Authentication apparatus with changing interval between adjacent working time periods of transceiver

ABSTRACT

In the case where the scheduled use start time has been acquired, the controller shortens the interval between the adjacent working time periods of the transceiver as the scheduled use start time approaches. Thus, in a case where there is a long time before the scheduled use start time, the power consumption is decreased. As the scheduled use start time approaches, the transceiver verifies the user immediately.

BACKGROUND OF THE INVENTION

Field of the Invention

The invention relates to a technology for authentication to verify auser of an object.

Description of the Background Art

Conventionally, an apparatus has been known that performs authenticationto verify whether or not a user is an authorized user for a vehicle orthe like that is shared for use. Such an authentication apparatusseparately includes a communication apparatus and establishes near fieldcommunication with a mobile device owned by the user. Then, thecommunication apparatus performs authentication to verify the user basedon an ID number received by the communication apparatus from the mobiledevice. Therefore, the authentication apparatus has been continuouslyworking until the user comes close to the vehicle and the like.

However, if the communication apparatus is continuously working, thecommunication apparatus keeps consuming power even while nocommunication is established with the user. Therefore, a large amount ofpower may be consumed. Moreover, it is not necessarily clear when theuser comes close to the vehicle and the like to establish communicationwith a communication apparatus. Therefore, if the communication devicestops working, when the user tries to establish communication,authentication is delayed and convenience is decreased.

SUMMARY OF THE INVENTION

According to one aspect of the invention, an authentication apparatusincludes a transceiver that performs wireless communications via anantenna and a controller configured to: cause the transceiver to operateintermittently by setting a working time period of the transceiver, thetransceiver seeking to obtain verification data of a user during theworking time period; and acquire a scheduled use start time of an objectassociated with the authentication apparatus, the user seeking to usethe object. The controller changes an interval between adjacent workingtime periods of the transceiver depending on whether or not thescheduled use start time has been acquired by the controller.

Thus, since the controller changes the interval between the adjacentworking time periods of the transceiver depending on whether or not thescheduled use start time has been acquired, the transceiver can becaused to operate using an appropriate interval.

According to another aspect of the invention, in a case where thescheduled use start time has been acquired by the controller, thecontroller shortens the interval between the adjacent working timeperiods of the transceiver as the scheduled use start time approaches.

Thus, in the case where the scheduled use start time has been acquired,the controller shortens the interval between the adjacent working timeperiods of the transceiver as the scheduled use start time approaches.Thus, in a case where there is a long time before the scheduled usestart time, the power consumption is decreased. As the scheduled usestart time approaches, the transceiver verifies the user immediately.

Therefore, an object of the invention is to provide a technology forverifying a user of an object immediately while decreasing powerconsumption.

These and other objects, features, aspects and advantages of theinvention will become more apparent from the following detaileddescription of the invention when taken in conjunction with theaccompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an outline of an authentication system;

FIG. 2 illustrates a configuration of an authentication apparatus;

FIG. 3 is an example of an interval table;

FIG. 4 illustrates a configuration of a server;

FIG. 5 illustrates an example of a reservation management database;

FIG. 6 illustrates steps of a process performed by the authenticationapparatus;

FIG. 7 illustrates steps of a process performed by the authenticationapparatus;

FIG. 8 illustrates steps of a process performed by the server;

FIG. 9 illustrates steps of a process performed by the authenticationapparatus in a second embodiment;

FIG. 10 illustrates a configuration of an authentication apparatus in athird embodiment;

FIG. 11 illustrates steps of a process performed by the authenticationapparatus in the third embodiment;

FIG. 12 illustrates an example of a modified interval table;

FIG. 13 illustrates an example of a modified interval table;

FIG. 14 illustrates an example of a modified interval table; and

FIG. 15 illustrates an example of a modified interval table.

DESCRIPTION OF THE EMBODIMENTS

Embodiments of the invention will be described with reference to thedrawings.

1. First Embodiment

<1-1. Outline>

FIG. 1 illustrates an outline of an authentication system 1. Theauthentication system 1 is a system that verifies whether or not a user21 is an authorized user of an object to be shared to use, for example,a vehicle 2 such as a car.

First, the user 21 who desires to use the vehicle 2 makes a reservationto use the vehicle 2 at an office 5 that manages the vehicle 2. The user21 may access to a reservation system via a mobile device 7 or may visitthe office 5 in person, to make a reservation to use the vehicle 2.

Once receiving the reservation of the vehicle 2, the reservation systemin the office 5 sends contents of the reservation to a server 6. Thecontents of the reservation includes a user ID number of the user 21, avehicle number for identifying the vehicle 2 and a use time period.

The server 6 includes a database including a plurality of the contentsof the reservation. Once determining that the user 21 can use thevehicle 2, the server 6 inputs the contents of the reservation into thedatabase. The server 6 sends the user ID number of the user 21 and theuse time period to an authentication apparatus 3 included in the vehicle2.

Once acquiring the user ID number of the user 21 and the use timeperiod, the authentication apparatus 3 causes an authenticationcommunication apparatus 4 to work (operate). The authenticationcommunication apparatus 4 receives the user ID number of the user 21sent from the mobile device 7 of the user 21.

Once beginning working after receiving power supplied from theauthentication apparatus 3, the authentication communication apparatus 4emits radio waves to a vicinity of the vehicle 2 in a predetermined timecycle. When the user 21 having the mobile device 7 comes closer to thevicinity of the vehicle 2 and when the mobile device 7 receives theradio wave emitted from the authentication communication apparatus 4,the mobile device 7 sends the user ID number of the user 21 included inthe mobile device 7 to the authentication communication apparatus 4.

The authentication apparatus 3 receives the user ID number of the mobiledevice 7 from the authentication communication apparatus 4. Theauthentication apparatus 3 performs authentication to verify whether ornot the user 21 coming closer to the vicinity of the vehicle 2 is anauthorized user who made the reservation to use the vehicle 2, bychecking the user ID number from the mobile device 7 against the user IDnumber acquired from the server 6 beforehand. In a case where theauthentication apparatus 3 determines that the user 21 is the authorizeduser, the authentication apparatus 3 allows the user 21 to use thevehicle 2. In other words, the authentication apparatus 3 unlocks a doorof the vehicle 2. Thus, the user 21 can enter the vehicle 2 and canstart an engine of the vehicle 2, using a key provided in a cabin of thevehicle 2.

As described above, the authentication system 1 performs authenticationto verify whether or not the user 21 is the authorized user of thevehicle 2 that is a shared-use vehicle. In a case where the user 21 isthe authorized user, the authentication system 1 allows the user 21 touse the vehicle 2. The authentication system 1 eliminates a physicalprocedure, such as receiving the key of the vehicle 2 between a user anda managing person of the vehicle 2, and enhances convenience of theshare-use of the vehicle 2.

<1-2. Configuration>

FIG. 2 illustrates a configuration of the authentication system 1. Morespecifically, FIG. 2 illustrates configurations of the authenticationapparatus 3 and the authentication communication apparatus 4 of theauthentication system 1. The authentication system 1 includes theauthentication apparatus 3 and the authentication communicationapparatus 4 installed in the vehicle 2, the office 5, the server 6 andthe mobile device 7.

The vehicle 2 is an object to be shared to use by a plurality of users.Since only the authorized user is allowed to use the vehicle 2,authentication of a user is performed before use. The object may be abuilding, such as a house, and an electronic device, such as a personalcomputer, in addition to a transportation, such as the vehicle 2. Theobject may be anything that can be shared to use.

