Authenticating method for short-distance radio devices and a short-distance radio device

ABSTRACT

The invention provides a method for making mutual authentication between short-distance radio devices automatically or after confirmation by users, and a short-distance radio device for realizing the method. In a condition where a plurality of radio devices exist, each of the radio devices comprising a data communicating unit for performing short-distance radio communication and an authenticating unit for performing authentication of the radio device, the authenticating unit performs mutual authentication between two radio devices automatically or after confirmation by users of the radio devices when the two radio devices come closer to each other to such an extent that coverage areas of radio waves generated by the radio devices overlap with each other.

This is a continuation of application Ser. No. 12/000,738, filed Dec. 17, 2007 now U.S. Pat. No. 7,739,503. Application Ser. No. 12/000,738 is a continuation of Ser. No. 09/920,376, filed Aug. 2, 2001 (now U.S. Pat. No. 7,353,391 B2), which claims priority to Japanese Application No. 2001-183616, filed Jun. 18, 2001, and Japanese Application No. 2000-237245, filed Aug. 4, 2000. All of the applications are incorporated herein by reference in their entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an authenticating method for short-distance radio devices and a short-distance radio device. More particularly, the present invention relates to an authenticating method for short-distance radio devices, which include data communicating units based on short-distance radio communication such as represented by Bluetooth, and which have the function enabling the radio devices to authenticate mutually with ease; as well as the short-distance radio device itself.

2. Description of the Related Art

In conventional general authentication procedures for portable radio (wireless) equipment, a system is made up of a base station and plural pieces of portable equipment, and an inquiry is issued to the base station from each piece of portable equipment for authentication thereof. The authentication is performed by inputting data, such as the ID number and the password, which have been set in advance, and checking for verification of the inputted data whether it is in match with data stored as a database or the like in the base station.

However, when data such as the ID number and the password is inputted for the authentication as described above, such data itself tends to be a longer string of symbols comprising characters and numerals in mixed fashion, and hence an operation for inputting the data has become troublesome. Also, mutual authentication procedures, which are general in radio communication, have a tendency to be used more and more in many applications in future. This causes another problem that the complicated authentication procedures make a user interface also complicated.

SUMMARY OF THE INVENTION

Accordingly, it is an object of the present invention to provide a method and a construction capable of easily performing mutual authentication between short-distance radio devices, in particular, portable devices.

To achieve the above object, an authenticating method for short-distance radio devices and a short-distance radio device according to the present invention are constituted as follows.

(1) An authenticating method for short-distance radio devices, comprising the steps of preparing a condition where a plurality of radio devices exist, each of the radio devices comprising a data communicating unit for performing short-distance radio communication and an authenticating unit for performing authentication of the radio device; and performing mutual authentication between two radio devices by the authenticating unit automatically or after confirmation by users of the radio devices when the two radio devices come closer to each other to such an extent that coverage areas of radio waves generated by the two radio devices overlap with each other. (2) In the authenticating method for short-distance radio devices of (1), the step of performing the authentication by the authenticating unit is performed in a state where a transmission output of the radio device is reduced to shorten a communication distance of the radio device. (3) In the authenticating method for short-distance radio devices of (2), the transmission output is reduced only in a particular one of the radio devices. (4) In the authenticating method for short-distance radio devices of (2), the transmission output is reduced upon turning-on of an authentication button provided on the radio device. (5) In the authenticating method for short-distance radio devices of (1), the step of performing the authentication by the authenticating unit is performed in a state where reception sensitivity of the radio device is reduced to shorten a communication distance of the radio device. (6) In the authenticating method for short-distance radio devices of (5), the reception sensitivity is reduced only in a particular one of the radio devices. (7) In the authenticating method for short-distance radio devices of (5), the reception sensitivity is reduced upon turning-on of an authentication button provided on the radio device. (8) In the authenticating method for short-distance radio devices of (1), the radio device is a portable device. (9) A short-distance radio device comprising a data communicating unit for performing short-distance radio communication and an authenticating unit for performing authentication of the radio device, the authenticating unit of the radio device performing, in a condition where a plurality of radio devices exist, mutual authentication between two radio devices automatically or after confirmation by users of the radio devices when the two radio devices come closer to each other to such an extent that coverage areas of radio waves generated by the radio devices overlap with each other. (10) In the short-distance radio device of (9), the authenticating unit performs the authentication in a state where a transmission output of the radio device is reduced to shorten a communication distance of the radio device. (11) In the short-distance radio device of (10), the transmission output is reduced only in a particular one of the radio devices. (12) In the short-distance radio device of (10), the transmission output is reduced upon turning-on of an authentication button provided on the radio device. (13) In the short-distance radio device of (9), the authenticating unit performs the authentication in a state where reception sensitivity of the radio device is reduced to shorten a communication distance of the radio device. (14) In the short-distance radio device of (13), the reception sensitivity is reduced only in a particular one of the radio devices. (15) In the short-distance radio device of (13), the reception sensitivity is reduced upon turning-on of an authentication button provided on the radio device. (16) In the short-distance radio device of (9), the radio device is a portable device.

