Key system

ABSTRACT

A key system using an ID card which can output ID data is combined with a mechanical ignition key. The key system is provided with a transceiver for receiving ID data from the ID card, a flash memory for storing the ID data and a CPU. When the stored ID data in the flash memory coincides with the ID card data obtained by the transceiver and operation is performed with the ignition key, the CPU enables the operation of an engine start. Furthermore, if a preset protection time has elapsed since the CPU recognizes the coincidence of the stored and ID card data, the operation by the ignition key is nullified.

FIELD OF THE INVENTION

The present invention relates to a key system which is used in anignition key for use in a car, a motorcycle, or the like, or anoperation key to a door for use at a building entrance, a storehouse, orthe like or for a computer system.

BACKGROUND OF THE INVENTION

In these days, it is not unusual that a family owns a plurality of carsor motorcycles. Since the family members have a plurality of cars ormotorcycles, they also have a plurality of keys for operating each car.Moreover, when they go outside by car, they carry a house front door keyand the like as well as a car key.

However, it is troublesome to own a plurality of keys in this manner andfurther to often confirm which key is to be used.

Moreover, in some case, the key is carelessly forgotten to be removed.In a delivery car or the like, the key is sometimes intentionally keptwithout being removed because it is troublesome to repeatedly stop/startthe engine. In this case, the car may be stolen. Furthermore, if thestolen car is used in a crime, it may cause trouble for other people aswell as the damage of the car theft.

OBJECT AND SUMMARY OF THE INVENTION

Wherefore, an object of the present invention is to provide a key systemwhich can be easily managed and also has high safety.

To achieve the object, a key system uses, as a key, an ID card foroutputting ID output signals including ID data to the outside. The keysystem is provided with ID signal receiving means for receiving IDoutput signals transmitted from the ID card; ID extracting means forextracting ID data from ID output signals received by the ID signalreceiving means; ID storage means for storing ID data beforehand;coincidence determination means for determining whether or not there isthe ID data coinciding with the ID data extracted by the ID extractingmeans; operation enabling means for making effective equipment unlockingor equipment operation when the coincidence determination means admitscoincidence of both ID data. In the key system, a driver's license, apassport, or one of other identity proving ID cards that can univocallyspecify an owner's identity is used. The system is further provided witha memory content change means for adding/deleting memory content of theID storage means.

In the key system, the driver's license, the passport or one of other IDcards which can emit ID output signals is used as the key. ID outputsignals emitted from such an ID card are received, the ID data includedin the signals is read, it is determined to whose ID data the ID datacorresponds, and operation of the key system is permitted only when theID data belongs to a person who is permitted the operation thereof.

As the information for univocally specifying the owner's identity, name,birthday, blood type, sex, license registration number, member number,and the like are used.

In this manner, different from the conventional key system,determination is not based on whether or not the key is owned. In thepresent key system, the driver's license, the passport or one of otheridentity proving ID cards is used to determine whether or not a personis permitted. Such an ID card is very difficult to be copied or forged.Therefore, it is substantially impossible to prepare a duplicate keywithout permission of the key system manager and perform operationwithout permission. Therefore, the key system has very high safety.Moreover, if ID data of a certain person is stored (registered) in aplurality of key systems, the person can perform unlocking and otheroperations for a plurality of equipment with only one ID card.Therefore, a purse or a pocket can be kept in order.

In addition to the driver's license and the passport, in the nearfuture, a credit card, an electronic money card, a health insurancecard, and the like provided with an IC chip which can emit ID outputsignals to the outside are to be issued. These can be used as theaforementioned identity proving ID cards. Alternatively, a card issuedto each citizen or each resident by the government, a local publicentity, or the like may be used.

Moreover, according to the key system when the coincidence determinationmeans admits the coincidence of both ID data in the key system theequipment unlocking or equipment operation is performed.

In the key system, when ID data of a person who is permitted to performoperation is confirmed, the equipment is unlocked or operated.

With the constitution, for example, in order to permit a plurality ofpeople to enter one room, the key system is applied to a roomentrance/exit door, and ID data of permitted people are registeredbeforehand. By determining coincidence/nonconformity of ID data, aperson is permitted to enter/exit or prohibited from entering/exiting.Furthermore, when business is finished, in order to prohibitentering/exiting from the room, ID data of the corresponding person maybe deleted from the key system. Therefore, the system is convenient fora room manager because he/she does not need to pass keys to a pluralityof people or collect the keys from them. Moreover, if the ID data of acertain person is registered in a plurality of door key systems, theperson can go into or out of a plurality of rooms with only one ID card,and key management is easy. Therefore, by applying the system to a hotelroom door and registering ID data of a person who has reserved the room,the person can use the room without receiving a key at the front desk.

Additionally, the key system may be applied to a condominium front door.In this case, means may be provided for storing a person who has openedthe door and a time when the door has been opened. With theconstitution, a person other than registered residents cannot open thedoor. Also, it can be managed who entered the condominium and when itwas. Therefore, the safety can be enhanced. Furthermore, the system maybe constituted in such a manner that the moment someone enters thecondominium, the room interphone, telephone, or the like becomesconnected.

Moreover, the key system may be applied to an entrance of the placewhere an admission fee is to be paid, for example, an amusement park, amembership system restaurant, or the like. In this case, when a creditcard or an electronic money card is used as an ID card, the fee can becollected simultaneously with entrance. Moreover, by providing the meansfor storing the time and the person who has entered as aforementioned,customer management can be facilitated.

The key system may be applied to a television set installed in a hotelor inn guest room. The system may be constituted in such a manner thatprojection is performed by determining whether or not a person who haspresented the ID card is over eighteen years old. With the constitution,there is no possibility that children watch a program for adults only.