The authentication apparatus 3 is installed in the vehicle 2 and is anelectronic control apparatus including an antenna for wirelesscommunication to an outside device. The authentication apparatus 3includes a controller 31, an information communication part 32 and amemory 33.

The controller 31 is a microcomputer including a CPU, a RAM and a ROM,not illustrated. The controller 31 is connected to other elementsincluded in the authentication apparatus 3 and controls the entireauthentication apparatus 3. Functions of the controller 31 will bedescribed later.

The information communication part 32 is a wireless communication deviceincluding an antenna and a wireless communication function to performinformation communications with the server 6 over a network. Theinformation communication part 32 performs the wireless communicationsover, for example, WiMAX, LTE, etc.

The memory 33 is a memory for storing data. For example, the memory 33is a non-volatile memory, such as an electrical erasable programmableread-only memory (EEPROM), a flash memory and a hard disk driveincluding a magnetic disk. The memory 33 stores a user ID number 33 a,reservation time data 33 b, an interval table 33 c and a program 33 d.

The user ID number 33 a is an identification number for identifying theuser of the vehicle 2. For example, the user ID number 33 a is a12-digit figure.

The reservation time data 33 b is time data showing use start time anduse end time of the vehicle 2 by the user 21. The user ID number 33 aand the reservation time data 33 b are stored in the memory 33 by anacquisition part 31 b. Therefore, if the acquisition part 31 b does notacquire the user ID number 33 a and the reservation time data 33 b, bothof the data are not stored in the memory 33. The reservation time data33 b functions as a scheduled use start time of the object.

The interval table 33 c is a data table including data of remaining timeperiod until reserved use start time, a working time period and astopped time period of the authentication communication apparatus 4. Aconcrete example of the interval table 33 c will be described later.

The program 33 d is a firmware that is read out by the controller 31,and the program 33 d is executed by the controller 31 to control theauthentication apparatus 3. The program 33 d is input and output to/fromthe authentication apparatus 3 via a memory, such as a memory card.However, the program 33 d may be input and output by connection to anoutside device with a communication wire.

Next, functions included in the controller 31 will be described. Thecontroller 31 includes an operation part 31 a, the acquisition part 31b, a timer 31 c, an authentication part 31 d and an unlocking part 31 e,as the functions that are implemented according to a program.

The operation part 31 a is a controller that causes the authenticationcommunication apparatus 4 to work and to stop. The operation part 31 acauses the authentication communication apparatus 4 to work by supplyingpower to the authentication communication apparatus 4 and stops theauthentication communication apparatus 4 by stopping supplying power tothe authentication communication apparatus 4. Since the operation part31 a causes the authentication communication apparatus 4 to work and tostop, the authentication communication apparatus 4 works at apredetermined interval, i.e., intermittently. While the operation part31 a stops supplying power to the authentication communication apparatus4, power is not consumed so that power can be saved.

Moreover, the operation part 31 a shortens or lengthens the intervalbetween adjacent work time periods (work period interval) of theauthentication communication apparatus 4, by controlling power supply tothe authentication communication apparatus 4. In a case where the workperiod interval is shortened, the operation part 31 a shortens a timeperiod (stopped time period) in which the authentication communicationapparatus 4 is stopped. Moreover, a time period (working time period) inwhich the authentication communication apparatus 4 works may belengthened. In a case where the work period interval is lengthened, theoperation part 31 a lengthens the stopped time period or shortens theworking time period. The operation part 31 a functions as an actuator.

The acquisition part 31 b receives a various types of data from theserver 6 located outside the vehicle 2, via the informationcommunication part 32. The data received by the acquisition part 31 bfrom the server 6 is data relating to the reservation of the vehicle 2.The data relating to the reservation is the user ID number and thereservation time data that is the use start time and the use end time.Once acquiring the data relating to the reservation, the acquisitionpart 31 b stores the user ID number and the reservation time data intothe memory 33.

The timer 31 c is measuring equipment that measures time. The timer 31 creceives signals sent from a positioning system satellite (e.g., GPSsatellite) and derives current time from time data included in thereceived signal. Therefore, the timer 31 c derives a time period fromthe current time to a predetermined time point.

The authentication part 31 d performs authentication to verify whetheror not the user 21 coming close to the vehicle 2 is a user registered tothe authentication apparatus 3 beforehand. In other words, theauthentication part 31 d determines whether or not the user ID number 33a stored in the memory 33 matches the user ID number of the user 21 sentto the authentication part 31 d from the authentication communicationapparatus 4, described later, after the authentication communicationapparatus 4 acquired the user ID number from the mobile device 7 of theuser 21. In a case where those user ID numbers are matched to eachother, it can be determined that the user 21 coming closer to thevehicle 2 is the authorized user of the vehicle 2. In this case, theauthentication part 31 d determines that the authentication succeeded,and turns on an authentication flag of a flag register, not illustrated.On the other hand, in a case where the authentication part 31 ddetermines that those user ID numbers are not matched to each other, theauthentication part 31 d determines that the authentication failed andturns off the authentication flag. Further, in a case where the user 21ends the use of the vehicle 2, the authentication part 31 d turns offthe authentication flag.

The unlocking part 31 e is a controller that controls unlocking andlocking of the door of the vehicle 2. In a case where the unlocking part31 e determines that the authentication flag is turned on while lookingup the authentication flag, the unlocking part 31 e unlocks the door ofthe vehicle 2. In this embodiment, the key to start the vehicle 2 isinstalled in the vehicle 2 beforehand. Therefore, when the user 21 isverified as the authorized user by the authentication part 31 d and whenthe door of the vehicle 2 is unlocked by the unlocking part 31 e, theuser 21 can enter the vehicle 2 and can start the vehicle 2 with the keyin the vehicle 2.

The authentication communication apparatus 4 is a wireless communicationdevice that receives the user ID number sent from a mobile devicelocated in the vicinity of the vehicle 2. The authenticationcommunication apparatus 4 is connected to the authentication apparatus 3by the communication wire, and sends the received user ID number to theauthentication apparatus 3. The authentication communication apparatus 4functions as a communication device.

The authentication communication apparatus 4 works by power suppliedfrom the authentication apparatus 3. Once starting working, theauthentication communication apparatus 4 transmits radio waves to atransmission range of approx. 70 cm or 100 cm, i.e., the vicinity of thevehicle 2, at a predetermined time cycle. A frequency of the radio wavesis, for example, 300 MHz. When the mobile device 7 is located within thetransmission range of the authentication communication apparatus 4 andreceives the radio waves transmitted by the authentication communicationapparatus 4, the mobile device 7 sends the user ID number included inthe mobile device 7 to the authentication communication apparatus 4.Once receiving the user ID number from the mobile device 7, theauthentication communication apparatus 4 sends the user ID numberreceived from the mobile device 7 to the authentication apparatus 3connected by the communication wire. In other words, the authenticationcommunication apparatus 4 seeks to obtain verification data of a userduring the working time period.

Since the authentication communication apparatus 4 works by the powersupplied by the authentication apparatus 3, the power is not consumedwhile the power is not supplied. Therefore, in a case where the mobiledevice 7 is not within the transmission range of the authenticationcommunication apparatus 4, i.e., in a case where there are still manyhours until the scheduled time for the user 21 to use the vehicle 2, itis recommenced that power should not be supplied to reduce the powerconsumption.