Thus, in a condition where a plurality of short-distance radio devices exist, particularly portable radio devices, each of the radio devices comprising a data communicating unit for performing short-distance radio communication and an authenticating unit for performing authentication of the radio device, the authenticating unit performs mutual authentication between two radio devices automatically or after confirmation by users when coverage areas of radio waves generated by the radio devices overlap with each other, that is, when the two radio devices come close to each other within a predetermined distance. As a result, an operation for inputting complex data, such as the authentication number, is eliminated and the operability can be greatly improved.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing the configuration of a terminal device as a short-distance radio device according to a first embodiment of the present invention;

FIG. 2 is a flowchart showing the operation of the terminal device;

FIG. 3 is an explanatory view showing the coverage area of radio waves when the terminal device is operated in the data communicating mode;

FIG. 4 is an explanatory view showing the coverage area of radio waves when the terminal device is operated in the authentication mode;

FIG. 5 is an explanatory view showing mutual authentication between the terminal devices operated in the authentication mode;

FIG. 6 is a block diagram showing the configuration of a terminal device as a short-distance radio device according to a second embodiment of the present invention;

FIG. 7 is a flowchart showing the operation of the terminal device of FIG. 6;

FIGS. 8A, 8B and 8C are explanatory views showing an authentication state between the terminal devices of FIG. 6 operated in the authentication mode with reduced reception sensitivity;

FIG. 9 is an explanatory view showing the coverage area of radio waves when the terminal device of FIG. 6 is operated in the data communicating mode;

FIG. 10 is an explanatory view showing an authentication state between the terminal devices of FIG. 6 when a particular terminal device is operated in the authentication mode with reduced reception sensitivity; and

FIG. 11 is an explanatory view showing mutual authentication between the terminal devices of FIG. 6 operated in the authentication mode.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Embodiments of an authenticating method for short-distance radio devices and a short-distance radio device according to the present invention will be described below with reference to the drawings.

According to a first embodiment of the present invention, as shown in FIG. 1, the short-distance radio device for realizing the authenticating method for short-distance radio devices is constituted by a portable terminal device such as a cellular phone. The terminal device comprises a short-distance data communicating unit 110 which forms a data communicating means for performing short-distance radio communication; an authenticating unit 120 which serves as an authenticating means capable of decoding, for analysis to make authentication, data received by the short-distance data communicating unit 110 in the authentication mode; an authentication button 130 for establishing the authentication mode; and a radio output attenuating unit 140 for attenuating a radio output and narrowing the coverage area of radio waves, when the authentication button 130 is depressed to turn on.

The operation of the terminal device thus constructed will be described below in connection with a flowchart shown in FIG. 2 while referring to FIG. 1.

When the authentication button 130 is turned off, the terminal device is in the data communication mode in which ordinary communication is carried out (steps ST110, ST120 and ST130). More specifically, as shown in FIG. 3, a terminal device A is in the ordinary operating state and produces a transmission output capable of covering a certain large distance (area indicated by W1 in FIG. 3).

When the authentication button 130 is depressed to turn on, the terminal device is brought into the authentication mode in which the transmission output is reduced and the coverage area of transmitted radio waves is considerably narrowed (steps ST110, ST140 and ST150). For example, the transmission output is reduced to such an extent that two terminal devices are not able to receive or transmit data unless they are positioned close to each other. Then, when the coverage areas of radio waves transmitted from the terminal devices come into an overlapped relation, i.e., when the terminal devices are positioned close to each other, mutual authentication is enabled to start (step ST160). More specifically, as shown in FIG. 4, by depressing the authentication button 130 of the terminal device A to turn on, the terminal device A is brought into the authentication mode. In this operating mode, the transmission output is considerably reduced and the communication distance (area indicated by W2 in FIG. 4) is set to such a range that two terminal device are not able to communicate data unless they approach very close to each other. Simultaneously, the other terminal device B, also in which the authentication button 130 is depressed and the communication distance is narrowed as indicated by W3, comes closer to the terminal device A for mutual authentication.

Then, as shown in FIG. 5, when both the terminal devices A and B come close to each other and enter within a distance capable of communicating data therebetween (as indicated by communication distances W4 and W5), the mutual authentication is performed between the terminal devices automatically or after confirmation by users.

While this embodiment is arranged to perform the mutual authentication in the state where the transmission outputs of both the terminal devices A and B are reduced, the present invention is not limited to such an arrangement. As a matter of course, the transmission output of only one particular terminal device may be reduced.

