WO2006075562A1 - 作業機械のロック制御システム及び作業機械のロック制御方法及び作業機械及び作業機械のロック制御装置及び作業機械のロック制御管理装置 - Google Patents
作業機械のロック制御システム及び作業機械のロック制御方法及び作業機械及び作業機械のロック制御装置及び作業機械のロック制御管理装置 Download PDFInfo
- Publication number
- WO2006075562A1 WO2006075562A1 PCT/JP2006/300109 JP2006300109W WO2006075562A1 WO 2006075562 A1 WO2006075562 A1 WO 2006075562A1 JP 2006300109 W JP2006300109 W JP 2006300109W WO 2006075562 A1 WO2006075562 A1 WO 2006075562A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- work machine
- information
- lock
- input
- Prior art date
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E02—HYDRAULIC ENGINEERING; FOUNDATIONS; SOIL SHIFTING
- E02F—DREDGING; SOIL-SHIFTING
- E02F9/00—Component parts of dredgers or soil-shifting machines, not restricted to one of the kinds covered by groups E02F3/00 - E02F7/00
- E02F9/20—Drives; Control devices
- E02F9/2025—Particular purposes of control systems not otherwise provided for
- E02F9/205—Remotely operated machines, e.g. unmanned vehicles
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- E—FIXED CONSTRUCTIONS
- E02—HYDRAULIC ENGINEERING; FOUNDATIONS; SOIL SHIFTING
- E02F—DREDGING; SOIL-SHIFTING
- E02F9/00—Component parts of dredgers or soil-shifting machines, not restricted to one of the kinds covered by groups E02F3/00 - E02F7/00
- E02F9/24—Safety devices, e.g. for preventing overload
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/008—Registering or indicating the working of vehicles communicating information to a remotely located station
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/08—Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
- G07C5/0841—Registering performance data
- G07C5/085—Registering performance data using electronic data carriers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
- G07C9/00674—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
- G07C9/0069—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in a predetermined sequence
Definitions
- Lock control system for work machine lock control method for work machine, work machine, lock control device for work machine, and lock control management device for work machine
- the present invention relates to a work machine lock control system, a work machine lock control method, and a work machine.
- Known work machines include, for example, various construction machines such as hydraulic excavators and wheel loaders, transport vehicles such as dump trucks, and the like. These work machines are relatively expensive and are often used at remote work sites, etc., so they are subject to theft.
- Patent Document 1 An anti-theft technology has been proposed in which an area where the work machine can be used is set in advance and the engine is allowed to start only when the user inputs a predetermined password into the work machine. ! Speak (Patent Document 1).
- Patent Document 1 Japanese Unexamined Patent Application Publication No. 2004-114893
- a user who is a debtor may intentionally activate an anti-theft function in order to avoid forced collection of a work machine by a creditor.
- the work machine cannot be operated unless the password is obtained from the user. Therefore, the creditor cannot move the work machine for which collateral is set and cannot collect the receivable.
- anti-theft technology is also conceivable in which the operation of the work machine is forcibly stopped by remote operation.
- remote control cannot be performed when the work machine is in a place where radio waves do not reach, such as in tunnels and mountainous areas.
- the present invention has been made paying attention to the above problems, and one object of the present invention is to integrate local operation on the work machine side and remote operation from outside the work machine, It is an object of the present invention to provide a work machine lock control system, a work machine lock control method, and a work machine that can control the operation of the work machine and improve usability.
- One object of the present invention is to provide a lock control system for a work machine and a work that can restrict the function of the work machine for each of the internal and external forces of the work machine and can release the function restriction by a plurality of methods. It is to provide a machine lock control method and a work machine.
- a further object of the present invention is to clarify the descriptive power of embodiments to be described later.
- a system for performing lock control of a work machine includes a work machine and a management device that are connected to be able to communicate with each other via a communication network.
- the work machine has an input means for inputting information, a first communication means for mutual communication with the management apparatus via a communication network, and information input from the management apparatus via the first communication means, or
- the control means for restricting the operation of the work machine or releasing the operation restriction based on either or both of the input information and the input means force.
- the management device is a second communication unit that performs mutual communication with the work machine via a communication network, and a port that transmits information for restricting the operation of the work machine to the work machine via the second communication unit.
- a setting unit; and a lock releasing unit that transmits a signal for releasing the operation restriction set to the work machine via the second communication unit.
- the control means compares the first password storage means for storing the first password information for comparison with the information input from the input means, and the information input from the input means. Second password storage means for storing the second password information, and third password storage means for storing third password information for comparison with information input from the management device. Then, the control means applies at least one of the information power first password information and the second password information input from the input means. Lock control is executed when it matches, and lock control is executed when the information input from the management device matches the third password information.
- superiority or inferiority may be set in advance between the first password, the second password, and the third password. For example, when the third password is positioned higher than the first password and the locked state is set by the third password, the locked state cannot be released by the first password.
- the second password information is one-time password information, and when the second password information stored in the second password storage means is used, the used second password information is used.
- a second password rewriting means for rewriting the password information with new second password information is further provided.