The office 5 is an organization that manages the vehicle 2. Some amongexamples of the office 5 are a taxi company, a trucking company thatowns trucks and a construction company that owns construction machinery.In this case, the vehicle 2 is a tax, a truck and constructionmachinery. The office 5 includes a reservation system 51 for reservationto use the vehicle 2.

The reservation system 51 receives a request of the reservation to usethe vehicle 2 from the user 21, and sends, to the server 6, datarelating to the reservation to use the vehicle 2. The user 21 inputs tothe reservation system 51, the user ID number, the vehicle number andreservation time that is the use start time and the use end time whenmaking the request of the reservation to use the vehicle 2.

The server 6 is a large-sized computer that communicates data and thelike with another computer over an information network. A configurationof the server 6 will be described later.

The mobile device 7 is carried by the user 21 and is a portableelectronic device for wireless communications. For example, the mobiledevice 7 is a cell phone and a smartphone. Moreover, the mobile device 7may be a card shaped device. The mobile device 7 includes an IC chip 71.

The IC chip 71 stores the user ID number that is an ID number specificto the user 21 who is an owner of the mobile device 7. Once receivingradio waves for authentication from the authentication communicationapparatus 4, the mobile device 7 reads out the user ID number from theIC chip 71 and sends the read-out user ID number to the authenticationcommunication apparatus 4.

FIG. 3 is an example of the interval table 33 c. The interval table 33 cis a data table including a plurality of interval pattern data sets Pthat are interval pattern data sets P1 to P7. Each of the plurality ofinterval pattern data sets P includes data of the remaining time perioduntil the reserved use start time, and the working time period and thestopped time period of the authentication communication apparatus 4. Theplurality of interval pattern data sets P are data showing that as theremaining time period until the reserved use start time becomes shorter,the working time period and the stopped time period of theauthentication communication apparatus 4 become shorter.

For example, the interval pattern data set P1 shows the working timeperiod (ten minutes) and the stopped time period (ten minutes) of theauthentication communication apparatus 4 in a case where the remainingtime period until the reserved use start time is twelve hours or lessand exceeds six hours. Moreover, the interval pattern data set P4 showsthe working time period (five minutes) and the stopped time period (fiveminutes) of the authentication communication apparatus 4 in a case wherethe remaining time period until the reserved use start time is one houror less and exceeds thirty minutes. Moreover, the interval pattern dataset P6 shows the working time period (thirty seconds) and the stoppedtime period (thirty seconds) of the authentication communicationapparatus 4 in a case where the remaining time period until the reserveduse start time is ten minutes or less and exceeds five minutes. Based onthe plurality of interval pattern data sets P, an interval between theadjacent working time periods of the authentication communicationapparatus 4 is shortened as the scheduled use start time of using thevehicle 2 approaches.

The authentication communication apparatus 4 is caused to work severalhours before the reserved use start time partly to confirm whether ornot the authentication communication apparatus 4 works properly, andalso to prepare a case where a need of using the vehicle 2 suddenlyarises due to change in schedule of a user. In other words, theauthentication communication apparatus 4 receives the user ID number ofthe user who suddenly desires to use the vehicle 2 and sends the user IDnumber to the server 6 so that the server 6 can determine whether or notthe vehicle 2 can be used. If there is no schedule conflicting withschedule of another user who will use the vehicle 2 and also if the userID number is effective, a request to use the vehicle 2 can be acceptedwithout the reservation to use the vehicle 2. Therefore, even if thereare still some hours before the reserved use start time, it is useful tocause the authentication communication apparatus 4 to work.

If the remaining time period until the reserved use start time isdetermined to correspond to the interval pattern data set P1, theoperation part 31 a of the authentication apparatus 3 causes theauthentication communication apparatus 4 to work for thirty minutes andthen to stop for thirty minutes. In this case, as compared to a casewhere the authentication communication apparatus 4 is caused to workcontinuously, the power consumption can be halved.

Since the authentication communication apparatus 4 is caused to workbased on the interval table 33 c, the authentication communicationapparatus 4 is caused to work intermittently. Moreover, as apredetermined time (time point) approaches, the interval between theadjacent working time periods of the authentication communicationapparatus 4 can be shorter.

FIG. 4 illustrates a block diagram showing the configuration of theserver 6. The server 6 includes a controller 61, a communication part 62and a reservation management database 63.

The controller 61 is a microcomputer including a CPU, a RAM and a ROM,not illustrated. The controller 61 is connected to other elementsincluded in the server 6, and controls the entire server 6. Functionsincluded in the controller 61 will be described later.

The communication part 62 is a wireless communication device includingan antenna and a wireless communication function to perform informationcommunications to the authentication apparatus 3 and the office 5 overthe network. The communication function is executed using, for example,WiMAX, LTE, etc. A service that sends and receives a text message may beused.

The reservation management database 63 is a database including data of auser ID number 63 a, a vehicle number 63 b and reservation time data 63c. In addition to the data of the user ID number 63 a and others, thereservation management database 63 includes various types of data, notillustrated, that is used for reservation management. A detailed exampleof the reservation management database 63 will be described later.

The user ID number 63 a is an identification number for identifying theuser of the vehicle 2. For example, the user ID number 63 a is a12-digit figure.

The vehicle number 63 b is data that consists of codes and figures foridentifying one vehicle from a plurality of vehicles. The vehicle number63 b is, for example, “B10.”

The reservation time data 63 c shows time for which the vehicle 2 isreserved. The reservation time data 63 c includes the use start time andthe use end time. The use start time is, for example, “9:00,” and theuse end time is, for example, “9:30.”

Next, the functions of the controller 61 will be described. Thecontroller 61 includes a reception part 61 a, a sender 61 b and amanaging part 61 c, as functions that are implemented according to aprogram.

The reception part 61 a receives the reservation to use the vehicle 2that is sent from the office 5. The reservation to use the vehicle 2 isdata including the user ID number 63 a, the vehicle number 63 b and thereservation time data 63 c.

The sender 61 b sends the reservation to use the vehicle 2 received bythe reception part 61 a, to the authentication apparatus 3 of thevehicle 2 via the communication part 62.

The managing part 61 c manages the reservation to use the vehicle 2received by the reception part 61 a based on the reservation managementdatabase 63. In other words, once the reception part 61 a receives thereservation to use the vehicle 2, the managing part 61 c stores data ofthe reservation to use the vehicle 2 into the reservation managementdatabase 63, and when use of the vehicle 2 ends, the managing part 61 cerases the data of the reservation to use the vehicle 2 from thereservation management database 63. The managing part 61 c manages tokeep reservations in the reservation management database 63 updated.

FIG. 5 illustrates an example of the reservation management database 63.The reservation management database 63 is a data table including aplurality of data records L that are data records L1 to Ln. Each of theplurality of data records L includes the user ID number 63 a, thevehicle number 63 b and the reservation time data 63 c. The reservationtime data 63 c includes start time 631 c and end time 632 c.

For example, the data record L1 includes “141255800942” as the user IDnumber 63 a, “B10” as the vehicle number 63 b, “9:00” as the start time631 c and “9:30” as the end time 632 c.

The plurality of data records L of the reservation management database63 are stored, updated and erased by the managing part 61 c. Latestreservations can be understood by looking up the reservation managementdatabase 63.