Thus, since the coverage area of radio waves outputted in the authentication mode is narrowed to such an extent that two terminal devices are able to receive data only when they are positioned close to each other, it is possible to prevent the mutual authentication from being performed among a number of terminal devices, and to carry out the mutual authentication essentially in a one-to-one relation.

Next, a second embodiment of an authenticating method for short-distance radio devices and a short-distance radio device according to the present invention will be described below with reference to the drawings.

According to the second embodiment of the present invention, as shown in FIG. 6, the short-distance radio device for realizing the authenticating method for short-distance radio devices is constituted by a portable terminal device, such as a cellular phone, similarly to the first embodiment described above. The terminal device comprises a short-distance data communicating unit 110 which forms a data communicating means for performing short-distance radio communication; an authenticating unit 120 which serves as an authenticating means capable of decoding, for analysis to make authentication, data received by the short-distance data communicating unit 110 in the authentication mode; an authentication button 130 for establishing the authentication mode; and a reception sensitivity attenuating unit 150 for reducing reception sensitivity and shortening the communication distance, when the authentication button 130 is depressed to turn on.

The operation of the terminal device thus constructed will be described below in connection with a flowchart shown in FIG. 7 while referring to FIG. 6.

When the authentication button 130 is turned off, the terminal device is in the data communication mode in which ordinary communication is carried out (steps ST210, ST220 and ST230). More specifically, as shown in FIG. 8A, a terminal device A is in the ordinary operating state and produces a transmission output capable of covering a certain large distance (area indicated by W6 in FIG. 8A).

When the authentication button 130 is depressed to turn on, the terminal device is brought into the authentication mode in which the reception sensitivity is reduced and the communication distance is considerably shortened (steps ST210, ST240 and ST250). For example, the reception sensitivity is reduced to such an extent that two terminal devices are not able to receive or transmit data unless they are positioned close to each other. Then, when the coverage areas of radio waves transmitted from the terminal devices are overlapped with each other and the terminal devices come into within a distance capable of communicating data between them, i.e., when the terminal devices are positioned close to each other, mutual authentication is enabled to start (step ST260). More specifically, as shown in FIG. 8B, by depressing the authentication button 130 of the terminal device A to turn on, the terminal device A is brought into the authentication mode. In this operating mode, the reception sensitivity is considerably reduced and the communication distance (area indicated by W7 in FIG. 8B) is set to such a range that two terminal device are not able to communicate data unless they approach very close to each other. Simultaneously, the other terminal device B, also in which the authentication button 130 is depressed and the communication distance is narrowed as indicated by W8, comes closer to the terminal device A for mutual authentication.

Then, as shown in FIG. 8C, when both the terminal devices A and B come close to each other and enter within a distance capable of communicating data therebetween (as indicated by communication distances W9 and W10), the mutual authentication is performed between the terminal devices automatically or after confirmation by users.

While this embodiment is arranged to perform the mutual authentication in the state where the reception sensitivity of each of the terminal devices A and B is reduced, the present invention is not limited to such an arrangement. As a matter of course, the reception sensitivity of only one particular terminal device may be reduced.

FIGS. 9 to 11 show mutual authentication between the terminal devices of FIG. 6 when a particular terminal device (A in this embodiment) is operated with reduced reception sensitivity. First, as shown in FIG. 9, the terminal device A is in the ordinary operating state and produces a transmission output capable of covering a certain large distance (area indicated by W11 in FIG. 9).

In the above condition, when the authentication button 130 of the terminal device A is depressed to turn on, the terminal device A is brought into the authentication mode as shown in FIG. 10. In this operating mode, the reception sensitivity is considerably reduced and the communication distance (coverage area indicated by W12 in FIG. 10) is reduced to such a range that two terminal device are not able to communicate data unless they approach very close to each other.

Subsequently, the other terminal device B having the ordinary communication distance (coverage area W13 in FIG. 10) comes closer to the terminal device A. Then, as shown in FIG. 11, when the terminal device B having the communication distance W13 comes closer to the terminal device A having the reduced communication distance (narrowed coverage area) W12 to such an extent that both the terminal devices enter within a distance capable of communicating data therebetween, the mutual authentication is performed between the terminal devices automatically or after confirmation by users.

Additionally, when, the terminal devices A and B are positioned close to each other, a coverage area W14 of another terminal device C is outside the coverage areas of the terminal devices A and B. The mutual authentication between the terminal devices A and C is therefore not performed.

Thus, since the coverage area of radio waves outputted in the authentication mode is narrowed to such an extent that two terminal devices are able to receive data only when they are positioned close to each other, it is possible to prevent the mutual authentication from being performed among a number of terminal devices, and to carry out the mutual authentication essentially in a one-to-one relation.