Similarly, when the key system is applied to an entrance to a pachinkoparlor or each pachinko machine, there is no possibility that childrenillegally play pachinko. Additionally, by providing the means forstoring the time and the person who has entered as aforementioned, thecustomer management can be facilitated.

Moreover, according to the key system an ID card and a physical key areboth used in the key system. When the coincidence determination meansadmits the coincidence of both ID data and further physical keyoperation is performed, the equipment unlocking or operation isperformed.

In the key system, only when the ID data of a person who is permitted tooperate and the physical key are both present, operation can beperformed. Specifically, the key system is locked up double.

As aforementioned, since operation cannot be performed until there areprovided both the ID card and the key, a very high safety is assured.Therefore, for example, when the key system is applied to a safe lockeddouble with a key and a dial in such a manner that the safe cannot openuntil the ID data of all the managers are entered, safety is enhancedbecause the presence of the key, the coincidence of dial numbers, andthe entry of ID data of all the managers form conditions for unlockingthe safe.

Moreover, according to the key system, the key system is furtherprovided with time setting means for setting an operation effective timefor which key operation is effective. The key operation is effectiveuntil the operation effective time set by the time setting means elapsesafter the coincidence determination means admits the coincidence of bothID data.

In the key system, when the ID data of the person who is permitted tooperate is recognized and the operation effective time is set, operationcan be performed only with the key before the operation effective timeelapses.

In the key system, when the person who is permitted to operate sets theoperation effective time and passes the key to a person who is notpermitted to operate, the person who is not permitted to operate canalso be allowed to temporarily operate the system.

According to the key system which is a specific application example, theID card is a driver's license, the key is an ignition key, and theequipment is a car, a motorcycle, or one of other vehicles in the keysystem.

In the key system, the key system is applied to a car or the like.

In the key system, the operation of the ignition key is not effectiveuntil the presence of the driver's license is confirmed. Therefore, evenif the ignition key is lost, the car or the like is prevented from beingdriven by a finder without permission. Therefore, safety is assured.Additionally, by setting the operation effective time as aforementioned,even if the car or the like parked/stopped while the engine is kept onshould be stolen, a secondary damage caused by a crime or a trafficaccident can be prevented. Furthermore, if there is no driver's license,the car cannot be driven. Therefore, the driving without carrying thedriver's license or the illicit driving can be prevented.

Moreover, by providing means for storing the age limitation of aninsurance for a car, for example, storing information that drivers under26 are not covered by the insurance, the system may be constituted insuch a manner that a person is prohibited from driving if the age of theperson stored in the driver's license is not covered by the insurance.Alternatively, the system may be constituted in such a manner that it isdetermined from an accident history stored in a driver's license whetheror not it is appropriate to permit a person to drive. As the case maybe, the person is prohibited from driving.

Furthermore, when there is provided means for storing a person who hasdriven a car and the time, employee management can be facilitated in ataxi company or a transportation company.

DETAILED DESCRIPTION OF THE INVENTION

An example of the mode of practicing the present invention will now bedescribed with reference to the drawings. A case where the key system ofthe present invention is applied to a car is herein illustrated.

First, the constitution of the key system will be described.

In addition to an ignition key, the present key system uses a master IDcard which is affixed to each car and which can transmit ID data to theoutside and a driver's license which can transmit ID data of a driver'slicensee to the outside, so that locking/unlocking or the like isperformed. The ID card and the driver's license will be detailed later.

A control unit 1 for administering the operation of the present keysystem is, as shown in FIG. 3, attached in the vicinity of a steeringwheel 11 at a driver's seat in the car. A monitor 2 for displaying aresponse, a warning, and the like from the key system is attachedadjacent to the control unit 1.

As shown in FIG. 1, the control unit 1 is provided with a key operationunit 100 for setting an operation mode as described later or performingother operations, and an ID card interface unit 200 for receiving IDdata from the master ID card and the driver's license (hereinafter, bothreferred to simply as the ID card 400 as the case may be). The ID cardinterface unit 200 is disposed under the key operation unit 100.

The key operation unit 100 is provided with a main face plate 110, anoperation mode selection ring 120, an ignition key face plate 130, andan ignition key position indicating plate 140. Additionally, the mainface plate 110, the operation mode selection ring 120, the ignition keyface plate 130, and the ignition key position indicating plate 140 havesurfaces on substantially the same plane. Moreover, the operation modeselection ring 120 and the ignition key position indicating plate 140have their rotation axis centers in the center of the main face plate110.

The main face plate 110 constitutes a surface plate of the key operationunit 100, and has on its surface a protection time sign 111, aprotection sign 112, a usual sign 113, a combination sign 114, aregistration sign 115 and a deletion sign 116.

The operation mode selection ring 120 is used for selecting theoperation mode of the car, and provided with an indicating protrusion121 for pointing to the signs 111 to 116 arranged on the main face plate110. Additionally, a state in which the indicating protrusion 121 pointsto the protection time sign 111 is referred to as “protection timesetting state”. Similarly, states in which the indicating protrusion 121points to the signs 112 to 116 are referred to as “protection modeselecting state”, “usual mode selecting state”, “combination modeselecting state”, “registration mode selecting state”, and “deletionmode selecting state”, respectively. The operation-modes described abovewill be detailed later.

The ignition key face plate 130 has substantially the same structure asthe known structure, and has OFF sign 132, ACC sign 133, ON sign 134,START sign 135 and, additionally, SELECT sign 131 inscribed on itssurface in the same manner as in the known structure.