<1-3. Steps>

Next, steps of a process performed by the authentication apparatus 3will be described. FIG. 6 illustrates a flowchart showing the steps ofthe process performed by the authentication apparatus 3. The process isrepeatedly performed in a predetermined time cycle.

When the process starts, the operation part 31 a causes theauthentication communication apparatus 4 to work (a step S101). Asdescribed above, the operation part 31 a causes the authenticationcommunication apparatus 4 to work by supplying power to theauthentication communication apparatus 4.

Once the operation part 31 a causes the authentication communicationapparatus 4 to work, the acquisition part 31 b determines whether or notreservation data has been acquired (a step S102). The acquisition part31 b looks up the memory 33. In a case where the user ID number 33 a andthe reservation time data 33 b are stored in the memory 33, theacquisition part 31 b determines that the reservation data has beenacquired. On the other hand, in a case where the user ID number 33 a andthe reservation time data 33 b are not stored in the memory 33, theacquisition part 31 b determines that the reservation data has not beenacquired.

In a case where the acquisition part 31 b determines that thereservation data has not been acquired (No in the step S102), theauthentication part 31 d performs authentication to verify a user of thevehicle 2 (a step S103). The authentication part 31 d checks the user IDnumber 33 a stored in the memory 33 against the user ID number sent bythe authentication communication apparatus 4 to the authenticationapparatus 3 to perform authentication to verify the user of the vehicle2. In other words, in a case where the user ID number 33 a stored in thememory 33 is the same as the user ID number sent by the authenticationcommunication apparatus 4 to the authentication apparatus 3, theauthentication part 31 d determines that the authentication succeeded.In a case where the user ID number 33 a stored in the memory 33 is notthe same as the user ID number sent by the authentication communicationapparatus 4 to the authentication apparatus 3, the authentication part31 d determines that the authentication has failed.

In a case where the authentication part 31 d determines that theauthentication has succeeded (Yes in the step S103), the unlocking part31 e unlocks the door of the vehicle 2 (a step S104). Thus, the user 21who made the reservation to use the vehicle 2 beforehand can enter thevehicle 2 and can use the vehicle 2.

On the other hand, in a case where the authentication part 31 ddetermines that the authentication has failed (No in the step S103), thetimer 31 c determines whether or not the working time period has passedsince the operation part 31 a causes the authentication communicationapparatus 4 to work (a step S105). The timer 31 c looks up the intervaltable 33 c in the memory 33 and sets a working time period correspondingto a remaining time period 331 c until the reserved use start time, as aworking time period 332 c.

In a case where the timer 31 c determines that the working time periodhas not passed (No in the step S105), the process returns to the stepS101. In other words, the operation part 31 a keeps the authenticationcommunication apparatus 4 working, and the steps 102 and after areperformed again.

On the other hand, in a case where the timer 31 c determines that theworking time period has passed (Yes in the step S105), the operationpart 31 a stops supplying power to the authentication communicationapparatus 4 to stop the authentication communication apparatus 4 (a stepS106).

Once the operation part 31 a stops the authentication communicationapparatus 4, the acquisition part 31 b determines whether or not thereservation data has been acquired (a step S107). The acquisition part31 b determines in the step S102 whether or not the reservation data hasbeen acquired while the authentication communication apparatus 4 isworking. In addition, the acquisition part 31 b also determines whetheror not the reservation data has been acquired in the step S107 while theauthentication communication apparatus 4 is stopped. Thus, it ispossible to speedily move to a step of shortening the working timeperiod and the stopped time period, described later.

In a case where the acquisition part 31 b determines that thereservation data has not been acquired (No in the step S107), the timer31 c determines whether or not the stopped time period has passed (astep S108). The timer 31 c looks up the interval table 33 c in thememory 33 and sets a stopped time period corresponding to the remainingtime period 331 c until the reserved use start time, as a stopped timeperiod 333 c. Supplying power to the authentication communicationapparatus 4 is stopped until the stopped time period passes.

Thus, power consumption can be reduced for a time period from time atwhich the reservation to use the vehicle 2 has been made to the usestart time of the vehicle 2. When there is enough time until the usestart time, even if power supply to the authentication communicationapparatus 4 is stopped, i.e., even if there is a time period in whichauthentication to verify a user is not performed, convenience of usingvehicle is not reduced because there is a low possibility that the userimmediately uses the vehicle in such a period.

In a case where the timer 31 c determines that the stopped time periodhas passed (Yes in the step S108), the process returns to the step S101.In other words, the operation part 31 a causes the authenticationcommunication apparatus 4 to work, and then the step S102 and after areperformed again. As described above, since the operation part 31 arepeatedly causes the authentication communication apparatus 4 to workand to stop, the operation part 31 a intermittently and regularly causesthe authentication communication apparatus 4 to work. Since theoperation part 31 a intermittently and regularly causes theauthentication communication apparatus 4 to work, the power consumptioncan be stably reduced in a planned manner. Moreover, since theauthentication communication apparatus 4 is caused to work for thepredetermined time periods, even in a case where a user originally hadno schedule to use the vehicle 2 but suddenly desires to use the vehicle2 due to change of the schedule, it is possible to use the vehicle 2.

On the other hand, in a case where the timer 31 c determines that thestopped time period has not passed (No in the step S108), the processreturns to the step S106 and the operation part 31 a keeps stopping theauthentication communication apparatus 4. While the timer 31 cdetermines that the stopped time period has not passed, the steps S106,S107 and S108 are repeatedly performed.

Next described is a process in which the acquisition part 31 b acquiresthe reservation data and shortens the working time period and thestopped time period of the authentication communication apparatus 4. Inthe foregoing process, in the case where the acquisition part 31 bdetermines that the reservation data has been acquired (Yes in the stepsS102 and S107), the timer 31 c looks up the interval table 33 c in thememory 33 (a step S109).

Once looking up the interval table 33 c, the timer 31 c determineswhether to shorten the working time period and the stopped time periodof the authentication communication apparatus 4, i.e., whether toshorten an interval between the adjacent working time periods of theauthentication communication apparatus 4 (a step S110). The timer 31 cdetermines whether to shorten those time periods based on the remainingtime period 331 c until the reserved use start time and on the workingtime period 332 c and the stopped time period 333 c in the intervaltable 33 c.

For example, in the interval table 33 c in FIG. 3, in a case where anappropriate interval pattern data set has been changed from the intervalpattern data set P2 to the interval pattern data set P3 as a result ofdecrease in the remaining time period 331 c until the reserved use starttime from six hours to three hours, the timer 31 c determines to shortenthe working time period 332 c and the stopped time period 333 c from tenminutes shown in the interval pattern data set P2 to five minutes shownin the interval pattern data set P3.

In a case where the timer 31 c determines to shorten the working timeperiod and the stopped time period (Yes in the step S110), the timer 31c shortens the working time period and the stopped time period based onthe interval table 33 c (steps S111 and S112).

In a case where the timer 31 c determines not to shorten the workingtime period and the stopped time period (No in the step S110) or wherethe timer 31 c shortens the working time period and the stopped timeperiod, the operation part 31 a causes the authentication communicationapparatus 4 to work (a step S113).

Once the operation part 31 a causes the authentication communicationapparatus 4 to work, the authentication part 31 d performsauthentication to verify the user of the vehicle 2 in the foregoingmethod (a step S114).

In a case where the authentication part 31 d determines that theauthentication has succeeded (Yes in the step S114), the unlocking part31 e unlocks the door of the vehicle 2 (the step S104).