- the second password information is one-time password information, and when the second password information stored in the second password storage means is used, the used second password information is used. 2Equipped with a second password erasure means for erasing password information.
- control means includes second password rewriting means, and the second password rewriting means is used when the second password information stored in the second password storage means is used. In this case, the used second password information is rewritten with new second password information.
- control means includes a second password erasing means and a second password rewriting means
- the second password erasing means is a second password stored in the second password storage means.
- password information is used, the used second password information is deleted, and the second password rewriting means is used when the second password information issuance request is input from the input means.
- new second password information is generated in accordance with a predetermined generation conditional expression set in advance, and this new second password information is stored in the second password storage means.
- control means is registered in advance in the control means via the input means. If any other information is entered, it is determined that a request for issuing the second password information has been entered.
- the management device includes second password rewriting means, and the second password rewriting means uses the second password information stored in the second password storage means.
- the control means power is received via the communication network, new second password information is generated, and the generated new second password information is transmitted to the control means via the communication network. 2The password is stored in the memory.
- the management device is stored in the second password storage means and a reset means for resetting the first password information stored in the first password storage means to an initial value. Updating means for updating the existing second password information with new second password information. Then, the control means resets the first password information stored in the first password storage means to the initial value based on the instruction of the reset means, and the second password storage means based on the instruction from the update means The second password information stored in is updated with new second password information.
- control means includes, as lock control, a lock state that disables the operation of the work machine or restricts an executable operation, and an unlock state that releases the lock state.
- lock control a lock state that disables the operation of the work machine or restricts an executable operation
- unlock state that releases the lock state.
- One of the states is set to the work machine.
- the first password information is information that can be used repeatedly for a plurality of lock controls
- the second password information is information that is changed each time the lock control is performed.
- a method for performing lock control of a work machine connected to a management device through a communication network so as to be able to communicate with each other is also input through the communication network.
- a first lock step for setting a lock state that disables the operation of the work machine or restricts an executable operation, and an input means force provided in the work machine.
- the second lock step for setting the lock state to the work machine based on the lock command and the unlock state for releasing the lock state based on the first unlock command input via the management device power communication network
- the second unlock command in which the input means force is also input conforms to at least one of the first password information and the second password information preset in the work machine. When doing so, the second unlock state is set.
- a work machine connected to a management device via a communication network so as to be able to communicate with each other includes an input means for inputting information, and the management device and the communication network.
- the operation of the work machine is controlled based on either or both of the first communication means for mutual communication and the information input from the management device via the first communication means or the information input from the input means.
- a control means for restricting or releasing the operation restriction is provided.
- a system for performing lock control of a work machine includes a work machine and a management device connected to be able to communicate with each other via a communication network.
- the work machine has a communication means for connecting to the management device via the communication network, a password storage means for storing a password used for lock control, and if a password is used, the password is used.
- Used notification means to send a used notification indicating the fact to the management device via the communication network, and when a new password is received from the management device via the communication network, it is stored in the password storage means.
- Rewriting means for rewriting a stored password with a new password.
- the management device includes a communication means for connecting to the work machine via the communication network, a password generation means for generating a new password when the work machine power also receives a used notification, and a generated password.
- a password transmitting means for transmitting a new password to the work machine via the communication network.
- a system for performing lock control of a work machine includes a work machine and a management device that are connected to each other via a communication network so that they can communicate with each other.
- the work machine uses password storage means for storing password information used for lock control and password information stored in the password storage means
- password erasing means for erasing the used password information and a password password issuance request are input
- new password information is generated according to a predetermined generation conditional expression set in advance.
- password generation means for storing the new password information in the password storage means.
- the management device may include password generation means for generating new password information according to the same generation condition expression as the predetermined generation condition expression when requested.
- the password generation means determines that a password information issuance request has been input when information other than the previously registered information is input.
- the management device includes notification means for notifying the generated new password information.
- An apparatus for performing lock control of a work machine is based on a communication means for communicating with a management apparatus via a communication network, and an input instruction.
- the lock control means for setting the work machine to either the locked state or the unlocked state, the password storage means for storing the password for releasing the lock state by the lock control means, and the password input means force were also input.
- a management device for performing lock control of a work machine includes: a communication unit for intercommunication with the work machine; and password generation for generating a password used in the work machine.
- a password issuance request is received from the work machine via the communication means, a new password is generated by the password generation means, and the new password is generated via the communication means.
- the invention's effect is not limited to: a password issuance request, a new password is generated by the password generation means, and the new password is generated via the communication means.
- the operation of the work machine is limited from either or both of the input means provided in the work machine or the management device connected to the work machine via the communication network. Or the operation restriction can be lifted, and the usability is improved. In other words, even if the operation of the work machine is restricted using the input means, it can be released remotely from the management device, and conversely, the operation of the work machine can be restricted remotely from the management device. Even if it is set, the input means force can be released.
- first password information and second password information Two types of password information, ie, first password information and second password information, can be input from the input means.