The ignition key position indicating plate 140 constitutes a surfaceplate of a known ignition key cylinder, and has an alternative ignitionkey member 141 protruded on its surface. Furthermore, the alternativeignition key member 141 is provided with an insertion port 142 throughwhich the ignition key is inserted. When the ignition key is insertedinto the insertion port 142 and rotated, the ignition key positionindicating plate 140 and the alternative ignition key member 141 arealso rotated together with the ignition key cylinder. Moreover, at theusual time, when the ignition key is not inserted in the insertion port142, the ignition key position indicating plate 140 cannot be rotated.Hereinafter, a state in which the tip end of the alternative ignitionkey member 141 points to SELECT sign 131 is referred to as “SELECTstate”. Similarly, states in which the tip end points to the signs 132to 135 are referred to as “OFF state”, “ACC state”, “ON state”, and“START state”, respectively.

The ID card interface unit 200 is constituted of a main face plate 210and an ID input switch 220. Additionally, the ID input switch 220 isformed in a push button shape.

Moreover, as shown in FIG. 2, the control unit 1 is provided inside witha CPU 311, a ROM 312, a RAM 313, a flash memory 314, input interfaces321 to 323, output interfaces 331 to 333, an input/output interface 341,a relay unit 351, and a transceiver 361.

The CPU 311 arithmetically processes the information obtained from thememory and the interfaces, and transmits results to the memory and theinterfaces. The ROM 312 stores each processing program of the key systemand other information. The RAM 313 temporarily stores the results of theoperation of the CPU 311 and the like. The flash memory 314 is, as shownin FIG. 4, divided into a master ID data area 314A, a registration IDdata area 314B, an operation mode area 314C, a protection time area314D, an engine start prohibition flag area 314E and the like, to storeID data of the master ID card, ID data of the person who is permitted tooperate the key system, and the like.

The input interface 321 converts the state of the operation modeselection ring 120, i.e., to which of the signs 111 to 116 theindicating protrusion 121 is pointing, into an electric signal. Theinput interface 322 converts the determination of whether or not the IDinput switch 220 is pushed into an electric signal. The input interface323 converts the state of the ignition key position indicating plate140, i.e., to which of the signs 131 to 135 the tip end of thealternative ignition key member 141 is pointing, into an electricsignal.

Following an instruction of the CPU 311, the output interface 331energizes any one of relay coils RC1, RC2 and RC3 of the relay unit 351.The output interface 332 transmits the instruction of the CPU 311 to anengine controller EC. The output interface 333 transmits the informationsent from the CPU 311 to the monitor 2. The input/output interface 341converts ID data or the like into an appropriate format to transmit thedata to the transceiver 361, and converts ID data or the like receivedfrom the transceiver 361 into an appropriate format to transmit the datato the CPU 311. The relay unit 351 has a known structure in which arelay contact is closed by excitation of the relay coil. The relay coilRC1 is associated with a relay contact RT1, the relay coil RC2 isassociated with a relay contact RT2, and the relay coil RC3 isassociated with a relay contact RT3. Additionally, the relay contactsRT1, RT2 and RT3 are arranged in parallel with a known ignition switchIS which is disposed between a [+] terminal (battery) and ACC, ON andSTART terminals. The transceiver 361 communicates with an ID card 400 toreceive ID data.

Moreover, as shown in FIG. 5, the ID card 400 is provided inside with aCPU 411, a ROM 412, a RAM 413, a flash memory 414, an input/outputinterface 421, a transceiver 431, and a power supply circuit 441. Thetransceiver 431 communicates with the transceiver 361 in the controlunit 1. The power supply circuit 441 receives a power carrying wave sentfrom a power carrier (not shown) disposed in the control unit 1, andsupplies the power to each section in the ID card 400.

The control unit 1 communicates with the ID card 400 in the followingmanner. The communication process will be described with reference to aflowchart of FIG. 6.

First, the CPU 311 transmits an instruction to the power carrier (notshown) disposed in the control unit 1, so that power carrying waves aretransmitted to the ID card 400 (S610). Subsequently, the CPU 311 sendsan instruction to the transceiver 361 via the input/output interface 341to transmit a signal to the ID card 400 requesting transmission of IDdata (S620). And then, it waits for return data including ID data fromthe ID card 400.

If there is a return from the ID card 400 (S630: YES), the ID data isextracted from the return data (S640), and the extracted ID data isstored in RAM 313 or the flash memory 314 (S650). Subsequently, the CPU311 transmits an instruction to the monitor 2 via the output interface333 to display a message that it has succeeded in communication (S660),thereby ending the process.

If the predetermined time elapses (S670:YES) while there is no returnfrom the ID card 400 (S630:NO), the CPU 311 transmits an instruction tothe monitor 2 via the output interface 333 to display a message that ithas failed in communication (S690), thereby ending the process.

The operation of the entire key system will next be described.

First, the process of main routine in the present key system will bedescribed based on a flowchart of FIG. 7.

First, the CPU 311 determines via the input interface 323 whether or notthe ignition key position indicating plate 140 is in SELECT state(S705). Subsequently, if the ignition key position indicating plate 140is in SELECT state (S705:YES), the CPU 311 determines via the inputinterface 321 whether or not the operation mode selection ring 120 is inthe protection time setting state (S710). Subsequently, if the operationmode selection ring 120 is in the protection time setting state(S710:YES), the CPU 311 executes a protection time setting process asdescribed later (S715). If the operation mode selection ring 120 is notin the protection time setting state (S710:NO), the CPU 311 executes anoperation mode selection process as described later (S720).Additionally, if the ignition key position indicating plate 140 is notin SELECT state (S705:NO), the CPU 311 executes neither the protectiontime setting process nor the operation mode selection process.

Subsequently, the CPU 311 reads the memory content of the operation modearea 314C in the flash memory 314 (S725), and determines which operationmode is at present selected (S730, S740, S750, S760). If the combinationmode is presently selected (S730:YES), the combination mode describedlater is executed (S735). Similarly, if the presently selected operationmode is a protection mode, a registration mode, a deletion mode, or anormal mode (S740:YES, S750:YES, S760:YES, S760:NO), the protectionmode, the registration mode, the deletion mode, or the normal mode isexecuted as described later (S745, S755, S765, S770).

