for example, the mobile terminal 20Ac of a delivery person ofa delivery service provider), the authentication key use coordinationunit 328 proceeds to step S706; otherwise, the authentication key usecoordination unit 328 proceeds to step S708.

In step S706, the authentication key use coordination unit 328 sets anavailable period that does not conflict with an available period that isassigned to the authentication key associated with a service that isprovided by the first business operator and delivered to the mobileterminal 20 of the third party.

On the other hand, in step S708, the authentication key use coordinationunit 328 sets an available period that is designated by theauthentication key arrangement request, or the like.

In step S710, the authentication key issuance unit 323 issues anauthentication key with permission of the available period set in stepS706 or step S708.

In step S712, the authentication key issuance unit 323 delivers theissued authentication key to the intended mobile terminal 20, and endsthe current process.

Thus, since the available period of the authentication key that isdelivered to the mobile terminal 20 corresponding to the first businessoperator and the available period of the authentication key that isdelivered to the mobile terminal 20 corresponding to the second businessoperator do not conflict with each other, it is possible to preventsimultaneous use of the authentication key.

Subsequently, FIG. 8 is a flowchart that schematically shows anotherexample of the coordination process that is executed by theauthentication key use coordination unit 328. Hereinafter, in thisexample, description will be made on the assumption that, when the trunkhas been unlocked or locked by using an authentication key with the useof the mobile terminal Ac of a delivery person, the DCM 14 of thevehicle 10A transmits that fact (a trunk unlock notification or a trunklock notification) to the center server 30.

In step S802, the authentication key use coordination unit 328determines whether the communication processing unit 321 has receivedthe trunk unlock notification from the vehicle 10A. When thecommunication processing unit 321 has received the trunk unlocknotification from the vehicle 10A, the authentication key usecoordination unit 328 proceeds to step S804; otherwise, theauthentication key use coordination unit 328 ends the current process.

In step S804, the authentication key use coordination unit 328invalidates the authentication key that has been delivered to the mobileterminal 20 associated with a service of a second business operator. Forexample, the authentication key use coordination unit 328 transmits aninvalidation notification to the vehicle 10A through the communicationprocessing unit 321. The invalidation notification designates theauthentication key to be invalidated. Thus, even when an authenticationrequest, or the like, including an authentication key to be invalidatedhas been received, the key unit 12 of the vehicle 10A is able to stopunlocking, or the like, of the doors of the vehicle 10A.

In step S806, the authentication key use coordination unit 328determines whether the communication processing unit 321 has receivedthe trunk lock notification from the vehicle 10A. When the communicationprocessing unit 321 has received the trunk lock notification from thevehicle 10A, the authentication key use coordination unit 328 determinesthat delivery work of a package to the trunk has been finished, andproceeds to step S808; otherwise, the authentication key usecoordination unit 328 repeats the process of step S806.

In step S808, the authentication key use coordination unit 328 validatesthe authentication key that has been delivered to the mobile terminal 20associated with the service of the second business operator. Forexample, the authentication key use coordination unit 328 transmits avalidation notification to the vehicle 10A through the communicationprocessing unit 321. The validation notification designates theauthentication key to be validated. Thus, when an authenticationrequest, or the like, including the validated authentication key hasbeen received, the key unit 12 of the vehicle 10A is able to allowunlocking, or the like, of the doors of the vehicle 10A.

Thus, when a delivery person of a delivery service provider thatprovides a trunk delivery service is loading a package into the trunk,the authentication key that has been delivered to the mobile terminal 20associated with a service of the second business operator isinvalidated, so it is possible to prevent simultaneous use of theauthentication key.

In this example, description is made by illustrating a trunk deliveryservice; however, an intended service may be a trunk pickup service ortrunk collection service for accessing the trunk of the vehicle 10A.Hereinafter, the same applies to FIG. 9 and FIG. 10.

Subsequently, FIG. 9 is a flowchart that schematically shows furtheranother example of the coordination process that is executed by theauthentication key use coordination unit 328.

In step S902, the authentication key use coordination unit 328determines whether the mobile terminal 20Ac of a delivery person of atrunk delivery service has reached an area within a predetermined rangefrom the vehicle 10A. At this time, the authentication key usecoordination unit 328 acquires location information of the vehicle 10Aby making an inquiry to the location information management unit 324.The authentication key use coordination unit 328 may use the locationinformation of the mobile terminal 20Ac, which is received from thedelivery management server 50 by the communication processing unit 321.Alternatively, the authentication key use coordination unit 328 maydirectly acquire location information from the mobile terminal 20Ac viathe communication processing unit 321. When the mobile terminal 20Ac ofa delivery person of a trunk delivery service has reached the areawithin the predetermined range from the vehicle 10A, the authenticationkey use coordination unit 328 proceeds to step S904; otherwise, theauthentication key use coordination unit 328 ends the current process.