- the work machine can be locked. Therefore, for example, if the first password information is information that can be freely set by the user and the second password information is managed by a predetermined organization such as a vendor of a work machine or a bank, the operation set by the user is performed. The restriction can be lifted by a person dispatched from a predetermined organization, and the work machine can be forcibly collected.
- each time a password is used in the work machine a new password is generated by the management apparatus and stored in the work machine.
- the new password is stored in the work machine. It can be rewritten. Therefore, the locked state of the work machine can be controlled by a so-called disposable nosword, which improves usability.
- FIG. 1 is an explanatory diagram showing an overall configuration of a system according to an embodiment of the present invention.
- FIG. 2 is a block diagram showing a functional configuration of the work machine.
- FIG. 3 is a block diagram showing a functional configuration of the lock setting device.
- FIG. 4 is a block diagram showing a functional configuration of the server.
- FIG. 5 is a block diagram showing a functional configuration of a bank terminal.
- FIG. 6 is an explanatory diagram showing a work implement management table managed on the server side.
- FIG. 7 is an explanatory diagram showing a work machine management table managed on the bank side.
- FIG. 8 is an explanatory diagram showing a plurality of types of locking methods and unlocking methods.
- FIG. 9 is a flowchart showing a central management method for operation information.
- FIG. 10 is a flowchart showing lock processing by remote operation.
- FIG. 11 is a flowchart showing lock processing by local operation.
- FIG. 12 is a flowchart showing unlock processing by remote operation.
- FIG. 13 is a flowchart showing user password reset processing.
- FIG. 14 is a flowchart showing unlock processing by local operation.
- FIG. 15 is a flowchart showing a one-time password issuing process.
- FIG. 16 is a flowchart showing a lock process by a local operation according to the second embodiment.
- FIG. 17 is a flowchart showing unlock processing by local operation according to the third embodiment.
- FIG. 18 is a flowchart showing lock processing by remote operation according to the fourth embodiment.
- FIG. 19 is a block diagram showing a functional configuration of a lock setting device according to a fifth embodiment.
- FIG. 20 is a flowchart showing unlock processing by local operation.
- FIG. 21 is a flowchart showing a process in which the server generates a new one-time password.
- FIG. 22 is a flowchart showing a process in which the server notifies the user at the work site of a new one-time password. Explanation of symbols
- the lock control of the work machine 1 can be performed remotely from the server 50, or can be performed via the input unit 152 (FIG. 3) provided in the work machine 1. You can also.
- the input unit 152 is provided with a communication function for performing data communication via wire or wireless with the external device 153 (see FIG. 19).
- the password can be input from the external device 153.
- the external device 153 include a mobile phone, a portable information terminal, a personal computer, an ID card, a memory card, and a wireless tag.
- the external device 153 should have at least a storage function for storing information such as a password and a communication function for communicating with the communication function of the input unit 152! / ,.
- the external device 153 By configuring the external device 153 to be able to input a keyword, for example, an operator or the like automatically inputs a password to the work machine 1 without manually operating the keyboard switch of the input unit 152. Thus, lock control can be performed, input errors and the like can be prevented, and convenience is improved.
- the external device 153 can also be called, for example, a nosword input unit for automatically inputting a nosword.
- remote operation remote lock control
- local lock control local lock control
- local operations can be performed independently from a plurality of routes.
- One route is managed by user 3 of work machine 1 Use the current user password.
- the other route uses a one-time password managed by the vendor of the work machine 1.
- the lock control includes a process of setting the work machine 1 to the locked state and a process of releasing the locked state and setting the unlocked state.
- the locked state is, for example, a state in which the operation of all or part of the work machine 1 is completely or partially disabled.
- the unlocked state is a state in which the locked state set in the work machine 1 is released, for example.
- the operating status of the work machine 1 used by the user 3 can be monitored by the bank (administrator) 2 who has loaned the user 3 also with a remote force. Thereby, the bank 2 can estimate the business situation of the user 3.
- the user 3 when purchasing the work machine 1 from the sales agent 4, the user 3 receives a loan from the bank 2 using the work machine 1 as collateral. User 3 is obliged to repay bank 2, for example, for a fixed amount every month.
- the bank 2 can monitor whether the business of the user 3 using the work machine 1 is fostering by remotely managing the operating status of the work machine 1. For example, the bank 2 can force the work machine 1 to be locked by remote operation when, for example, the operation rate of the work machine 1 is remarkably lowered and there is a strong concern about the repayment capacity. As a result, it is possible to prevent the user from taking away the work machine 1, and the work machine 1 can be easily seized. This remote operation can be performed from the bank terminal 20 via the server 50.
- Figure 1 shows the overall system.
- the lock control system includes a work machine 1, a server 50 provided in a network control station 5 on the work machine manufacturer side, a bank terminal 20 provided on the bank 2 side, and a user 3 side.
- the communication network 7 is a dedicated connection between the satellite communication line connecting the work machine 1 and the satellite earth station 6 via the communication satellite 8, and the server 50 of the satellite earth station 6 and the network control station 5.
- a computer network such as the Internet.
- a terminal of a sales agent 4 that sells the work machine 1 is connected to the computer network.