The mutual authentication is performed by reducing the transmission output in the first embodiment and by reducing the reception sensitivity in the second embodiment. As a matter of course, however, the mutual authentication may be performed between terminal devices which are each equipped with both the functions.

With, the authenticating method for short-distance radio devices and the short-distance radio device according to the present invention, as described hereinabove, the mutual authentication is performed between two terminal devices automatically or after confirmation by users when the terminal devices are brought into the authentication mode and are positioned close to each other. As a result, an operation for inputting data for authentication is no longer required, and hence the operability is improved. Further, the mutual authentication can be performed with no need of special highly-equipped user interfaces. 

What is claimed is:
 1. A wireless communication apparatus comprising: a communicating unit configured to communicate with another wireless communication apparatus included in a first coverage area, wherein the wireless communication apparatus is configured to execute instructions to: process an authentication with the another wireless communication apparatus in a second coverage area that is smaller than said first coverage area, wherein the authentication processing with the another wireless communication apparatus is automatically initiated when the another wireless communication apparatus enters in the second coverage area, and switch the coverage area of the wireless communication apparatus, prior to the initiation of the authentication with the another wireless communication apparatus, from the first coverage area to the second coverage area.
 2. The wireless communication apparatus of claim 1, wherein the wireless communication apparatus is further configured to execute instructions to: receive a user input information; and set the wireless communication apparatus to authentication mode, wherein the wireless communication apparatus is further configured to automatically process the authentication with the another wireless communication apparatus when the wireless communication apparatus is set in authentication mode.
 3. The wireless communication apparatus of claim 1, wherein the wireless communication apparatus is further configured to automatically process the authentication with the another wireless communication apparatus when the first coverage area and the second coverage area overlap.
 4. The wireless communication apparatus of claim 1, wherein the authentication process includes performing mutual authentication.
 5. The wireless communication apparatus of claim 1, wherein the wireless communication apparatus is further configured to execute instructions to: set the wireless communication apparatus to authentication mode; and change a reception sensitivity when the wireless communication apparatus is set to authentication mode.
 6. The wireless communication apparatus of claim 1, wherein the communicating unit is configured to receive data and the wireless communication apparatus is configured to decode the received data during processing of the authentication with the another wireless communication apparatus.
 7. An authenticating method being executed by a wireless communication apparatus, comprising: communicating with another wireless communication apparatus included in a first coverage area; processing an authentication with the another wireless communication apparatus in a second coverage area that is smaller than said first coverage area, wherein the authentication processing with the another wireless communication apparatus is automatically initiated when the another wireless communication apparatus enters in the second coverage area; and prior to the automatic initiating of the authentication processing, switching the coverage area of the wireless communication apparatus from the first coverage area to the second coverage area.
 8. The method of claim 7, further comprising; receiving a user input information; and setting the wireless communication apparatus to authentication mode, wherein the authentication processing with the another wireless communication apparatus is automatically initiated when the wireless communication apparatus is set in authentication mode.
 9. The method claim 7, wherein the authentication processing is with the another wireless communication apparatus is automatically initiated when the first coverage area and the second coverage area overlap.
 10. The method of claim 7, wherein processing the authentication with the another wireless communication apparatus includes performing mutual authentication.
 11. The method of claim 7, further comprising: setting the wireless communication apparatus to authentication mode; and changing a reception sensitivity when the wireless communication apparatus is set to authentication mode.
 12. The method of claim 7, further comprising: receiving data; and decoding the received data during processing of the authentication with the another wireless communication apparatus.
 13. A portable device comprising: a communicating unit configured to communicate with another portable device included in a first coverage area, wherein the portable device is configured to execute instructions to: process an authentication with the another portable device in a second coverage area that is smaller than said first coverage area, wherein the authentication processing with the another portable device is automatically initiated when the another portable device enters in the second coverage area, and switch the coverage area of the portable device, prior to initiation of the authentication process with the another portable device, from the first coverage area to the second coverage area.
 14. The portable device of claim 13, wherein the portable device is further configured to execute instructions to: receive a user input information; and set the portable device to authentication mode, wherein the portable device is further configured to automatically process the authentication with the another portable device when the portable device is set in authentication mode.
 15. The portable device of claim 13, wherein the portable device is further configured to automatically process the authentication with the another portable device when the first coverage area and the second coverage area overlap.
 16. The portable device of claim 13, wherein the authentication includes performing mutual authentication.
 17. The portable device of claim 13, wherein the portable device is further configured to execute instructions to: set the portable device to authentication mode; and change a reception sensitivity when the portable device is set to authentication mode.
 18. The portable device of claim 13, wherein the communicating unit is configured to receive data and the portable device is further configured to decode the received data during the authentication process with the another portable device.
 19. The portable device of claim 13, wherein the portable device is a cellular phone.
 20. The portable device of claim 13, wherein the another portable device is a cellular phone. 