On the other hand, in a case where the authentication part 31 ddetermines that the authentication has failed (No in the step S114), thetimer 31 c determines whether or not the working time period has passedsince the operation part 31 a causes the authentication communicationapparatus 4 to work (a step S115). In a case where the working timeperiod has been shortened because the step S111 has been executed, theoperation part 31 a determines whether or not the shortened working timeperiod has passed.

In a case where the timer 31 c determines that the working time periodhas not passed (No in the step S115), the process returns to the stepS113, and the operation part 31 a keeps the authentication communicationapparatus 4 working. Until the timer 31 c determines that the stoppedtime period has passed, the steps S113, S114 and S115 are repeatedlyperformed.

In a case where the timer 31 c determines that the working time periodhas passed (Yes in the step S115), the operation part 31 a stops theauthentication communication apparatus 4 (a step S116).

Once the operation part 31 a stops the authentication communicationapparatus 4, the timer 31 c determines whether or not the stopped timeperiod has passed since the operation part 31 a stopped theauthentication communication apparatus 4 (a step S117). In a case wherethe step S112 has been performed and thus the stopped time period hasbeen shortened, the operation part 31 a determines whether or not theshortened stopped time period has passed.

In a case where the timer 31 c determines that the stopped time periodhas not passed (No in the step S117), the process returns to the stepS116 and the operation part 31 a keeps stopping the authenticationcommunication apparatus 4. Until the timer 31 c determines that thestopped time period has passed, the steps S116 and S117 are repeatedlyperformed.

In a case where the timer 31 c determines that the stopped time periodhas passed (Yes in the step S117), the process returns to the step S109and then the step S109 and after are performed again.

As described above, based on whether or not the reservation data hasbeen acquired by the authentication apparatus 3 from the server 6, theinterval between the adjacent working time periods of the authenticationcommunication apparatus 4 can be changed. Especially, in a case wherethe reservation data has been acquired, as the scheduled use start timeof the vehicle 2 approaches, the authentication apparatus 3 shortens theinterval between the adjacent working time periods of the authenticationcommunication apparatus 4 based on the interval table 33 c. On the otherhand, in a case where the reservation data has not been acquired, theauthentication apparatus 3 is configured to cause the authenticationcommunication apparatus 4 to work at a constant interval, i.e.intermittently.

Next described are steps of a process that is performed after the doorof the vehicle 2 is unlocked by the unlocking part 31 e in the stepS104. FIG. 7 illustrates a flowchart showing the steps of the processafter the door of the vehicle 2 is unlocked by the unlocking part 31 e.

Once the unlocking part 31 e unlocks the door of the vehicle 2, theacquisition part 31 b sends, to the server 6, time at which the door hasbeen unlocked, i.e., time at which the user started using the vehicle 2(use start time) (a step S118). Once receiving the time, the server 6updates the reservation management database 63. It is possible tounderstand the time at which use of the vehicle 2 has been started, bylooking up the updated reservation management database 63.

Once the acquisition part 31 b sends the use start time, the operationpart 31 a determines whether or not the vehicle 2 is travelling (a stepS119).

In a case where the operation part 31 a determines that the vehicle 2 istravelling (Yes in the step S119), the operation part 31 a stops theauthentication communication apparatus 4 (a step S120) to decrease thepower consumption during travelling because there is no need of theauthentication process during travelling. Once the operation part 31 astops the authentication communication apparatus 4, the steps areperformed again from S119.

In a case where the operation part 31 a determines that the vehicle 2 isnot travelling, i.e., that the vehicle 2 is stopped (No in the stepS119), the operation part 31 a causes the authentication communicationapparatus 4 to work (a step S121). In the case where the vehicle 2 isstopped, the user may be temporarily outside the vehicle 2 for shopping,sightseeing, etc. In this case, the operation part 31 a stands by,keeping the authentication communication apparatus 4 working until theuser returns to the vehicle 2 and performs authentication.

Once the operation part 31 a causes the authentication communicationapparatus 4 to work, the timer 31 c looks up the reservation time data33 b in the memory 33 to determine whether or not a scheduled use endtime has arrived (a step S122).

In a case where the timer 31 c determines that the scheduled use endtime has not arrived (No in the step S122), the step S119 and after areperformed again. The steps S119 to S122 are repeatedly performed untilthe vehicle 2 is stopped and the scheduled use end time arrives.

On the other hand, in a case where the timer 31 c determines that thescheduled use end time has arrived (Yes in the step S122), the unlockingpart 31 e locks the door of the vehicle 2 (a step S123). In a case wherethe vehicle 2 is stopped and also where the scheduled use end time hasarrived, it can be determined that the user returns the vehicle 2 to apredetermined return place.

Once the unlocking part 31 e locks the door of the vehicle 2, theacquisition part 31 b sends to the server 6 time at which the door hasbeen locked, i.e., time at which the user ended to use the vehicle 2(use end time) (a step S124). Once receiving the time, the server 6updates the reservation management database 63. It is possible tounderstand the time at which use of the vehicle 2 has been ended, bylooking up the updated reservation management database 63. Once theacquisition part 31 b sends the use end time to the server 6, theprocess ends.

Next, a process performed by the server 6 will be described. FIG. 8illustrates a flowchart showing steps of the process performed by theserver 6. The process are repeated at a predetermine time cycle.

Once the process starts, the reception part 61 a determines whether ornot a request of the reservation to use the vehicle 2 is present, basedon the reservation system 51 in the office 5 (a step S201).

In a case where the reception part 61 a determines that the request ofthe reservation to use the vehicle 2 is present (Yes in the step S201),the reception part 61 a receives the user ID number, the vehicle numberand the reservation time that is the use start time and the use end timeincluded in the request of the reservation to use the vehicle 2 (stepsS202, S203 and S204).

Once the reception part 61 a receives the user ID number, etc., themanaging part 61 c stores the user ID number, the vehicle number and thereservation time received by the reception part 61 a into thereservation management database 63 (a step S205).

Once the managing part 61 c stores the user ID number, etc. into thereservation management database 63, the sender 61 b identifies theauthentication apparatus 3 installed in a vehicle corresponding to thevehicle number. The sender 61 b sends, to the identified authenticationapparatus 3, the reservation data including received data (a step S206).

In a case where the reception part 61 a determines that the request ofthe reservation to use the vehicle 2 is not present in the step S201based on the reservation system 51 in the office 5 (No in the stepS201), or in a case where the sender 61 b sends the reservation data tothe authentication apparatus 3 in the step S206, the reception part 61 areceives the use start time of the vehicle 2 sent from theauthentication apparatus 3 (a step S207).

Once the reception part 61 a receives the use start time and the use endtime, the managing part 61 c stores the two received time and updatesthe reservation management database 63 (a step S208).

Once the managing part 61 c updates the reservation management database63, the reception part 61 a receives the use end time of the vehicle 2sent from the authentication apparatus 3 (a step S209).

Once the reception part 61 a receives the use end time, the managingpart 61 c erases the data record L corresponding to the received use endtime from the reservation management database 63 (a step S210) to keepthe reservations in the reservation management database 63 updated.

As described above, the server 6 receives the data relating to thereservation from the reservation system 51 in the office 5 and alsoreceives the use start time and the use end time from the authenticationapparatus 3. Since the server 6 stores, updates and erases the datain/from the reservation management database 63, the latest reservationscan be always understood by looking up the reservation managementdatabase 63.

