U.S. patent application number 17/454307 was filed with the patent office on 2022-03-03 for information processing device, information processing method, and non-transitory computer-readable storage medium.
This patent application is currently assigned to TOYOTA JIDOSHA KABUSHIKI KAISHA. The applicant listed for this patent is TOYOTA JIDOSHA KABUSHIKI KAISHA. Invention is credited to Yuichiro HARUNA, Kuniaki JINNAI.
Application Number | 20220068062 17/454307 |
Document ID | / |
Family ID | |
Filed Date | 2022-03-03 |
United States Patent
Application |
20220068062 |
Kind Code |
A1 |
JINNAI; Kuniaki ; et
al. |
March 3, 2022 |
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND
NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
Abstract
An information processing device relates to a predetermined
service provided to a user by allowing a worker to temporarily
access a vehicle cabin including a trunk of a vehicle used by the
user. The information processing device includes a processor. The
processor is configured to determine whether the worker relating to
a service provider of the service has unlocked a door of the
vehicle using key information for unlocking the door, the door
accessing the vehicle cabin of the vehicle, and notify the user of
a warning or activate an alarm device of the vehicle, in a case
where the processor determines that the door has been unlocked and
in a case where the processor determines that a state in which the
door of the vehicle is not locked continues after a predetermined
time has elapsed from unlocking of the door.
Inventors: |
JINNAI; Kuniaki;
(Nagoya-shi, JP) ; HARUNA; Yuichiro; (Oyama-shi,
JP) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
TOYOTA JIDOSHA KABUSHIKI KAISHA |
Toyota-shi |
|
JP |
|
|
Assignee: |
TOYOTA JIDOSHA KABUSHIKI
KAISHA
Toyota-shi
JP
|
Appl. No.: |
17/454307 |
Filed: |
November 10, 2021 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
16903325 |
Jun 16, 2020 |
11200766 |
|
|
17454307 |
|
|
|
|
16228038 |
Dec 20, 2018 |
10726652 |
|
|
16903325 |
|
|
|
|
International
Class: |
G07C 9/00 20060101
G07C009/00; B60R 25/01 20060101 B60R025/01; B60R 25/102 20060101
B60R025/102; B60R 25/24 20060101 B60R025/24; B60R 25/30 20060101
B60R025/30 |
Foreign Application Data
Date |
Code |
Application Number |
Dec 27, 2017 |
JP |
2017-252296 |
Claims
1. An information processing device relating to a predetermined
service provided to a user by allowing a worker to temporarily
access a vehicle cabin including a trunk of a vehicle used by the
user, the information processing device comprising a processor
configured to communicate with a mobile terminal carried by the
worker, determine whether the worker relating to a service provider
of the service has unlocked a door of the vehicle based on a
manipulation on the mobile terminal by the worker, the door
accessing the vehicle cabin of the vehicle, and notify the user of
a warning or activate an alarm device of the vehicle, in a case
where the processor determines that the door has been unlocked and
in a case where the processor determines that a state in which a
locking notification indicating that the door of the vehicle has
not been locked based on the manipulation on the mobile terminal by
the worker is not received from the mobile terminal continues after
a predetermined time has elapsed from unlocking of the door.
2. The information processing device according to claim 1, wherein:
the information processing device is provided outside the vehicle;
and the processor is configured to notify the user of the warning
or activate the alarm device in a case where an unlocking
notification indicating that the door of the vehicle has been
unlocked based on a manipulation on the mobile terminal by the
worker, by transmitting a predetermined transmission signal
including the key information to the vehicle, is received from the
mobile terminal.
3. The information processing device according to claim 1, wherein
the processor is configured to notify the user of the warning or
activate the alarm device, in a case where the worker has unlocked
the door of the vehicle using the key information, and in a case
where a certain period of time has elapsed from the predetermined
timing after unlocking of the door.
4. The information processing device according to claim 3, wherein
the predetermined timing is a time when the door is unlocked, or a
time when a situation inside the vehicle cabin of the vehicle is
captured by an imaging function mounted on the mobile terminal in
response to the manipulation on the mobile terminal upon completing
a work relating to the service.
5. The information processing device according to claim 1, wherein
the processor is configured to transmit a signal corresponding to
the warning to a user terminal carried by the user or notify the
user of the warning using a function provided by a predetermined
application program installed in the user terminal, in a case where
the worker has unlocked the door of the vehicle using the key
information, and in a case where a state in which the door of the
vehicle is not locked continues after the predetermined time has
elapsed from unlocking of the door.
6. The information processing device according to claim 1, wherein
the processor is configured to transmit the warning to a mail
address of the user or a predetermined social networking service
account of the user, in a case where the worker has unlocked the
door of the vehicle using the key information, and in a case where
a state in which the door of the vehicle is not locked continues
after the predetermined time has elapsed from unlocking of the
door.
7. The information processing device according to claim 1, wherein
the processor is configured to acquire history information on
working time from when the door of the vehicle is unlocked using
the key information to when the door of the vehicle is locked, and
decide the predetermined time based on the acquired history
information on the working time.
8. The information processing device according to claim 1, wherein
the processor is configured to acquire history information on past
working time, for each of a plurality of workers, from when the
door of the vehicle is unlocked using the key information to when
the door of the vehicle is locked, and extract a worker from the
plurality of workers having past working time that statistically
exceeds a predetermined standard out of the plurality of workers
based on the acquired history information on the past working time
for each of the plurality of workers.
9. The information processing device according to claim 8, wherein
the processor is configured to distribute the key information used
by the worker to the service provider, and cease to distribute the
key information to be used by the extracted worker having past
working time statistically exceeds the predetermined standard to
the service provider.
10. The information processing device according to claim 8, wherein
the processor is configured to set the predetermined time for the
extracted worker having past working time statistically exceeds the
predetermined standard to be shorter than the predetermined time
for the worker other than the extracted worker out of the plurality
of workers.
11. An information processing method executed by an information
processing device relating to a predetermined service provided to a
user by allowing a worker to temporarily access a vehicle cabin
including a trunk of a vehicle used by the user, the information
processing method comprising: the information processing method is
executed by the information processing device included in a mobile
terminal carried by the worker; and determining, by the information
processing device, whether the worker relating to a service
provider of the service has unlocked a door of the vehicle based on
a manipulation on the mobile terminal by the worker, the door
accessing the vehicle cabin of the vehicle; determining, by the
information processing device, whether a predetermined time has
elapsed from unlocking of the door in a case where the door has
been unlocked; and notifying, by the information processing device,
the user of a warning or activating an alarm device of the vehicle
in a case where a state in which a locking notification indicating
that the door of the vehicle has not been locked based on the
manipulation on the mobile terminal by the worker is not received
from the mobile terminal continues after the predetermined time has
elapsed from unlocking the door.
12. The information processing method according to claim 11,
wherein: the information processing device notifies the user of the
warning in a case where the door of the vehicle has been unlocked
based on a predetermined unlocking manipulation on the mobile
terminal by transmitting a predetermined transmission signal
including the key information to the vehicle.
13. A non-transitory computer-readable storage medium storing an
information processing program causing an information processing
device to execute the information processing method according to
claim 11, the information processing device being related to a
predetermined service provided to a user by allowing a worker to
temporarily access a vehicle cabin including a trunk of a vehicle
used by the user.
Description
INCORPORATION BY REFERENCE
[0001] This is a continuation application of U.S. patent
application Ser. No. 16/903,325, filed Jun. 16, 2020, which is a
continuation application of U.S. patent application Ser. No.
16/228,038, filed Dec. 20, 2018, which claims the disclosure of
Japanese Patent Application No. 2017-252296 filed on Dec. 27, 2017,
including the specification, drawings and abstract are incorporated
herein by reference in their entirety.
BACKGROUND
1. Technical Field
[0002] The present disclosure relates to an information processing
device, an information processing method, and a non-transitory
computer-readable storage medium storing an information processing
program.
2. Description of Related Art
[0003] A service provided to the user by allowing a worker to
temporarily access a vehicle cabin of a vehicle when the user is
absent is disclosed.
[0004] For example, a mechanism for using a vehicle cabin of a
vehicle such as a trunk as a delivery destination, i.e. a delivery
locker, of a package is disclosed (see Japanese Unexamined Patent
Application Publication No. 2006-206225 (JP 2006-206225 A) or the
like).
[0005] Specifically, authentication information (key information)
for unlocking the vehicle is distributed to a delivery company (for
example, a mobile terminal carried by a deliverer). Specifically,
when a predetermined transmission signal including the key
information is transmitted from the mobile terminal carried by the
deliverer to the vehicle and accordingly, authentication based on
the key information included in the transmission signal is
successful on the vehicle side, a door accessing the trunk of the
vehicle (for example, a trunk lid or a backdoor) is unlocked.
Consequently, the deliverer can put the package in the trunk.
Accordingly, a delivery company can provide a customer with a
delivery service in which a vehicle cabin such as the trunk of the
vehicle can be designated as a delivery destination (hereinafter
simply referred to as a "vehicle cabin delivery service").
[0006] Also, in addition to implementing a pick-up service using a
vehicle cabin, such as a trunk, of the vehicle as a pick-up point
of a package, it is possible to implement a cleaning service for
cleaning inside the vehicle cabin of the vehicle when the user is
absent in a same way as the vehicle cabin delivery service.
SUMMARY
[0007] However, in a case where the services as described above are
offered, a third person (worker) who is not a vehicle owner nor
close relatives of the vehicle owner has to access a vehicle cabin
of the vehicle when the user is absent. Therefore, improper
behaviors other than works related to the original purpose of the
service provider, such as rummaging about inside the vehicle, may
be committed by the third person.
[0008] The disclosure provides an information processing device, an
information processing method, and a non-transitory
computer-readable storage medium storing an information processing
program capable of suppressing improper behaviors committed by the
third person, such as a worker, in a vehicle cabin of a vehicle in
a service provided to the user by allowing the worker to
temporarily access the vehicle cabin of the vehicle.
[0009] A first aspect of the disclosure relates to an information
processing device relating to a predetermined service provided to a
user by allowing a worker to temporarily access a vehicle cabin
including a trunk of a vehicle used by the user. The information
processing device includes a processor. The processor is configured
to determine whether or not the worker relating to a service
provider of the service has unlocked a door of the vehicle using
key information for unlocking the door, in which the door is a door
accessing the vehicle cabin of the vehicle; and notify the user of
a warning or activate an alarm device of the vehicle, in a case
where the processor determines that the door has been unlocked and
in a case where the processor determines that a state in which the
door of the vehicle is not locked continues after a predetermined
time has elapsed from unlocking of the door.
[0010] According to the first aspect of the disclosure, the
information processing device is capable of determining that
improper behaviors other than the original works may be committed
when a certain period time has elapsed after the door accessing the
vehicle cabin of the vehicle was unlocked by the worker using the
key information. Therefore, the information processing device can
notify the user of a warning about potential improper behaviors by,
for example, a push notification function of an application
installed in a user terminal or e-mail when an unlocked state lasts
over a relatively long time. Moreover, the information processing
device can activate the alarm device mounted on the vehicle to
notify the potential improper behaviors to the surroundings of the
vehicle when the unlocked state continues over relatively a long
time. Consequently, the information processing device is able to
suppress the improper behaviors committed by the worker in the
vehicle cabin of the vehicle by notifying the user or the
surroundings of the vehicle when the unlocked state of the vehicle
lasts over a long time.
[0011] In the first aspect of the disclosure, the information
processing device may be provided outside the vehicle. The
processor may be configured to communicate with a mobile terminal
carried by the worker, and notify the user of the warning or
activate the alarm device in a case where an unlocking notification
indicating that the door of the vehicle has been unlocked based on
a manipulation on the mobile terminal by the worker, by
transmitting a predetermined transmission signal including the key
information to the vehicle, is received from the mobile terminal,
and in a case where a state in which a locking notification
indicating that the door of the vehicle has been locked based on
the manipulation on the mobile terminal by the worker is not
received from the mobile terminal continues after the predetermined
time has elapsed from unlocking of the door.
[0012] According to the aspect of the disclosure, the information
processing device can be provided outside the vehicle, and figure
out unlocked and locked states of the door accessing the vehicle
cabin of the vehicle based on a manipulation by the worker on the
mobile terminal, via a communication between the information
processing device and the mobile terminal used by the worker to
unlock the vehicle. Therefore, the information processing device
(for example, server, etc.) outside the vehicle is able to,
specifically, figure out whether the vehicle is unlocked or locked
by the worker using the key information, thereby notifying the user
of a warning or activating the alarm device by transmitting a
control command to the vehicle.
[0013] In the first aspect of the disclosure, the information
processing device may be mounted on the vehicle. The processor may
be configured to communicate with a mobile terminal carried by the
worker, and notify the user of the warning or activate the alarm
device in a case where the processor determines whether the door of
the vehicle has been unlocked or not by receiving a predetermined
transmission signal including the key information from the mobile
terminal and determines that the door has been unlocked, and in a
case where a state in which the door of the vehicle is not locked
continues after the predetermined time has elapsed from unlocking
of the door.
[0014] According to the aspect of the disclosure, the information
processing device can be mounted on the vehicle, and figure out
whether the door accessing the vehicle cabin of the vehicle is
unlocked or locked by the worker, by receiving the transmission
signal including the key information used for unlocking, which is
transmitted from the mobile terminal carried by the worker to the
vehicle. Therefore, the information processing device mounted on
the vehicle is able to, specifically, figure out whether the
vehicle is unlocked or locked by the worker using the key
information, thereby notifying the user of a warning or activating
the alarm device of the vehicle.
[0015] In the aspect of the disclosure, the processor may be
configured to notify the user of the warning or activate the alarm
device, in a case where the worker has unlocked the door of the
vehicle using the key information, and in a case where a certain
period of time has elapsed from the predetermined timing after
unlocking of the door.
[0016] According to the aspect of the disclosure, the information
processing device is capable of specifying, specifically, a time
from unlocking of the door to the predetermined timing with a
certain period of time from the predetermined timing, as the
predetermined time from unlocking of the door accessing the vehicle
cabin of the vehicle.
[0017] In the aspect of the disclosure, the predetermined timing
may be a time when the door is unlocked, or a time when a situation
inside the vehicle cabin of the vehicle is captured by an imaging
function mounted on the mobile terminal in response to the
manipulation on the mobile terminal upon completing a work relating
to the service.
[0018] According to the aspect of the disclosure, the information
processing device is capable of, specifically, notifying the user
of a warning or activating the alarm device of the vehicle, by
monitoring duration of the unlocked state from the timing when the
door has been unlocked to confirm the duration exceeds a certain
period of time. Moreover, the worker may capture a situation inside
the vehicle cabin of the vehicle using the imaging function of the
mobile terminal, for example, to verify that the service works have
been completed. In this case, the information processing device
waits for a capture timing from unlocking of the door. The
information processing device is capable of, specifically notifying
the user of a warning or activating the alarm device of the
vehicle, by monitoring duration of the unlocked state from the
capture timing, since the door of the vehicle has to be locked
shortly after the capture timing, to confirm the duration exceeds a
certain period of time.
[0019] In the first aspect of the disclosure, the processor may be
configured to transmit a signal corresponding to the warning to a
user terminal carried by the user or notify the user of the warning
using a function provided by a predetermined application program
installed in the user terminal, in a case where the worker has
unlocked the door of the vehicle using the key information, and in
a case where a state in which the door of the vehicle is not locked
continues after the predetermined time has elapsed from unlocking
of the door.
[0020] According to the aspect of the disclosure, the information
processing device is capable of, specifically, notifying the user
of a warning via a push notification function of the application
program (hereinafter simply referred to as an "application")
installed in the user terminal carried by the user.
[0021] In the first aspect of the disclosure, the processor may be
configured to transmit the warning to a mail address of the user or
a predetermined social networking service account of the user, in a
case where the worker has unlocked the door of the vehicle using
the key information, and in a case where a state in which the door
of the vehicle is not locked continues after the predetermined time
has elapsed from unlocking of the door.
[0022] According to the aspect of the disclosure, the information
processing device is capable of, specifically, transmitting a
warning to the mail address of the user or the predetermined social
networking service (SNS) account of the user.
[0023] In the first aspect of the disclosure, the processor may be
configured to acquire history information on working time from when
the door of the vehicle is unlocked using the key information to
when the door of the vehicle is locked; and decide the
predetermined time based on the acquired history information on the
working time.
[0024] According to the aspect of the disclosure, the information
processing device is capable of confirming the past history of
working time from when the door accessing the vehicle cabin is
unlocked by the worker using the key information to when the door
is locked. Consequently, the information processing device can
figure out a time needed for works relating to the target service
and a fluctuation in the working time by statistically processing,
for example, the history of the past working time. Therefore, the
information processing device is able to, specifically, decide the
predetermined time corresponding to conditions for notifying a
warning or activating the alarm device, in consideration of the
statistical data based on the history of the past working time.
[0025] In the first aspect of the disclosure, the processor may be
configured to acquire history information on past working time, for
each of the workers, from when the door of the vehicle is unlocked
using the key information to when the door of the vehicle is
locked, and extract the worker having past working time
statistically exceeds a predetermined standard out of the workers
based on the acquired history information on the past working time
for each of the workers.
[0026] According to the aspect of the disclosure, the information
processing device is capable of confirming the history of working
time for each of several workers engaged in the target service.
Consequently, the information processing device can figure out
difference in working time for each worker, and extract the worker
having working time exceeds the predetermined standard, i.e. having
working time is understood as being too long, by statistically
processing, for example, the history of the past working time for
each worker. That is, the information processing device can extract
the worker who may commit the improper behaviors in the past.
Therefore, the information processing device is able to take
measures in advance, for example, giving a notice to the service
provider in advance when the worker who may commit the improper
behaviors in the past is likely engaged in the service.
[0027] In the aspect of the disclosure, the processor may be
configured to distribute the key information used by the worker to
the service provider, and cease to distribute the key information
to be used by the extracted worker having the past working time
statistically exceeds the predetermined standard to the service
provider.
[0028] According to the aspect of the disclosure, the information
processing device is capable of ceasing to distribute the key
information to be used by the worker extracted due to potential
improper behaviors in the past to the service provider offering the
target service. Therefore, the information processing device is
further able to suppress the improper behaviors committed by the
worker in the vehicle cabin of the vehicle.
[0029] In the aspect of the disclosure, the processor may be
configured to set the predetermined time for the extracted worker
having the past working time statistically exceeds the
predetermined standard to be shorter than the predetermined time
for the worker other than the extracted worker out of the
workers.
[0030] According to the aspect of the disclosure, the information
processing device is capable of notifying the user of a warning or
activating the alarm device of the vehicle, when the worker is
extracted due to potential improper behaviors in the past, at the
timing earlier than that for other workers. Consequently, the
information processing device can notify the user of a warning or
activate the alarm device of the vehicle before the improper
behaviors would be actually committed in accordance with the
extracted worker. Therefore, the information processing device is
able to suppress the improper behaviors committed by the extracted
worker beforehand, and further suppress the improper behaviors
committed by the worker in the vehicle cabin of the vehicle.
[0031] A second aspect of the disclosure relates to an information
processing method executed by an information processing device
relating to a predetermined service provided to a user by allowing
a worker to temporarily access a vehicle cabin including a trunk of
a vehicle used by the user. The information processing method
includes determining, by the information processing device, whether
or not the worker relating to a service provider of the service has
unlocked a door of the vehicle using key information for unlocking
the door, the door accessing the vehicle cabin of the vehicle,
determining, by the information processing device, whether or not a
predetermined time has elapsed from unlocking of the door in a case
where the door has been unlocked, and notifying, by the information
processing device, the user of a warning or activating an alarm
device of the vehicle in a case where a state in which the door of
the vehicle is not locked continues after the predetermined time
has elapsed.
[0032] According to the second aspect of the disclosure, the
information processing device is capable of suppressing the
improper behaviors committed by the worker in the vehicle cabin of
the vehicle with the information processing method, as described
above.
[0033] In the second aspect of the disclosure, the information
processing method may be executed by the information processing
device included in a mobile terminal carried by the worker, and the
information processing device may notify the user of the warning in
a case where the door of the vehicle has been unlocked based on a
predetermined unlocking manipulation on the mobile terminal by
transmitting a predetermined transmission signal including the key
information to the vehicle, and in case where the information
processing device determines that a state in which a locking
manipulation is not performed on the mobile terminal for locking
the door of the vehicle continues after the predetermined time has
elapsed from unlocking of the door.
[0034] According to the aspect of the disclosure, the information
processing device included in the mobile terminal of the worker is
capable of figuring out an unlocked or locked state of the door
accessing the vehicle cabin of the vehicle based on a manipulation
by the worker on the mobile terminal, using the information
processing method. Therefore, the information processing device is
able to, specifically, figure out whether the vehicle is unlocked
or locked by the worker using the key information, using the
information processing method, thereby notifying the user of a
warning, or activating the alarm device by transmitting the control
command to the vehicle.
[0035] A third aspect of the disclosure relates to a non-transitory
computer-readable storage medium storing an information processing
program causing an information processing device to execute the
information processing method according to the second aspect. The
information processing device is related to a predetermined service
provided to a user by allowing a worker to temporarily access a
vehicle cabin including a trunk of a vehicle used by the user.
[0036] According to the aspects of the disclosure, it is possible
to provide the information processing device, the information
processing method, and the non-transitory computer readable storage
medium storing the information processing program, which are
capable of suppressing the improper behaviors by a third person
such as a worker in the vehicle cabin of the vehicle, in the
service provided to the user by allowing the worker to temporarily
access the vehicle cabin of the vehicle.
BRIEF DESCRIPTION OF THE DRAWINGS
[0037] Features, advantages, and technical and industrial
significance of exemplary embodiments of the disclosure will be
described below with reference to the accompanying drawings, in
which like numerals denote like elements, and wherein:
[0038] FIG. 1 is a diagram illustrating an example of an overall
configuration of an authentication key management system;
[0039] FIG. 2 is a diagram mainly illustrating an example of a
configuration regarding locking and unlocking of a vehicle in the
authentication key management system;
[0040] FIG. 3 is a diagram mainly illustrating an example of a
configuration regarding a key sharing service in the authentication
key management system;
[0041] FIG. 4 is a diagram mainly illustrating an example of a
configuration regarding a vehicle cabin delivery service in the
authentication key management system;
[0042] FIG. 5 is a diagram mainly illustrating an example of a
configuration regarding a consumer to consumer (C2C) car sharing
service in the authentication key management system;
[0043] FIG. 6 is a diagram mainly illustrating an example of a
configuration regarding a business to consumer (B2C) car sharing
service in the authentication key management system;
[0044] FIG. 7 is a flowchart schematically showing one example of a
warning notification output process of the center server;
[0045] FIG. 8 is a flowchart schematically showing another example
of the warning notification output process of the center server;
and
[0046] FIG. 9 is a flowchart schematically showing one example of
an authentication key distribution process of the center
server.
DETAILED DESCRIPTION OF EMBODIMENTS
[0047] Hereinafter, modes for carrying out the disclosure will be
described with reference to the drawings.
[0048] Overall Configuration of Authentication Key Management
System
[0049] FIG. 1 is a diagram illustrating an example of an overall
configuration of an authentication key management system 1
according to an embodiment.
[0050] An authentication key management system 1 includes a vehicle
10, a mobile terminal 20, a center server 30, and a service
management server 40.
[0051] The vehicle 10 can perform wireless communication
(hereinafter simply referred to as a "near field communication")
with the mobile terminal 20 at a relatively short range (a distance
that allows communication between the inside of a vehicle cabin and
the outside of the vehicle cabin) according to a predetermined
communication standard. The vehicle 10 is a target on which locking
and unlocking of doors and activation (ignition on) of the vehicle
10 are performed based on transmission signals (an authentication
request, a locking request, and an unlocking request to be
described below) from the mobile terminal 20. The door of the
vehicle 10 may include not only a door for getting on and off, but
also a door for a cargo (for example, a trunk lid or a backdoor)
for accessing a trunk (luggage compartment). The ignition on
(IG-ON) of the vehicle 10 may include ON of a power supply to an
electric motor in the vehicle 10 using the electric motor as a main
power source, in addition to startup of an engine in the vehicle 10
using the engine as a main power source. Hereinafter, in the
embodiment, description will be given on the premise that the
vehicle 10 includes an engine 117 to be described below as a main
power source, the activation (IG-ON) of the vehicle 10 corresponds
to startup of the engine 117, and stopping (IG-OFF) of the vehicle
10 corresponds to stopping of the engine 117.