- the server 50 and the bank terminal 20 can cooperate to monitor the operation status of the work machine 1 and execute lock control.
- the server 50 can independently control the lock of the work machine 1.
- the server 50 and the bank terminal 20 may correspond to the “management device” depending on the force level to which the server 50 corresponds.
- the satellite communication line is used for the purpose of enabling communication between the work machine 1 and the management device wherever the work machine 1 is located. If the same purpose can be achieved, another mobile communication network or wireless communication network may be used instead of the satellite communication line. However, for example, when the work machine 1 is in an area where it is difficult to receive radio waves, such as in a mountainous area or in a tunnel, the power of the management device cannot be operated remotely. In this case, lock control can be performed by local operation.
- a large number of work machines 1 may include, for example, construction machines such as excavators, wheel loaders, bulldozers, motor graders, and cranes, transport vehicles such as dump trucks, and industrial machines such as various crushers and generators.
- One server 50 or a plurality of servers 50 may be used. By centralized processing or distributed processing by one or a plurality of servers 50, it is possible to monitor a large number of work machines 1 and provide information to each bank terminal 20 and each user terminal 30.
- each terminal 20, 30 can execute various application software on OS (Operating Systems).
- OS Operating Systems
- Examples of the application software include a web browser for displaying a web page provided from the server 50, an e-mailer that transmits and receives e-mails, and the like.
- FIG. 2 is a block diagram showing a functional configuration of the work machine 1.
- the work machine 1 includes, for example, an electronic controller 100, a communication controller 110, a GPS (Global Positioning System) sensor 120, a satellite communication terminal 130, a lock setting device 140, and an Ul (User (Interface) section 150, service meter 160, and a plurality of sensors. All or some of these parts can be connected to each other via one or more in-vehicle networks.
- the electronic controller 100 and the communication controller 110 are integrated, or the lock setting device 140 and the electronic controller 100 are integrated. Can also be summarized.
- the electronic controller 100 can be connected to a communication controller 110, a lock setting device 140, a service meter 160, and various sensor groups. Note that the UI unit 150 can also be connected to the electronic controller 100.
- the electronic controller 100 is connected to various sensors attached to various components of the work machine 1 (for example, an engine, a battery, a fuel tank, a radiator, and the like).
- these sensors include a service meter (a sensor that measures and integrates operating time) 160, an engine speed sensor, a notch voltage sensor, a fuel amount sensor, and a cooling water temperature sensor.
- the electronic controller 100 generates information indicating the operating time, engine speed, knotter voltage, fuel amount, cooling water temperature, and the like detected by these sensor groups, and transmits the information to the communication controller 110. .
- Information indicating various states and operations of the work machine 1 such as the operation time and the engine speed described above is hereinafter collectively referred to as “operation information”.
- the electronic controller 100 is in response to signals from the sensor group, and is in response to a control command given from the communication controller 110, and is in a state of various constituent elements of the work machine 1. And control the operation electronically.
- One of the control commands given from the communication controller 110 to the electronic controller 100 is a lock control command by remote operation.
- the electronic controller 100 sets the work machine 1 to the locked state. As a result, even if the operator operates the operation lever or the like, the work machine 1 cannot be moved.
- the GPS sensor 120 has a GPS antenna 121 for receiving radio waves of GPS satellite 9 (Fig. 1) force.
- the GPS sensor 120 measures the current position of the work machine 1 and notifies the communication controller 110 of this.
- the satellite communication terminal 130 has a satellite communication antenna 131 for communicating with the communication satellite 8 (FIG. 1).
- the satellite communication terminal 130 includes a communication controller 110 and a server. Communication with 50 via satellite communication network is enabled.
- the communication controller 110 controls communication with the management apparatus.
- the communication controller 110 receives the operation information described above from the electronic controller 100. Further, the communication controller 110 receives position information indicating the current position from the GPS sensor 120.
- the communication controller 110 transmits the operation information and the position information to the server 50 periodically or irregularly via the satellite communication terminal 130 and the satellite communication line. For example, the communication controller 110 can transmit the operation information and the position information to the server 50 once a day during the time when the field work is completed. Alternatively, the communication controller 110 can transmit the operation information and the position information to the server 50 at any time as necessary.
- the server 50 stores the received operation information and position information.
- the server 50 can determine how much risk the loan to the user 3 will be overlooked by automatically examining the stored operation information.
- the operation information includes information on various states or operations detected in the work machine 1, and in particular, the operation time force detected by the service meter 160. Used for server 50 as material. Information on other states or operations can be used for, for example, scheduling maintenance of the work machine 1.
- the server 50 transmits the above-described lock control command to the work machine 1 through the satellite communication line as necessary, thereby Can be locked.
- the communication controller 110 may include a rewritable nonvolatile storage device 111.
- the storage device 111 can store, for example, the user name of the work machine 1, the operation time, the work area, the operation history of the work machine 1, and the like.
- the work area is a specific activity area set by the agreement between the user 3 and the bank 2 when the user 3 receives a loan from the bank 2. Setting a work area means that the bank 2 does not allow the user 3 to take the work machine 1 out of the active area.