In step S904, the authentication key use coordination unit 328determines whether a delivery person of another delivery serviceprovider is working for a trunk delivery service (loading a package intothe trunk). For example, when the communication processing unit 321 hasreceived the trunk unlock notification from the vehicle 10A and has notreceived the trunk lock notification yet, the authentication key usecoordination unit 328 may determine that the delivery person is stillworking for a trunk delivery service. When a delivery person of anotherdelivery service provider is working for a trunk delivery service, theauthentication key use coordination unit 328 proceeds to step S906;otherwise, the authentication key use coordination unit 328 proceeds tostep S908.

In step S906, the authentication key use coordination unit 328determines whether the communication processing unit 321 has receivedthe trunk lock notification from the vehicle 10A. When the communicationprocessing unit 321 has received the trunk lock notification from thevehicle 10A, the authentication key use coordination unit 328 proceedsto step S908; otherwise, the authentication key use coordination unit328 repeats the process of this step.

In step S908, the authentication key use coordination unit 328 issues anauthentication key of which an available period or the available numberof times is limited, delivers the issued authentication key to themobile terminal 20Ac of the delivery person, and ends the currentprocess.

Thus, since an authentication key is not delivered until a deliveryperson reaches relatively near the vehicle 10A, it is possible to makeit difficult to deliver an authentication key to the mobile terminals20Ac of delivery persons of a plurality of delivery service providers.Even when a delivery person has reached relatively near the vehicle 10A,but when a delivery person of another delivery service provider is doingwork, an authentication key is not delivered until the end of the work,so it is possible to reliably prevent the mobile terminals 20 associatedwith a plurality of business operators from simultaneously using theauthentication key of the vehicle 10A.

Subsequently, FIG. 10 is a flowchart that schematically shows yetanother example of the coordination process that is executed by theauthentication key use coordination unit 328. In this example,description will be made on the assumption that an authentication keythat is available only the necessary minimum number of times (forexample, twice, that is, locking and unlocking) is delivered to themobile terminal 20Ac of a delivery person to deliver a package into thetrunk.

In step S1002, the authentication key use coordination unit 328determines whether the communication processing unit 321 has received anauthentication key arrangement request from a delivery service provider(delivery management server 50). When the communication processing unit321 has received an authentication key arrangement request from adelivery service provider, the authentication key use coordination unit328 proceeds to step S1004; otherwise, the authentication key usecoordination unit 328 ends the current process.

In step S1004, the authentication key use coordination unit 328determines whether an authentication key has been delivered to themobile terminal 20Ac associated with another delivery service provider.

In step S1006, the authentication key use coordination unit 328determines whether the authentication key that has been delivered to themobile terminal 20Ac associated with another delivery service providerhas been used up the available number of times. For example, when theauthentication key has been used, the authentication key usecoordination unit 328 is able to determine how many times theauthentication key has been used by uploading information related to theauthentication key from the vehicle 10A to the center server 30 as inthe case of the trunk unlock notification, the trunk lock notification,or the like. When the authentication key has been used up the availablenumber of times, the authentication key use coordination unit 328determines that delivery of a package to the trunk by the deliveryperson of the another delivery service provider has been finished, andproceeds to step S1008; otherwise, the authentication key usecoordination unit 328 repeats the process of this step.

In step S1008, the authentication key issuance unit 323 issues anauthentication key with permission of which the available number oftimes is limited to the necessary minimum number of times.

In step S1010, the authentication key issuance unit 323 delivers theauthentication key to the mobile terminal 20Ac of the delivery personthat is designated by the authentication key arrangement request, andends the current process.

Thus, as long as the authentication key that has been delivered to themobile terminal 20Ac of a delivery person of a delivery service providerhas not been used up the available number of times, the authenticationkey is not delivered to the mobile terminal 20Ac of a delivery person ofa delivery service provider that delivers a package to the trunksubsequently. Therefore, it is possible to prevent the mobile terminals20 associated with a plurality of business operators from simultaneouslyusing the authentication key of the vehicle 10A. Since the availablenumber of times is set to the minimum number of times required for atrunk delivery service, it is possible to deliver an authentication keyto the subsequent delivery service provider each time work of a trunkdelivery service of a delivery service provider has been finished.