[0052] The vehicle 10 is communicably connected to the center
server 30 over a predetermined communication network (for example,
a mobile phone network or an Internet network in which a plurality
of base stations is terminations). The vehicle 10 transmits vehicle
information such as location information to the center server 30,
as described below.
[0053] The vehicle 10 includes a vehicle 10A owned by an individual
and a vehicle 10B owned by a company providing a business to
consumer (hereinafter simply referred to as a "B2C") car sharing
service.
[0054] The mobile terminal 20 is communicably connected to the
center server 30 over a predetermined communication network (for
example, a mobile phone network or an Internet network in which a
plurality of base stations is terminations). The mobile terminal 20
can unlock or lock the vehicle 10 by acquiring authentication key
information (an example of the key information. The authentication
key information is hereinafter simply referred to as an
"authentication key") distributed from the center server 30 and
transmitting the acquired authentication key to the vehicle 10
through relatively short-range wireless communication according to
a predetermined manipulation of the user. The mobile terminal 20
may be, for example, a general-purpose mobile phone, a smartphone,
or a tablet terminal. As will be described below, a predetermined
application program (hereinafter simply referred to as a "key
application") installed in the built-in processing device 23 is
activated, and thereby, the above-described function may be
realized. The mobile terminal 20 may be a dedicated mobile terminal
specialized for unlocking of the doors of the vehicle 10 and
activation of the vehicle 10 by acquiring the authentication key
from the center server 30 and using the acquired authentication
key. The mobile terminal 20 includes mobile terminals 20Aa to 20Ad
corresponding to the vehicle 10A and a mobile terminal 20B
corresponding to the vehicle 10B.
[0055] The mobile terminal 20Aa is a mobile terminal carried by an
owner (hereinafter simply referred to as an "owner user") among
regular users of the vehicle 10A (hereinafter simply referred to as
"regular users"). The mobile terminal 20Aa may bidirectionally
communicate with the mobile terminal 20Ab through wireless
communication at a relatively short range.
[0056] The mobile terminal 20Ab is a mobile terminal carried by a
regular user other than the owner user of the vehicle 10A (for
example, including a family member of the owner user and a close
friend of the owner user. The regular user is hereinafter simply
referred to as a "sub-user").
[0057] The sub-user may include a user who does not drive the
vehicle 10A or a user who cannot drive (for example, an owner
user's child under 18 years of age). This is because, for example,
when solely a vehicle cabin delivery service to be described below
is used, the regular user does not need to drive the vehicle
10A.
[0058] The mobile terminal 20Ac is carried by a deliverer (an
example of the worker) of a company that provides a vehicle cabin
delivery service to be described below (hereinafter simply referred
to as a "delivery company"). The mobile terminal 20Ac is
communicably connected to the center server 30 and a delivery
management server 50 to be described below over a predetermined
communication network (for example, a mobile phone network or an
Internet network in which a plurality of base stations is
terminations).
[0059] The mobile terminal 20Ad is a mobile terminal carried by a
lessee of the vehicle 10A in a consumer to consumer (hereinafter
simply referred to as a "C2C") car sharing service to be described
below. The mobile terminal 20Ad is communicably connected to the
center server 30 and a C2C car sharing management server 70 to be
described below over the predetermined communication network (for
example, a mobile phone network or an Internet network in which a
plurality of base stations is terminations).
[0060] The mobile terminal 20B is a mobile terminal carried by the
lessee of the vehicle 10B in a business to consumer (B2C) car
sharing service to be described below. The mobile terminal 20B is
communicably connected to the center server 30 and a B2C car
sharing management server 80 to be described below over the
predetermined communication network (for example, a mobile phone
network or an Internet network in which a plurality of base
stations is terminations).
[0061] The center server 30 is communicably connected to the
vehicle 10, the mobile terminal 20, and the service management
server 40.
[0062] The center server 30 manages issuance of an authentication
key of the vehicle 10. For example, the center server 30 issues the
authentication key according to a predetermined condition and
distributes the authentication key to the mobile terminal 20.
[0063] The center server 30 acquires location information of the
vehicle 10 from the vehicle 10. Accordingly, the center server 30
can figure out the location of the vehicle 10.
[0064] The center server 30 operates the car sharing service for
sharing the vehicle 10A among a plurality of regular users
including the owner user of the vehicle 10A. Specifically, the
center server 30 operates a service for sharing the authentication
key of the vehicle 10A that each of a plurality of pre-registered
regular users including the owner user can acquire in the mobile
terminal 20 of the regular user (the mobile terminals 20Aa, 20Ab)
(a key sharing service).
[0065] The center server 30 performs a registration process (a use
registration process) of allowing the regular user of the vehicle
10A to use a service for using the vehicle 10A (a key sharing
service, a vehicle cabin delivery service, a C2C car sharing
service, or the like). Specifically, the center server 30 registers
an authority to distribute the authentication key to the
predetermined mobile terminal 20 (hereinafter simply referred to as
an "authentication key arrangement authority") by a key sharing
management unit 3207 or a service management server 40 to be
described below transmitting an authentication key arrangement
request to be described below in order for the regular user of the
vehicle 10A to use the service for using the vehicle 10A.
[0066] The center server 30 manages a use situation of the vehicle
10A through a plurality of services (that is, a plurality of
companies) through a vehicle cabin delivery service (an example of
the service provided to the user by allowing the worker to
temporarily access the vehicle cabin of the vehicle used by the
user), a C2C car sharing service, and the like to be described
below.
[0067] The service management server 40 operates and manages
various services that are provided using the vehicle 10. The
service management server 40 includes a delivery management server
50 and an electronic commerce (EC) server 60 corresponding to the
vehicle cabin delivery service, a C2C car sharing management server
70 corresponding to the C2C car sharing service, a B2C car sharing
management server 80 corresponding to the B2C car sharing
service.
[0068] The vehicle cabin delivery service may include a delivery
service in which a product ordered at an EC site to be described
below is a delivery target, and a delivery service in which a
product other than the product ordered at the EC site is a delivery
target. For example, the vehicle cabin delivery service in which
the product other than the product ordered at the EC site is the
delivery target is a service in which the regular user of the
vehicle 10A can change a delivery destination to the trunk of the
vehicle 10A when there is a notification indicating that a package
destined for home is scheduled to be delivered, from the delivery
management server 50 to the regular user of the vehicle 10A through
an e-mail, a predetermined social networking service (SNS) account,
or a specific application program activated at mobile terminals
20Aa, 20Ab. Hereinafter, in the embodiment, description will be
given while focusing on the vehicle cabin delivery service in which
the product ordered at the EC site is the delivery target. An
operation of each configuration related to the vehicle cabin
delivery service to be described below can be appropriately applied
to an operation of each configuration in the delivery service in
which the product other than the product ordered at the EC site is
the delivery target.
[0069] The delivery management server 50 is communicably connected
to the mobile terminal 20Ac and the center server 30 over a
predetermined communication network, and performs an operation and
management of a distribution system related to the vehicle cabin
delivery service from reception of the package to the delivery of
the package to the trunk of the vehicle 10A.
[0070] A delivery company operating the delivery management server
50 may provide the regular user of the vehicle 10A with a delivery
service in which a vehicle cabin other than the trunk of the
vehicle 10A can be designated as a delivery destination in place of
the trunk of the vehicle 10A or in addition to the trunk of the
vehicle 10A. Hereinafter, a delivery service (an example of the
service provided to the user by allowing the worker to temporarily
access the vehicle cabin of the vehicle used by the user) in which
the vehicle cabin (that is, the inside of the vehicle 10A)
including the trunk of the vehicle 10A can be designated as the
delivery destination is referred to as a "vehicle cabin delivery
service". The delivery company operating the delivery management
server 50 may provide the regular user of the vehicle 10A with a
pick-up service in which the vehicle cabin including the trunk can
be designated as a package pick-up point (an example of the service
provided to the user by allowing the worker to temporarily access
the vehicle cabin of the vehicle used by the user; hereinafter
simply referred to as a "vehicle cabin pick-up service") in
addition to the vehicle cabin delivery service. That is, the
delivery management server 50 may perform an operation and
management of the vehicle cabin pick-up service in place of the
vehicle cabin delivery service or in addition to the vehicle cabin
delivery service. In this case, the package that is a pick-up
target may be a product (that is, a product purchased at the EC
site) returning to an operating company of the EC site (hereinafter
simply referred to as an "EC company") corresponding to the EC
server 60 (or a store opened at the EC site) or may be a package
for delivery not related to the EC site. The vehicle cabin pick-up
service may be realized as a pick-up service when a company (for
example, a laundry company) that provides a service in a form of
temporarily keeping products from a customer keeps products from
the regular user of the vehicle 10A. The vehicle cabin pick-up
service may be realized as a pick-up service when a company (for
example, a junk removal company or a secondhand dealer) that
provides a service in a form of collecting items from a customer
collects articles from the regular user of the vehicle 10A. In this
case, a laundry company, a junk removal company or the like may
provide a pick-up management server that operates and manages the
vehicle cabin pick-up service, which can be included in the service
management server 40, as in the delivery management server 50. That
is, the pick-up management server may be provided, in place of the
delivery management server 50 or in addition to the delivery
management server 50.
[0071] The EC server 60 is communicably connected to the center
server 30 and the delivery management server 50 over a
predetermined communication network, and operates a predetermined
website (an EC site) for selling products or services.
Specifically, the EC server 60 displays the trunk of the vehicle
10A as an optional delivery destination on a webpage for inputting
information on the order of the product of the EC site (hereinafter
simply referred to as an "order input page"), which is accessed via
a browser activated in a user terminal (for example, the mobile
terminals 20Aa, 20Ab, etc.; hereinafter simply referred to as a
"user terminal") directly manipulated by the user, for the regular
user of the vehicle 10A and the predetermined delivery company (in
the embodiment, the delivery company corresponding to the delivery
management server 50), which are registered in advance.
Consequently, the regular user of the vehicle 10A can request the
delivery company to deliver the purchased product to the trunk of
the vehicle 10A, for example, which is parked in a parking lot near
his/her home or parked in a parking area of the office for
traveling to work even when he/she is not at home.
[0072] The C2C car sharing management server 70 is communicably
connected to the mobile terminal 20Ad and the center server 30, and
performs an operation and management of the C2C car sharing service
that assists in car rental of the vehicle 10A between individuals.
For example, the C2C car sharing management server 70 performs an
operation and management of the C2C car sharing service such as
reception of registration of a date and time when the vehicle 10A
can be rented by the owner user, reception of reservation of use
from a person who wants to rent the vehicle 10A, and arrangement of
the authentication key of the vehicle 10A. The C2C car sharing
management server 70 may operate and manage the C2C trunk sharing
service such that the inside of the vehicle cabin of the vehicle
10A of an individual or the trunk thereof is rented as a temporary
package storage space, a package delivery destination, or the
like.
[0073] The B2C car sharing management server 80 is communicably
connected to the mobile terminal 20B and the center server 30, and
performs an operation and management of the B2C car sharing service
in which the vehicle 10B owned by a predetermined company (for
example, a provider of the B2C car sharing service) is rented such
that the vehicle 10B can be shared among a plurality of general
consumers. For example, the B2C car sharing management server 80
performs an operation and management of the B2C car sharing service
such as reception of reservation of use of the vehicle 10B, and
arrangement of a parking location of the vehicle 10B and the
authentication key of the vehicle 10B. The B2C car sharing
management server 80 may operate and manage the B2C trunk sharing
service such that the inside of the vehicle cabin of the vehicle
10B or the trunk is rented as a temporary package storage space or
a package delivery destination.
[0074] A company car use management server that operates a car
sharing service (a company car use management service) in which an
employee of a company is a lessee, with the vehicle 10 as a company
car of the company being a reservation of use target, may be
included in the service management server 40, instead of the B2C
car sharing management server 80 or in addition to the B2C car
sharing management server 80. In this case, when there is an idle
time period of the vehicle 10, which is the company car, the C2C
car sharing management server 70 may operate the C2C car sharing
service, with the vehicle 10 as a company car being a rental
target. The delivery management server 50 and the EC server 60 may
operate the vehicle cabin delivery service in which a delivery
destination of a package to be delivered to a company can be
designated as a trunk of the vehicle 10 that is a company car of
the company.
[0075] Details of Configuration Regarding Locking, Unlocking, and
Activation of Vehicle
[0076] A configuration regarding locking, unlocking, and activation
of vehicle 10 in the authentication key management system 1 will be
described with reference to FIG. 2.
[0077] FIG. 2 is a diagram mainly illustrating an example of the
configuration regarding locking, unlocking, and activation of the
vehicle 10 in the authentication key management system 1. The
vehicle 10 includes a locking, unlocking and activation device 11,
a key unit 12, a global positioning system (GPS) module 13, a data
communication module (DCM) 14, and a buzzer 15.
[0078] The locking, unlocking and activation device 11 is attached
to the vehicle 10 and performs unlocking and locking of the doors
of the vehicle 10 according to a locking signal and an unlocking
signal to be transmitted as radio waves in a radio frequency (RF)
band (for example, 300 MHz to 3 GHz) (hereinafter simply referred
to as "RF radio waves") from the key unit 12. The locking,
unlocking and activation device 11 activates the vehicle 10
according to exchange using radio waves in a low frequency (LF)
band (for example, 30 Hz to 300 kHz) (hereinafter simply referred
to as "LF radio waves") and RF radio waves with the key unit using
a pressing manipulation of an activation switch (not illustrated)
provided in the vehicle cabin of the vehicle 10 as a trigger. The
locking, unlocking and activation device 11 includes an LF radio
wave transmitter 111, an RF radio wave receiver 112, a collating
electronic control unit (ECU) 113, a body ECU 114, a door lock
motor 115, an engine ECU 116, and an engine 117 as a driving power
source of the vehicle 10.
[0079] The locking, unlocking and activation device 11 operates
with power supplied from an auxiliary battery (not illustrated)
mounted on the vehicle 10.
[0080] The LF radio wave transmitter 111 is embedded into, for
example, a center console or a door handle in the vehicle cabin,
and transmits LF radio waves under the control of the collating ECU
113.
[0081] The RF radio wave receiver 112 is provided, for example, in
a trim of a luggage compartment of the vehicle 10 and receives RF
radio waves under the control of the collating ECU 113.
[0082] The collating ECU 113 is an electronic control unit that
controls locking and unlocking of the doors of the vehicle 10 and
activation of the vehicle 10 based on exchange of signals with the
key unit 12. The collating ECU 113 is realized by any hardware, any
software, or a combination of any hardware and any software. For
example, the collating ECU 113 is configured mainly of a
microcomputer includes a central processing unit (CPU), a random
access memory (RAM), a read only memory (ROM), an auxiliary storage
device, a real time clock (RTC), and a communication interface. The
collating ECU 113 realizes various control processes by executing
various programs stored in the ROM or the auxiliary storage device
on the CPU. Hereinafter, the same applies to the key ECU 124 to be
described below.
[0083] The collating ECU 113 receives an unlocking signal and a
locking signal transmitted as RF radio waves from the key unit 12
using the RF radio wave receiver 112.
[0084] When the collating ECU 113 receives the unlocking signal or
the locking signal, the collating ECU 113 performs authentication
of a transmission source (the key unit 12) of the unlocking signal
or the locking signal based on key information included in the
unlocking signal or the locking signal (hereinafter simply referred
to as "internal key information"). For example, when the internal
key information registered in an internal memory such as an
auxiliary storage device in advance matches the internal key
information included in the unlocking signal or the locking signal,
the collating ECU 113 determines that the authentication is
successful, and when the internal key information registered in the
internal memory such as the auxiliary storage device in advance
does not match the internal key information included in the
unlocking signal or the locking signal, the collating ECU 113
determines that the authentication fails.
[0085] For example, the collating ECU 113 may transmit LF radio
waves including a "challenge" created in a predetermined method
using the internal key information of the internal memory from the
LF radio wave transmitter 111 to the key unit 12 and perform
challenge response authentication based on a "response" replied
from the key unit 12, which is received from the RF radio wave
receiver 112.
[0086] When the authentication is successful, the collating ECU 113
transmits an unlocking command (upon reception of the unlocking
signal) or a locking command (upon reception of the locking signal)
to the body ECU 114 via an in-vehicle network such as a controller
area network (CAN).
[0087] Moreover, the collating ECU 113 transmits a notification
that the door is unlocked or locked (an unlocking notification or a
locking notification) to the key unit 12 via the LF radio wave
transmitter 111 when a reply indicating that the door is normally
unlocked or locked (an unlocking reply or a locking reply) is
received from the body ECU 114 via the in-vehicle network such as
the CAN after the collating ECU 113 transmits the unlocking command
or and locking command to the body ECU 114.
[0088] As will be described below, in the unlocking signal, solely
some of the doors of the vehicle 10 may be designated as unlocked
targets. In this case, the collating ECU 113 designates the door as
an unlocked target in the unlocking command. Accordingly, the body
ECU 114 can operate solely the door lock motor 115 corresponding to
some designated doors and unlock solely some doors.
[0089] When the above-described activation switch is pressed, the
collating ECU 113 performs authentication of the key unit 12 by
exchanging signals with the key unit 12 using the LF radio wave
transmitter 111 and the RF radio wave receiver 112.
[0090] For example, the collating ECU 113 transmits a request
signal in an LF band from the LF radio wave transmitter 111 to the
key unit 12 to request reply of the internal key information. When
a response signal including the internal key information is
received from the key unit 12 by the RF radio wave receiver 112,
the collating ECU 113 determines authentication success or
authentication failure based on matching between the internal key
information registered in the internal memory in advance and the
internal key information included in the response signal, as in a
case of locking and unlocking the doors.
[0091] For example, the collating ECU 113 may perform challenge
response authentication, as in a case of locking and unlocking of
doors.
[0092] When the authentication has succeeded, the collating ECU 113
transmits a startup command of the engine 117 to the engine ECU 116
through the in-vehicle network such as the CAN.
[0093] The body ECU 114 is an electronic control unit that performs
operation control of the door lock motor 115 that is communicably
connected via a one-to-one communication line or the like. The body
ECU 114 outputs a control command to cause the door lock motor 115
to perform an unlocking operation according to the unlocking
command from the collating ECU 113. The body ECU 114 outputs a
control command to cause the door lock motor 115 to perform a
locking operation according to the locking command from the
collating ECU 113. Furthermore, the body ECU 114 transmits the
unlocking reply or the locking reply to the collating ECU 113 via
the in-vehicle network such as the CAN when the door is normally
unlocked or locked by outputting the control command to the door
lock motor 115.
[0094] The door lock motor 115 is a known electric actuator that
unlocks and locks the doors of the vehicle 10 according to the
control command from the body ECU 114.
[0095] The engine ECU 116 is an electronic control unit that drives
and controls the engine 117. Specifically, the engine ECU 116
drives and controls various actuators such as a starter or an
injector, which are mounted on the engine 117. When the startup
command is input from the collating ECU 113, the engine ECU 116
outputs a control command to various actuators such as a starter or
an injector of the engine 117 to start up the engine 117.
[0096] The key unit 12 is disposed in the vehicle cabin of the
vehicle 10 and transmits the unlocking signal and the locking
signal as RF radio waves to the locking, unlocking and activation
device 11 according to the unlocking request and the locking
request transmitted from the mobile terminal 20. The key unit 12
performs exchange of signals with the locking, unlocking and
activation device 11 according to the signal in the LF band
transmitted from the locking, unlocking and activation device 11
when the activation switch provided in the vehicle cabin of the
vehicle 10 is pressed. The key unit 12 includes an LF radio wave
receiver 121, an RF radio wave transmitter 122, a communication
device 123, and a key ECU 124.
[0097] The key unit 12 may be disposed at a location (for example,
a glove box, or the inside of a center console box) at which it is
difficult for users seated on respective seats of the vehicle 10 to
visually recognize the key unit 12. The key unit 12 may be fixed or
may not be fixed to the vehicle 10. The key unit 12 may be operated
by a built-in button battery or the like or may be operated by
power supplied from an auxiliary battery mounted on the vehicle
10.
[0098] The LF radio wave receiver 121 receives the LF radio waves
under the control of the key ECU 124.
[0099] The RF radio wave transmitter 122 transmits RF radio waves
under the control of the key ECU 124.
[0100] The communication device 123 is any device that performs
near field communication with the mobile terminal 20 under the
control of the key ECU 124. The communication device 123 may be,
for example, a BLE communication module that performs communication
with the mobile terminal 20 in compliance with a Bluetooth
(registered trademark) low energy (BLE) communication standard.
Hereinafter, description will be given on the premise that a
communication standard adopted in the communication device 123
conforms to BLE communication.
[0101] The communication device 123 may be a communication device
conforming to a short-range communication standard having a very
short communicable distance, such as a near field communication
(NFC) standard. In this case, the communication device 123 may be
built, for example, at a location (for example, the inside of the
door handle) close to a body surface of the vehicle 10 outside the
vehicle cabin. Accordingly, the key unit 12 (the key ECU 124) can
communicate with the mobile terminal 20 outside the vehicle cabin
even when the communicable distance of the communication device 123
is very short.
[0102] The key ECU 124 is an electronic control unit that performs
a control process of transmitting a locking signal and an unlocking
signal to the locking, unlocking and activation device 11 according
to the unlocking request and the locking request received from the
mobile terminal 20.
[0103] The key ECU 124 controls the communication device 123 and
establishes a state in which communication according to a
predetermined communication standard with the mobile terminal 20,
such as a BLE communication standard is possible.
[0104] Specifically, the key ECU 124 periodically (for example,
every several seconds) transmits an advertising packet including
advertisement information reachable in a predetermined
communication range (for example, several meters to tens of meters)
from the communication device 123. The advertisement information
includes a universally unique identifier (UUID) corresponding to
the key unit 12, a device identifier (ID), and the like.
Accordingly, the mobile terminal 20 can identify the key unit 12
mounted on the vehicle 10 that is a target by receiving the
advertising packet and confirming the advertisement
information.
[0105] When a connection request for requesting connection based on
the BLE communication is received from the mobile terminal 20
present in a communication range of the vehicle 10 (the key unit
12) that has received the advertising packet, the key ECU 124
establishes a state in which BLE communication between the mobile
terminal 20 and the vehicle 10 (the key unit 12) is possible. In
this case, the key ECU 124 transmits a connection response
indicating that the state in which the BLE communication is
possible has been established, to the mobile terminal 20 via the
communication device 123.
[0106] The key ECU 124 receives an authentication request including
an authentication key associated with the key unit 12 from the
mobile terminal 20 via the communication device 123 in a state in
which the above-described BLE communication is established.
[0107] When the authentication request including the authentication
key associated with the key unit 12 is received from the mobile
terminal 20, the key ECU 124 performs authentication of the mobile
terminal 20 based on the authentication key. When the
authentication has been successful, the key ECU 124 restores the
internal key information stored in an internal memory such as an
auxiliary storage device to a usable state. The internal key
information is stored in a state that the internal key information
cannot be used for authentication in the locking, unlocking and
activation device 11, for example, due to a state in which the
internal key information is not accessible or a state in which the
internal key information has been encrypted. Therefore, when the
authentication of the mobile terminal 20 has been successful, the
key ECU 124, for example, performs changing of an authority to
access the internal memory for changing the key information to an
accessible state, or decodes encrypted internal key information
based on the authentication key. Accordingly, the key ECU 124 can
access the internal key information which is not normally
accessible to transmit an unlocking signal or a locking signal
including the internal key information to the locking, unlocking
and activation device 11 or transmit an unlocking signal or a
locking signal including decoded internal key information to the
locking, unlocking and activation device 11. Therefore, the
locking, unlocking and activation device 11 can perform appropriate
authentication based on the internal key information included in
the unlocking signal and the locking signal. Even when a situation
in which a malicious third person illegally obtains the key unit 12
occurs, the internal key information in the key unit 12, for
example, is not accessible or is encrypted, occurrence of theft of
the vehicle 10 can be suppressed.