- the set work area is stored in association with the work machine 1 even in the server 50 and the bank terminal 20 that are connected only by the communication controller 110 in the work machine 1.
- server 50 Based on the position information received from work machine 1, server 50 has work machine 1 placed outside the work area. Determine if it exists. As a result, when it is determined that the work machine 1 exists outside the work area, the server 50 transmits the lock control command described above to the work machine 1 through the satellite communication line as necessary. The work machine 1 can be locked.
- the UI unit 150 can be connected to the communication controller 110 and the lock setting device 140, respectively.
- the UI unit 150 can be provided in the vicinity of the driver's seat of the work machine 1, for example.
- the UI unit 150 includes, for example, a display unit 151 and an input unit 152.
- the display unit 151 can also be configured with, for example, a display device such as a liquid crystal display, and is used for map display for car navigation based on position information, message display, and the like.
- the input unit 152 can be configured to include, for example, a keyboard switch and a pointing device such as a mouse, and is used for inputting various operation instructions and passwords. It is also possible to use voice to provide information to operators (including those other than user 3 such as manufacturer maintenance personnel) and to input information from operators.
- the UI unit 150 can also be used for information input / output to the electronic controller 100.
- the lock setting device 140 can be provided between the electronic controller 100 and the communication controller 110, for example.
- the lock setting device 140 performs lock control by remote operation or local operation, and gives necessary instructions to the electronic controller 100. Details of the lock setting device 140 will be described later with reference to FIG.
- the work machine 1 is provided with an engine 170.
- Engine 170 is started by engine starter 171.
- the electronic controller 100 exists between the engine starter 171 and the engine key switch (“key SW” in the figure) 181.
- the engine starter 171 is activated by a control signal (start command signal) from the electronic controller 100.
- the electronic controller 100 When the electronic controller 100 detects a start signal from the engine key switch 181, it outputs a start command signal to the engine starter 171. As a result, the engine 170 is started. When the work machine 1 is set to the locked state, the electronic controller 100 does not output the start command signal even if the start signal is input.
- a method of cutting the start signal of the engine key switch 18 1 can be employed.
- Other locking methods include, for example, opening the knotter relay provided between the knotter and the electrical components.
- a method for cutting the pilot signal of the control valve for controlling the hydraulic work machine, a method for cutting the I / O command signal for the engine fuel injection valve, and the control signal for the fuel injection device are kept at the minimum value. The method etc. which make only idling possible are mentioned. Either way, the work machine 1 is completely stopped or its possible movement is limited.
- FIG. 3 is a block diagram of the lock setting device 140.
- the lock setting device 140 includes, for example, a mouth setting storage unit 141, a comparison unit 142, a lock control unit 143, a user password storage unit 144, an administrator password storage unit 145, a one-time password storage unit 146, Can be configured.
- the input unit 152 of the UI unit 150 can be used.
- the lock setting device 140 has a purpose that the user 3 or an operator! /, A maintenance person (hereinafter referred to as an operator or the like) manually locks the work machine 1 and releases the lock. It can be used for the purpose of releasing the lock set by remote control.
- the user password storage unit 144 stores a user password that can be set by the user 3 or the operator. An operator or the like can set the lock state on the work machine 1 or release the set lock state by inputting the user password to the lock setting device 140. That is, every time a correct user password is input, the locked state and the unlocked state are switched alternately. The user password can be reset to the initial value by a command from the server 50.
- the administrator password storage unit 145 stores an administrator password.
- the administrator password is a password that is managed by Bank 2, and is usually not known to at least User 3.
- the bank 2 can lock the work machine 1 by inputting the administrator password to the lock setting device 140 by remote control.
- the one-time password storage unit 146 stores a one-time password.
- the one-time newsword is managed by the work machine 1 vendor, that is, by the server 50.
- the one-time password is disposable authentication information that cannot be used immediately after use. A one-time password cannot be used once. New one tie The munosword is issued from the work machine 1 itself or the server 50 as described later. The issued new one-time password is stored in the one-time password storage unit 146.
- the user password, administrator password, and one-time password can be composed of, for example, a multi-digit alphanumeric character or symbol power.
- biometric information such as a fingerprint, a voiceprint, or an iris is used.
- the lock setting storage unit 141 stores lock setting information indicating what type of lock is currently set on the work machine 1.
- the lock setting information includes, for example, information indicating whether the lock is manually set, whether the lock is set by remote operation from the bank terminal 20 or the server 50, and the like.
- the lock setting device 140 causes the lock setting storage unit 141 to store lock setting information indicating manual lock.
- the lock setting device 140 causes the lock setting storage unit 141 to store lock setting information indicating that it is a remote operation lock.
- the comparison unit 142 compares the password input from the input unit 152 with the user password or the one-time password, and determines whether or not they match. For example, when a lock setting request and a password are input from the input unit 152, the comparison unit 142 reads the user password in the user password storage unit 144 and compares it with the input password. When these passwords match, the comparison unit 142 outputs a lock instruction to the lock control unit 143. The comparison unit 142 compares the input password with the one-time password, and outputs a lock instruction to the lock control unit 143 if they match.