In this example, when an authentication key is required again because ofsome reasons (for example, misloading a package, forgetting to load apackage, or the like), a delivery person transmits an authentication keyacquisition request from the mobile terminal 20Ac to the deliverymanagement server 50, and the authentication key is re-arranged.

Operation

In the present embodiment, the authentication key issuance unit 323delivers key information (authentication key) to the mobile terminal 20(that is, the mobile terminal 20 of a third party other than the regularusers of the vehicle 10A). The mobile terminal 20 corresponds to each ofa plurality of business operators that provide the regular users of thevehicle 10A with a predetermined service using the vehicle 10A. The keyinformation is information for unlocking the vehicle 10A or starting thevehicle 10A when a predetermined transmission signal is transmittedtoward the vehicle 10A. When the mobile terminal 20 corresponding to afirst business operator among the plurality of business operators thatprovide the predetermined service uses the authentication key, theschedule management unit 325 or the authentication key use coordinationunit 328 makes coordination such that the mobile terminal 20corresponding to a second business operator among the plurality ofbusiness operators does not use the authentication key.

Thus, when the plurality of business operators each provides a serviceusing the vehicle 10, the center server 30 is able to make coordinationsuch that only the mobile terminal 20 corresponding to the firstbusiness operator is able to use the authentication key at the sametime. Therefore, when the plurality of business operators each providesa service using the vehicle 10A, it is possible to improve the securityof the vehicle 10A.

In the present embodiment, the authentication key use coordination unit328 limits the authentication key that is delivered to the mobileterminal 20 corresponding to the first business operator by theauthentication key issuance unit 323 such that the authentication key isavailable only in a first period, and limits the authentication key thatis delivered to the mobile terminal 20 corresponding to the secondbusiness operator by the authentication key issuance unit 323 such thatthe authentication key is available only in a second period that doesnot conflict with the first period.

Thus, the center server 30 is able to prevent a conflict between aperiod during which the mobile terminal 20 corresponding to the firstbusiness operator uses the authentication key and a period during whichthe mobile terminal 20 corresponding to the second business operatoruses the authentication key. Therefore, the center server 30 isspecifically able to make coordination such that only the mobileterminal 20 corresponding to the first business operator is able to usethe authentication key at the same time.

In the present embodiment, the authentication key issuance unit 323delivers the authentication key to the mobile terminal 20 of a workerwho does work for delivery of a package in correspondence with a trunkdelivery service, work for pickup of a package in correspondence with atrunk pickup service, or work for collection of an article incorrespondence with a trunk collection service. When the workercorresponding to the first business operator is doing the work based onusage of the authentication key by the mobile terminal 20 of the workercorresponding to the first business operator, the authentication key usecoordination unit 328 disables usage of the authentication key acquiredby the mobile terminal 20 of the worker corresponding to the secondbusiness operator unless the worker corresponding to the first businessoperator finishes the work.

Thus, the center server 30 is able to disable usage of theauthentication key acquired by the mobile terminal 20 of the worker ofthe second business operator until the worker of the first businessoperator who provides the trunk delivery service, or the like, finishesthe work, such as delivery. Therefore, the center server 30 isspecifically able to enable only the mobile terminal 20 of the workercorresponding to the first business operator among the plurality ofbusiness operators that provide the trunk delivery service, or the like,to use the authentication key at the same time.

In the present embodiment, the authentication key issuance unit 323delivers the authentication key to the mobile terminal 20 of a workerwho does work for delivery of a package in correspondence with a trunkdelivery service, work for pickup of a package in correspondence with atrunk pickup service, or work for collection of an article incorrespondence with a trunk collection service. When the mobile terminal20 of the worker corresponding to the first business operator hasreached an area within a predetermined range from the vehicle 10A, theauthentication key use coordination unit 328 causes the authenticationkey issuance unit 323 to deliver the authentication key to the mobileterminal 20 of the worker corresponding to the first business operator.After that, when the mobile terminal 20 of the worker corresponding tothe second business operator has reached the area within thepredetermined range from the vehicle 10A in a situation in which theworker corresponding to the first business operator is doing the workbased on usage of the authentication key by the mobile terminal 20 ofthe worker corresponding to the first business operator, theauthentication key use coordination unit 328 causes the authenticationkey issuance unit 323 to deliver the authentication key to the mobileterminal 20 of the worker corresponding to the second business operatorat the time when the worker corresponding to the first business operatorhas finished the work.