[0108] The key ECU 124 receives the unlocking request and the
locking request from the mobile terminal 20 via the communication
device 123 in a state in which the above-described BLE
communication is established. When the authentication of the mobile
terminal 20 is successful (specifically, a state in which the BLE
communication has been established is kept after the authentication
of the mobile terminal 20 has been successful) and the key ECU 124
has received the unlocking request or the locking request from the
mobile terminal 20, the key ECU 124 transmits the unlocking signal
or the locking signal including locking and unlocking key
information to the locking, unlocking and activation device 11 via
the RF radio wave transmitter 122.
[0109] Accordingly, unlocking or locking of the doors of the
vehicle 10 is realized after an authentication process in the
locking, unlocking and activation device 11.
[0110] Furthermore, the key ECU 124 transmits to an unlocking
completion notification to the mobile terminal 20 in which the BLE
communication is established, i.e. the mobile terminal 20 which is
the transmission source of the unlocking request, via the
communication device 123 in a case of receiving the unlocking
notification from the locking, unlocking and activation device 11
via the LF radio wave receiver 121 after transmitting the unlocking
signal to the locking, unlocking and activation device 11.
Similarly, the key ECU 124 transmits to a locking completion
notification to the mobile terminal 20 in which the BLE
communication is established via the communication device 123 in a
case of receiving the locking notification from the locking,
unlocking and activation device 11 via the LF radio wave receiver
121 after transmitting the locking signal to the locking, unlocking
and activation device 11. Accordingly, the mobile terminal 20,
which is the transmission source of the locking request or the
unlocking request based on the predetermined manipulation of the
user, can figure out that the locking or unlocking of the vehicle
10A has been normally completed.
[0111] As described above, the key ECU 124 performs exchange of
signals with the locking, unlocking and activation device 11
according to a signal in the LF band transmitted from the locking,
unlocking and activation device 11 when the activation switch
provided in the vehicle cabin of the vehicle 10 is pressed.
[0112] For example, when the request signal is received from the
locking, unlocking and activation device 11 by the LF radio wave
receiver 121, the key ECU 124 transmits a response signal including
the internal key information stored in the internal memory or the
like to the locking, unlocking and activation device 11 via the RF
radio wave transmitter 122.
[0113] For example, when the LF radio waves including the
"challenge" are received from the locking, unlocking and activation
device 11 by the LF radio wave receiver 121, the key ECU 124
generates a "response" based on the internal key information and
transmits the response to the locking, unlocking and activation
device 11 via the RF radio wave transmitter 122.
[0114] Accordingly, after the authentication process in the
locking, unlocking and activation device 11, the startup of the
engine 117 is realized.
[0115] An authority regarding a function of locking, unlocking, or
activating the vehicle 10 imparted by the center server 30 may be
defined in the authentication key.
[0116] For example, when the authentication key has solely the
authority to unlock some of the doors of the vehicle 10, the key
ECU 124 transmits an unlocking signal including information for
designating the door to be unlocked to the key unit 12 via the RF
radio wave transmitter 122. Accordingly, solely some of the doors
of the vehicle 10 can be unlocked as described above.
[0117] For example, when the authentication key does not have the
authority to activate the engine 117, the key ECU 124 may not
perform exchange with the locking, unlocking and activation device
11 even when the signal in the LF band from the locking, unlocking
and activation device 11 based on a pressing manipulation of the
activation switch is received by the LF radio wave receiver 121.
Accordingly, it is possible to prohibit the activation of the
engine 117 according to the authority of the authentication
key.
[0118] The GPS module 13 receives GPS signals transmitted from
three or more satellites and, desirably, four or more satellites
over the vehicle 10, and measures a location of the vehicle 10. The
GPS module 13 is communicably connected to the DCM 14 or the like
via a one-to-one communication line or an in-vehicle network such
as a CAN, and the measured location information of the vehicle 10
is input to the DCM 14 or the like.
[0119] The DCM 14 is a communication device that bidirectionally
communicates with the center server 30 over a predetermined
communication network. The DCM 14 transmits current location
information of the vehicle 10 input from the GPS module 13 to the
center server 30 at a predefined timing or according to a request
from the center server 30, or the like. The DCM 14 transmits, to
the center server 30, various types of vehicle information (for
example, information indicating that unlocking of the door of the
vehicle 10 or activation of the vehicle 10 is performed based on
the authentication key, which is acquired from the key unit 12)
that can be acquired over an in-vehicle network such as a CAN at a
predefined timing or according to a request from the center server
30 or the like. The DCM 14 activates a buzzer 15 in response to an
activation request received from the center server 30 via a
one-to-one communication line or an in-vehicle network such as a
CAN.
[0120] The buzzer 15 (an example of the alarm device) is mounted,
for example, in an engine compartment behind a front grille of the
vehicle 10, and outputs a predetermined buzzer sound to the
surroundings of the vehicle 10. Accordingly, it is possible to
alert the surroundings of the vehicle 10 that improper behaviors
are committed in the vehicle 10 by a third person other than a
vehicle owner, close relatives of the vehicle owner or the
like.
[0121] The mobile terminal 20 includes a communication device 21, a
communication device 22, a processing device 23, a touch panel
display (hereinafter simply referred to as a "display") 24, a GPS
module 25, and a camera 26.
[0122] The communication device 21 is any device that performs near
field communication with the mobile terminal 20 according to the
same communication standard as that of the communication device
123. As described above, in a case of the embodiment, the
communication device 21 is, for example, a BLE communication
module.
[0123] The communication device 22 is any device that communicates
with the center server 30, the service management server 40, or the
like over a predetermined communication network. The communication
device 22 is a mobile communication module corresponding to a
communication standard such as Long Term Evolution (LTE), 4th
Generation (4G), or 5th Generation (5G).
[0124] The processing device 23 performs various control processes
in the mobile terminal 20. The functions of the processing device
23 may be realized by any hardware, any software, or a combination
of any hardware and any software, and includes, for example, a CPU,
a RAM, a ROM, an auxiliary storage device, an RTC, and various
interfaces for communication. The processing device 23 includes,
for example, a communication processing unit 2301, a communication
processing unit 2302, an authentication key acquisition unit 2303,
an authentication request unit 2304, and a locking and unlocking
request unit 2305 as functional units that are realized by
executing one or more programs stored in the ROM or the auxiliary
storage device on the CPU. The processing device 23 includes, for
example, a storage unit 2300 that is realized as a storage area in
the auxiliary storage device, and a process of storing various
pieces of data in the storage unit 2300 is realized by a
predetermined program stored in the ROM or the auxiliary storage
device.
[0125] The communication processing unit 2301 performs
bidirectional near field communication with the key unit 12 using
the communication device 21 and performs transmission and reception
of various signals.
[0126] The communication processing unit 2302 connects to the
predetermined communication network using the communication device
22 and transmits and receives various signals such as a data signal
or a control signal to and from the center server 30, the service
management server 40, and the like.
[0127] The authentication key acquisition unit 2303 acquires the
authentication key from the center server 30, for example,
according to a predetermined manipulation of the user with respect
to a predetermined graphical user interface (GUI) displayed on the
display 24, and stores the acquired authentication key in the
storage unit 2300. Hereinafter, the description will be given on
the premise that various manipulations with respect to the mobile
terminal 20 are performed by a manipulation with respect to the GUI
displayed on the display 24 in conjunction with the operation of
the key application.
[0128] For example, the authentication key acquisition unit 2303 of
the mobile terminal 20Aa transmits an authentication key
acquisition request to the center server 30 via the communication
processing unit 2302. Accordingly, the center server 30 receives
the authentication key acquisition request, and issues the
authentication key when the center server 30 determines that the
authentication key acquisition request is a regular authentication
key acquisition request. The authentication key acquisition unit
2303 acquires the authentication key distributed from the center
server 30 via the communication processing unit 2302.
[0129] For example, the authentication key acquisition unit 2303 of
the mobile terminal 20Ab acquires the authentication key
distributed from the center server 30 to the mobile terminal 20Ab
via the communication processing unit 2302 according to a key
sharing request (to be described below) transmitted from the mobile
terminal 20Aa to the center server 30.
[0130] The authentication key acquisition unit 2303 of the mobile
terminal 20Ab may transmit the authentication key acquisition
request by itself to the center server 30 via the communication
processing unit 2302. In this case, when the center server 30
receives the authentication key acquisition request from the mobile
terminal 20Ab, the center server 30 may perform an inquiry about
whether or not to permit distribution of the authentication key to
the mobile terminal 20Aa of the owner user.
[0131] For example, the authentication key acquisition unit 2303 of
each of the mobile terminals 20Ac, 20Ad, 20B transmits an
authentication key acquisition request to the delivery management
server 50, the C2C car sharing management server 70, and the B2C
car sharing management server 80 to request acquisition of the
authentication key. Accordingly, the delivery management server 50,
the C2C car sharing management server 70, and the B2C car sharing
management server 80 transmit an authentication key arrangement
request to the center server 30 according to reception of the
authentication key acquisition request, and the center server 30
issues the authentication key according to reception of the
authentication key arrangement request. The authentication key
acquisition unit 2303 acquires the authentication key distributed
from the center server 30 via the communication processing unit
2302.
[0132] The authentication key acquisition unit 2303 of the mobile
terminals 20Ac, 20Ad, 20B may transmit the authentication key
acquisition request to the center server 30 via the communication
processing unit 2302. In this case, the center server 30 may
perform an inquiry of the delivery management server 50, the C2C
car sharing management server 70, and the B2C car sharing
management server 80 to determine whether or not the authentication
key acquisition request is a regular authentication key acquisition
request.
[0133] The authentication request unit 2304 transmits an
authentication request to the key unit 12 of the vehicle 10 via the
communication processing unit 2301 to request authentication of the
mobile terminal 20 serving as a remote manipulation unit for
locking and unlocking the doors of the vehicle 10. For example,
when the authentication request unit 2304 finds a key unit
corresponding to the authentication key, and specifically, when an
advertising packet corresponding to the key unit 12 is received by
the communication processing unit 2301, the authentication request
unit 2304 may transmit the authentication request to the key unit
12. For example, the authentication request unit 2304 may transmit
the authentication request to the key unit 12 according to a
predetermined manipulation by the user.
[0134] The locking and unlocking request unit 2305 transmits an
unlocking request including an authentication key or a locking
request including the authentication key to the key unit 12 via the
communication processing unit 2301 according to the predetermined
manipulation by the user. Accordingly, even when the unlocking
request or the locking request has been transmitted to the key unit
12 before the authentication request is transmitted by the
authentication request unit 2304, locking and unlocking of the door
of the vehicle 10 based on the authentication process in the key
unit 12 can be realized. For example, an unlocking button for
requesting unlocking of the vehicle 10 and a locking button for
requesting locking of the vehicle 10 may be drawn in a GUI serving
as a manipulation screen of the display 24, a locking request may
be transmitted when the locking button is touched, and an unlocking
request may be transmitted when the unlocking button is touched.
The locking request and the unlocking request may be transmitted by
a manipulation with respect to a predetermined manipulation unit by
hardware provided in the mobile terminal 20.
[0135] For example, the functions of the authentication key
acquisition unit 2303, the authentication request unit 2304, and
the locking and unlocking request unit 2305 may be available to the
user by a predetermined application program installed in the ROM of
the processing device 23, the auxiliary storage device, or the like
being activated. Hereinafter, the description will be given on the
premise that the functions of the authentication key acquisition
unit 2303, the authentication request unit 2304, and the locking
and unlocking request unit 2305 of the processing device 23 are
available to the user by the key application already installed in
the processing device 23 (the auxiliary storage device or the ROM)
being activated.
[0136] The display 24 is, for example, a liquid crystal display or
an organic electroluminescence (EL) display, and is a display
device which is provided on a front surface of the mobile terminal
20 and also serving as a known touch panel type manipulation
unit.
[0137] The GPS module 25 receives GPS signals transmitted from
three or more satellites and, desirably, four or more satellites
above the mobile terminal 20, and measures the location of the
mobile terminal 20. The location measurement information (location
information of the mobile terminal 20) of the GPS module 25 is
input to the processing device 32.
[0138] The mobile terminal 20 may measure the location of the
mobile terminal 20 through base station location measurement based
on wireless communication with a plurality of base stations.
[0139] The camera 26 captures an image of the surrounding of the
mobile terminal 20 at a predetermined angle of view as viewed from
a lens provided on a front or rear surface of the mobile terminal
20 in response to a predetermined manipulation by the user. The
captured image taken by the camera 26 is sent to the processing
device 23.
[0140] The center server 30 includes a communication device 31 and
a processing device 32.
[0141] The functions of the center server 30 may be shared and
realized by a plurality of servers. Hereinafter, the same applies
to the delivery management server 50, the EC server 60, the C2C car
sharing management server 70, and the B2C car sharing management
server 80.
[0142] The communication device 31 is any device that performs
bidirectional communication with each of the vehicle 10, the mobile
terminal 20, and the service management server 40 over a
predetermined communication network.
[0143] The processing device 32 performs various control processes
in the center server 30. The functions of the processing device 32
may be realized by any hardware, any software, or a combination of
any hardware and any software, and the processing device 32 is
mainly configured of one or a plurality of server computers
including, for example, a CPU, a RAM, a ROM, an auxiliary storage
device, an RTC, and a predetermined communication interface.
Hereinafter, the same applies to processing devices 52, 62, 72, 82
to be described below of the delivery management server 50, the EC
server 60, the C2C car sharing management server 70, and the B2C
car sharing management server 80. The processing device 32
includes, for example, a communication processing unit 3201, a
condition determination unit 3202, and an authentication key
issuance unit 3203 as functional units that are realized by
executing one or more programs stored in the ROM or the auxiliary
storage device on the CPU. The processing device 32 includes, for
example, a storage unit 3200 that is realized as a storage area
defined in an auxiliary storage device of a server computer or an
external storage device connected to the server computer, and a
process in which various pieces of data are stored in the storage
unit 3200 is realized by a program stored in the ROM or the
auxiliary storage device. Hereinafter, the same applies to the
storage units 520, 620, 720, 820 to be described below.
[0144] The communication processing unit 3201 controls the
communication device 31 to perform exchange of various signals such
as control signals and information signals with the vehicle 10, the
mobile terminal 20, and the service management server 40.
[0145] The condition determination unit 3202 determines whether or
not the authentication key acquisition request or the
authentication key arrangement request is a regular authentication
key acquisition request or a regular authentication key arrangement
request according to reception of an authentication key acquisition
request from the mobile terminal 20 or an authentication key
arrangement request from the service management server 40 received
by the communication processing unit 3201.
[0146] When the condition determination unit 3202 determines that
the authentication key acquisition request or the authentication
key arrangement request is the regular one, the authentication key
issuance unit 3203 specifies a specification of the authentication
key to be issued and issues an authentication key corresponding to
the specified specification. For example, the authentication key
issuance unit 3203 specifies the vehicle 10 that is a target of
locking and unlocking using the authentication key or the key unit
12 corresponding to the vehicle 10. For example, the authentication
key issuance unit 3203 specifies the authority of the
authentication key regarding a period of time in which the
authentication key is valid (available) and the number of times the
authentication key is available. For example, the authentication
key issuance unit 3203 specifies the authority of the
authentication key regarding the unlocking or activation of the
vehicle 10, such as lockable and unlockable doors and whether or
not the vehicle 10 can be activated. For example, the
authentication key issuance unit 3203 specifies the authority of
the authentication key regarding the temporary key sharing, such as
whether or not the authentication key can be shared with another
mobile terminal 20 through a temporary key sharing to be described
below, a period of time in which the authentication key can be
shared with the other mobile terminal 20, and the number of times
the authentication key can be shared with the other mobile terminal
20. Hereinafter, the authority of the authentication key regarding
the period of time in which the authentication key is available,
the number of times the authentication key is available, and the
like, the authority of the authentication key regarding the
unlocking or activation of the vehicle 10, and the authority of the
authentication key regarding the temporary key sharing are
collectively simply referred to as "various authorities of the
authentication key". The authentication key issuance unit 3203
distributes the authentication key issued to the mobile terminal 20
that is a target via the communication processing unit 3201.
[0147] Details of Configuration Regarding Key Sharing Service
[0148] A configuration regarding the key sharing service in the
authentication key management system 1 will be described with
reference to FIG. 3.
[0149] FIG. 3 is a diagram mainly illustrating an example of a
configuration regarding the key sharing service in the
authentication key management system 1. Hereinafter, a
configuration regarding the key sharing service in the
authentication key management system 1 will be mainly described
with reference to FIG. 3, and duplicate description on the
configuration overlapping the configuration regarding locking,
unlocking, and activation of the vehicle 10 described above will be
omitted as much as possible. Hereinafter, the same applies to
description of FIGS. 4 to 6.
[0150] The processing device 23 of the mobile terminal 20Aa carried
by the owner user of the vehicle 10A includes the communication
processing unit 2301, the communication processing unit 2302, the
authentication key acquisition unit 2303, the authentication
request unit 2304, and the locking and unlocking request unit 2305,
as described above. The processing device 23 of the mobile terminal
20Aa further includes a user registration request unit 2306, a
service use registration request unit 2307, a service use situation
request unit 2308, and a key sharing request unit 2309 as
functional units that are realized by executing one or more
programs stored in the ROM or the auxiliary storage device on the
CPU.
[0151] In the embodiment, the description will be given on the
premise that the functions of the user registration request unit
2306, the service use registration request unit 2307, the service
use situation request unit 2308, and the key sharing request unit
2309 of the mobile terminal 20Aa are available to the owner user by
the key application being activated and the user authentication
based on bidirectional communication with the center server 30
being successful. The description will be given on the premise that
the user authentication is performed by the center server 30 based
on an ID defined for the owner user (hereinafter simply referred to
as an "owner user ID") in advance and a password corresponding to
the owner user ID.
[0152] The user registration request unit 2306 requests the center
server 30 to register the regular user of the vehicle 10A that uses
various services (the key sharing service, the vehicle cabin
delivery service, the C2C car sharing service, and the like) for
using the vehicle 10A, according to a predetermined manipulation by
the owner user. For example, the user registration request unit
2306 transmits a user registration request including an owner user
ID and a password and attribute information (for example, a name,
age, and relationship with the owner user) for specifying a
sub-user who is a registration target to the center server 30 via
the communication processing unit 2302.
[0153] When a notification indicating that registration of the
sub-user has been completed (user registration completion
notification) is received from the center server 30 by the
communication processing unit 2302, the user registration request
unit 2306 stores an ID (hereinafter simply referred to as a
"sub-user ID") and a password of the sub-user included in the user
registration completion notification in the storage unit 2300. In
this case, the user registration request unit 2306 may transmit the
sub-user ID and the password to the mobile terminal 20Ab carried by
the registered sub-user via the communication processing unit 2301
according to a predetermined manipulation by the owner user.
[0154] The service use registration request unit 2307 requests the
center server 30 to perform registration of use of various services
for using the vehicle 10A by the regular user of the vehicle 10A
according to a predetermined manipulation by the owner user. That
is, the service use registration request unit 2307 requests
registration of the authentication key arrangement authority of the
key sharing management unit 3207 or the service management server
40 corresponding to various services for allowing regular users of
the vehicle 10A to use various services, as described above. For
example, the service use registration request unit 2307 transmits a
service use registration request including the owner user ID and
the password, the information for specifying the vehicle 10A to be
used for various services, the information for specifying the
service that is a target, and the ID of the regular user who uses
the target service (the owner user ID or the sub-user ID) to the
center server 30 via the communication processing unit 2302.
Hereinafter, the owner user ID and the sub-user ID may be
collectively referred to as a "regular user ID". Accordingly, the
service use registration request unit 2307 can register a sub-user
who uses the key sharing service in the center server 30.
[0155] The service use registration request unit 2307 receives a
notification that the use registration of the service based on the
service use registration request has been completed from at least
one of the center server 30 and the service management server 40
through the communication processing unit 2302. The service use
registration request unit 2307 causes the display 24 to display an
indication that the use registration of the specific service by the
regular user of the vehicle 10A based on the predetermined
manipulation by the owner user has been completed. Accordingly, the
owner user can figure out that the use registration of the specific
service by the regular user has been completed.
[0156] The service use situation request unit 2308 requests the
center server 30 to provide information on the use situation of
various services (service use situation information) including the
key sharing service by the regular user of the vehicle 10A for
which the use registration has been completed in a form
corresponding to the owner user ID according to a predetermined
manipulation by the owner user. For example, the service use
situation request unit 2308 transmits a service use situation
request including the owner user ID and the password to the center
server 30 via the communication processing unit 2302. When the
service use situation information received from the center server
30 by the communication processing unit 2302 is received, the
service use situation request unit 2308 displays the service use
situation information on the display 24. Accordingly, the owner
user can centrally figure out the information on the use situation
of each service by each of the regular users registered for use in
the center server 30 such that the information is linked to the
owner user ID.
[0157] The key sharing request unit 2309 requests the center server
30 to distribute the authentication key for performing locking,
unlocking or activating of the vehicle 10A to the sub-user
registered for use in the key sharing service according to a
predetermined manipulation by the owner user. For example, the key
sharing request unit 2309 transmits a key sharing request including
an owner user ID and a password, information for specifying the
vehicle 10A that is a locking and unlocking target by the
authentication key, and information (for example, a sub-user ID)
for specifying the sub-user that is a distribution (sharing) target
of the authentication key to the center server 30 via the
communication processing unit 2302. When the key sharing request
unit 2309 transmits the key sharing request, use period information
(for example, a date and time of use start and a date and time of
use end) regarding a period of time in which the authentication key
set and distributed by a predetermined manipulation by the owner
user is available may be included in the key sharing request. The
key sharing request may include authority information on various
authorities of the authentication key, such as an authority of the
authentication key regarding a period of time in which the
authentication key is available or the number of times the
authentication key is available, an authority of the authentication
key regarding the unlocking or activation of the vehicle, and an
authority of the authentication key regarding temporary key sharing
to be described below, which can be designated according to the
predetermined manipulation by the owner user. Accordingly, as
described below, when the authentication key available at the same
time is shared among the mobile terminals 20, the owner user can
appropriately set authority information such that use of the
vehicle 10A by a user other than the owner user can be limited.
Therefore, security of the vehicle 10A can be improved.
[0158] The key sharing request unit 2309 may set the mobile
terminals 20 (that is, at least one of the mobile terminals 20Aa,
20Ab) of a plurality of regular users of the vehicle 10A as
distribution targets and request the center server 30 to distribute
the authentication key of which the periods of time in which the
authentication key is available overlap according to the
predetermined manipulation by the owner user. That is, in the key
sharing request, the regular users that are authentication key
distribution targets may be designated, or the owner users may be
included among the regular users. In the key sharing request, the
period of time in which the authentication key is available for
each of the designated regular users may overlap. Accordingly, the
authentication key of the vehicle 10A available at the same time
can be shared by the regular users. Therefore, for example, when a
plurality of persons gets on the vehicle 10A together and go out
for travel, camp, or the like, each of passengers can lock and
unlock the vehicle 10A without renting the mobile terminal 20 in
which the authentication key has been stored, and therefore,
convenience for users can be improved.
[0159] Even when the key sharing request unit 2309 may share the
distributed authentication key with another mobile terminal 20
(that is, the mobile terminal 20 in which the key application is
installed) according to a predetermined manipulation by the owner
user (hereinafter, a sharing option of the authentication key will
be referred to as "temporary key sharing"). In this case, the other
mobile terminal 20 may be the mobile terminal 20Ab of the sub-user
or may be the mobile terminal 20 of a user other than the sub-user,
that is, a user temporarily using the vehicle 10A.