As described above, the authentication apparatus 3 in the firstembodiment changes the interval between the adjacent working timeperiods of the authentication communication apparatus 4, depending onwhether or not the reservation time data 33 b to use the vehicle 2 hasbeen acquired. Thus, the authentication communication apparatus 4 iscaused to work at an appropriate interval. In other words, power can besupplied to the authentication communication apparatus 4 at theappropriate interval.

Moreover, in the case where the reservation time data 33 b has beenacquired, the operation part 31 a shortens the interval between theadjacent working time periods of the authentication communicationapparatus 4 as the start time 631 c of scheduled use of the vehicle 2approaches. Thus, in a case where there is a long time before the starttime 631 c of the scheduled use of the vehicle 2, the power consumptionis decreased. On the other hand, as the start time 631 c of thescheduled use of the vehicle 2 approaches, the authentication apparatus3 is configured to verify the user 21 more immediately.

Moreover, in the case where the reservation time data 33 b has not beenacquired, the operation part 31 a causes the authenticationcommunication apparatus 4 to work intermittently. Thus, in a case wherethe vehicle 2 is surely used, while the power consumption is decreased,as the start time 631 c of the scheduled use of the vehicle 2approaches, the authentication apparatus 3 is configured to verify theuser 21 immediately. Further, in a case where there is no schedule touse the vehicle 2, the power consumption is decreased. However, if theschedule is changed, the authentication can be performed.

2. Second Embodiment

<2-1. Outline>

In the foregoing first embodiment, in the case where the reservationtime data 33 b has been acquired, as the start time 631 c of thescheduled use of the vehicle 2 approaches, the interval between theadjacent working time periods of the authentication communicationapparatus 4 is shortened. Moreover, in the case where the reservationtime data 33 b has not been acquired, the authentication communicationapparatus 4 is caused to work intermittently.

On the other hand, in a second embodiment, in a case where reservationtime data 33 b has been acquired, an authentication communicationapparatus 4 is kept working continuously. Moreover, in a case where thereservation time data 33 b has not been acquired, the authenticationcommunication apparatus 4 is caused to work intermittently.

Thus, in a case where the reservation time data 33 b has been acquiredand where a vehicle 2 is surely used, an authentication apparatus 3 isconfigured to verify a user 21 immediately. In a case where there is noschedule to use the vehicle 2, the power consumption is decreased.However, the authentication can be performed if the schedule is changed.A configuration and a process of the second embodiment partially includethe configuration and the process of the first embodiment. Therefore,differences from the first embodiment will be mainly described below.

<2-2. Configuration>

A configuration of the authentication apparatus 3 in the secondembodiment is the same as the configuration in the first embodiment.Therefore, the configuration of the authentication apparatus 3 in thesecond embodiment will not be described or illustrated.

<2-3. Process>

FIG. 9 illustrates a flowchart showing steps of the process performed bythe authentication apparatus 3 in the second embodiment. The steps ofthe process in the second embodiment include steps S301 and S302,instead of the steps S109 to S117 in the steps of the process in thefirst embodiment. Therefore, the steps S301 and S302 will be mainlydescribed below.

In the step S102 or the step S107, in a case where an acquisition part31 b determines that the reservation data has been acquired, theoperation part 31 a causes the authentication communication apparatus 4to work.

Once the operation part 31 a causes the authentication communicationapparatus 4 to work, an authentication part 31 d performs authenticationto verify a user of the vehicle 2 in the same method used in the firstembodiment (the step S302).

In a case where the authentication part 31 d determines that theauthentication has succeeded (Yes in the step S302), an unlocking part31 e unlocks a door of the vehicle 2 (the step S104).

On the other hand, in a case where the authentication part 31 ddetermines that the authentication has failed (No in the step S302), thestep S301 is performed again, and the operation part 31 a keeps theauthentication communication apparatus 4 working. The operation part 31a keep the authentication communication apparatus 4 working until theauthentication part 31 d determines that the authentication succeeded.In other words, the operation part 31 a keeps the authenticationcommunication apparatus 4 working continuously. In a case where theacquisition part 31 b determines that the reservation data has not beenacquired, the operation part 31 a alternately causes the authenticationcommunication apparatus 4 to work and stop. In other words, theoperation part 31 a causes the authentication communication apparatus 4to work intermittently.

As described above, the authentication apparatus 3 in the secondembodiment switches between a constant operation and an intermittentoperation of the authentication communication apparatus 4, depending onwhether presence and absence of the reservation time data 33 b. Thus, ina case where the reservation time data 33 b has been acquired and wherethe vehicle 2 is surely used, the authentication apparatus 3 isconfigured to verify the user 21 immediately. Moreover, in a case wherethere is no schedule to use the vehicle 2, the power consumption isdecreased by the intermittent operation. However, if the schedule ischanged, the authentication can be performed.

3. Third Embodiment

<3-1. Outline>

In a third embodiment, in a case where schedule data has been acquired,an operation part 31 a causes an authentication communication apparatus4 to work using a first interval. Moreover, in a case where the scheduledata has not been acquired, the operation part 31 a causes theauthentication communication apparatus 4 to work using a second intervallonger than the first interval.

Thus, in a case where the vehicle 2 is surely used, while the powerconsumption is decreased, an authentication apparatus 3 is configured toverify the user 21 immediately. Further, in a case where there is noschedule to use the vehicle 2, the power consumption is decreased.However, if the schedule is changed, the authentication can beperformed. A configuration and a process of the third embodimentpartially include the configuration and the process of the firstembodiment. Therefore, differences from the first embodiment will bemainly described below.

<3-2. Configuration>

FIG. 10 illustrates a block diagram of the authentication apparatus 3 inthe third embodiment. In addition to the configuration in the firstembodiment, a memory 33 of the authentication apparatus 3 in the thirdembodiment further stores addition time data 33 e.

The addition time data 33 e is a plurality of time data, for example,five minutes and three minutes, to extend the working time period andthe stopped time period of the authentication communication apparatus 4.

<3-3. Process>

FIG. 11 illustrates a flowchart showing steps of a process performed bythe authentication apparatus 3 in the third embodiment. The steps of theprocess in the third embodiment further include steps S401 to S404 ascompared to the steps of the process in the first embodiment. Therefore,the steps S401 to S404 will be mainly described blew.

In the case where an authentication part 31 d determines that theauthentication has failed in the step S103 (No in the step S103), atimer 31 c determines whether or not additional time periods have beenadded to the working time period and the stopped time period (the stepS401).

The timer 31 c determines that the additional time periods have not beenadded to the working time period and the stopped time period (No in thestep S401), the timer 31 c reads out the addition time data 33 e fromthe memory 33 (the step S402).

Once reading out the addition time data 33 e from the memory 33, thetimer 31 c adds an α time period, as the additional time period, to theworking time period (the step S403), and a β time period, the additionaltime period, to the stopped time period (the step S404). The α timeperiod and the β time period to be added as the additional time periodsare, for example, five minutes and ten minutes.

Once the timer 31 c adds the β time period, as the additional timeperiod, to the stopped time period or once the timer 31 c determinesthat the additional time periods have been added to the working timeperiod and the stopped time period in the step S401 (Yes in the stepS401), the step 105 and after are performed. After that, theauthentication communication apparatus 4 is caused to work and to stopin a time cycle added with the additional time periods. In other words,the authentication communication apparatus 4 is caused to work at aninterval longer by the additional time period, as compared to theinterval between the adjacent working time periods in the case where thereservation data has not been acquired.