Thus, the center server 30 is able to disable delivery of theauthentication key to the mobile terminal 20 of the worker of the secondbusiness operator, who has reached near the vehicle 10A, until theworker of the first business operator that provides the trunk deliveryservice, or the like, finishes the work, such as delivery of a packageto the trunk of the vehicle 10A. Therefore, the center server 30 isspecifically able to enable only the mobile terminal 20 of the workercorresponding to the first business operator among the plurality ofbusiness operators that provide the trunk delivery service, or the like,to use the authentication key at the same time.

In the present embodiment, the authentication key issuance unit 323delivers the authentication key to the mobile terminal 20 of a workerwho does work for delivery of a package in correspondence with a trunkdelivery service, work for pickup of a package in correspondence with atrunk pickup service, or work for collection of an article incorrespondence with a trunk collection service. The authentication keyuse coordination unit 328 limits the number of times the authenticationkey is available to a predetermined number of times, the authenticationkey is delivered to the mobile terminal 20 of the worker correspondingto each of the plurality of business operators by the authentication keyissuance unit 323, and, when the mobile terminal 20 of the workercorresponding to the first business operator has used up theauthentication key the predetermined number of times, the authenticationkey use coordination unit 328 causes the authentication key issuanceunit 323 to deliver the authentication key to the mobile terminal 20 ofthe worker corresponding to the second business operator.

Thus, the center server 30 is able to set the number of times (forexample, twice, that is, unlocking and locking, or the like) of usage ofthe authentication key required of the workers of the plurality ofbusiness operators that provide the trunk delivery service, or the like,to do the work, such as delivery of a package to the trunk of thevehicle 10A, to the predetermined number of times. For this reason, thecenter server 30 is able to disable delivery of the authentication keyto the mobile terminal 20 of the worker of the second business operator,who has reached near the vehicle 10A, until the worker of the firstbusiness operator finishes the work, such as delivery of a package tothe trunk of the vehicle 10A. Therefore, the center server 30 isspecifically able to enable only the mobile terminal 20 of the workercorresponding to the first business operator that provides the trunkdelivery service, or the like, to use the authentication key at the sametime.

In the present embodiment, the center server 30 bidirectionally relaysinformation between the mobile terminal 20 of the worker correspondingto the first business operator and the mobile terminal 20 of the workercorresponding to the second business operator.

Thus, the center server 30 is able to allow the first business operatorand the second business operator, which provide the trunk deliveryservice, or the like, to directly make contact with each other. For thisreason, for example, when there are a package of the first businessoperator and a package of the second business operator and the samedelivery time period is designated for these packages, it is possible toallow the worker of the first business operator and the worker of thesecond business operator to adjust specific delivery time. Therefore,the center server 30 is able to improve the convenience, and the like,of the plurality of business operators that provide the trunk deliveryservice, or the like.

In the present embodiment, when a use schedule of the vehicle 10,associated with the predetermined service corresponding to the firstbusiness operator, is set up in a first period, the schedule managementunit 325 keeps a period that conflicts with the first period such that ause schedule of the vehicle 10A, associated with the predeterminedservice corresponding to the second business operator, is not set up inthe period.

Thus, the center server 30 is able to prevent a conflict between a timeperiod during which the vehicle 10A is used for the service that isprovided by the first business operator and a time period during whichthe vehicle 10A is used for the service that is provided by the secondbusiness operator. Therefore, the center server 30 is specifically ableto make coordination such that only the mobile terminal 20 correspondingto the first business operator is able to use the authentication key atthe same time.

In the present embodiment, when a first time period has been alreadydesignated as a delivery time period for a product with the trunkdelivery service corresponding to the first business operator, theschedule management unit 325 disables the regular user of the vehicle10A from selecting a time period that conflicts with the first timeperiod on the same date on an EC site as a delivery time period for aproduct with the delivery service corresponding to the second businessoperator.

Thus, at the time when the regular user of the vehicle 10A places anorder for a product on the EC site, the center server 30 is able todisable selection of a time period that conflicts with an alreadydesignated delivery time period for a product by the first businessoperator as a delivery time period for a product by the second businessoperator. Therefore, the center server 30 is specifically able to enableonly the mobile terminal 20 of the worker corresponding to the firstbusiness operator among the plurality of business operators that providethe trunk delivery service for delivering a product purchased on the ECsite to use the authentication key at the same time.