[0160] For example, the key sharing request unit 2309 transmits the
authentication key (more specifically, a copy of the authentication
key) to another mobile terminal 20 via the communication processing
unit 2301. Accordingly, the owner user of the vehicle 10A can share
the authentication key with the other user even when a plurality of
persons suddenly gets on the vehicle 10A together and go out for
traveling or the like. It is possible to share the authentication
key available at the same time with the other mobile terminal 20
directly from the mobile terminal 20Aa. Accordingly, for example,
even when the mobile terminal 20Aa is at a place at which a
communication situation in a wireless mobile communication network
is poor or out of a communication range, the owner user of the
vehicle 10A can share the authentication key with the other
user.
[0161] In this case, the key sharing request unit 2309 may transmit
the authentication key of which the authority regarding the period
of time in which the authentication key is available or the number
of times the authentication key is available or the authority
regarding the unlocking or activation of the vehicle 10A, which is
set based on the predetermined manipulation by the owner user or
which is defined in advance, has been restricted, to the other
mobile terminal 20 via the communication processing unit 2301.
Specifically, for example, an authentication key with an authority
to limit the period of time in which the authentication key is
available or the number of times the authentication key is
available to, for example, 30 minutes or once, or an authentication
key with an authority, for example, solely to lock and unlock doors
for getting on and off the vehicle 10A or prohibit activation of
the vehicle 10A may be transmitted to another mobile terminal 20.
Hereinafter, the same applies to the case of temporary key sharing
that is performed via the center server 30. Accordingly, security
of the vehicle 10A due to the temporary key sharing can be
improved.
[0162] When the temporary key sharing is performed, the key sharing
request unit 2309 may cause the authentication key to be
distributed from the center server 30 to the other mobile terminal
20, as in a case of a normal key sharing. In this case, the key
sharing request unit 2309 may transmit a temporary key sharing
request including information (for example, an issued ID embedded
in the authentication key) for specifying the distributed
authentication key and information for designating the other mobile
terminal 20 that is a distribution target to the center server 30
via the communication processing unit 2302, to cause the
authentication key of the vehicle 10A to be distributed from the
center server 30 to the other mobile terminal 20.
[0163] For example, when the other mobile terminal 20 is the mobile
terminal 20Ab of the sub-user, the key sharing request unit 2309
may transmit a temporary key sharing request including the sub-user
ID to the center server 30 via the communication processing unit
2302.
[0164] For example, the key sharing request unit 2309 acquires
predetermined identification information (for example, a quick
response (QR) code (registered trademark) corresponding to the user
of another mobile terminal 20 registered as a user installing the
key application in the center server 30) from the other mobile
terminal 20 via the communication processing unit 2301. The key
sharing request unit 2309 may transmit a temporary key sharing
request for designating another mobile terminal 20 specified based
on the identification information as a distribution target, to the
center server 30.
[0165] The mobile terminal 20Aa may acquire the identification
information using another method. For example, the mobile terminal
20Aa may acquire identification information corresponding to the
user of the other mobile terminal 20 in which the identification
information displayed on the display 24 of the other mobile
terminal 20 is recognized using a mounted camera function. For
example, the mobile terminal 20Aa may acquire the identification
information transmitted from the user of the other mobile terminal
20 to a mail address or an SNS account of the owner user.
[0166] For example, according to a predetermined manipulation by
the owner user, the key sharing request unit 2309 transmits a
candidate terminal information request for requesting a candidate
terminal information on a candidate terminal that is a candidate
for the other mobile terminal 20 present around a current location
of the mobile terminal 20Aa to the center server 30 via the
communication processing unit 2302. When the candidate terminal
information is received from the center server 30 by the
communication processing unit 2302, the key sharing request unit
2309 causes the display 24 to display the candidate terminal
information. When the candidate terminal information is displayed
on the display 24, information for specifying a candidate terminal
in which a specific manipulation or operation is performed among
candidate terminals may be included in the candidate terminal
information replied from the center server 30. Accordingly, the
owner user of the vehicle 10A can specify another mobile terminal
20 from among the candidate terminals displayed on the display 24
of the mobile terminal 20Aa by the user of the other mobile
terminal 20 as a key sharing target performing a specific
manipulation or operation with respect to the mobile terminal 20.
The key sharing request unit 2309 may transmit a temporary key
sharing request for designating the other mobile terminal 20
specified from among the candidate terminals as a distribution
target to the center server 30, according to a predetermined
manipulation by the owner user.
[0167] The key sharing request unit 2309 may activate the key
application according to a predetermined manipulation by the owner
user to transmit link information according to a uniform resource
locator (URL) scheme for allowing the other mobile terminal 20 to
acquire the authentication key from the center server 30
(hereinafter, simply referred to as "link information") to a mail
address or an account of an SNS of the user of the other mobile
terminal 20 via the communication processing unit 2302. In this
case, the key sharing request unit 2309 transmits a temporary key
sharing request for designating the acquired authentication key to
the center server 30 via the communication processing unit 2302
according to a predetermined manipulation by the owner user, and
acquires the link information replied from the center server 30
according to the temporary key sharing request. Accordingly, the
key sharing request unit 2309 can cause the authentication key to
be distributed from the center server 30 to the other mobile
terminal 20.
[0168] The temporary key sharing may be executed from the mobile
terminal 20Ab of the sub-user to which the authentication key has
already been distributed. That is, a function regarding the
temporary key sharing in the key sharing request unit 2309 may be
included in a function of the key application that is installed in
the processing device 23 of the mobile terminal 20Ab of the
sub-user. Accordingly, it is not needed to lend and borrow the
mobile terminal 20Ab of the sub-user who has acquired the
authentication key even when a plurality of persons including no
owner user gets on the vehicle 10A together, and convenience for
the sub-user of the vehicle 10A can be further improved.
Hereinafter, description will be given on the premise that the
temporary key sharing can be performed from the mobile terminal
20Ab of the sub-user.
[0169] The processing device 32 of the center server 30 includes
the communication processing unit 3201, the condition determination
unit 3202, the authentication key issuance unit 3203, and the
storage unit 3200, as described above. The processing device 32 of
the center server 30 includes, for example, a location information
management unit 3204, a schedule management unit 3205, a
registration management unit 3206, and a key sharing management
unit 3207 as functional units realized by executing one or more
programs stored in an auxiliary storage device or the like of a
server computer on a CPU.
[0170] When the authentication key acquisition request has been
received from the mobile terminals 20Aa, 20Ab by the communication
processing unit 3201, the condition determination unit 3202
performs authentication based on the regular user ID and the
password included in the authentication key acquisition request.
For example, the condition determination unit 3202 collates the
regular user ID and password registered in the storage unit 3200
with the regular user ID and password included in the
authentication key acquisition request, and determines that the
authentication is successful, that is, the authentication key
acquisition request is a regular authentication key acquisition
request when both match.
[0171] The condition determination unit 3202 determines whether or
not the authentication key arrangement request transmitted from the
key sharing management unit 3207 to be described below is a regular
authentication key arrangement request. For example, when the
authentication is successful based on authentication information
(for example, the ID and the password) included in the
authentication key arrangement request from the key sharing
management unit 3207, the condition determination unit 3202 may
determine that the authentication key arrangement request is a
regular authentication key arrangement request.
[0172] When the condition determination unit 3202 determines that
the authentication key acquisition request or the authentication
key arrangement request is a regular authentication key acquisition
request or a regular authentication key arrangement request, the
authentication key issuance unit 3203 issues the authentication key
and distributes the authentication key to the mobile terminal 20
via the communication processing unit 3201.
[0173] The location information management unit 3204 manages the
location information of the vehicles 10 (10A, 10B). Specifically,
the location information management unit 3204 transmits a location
information request to the vehicle 10 via the communication
processing unit 3201. In response to the location information
request, the DCM 14 of the vehicle 10 replies the center server 30
with the location information of the vehicle 10 input from the GPS
module 13, and the location information management unit 3204 can
acquire the location information of the vehicle 10.
[0174] The location information management unit 3204 acquires the
location information from the vehicle 10A via the communication
processing unit 3201 and monitors the location information of the
vehicle 10A in real time to figure out a movement situation of the
vehicle 10A. Accordingly, for example, the location information
management unit 3204 can notify the owner user of the location
information of the vehicle 10A rented to the sub-user via the
communication processing unit 3201. For example, the location
information management unit 3204 can notify the mobile terminal
20Ab of the sub-user of information such as whether or not the
vehicle 10A scheduled to be rented to the sub-user is directed to a
designated location (for example, home) or a reference for
returning, via the communication processing unit 3201.
[0175] The schedule management unit 3205 manages the use situation
of the vehicle 10A regarding various services. For example, the
schedule management unit 3205 periodically acquires a use schedule
of the vehicle 10 by the key sharing service and, specifically,
information on a date and time on which the authentication key
distributed by the key sharing service is available, from the key
sharing management unit 3207. The schedule management unit 3205
acquires the use schedule of the vehicle 10A by each of the vehicle
cabin delivery service and the C2C car sharing service from the
delivery management server 50 and the C2C car sharing management
server 70 via the communication processing unit 3201. The schedule
management unit 3205 generates information on the use schedule of
the vehicle 10A (vehicle use schedule information) over a plurality
of services based on the acquired use schedule of the vehicle 10A
regarding the various services, and updates the vehicle use
schedule information stored in the storage unit 3200.
[0176] The registration management unit 3206 performs registration
of the regular user (the sub-user) who uses various services
according to the user registration request received from the mobile
terminal 20Aa of the owner user by the communication processing
unit 3201. For example, the registration management unit 3206
collates the owner user ID and password included in the user
registration request from the mobile terminal 20Aa with the owner
user ID and password stored in the storage unit 3200, and
determines that the user registration request is a regular user
registration request when both match. That is, the registration
management unit 3206 determines that the authentication is
successful. The registration management unit 3206 registers the
sub-user ID included in the regular user registration request in a
user service registration information database (DB) in the storage
unit 3200 as the regular user who can use various services.
[0177] The registration management unit 3206 performs registration
of use of various services by the regular user of the vehicle 10A
according to the service use registration request received from the
mobile terminal 20Aa of the owner user by the communication
processing unit 3201. That is, according to the service use
registration request, the registration management unit 3206
performs registration of an authentication key arrangement
authority of the key sharing management unit 3207 or the service
management server 40 corresponding to various services to allow the
user of the vehicle 10A to use various services. For example, the
registration management unit 3206 performs the same authentication
process as described above based on the owner user ID and the
password included in the service use registration request from the
mobile terminal 20Aa to determine whether the service use
registration request is a regular service use registration request.
When the service use registration request is a regular service use
registration request, the registration management unit 3206
determines whether or not the regular user ID included in the
service use registration request has already been registered in the
user service registration information DB. When the regular user ID
included in the service use registration request has already been
registered in the user service registration information DB, the
registration management unit 3206 registers the service of a target
specified by the service use registration request in the user
service registration information database (DB) in the storage unit
3200 as a service available to the regular user corresponding to
the regular user ID.
[0178] Specifically, the registration management unit 3206
constructs a user service registration information DB such that
service-specific information for specifying a target service,
vehicle-specific information for specifying the vehicle 10A, a
regular user ID for specifying a regular user who uses the service,
and service link information in which the vehicle-specific
information corresponding to the vehicle 10A and the regular user
ID are associated with the target service is linked to the owner
user ID.
[0179] The service-specific information is, for example, a service
ID that is defined for each service. Specifically, when a plurality
of companies provides, for example, the C2C car sharing service, a
unique service ID is defined for each of the companies. For
example, when the same company provides a plurality of C2C car
sharing services, a unique service ID is defined for each of the
services provided by the same company. When a vehicle cabin
delivery service is provided by a combination of a plurality of
delivery companies and a plurality of EC companies, a unique
service ID may be defined for each combination of the delivery
company and the EC company, and the target service may be specified
by a combination of the unique service ID defined for each of the
delivery companies and a unique service ID defined for each of the
EC companies.
[0180] The vehicle-specific information may be any information as
long as the information is able to specify the vehicle 10A that is
a target of locking, unlocking, or activation using the
authentication key. For example, the vehicle-specific information
may be identification information such as a vehicle ID or a vehicle
identification number (VIN), which is defined for each vehicle 10A.
For example, the vehicle-specific information may be identification
information such as a key unit ID, which is defined for each
in-vehicle device related to locking, unlocking, or activation of
the doors based on the authentication key mounted on the vehicle
10A such as the key unit 12. Hereinafter, description will be given
on the premise that the vehicle-specific information is the key
unit ID.
[0181] The service link information is information needed for the
key sharing management unit 3207, the delivery management server
50, the EC server 60, and the C2C car sharing management server 70
managing various services to transmit the authentication key
arrangement request to thereby cause the authentication key
issuance unit 3203 to issue the authentication key of the vehicle
10A that is a target and distribute the authentication key to the
mobile terminal 20 that is a target. That is, the authentication
key issuance unit 3203 can specify the vehicle 10A that is a target
of locking, unlocking, or activation using the authentication key
and issue an appropriate authentication key by receiving the
authentication key arrangement request including the service link
information from the key sharing management unit 3207, the delivery
management server 50, the EC server 60, and the C2C car sharing
management server 70.
[0182] The service link information may be any information as long
as the target service is associated with the vehicle 10A and the
user who uses the service in the center server 30. For example, the
service link information may be a login ID of the regular user at a
website for users of various services corresponding to the key
sharing management unit 3207, the delivery management server 50,
the EC server 60, and the C2C car sharing management server 70
(hereinafter referred to as a "service login ID" for convenience).
In this case, the service use registration request unit 2307 of the
mobile terminal 20Aa transmits the service use registration request
including the service login ID of the regular user that is a
registration target corresponding to the various services to the
center server 30 via the communication processing unit 2302. When
the regular user that is a registration target corresponding to
various services does not acquire the service login ID, the
processing device 23 of the mobile terminal 20Aa may activate a
predetermined browser and acquire the service login ID of a website
of various services. Accordingly, when the user (the regular user
of the vehicle 10A) logs in to the website at the time of
requesting a service that is a target, the delivery management
server 50 or the C2C car sharing management server 70 can figure
out the service login ID corresponding to the service link
information and easily arrange the authentication key regarding the
service provision. Hereinafter, description will be given on the
premise that the service link information on the vehicle cabin
delivery service and the C2C car sharing service is the service
login ID.
[0183] In a case of regular users who regularly use a plurality of
vehicles 10A, the center server 30 can specify the regular user
solely by using the service login ID, but cannot specify the
vehicle 10A. Therefore, information for indirectly specifying the
vehicle 10A (for example, information obtained by encrypting the
vehicle-specific information using a predetermined scheme) in
addition to the service login ID may be included in the service
link information.
[0184] When the registration of use of various services has been
completed, registration management unit 3206 notifies the mobile
terminals 20Aa, 20Ab corresponding to the regular users that are
registration targets that the registration of use of various
services has been completed, via the communication processing unit
3201. When the registration of use of various services has been
completed, the registration management unit 3206 transmits a
service use registration completion notification including the
service link information to the key sharing management unit 3207 or
the service management server 40 that performs an operation and
management of a service that is a registration target.
[0185] A notification that the registration of use of various
services for the mobile terminals 20Aa, 20Ab has been completed may
be transmitted from the service management server 40 that has
received the service use registration completion notification.
[0186] When the service use situation request has been received
from the mobile terminal 20Aa by the communication processing unit
3201, the registration management unit 3206 generates the service
use situation information based on, for example, the vehicle use
schedule information managed by the user service registration
information DB of the storage unit 3200 or the schedule management
unit 3205, and distributes the service use situation information to
the mobile terminal 20Aa via the communication processing unit
3201.
[0187] The key sharing management unit 3207 performs an operation
and management of the key sharing service.
[0188] For example, according to the key sharing request received
from the mobile terminal 20Aa of the owner user by the
communication processing unit 3201, the key sharing management unit
3207 performs the arrangement of the authentication key to the
mobile terminals 20Aa, 20Ab corresponding to the regular user ID
designated by the key sharing request. Specifically, the key
sharing management unit 3207 collates the owner user ID and the
password included in the key sharing request with the owner user ID
and the password stored in the storage unit 3200, and determines
that the key sharing request is a regular key sharing request when
both match. The key sharing management unit 3207 inquires of the
schedule management unit 3205 and determines whether or not there
is mismatch, that is, overlapping of the use date and time
regarding the use of the services and the vehicle 10A of the
regular users between the use period information included in the
key sharing request and the latest vehicle use schedule
information. When there is no overlapping of the use time, the key
sharing management unit 3207 transmits, to the authentication key
issuance unit 3203, the authentication key arrangement request
including information on the regular users corresponding to the
mobile terminals 20Aa, 20Ab that are distribution targets of the
authentication key specified by the information included in the key
sharing request, and the vehicle 10A that is a target of locking,
unlocking, or activation using the authentication key, and
authority information such as a period of time in which the
authentication key is available to the respective mobile terminals
20Aa, 20Ab, the number of times the authentication key is available
to the respective mobile terminals 20Aa, 20Ab, unlockable doors,
and whether or not the vehicle can be activated. Accordingly, the
authentication key issuance unit 3203 can specify the regular user
IDs corresponding to the mobile terminals 20Aa, 20Ab that are
distribution targets of the authentication key, and the vehicle 10A
that is a target of locking, unlocking, or activation using the
authentication key, and issue an appropriate authentication
key.
[0189] For example, the key sharing management unit 3207 confirms,
for example, attribute information (for example, an age or presence
or absence of a driving license) of the users of the mobile
terminals 20Aa, 20Ab that are distribution targets of the
authentication key that is designated by the key sharing request,
which is stored in the storage unit 3200. When the users of the
mobile terminal 20Aa, 20Ab (regular users of the vehicle 10A) that
are distribution targets of the authentication key are users
determined to be unable to drive the vehicle 10A, the key sharing
management unit 3207 allows an authentication key to which an
authority to be unable to activate the vehicle 10A has been
imparted to be issued to the mobile terminal 20 of the user. The
user who cannot drive the vehicle 10A is, for example, a user who
has not reached an age at which the user can acquire a driver's
license or a user who does not acquire the driver's license.
Specifically, the key sharing management unit 3207 transmits an
authentication key arrangement request in which an indication that
the activation of the vehicle 10A is prohibited is included in
authority information corresponding to the mobile terminals 20Aa,
20Ab corresponding to the users determined to be unable to drive
the vehicle 10A, to the authentication key issuance unit 3203.
Accordingly, since the authentication key issuance unit 3203 can
distribute the authentication key to which the authority to
prohibit the activation of the vehicle 10A has been imparted, to
the mobile terminals 20Aa, 20Ab of the users who are unable to
drive the vehicle 10A, it is possible to improve safety of the
vehicle 10A in the key sharing service.
[0190] For example, the key sharing management unit 3207
distributes the authentication key of the vehicle 10A to the other
mobile terminal 20 designated by the temporary key sharing request
received from the mobile terminal 20Aa of the owner user by the
communication processing unit 3201 based on the temporary key
sharing request. Specifically, the key sharing management unit 3207
specifies the ID of the installing user corresponding to the other
mobile terminal 20 that is a distribution target (hereinafter
simply referred to as an "installing user ID") based on the
installing user information DB of the key application stored in the
storage unit 3200. The key sharing management unit 3207 transmits
an authentication key arrangement request including the specified
installing user ID and information (for example, an issued ID of
the authentication key included in the temporary key sharing
request) corresponding to the authentication key designated by the
temporary key sharing request to the authentication key issuance
unit 3203. Accordingly, the authentication key issuance unit 3203
can specify another mobile terminal 20 that is a distribution
target based on the installing user ID, the issued ID of the
authentication key, and the like, and distribute the authentication
key to the other mobile terminal 20 via the communication
processing unit 3201.
[0191] A function of the key sharing management unit 3207 may be
transferred to a server (a key sharing management server) outside
the center server 30, which may be included in the service
management server 40, similar to other services for using the
vehicle 10A.
[0192] The mobile terminal 20Ab carried by the sub-user includes
the communication processing unit 2301, the communication
processing unit 2302, the authentication key acquisition unit 2303,
the authentication request unit 2304, the locking and unlocking
request unit 2305, and the storage unit 2300, as described
above.
[0193] In the embodiment, description will be given on the premise
that the function of the authentication key acquisition unit 2303
of the mobile terminal 20Ab is available to the sub-user by the key
application being activated and the user authentication based on
bidirectional communication with the center server 30 being
successful. Description will be given on the premise that the user
authentication is performed by the center server 30 based on the
sub-user ID and the password. Description will be given on the
premise that functions of the authentication request unit 2304 and
the locking and unlocking request unit 2305 of the mobile terminal
20Ab are available to the sub-user by the key application being
activated.
[0194] The authentication key acquisition unit 2303 acquires the
authentication key distributed from the center server 30 according
to the key sharing request transmitted from the mobile terminal
20Aa to the center server 30 via the communication processing unit
2302, as described above. Accordingly, the mobile terminal 20Ab can
lock and unlock the doors of the vehicle 10A or activate the
vehicle 10A based on the functions of the communication processing
unit 2301, the authentication request unit 2304, and the locking
and unlocking request unit 2305. That is, the sub-user carrying the
mobile terminal 20Ab can directly use the vehicle 10A through the
key sharing service. For example, the sub-user can lock and unlock
the vehicle 10A using the mobile terminal 20Ab without performing
key exchange with the owner user and drive the vehicle 10A.
Similarly, the owner user can rent the vehicle 10A to the sub-user
without exchanging the key with the sub-user. Accordingly, it is
possible to improve convenience in rental of the vehicle 10A
between the owner user of the vehicle 10A and the sub-user through
the key sharing service in the authentication key management system
1.
[0195] The authentication key acquisition unit 2303 acquires the
authentication key that is distributed from the center server 30
according to the temporary key sharing request transmitted from the
mobile terminal 20Aa to the center server 30 via the communication
processing unit 2302, as described above. The same applies to a
case where the authentication key is distributed to another mobile
terminal 20 other than the mobile terminal 20Ab of the sub-user
according to the temporary key sharing request. Accordingly, the
other mobile terminal 20 including the mobile terminal 20Ab can
lock and unlock the doors of the vehicle 10A or activate the
vehicle 10A based on the functions of the communication processing
unit 2301, the authentication request unit 2304, and the locking
and unlocking request unit 2305. That is, for example, when a
plurality of persons including other regular users gets on the
vehicle 10A together and goes out and even when the sub-user
carrying the mobile terminal 20Ab does not acquire the
authentication key in advance, the sub-user does not have to rent
the mobile terminals 20Aa, 20Ab to which the authentication key has
already been distributed, and can directly use the vehicle 10A
using the mobile terminal 20Ab, such as locking and unlocking the
vehicle 10A or driving the vehicle 10A. Similarly, even when the
owner user has not caused the mobile terminal 20Ab of the sub-user
to acquire the authentication key, it is not needed for the owner
user to rent the mobile terminal 20Aa of the owner user to the
sub-user. Accordingly, it is possible to improve convenience of the
user in a case where a plurality of persons including the regular
user of the vehicle 10A gets on the vehicle 10A together and uses
the vehicle 10A through the temporary key sharing in the
authentication key management system 1.
[0196] Details of Configuration Regarding Vehicle Cabin Delivery
Service
[0197] A configuration regarding the vehicle cabin delivery service
in the authentication key management system 1 will be described
with reference to FIG. 4.
[0198] FIG. 4 is a diagram mainly illustrating an example of a
configuration regarding a vehicle cabin delivery service in the
authentication key management system 1. Hereinafter, the
configuration regarding the vehicle cabin delivery service in the
authentication key management system 1 will be mainly described
with reference to FIG. 4, and duplicate description on the
configuration overlapping the above-described configuration
regarding the key sharing service will be omitted as much as
possible.