As described above, in the case where the reservation data has notacquired, the authentication apparatus 3 in the third embodiment addsthe additional time periods to the working time period and the stoppedtime period. Therefore, in a case where there is no schedule of usingthe vehicle 2, more consumed power can be reduced. Even if the scheduleis changed and the vehicle 2 is used, since the authenticationcommunication apparatus 4 is not completely stopped, authentication canbe performed.

4. Modifications

The invention is not limited to the foregoing embodiments, but variousmodifications are possible. Examples of other modifications will bedescribed below. Any form of the embodiments described above and themodifications described below may be arbitrarily combined with oneanother.

In the foregoing embodiments, the interval between the adjacent workingtime periods of the authentication communication apparatus 4 isshortened as the scheduled time approaches by changing the intervalpattern data set P according to the remaining time period 331 c untilthe reserved use start time. When the interval is shortened, the workingtime period and the stopped time period are the same in each of theplurality of interval pattern data sets P. However, the working timeperiod and the stopped time period may not be the same.

Each of FIG. 12 to FIG. 14 illustrates an example of the modifiedinterval table 33 c. As shown in FIG. 12, a working time period 332 cmay be constant, for example, three minutes, for all of the intervalpattern data sets P, and only the stopped time period 333 c may beshortened according to a remaining time period 331 c. In a case wherethe working time period 332 c is constant, stable authentication can beperformed.

On the other hand, as shown in FIG. 13, the stopped time period 333 cmay be constant, for example, three minutes, for all of the intervalpattern data sets P, and only the working time period 332 c may beshortened according to the remaining time period 331 c. In a case wherethe stopped time period 333 c is constant, a stable amount of power isconsumed.

As shown in FIG. 14, time periods for the working time period 332 c andthe stopped time period 333 c may be different. For example, as shown inthe interval pattern data set P1 in FIG. 14, in a case where theremaining time period 331 c until the reserved use start time is 12hours or less, the working time period may be 45 minutes and the stoppedtime period may be thirty minutes. The working time period and thestopped time period are flexibly set according to use frequency based ona parking region of the vehicle 2 and the season so that powerconsumption is effectively reduced.

The working time period 332 c and the stopped time period 333 c may beshortened in proportion to the remaining time period 331 c. In otherwords, shortening rate may be changed.

As the reserved use start time approaches, an interval between theadjacent working time periods of the authentication communicationapparatus 4 can be shortened by a method using the examples of themodified interval tables 33 c shown in FIG. 12 to FIG. 14. Moreover, asa user comes closer to the vehicle 2, the authentication can be surelyperformed.

In the foregoing embodiments, as the scheduled time approaches, theinterval between the adjacent working time periods of the authenticationcommunication apparatus is shortened by changing the interval patterndata set P according to the remaining time period 331 c until thereserved use start time. However, in a case where authentication is notperformed even when the reserved use start time has arrived, the workingtime period 332 c and the stopped time period 333 c may be graduallylengthened according to elapsed time from the reserved use start time.

FIG. 15 illustrates an example of a modified interval table 33 c forlengthening the working time period 332 c and the stopped time period333 c according to an elapsed time period 334 c from the reserved usestart time. The interval table 33 c in FIG. 15 includes interval patterndata sets P8 to P14. For example, in a case where the elapsed timeperiod 334 c from the reserved use start time is five minutes or more,the working time period 332 c of ten seconds and the stopped time period333 c of five seconds are stored as the interval pattern data set P8.Moreover, in a case where the elapsed time period 334 c from thereserved use start time is ten minutes or more, the working time period332 c of thirty seconds and the stopped time period 333 c of thirtyseconds are stored as the interval pattern data set P9. As describedabove, since the working time period 332 c and the stopped time period333 c are lengthened according to the elapsed time period 334 c, in thecase where authentication is not performed even when the reserved usestart time has arrived, as longer time has passed from the reserved usestart time, i.e., as a possibility of no use of the vehicle 2 becomeshigher, the working time period 332 c and the stopped time period 333 care lengthened. Therefore, the convenience of the authenticationapparatus 3 is enhanced while the consumed power is reduced.

The authentication communication apparatus 4 may be caused to workcontinuously in a predetermined time period from the reserved use starttime because there is a high possibility that the user uses the vehicle2 immediately in the predetermined time period from the reserved usestart time. The predetermined time period is, for example, ten minutes.

In the foregoing embodiments, in the case where the reservation timedata is stored, authentication is performed. However, even ifreservation time data to use the vehicle 2 is not stored but in a casewhere the user ID number is stored, authentication may be performed. Inthis case, a user having a stored user ID number, i.e., an authorizeduser, may use a vehicle anytime even without reservation so thatconvenience is enhanced.

The “reserved use start time” in the foregoing embodiments may be timeor may be a remaining time period until use start time.

In the foregoing embodiments, the authentication apparatus 3 includesthe interval table 33 c. However, a server 6 may include the intervaltable 33 c. The server 6 may give an instruction of the working timeperiod 332 c and the stopped time period 333 c to the authenticationapparatus 3. In this case, a capacity of the memory 33 included in theauthentication apparatus 3 may be saved.

In the foregoing embodiments, the vehicle 2 is a taxi, a truck, orconstruction machinery. However, the vehicle 2 may be a vehicle thattravels in a short distance for shopping, commuting or sightseeing.

In the foregoing embodiments, the reservation system 51 receives therequest of the reservation to use the vehicle 2 from the user. The usermay visit the office 5 to make the request of the reservation to use thevehicle 2 with the reservation system 51. Moreover, the user maycommunicate contents of the reservation to staff of the office 5 overphone or via an email, using the mobile device 7, and then the staff ofthe office 5 may input the reservation with the reservation system 51.Further, the user may use the mobile device 7 to operate the reservationsystem 51 via wireless communications.

In the foregoing embodiments, in the case where the unlocking part 31 elooks up the authentication flag and determines that the authenticationflag is on, the unlocking part 31 e unlocks the door of the vehicle 2.Once the unlocking part 31 e determines that the authentication flag ison, the unlocking part 31 e may unlock a lock of a steering wheel,unlock the luggage door and/or start of an engine of the vehicle 2, inaddition to unlocking the door of the vehicle 2.

In the third embodiment, in the case where the reservation data has beenacquired, the additional time period is added to the working time periodand the stopped time period. However, the additional time period may notbe added to the working time period and the stopped time period. In thecase where the reservation data has not to acquired, the additional timeperiod may be subtracted from the working time period and the stoppedtime period. In this case, too, in a case where the scheduled time hasbeen acquired, the operation part 31 a causes the authenticationcommunication apparatus 4 to work using the first interval and in a casewhere the scheduled time has not been acquired, the operation part 31 acauses the authentication communication apparatus 4 to work using thesecond interval that is longer than the first interval.

In the foregoing embodiments, the object to be reserved to use is avehicle, such as a car. However, the vehicle may be a motorcycle, atrain, an airplane, a ship, a boat or other transport machinery besidesa vehicle. The vehicle includes a vehicle for civilian use and formilitary use, and a vehicle for private use and for business use.Moreover, the object is installed not only on the vehicle but also on anelevator or an escalator and another lift. In short, the object may beanything for which a reservation can be made to use and that requiresauthentication of a user.