The operation mode selection process will next be described based on aflowchart of FIG. 8.

First, the CPU 311 transmits an instruction to the monitor 2 via theoutput interface 333 to display a message that the operation modeselection process is being executed (S805). Subsequently, the CPU 311instructs the monitor to display a message requesting for presentationof the master ID card (S810). And then, it waits until the ID inputswitch 220 is pushed.

If the ID input switch 220 is pushed (S815:YES), the CPU 311 executesthe communication process described above (S820). Subsequently, the CPU311 compares the master ID data obtained by executing the communicationprocess with the master ID data stored in the master ID data area 314Ain the flash memory 314 (S825). If both master ID data coincide witheach other (S825:YES), the CPU 311 acquires, via the input interface321, which of the protection mode selection state, the normal modeselection state, the combination mode selection state, the registrationmode selection state and the deletion mode selection state the operationmode selection ring 120 is in(S830). Subsequently, the correspondingoperation mode is stored in the operation mode area 314C in the flashmemory 314 (S835). Subsequently, the CPU 311 sends an instruction to themonitor 2 via the output interface 333 to display a message that it hassucceeded in selection of the operation mode (S840). Then, by resettingthe engine start prohibition flag area 314E in the flash memory 314, theCPU 311 enables the engine to start (S845), thereby ending the process.Additionally, an engine start prohibition flag will be describedhereinafter in detail.

If the predetermined time elapses (S850:YES) while the ID input switch220 is not pushed (S815:NO), or if both master ID data do not coincidewith each other at S825 (S825:NO), the CPU 311 sends an instruction tothe monitor 2 via the output interface 333 to display a message that ithas failed in selection of the operation mode (S855), ending theprocess.

Each operation mode process will next be described.

First, the normal mode will be described. In the normal mode, as in aconventional car, a person who owns the ignition key is permitted tooperate the car, and any processing is not performed.

When the normal mode is executed, a message is displayed on the monitor2 that the normal mode is being executed and that the car can beoperated with the ignition key (FIG. 9, S910). The ignition key isinserted into the insertion port 142 and rotated to obtain START state,and the car is operated in the same manner as the conventional car.

The combination mode will next be described. In the combination mode,not only the person who owns the ignition key but a person whose ID datais registered in the registration ID data area 314B in the flash memory314 is permitted to operate the car. The combination mode process willbe described based on a flowchart of FIG. 10.

When the combination mode is executed, the CPU 311 transmits aninstruction to the monitor 2 via the output interface 333 to display themessage that the combination mode is being executed and that the car canbe operated with the ignition key or the registered driver's license(S1010). Subsequently, it waits until the ID input switch 220 is pushed.

The combination mode is the same as the normal mode until the ID inputswitch 220 is pushed (S1020:NO), and only the operation with theignition key is permitted.

If the ID input switch 220 is pushed (S1020:YES), the CPU 311 executesthe communication process described above (S1030). Subsequently; the CPU311 compares the ID data obtained by executing the communication processwith the ID data stored in the registration ID data area 314B in theflash memory 314 (Sl040). If coincident ID data is found (S1040:YES),the CPU 311 gives a permission in such a manner that the ignition keyposition indicating plate 140 can be rotated by manually turning thealternative ignition key member 141 even if the ignition key is notinserted in the insertion port 142 (S1050). Subsequently, the CPU 311transmits an instruction to the monitor 2 via the output interface 333to display a message that the rotation of the ignition key positionindicating plate 140 is permitted (S1060), ending the process.

If no coincident ID data is found (S1040:NO), the CPU 311 transmits aninstruction to the monitor 2 via the output interface 333 to display amessage that only the operation with the ignition key is possible(S1070), ending the process.

After permission is given at S1050 of the combination mode, the engineis started as follows: First, by manually turning the alternativeignition key member 141, the ignition key position indicating plate 140is displaced into START state. Then, the CPU 311 obtains thecorresponding signal from the input interface 323. Subsequently, the CPU311 transmits an instruction to the output interface 331, so that therelay coil RC3 of the relay unit 351 is energized, and the relay contactRT3 is closed. In this case, [+] terminal is connected to STARTterminal, an electric power is supplied to engine sections and a starter(not shown), and the engine is started. When the alternative ignitionkey member 141 is released at an appropriate time, the ignition keyposition indicating plate 140 is rotated by a spring (not shown) anddisplaced into ON state. In ON state, the relay coil RC2 is energizedinstead of the relay coil RC3, the relay contact RT2 is accordinglyclosed, [+] terminal is connected to ON terminal, and electric power issupplied to the engine sections and accessory sections. Moreover, whenthe alternative ignition key member 141 is manually rotated into ACCstate, the relay contact RT1 is closed by energizing the relay coil RC1,and electric power is supplied to the accessory sections.

The protection time setting process will next be described based on aflowchart of FIG. 11. Additionally, the protection time will bedescribed in description of the protection mode.

First, the CPU 311 transmits an instruction to the monitor 2 via theoutput interface 333 to display a message that the protection timesetting process is being executed (S1105). Subsequently, another messageis allowed to be displayed requesting for presentation of the master IDcard (S1110). Then, the CPU waits until the ID input switch 220 ispushed.

If the ID input switch 220 is pushed (S1115:YES), the CPU 311 executesthe aforementioned communication process (S1120). Subsequently, the CPU311 compares the master ID data obtained by executing the communicationprocess with the master ID data stored in the master ID data area 314Ain the flash memory 314 (S1125). If both master ID data coincide witheach other (S1125:YES), the CPU 311 acquires via the input interface 321to which protection time sign the indicating protrusion 121 of theoperation mode selection ring 120 is pointing (S1130). The correspondingprotection time is then stored in the protection time area 314D in theflash memory 314 (S1135). Subsequently, the CPU 311 transmits aninstruction to the monitor 2 via the output interface 333 to display amessage that it has succeeded in setting the protection time (S1140),ending the process.