[0199] The processing device 23 of the mobile terminal 20Aa carried
by the owner user of the vehicle 10A includes the communication
processing unit 2302, the user registration request unit 2306, the
service use registration request unit 2307, and the service use
situation request unit 2308, as described above.
[0200] The user registration request unit 2306 requests the center
server 30 to register the regular user (a sub-user) of the vehicle
10A who uses various services including the vehicle cabin delivery
service according to a predetermined manipulation by the owner
user, as described above.
[0201] The service use registration request unit 2307 requests the
center server 30 to perform the registration of use of various
services including the vehicle cabin delivery service for each
registered regular user (the owner user or the sub-user) according
to a predetermined manipulation by the owner user, as described
above.
[0202] For example, the service use registration request unit 2307
transmits, as the service link information, a service use
registration request for using the vehicle cabin delivery service
including a service login ID of a website for a user who uses the
service of the delivery management server 50 (hereinafter simply
referred to as a "delivery site") and a service login ID of the EC
site, which corresponds to the regular user of the vehicle 10A that
is a registration target, to the center server 30.
[0203] The service use situation request unit 2308 requests the
center server 30 to provide information on a use situation of
various services (service use situation information) including the
vehicle cabin delivery service of the regular user of the vehicle
10A for which the use registration has been performed, in a form
corresponding to the owner user ID according to a predetermined
manipulation by the owner user, as described above.
[0204] The delivery management server 50 that performs an operation
of the vehicle cabin delivery service includes a communication
device 51 and a processing device 52.
[0205] The communication device 51 is any device that performs
bidirectional communication with each of the mobile terminal 20,
the center server 30, and the EC server 60 over a predetermined
communication network.
[0206] The processing device 52 includes, for example, a
communication processing unit 521, a service cooperation
registration unit 522, a delivery reception unit 523, and a
delivery management unit 524 as functional units that are realized
by executing one or more programs stored in the ROM or the
auxiliary storage device on the CPU. The processing device 52
includes a storage unit 520 that is realized as a storage area of
an auxiliary storage device or the like of the server computer.
[0207] The communication processing unit 521 controls the
communication device 51 to perform transmission and reception of
various signals such as control signals or information signals to
and from each of the mobile terminal 20, the center server 30, and
the EC server 60.
[0208] The service cooperation registration unit 522 performs
information registration for cooperation between the center server
30 regarding the use of the vehicle cabin delivery service of the
regular user of the vehicle 10A and the delivery management server
50 according to the service use registration completion
notification received from the center server 30 by the
communication processing unit 521.
[0209] For example, the service cooperation registration unit 522
adds a flag indicating a use target of the vehicle cabin delivery
service to the service login ID (a part of service link
information) included in the service use registration completion
notification in the user management DB that manages the user of the
delivery site constructed in the storage unit 520. In addition, the
service cooperation registration unit 522 performs registration
such that information for specifying the vehicle 10A included in
the service link information and a service login ID of a website
(that is, the EC site) corresponding to the EC server 60 included
in the service use registration completion notification is linked
to the service login ID included in the service use registration
completion notification in the user management DB of the storage
unit 520. Accordingly, when the user corresponding to the service
login ID regularly uses the vehicles 10A, the delivery management
server 50 transmits an authentication key arrangement request to
the center server 30 for the vehicle 10A designated by the user.
When an order reception including a service login ID is received
from the EC server 60 by the communication processing unit 521, the
delivery management server 50 can specify the corresponding service
login ID of the delivery site. The delivery management server 50
transmits the authentication key arrangement request including
service link information such as the specified service login ID or
information for specifying the vehicle 10A corresponding to the
vehicle 10A designated by the user to the center server 30 such
that it is possible to cause the authentication key to be
distributed from the center server 30 to the mobile terminal 20Ac
of the deliverer, as described below.
[0210] The delivery reception unit 523 receives information
(delivery request information) on the package delivery request
including the service login ID of the EC site corresponding to an
orderer of the product at the EC site from the EC server 60 via the
communication processing unit 521. The delivery request information
received from the EC server 60 includes basic information such as
name, address, telephone number of the orderer corresponding to the
delivery destination. The delivery request information also
includes, for example, information (delivery destination
information) on the designated delivery destination, and
information (designated delivery date-and-time information) on the
scheduled delivery date and time designated by the orderer (client)
(designated delivery date and time), etc. In this case, when the
trunk of the vehicle 10A is designated as a delivery destination,
the delivery destination information may include information
(vehicle identification information) for specifying the vehicle 10A
corresponding to the delivery destination, such as identification
information (for example, a vehicle ID) of the vehicle 10A, and
information (parking location information) on a designated location
to which the deliverer is directed, i.e. a location in which the
vehicle 10A is (to be) parked for delivery of the package
(product). The delivery request information may include, for
example, information (product type information) on a type of the
package (product) (for example, a pre-defined class) as the
delivery target. In this case, the target product may be
classified, for example, into categories "food" and "non-food". The
category "food" may be further classified into a plurality of
subcategories according to its expiration date or best-by date.
Furthermore, the target product may be classified into categories
"gift (present)" such as an anniversary gift, a year-end present, a
midsummer gift or the like, and "non-gift". In this case, when the
product falls within the category of the "gift", the product type
information may include information on a date, a period or a season
corresponding to the gift (for example, a date in a case of a
birthday gift or an anniversary gift, or a corresponding period or
season in a case of a limited-time gift such as a year-end
present).
[0211] The delivery management unit 524 performs an operation and
management of each process from reception to delivery regarding the
delivery request received by the delivery reception unit 523.
[0212] For example, when the delivery management unit 524 receives
a notification that package has reached a business office that has
jurisdiction over a parking location of the vehicle 10A designated
by the delivery destination information of the delivery request
from the business office via the communication processing unit 521,
the delivery management unit 524 decides a date and time of
departure for delivery of the package, a deliverer in charge, and
the like according to a designated delivery date and time (delivery
date and time period).
[0213] The delivery management unit 524 inquires of the center
server 30 about the location information of the vehicle 10A via the
communication processing unit 521 before departure for the delivery
of the package that is a target (for example, 10 minutes before the
departure). The delivery management unit 524 acquires current
location information of the vehicle 10A from the center server 30
via the communication processing unit 521 and determines whether or
not the delivery is available from whether or not the current
location matches the designated parking location of the vehicle
10A, a relationship between the current location and a jurisdiction
area, or the like.
[0214] The determination as to whether or not the delivery is
available may be made by the center server 30.
[0215] When the delivery management unit 524 determines that the
delivery can be performed with respect to a package that is a
target, the delivery management unit 524 transmits a notification
that the package can be delivered to the trunk of the vehicle 10A
(delivery available notification) to the mobile terminal 20Ac of
the deliverer via the communication processing unit 521.
[0216] When an authentication key acquisition request is received
from the mobile terminal 20Ac that has received the delivery
available notification by the communication processing unit 521,
the delivery management unit 524 determines whether or not the
authentication key acquisition request is a regular authentication
key acquisition request. Specifically, the delivery management unit
524 may perform the determination by collating information on a
package that is a delivery target (hereinafter referred to as
"delivery package information" for convenience) such as a
deliverer, a destination (for example, a name of a recipient or a
corporate name), a type of the package, a delivery time period, and
a delivery place that can be included in the authentication key
acquisition request, with various kinds of information on the
package registered in the storage unit 520. When the delivery
management unit 524 determines that the authentication key
acquisition request is a regular authentication key acquisition
request, the delivery management unit 524 transmits an
authentication key arrangement request to the center server 30 via
the communication processing unit 521. In this case, information
for specifying the mobile terminal 20Ac of the deliverer may be
included in the authentication key arrangement request. The
information for specifying the deliverer may be, for example, an
authentication ID for obtaining user authentication at the center
server 30 in order for the deliverer to use the function of the key
application corresponding to the authentication key acquisition
unit 2303 of the mobile terminal 20Ac or the like (hereinafter
referred to as a "deliverer ID" for convenience). Accordingly, the
mobile terminal 20Ac of the deliverer can acquire the
authentication key from the center server 30. Information for
specifying the target package is included in the authentication key
arrangement request.
[0217] Subsequently, when the delivery management unit 524 receives
an inquiry about the current location of the vehicle 10A from the
mobile terminal 20Ac of the deliverer who has left for the delivery
from the business office via the communication processing unit 521,
the delivery management unit 524 inquires of the center server 30
about the current location information of the vehicle 10A. The
delivery management unit 524 acquires the current location
information of the vehicle 10A from the center server 30 via the
communication processing unit 521 and transmits (transfers) the
current location information of the vehicle 10A to the mobile
terminal 20Ac of the deliverer. Accordingly, the deliverer who has
gone out can compare the current location information of the
vehicle 10A with the information on the parking location of the
vehicle 10A designated by the delivery destination information and
determine whether to deliver or return the package to the business
office.
[0218] Finally, when the delivery management unit 524 receives a
delivery verification image acquisition notification received from
the mobile terminal 20Ac of the deliverer who has completed the
delivery of the package by the communication processing unit 521,
the delivery management unit 524 transmits (sends) the delivery
verification image acquisition notification to the center server 30
via the communication processing unit 521. The delivery
verification image acquisition notification is a notification
indicating that an image (hereinafter simply referred to as a
"delivery verification image") showing a state inside the trunk of
the vehicle 10A in order to verify that the delivery is completed
has been taken by the camera 26 of the mobile terminal 20Ac carried
by the deliverer. The delivery verification image acquisition
notification includes a timestamp indicating date and time when the
delivery verification image is taken. Subsequently, when the
delivery management unit 524 receives a delivery completion
notification received from the mobile terminal 20Ac of the
deliverer who has completed the delivery of the package by the
communication processing unit 521, the delivery management unit 524
transmits the delivery completion notification to the center server
30 via the communication processing unit 521 and basically ends an
operation and management regarding the vehicle cabin delivery
service regarding the package. In this case, the delivery
completion notification transmitted from the mobile terminal 20Ac
of the deliverer includes the delivery verification image.
Therefore, the delivery completion notification transmitted from
the center server 30 also includes the delivery verification image.
When the operation and management regarding the vehicle cabin
delivery service regarding the package ends, the delivery
management unit 524 may notify the regular user of the vehicle 10A
that is a client (a purchaser of a product at the EC site) through
an e-mail, a predetermined SNS, or a predetermined application
program cooperating with the delivery site installed in the mobile
terminals 20Aa, 20Ab that the delivery has been completed.
[0219] The DCM 14 of the vehicle 10A may determine that the
delivery by the deliverer has been completed when the door (the
trunk lid or the like) for access to the trunk of the vehicle 10A
is locked after the door is unlocked by the unlocking request and
the locking request transmitted from the mobile terminal 20Ac
carried by the deliverer who has completed the delivery of the
package, and notify the center server 30 that the delivery by the
deliverer has been completed, as described above. Accordingly, the
center server 30 can transmit a delivery completion notification to
the delivery management server 50 when the notification is
received. That is, the center server 30 may transmit a delivery
completion notification to the delivery management server 50 in
response to a message for notifying that the delivery has been
completed, which is received by the deliverer from the vehicle 10A.
The delivery verification image may be included in the delivery
verification image acquisition notification instead of the delivery
completion notification.
[0220] For example, when inquiry about the delivery of the package
(product) is received by the delivery company from the client
(orderer) through the delivery site or the e-mail, or via the EC
site, the delivery management unit 524 transmits a notification
(delivery inquiry reception notification) about the inquiry to the
center server 30 via the communication processing unit 521. In this
case, the delivery inquiry reception notification may include
information (delivery inquiry detail information) on details of the
inquiry, information (delivery response detail information) on a
response of the delivery company to the inquiry, information
(delivery response result information) on the response result (for
example, information on whether such a response to the inquiry has
to be maintained or is response as a final solution). Accordingly,
the center server 30 is capable of acquiring the information
indicating that the inquiry about the package delivery has been
received, which will be recorded as a delivery log, as described
below.
[0221] When the response to the inquiry has to be maintained, the
delivery management unit 524 transmits to the center server 30 a
notification (continuous delivery response notification) that the
continuous response is being made via the communication processing
unit 521 every time the response has to be maintained until such a
response is over. In this case, the continuous delivery response
notification includes information (continuous delivery response
detail information) on details of the continuous response and
information (continuous delivery response result information) on
results of the continuous response.
[0222] Various kinds of information included in the delivery
inquiry reception notification are input by a server administrator
of the delivery management server 50, the worker or the like via a
predetermined input terminal, and then stored in the storage unit
520.
[0223] The EC server 60 includes a communication device 61 and a
processing device 62.
[0224] The communication device 61 is any device that performs
bidirectional communication with each of the mobile terminal 20,
the center server 30, and the delivery management server 50 over a
predetermined communication network.
[0225] The processing device 62 includes, for example, a
communication processing unit 621, a web resource transmission unit
622, a service cooperation registration unit 623, and an order
reception processing unit 624 as functional units that are realized
by executing one or more programs stored in the ROM or the
auxiliary storage device on the CPU. The processing device 62
includes a storage unit 620 that is realized as a storage area of
an auxiliary storage device or the like of the server computer.
[0226] The communication processing unit 621 controls the
communication device 61 to perform transmission and reception of
various signals such as control signals or information signals to
and from each of the mobile terminal 20, the center server 30, and
the delivery management server 50.
[0227] The web resource transmission unit 622 transmits resources
corresponding to the webpage to be displayed on a browser of any
terminal of the user browsing the EC site including the mobile
terminals 20Aa, 20Ab based on various kinds of information as
resources of the EC site stored in the storage unit 620 to the
browser of the terminal using a predetermined scheme. The webpage
to be displayed on the EC site includes, a top page of the EC site,
a webpage respectively corresponding to each product handled at the
EC site (hereinafter simply referred to as an "individual product
page"), a webpage for displaying a list of products (typically
placed in a virtual cart on the EC site) selected by the user as
may-be-purchased items (hereinafter simply referred to as a "cart
page"), a webpage into which the user inputs various kinds of
information upon ordering each product (that is, an "order input
page"), etc. For example, the web resource transmission unit 622
transmits a Hyper Text Markup Language (HTML) document
corresponding to a webpage, and information under the HTML document
such as an image and a moving image displayed on webpages in
parallel.
[0228] When a predetermined application program (hereinafter simply
referred to as an "EC application"), in conjunction with
(cooperating with) the EC site and installed in the user terminal,
is activated, the web resource transmission unit 622 transmits
resources to be displayed on a predetermined window or screen
(hereinafter collectively referred to as a "window") of the EC
application which is displayed on a display of the user terminal
(for example, the display 24 of the mobile terminal 20), to the
user terminal in a predetermined format. The window that may be
displayed on the EC application includes a top window corresponding
to the top page of the EC site described above, the individual
product page, the cart page, the order input page or the like, an
individual product window, a cart window, an order input window,
etc.
[0229] The service cooperation registration unit 623 performs
information registration for cooperation between the center server
30 regarding the use of the vehicle cabin delivery service of the
regular user of the vehicle 10A and the EC server 60 according to
the service use registration completion notification received from
the center server 30 by the communication processing unit 621. For
example, the service cooperation registration unit 623 adds a flag
indicating a use target of the vehicle cabin delivery service to
the service login ID included in the service use registration
completion notification in the user management DB that manages the
user of the EC site constructed in the storage unit 620. In
addition, the service cooperation registration unit 623 performs
registration such that a service login ID of a website (that is,
the delivery site) corresponding to the delivery management server
50 included in the service use registration completion notification
is linked to the service login ID included in the service use
registration completion notification in the user management DB.
Accordingly, for example, when an inquiry about an ordered product
including the service login ID of the delivery site is received
from the delivery management server 50 by the communication
processing unit 621, the EC server 60 can specify the service login
ID of the corresponding EC site.
[0230] The order reception processing unit 624 receives a product
order from the user based on various input information related to
the product order, which is input from the EC site accessed via a
browser of the user terminal (for example, the mobile terminals
20Aa, 20Ab) or the EC application activated in the user terminal.
In this case, when the trunk of the vehicle 10A is selected as a
delivery destination on the order input page of the EC site, the
order reception processing unit 624 inquires the center server 30
about the vehicle use schedule information via the communication
processing unit 621. Accordingly, the order reception processing
unit 624 can acquire the latest vehicle use schedule information
via the communication processing unit 621. Therefore, for example,
when a designated date and time of delivery has already overlapped
another schedule, the order reception processing unit 624 can take
countermeasures such as requesting to change a delivery date and
time. Meanwhile, the order reception processing unit 624 decides
the trunk of the vehicle 10A as the delivery destination when
vehicle use schedule information of the vehicle 10A corresponding
to the designated (selected) delivery destination matches the
designated delivery date and time.
[0231] The order reception processing unit 624 transmits
information (delivery request information) on the received delivery
request of the product to the delivery management server 50 and the
center server 30 via the communication processing unit 621 after
receiving the product order from the user. Accordingly, the
delivery company can receive the delivery request of the product
ordered via the EC site or the EC application. Furthermore, the
center server 30 can acquire various kinds of information (for
example, parking location information, vehicle identification
information, etc.) included in the delivery request information,
which will be recorded as the delivery log, as described below.
[0232] In this case, the information (product type information) on
a type of the product, which may be included in the delivery
request information, may be input by the user via the order input
page, or may be automatically generated in accordance with a
classification code defined for each product in advance, as
described above. Specifically, the web resource transmission unit
622 may display on the order input page, for example, a Q&A
column for asking whether or not the ordered product is a gift, and
a remark column for requesting input of a date corresponding to an
anniversary in a case where the ordered product is a gift.
[0233] The order reception processing unit 624 transmits
information (product order information) on the received order of
the product to the center server 30 via the communication
processing unit 621 after receiving the product order from the
user. Information included in the product order information and the
information in the delivery request information may or may not be
partially overlapped or not overlapped. That is, the product order
information may include a part or all of types of information
included in the delivery request information, or may not include
all of types of information included in the delivery request
information. Hereinafter, the description will be given on the
premise that information in the delivery request information may
not be overlapped with information included in the product order
information. For example, the product order information may include
information (purchase shop information) on a shop from which the
product is ordered, information (purchase price information) on
purchase price, information (shipment cost information) on shipment
cost, information (payment information) on payment method, and the
like. Accordingly, the center server 30 is able to acquire the
product order information to be recorded as the delivery log, as
described below.
[0234] As described above, the vehicle cabin delivery service in
which a package other than the ordered product at the EC site is a
target can also be assumed. In this case, the delivery management
server 50 may similarly acquire the latest vehicle use schedule
information from the center server 30. Accordingly, the delivery
management server 50 can take countermeasures such as requesting to
change a delivery date and time when a date and time of delivery of
the package to the trunk of the vehicle 10A designated by the
regular user of the vehicle 10A has already overlapped another
schedule.
[0235] When inquiry about the order (except for the delivery
request) is received by the EC company from the orderer through the
EC site or the e-mail, the order reception processing unit 624
transmits a notification (order inquiry reception notification)
about the order to the center server 30 via the communication
processing unit 621. In this case, the order inquiry reception
notification may include information (order inquiry detail
information) on details of the inquiry, information (order response
detail information) on a response of the EC company to the inquiry,
information (order response result information) on the response
result (for example, information on whether such a response to the
inquiry has to be maintained or is response as a final solution).
Accordingly, the center server 30 is capable of acquiring the
information indicating that the inquiry about the order has been
received, which will be recorded as the delivery log, as described
below.
[0236] When the response to the inquiry has to be maintained, the
order reception processing unit 624 transmits to the center server
30 a notification (continuous order response notification) that the
continuous response is being made via the communication processing
unit 621 every time the response has to be maintained until such a
response is over. In this case, the continuous order response
notification includes information (continuous order response detail
information) on details of the continuous response and information
(continuous order response result information) on results of the
continuous response.
[0237] Various kinds of information included in the order inquiry
reception notification are input by a server administrator of the
EC server 60, the worker or the like via a predetermined input
terminal, and then stored in the storage unit 620.
[0238] The processing device 32 of the center server 30 that
assists in an operation of the vehicle cabin delivery service
includes the communication processing unit 3201, the condition
determination unit 3202, the authentication key issuance unit 3203,
the location information management unit 3204, the schedule
management unit 3205, the registration management unit 3206, and
the storage unit 3200, as described above. The processing device 32
of the center server 30 (an example of the information processing
device) includes a delivery log information acquisition unit 3208,
a delivery log recording unit 3209, a receipt determination unit
3210, a monitoring unit 3211, a working time history information
acquisition unit 3212, and an analysis unit 3213 as functional
units realized by executing one or more programs stored in the ROM
of the server computer or the auxiliary storage device on the
CPU.
[0239] When the condition determination unit 3202 receives the
authentication key arrangement request from the delivery management
server 50 via the communication processing unit 3201, the condition
determination unit 3202 determines whether or not the
authentication key arrangement request is a regular authentication
key arrangement request. For example, the condition determination
unit 3202 determines whether or not the authentication key
arrangement request is the regular authentication key arrangement
request based on service login information (the service login ID of
the delivery site or the like) included in the authentication key
arrangement request or predetermined authentication information
(for example, the ID and the password) corresponding to the
delivery management server 50.
[0240] When the condition determination unit 3202 determines that
the authentication key arrangement request is a regular
authentication key arrangement request, the authentication key
issuance unit 3203 issues the authentication key corresponding to
the regular authentication key arrangement request and distributes
the authentication key to the mobile terminal 20Ac of the
deliverer.
[0241] Specifically, the authentication key issuance unit 3203
specifies the vehicle 10A corresponding to the authentication key
arrangement request based on the user service registration
information DB of the storage unit 3200. The authentication key
issuance unit 3203 issues the authentication key in which a time is
limited (for example, the vehicle is available solely in units of
several minutes to tens of minutes from the distribution), the
number of times of use is limited (for example, the number of times
of use is solely one), and an authority is limited so that solely
locking and unlocking of the trunk lid can be allowed. Accordingly,
it is possible to suppress an unauthorized use of the vehicle 10A
by the deliverer and to improve security. The authentication key
issuance unit 3203 distributes the authentication key to the mobile
terminal 20Ac of the deliverer specified by the authentication key
arrangement request via the communication processing unit 3201.
[0242] For example, any method such as a known mathematical method
or a method based on bidirectional communication between the center
server 30 and the vehicle 10 may be adopted as a method of limiting
a period of time in which the authentication key is available or
the number of times the authentication key is used.
[0243] For example, the authentication key issuance unit 3203
restricts distribution of the authentication key to the mobile
terminal 20Ac of the worker having past working time statistically
exceeds a predetermined standard (that is, the worker who may
committed improper behaviors), extracted by the analysis unit 3213,
as described below. Details of a restriction operation of
distribution of the authentication key by the authentication key
issuance unit 3203 will be described (see FIG. 9).
[0244] In response to the inquiry about the current location of the
vehicle 10 A from the delivery management server 50 received by the
communication processing unit 3201, the location information
management unit 3204, for example, acquires the location
information from the vehicle 10A via the communication processing
unit 3201 and provides (transmits) the location information to the
delivery management server 50 via the communication processing unit
3201.
[0245] For example, the schedule management unit 3205 replies the
EC server 60 with the latest vehicle use schedule information
stored in the storage unit 3200 via the communication processing
unit 3201 according to the inquiry from the EC server 60 received
by the communication processing unit 3201.
[0246] The schedule management unit 3205 updates, for example, the
vehicle use schedule information stored in the storage unit 3200
via the communication processing unit 3201 by adding use of the
vehicle 10A related to the vehicle cabin delivery service, based on
the scheduled delivery date-and-time information included in the
delivery request information received from the EC server 60.