- a "lock button” or “unlock button” is provided in the input unit 152, and either the lock button or the unlock button is provided to the operator or the like either before or after the password input. Can be selected.
- a configuration may be adopted in which the locked state and the unlocked state are alternately switched each time an operator or the like inputs a password. In the latter case, when the work machine 1 is in the locked state and the operator or the like enters the correct password, the lock state force also changes to the unlocked state. Conversely, work machine 1 is unlocked. When the operator enters the correct password while in the locked state, the unlocked state force also changes to the locked state.
- the lock instruction includes both an instruction to enter the locked state and an instruction to enter the unlocked state.
- an instruction for changing to the locked state may be distinguished from a lock command
- an instruction for changing to the unlocked state may be distinguished from an unlock command.
- the lock control unit 143 outputs a control signal to the electronic controller 100 in response to the lock instruction. In response to this control signal, the electronic controller 100 sets a manual lock. As already explained, there are several ways to lock. For example, the electronic controller 100 can cut the start signal of the key switch 181. At this time, lock setting information indicating manual lock is written in the lock setting storage unit 141.
- the comparing unit 142 compares the input password with the user password and the one-time password, respectively.
- a signal for releasing the lock is output to the lock control unit 143.
- the lock status can be released by either remote operation using the administrator password or local operation using the one-time password. Also good. In other words, the user password can be prohibited from being locked by remote operation.
- the type of lock setting indicated by the lock setting information is manual lock, it can be configured to be releasable using any of a user password, an administrator password, and a one-time password.
- the unlocking method corresponds to each locking method.
- the lock setting device 140 has been turned on by the operation of the key switch 181.
- the display 151 indicates that it is locked to secure collateral. Messages or marks can also be displayed. As a result, if user 3 tries to resell work machine 1 that is locked remotely, the third party will know that the transaction is fraudulent. it can.
- FIG. 4 shows a functional configuration of the server 50.
- the server 50 is connected to the computer network of the communication network 7, receives operation information and position information from the work machines 1 existing in various remote locations, stores them, and analyzes them. .
- the Sano 50 includes, for example, a communication control unit 51 that controls communication with a computer network, an arithmetic processing unit 52 that processes information transmitted and received through the communication control unit 51,
- the semiconductor memory can be provided with a storage unit 53 constituted by a node disk device or the like.
- the storage unit 53 stores a program storage unit 53A in which various computer programs executed by the arithmetic processing unit 52 are stored, and operation information, position information, and other information received from the work machine 1.
- database 53B For database 53B.
- the arithmetic processing unit 52 executes the various computer programs described above, thereby operating information reception processing 52A, operating information transfer processing 52B, lock setting processing 52C by remote operation, and unlocking by remote operation. Processing 52D, user password reset processing 52E, and one-time password issuing processing 52F can be executed.
- the operation information receiving process 52A is a function of receiving operation information and position information from the work machine 1 and storing them in the database 53B.
- the operation information transfer processing 52B is a function for reading the operation information from the database 53B and transferring the operation information to the bank terminal 20 through the computer network.
- the operation information transferred to the bank terminal 20 may include at least the operation time that is a material for determining the credit loss risk that does not need to include all of the various state information described above! /.
- the lock setting process 52C by remote operation is a function of outputting a lock command to the work machine 1 based on an instruction from the bank terminal 20, for example.
- the lock command is received by the satellite communication terminal 130 of the work machine 1 through the satellite communication network, and sent from the communication controller 110 in the work machine 1 to the electronic controller 100 via the lock setting device 140.
- Electronic computer In response to the lock command, Troller 100 locks work machine 1 and the operator
- the unlocking process 52D by remote operation is a function for releasing the locked state of the work machine 1 via the satellite communication network. Similarly to the lock command, the unlock command is received by the satellite communication terminal 130 and transmitted from the communication controller 110 to the electronic controller 100 via the lock setting device 140.
- the user password reset process 52E is a function for resetting the user password stored in the user password storage unit 144 to an initial value.
- the reset command is input to the lock setting device 140 via a satellite communication network or the like.
- the lock setting device 140 resets the currently set user password to an initial value (for example, a predetermined digit alphabet (such as ABCD)) according to the reset command.
- an initial value for example, a predetermined digit alphabet (such as ABCD)
- the user password can be reset by remote operation by the user 3 contacting the vendor.
- the user 3 and the operator can release the lock state set in the work machine 1 by inputting the initial value.
- the one-time password issuance process 52F is a function for generating a new one-time password and sending it to the lock setting device 140 upon receiving a notification from the lock setting device 140 that the one-time password has been used.
- the new one-time password is registered in the one-time password storage unit 146 via a satellite communication network or the like.
- the one-time password issuing process 52F generates a new password when a one-time password issuing request (generation request) is input.
- FIG. 5 shows a functional configuration of the bank terminal 20.
- the bank terminal 20 can be configured as, for example, a personal computer as described above.
- the bank terminal 20 is connected to a computer network and can communicate with the server 50.