If the predetermined time elapses (S1150:YES) while ID input switch 220is not pushed (S1115:NO), or if both master ID data do not coincide witheach other at S1125 (S1125:NO), the CPU 311 transmits an instruction tothe monitor 2 via the output interface 333 to display a message that ithas failed in setting the protection time (S1155), ending the process.

The protection mode will next be described. In the protection mode, theperson who owns the ignition key is permitted to operate the car onlyfor the protection time set in the protection time setting mode. Theprotection mode process will be described based on a flowchart of FIG.12.

When the protection mode is executed, the CPU 311 transmits aninstruction to the monitor 2 via the output interface 333 to display amessage that the protection mode is being executed (S1205).Subsequently, the elapsed time since the start of the protection mode ismeasured, and the remaining time of the protection mode is calculated bysubtracting the measured time from the protection time (S1210).Subsequently, an instruction is transmitted to the monitor 2 via theoutput interface 333 to display the remaining time of the protectionmode

Subsequently, the CPU 311 determines whether or not the elapsed timesince the start of the protection mode reaches the protection time,i.e., whether or not the remaining time of the protection mode is zero(S1220). If time is still left in the protection mode (S1220:YES), theCPU 311 calculates the remaining time of the protection mode again(S1210), and it instructs the monitor 2 to display the remaining time(S1215).

Subsequently, if the remaining time of the protection mode is zero(S1220:NO), the CPU 311 transmits an instruction to the monitor 2 viathe output interface 333 to display a message requesting forpresentation of the driver's license (S1225).

Subsequently, the CPU 311 determines whether or not the car is stopped(S1230). If the car is stopped (S1230:YES), the CPU determines whetheror not the predetermined time elapses since the car is stopped (S1235).If the predetermined time elapses since the car is stopped (S1235:YES),the CPU 311 transmits an instruction to the engine controller EC via theoutput interface 332 to stop the engine (S1240). Subsequently, theengine start is prohibited, and the prohibition instruction is stored inthe engine start prohibition flag area 314E in the flash memory 314(S1245). Then, the CPU 311 transmits an instruction to the monitor 2 viathe output interface 333 to display a message that the engine start isprohibited (S1250). It waits until the ID input switch 220 is pushed.

If the ID input switch 220 is pushed (S1255:YES), the CPU 311 executesthe aforementioned communication process (S1260). Subsequently, the CPU311 temporarily stores the ID data obtained by executing thecommunication process in the RAM 313 to compare it with the ID datastored in the registration ID data area 314B in the flash memory 314(S1265). If coincident ID data is found (S1265:YES), the CPU 311transmits an instruction to the engine controller EC via the outputinterface 332 to permit the engine start (S1270), ending the process.

If the predetermined time elapses (S1275:YES) while the ID input switch220 is not pushed (S1255:NO), or if no coincident ID data is found atS1265 (S1265:NO), the process is finished while the engine start isprohibited.

The registration mode will next be described. In the registration mode,a person is registered who is permitted to operate by collating thedriver's license in the combination mode and the protection mode. Theregistration mode process will be described based on a flowchart of FIG.13.

First, the CPU 311 transmits an instruction to the monitor 2 via theoutput interface 333 to display a message that the registration mode isbeing executed (S1310). Subsequently, another message is displayedrequesting presentation of the driver's license (S1320). Then, the CPUwaits until the ID input switch 220 is pushed.

When the ID input switch 220 is pushed (S1330:YES), the CPU 311 executesthe aforementioned communication process (S1340). Subsequently, the CPU311 stores ID data obtained by executing the communication process intothe registration ID data area 314B of the flash memory 314 (S1350).Then, the CPU 311 transmits an instruction to the monitor 2 via theoutput interface 333 to display a message that the ID data of thepresented driver's license has been registered (S1360), thereby endingthe process.

If the predetermined time elapses (S1370:YES) while the ID input switch220 is not pushed (S1330:NO), the CPU 311 transmits an instruction tothe monitor 2 via the output interface 333 to display a message that theID input switch 220 is not pushed (S1380), thereby ending the process.

The deletion mode will next be described. Contrary to the registrationmode, in the deletion mode, ID data of the person who has been permittedto operate is deleted. The deletion mode process will be described basedon a flowchart of FIG. 14.

First, the CPU 311 transmits an instruction to the monitor 2 via theoutput interface 333 to display a message that the deletion mode isbeing executed (S1405). Subsequently, another message is displayedrequesting selection of ID data to be deleted (S1410). Then, the CPU 311transmits an instruction to the monitor 2 via the output interface 333to display all registered ID data and to attach a pointer for indicatinga deletion object to the ID data stored in region #1 of the registrationID data area 314B (S1415).

Subsequently, the CPU 311 determines whether or not the ignition keyposition indicating plate 140 is in SELECT state (S1420), and whether ornot the ID input switch 220 is pushed (S1425). Subsequently, if theignition key position indicating plate 140 is in SELECT state(S1420:YES), the CPU 311 changes the deletion object from ID data storedin region #1 to ID data stored in region #2 (S1450), updates displaycontent, and displays it on the monitor 2 (S1415). Subsequently, whenthe ignition key position indicating plate 140 is again in SELECT stateat S1420 (S1420:YES), the CPU 311 determines ID data stored in region #3as the deletion object (S1450). In such a manner, when the ignition keyposition indicating plate 140 is in SELECT state, the CPU 311successively changes ID data to be the deletion object.