The embodiment of the disclosure is described in detail above; however,the disclosure is not limited to the specific embodiment. Variousmodifications or changes are applicable within the scope of thedisclosure recited in the appended claims.

For example, in the above-described embodiment, the mobile terminal 20transmits an authentication request including an authentication key tothe key unit 12, the key unit 12 exchanges signals with the lock/unlockand start device 11 in response to an authentication result based on theauthentication key, and locking or unlocking of the doors of the vehicle10A or starting of the vehicle 10A is realized by the lock/unlock andstart device 11; however, the disclosure is not limited to this mode.

Specifically, the function of the key unit 12 may be transferred to themobile terminal 20, and locking or unlocking of the doors of the vehicle10A or starting of the vehicle 10A may be realized by the lock/unlockand start device 11 as the mobile terminal 20 exchanges signals based onthe key information with a vehicle 10 (lock/unlock and start device 11)by LF radio waves and RF radio waves. In this case, the authenticationkey in the above-described embodiment just needs to be read as keyinformation. That is, the center server 30 may issue key informationinstead of an authentication key and deliver the key information to themobile terminal 20 with a similar method to the authentication key inthe above-described embodiment. Thus, similar operation and advantageouseffects to those of the above-described embodiment are obtained.

The function of the key unit 12 may be integrated into the lock/unlockand start device 11, and components related to communication between thelock/unlock and start device 11 and the key unit 12 and authenticationrelated to the communication (the LF radio wave transmitter 111, the RFradio wave receiver 112, the collation ECU 113, the LF radio wavereceiver 121, and the RF radio wave transmitter 122) may be omitted. Inthis case, when authentication of the mobile terminal 20 is successfulbased on an authentication key, the key ECU 124 may directly output anunlock or lock instruction to the body ECU 114 or a start instruction tothe engine ECU 116, instead of the collation ECU 113, and cause the bodyECU 114 to lock or unlock the doors of the vehicle 10 and cause theengine ECU 116 to start the vehicle 10. Thus, similar operation andadvantageous effects to those of the above-described embodiment areobtained.