- the bank terminal 20 can include a communication control unit 21, an arithmetic processing unit 22, a storage unit 23, and a UI unit 24.
- the storage unit 23 can be configured, for example, as a semiconductor memory node disk device or the like, and can be provided with a program storage unit 23A and a database main body 23B.
- the program storage unit 23A stores application programs such as web browsers and electronic mailers. Is done.
- the database main body 23B can store operation information received from the server 50 (in particular, operation time data indicating the operation amount of the work machine 1).
- the arithmetic processing unit 22 executes a computer program to execute an operating condition setting process 22A, an operating information reception process 22B, an operating state determination process 22C, a work machine restraint determination process 22D, a work machine
- Each of the constraint release processing 22E can be executed.
- the arithmetic processing unit 22 determines whether or not the work machine 1 is active in a specific area specified in advance, and outputs a lock command when the work machine 1 moves out of the area. A monitoring process can also be performed.
- the operating condition setting process 22A is a process for setting an operating condition.
- the operating conditions for example, a work area in which the work machine 1 can operate and a period in which the work machine 1 is allowed to be stopped can be set.
- the operation information reception process 22B is a function of receiving the operation information of the work machine 1 from the server 50, for example, about once a day, and storing the received operation information in the storage unit 23.
- the operation status determination process 22C is a function of determining whether or not the operation state of the work machine 1 satisfies a desired operation condition. That is, in the operation status determination process 22C, the operation information of the work machine 1 stored in the storage unit 23 is entered into a predetermined calculation formula, and the operation status of the work machine 1 is quantified and evaluated. Then, this operation status determination process 22C compares the calculated evaluation N with a preset threshold value Nth for evaluation, and if N is Nth, the operating state of the work machine 1 is the desired operating condition. Is not satisfied (meaning that the business status of User 3 may be at risk).
- the work machine restraint process determination process 22D is a function for determining to set the work machine 1 to the locked state by remote operation using the administrator password.
- the work machine restraint release process 22E is a function for releasing the lock state set in the work machine 1 by remote operation using the administrator password.
- FIG. 6 shows an example of a work machine management table T1 managed by the server 50.
- This management table T1 is assigned to, for example, a user ID for identifying each user, a user name, a machine ID for identifying each work machine 1, a work machine name, and a work machine.
- the one-time newsword and whether the work machine is locked or not By associating each, it can be configured.
- FIG. 7 shows an example of a work machine management table T2 managed on the bank 2 side.
- This management table T2 for example, is financed with the user ID, user name, machine ID, work machine name, operation rate (or evaluation value N) of each work machine, and the work machine as collateral. It can be configured by associating the balance of the amount of money, the presence / absence of the security right setting, and the presence / absence of the lock state.
- FIG. 8 is an explanatory diagram showing an overview of lock control by this system.
- FIG. 8 (a) is a schematic diagram showing a method (mode) for setting the lock state to the work machine 1.
- mode a method for setting the lock state to the work machine 1.
- the user password can be manually locked by inputting the user password from the input unit 152 (S2).
- this system also has an auto-lock mode that can automatically lock when the operator stops the engine 170 (S3).
- the work machine 1 can be set in the locked state in three types of modes. As a result, the state of the work machine 1 changes to the unlocked state force lock state (S4). Details of each mode will be described later.
- FIG. 8B is a schematic diagram showing a method (mode) for releasing the lock of the work machine 1.
- the lock can be released by remote operation based on an instruction from the server 50 (S5).
- the operator or the like can also release the locked state set in the work machine 1 by manual operation (S6).
- Manual unlocking also includes a method of using a user password (S7) and a method of using a one-time password (S8).
- the locked state of the work machine 1 can be released in the three types of modes, whereby the work machine 1 changes to the locked state force unlocked state (S9).
- superiority or inferiority can be set between each mode.
- the lock can not be released by manual operation (S 7) using a user password.
- FIG. 9 is a flowchart showing a process for centrally managing the operation rate of each work machine 1.
- the work machine 1 monitors whether or not the operation information transfer time (report time) has arrived.
- operation information is generated (S12) and transmitted to the server 50 (S13).
- the operation information is transmitted to the server 50 at a frequency of about once a day during the time when the field work is completed.
- the server 50 When the server 50 receives the operation information from the work machine 1 (S14), the server 50 transfers the information to the bank terminal 20 (S15). Since the operation information can also be left in the server 50, the server 50 can be utilized for maintenance services and the like using the operation information.
- the bank terminal 20 When the bank terminal 20 receives the operation information from the server 50 (S16), the bank terminal 20 calculates the operation rate based on this (S17). As a result, the bank terminal 20 can determine the risk of credit loss based on the operating status of the work machine 1. The work machine 1 can be locked by remote operation based on the determined risk of loan collapse.
- FIG. 10 is a flowchart showing a process for setting a locked state in work machine 1 by remote operation.
- the bank terminal 20 determines whether or not to perform remote lock in consideration of the risk of credit loss (S21). When the lock of the work machine 1 is determined (S21: YES), the bank terminal 20 identifies the work machine 1 and instructs the server 50 to lock (S22).