[0247] The registration management unit 3206 performs registration
of the regular user (the sub-user) who uses various services
including the vehicle cabin delivery service according to the user
registration request received from the mobile terminal 20Aa of the
owner user by the communication processing unit 3201, as described
above. The registration management unit 3206 performs registration
of use of the vehicle cabin delivery service by the regular user of
the vehicle 10A according to the service use registration request
received from the mobile terminal 20Aa of the owner user by the
communication processing unit 3201, as described above. When the
registration of use of various services including the vehicle cabin
delivery service has been completed, the registration management
unit 3206 notifies the mobile terminals 20Aa, 20Ab corresponding to
the regular users that are registration targets that the
registration of use of various services including the vehicle cabin
delivery service has been completed via the communication
processing unit 3201, as described above. When the registration of
use of the vehicle cabin delivery service has been completed, the
registration management unit 3206 transmits a service use
registration completion notification including the service link
information to the delivery management server 50 and the EC server
60 that perform an operation and management of a service that is a
registration target via the communication processing unit 3201.
[0248] The delivery log information acquisition unit 3208 acquires
information on the delivery, of which type has to be recorded as
the delivery log by the delivery log recording unit 3209 (described
below), for the package with a delivery destination designated as
the trunk of the vehicle 10A within a target period relating to the
delivery. In this case, the target period is, for example, a period
from when a product is ordered or delivery of the product is
requested as a package to when the package delivered to the vehicle
10A is received by the client.
[0249] For example, when delivery request information is received
from the EC server 60 by the communication processing unit 3201,
the delivery log information acquisition unit 3208 acquires various
kinds of information included in the delivery request information
as information to be recorded. Specifically, the delivery log
information acquisition unit 3208 may acquire product type
information, vehicle identification information, parking location
information, designated delivery date-and-time information or the
like, as the information to be recorded.
[0250] For example, the delivery log information acquisition unit
3208 acquires, when product order information is received from the
EC server 60 by the communication processing unit 3201, the product
order information as the information to be recorded.
[0251] The delivery log information acquisition unit 3208 may
individually acquire various kinds of information included in the
product order information as the information to be recorded,
instead of comprehensively acquiring the product order information
as bundle information. That is, the various kinds of information
included in the product order information may be recorded in the
storage unit 3200 as the delivery logs mutually different from each
other.
[0252] For example, when the delivery inquiry reception
notification is received from the delivery management server 50 by
the communication processing unit 3201, the delivery log
information acquisition unit 3208 acquires (generates) information
indicating that inquiry about the package delivery has been
received, e.g. a flag (delivery inquiry flag), as the information
to be recorded. When the delivery inquiry reception notification is
received from the delivery management server 50 by the
communication processing unit 3201, the delivery log information
acquisition unit 3208 acquires various kinds of information (for
example, delivery inquiry detail information, delivery response
detail information, delivery response result information, etc.)
included in the delivery inquiry reception notification as the
information to be recorded. Furthermore, when a continuous delivery
response notification is received from the delivery management
server 50 by the communication processing unit 3201, the delivery
log information acquisition unit 3208 acquires (generates)
information indicating that the continuous response is being made,
e.g. a flag (continuous delivery response flag), as the information
to be recorded. Moreover, the delivery log information acquisition
unit 3208 acquires continuous delivery response detail information
and the continuous delivery response result information, which are
included in the continuous delivery response notification, as the
information to be recorded.
[0253] Various kinds of information included in the delivery
inquiry reception notification and the continuous delivery response
notification may be acquired as information on the inquiry about
delivery and information on continuous response to the delivery
inquiry, respectively, in a form of comprehensive bundle
information.
[0254] For example, when the order inquiry reception notification
is received from the EC server 60 by the communication processing
unit 3201, the delivery log information acquisition unit 3208
acquires (generates) information indicating that inquiry about the
product order has been received, e.g. a flag (order inquiry flag),
as the information to be recorded. When the order inquiry reception
notification is received from the EC server 60 by the communication
processing unit 3201, the delivery log information acquisition unit
3208 acquires various kinds of information (for example, order
inquiry detail information, order response detail information,
order response result information, etc.) included in the order
inquiry reception notification as the information to be recorded.
Furthermore, when a continuous order response notification is
received from the EC server 60 by the communication processing unit
3201, the delivery log information acquisition unit 3208 acquires
(generates) information indicating that the continuous delivery
response is being made, e.g. a flag (continuous order response
flag), as the information to be recorded. Moreover, the delivery
log information acquisition unit 3208 acquires continuous order
response detail information and the continuous order response
result information, which are included in the continuous order
response notification, as the information to be recorded.
[0255] Various kinds of information included in the order inquiry
reception notification and the continuous order response
notification may be acquired as information on the inquiry about
order and information on continuous response to the order inquiry,
respectively, in a form of comprehensive bundle information.
[0256] For example, the delivery log information acquisition unit
3208 acquires information (vehicle travel history information) on
traveling history of the vehicle 10A within a predetermined target
period until the package is delivered to the trunk of the vehicle
10A. The target period is, for example, a period from when the
deliverer leaves a business office of the delivery company for
delivering a target package to when the package is completely
delivered to the trunk of the vehicle 10A. Specifically, the
delivery log information acquisition unit 3208 successively
acquires location information of the vehicle 10A within the target
period as the vehicle travel history information through the
location information management unit 3204.
[0257] For example, the delivery log information acquisition unit
3208 acquires information (deliverer movement history information)
on movement history of the deliverer within a predetermined target
period until the package is delivered. The target period may be the
same as or different from the target period upon acquiring the
vehicle travel history information, as described above.
Specifically, the delivery log information acquisition unit 3208
successively acquires location information of the mobile terminal
20Ac carried by the deliverer within the target period by the
location information management unit 3204 as the deliverer movement
history information through the communication processing unit 3201.
The delivery log information acquisition unit 3208 may successively
acquire the location information of the mobile terminal 20Ac
carried by the deliverer within the target period through the
communication processing unit via the delivery management server 50
through the communication processing unit 3201.
[0258] For example, the delivery log information acquisition unit
3208 acquires, when an authentication key arrangement request is
received from the delivery management server 50 by the
communication processing unit 3201, information for specifying the
deliverer who is in charge of the target package included in the
authentication key arrangement request (that is, deliverer ID), as
the information to be recorded.
[0259] For example, the delivery log information acquisition unit
3208 acquires (generates), when a service unlocking notification
(described below) is received from the mobile terminal 20Ac carried
by the deliverer by the communication processing unit 3201,
information indicating that the door accessing the trunk of the
vehicle 10A has been unlocked by the deliverer, e.g. a flag
(unlocking flag), as the information to be recorded.
[0260] For example, the delivery log information acquisition unit
3208 acquires (generates), when a service locking notification
(described below) is received from the mobile terminal 20Ac carried
by the deliverer by the communication processing unit 3201,
information indicating that the vehicle 10A has been locked by the
deliverer, e.g. a flag (locking flag), as the information to be
recorded.
[0261] For example, the delivery log information acquisition unit
3208 acquires (generates), when a delivery completion notification
is received from the delivery management server 50 by the
communication processing unit 3201, information indicating that the
target package has been completely delivered, e.g. a flag (delivery
completion flag), as the information to be recorded. Moreover, the
delivery log information acquisition unit 3208 acquires a delivery
verification image included in the delivery completion
notification, as the information to be recorded.
[0262] For example, the delivery log information acquisition unit
3208 acquires information (final delivery location information) on
parking location of the vehicle 10A when the target package is
finally delivered to the trunk of the vehicle 10A, as the
information to be recorded. Specifically, the delivery log
information acquisition unit 3208 confirms information on delivery
completion time point included in the delivery completion
notification (for example, a time point when the delivery
completion notification is transmitted from the mobile terminal
20Ac carried by the deliverer to the delivery management server
50). The delivery log information acquisition unit 3208 acquires
(generates) the final delivery location information as the
information to be recorded, by acquiring the location information
of the vehicle 10A corresponding to the time point through the
location information management unit 3204. For example, the final
delivery location information may include, in addition to location
information such as latitude and longitude, information on names of
buildings, facilities, streets or the like, corresponding to the
location information.
[0263] For example, the delivery log information acquisition unit
3208 acquires information on redelivery of the target package, e.g.
information on redelivery history of the package, as the
information to be recorded. Specifically, the delivery log
information acquisition unit 3208 acquires (generates), when a
redelivery notification is received from the delivery management
server 50 by the communication processing unit 3201, a flag
(redelivery flag) indicating the redelivery is made as the
information on redelivery history of the package.
[0264] For example, the delivery log information acquisition unit
3208 acquires (generates), when the receipt determination unit 3210
(described below) determines that the package delivered to the
trunk of the vehicle 10A has been received by the client, etc.,
information indicating that the delivered package has been
received, e.g. a flag (receipt completion flag) as the information
to be recorded.
[0265] The delivery log recording unit 3209 records, in a delivery
log database (DB) constructed in the storage unit 3200, such that
the acquired delivery information is linked to information for
specifying the corresponding package (e.g. a package ID defined for
each package) every time the information is acquired by the
delivery log information acquisition unit 3208. In this case, the
delivery log recording unit 3209 chronically records delivery log
relating to the package, specifically such that mutual chronical
order relation between the recorded delivery logs is recognizable
upon reading afterwards. More specifically, respective information
as the delivery log recorded by the delivery log recording unit
3209 in the deliver log database include information (for example,
timestamp) indicating a corresponding date and time (for example, a
date and time when the information is acquired or an event
corresponding to such information occurs).
[0266] The receipt determination unit 3210 determines whether or
not the package has been received from the trunk of the vehicle
10A.
[0267] For example, the receipt determination unit 3210 determines
that the package has been received from the trunk of the vehicle
10A when the information indicating that the door accessing the
trunk has been locked by the client is acquired from the vehicle
10A after the package was delivered to the trunk of the vehicle
10A. Meanwhile, the receipt determination unit 3210 determines that
the package is not received from the trunk of the vehicle 10A when
the information is not acquired after the package was delivered to
the trunk of the vehicle 10A.
[0268] Specifically, the receipt determination unit 3210 acquires
from the vehicle 10A information on whether the client (the regular
user of the vehicle 10A) locks the door accessing the trunk of the
vehicle 10A designated as the delivery destination of the package.
More specifically, the receipt determination unit 3210 acquires
from the vehicle 10A via the communication processing unit 3201 a
notification (client locking notification) indicating that the
client has locked the door accessing the trunk of the vehicle 10A
after the package was delivered. Accordingly, the center server 30
can figure out whether or not the trunk of the vehicle 10A
corresponding to the delivery destination has been locked after the
delivery was completed. Therefore, the center server 30 can
determine whether or not the package has been received, e.g. by
determining (estimating) that the door accessing the trunk was
opened and closed to pick up the package before the door has been
locked. In this case, the receipt determination unit 3210 transmits
to the regular user of the vehicle 10A as the client a reply
request for the client locking notification including information
on the distributed authentication key via the communication
processing unit 3201 when the package delivery to the vehicle 10A
was completed (specifically, when receiving the delivery completion
notification from delivery company, i.e. from the deliverer, the
delivery management server 50, or the like). Accordingly, the DCM
14 of the vehicle 10A can return the client locking notification to
the center server 30 when the door accessing the trunk has been
locked by the key unit 12 based on the authentication request
including the authentication key transmitted from the mobile
terminals 20Aa, 20Ab of the client.
[0269] The receipt determination unit 3210 may determine that the
package has been received from the trunk of the vehicle 10A when a
series of information indicating that the door accessing the trunk
has been opened and then locked by the client is acquired after the
package was delivered to the trunk of the vehicle 10A. Meanwhile,
the receipt determination unit 3210 may determine that the package
is not received from the trunk of the vehicle 10A after the package
was delivered to the trunk of the vehicle 10A when a series of the
information is not acquired after the door accessing the trunk has
been opened by the client.
[0270] Specifically, the receipt determination unit 3210 may
further acquire information on opening of the door accessing the
trunk of the vehicle 10A from the vehicle 10A after the package
delivery was completed. Specifically, the receipt determination
unit 3210 may acquire from the vehicle 10A via the communication
processing unit 3201 a notification (trunk opening notification)
indicating that the door accessing the trunk of the vehicle 10A has
been opened after the package was delivered. Accordingly, the
center server 30 can further figure out whether or not the door of
the trunk has been opened after the delivery was completed.
Therefore, the center server 30 can determine (estimate) whether or
not the package has been received more reliably, for example, by
determining (estimating) that the package delivered to the trunk of
the vehicle 10A has been picked up if the door accessing the trunk
of the vehicle 10A was opened immediately before the door accessing
the trunk has been locked by the client. In this case, the receipt
determination unit 3210 transmits to the regular user of the
vehicle 10A as the client reply requests for the client locking
notification including information on the distributed
authentication key and for the trunk opening notification via the
communication processing unit 3201 when the package delivery to the
vehicle 10A was completed. Accordingly, the DCM 14 of the vehicle
10A can return the trunk opening notification to the center server
30 when the door accessing the trunk has been opened based on an
ON/OFF state of a door switch of the door accessing the trunk.
[0271] For example, the receipt determination unit 3210 determines
that the package has been received from the trunk of the vehicle
10A when a notification (receipt notification) indicating that the
delivered package has been received is acquired by a predetermined
method from the client after the package was delivered to the trunk
of the vehicle 10A. Meanwhile, the receipt determination unit 3210
determines that the package is not received from the trunk of the
vehicle 10A when the receipt notification corresponding to the
package is not acquired after the package was delivered to the
trunk of the vehicle 10A.
[0272] Specifically, the receipt determination unit 3210 may
acquire the receipt notification transmitted to the center server
30 via a predetermined application (for example, a key application,
etc.) activated in the user terminal of the client (for example,
the mobile terminals 20Aa, 20Ab, etc.) in accordance with a
predetermined manipulation on the user terminal. The receipt
determination unit 3210 may acquire the receipt notification
transmitted to a mail address or a predetermined SNS account of the
client, corresponding to the center server 30, from the mail
address or the SNS account via the electronic mail or the SNS.
[0273] For example, the receipt determination unit 3210 determines
that the package has been received from the trunk of the vehicle
10A when the location information of the mobile terminals 20Aa,
20Ab of the client indicates that the client has moved to within
the predetermined range (for example, within 10 meters) in the
vicinity of the vehicle 10A after the package was delivered to the
trunk of the vehicle 10A. Meanwhile, the receipt determination unit
3210 determines that the package is not received from the trunk of
the vehicle 10A when the location information of the mobile
terminals 20Aa, 20Ab of the client indicates that the client has
not moved to within the predetermined range in the vicinity of the
vehicle 10A after the package was delivered to the trunk of the
vehicle 10A.
[0274] Specifically, the receipt determination unit 3210 transmits
a request for location information acquisition to the mobile
terminals 20Aa, 20Ab of the client via the communication processing
unit 3201 when the package delivery to the vehicle 10A was
completed. Accordingly, the corresponding mobile terminals 20Aa,
20Ab can return the location information measured by the GPS module
25 to the center server 30.
[0275] The location information is uploaded from the mobile
terminals 20Aa, 20Ab to the center server 30 under permission of
the user of the mobile terminals 20Aa, 20Ab (for example, when the
location information is permitted to be transmitted with a setting
relating to the privacy of the mobile terminals 20Aa, 20Ab).
[0276] The monitoring unit 3211 monitors a time (hereinafter simply
referred to as a "working time") needed from unlocking to locking
of the door accessing the trunk of the vehicle 10A by the
deliverer. Specifically, when a predetermined time T has elapsed
from the door accessing the trunk of the vehicle 10A was unlocked
by the deliverer but the door is in the unlocked state, the
monitoring unit 3211 notifies the client of a warning (hereinafter
simply referred to as an "improper behavior warning") indicating
potential improper behaviors committed by the deliverer. The
monitoring unit 3211 transmits an activation request of the buzzer
15 to the vehicle 10A corresponding to the delivery destination via
the communication processing unit 3201, in addition to the improper
behavior warning notification for the client. Because when the
unlocked state continues beyond a time assumed for delivery work
(predetermined time T), the potential improper behaviors committed
by the deliverer can be expected. In this case, the monitoring unit
3211 can figure out whether the door accessing the trunk of the
vehicle 10A is locked or unlocked by the deliverer, by receiving
the service unlocking notification and the service locking
notification from the mobile terminal 20Ac carried by the deliverer
through the communication processing unit 3201.
[0277] In this case, the predetermined time T may be a fixed value
not dependent on certain conditions, or a variable value that
varies based on the predefined certain conditions (that is,
conditions to be confirmed before the door accessing to the trunk
of the vehicle 10A is unlocked) as described below. Moreover, the
predetermined time T may be defined as a certain period of time not
dependent on conditions occurring after the door accessing to the
trunk of the vehicle 10A is unlocked, i.e. ex post conditions. That
is, the predetermined time T may correspond to a certain period of
time from the door accessing to the trunk of the vehicle 10A is
unlocked.
[0278] The predetermined time T may be a variable value that varies
based on ex post conditions occurring after the door is unlocked.
That is, the predetermined time T may be, for example, specified
with a variable time until a predetermined timing comes after
unlocking the door and a certain period of time which has elapsed
from the predetermined timing. In this case, the predetermined
timing may be when the deliverer takes by the camera 26 of the
mobile terminal 20Ac, for example, an image (e.g. delivery
verification image) inside the vehicle cabin for verifying that the
work is over. When the image inside the vehicle cabin is taken for
verifying that the work is over, since the work relating to the
service has been finished, in a case where an elapsed time based on
a timing at which the image is taken is longer than the certain
period of time, the potential improper behaviors committed by the
worker may be estimated. Hereinafter, in this embodiment, the
description will be given on the premise that the predetermined
time T corresponds to a certain period of time not dependent on the
ex post conditions, i.e. a certain period of time from unlocking of
the door accessing the trunk of the vehicle 10A.
[0279] For example, the monitoring unit 3211 may display a signal
corresponding to the improper behavior warning on a display (for
example, the display 24) of the user terminal of the client (for
example, the mobile terminals 20Aa, 20Ab) by transmitting the
improper behavior warning to the user terminal of the client so as
to notify the client of the improper behavior warning. More
specifically, the monitoring unit 3211 may display the improper
behavior warning on the display of the user terminal of the client
via a notification function or the like, provided by a
predetermined application program (for example, a key application,
etc.) installed in the user terminal.
[0280] For example, the monitoring unit 3211 may transmit a
notification of improper behavior warning to a mail address or a
predetermined SNS account of the client, which is registered
(stored) in the storage unit 3200 in advance.
[0281] Details of an operation by the monitoring unit 3211 will be
described (see FIGS. 7 and 8).
[0282] Either the notification to the client of the improper
behavior warning or the activation request for the buzzer 15 to the
vehicle 10A may be issued.
[0283] The working time history information acquisition unit 3212
acquires history information of past working time relating to the
package delivery with the trunk of the vehicle 10A designated as
the delivery destination.
[0284] For example, the working time history information
acquisition unit 3212 (an example of the first information
acquisition unit) calculates working time for each delivery, based
on information on the unlocking flag and the date-and-time
corresponding for respective unlocking flag, which are recorded in
the delivery log database (storage unit 3200). Accordingly, the
working time history information acquisition unit 3212 can acquire
(generate) history information of the working time relating to a
part or all (for example, a predetermined target period) of the
past delivery works, which are recorded in the delivery log
database.
[0285] For example, a deliverer ID allocated to the deliverer who
is in charge of each delivery is referred, which is recorded in the
working time history information acquisition unit 3212 (an example
of the second information acquisition unit), and further in the
delivery log database (storage unit 3200). Accordingly, the working
time history information acquisition unit 3212 is able to acquire
(generate) history information of a part or all of the delivery
works for each deliverer, which is recorded in the delivery log
database.
[0286] The analysis unit 3213 analyzes the history information of
the past working time, which is acquired by the working time
history information acquisition unit 3212.
[0287] For example, the analysis unit 3213 (an example of the
decision unit) performs analysis for the working time history
information relating to the past delivery works, which is recorded
in the delivery database, and decides the predetermined time T
satisfying conditions for, e.g. activating the improper behavior
warning to the client by the monitoring unit 3211, based on the
analysis results. This is because it is possible to determine a
proper working time needed as a delivery working time by using the
history information of the past working time.
[0288] Specifically, the analysis unit 3213 may calculate a needed
working time standard by statistically analyzing the history
information of the working time relating to a part or all (for
example, a predetermined target period) of the past delivery works,
and decide the predetermined time T based on the standard with
consideration of buffers (for example, standard deviation).
Accordingly, the center server 30 can notify the client (user) of
the improper behavior warning or activate the buzzer 15 of the
vehicle 10A, considering the actual delivery working time.
[0289] The needed delivery working time may be different depending
on a parking state of the vehicle 10A corresponding to the delivery
destination, for example, whether or not an obstacle such as
another vehicle or a wall is placed in an opening direction of the
door accessing the trunk of the vehicle 10A. Therefore, the
analysis unit 3213 classifies the working time history information
relating to the past delivery works according to parking state of
the vehicle 10A corresponding to the delivery destination. In this
case, the analysis unit 3213 may estimate parking state of the
vehicle 10A corresponding to the delivery destination based on, for
example, whether or not the delivery verification image is taken
from behind the vehicle 10A, or whether or not the image is taken
from either one of the right and left diagonally backwards or
sideways. The analysis unit 3213 may decide the predetermined time
T for each predefined type of parking state of the vehicle 10A
corresponding to the delivery destination by statistically
analyzing the classified working time history information relating
to the past delivery works. Accordingly, the center server 30 can
notify the client (user) of the improper behavior warning or
activate the buzzer 15 of the vehicle 10A, in accordance with the
parking state of the vehicle 10A.
[0290] For example, the analysis unit 3213 (an example of the
extraction unit) is able to extract a deliverer who needs working
time exceeding a predetermined standard, that is, more than
necessary, by statistically analyzing the working time history
information relating to the past delivery works for each deliverer
(specifically, for each deliverer ID). Accordingly, the center
server 30 is able to extract a deliverer who needs working time
longer than standard needed time, and thus potentially commits
improper behaviors (for example, such as rummaging about inside the
trunk) other than delivering (placing) a package to the trunk of
the vehicle 10A, which is the original purpose of the service
provider. Consequently, the center server 30 can notify the
delivery company (delivery management server 50) of the extracted
deliverer and request the delivery company to retrain or replace
such a deliverer. Hereinafter, the deliverer extracted by the
analysis unit 3213 will be referred to as a "marked deliverer". In
this case, the predetermined standard may be defined based on the
predetermined time T decided as described above. Accordingly, the
center server 30 can extract a marked deliverer having working time
is relatively longer than actual working time relating to the past
delivery works over the whole deliverers.
[0291] A part or all of various functions relating to alert to the
surrounding of the vehicle 10A using improper behavior warning
notification or activation of the buzzer 15 by the center server 30
(that is, monitoring unit 3211, working time history information
acquisition unit 3212, and analysis unit 3213) may be provided in
the vehicle 10A. For example, a function of the monitoring unit
3211 can be implemented by running on the CPU at least one program
stored in a built-in memory of a microcomputer embedded in the key
unit 12 or the DCM 14 (examples of the information processing
device) of the vehicle 10A. Specifically, the key unit 12 or the
like can confirm that the door accessing the trunk of the vehicle
10A has been unlocked by receiving a transmission signal (for
example, authentication request, etc.) including an authentication
key from the mobile terminal 20Ac carried by the deliverer via the
communication device 123. The key unit 12 or the like notifies the
user (client) of the improper behavior warning when the door is
still in an unlocked state even after the predetermined time T has
elapsed from unlocking of the door, which is estimated based on
reception of the transmission signal from the mobile terminal 20Ac
carried by the deliverer. In this case, the key unit 12 or the like
may directly notify the user of the improper behavior warning in a
form of push notification to the user terminal, or transmits the
improper behavior warning to a mail address or a predetermined SNS
account of the user through the DCM 14, as in a case of the center
server 30. The key unit 12 or the like may notify the user, or the
mail address or the SNS account of the user, of the improper
behavior warning through the DCM 14 via the center server 30. The
key unit 12 or the like may activate the buzzer 15 of the vehicle
10A in addition to notifying the user of the improper behavior
warning, as in a case of the center server 30.