What is claimed is:
 1. A service support device comprising: aninformation processing device configured to i) deliver key informationto a mobile terminal, the mobile terminal corresponding to each of aplurality of business operators that provide a user of a vehicle with apredetermined service using the vehicle, the key information beinginformation for unlocking the vehicle, starting the vehicle, orunlocking and starting the vehicle when a predetermined transmissionsignal is transmitted toward the vehicle, and ii) when the mobileterminal corresponding to a first business operator among the pluralityof business operators uses the key information, make coordination suchthat the mobile terminal corresponding to a second business operatoramong the plurality of business operators does not use the keyinformation.
 2. The service support device according to claim 1, whereinthe information processing device is configured to limit the keyinformation that is delivered to the mobile terminal corresponding tothe first business operator such that the key information is availableonly in a first period, and limit the key information that is deliveredto the mobile terminal corresponding to the second business operatorsuch that the key information is available only in a second period thatdoes not conflict with the first period.
 3. The service support deviceaccording to claim 1, wherein: the predetermined service is any one of adelivery service that allows a luggage compartment of the vehicle to bedesignated as a delivery address for a package, a pickup service thatallows the luggage compartment to be designated as a pickup address fora package, and a collection service that allows the luggage compartmentto be designated as a collection address for an article; the informationprocessing device is configured to deliver the key information to eachof a plurality of mobile terminals of workers who conduct work fordelivery of the package, pickup of the package, or collection of thearticle, the work corresponding to the predetermined service; and theinformation processing device is configured to, when a workercorresponding to the first business operator, among the workers, isdoing the work based on usage of the key information by the mobileterminal of the worker corresponding to the first business operator,disable usage of the key information acquired by the mobile terminal ofa worker corresponding to the second business operator, among theworkers, until the worker corresponding to the first business operatorfinishes the work.
 4. The service support device according to claim 1,wherein: the predetermined service is any one of a delivery service thatallows a luggage compartment of the vehicle to be designated as adelivery address for a package, a pickup service that allows the luggagecompartment to be designated as a pickup address for a package, and acollection service that allows the luggage compartment to be designatedas a collection address for an article; the information processingdevice is configured to deliver the key information to each of aplurality of mobile terminals of workers who conduct work for deliveryof the package, pickup of the package, or collection of the article, thework corresponding to the predetermined service; the informationprocessing device is configured to, when a mobile terminal of a workercorresponding to the first business operator, among the workers, hasreached an area within a predetermined range from the vehicle, deliverthe key information to the mobile terminal of the worker correspondingto the first business operator; and the information processing device isconfigured to, when a mobile terminal of a worker corresponding to thesecond business operator, among the workers, has reached the area withinthe predetermined range from the vehicle in a situation in which theworker corresponding to the first business operator is doing the workbased on usage of the key information by the mobile terminal of theworker corresponding to the first business operator, deliver the keyinformation to the mobile terminal of the worker corresponding to thesecond business operator at a time when the worker corresponding to thefirst business operator has finished the work.
 5. The service supportdevice according to claim 1, wherein: the predetermined service is anyone of a delivery service that allows a luggage compartment of thevehicle to be designated as a delivery address for a package, a pickupservice that allows the luggage compartment to be designated as a pickupaddress for a package, and a collection service that allows the luggagecompartment to be designated as a collection address for an article; theinformation processing device is configured to deliver the keyinformation to each of a plurality of mobile terminals of workers whoconduct work for delivery of the package, pickup of the package, orcollection of the article, the work corresponding to the predeterminedservice; the information processing device is configured to limit thenumber of times the key information is available to a predeterminednumber of times; and the information processing device is configured to,when a mobile terminal of a worker corresponding to the first businessoperator, among the workers, has used up the key information thepredetermined number of times, deliver the key information to the mobileterminal of a worker corresponding to the second business operator,among the workers.
 6. The service support device according to claim 3,wherein the information processing device is configured tobidirectionally relay information between the mobile terminal of theworker corresponding to the first business operator and the mobileterminal of the worker corresponding to the second business operator. 7.The service support device according to claim 1, wherein the informationprocessing device is configured to, when a use schedule of the vehicle,associated with the predetermined service corresponding to the firstbusiness operator, is set up in a first period, keep a period thatconflicts with the first period such that a use schedule of the vehicle,associated with the predetermined service corresponding to the secondbusiness operator, is not set up in the period.
 8. The service supportdevice according to claim 7, wherein: the predetermined service includesa delivery service that allows a luggage compartment of the vehicle tobe designated as a delivery address for a product that is ordered on awebsite corresponding to electric commerce; and the informationprocessing device is configured to, when a first time period has beenalready designated as a delivery time period for the product with thedelivery service corresponding to the first business operator, disablethe user of the vehicle from selecting, as a delivery time period for aproduct with the delivery service corresponding to the second businessoperator, a time period that conflicts with the first time period on thesame date on the website.
 9. The service support device according toclaim 1, wherein the user of the vehicle is a regular user of thevehicle.
 10. The service support device according to claim 1, furthercomprising a communication device configured to bidirectionally carryout communication with each of the vehicle, the mobile terminal, and anexternal device through a predetermined communication network.
 11. Theservice support device according to claim 1, wherein the key informationfurther includes information for locking the vehicle.
 12. The servicesupport device according to claim 1, wherein the predeterminedtransmission signal includes the key information.
 13. A service supportmethod that is executed by a service support device, the service supportmethod comprising: delivering key information to a mobile terminal, themobile terminal corresponding to each of a plurality of businessoperators that provide a user of a vehicle with a predetermined serviceusing the vehicle, the key information being information for unlockingthe vehicle, starting the vehicle, or unlocking and starting the vehiclewhen a predetermined transmission signal is transmitted toward thevehicle; and when the mobile terminal corresponding to a first businessoperator among the plurality of business operators uses the keyinformation, making coordination such that the mobile terminalcorresponding to a second business operator among the plurality ofbusiness operators does not use the key information.
 14. Anon-transitory computer-readable recording medium storing a servicesupport program causing an information processing device to executeinstructions for: delivering key information to a mobile terminal, themobile terminal corresponding to each of a plurality of businessoperators that provide a user of a vehicle with a predetermined serviceusing the vehicle, the key information being information for unlockingthe vehicle, starting the vehicle, or unlocking and starting the vehiclewhen a predetermined transmission signal is transmitted toward thevehicle; and when the mobile terminal corresponding to a first businessoperator among the plurality of business operators uses the keyinformation, making coordination such that the mobile terminalcorresponding to a second business operator among the plurality ofbusiness operators does not use the key information.