In the third embodiment, the addition time data 33 e is time data forlengthening the working time period and the stopped time period of theauthentication communication apparatus 4, and the addition time data 33e may be five minutes, for example. However, the addition time data 33 emay not be five minutes. The addition time data 33 e may be changeddepending on the remaining time period 331 c until the reserved usestart time. For example, the addition time data 33 e may be ten minutesin a case where the remaining time period 331 c until the reserved usestart time is twelve hours or less and six hours or less. Similarly, ina case where the remaining time period 331 c is three hours or less andone hour or less, the addition time data 33 e may be five minutes.Similarly, in a case where the remaining time period 331 c is thirtyminutes or less and ten minutes or less, the addition time data 33 e maybe one minute.

In the foregoing embodiments, the function described as one block is notnecessarily implemented by a single physical element, but may beimplemented by separate physical elements. In the foregoing embodiments,the function described as a plurality of blocks may be implemented by asingle physical element. Further, a process relating to one arbitraryfunction may be shared and implemented by apparatuses inside and outsidethe vehicle, and the function may be implemented as a whole byexchanging information via communications between those apparatuses. Forexample, the authentication apparatus 3 and the authenticationcommunication apparatus 4 may be realized by one constituent element.Further, the office 5 and the server 6 may be realized by oneconstituent element.

Moreover, in the foregoing embodiments, the configuration described ashardware may be implemented by software, and a function described assoftware may be implemented by hardware. Also, a function of hardware orsoftware may be implemented by the cooperation of software and hardware.

While the invention has been shown and described in detail, theforegoing description is in all aspects illustrative and notrestrictive. It is therefore understood that numerous othermodifications and variations can be devised without departing from thescope of the invention.

What is claimed is:
 1. An authentication apparatus comprising: atransceiver that performs wireless communications via an antenna; and acontroller configured to: cause the transceiver to operateintermittently by setting a working time period of the transceiver, thetransceiver seeking to obtain verification data of a user during theworking time period; and acquire a scheduled use start time of an objectassociated with the authentication apparatus, the user seeking to usethe object, wherein the controller changes an interval between adjacentworking time periods of the transceiver depending on whether or not thescheduled use start time has been acquired by the controller.
 2. Theauthentication apparatus according to claim 1, wherein in a case wherethe scheduled use start time has been acquired by the controller, thecontroller shortens the interval between the adjacent working timeperiods of the transceiver as the scheduled use start time approaches.3. The authentication apparatus according to claim 1, wherein in a casewhere the scheduled use start time has not been acquired by thecontroller, the controller sets the interval between the adjacentworking time periods of the transceiver to a constant time period. 4.The authentication apparatus according to claim 1, wherein in a casewhere the scheduled use start time has been acquired by the controller,the controller causes the transceiver to operate continuously, and in acase where the scheduled use start time has not been acquired by thecontroller, the controller causes the transceiver to operateintermittently.
 5. The authentication apparatus according to claim 1,wherein in a case where the scheduled use start time has been acquiredby the controller, the controller causes the transceiver to operateusing a first interval, and in a case where the scheduled use start timehas not been acquired by the controller, the controller causes thetransceiver to operate using a second interval longer than the firstinterval.
 6. The authentication apparatus according to claim 1, whereinthe controller sets the working time period and a non-working timeperiod of the transceiver.
 7. An authentication method comprising thesteps of: (a) performing wireless communications via an antenna of atransceiver to obtain verification data by which to verify a user of anobject associated with an authentication apparatus that has thetransceiver; (b) causing, by a controller of the authenticationapparatus, the transceiver to operate intermittently by setting aworking time period of the transceiver; and (c) acquiring, by thecontroller, a scheduled use start time of the object, wherein the step(b) changes an interval between adjacent working time periods of thetransceiver depending on whether or not the scheduled use start time hasbeen acquired by the controller.
 8. The authentication method accordingto claim 7, wherein in a case where the scheduled use start time hasbeen acquired by the controller, the step (b) shortens the intervalbetween the adjacent working time periods of the transceiver as thescheduled use start time approaches.
 9. The authentication methodaccording to claim 7, wherein in a case where the scheduled use starttime has not been acquired by the controller, the step (b) sets theinterval between the adjacent working time periods of the transceiver toa constant time period.
 10. The authentication method according to claim7, wherein in a case where the scheduled use start time has beenacquired by the controller, the step (b) causes the transceiver tooperate continuously, and in a case where the scheduled use start timehas not been acquired by the controller, the step (b) causes thetransceiver to work intermittently.
 11. The authentication methodaccording to claim 7, wherein in a case where the scheduled use starttime has been acquired by the controller, the step (b) causes thetransceiver to operate using a first interval, and in a case where thescheduled use start time has not been acquired by the controller, thestep (b) causes the transceiver to operate using a second intervallonger than the first interval.
 12. The authentication method accordingto claim 7, wherein the step (b) sets the working time period and anon-working time period of the transceiver.
 13. An authentication systemthat includes an authentication apparatus and a server, wherein theserver includes: a memory in which is stored information about a userwho desires to use an object and a scheduled use start time by the userof the object; a transmitter that sends, to the authenticationapparatus, user data about the user and the scheduled use start time,and the authentication apparatus includes: a controller that acquiresthe user data and the scheduled use start time from the server; and atransceiver that performs wireless communication via an antenna toobtain verification data that is used to verify the user based on theuser data, wherein the controller causes the transceiver to operateintermittently by setting a working time period of the transceiver, thetransceiver operating during the working time period, and the controllerchanges an interval between adjacent working time periods of thetransceiver depending on whether or not the scheduled use start time hasbeen acquired by the controller.
 14. The authentication system accordingto claim 13, wherein in a case where the scheduled use start time hasbeen acquired by the controller, the controller shortens the intervalbetween the adjacent working time periods of the transceiver as thescheduled use start time approaches.
 15. The authentication systemaccording to claim 13, wherein in a case where the scheduled use starttime has not been acquired by the controller, the controller sets theinterval between the adjacent working time periods of the transceiver toa constant time period.
 16. The authentication system according to claim13, wherein in a case where the scheduled use start time has beenacquired by the controller, the controller causes the transceiver tooperate continuously, and in a case where the scheduled use start timehas not been acquired by the controller, the controller causes thetransceiver to operate intermittently.
 17. The authentication systemaccording to claim 13, wherein in a case where the scheduled use starttime has been acquired by the controller, the controller causes thetransceiver to operate using a first interval, and in a case where thescheduled use start time has not been acquired by the controller, thecontroller causes the transceiver to operate using a second intervallonger than the first interval.
 18. The authentication system accordingto claim 13, wherein the controller sets the working time period and anon-working time period of the transceiver.
 19. A non-transitorycomputer-readable recording medium that stores a program to be executedby a computer to perform authentication, the program causing thecomputer to execute the steps of: (a) performing wireless communicationsvia an antenna of a transceiver associated with the computer to obtainverification data by which to verify a user of an object associated withthe computer; (b) causing the transceiver to operate intermittently byseeking a working time period of the transceiver; and (c) acquiring ascheduled use start time of the object, wherein the step (b) changes aninterval between adjacent working time periods of the transceiverdepending on whether or not the scheduled use start time has beenacquired by the computer.
 20. The non-transitory computer-readablerecording medium according to claim 19, wherein in a case where thescheduled use start time has been acquired by the computer, the computershortens the interval between the adjacent working time periods of thetransceiver as the scheduled use start time approaches.