[0292] A part or all of various functions relating to alert to the
surrounding of the vehicle 10A using improper behavior warning
notification or activation of the buzzer 15 by the center server 30
may be provided in the mobile terminal 20Ac carried by the
deliverer. For example, a function of the monitoring unit 3211 can
be implemented by running on the CPU at least one program stored in
an auxiliary storage or the like of the processing device 23 (an
example of the information processing device) of the mobile
terminal 20Ac. Specifically, the processing device 23 of the mobile
terminal 20Ac can determine that the door accessing the trunk of
the vehicle 10A has been unlocked when an unlocking completion
notification is received from the vehicle 10A after transmitting a
transmission signal (for example, authentication request, etc.)
including an authentication key via the communication device 21.
The processing device 23 of the mobile terminal 20Ac notifies the
user (client) of the improper behavior warning when the door is
still in an unlocked state even after the predetermined time T has
elapsed from unlocking of the door, which is estimated based on
transmission of the transmission signal. In this case, the
processing device 23 of the mobile terminal 20Ac can determine that
the door is still in the unlocked state when a manipulation for
transmitting a locking signal to the vehicle 10A is not made on the
mobile terminal 20Ac yet. The processing device 23 of the mobile
terminal 20Ac can determine that the door is still in the unlocked
state when a locking completion notification is not received from
the vehicle 10A through the communication device 21. In this case,
key unit 12 may directly notify the user of the improper behavior
warning in a form of push notification to the user terminal, or
transmits the improper behavior warning to a mail address or a
predetermined SNS account of the user through the communication
device 22, as in a case of the center server 30. The processing
device 23 of the mobile terminal 20Ac may notify the user, or the
mail address or the SNS account of the user, of the improper
behavior warning through the communication device 22 via the center
server 30. The processing device 23 of the mobile terminal 20Ac may
activate the buzzer 15 of the vehicle 10A in addition to notifying
the user of the improper behavior warning, as in a case of the
center server 30. In this case, the processing device 23 of the
mobile terminal 20Ac may transmit the activation request for the
buzzer 15 to the vehicle 10A through the communication device
21.
[0293] The processing device 23 of the mobile terminal 20Ac of a
deliverer includes the communication processing unit 2301, the
communication processing unit 2302, the authentication key
acquisition unit 2303, the authentication request unit 2304, and
the locking and unlocking request unit 2305, as described
above.
[0294] In the embodiment, the description will be given on the
premise that the functions of the authentication key acquisition
unit 2303, the authentication request unit 2304, and the locking
and unlocking request unit 2305 of the mobile terminal 20Ac are
available to the deliverer by the key application being
activated.
[0295] The authentication key acquisition unit 2303 transmits the
authentication key acquisition request to the delivery management
server 50 via the communication processing unit 2302 according to a
predetermined manipulation by a deliverer. In this case, the
authentication key acquisition request includes the above-described
delivery package information stored in the storage unit 2300 in
advance. Accordingly, the delivery management server 50 transmits
an authentication key arrangement request to the center server 30
according to the authentication key acquisition request, the center
server 30 distributes the authentication key to the mobile terminal
20Ac according to the authentication key arrangement request, and
the mobile terminal 20Ac can acquire the authentication key.
Therefore, the mobile terminal 20Ac can lock and unlock the trunk
lid of the vehicle 10A based on the functions of the communication
processing unit 2301, the authentication request unit 2304, and the
locking and unlocking request unit 2305, such that the deliverer
can deliver the requested package to the trunk of the vehicle 10A,
lock the trunk of the vehicle 10A, and return home.
[0296] The mobile terminal 20Ac transmits to the center server 30 a
notification (hereinafter simply referred to as a "service
unlocking notification") indicating that the door accessing the
trunk of the vehicle 10A has been unlocked when the door is
unlocked by transmitting the transmission signal (for example,
authentication request, etc.) including the authentication key to
the vehicle 10A. For example, the mobile terminal 20Ac transmits
the service unlocking notification to the center server 30 after
receiving the unlocking completion notification from the vehicle
10A.
[0297] The mobile terminal 20Ac transmits to the center server 30 a
notification (hereinafter simply referred to as a "service locking
notification") indicating that the vehicle 10A has been locked when
the door accessing the trunk of the vehicle 10A is unlocked and
then a manipulation for locking the door of the vehicle 10A is made
by the deliverer. The mobile terminal 20Ac may transmit the service
locking notification to the center server 30 after receiving the
locking completion notification from the vehicle 10A.
[0298] Details of Configuration Regarding C2C Car Sharing
Service
[0299] A configuration regarding a C2C car sharing service in the
authentication key management system 1 will be described with
reference to FIG. 5.
[0300] FIG. 5 is a diagram mainly illustrating an example of the
configuration regarding the C2C car sharing service in the
authentication key management system 1. Hereinafter, the
configuration regarding the C2C car sharing service in the
authentication key management system 1 will be mainly described
with respect to FIG. 5, and duplicate description on the
configuration overlapping the above-described configuration
regarding the key sharing service or the like will be omitted as
much as possible.
[0301] The processing device 23 of the mobile terminal 20Aa carried
by the owner user of the vehicle 10A includes the communication
processing unit 2302, the user registration request unit 2306, the
service use registration request unit 2307, and the service use
situation request unit 2308, as described above.
[0302] The user registration request unit 2306 requests the center
server 30 to register the regular user (the sub-user) of the
vehicle 10A who uses various services including the C2C car sharing
service according to a predetermined manipulation by the owner
user, as described above.
[0303] The service use registration request unit 2307 requests the
center server 30 to perform the registration of use of various
services including the C2C car sharing service for each registered
regular user (the owner user or the sub-user) according to a
predetermined manipulation by the owner user, as described
above.
[0304] For example, the service use registration request unit 2307
transmits, as the service link information, a service use
registration request for using the C2C car sharing service
including a service login ID of a website for a user who uses the
C2C car sharing service corresponding to the C2C car sharing
management server 70 (hereinafter simply referred to as a "C2C car
sharing site"), which corresponds to the regular user of the
vehicle 10A that is a registration target, to the center server
30.
[0305] The service use situation request unit 2308 requests the
center server 30 to provide information on a use situation of
various services (service use situation information) including the
C2C car sharing service of the regular user of the vehicle 10A for
which the use registration has been performed, in a form
corresponding to the owner user ID according to a predetermined
manipulation by the owner user, as described above.
[0306] The C2C car sharing management server 70 includes a
communication device 71 and a processing device 72.
[0307] The communication device 71 is any device that performs
bidirectional communication with each of the mobile terminal 20 and
the center server 30 over a predetermined communication
network.
[0308] The processing device 72 includes, for example, a
communication processing unit 721, a service cooperation
registration unit 722, a reservation management unit 723, and a
vehicle management unit 724 as functional units that are realized
by executing one or more programs stored in the ROM or the
auxiliary storage device on the CPU. The processing device 72
includes a storage unit 720 that is realized as a storage area of
an auxiliary storage device or the like of the server computer.
[0309] Description will be given on the premise that the
information for specifying the vehicle 10A that is a rental target
has already been stored (registered) in the storage unit 720 such
that the information is linked to the service login ID via the C2C
car sharing site by the regular user (the owner user) of the
vehicle 10A.
[0310] The communication processing unit 721 controls the
communication device 71 to perform transmission and reception of
various signals such as control signals or information signals to
and from each of the mobile terminal 20 and the center server
30.
[0311] The service cooperation registration unit 722 performs
information registration for cooperation between the center server
30 regarding the use of the C2C car sharing service of the regular
user of the vehicle 10A and the C2C car sharing management server
70 according to the service use registration completion
notification received from the center server 30 by the
communication processing unit 721.
[0312] For example, the service cooperation registration unit 722
adds a flag indicating a lessor of the vehicle 10A the C2C car
sharing service to the service login ID included in the service use
registration completion notification in the user management DB that
manages the user of the C2C car sharing site constructed in the
storage unit 720. The C2C car sharing management server 70
transmits the authentication key arrangement request including the
service login ID corresponding to the regular user of the vehicle
10A, which is the lessor, to the center server 30 such that it is
possible to cause the authentication key to be distributed from the
center server 30 to the mobile terminal 20Ad of the lessee, as
described below.
[0313] The reservation management unit 723 manages reservation of
use of the vehicle 10A that is performed through the C2C car
sharing site or the like.
[0314] For example, the reservation management unit 723 receives
registration of a date and time on which the vehicle 10A is
rentable from the regular user of the vehicle 10A through the C2C
car sharing site and stores (registers) the received date and time
on which the vehicle 10A is rentable in the storage unit 720. In
this case, the reservation management unit 723 inquires of the
center server 30 about the vehicle use schedule information via the
communication processing unit 721. Accordingly, the reservation
management unit 723 can acquire the latest vehicle use schedule
information via the communication processing unit 721. Therefore,
the C2C car sharing management server 70, for example, can take
countermeasures such as requesting to change the date and time on
which the vehicle 10A is rentable, which is received from the
regular user of the vehicle 10A, or registering a portion excluding
an overlapping portion from the date and time on which the vehicle
10A is rentable as the date and time on which the vehicle 10A is
rentable when the received date and time on which the vehicle 10A
is rentable already overlaps another schedule or registering.
[0315] For example, the reservation management unit 723 accepts the
reservation of use of the vehicle 10A within a range of the date
and time on which the vehicle 10A is rentable, which is stored in
the storage unit 720. When the reservation management unit 723
receives the reservation of use of the vehicle 10A from a user who
is a lessee through the C2C car sharing site, the reservation
management unit 723 updates information on a rental schedule of the
vehicle 10A (rental schedule information) stored in the storage
unit 720.
[0316] For example, when the authentication key acquisition request
is received from the mobile terminal 20Ad of the lessee of the
vehicle 10A by the communication processing unit 721, the
reservation management unit 723 determines whether or not the
authentication key acquisition request is a regular authentication
key acquisition request. Specifically, the reservation management
unit 723 may perform the determination based on the service login
ID and the password of the C2C car sharing site included in the
authentication key acquisition request, or a relationship regarding
the date and time of reservation of use (for example, within a
range of the date and time of reservation of use or less than a
predetermined time until a date and time of use start). When the
authentication key acquisition request is a regular authentication
key acquisition request, the reservation management unit 723
transmits an authentication key arrangement request to the center
server 30 via the communication processing unit 721. In this case,
information for specifying the mobile terminal 20Ad of the lessee
of the vehicle 10A is included in the authentication key
arrangement request. The information for specifying the lessee of
the vehicle 10A may be, for example, an authentication ID
(hereinafter referred to as a "lessee ID" for convenience) for
obtaining user authentication in the center server 30 in order for
the lessee of the vehicle 10A to use a function of the
authentication key acquisition unit 2303 of the mobile terminal
20Ad. Accordingly, the mobile terminal 20Ad of the lessee of the
vehicle 10A can acquire the authentication key from the center
server 30.
[0317] The vehicle management unit 724 manages the vehicle 10A that
is a rental target.
[0318] For example, the vehicle management unit 724 inquires of the
center server 30 about a current location information of the
vehicle 10A via the communication processing unit 721 before the
date and time of reservation of use of the vehicle 10A (for
example, a period from tens of minutes ago to immediately before).
The vehicle management unit 724 acquires the current location
information of the vehicle 10A replied from the center server 30
according to the inquiry via the communication processing unit 721.
Accordingly, a determination can be made as to whether or not the
vehicle 10A returns to a designated place before a date and time of
rental (a date and time of reservation of use) of the vehicle 10A.
Therefore, when the vehicle 10A does not return to the designated
place, the C2C car sharing management server 70 can take
countermeasures such as warning the regular user who is a lessor of
the vehicle 10A so that the vehicle 10A returns to the designated
place through an e-mail or a predetermined application cooperating
with the C2C car sharing site, which is installed in the mobile
terminals 20Aa, 20Ab.
[0319] The processing device 32 of the center server 30 includes
the communication processing unit 3201, the condition determination
unit 3202, the authentication key issuance unit 3203, the location
information management unit 3204, the schedule management unit
3205, the registration management unit 3206, and the storage unit
3200, as described above.
[0320] When the authentication key arrangement request is received
from the C2C car sharing management server 70 by the communication
processing unit 3201, the condition determination unit 3202
determines whether or not the authentication key arrangement
request is a regular authentication key arrangement request. For
example, the condition determination unit 3202 determines whether
or not the authentication key arrangement request is the regular
authentication key arrangement request based on the service link
information included in the authentication key arrangement request
(for example, the service login ID of the C2C car sharing site) or
predetermined authentication information (for example, the ID and
the password) corresponding to the C2C car sharing management
server 70.
[0321] When the condition determination unit 3202 determines that
the authentication key arrangement request is a regular
authentication key arrangement request, the authentication key
issuance unit 3203 specifies the vehicle 10A corresponding to the
authentication key arrangement request based on the user service
registration information DB of the storage unit 3200. The
authentication key issuance unit 3203 issues the authentication key
in which a time is limited (for example, the vehicle is available
solely at the date and time of reservation of use of the vehicle
10A included in the authentication key arrangement request and in a
buffering period before and after the date and time of
reservation). The authentication key issuance unit 3203 distributes
the authentication key to the mobile terminal 20Ad of the lessee of
the vehicle 10A specified by the authentication key arrangement
request via the communication processing unit 3201.
[0322] The C2C car sharing service may include, for example, a
service (hereinafter referred to as a "vehicle trunk rental
service" for convenience) in which solely a trunk of the vehicle
10A is rented. In a case of a vehicle trunk rental service, the
authentication key issuance unit 3203 may issue an authentication
key with an authority limited so that locking and unlocking of the
trunk lid are allowed. Accordingly, it is possible to limit a
rental target of C2C car sharing to solely the trunk. Consequently,
for example, a vehicle cabin delivery service in which the trunk of
the vehicle 10A to be rented at a travel destination is rented and
a purchased product for use at a travel destination is delivered to
the rented trunk can be realized.
[0323] The location information management unit 3204 transmits a
location information request to the vehicle 10A via the
communication processing unit 3201 according to the inquiry about
the current location of the vehicle 10A received from the C2C car
sharing management server 70 by the communication processing unit
3201. Accordingly, the location information management unit 3204
can acquire the current location information from the vehicle 10A
via the communication processing unit 3201. The location
information management unit 3204 replies the C2C car sharing
management server 70 with the current location information acquired
from the vehicle 10A via the communication processing unit
3201.
[0324] The schedule management unit 3205 transmits the latest
vehicle use schedule information to the vehicle 10A via the
communication processing unit 3201 according to the inquiry about
the current location of the vehicle 10A received from the C2C car
sharing management server 70 by the communication processing unit
3201.
[0325] The registration management unit 3206 performs registration
of the regular user (the sub-user) who uses various services
including the C2C car sharing service according to the user
registration request received from the mobile terminal 20Aa of the
owner user by the communication processing unit 3201, as described
above. The registration management unit 3206 performs registration
of use of the C2C car sharing service by the regular user of the
vehicle 10A according to the service use registration request
received from the mobile terminal 20Aa of the owner user by the
communication processing unit 3201, as described above. When the
registration of use of various services including the C2C car
sharing service has been completed, the registration management
unit 3206 notifies the mobile terminals 20Aa, 20Ab corresponding to
the regular users that are registration targets that the
registration of use of various services including the C2C car
sharing service has been completed via the communication processing
unit 3201, as described above. When the registration of use of the
C2C car sharing service has been completed, the registration
management unit 3206 transmits a service use registration
completion notification including the service link information to
the C2C car sharing management server 70 that performs an operation
and management of a service that is a registration target via the
communication processing unit 3201.
[0326] The processing device 23 of the mobile terminal 20Ad of the
lessee of the vehicle 10A includes the communication processing
unit 2301, the communication processing unit 2302, the
authentication key acquisition unit 2303, the authentication
request unit 2304, the locking and unlocking request unit 2305, and
the storage unit 2300, as described above.
[0327] The authentication key acquisition unit 2303 transmits an
authentication key acquisition request to the C2C car sharing
management server 70 via the communication processing unit 2302
according to a predetermined manipulation by the lessee of the
vehicle 10A. In this case, the service login ID of the C2C car
sharing site corresponding to the lessee of the vehicle 10A is
included in the authentication key acquisition request.
Accordingly, the C2C car sharing management server 70 can transmit
an authentication key arrangement request to the center server 30
according to the authentication key acquisition request, the center
server 30 can distribute the authentication key to the mobile
terminal 20Ad according to the authentication key arrangement
request, and the mobile terminal 20Ad can acquire the
authentication key. Therefore, the mobile terminal 20Ad can lock
and unlock the door of the vehicle 10A based on the functions of
the communication processing unit 2301, the authentication request
unit 2304, and the locking and unlocking request unit 2305. That
is, the lessee of the vehicle 10A carrying the mobile terminal 20Ad
can directly use the vehicle 10A, such as locking and unlocking the
vehicle 10A and driving the vehicle 10A using the mobile terminal
20Ad without performing exchange of a key with the regular user of
the vehicle 10A through the C2C car sharing service. Similarly, the
regular user of the vehicle 10A can rent the vehicle 10A to another
person other than the regular user without exchanging the key.
Therefore, it is possible to improve convenience in rental of the
vehicle 10A between the regular user of the vehicle 10A and another
person other than the regular user through the C2C car sharing
service in the authentication key management system 1.
[0328] Details of Configuration Regarding B2C Car Sharing
Service
[0329] A B2C car sharing service in the authentication key
management system 1 will be described with reference to FIG. 6.
[0330] FIG. 6 is a diagram mainly illustrating an example of the
configuration regarding the B2C car sharing service in the
authentication key management system 1. Hereinafter, the
configuration regarding the B2C car sharing service in the
authentication key management system 1 will be mainly described
with respect to FIG. 6, and duplicate description on the
configuration overlapping the above-described configuration
regarding the key sharing service or the like will be omitted as
much as possible.
[0331] The B2C car sharing management server 80 includes a
communication device 81 and a processing device 82.
[0332] The communication device 81 is any device that performs
bidirectional communication with each of the mobile terminal 20B
and the center server 30 over a predetermined communication
network.
[0333] The processing device 82 includes, for example, a
communication processing unit 821, a reservation management unit
822, and a vehicle management unit 823 as functional units that are
realized by executing one or more programs stored in the ROM or the
auxiliary storage device on the CPU. The processing device 82
includes a storage unit 820 that is realized as a storage area of
an auxiliary storage device or the like of the server computer.
[0334] The communication processing unit 821 controls the
communication device 81 to perform transmission and reception of
various signals such as control signals or information signals to
and from each of the mobile terminal 20B and the center server
30.
[0335] The reservation management unit 822 manages the reservation
of use of the vehicle 10B that is performed through the B2C car
sharing site or the like.
[0336] For example, the reservation management unit 822 accepts
reservation of use of the vehicle 10B from a user (hereinafter
simply referred to as a "lessee user") who wants to rent the
vehicle 10B through a website that is operated by a company of the
B2C car sharing management server 80 or the like (hereinafter
referred to as a "B2C car sharing site" for convenience). The
reservation management unit 822 stores information on the received
reservation of use of the vehicle 10B (use reservation information)
in the storage unit 820. In this case, for example, information for
specifying the vehicle 10A that is a target, information on a date
and time of reservation of use (a start date and time of use and an
end date and time of use), and a service login ID of the lessee
user in the B2C car sharing site may be included in the use
reservation information.
[0337] For example, the reservation management unit 822 updates the
information on the use schedule of the vehicle 10B (the vehicle use
schedule information) stored in the storage unit 820 each time the
reservation management unit 822 receives the reservation of use of
the vehicle 10B. Accordingly, the B2C car sharing management server
80 can display the use schedule of the vehicle 10B on the B2C car
sharing site to present a date and time when the reservation of use
can be made, to the lessee user.
[0338] For example, when the authentication key request is received
from the mobile terminal 20B by the communication processing unit
821, the reservation management unit 822 determines whether or not
the authentication key request is a regular authentication key
request. Specifically, the reservation management unit 822 may
perform the determination based on the service login ID and the
password of the B2C car sharing site corresponding to the lessee
user included in the authentication key request, or a relationship
regarding the date and time of reservation of use (for example,
within a range of the date and time of reservation of use or less
than a predetermined time until a date and time of use start). When
the authentication key request is a regular authentication key
acquisition request, the reservation management unit 822 transmits
an authentication key arrangement request to the center server 30
via the communication processing unit 821. In this case,
information for specifying the mobile terminal 20B of the lessee
user renting the vehicle 10B is included in the authentication key
arrangement request. The information for specifying the lessee user
renting the vehicle 10B may be, for example, an authentication ID
(hereinafter referred to as a "lessee user ID" for convenience) for
obtaining user authentication in the center server 30 in order for
the lessee user renting the vehicle 10B to use a function of a key
application corresponding to the authentication key acquisition
unit 2303 of the mobile terminal 20B or the like. Accordingly, the
mobile terminal 20B of the lessee user renting the vehicle 10B can
acquire the authentication key from the center server 30.
[0339] The vehicle management unit 823 manages the vehicle 10B that
is a rental target.
[0340] For example, the vehicle management unit 823 inquires of the
center server 30 about the vehicle 10B parked in the vicinity (for
example, within hundreds of meters) of a place designated in the
reservation of use via the communication processing unit 821 before
the date and time of reservation of use of the vehicle 10B of a
lessee user (for example, before tens of minutes). The vehicle
management unit 823 acquires the location information of the
vehicle 10B parked in the vicinity of the designated place replied
from the center server 30 according to the inquiry via the
communication processing unit 821. Accordingly, the vehicle
management unit 823 can specify one or a plurality of vehicles 10B
parked around the designated place and determine, for example, the
vehicle 10B to be rented before the start date and time of use of
the vehicle 10B of the lessee.
[0341] For example, the vehicle management unit 823 inquires of the
center server 30 about the location information of the vehicle 10B
in the designated area via the communication processing unit 821
according to a search request of the vehicle 10B in a designated
area by the lessee user at the B2C car sharing site. The vehicle
management unit 823 acquires the location information of the
vehicle 10B in the designated area replied from the center server
30 according to the inquiry via the communication processing unit
821. Accordingly, the vehicle management unit 823, for example, can
present the location information of the vehicle 10B that is a
target to the lessee user who wants to rent the vehicle 10B in the
designated area immediately at the B2C car sharing site.
[0342] The processing device 32 of the center server 30 includes
the communication processing unit 3201, the condition determination
unit 3202, the authentication key issuance unit 3203, and the
storage unit 3200, as described above.
[0343] When the authentication key arrangement request received
from the B2C car sharing management server 80 is received by the
communication processing unit 3201, the condition determination
unit 3202 determines whether or not the authentication key
arrangement request is a regular authentication key arrangement
request. For example, the condition determination unit 3202
determines whether or not the authentication key arrangement
request is the regular authentication key arrangement request based
on whether or not the lessee user ID included in the authentication
key arrangement request is the authentication ID already registered
in the storage unit 3200, or on predetermined authentication
information (for example, an ID Password) corresponding to the B2C
car sharing management server 80.
[0344] When the condition determination unit 3202 determines that
the authentication key arrangement request is the regular
authentication key arrangement request, the authentication key
issuance unit 3203 issues the authentication key in which a time is
limited (for example, the vehicle is available solely at the date
and time of reservation of use of the vehicle 10B included in the
authentication key arrangement request and in a buffering period
before and after the date and time of reservation). The
authentication key issuance unit 3203 distributes the
authentication key to the mobile terminal 20B of the lessee user
renting the vehicle 10B specified by the authentication key
arrangement request via the communication processing unit 3201.
[0345] The processing device 23 of the mobile terminal 20B of the
lessee user renting the vehicle 10B includes the communication
processing unit 2301, the communication processing unit 2302, the
authentication key acquisition unit 2303, the authentication
request unit 2304, the locking and unlocking request unit 2305, and
the storage unit 2300, as described above.
[0346] The authentication key acquisition unit 2303 transmits an
authentication key acquisition request to the B2C car sharing
management server 80 via the communication processing unit 2302
according to a predetermined manipulation by the lessee user of the
vehicle 10B. In this case, the service login ID of the B2C car
sharing site corresponding to the lessee user renting the vehicle
10B is included in the authentication key acquisition request.