When the ignition key position indicating plate 140 is not in SELECTstate (S1420:NO), it is determined whether or not the ID input switch220 is pushed (S1425). If the ID input switch 220 is pushed (S1425:YES),the CPU 311 executes the aforementioned communication process (S1430).Subsequently, the CPU 311 compares the master ID data obtained byexecuting the communication process with the master ID data stored inthe master ID data area 314A of the flash memory 314 (S1435). If bothmaster ID data coincide with each other (S1435:YES), the CPU 311 deletesID data as the deletion object from the registration ID data area 314Bof the flash memory 314 (S1440). Subsequently, the CPU 311 transmits aninstruction to the monitor 2 via the output interface 333 to display amessage that the selected ID data has been deleted (S1445), therebyending the process.

If the predetermined time elapses (S1455:YES) while the ID input switch220 is not pushed (S1425:NO), or if both master ID data do not coincidewith each other in S1435 (S1435:NO), the CPU 311 transmits aninstruction to the monitor 2 via the output interface 333 to display amessage that it has failed in deleting ID data (S1460), thereby endingthe process.

A case where the car to which the present key system is applied isactually used by a forwarding agent in transportation business will nextbe illustrated.

First, the usage in the combination mode will be described.

When the car is just obtained, no data is stored in the registration IDdata area 314B of the flash memory 314, i.e., no one is permitted tooperate the car with the driver's license in the combination mode.Therefore, a car manager registers the driver's license of a deliveryperson at the beginning. First, the ignition key is inserted into theinsertion port 142 to set SELECT state. Subsequently, the operation modeselection ring 120 is turned to make the indicating protrusion 121 pointto the registration sign 115. The master ID data is entered to executethe registration mode. According to the message on the monitor 2, IDdata of the driver's license of the delivery person to be permitted tooperate the car is entered, and stored in the registration ID data area314B of the flash memory 314. When a plurality of delivery people are tobe registered, the procedure described above is repeated.

Subsequently, the car manager turns the operation mode selection ring120 to enter the master ID data and execute the combination mode. Afterthe combination mode is executed, the delivery person presents his/herdriver's license to the ID card interface unit 200, and performsoperation for starting engine or the like by the alternative ignitionkey member 141. In order to cancel the operation permission, byexecuting the deletion mode, the corresponding delivery person's ID datais deleted.

The operation in the protection mode will next be described.

First, in the same manner as in the combination mode, ID data of thedelivery person to be permitted to operate the car is registered.Subsequently, the protection time is set, and the protection mode isexecuted. After the protection mode is executed, the delivery personstarts the engine or perform another operation by the ignition key.

If the elapsed time since the start of the protection mode reaches theprotection time, and the engine is stopped, the delivery person presentsthe driver's license to the ID card interface unit 200. Then, afterpermission for engine start is given, the protection mode is executedagain, and operation is permitted until the protection time is reached.

According to the embodiment described above, the following effects areachieved.

First, in the key system, the operation mode cannot be changed untilboth the master ID card attached to the car and the ignition key areused. Therefore, after the protection time is reached especially in theprotection mode, other people than the person who owns the master IDcard or the registered driver's license cannot restart the engine.Therefore, even if the car parked with the ignition key inserted theretois stolen, the engine of the stolen car cannot be restarted.

Therefore, the stolen car can be prevented from being used in a crime,causing a traffic accident or causing other secondary damages.

Additionally, in the embodiment described above, even when theprotection time elapses, the engine is not immediately halted. Theengine is halted when the car is stopped and the predetermined time haselapsed since the car was stopped. If the operation of the engine issuddenly restricted to stop the car while running, an accident or damageis to be caused.

Moreover, in the combination mode of the key system, even a person whodoes not own the ignition key is permitted to operate the car just bycollating the driver's license, if the person's ID data is registered inthe key system. Therefore, just by registering or deleting ID data, thecar owner can select the person who is permitted to operate the car, anddoes not need to transfer the ignition key to the person. Additionally,the driver's license which can transmit ID data to the outside is verydifficult to counterfeit. Unlike the ignition key, it is impossible toduplicate the driver's license. Therefore, although the key system iseasy to manage, its safety is very high. Moreover, in the key system, ifthe driver's license is not carried, the car cannot be driven.Therefore, the driving without carrying the driver's license can beprevented.

Furthermore, the age limitation of the insurance for the car, forexample, the information that the age under 26 is not covered by theinsurance may be stored beforehand in the flash memory 314. In thisstructure, if the age of the person stored in the driver's license isnot covered by the insurance, driving is prohibited. Alternatively, thesystem may be constituted in such a manner that it is determined from anaccident history stored in the driver's license whether or not it isappropriate to permit the person to drive. As the case may be, drivingmay be prohibited.

Additionally, for example, by storing the person driving the car and thetime in the flash memory 314 at S650 of the communication process, theemployee's working state can easily be managed in the taxi company orthe transportation company.

The second embodiment will next be described based on FIG. 15. In thesecond embodiment, the key system is applied to the reservation of ahotel room.

First, the structure of the key system will be described.

As shown in FIG. 15, the present key system is constituted by the IDcard 400, such as a driver's license, a credit card, or the like fortransmitting the owner's ID data to the outside, a travel agent 510, acard reader 511 for reading ID data from the ID card 400, a travel agentterminal 512, a hotel 520, a hotel terminal 521, a guest room lockingcontrol device 522 for controlling each guest room key, and the like.

The operation of the present key system will next be described.

First, the guest visiting the travel agent 510 designates the hotel 520where he/she wants to stay. Then, the travel agent 510 connects theirterminal 512 to the designated hotel terminal 521 via Internet. Theyselect the room which meets the requirements of the guest.