Accordingly, the B2C car sharing management server 80 can transmit
an authentication key arrangement request to the center server 30
according to the authentication key acquisition request, the center
server 30 can distribute the authentication key to the mobile
terminal 20B according to the authentication key arrangement
request, and the mobile terminal 20B can acquire the authentication
key. Therefore, the mobile terminal 20B can lock and unlock the
door of the vehicle 10B based on the functions of the communication
processing unit 2301, the authentication request unit 2304, and the
locking and unlocking request unit 2305. That is, the lessee user
renting the vehicle 10B carrying the mobile terminal 20B can
directly use the vehicle 10B, such as locking and unlocking the
vehicle 10B and driving the vehicle 10B using the mobile terminal
20B without performing exchange of a key with the company of the
vehicle 10B through the B2C car sharing service. Therefore, it is
possible to improve convenience for the lessee user renting the
vehicle 10B through the B2C car sharing service in the
authentication key management system 1.
[0347] Characteristic Operation of Center Server
[0348] Next, process flows of characteristic operations by the
center server 30, that is, a process of notifying the user of the
improper behavior warning and activating the buzzer 15 of the
vehicle 10A (warning notification output process) and a process of
distributing the authentication key (authentication key
distribution process) will be described with reference to FIGS. 7
to 9.
[0349] FIG. 7 is a flowchart schematically showing one example of
the warning notification output process of the center server 30. A
process according to this flowchart is repeatedly executed, for
example, for each delivery target (package) at predetermined
process intervals. Hereinafter, the same applies to processes
according to flowcharts of FIGS. 8 and 9.
[0350] In step S102, the monitoring unit 3211 determines whether or
not a service unlocking notification has been received from the
mobile terminal 20Ac carried by the deliverer who is in charge of a
target package by the communication processing unit 3201. The
monitoring unit 3211 proceeds to step S104 when the service
unlocking notification has been received from the mobile terminal
20Ac carried by the deliverer, and otherwise the monitoring unit
3211 terminates this process.
[0351] In step S104, the monitoring unit 3211 determines whether or
not a predetermined time T has elapsed from reception of the
service unlocking notification. The monitoring unit 3211 proceeds
to step S106 when the predetermined time T has elapsed from
reception of the service unlocking notification, and proceeds to
step S110 when the predetermined time T has not been elapsed.
[0352] In step S106, the monitoring unit 3211 notifies the user of
the improper behavior warning by transmitting a predetermined
signal to the user terminal (for example, the mobile terminal 20Aa,
20Ab, etc.) carried by the user (client) via the communication
processing unit 3201. Moreover, the monitoring unit 3211 may notify
the user of the improper behavior warning by transmitting the
signal a mail address or a predetermined SNS account of the user
via the communication processing unit 3201, as described above.
[0353] In step S108, the monitoring unit 3211 transmits an
activation request of the buzzer 15 to the vehicle 10A
corresponding to the delivery destination of the target package via
the communication processing unit 3201, and then terminates this
process.
[0354] The order of steps S106 and S108 may be reversed.
[0355] Meanwhile, in step S110, the monitoring unit 3211 determines
whether or not a service locking notification has been received
from the mobile terminal 20Ac carried by the deliverer who is in
charge of a target package by the communication processing unit
3201. The monitoring unit 3211 returns to step S104 and repeats the
process of step S104 when the service locking notification has been
received from the mobile terminal 20Ac carried by the deliverer,
and otherwise the monitoring unit 3211 terminates this process.
[0356] As described above, in this example, the center server 30
notify the user (client) of the improper behavior warning when the
door accessing the trunk of the vehicle 10A is still in the
unlocked state after the predetermined time T has elapsed since the
door was unlocked by the deliverer. The center server 30 activates
the buzzer 15 of the vehicle 10A in addition to notifying the user
of the improper behavior warning. Accordingly, the center server 30
is capable of allowing the surroundings of the user or the vehicle
10A to recognize the potential improper behaviors committed by the
deliverer when the improper behaviors may be committed by the
deliverer. Therefore, the user can determine whether or not the
improper behaviors are committed relatively earlier and take
appropriate countermeasures. The center server 30 is able to
suppress the improper behaviors of the deliverer by activating the
buzzer 15. Moreover, the center server 30 is able to suppress the
improper behaviors of the deliverer by notifying the user of the
improper behavior warning or activating the buzzer 15 of the
vehicle 10A, when the delivery work takes a longer time than
necessary.
[0357] FIG. 8 is a flowchart schematically showing another example
of the warning notification output process of the center server
30.
[0358] Since a process of step S202 is the same as the process of
step S102 in FIG. 7, description thereof will be omitted.
[0359] In step S202, the monitoring unit 3211 proceeds to step S204
when the service unlocking notification is received from the mobile
terminal 20Ac carried by the deliverer.
[0360] In step S204, the monitoring unit 3211 determines whether or
not the deliverer in charge of the target package corresponds to
the "marked deliverer" extracted by the analysis unit 3213. The
monitoring unit 3211 proceeds to step S206 when the deliverer in
charge does not correspond to the "marked deliverer", and proceeds
to step S208 when the deliverer in charge corresponds to the
"marked deliverer".
[0361] In step S206, the monitoring unit 3211 sets the
predetermined time T to a default setting value (default value) TO.
In this case, the setting value TO may be a value corresponding to
the predetermined time T decided by the analysis unit 3213 based on
the working time history information relating to the past delivery
works, as described above.
[0362] Meanwhile, in step S208, the monitoring unit 3211 sets the
predetermined time T to a setting value Ti shorter than the setting
value TO.
[0363] Since processes of steps S210 to S216 are the same as the
processes of steps S104 to S110 in FIG. 7, description thereof will
be omitted.
[0364] As described above, in this example, the center server 30
sets, when the deliverer in charge is the "marked deliverer", the
predetermined time T corresponding to condition for notifying the
user of a warning or condition for activating the buzzer 15 of the
vehicle 10A to be shorter than that of a case where the deliverer
in charge is not the "marked deliverer". Accordingly, the center
server 30 is capable of notifying the user of the improper behavior
warning or alerting the surrounding of the vehicle 10A with the
buzzer 15 at a relatively earlier timing when the deliverer is the
"marked deliverer" suspected of the past improper behaviors based
on the working time history information relating to the past
delivery works. Therefore, the center server 30 can stop the
improper behavior by the marked deliverer, and suppress the marked
deliverer to commit the improper behaviors.
[0365] FIG. 9 is a flowchart schematically showing another example
of the authentication key distribution process of the center server
30.
[0366] In step S302, the authentication key issuance unit 3203
determines whether or not a regular authentication key arrangement
request is received from the delivery management server 50.
Specifically, the authentication key issuance unit 3203 determine
whether or not an authentication key arrangement request is
received from the delivery management server 50 by the
communication processing unit 3201 and the authentication key
arrangement request is determined as a regular authentication key
arrangement request by the condition determination unit 3202. The
authentication key issuance unit 3203 proceeds to step S304 when
the regular authentication key arrangement request has been
received from the delivery management server 50, and otherwise the
authentication key issuance unit 3203 terminates this process.
[0367] In step S304, the authentication key issuance unit 3203
determines whether or not the deliverer in charge of the target
package, that is, the deliverer corresponding to the deliverer ID
included in the authentication key arrangement request corresponds
to "marked deliverer". The authentication key issuance unit 3203
proceeds to step S306 when the deliverer in charge does not
correspond to the "marked deliverer", and proceeds to step S310
when the deliverer in charge corresponds to the "marked
deliverer".
[0368] In step S306, the authentication key issuance unit 3203
issues an authentication key corresponding to the vehicle 10A and
the mobile terminal 20Ac carried by the deliverer.
[0369] In the step S308, the authentication key issuance unit 3203
distributes the issued authentication key to the mobile terminal
20Ac carried by the deliverer, and then terminates this
process.
[0370] Meanwhile, in the step S310, the authentication key issuance
unit 3203 notifies the delivery management server 50 that the
authentication key cannot be distributed to the mobile terminal
20Ac carried by the deliverer (authentication key distribution
unavailable notification) via the communication processing unit
3201, and then terminates this process. Meanwhile, the delivery
management server 50 is able to take measures such as removing the
deliverer suspected of the past improper behaviors and replacing
with another deliverer.
[0371] As described above, in the example, the center server 30
ceases to distribute the authentication key to the delivery company
(specifically, the mobile terminal 20Ac carried by the deliverer)
when the deliverer in charge of the target package is the "marked
deliverer". Therefore, center server 30 is further able to suppress
the improper behaviors committed by the "marked deliverer".
[0372] Operation
[0373] In the embodiment, the center server 30, the key unit 12 or
the like of the vehicle 10A, or the processing device 23 of the
mobile terminal 20Ac (hereinafter referred to as a "center server
30 or the like" for convenience) supports a predetermined service
(for example, vehicle cabin delivery service) provided to a user by
allowing a worker to temporarily access the vehicle cabin including
the trunk of the vehicle 10A used by the user. Specifically, the
monitoring unit 3211 determines whether or not the worker (for
example, deliverer) relating to a service provider of the service
has been unlocked a door of the vehicle using key information
(authentication key) for unlocking the door, in which the door is a
door accessing the vehicle cabin of the vehicle 10A, and notifies
the user of a warning or activates the buzzer 15 of the vehicle
10A, when the monitoring unit 3211 determines that the door has
been unlocked and when the monitoring unit 3211 determines that a
state where the door is not locked continues after a predetermined
time T has elapsed from unlocking of the door.
[0374] Accordingly, the center server 30 or the like is capable of
determining that improper behaviors other than the original works
may be committed when a certain period time has elapsed after the
door accessing the vehicle cabin of the vehicle 10A was unlocked by
the worker using the authentication key. Therefore, the center
server 30 or the like can notify the user of a warning about
potential improper behaviors by, for example, a push notification
function of an application installed in a user terminal or e-mail
when the unlocked state lasts over a relatively long time.
Moreover, the center server 30 or the like can activate the buzzer
15 mounted on the vehicle 10A to notify the potential improper
behaviors to the surroundings of the vehicle 10A when an unlocked
state continues over relatively a long time. Consequently, the
center server 30 or the like is able to suppress the improper
behaviors committed by the worker in the vehicle cabin of the
vehicle 10A by notifying user or the surroundings of the vehicle
10A when the unlocked state of the vehicle 10A lasts over a long
time.
[0375] The service provided to the user by allowing a worker to
temporarily access the vehicle cabin of the vehicle used by the
user may include the vehicle cabin pick-up service in addition to
the vehicle cabin delivery service, as described above.
Furthermore, the service provided to the user by allowing a worker
to temporarily access the vehicle cabin of the vehicle used by the
user may include a cleaning service for cleaning inside and outside
the vehicle of the user by allowing a worker to temporarily access
the vehicle cabin of the vehicle used by the user when the user is
absent.
[0376] In the embodiment, the monitoring unit 3211 of the center
server 30 notifies the user of a warning or activates the buzzer 15
when the service unlocking notification indicating that the door
accessing the vehicle cabin of the vehicle 10A has been unlocked
based on a manipulation on the mobile terminal 20Ac by the worker,
by transmitting a predetermined transmission signal including the
authentication key from the mobile terminal 20Ac to the vehicle 10A
by the communication processing unit 3201, is received from the
mobile terminal 20Ac, and when a state in which a service locking
notification indicating that the door of the vehicle 10A has been
locked based on a manipulation on the mobile terminal 20Ac by the
worker is not received from the mobile terminal 20Ac, by the
communication processing unit 3201, continues after the
predetermined time T has elapsed from unlocking of the door.
[0377] Accordingly, the center server 30 can be provided outside
the vehicle 10A, and figure out unlocked and locked states of the
door accessing the vehicle cabin of the vehicle 10A based on a
manipulation by the worker on the mobile terminal 20Ac, via a
communication between the center server 30 and the mobile terminal
20Ac used by the worker to unlock the vehicle 10A. Therefore, the
center server 30 or the like outside the vehicle 10A is able to,
specifically, figure out whether the vehicle 10A is unlocked or
locked by the worker using the authentication key, thereby
notifying the user of a warning or activating the buzzer 15 by
transmitting a control command to the vehicle 10A.
[0378] In the embodiment, a function unit corresponding to the
monitoring unit 3211, such as the key unit 12 of the vehicle 10A,
notifies the user of a warning or activates the buzzer 15 when
where the key unit 12 of the like of the vehicle 10A determines
whether the door accessing the vehicle cabin of the vehicle 10A has
been unlocked or not by receiving a predetermined transmission
signal including the authentication key from the mobile terminal
20Ac by the communication device 123, and determines that the door
has been unlocked, and when where a state in which the door of the
vehicle 10A is not locked continues after a predetermined time T
has elapsed from unlocking of the door.
[0379] Accordingly, the key unit 12 or the like of the vehicle 10A
can be mounted on the vehicle 10A, and figure out whether the door
accessing the vehicle cabin of the vehicle 10A is unlocked or
locked by the worker, by receiving the transmission signal
including the authentication key used for unlocking, which is
transmitted from the mobile terminal 20Ac carried by the worker to
the vehicle 10A. Therefore, the key unit 12 or the like mounted on
the vehicle 10A is able to, specifically, figure out whether the
vehicle 10A is unlocked or locked by the worker using the
authentication key, thereby notifying the user of a warning or
activating the buzzer 15 of the vehicle 10A.
[0380] In the embodiment, the monitoring unit 3211 notifies the
user of a warning or activates the buzzer 15 of the vehicle 10A,
when the worker has unlocked the door accessing the vehicle cabin
of the vehicle 10A using the authentication key, and when a certain
period of time has elapsed from a predetermined timing after
unlocking of the door.
[0381] Accordingly, the center server 30 or the like is capable of
specifying, specifically, a (variable) time from unlocking of the
door to the predetermined timing with a certain period of time from
the predetermined timing, as the predetermined time T from
unlocking of the door accessing the vehicle cabin of the vehicle
10A.
[0382] In the embodiment, the predetermined timing as a starting
point of the predetermined time, compared with the certain period
of time as described above, is a time when the door accessing the
vehicle cabin of the vehicle 10A is unlocked, or a time when an
image (for example, delivery verification image) showing a
situation inside the vehicle cabin of the vehicle 10A, upon
completing a work relating to the service, is captured by an
imaging function mounted on the mobile terminal 20Ac in response to
a manipulation on the mobile terminal 20Ac.
[0383] Accordingly, the center server 30 or the like the
information processing device is capable of, specifically,
notifying the user of a warning or activating the buzzer 15 of the
vehicle 10A, by monitoring duration of the unlocked state from the
timing when the door has been unlocked to confirm the duration
exceeds a certain period of time. Moreover, the worker may capture
a situation inside the vehicle cabin of the vehicle 10A using the
imaging function of the mobile terminal 20Ac, for example, to
verify that the service works have been completed. In this case,
the center server 30 or the like waits for a capture timing from
unlocking of the door. The center server 30 or the like is capable
of, specifically, notifying the user of a warning or activating the
buzzer 15 of the vehicle 10A, by monitoring duration of the
unlocked state from the capture timing, since the vehicle 10A has
to be locked shortly after the capture timing, to confirm the
duration exceeds a certain period of time.
[0384] In the embodiment, the monitoring unit 3211 transmits a
signal corresponding to a warning to a user terminal carried by the
user or notify the user of a warning using a function provided by a
predetermined application program installed in the user terminal,
when the worker has unlocked the door of the vehicle 10A using the
authentication key, and when a state in which the door of the
vehicle 10A is not locked continues after the predetermined time T
has elapsed from unlocking of the door.
[0385] Accordingly, the center server 30 or the like is capable of,
specifically, notifying the user of a warning via a push
notification function of the application program (hereinafter
simply referred to as an "application") installed in the user
terminal carried by the user.
[0386] In the embodiment, the monitoring unit 3211 transmits a
warning to a mail address of the user or a predetermined SNS
account of the user, when the worker has unlocked the door of the
vehicle 10A using the authentication key, and when a state in which
the door is not locked continues after the predetermined time T has
elapsed from unlocking of the door.
[0387] Accordingly, the center server 30 is capable of,
specifically, transmitting a warning to the mail address of the
user or the predetermined SNS account of the user.
[0388] In the embodiment, the working time history information
acquisition unit 3212 acquires history information on working time
from when the door accessing the vehicle cabin of the vehicle 10A
is unlocked using the authentication key to when the door of the
vehicle 10A is locked, and the analysis unit 3213 decides the
predetermined time T based on the history information on the
working time, which is acquired by the working time history
information acquisition unit 3212.
[0389] Accordingly, the center server 30 or the like is capable of
confirming the past history of working time from when the door
accessing the vehicle cabin of the vehicle 10A is unlocked by the
worker using the authentication key to when the door is locked.
Consequently, the center server 30 or the like can figure out a
time needed for works relating to the target service and a
fluctuation in the working time by statistically processing, for
example, the history of the past working time. Therefore, the
center server 30 or the like is able to, specifically, decide the
predetermined time T corresponding to conditions for notifying a
warning or activating the buzzer 15, in consideration of the
statistical data based on the history of the past working time.
[0390] In the embodiment, the working time history information
acquisition unit 3212 acquires history information on past working
time, for each of the workers, from when the door accessing the
vehicle cabin of the vehicle 10A is unlocked using the
authentication key to when the door is locked, and the analysis
unit 3213 extracts the worker having past working time
statistically exceeds a predetermined standard out of the workers
based on the history information on the past working time for each
of the workers, which is acquired by the working time history
information acquisition unit 3212.
[0391] Accordingly, the center server 30 or the like is capable of
confirming the history of working time for each of the workers
engaged in the target service. Consequently, the center server 30
can figure out a difference in working time for each worker, and
extract the worker having working time exceeds the predetermined
standard, i.e. having working time is understood as being too long,
by statistically processing, for example, the history of the past
working time for each worker. That is, the center server 30 or the
like can extract the worker who may have committed the improper
behaviors in the past. Therefore, the center server 30 or the like
is able to take measures in advance, for example, giving a notice
to the service provider in advance when the worker who may have
committed the improper behaviors in the past is likely engaged in
the service.
[0392] In the embodiment, the authentication key issuance unit 3203
distributes the authentication key used by the worker relating to
the target service to the service provider of the service. The
authentication key issuance unit 3203 ceases to distribute the
authentication key to be used by the worker (marked worker),
extracted by the analysis unit 3213, having working time exceeds
the predetermined standard to the service provider.
[0393] Accordingly, the center server 30 or the like is capable of
ceasing to distribute the authentication key to be used by the
worker extracted due to potential improper behaviors in the past to
the service provider offering the target service. Therefore, the
center server 30 or the like is further able to suppress the
improper behaviors committed by the worker in the vehicle cabin of
the vehicle 10A.
[0394] In the embodiment, the monitoring unit 3211 sets the
predetermined time for the worker, extracted by the analysis unit
3213, having working time exceeds the predetermined standard to be
shorter than the predetermined time for the worker other than the
worker extracted by the analysis unit 3213 out of the workers.
[0395] Accordingly, the center server 30 or the like is capable of
notifying the user of a warning or activating the buzzer 15 of the
vehicle 10A, when the worker is extracted due to potential improper
behaviors in the past, at the timing earlier than that for other
workers. Consequently, the center server 30 or the like can notify
the user of a warning or activate the buzzer 15 of the vehicle 10A
before the improper behaviors would be actually committed in
accordance with the extracted worker. Therefore, the center server
30 or the like is able to suppress the improper behaviors committed
by the extracted worker beforehand, and further suppress the
improper behaviors committed by the worker in the vehicle cabin of
the vehicle 10A.
[0396] In the embodiment, a predetermined information processing
method is executed by the center server 30 or the like, relating to
a predetermined service provided to a user by allowing a worker to
temporarily access a vehicle cabin including a trunk of a vehicle
10A used by the user. Specifically, a monitoring step of the
information processing method includes determining whether or not
the worker relating to a service provider of the service has
unlocked a door of the vehicle 10A using authentication key for
unlocking the door, in which the door is a door accessing the
vehicle cabin of the vehicle 10A, determining whether or not a
predetermined time has elapsed from unlocking of the door when the
door has been unlocked, and notifying the user of a warning or
activating the buzzer 15 of the vehicle 10A when a state in which
the door of the vehicle 10A is not locked continues after the
predetermined time T has elapsed.
[0397] Accordingly, the center server 30 or the like is capable of
suppressing the improper behaviors committed by the worker in the
vehicle cabin of the vehicle 10A with the information processing
method, as described above.
[0398] In the embodiment, the information processing method is
executed by the processing device 23 included in the mobile
terminal 20Ac carried by the worker (deliverer). Specifically, the
monitoring step described above notifies the user of a warning or
activates the buzzer 15 when the door accessing the trunk of the
vehicle 10A has been unlocked based on a predetermined unlocking
manipulation on the mobile terminal 20Ac by transmitting a
predetermined transmission signal including the authentication key
to the vehicle 10A, and when the processing device 23 included in
the mobile terminal 20Ac that a state in which a locking
manipulation is not performed on the mobile terminal 20Ac for
locking the door of the vehicle 10A continues after the
predetermined time T has elapsed from unlocking of the door.
[0399] Accordingly, the processing device 23 included in the mobile
terminal 20Ac of the worker is capable of figuring out an unlocked
or locked state of the door accessing the vehicle cabin of the
vehicle 10A based on a manipulation by the worker on the mobile
terminal 20Ac, using the information processing method. Therefore,
the processing device 23 of the mobile terminal 20Ac of the worker
is able to, specifically, figure out whether the vehicle 10A is
unlocked or locked by the worker using the key information, using
the information processing method, thereby notifying the user of a
warning, or activating the buzzer 15 by transmitting the control
command to the vehicle 10A.
[0400] The embodiments for carrying out the present disclosure have
been described in detail above, but the present disclosure is not
limited to the specific embodiments as described above, and various
modifications and changes can be performed without departing from
the gist of the present disclosure described in the claims.
[0401] For example, in the embodiment described above, the mobile
terminal 20 transmits the authentication request including the
authentication key to the key unit 12, the key unit 12 performs
exchange of signals with the locking, unlocking and activation
device 11 according to an authentication result based on the
authentication key, and locking and unlocking of the door of the
vehicle 10A and activation of the vehicle 10A are realized by the
locking, unlocking and activation device 11, however, implement of
the present disclosure is not limited thereto.
[0402] Specifically, a configuration in which the function of the
key unit 12 is transferred to the mobile terminal 20, and the
mobile terminal 20 performs exchange of signals based on the
above-described key information (internal key information) with the
vehicle 10 (the locking, unlocking and activation device 11) using
the LF radio waves and the RF radio waves such that the locking and
unlocking of the doors of the vehicle 10A and the activation of the
vehicle 10A by the locking, unlocking and activation device 11 are
realized may be adopted. In this case, the "authentication key" of
the embodiment described above may be read as the "key
information". That is, the center server 30 may issue the key
information instead of the authentication key and distribute the
key information to the mobile terminal 20 in the same method as in
the authentication key in the above-described embodiment.
Accordingly, the same operation and effects as those of the
above-described embodiment can be obtained.
[0403] The functions of the key unit 12 may be integrated with the
locking, unlocking and activation device 11, and a configuration
regarding communication between the locking, unlocking and
activation device 11 and the key unit 12 and authentication related
to the communication (the LF radio wave transmitter 111, the RF
radio wave receiver 112, the collating ECU 113, the LF radio wave
receiver 121, and the RF radio wave transmitter 122) may be
omitted. In this case, when the authentication of the mobile
terminal 20 based on the authentication key has been successful,
the key ECU 124 may directly output an unlocking command or a
locking command and an activation command to each of the body ECU
114 and the engine ECU 116 instead of the collating ECU 113, and
perform locking and unlocking the doors of the vehicle 10 and
activation of the vehicle 10. Accordingly, the same operation and
effects as those of the above-described embodiment can be
obtained.
* * * * *