Subsequently, ID data is read from the guest's ID card 400 via the cardreader 511 of the travel agent 510, and transmitted to the hotelterminal 521 via the travel agent terminal 512. The hotel terminal 521transmits the corresponding room number, ID data and staying term to theguest room locking control device 522 to register the ID data and theterm by which the room door can be opened. The door can be unlocked bythe corresponding ID data during the staying term.

After the guest arrives at the hotel 520, just by presenting the card400 to the card reader provided in the room door and having the ID dataread, the guest can enter the reserved room.

In this manner, since the ID data output from the ID card 400 functionsas the room key, the key does not need to be physically transferredbetween the hotel 520 and the guest. Therefore, check-in or check-out isunnecessary, and both the hotel 520 and the guest are released frombothersome procedures.

Moreover, since door unlocking is impossible after the staying termelapses, each room locking can easily be controlled.

The third embodiment will be described based on FIG. 16. The key systemof the third embodiment can be used for general purposes.

First, the structure of the present key system will be described.

As shown in FIG. 16, the present key system is constituted by an ID card400 and a control device 600. The control device 600 is provided with acard reader 610, a keyboard 620, a microcomputer 630 for performingoperation in response to various inputs from the card reader 610 and thekeyboard 620, and an operation instruction output terminal 640. Themicrocomputer 630 is provided with a CPU 631, a ROM 632, a RAM 633, aflash memory 634, an input interface 635, and an output interface 636.

The card reader 610 has a function of receiving ID output signals fromthe ID card 400 in the same manner as the card reader 511 described inthe second embodiment. The keyboard 620 is a known keyboard for enteringvarious inputs. In the microcomputer 630, the various signals of thecard reader 610 and the keyboard 620 are received via the inputinterface 635, operation is performed based on the input content, andoperation instruction signals are transmitted to the operationinstruction output terminal 640 via the output interface 636, orcollection instruction signals are transmitted to a collectioninstruction output terminal 650. The operation instruction outputterminal 640 transmits the operation instruction signals from themicrocomputer 630 to the outside device, and is connected, for example,to a locking device of an entrance or a room door, a starting device ofa television set or a pachinko machine, or the like. The collectioninstruction output terminal 650 transmits the collection instructionsignals from the microcomputer 630 to the outside, and is connected to adeposit account of a bank or a post office, or the like via a dedicatedcommunication line.

The action of the present key system will next be described.

First, a key system manager registers the conditions (hereinafterreferred to as “operation conditions”) of a person who is permitted tooperate the locking device, the starting device, or the like.Specifically, the ID data of the person who is permitted to operate thedevice is registered. Alternatively, the age range, sex and otherconditions of the person who is permitted to operate the device areregistered. Moreover, the fee to be collected for operating the lockingdevice, the starting device, or the like (for example, the admission feeof an amusement park or a membership system restaurant, a ball rent feefor a pachinko game, and the like) is registered. The registration isperformed by entering the information via the keyboard 620, and theoperation conditions are stored in the flash memory 634 of themicrocomputer 630.

The process executed by the CPU 631 of the microcomputer 630 after theregistration will be described based on a flowchart shown in FIG. 17.The process is started, when the person who desires to operate thelocking device, the starting device, or the like presents the ID card400 to the card reader 610, the card reader 610 reads ID data from theID card 400, and the card reader 610 transmits the ID data to the CPU631. After the process starts, the CPU 631 transmits an instruction tothe card reader 610 to read the ID data, and receives the ID data fromthe card reader 610 (S2010). Subsequently, it is determined whether ornot the ID data meets the operation conditions stored in the flashmemory 634 (S2020). If it is determined that the ID data satisfies theoperation conditions (S2020:YES), an operation instruction signal istransmitted to the locking device, the start device, or the like via theoperation instruction output terminal 640 to operate the locking device,the starting device, or the like (S2030). Subsequently, the feenecessary for operation of the locking device, the starting device orthe like is collected from the deposit account via the collectioninstruction output terminal 650 (S2040). Subsequently, the ID data incombination with the time when the locking device, the starting device,or the like is operated, are stored in the flash memory 634 (S2050). Theprocess thus ends.

Additionally, if it is determined by the CPU 631 at S2020 that the IDdata does not satisfy the operation conditions (S2020:NO), the processesat S2030 and S2040 are not performed. The ID data in combination withthe time when the card reader 610 reads the ID data (the time when theperson who does not satisfy the operation conditions tries to operatethe locking device or the starting device) are stored in the flashmemory 634 (S2050). The process thus ends.

As aforementioned, in the present key system, it is determined whetheror not the ID data transmitted from the ID card 400 coincides with theID data of the person who is already registered, or whether or not theage range, sex and other conditions are satisfied. If the operationconditions are satisfied, the operation of the locking device, thestarting device, or the like is permitted, and the fee can be collectedfrom the deposit account in accordance with the operation of the lockingdevice, the starting device, or the like.

If the key system is applied, for example, to the entrance door lockingdevice in a condominium, people other than those who are alreadyregistered cannot open the door. In addition, it can easily be graspedwho entered the condominium and when it was. Therefore, safety can beremarkably enhanced. Additionally, in this case, the fee does not needto be collected. Therefore, the fee to be collected is registered aszero.

Moreover, if the key system is applied, for example, to the entrance ofan amusement park, a membership system restaurant, or the like, theregistered fee can be collected simultaneously with entering.Additionally, it can easily be grasped in the same manner asaforementioned who entered the entrance and when it was, and customermanagement can easily be performed.

Furthermore, if the key system is applied to a television set installedin a hotel or inn guest room, by determining whether or not the age ofthe person who is going to watch television is under 18, the televisionprogram for adults can be prohibited from being projected to children.

In the same manner, when the key system is applied to the entrance of apachinko parlor or each pachinko machine, children can be prevented fromillicitly playing the game. Moreover, it can easily be grasped whoplayed the game and when it was. Therefore, customer management caneasily be performed, and the ball rent fee can easily be collected.

The embodiments of the present invention have been described above, butthe present invention is not limited to the embodiments. The presentinvention can be embodied in further various manners. For example, thepresent invention can also be applied to vehicles other than cars, asafe, and the like. The safety can be enhanced also in these cases.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a front view of a control unit.

FIG. 2 is a block diagram of the control unit.

FIG. 3 is an explanatory view of the attached condition of the controlunit.

FIG. 4 is an explanatory view of a flash memory.

FIG. 5 is a block diagram of an ID card.

FIG. 6 is a flowchart showing a flow of communication process.

FIG. 7 is a flowchart showing a flow of main routine process.

FIG. 8 is a flowchart showing a flow of operation mode selectionprocess.

FIG. 9 is a flowchart showing a flow of usual mode process.

FIG. 10 is a flowchart showing a flow of combination mode process.

FIG. 11 is a flowchart showing a flow of protection time settingprocess.

FIG. 12 is a flowchart showing a flow of protection mode process.

FIG. 13 is a flowchart showing a flow of registration mode process.

FIG. 14 is a flowchart showing a flow of deletion mode process.

FIG. 15 is a block diagram of a key system according to the secondembodiment.

FIG. 16 is a block diagram of a key system according to the thirdembodiment.

FIG. 17 is a flowchart showing a process flow according to the thirdembodiment.

DESCRIPTION OF REFERENCE CHARACTERS

1 . . . control unit, 2 . . . monitor, 100 . . . key operation unit,

110 . . . main face plate, 111 . . . protection time sign, 112 . . .protection sign, 113 . . . usual sign, 114 . . . combination sign, 115 .. . registration sign, 116 . . . deletion sign, 120 . . . operation modeselection ring, 121 . . . indicating protrusion, 130 . . . ignition keyface plate, 131 . . . SELECT sign, 132 . . . OFF sign, 133 . . . ACCsign, 134 . . . ON sign, 135 . . . START sign, 140 . . . ignition keyposition indicating plate, 141 . . . alternative ignition key member,142 . . . insertion port, 200 . . . ID card interface unit, 210 . . .main face plate, 220 . . . ID input switch, 311 . . . CPU, 312 . . .ROM, 313 . . . RAM, 314 . . . flash memory, 314A . . . master ID dataarea, 314B . . . registration ID data area, 314C . . . operation modearea, 314D . . . protection time area, 314E . . . engine startprohibition flag area, 321 . . . input interface, 322 . . . inputinterface, 323 . . . input interface, 331 . . . output interface, 332 .. . output interface, 333 . . . output interface, 341 . . . input/outputinterface, 351 . . . relay unit, 361 . . . transceiver, 400 . . . IDcard, 411 . . . CPU, 412 . . . ROM, 413 . . . RAM, 414 . . . flashmemory, 421 . . . input/output interface, 431 . . . transceiver, 441 . .. power supply circuit, 510 . . . travel agent, 511 . . . card reader,512 . . . travel agent terminal, 520 . . . hotel, 521 . . . hotelterminal, 522 . . . guest room locking control device, 600 . . . controldevice, 610 . . . card reader, 620 . . . keyboard, 630 . . .microcomputer, 631 . . . CPU, 632 . . . ROM, 633 . . . RAM, 634 . . .flash memory, 635 . . . input interface, 636 . . . output interface, 640. . . operation instruction output terminal, 650 . . . collectioninstruction output terminal, EC . . . engine controller, IS . . .ignition switch, RC1 . . . relay coil, RC2 . . . relay coil, RC3 . . .relay coil, RTl . . . relay contact, RT2 . . . relay contact, RT3 . . .relay contact.

What is claimed is:
 1. A key system for a lock mechanism activated by atleast one of an ID card and a mechanical key, the key system comprising:ID signal receiving means for receiving ID output signals transmittedfrom said ID card; ID extracting means for extracting ID card data fromID output signals received by the ID signal receiving means; ID storagemeans for maintaining stored ID data; coincidence determination meansfor ascertaining whether or not there is stored ID data coinciding withthe ID card data extracted by said ID extracting means; a memory contentchange means for adding/deleting stored ID data in said ID storage meansand said ID card is, a driver's license, a passport, or other identityproving ID cards; a mechanical key switch having a port for receivingthe mechanical key, the mechanical key switch controlled by an operationenabling means permitting operation of the key switch; the key systemfurther comprises a first mode and a second mode, in the first mode themechanical key is received in the mechanical key switch port and the IDsignal receiving means receives ID output signals transmitted from saidID card and where the coincidence determination means ascertainscoincidence of the stored ID data and the extracted ID card data theoperation enabling means is actuated to enable operation of themechanical key switch and equipment operation; and in the second modethe operation enabling means is actuated solely by the ID card whereinthe ID signal receiving means receives ID output signals transmittedfrom said ID card and where the coincidence determination meansascertains coincidence of the stored ID data and the extracted ID carddata, the operation enabling means is actuated to enable operation ofthe mechanical key switch and equipment operation without the mechanicalkey.
 2. The key system for a lock mechanism as set forth in claim 1further comprising a master ID card wherein the key system is selectedto be operated in one of the first and second mode by setting themechanical key switch to an operation mode selection position and the IDsignal receiving means receives master ID card data transmitted fromsaid master ID card and where the coincidence determination meansascertains coincidence of stored master ID data with the master ID carddata one of the first and second modes is selected.
 3. The key systemfor a lock mechanism as set forth in claim 2, wherein the mechanical keyswitch receives the mechanical key to enable setting of the mechanicalkey switch to the operation mode selection position.