- the server 50 Upon receiving the lock instruction from the bank terminal 20 (S23: YES), the server 50 transmits a mouth command to the work machine 1 (S24). This lock command is associated with the work machine 1
- V the administrator password is included.
- a lock signal is output (S26), and the lock setting information stored in the lock setting storage unit 141 is updated (S27).
- the lock setting information stores information indicating that the lock has been applied by remote operation.
- FIG. 11 is a flowchart showing local lock control executed on the work machine 1 side.
- the work machine 1 determines whether or not the auto lock mode is set (S31). Op The lator or the like can select the auto lock mode via the UI unit 150.
- the work machine 1 monitors whether the engine 170 has stopped (S32).
- work machine 1 outputs a lock signal (S33).
- the work machine 1 updates the lock setting information (S34).
- the lock setting information stores information indicating that the lock is set in the auto lock mode.
- FIG. 12 is a flowchart showing unlock processing by remote operation from the server 50.
- the server 50 determines whether or not to perform remote unlocking based on a request from the bank terminal 20 or a contact from a maintenance staff dispatched to the site (S41).
- server 50 transmits an unlock command to work machine 1 (S42).
- This unlock command contains at least the administrator password.
- the work machine 1 When the work machine 1 receives the unlock command from the server 50 (S43: YES), the work machine 1 outputs the unlock signal (S44) and releases the locked state. In addition, the work machine 1 updates the lock setting information (S45). The lock setting information indicates that the lock was released by remote operation. Can be reminded.
- FIG. 13 is a flowchart showing user password reset processing by remote operation.
- the server 50 can determine whether or not to reset the user password based on the notification from the user 3 who has forgotten the user password or the contact from the maintenance staff (S51).
- the server 50 transmits a reset command to the work machine 1 (S52).
- This reset command can include, for example, an administrator password.
- work machine 1 When work machine 1 receives a reset command from server 50 (S53: YES), work machine 1 resets the user password registered in user node storage unit 144, and returns the value to the initial value. (S54). Therefore, the user 3 or the operator can release the lock state set in the work machine 1 by inputting, for example, a predetermined digit “alphabet (ABCD, etc.)” from the input unit 152. Thereafter, the user 3 and the operator can re-register a new user password in the user password storage unit 144.
- ABCD alphabet
- FIG. 14 is a flowchart showing unlock processing by local operation.
- the work machine 1 monitors the force / force of input of some character string (password) from the input unit 152 (S61).
- password is input (S61: YES)
- the work machine 1 determines whether or not the input password strength matches the user password registered in the user password storage unit 144 (S62). .
- the work machine 1 When the input password matches the user password (S62: YES), the work machine 1 outputs an unlock signal (S63) to release the locked state.
- the work machine 1 can also store in the lock setting information that the lock has been released by the user password (S64).
- the force lock setting information which is the same in the parts already described and the parts described below, does not always need to be updated. If necessary, update the lock setting information.
- the implement Machine 1 If the entered password matches the one-time password (S65: YES), the implement Machine 1 outputs an unlock signal (S66) to release the locked state. Further, the work machine 1 can store in the lock setting information that the lock has been released by the one-time password (S67).
- the one-time password becomes invalid and cannot be used repeatedly. Therefore, work machine 1 notifies server 50 that the one-time password has been used via the satellite communication network (S68). Then, after erasing the used one-time password (S69), the work machine 1 waits until a new one-time password is received from the server 50 (S70). When a new one-time password is received from the server 50 (S70: YES), the work machine 1 stores the new one-time password in the one-time password storage unit 146 (S71).
- work machine 1 can also generate a one-time password by itself and store it in one-time password storage unit 146.
- server 50 and work machine i can generate one-time passwords individually by entering the same basic information (device number and time information) into the same generation condition expression. Is. Accordingly, the one-time passwords generated by the server 50 and the work machine 1 are the same as a result.
- FIG. 15 is a flowchart showing a one-time password issuing process.
- the server 50 monitors the force / force of receiving some data from the work machine 1 (S81). When data is received from work machine 1 (S81: YES), the server 50 refers to the database 53B (S82), whether the received data contains a one-time password, or the received data is a one-time password. It is determined whether or not it is a force itself (S83). Work machine 1 force If the received data is a one-time password (S83: YES), it means that the work machine 1 has used a one-time password.
- the server 50 generates a new one-time password (S84), and determines whether or not the generated one-time password power is different from the already issued one-time password. (S85). For example, by referring to the work machine management table Tl shown in FIG. 6, it is determined whether or not it is the same as the one-time password already issued to the work machine of the same type as that work machine 1. The contents of management table T1 are included in database 53B.
- the server 50 registers the new one-time password in the database 53B (S86), and this new one-time password is transmitted to the satellite communication network. To the work machine 1 (S87). As described above, when the work machine 1 receives the one-time password, the work machine 1 stores it in the one-time password storage unit 146.
- the one-time password can be encrypted and transmitted from the server 50 to the work machine 1.
- the work machine 1 receives the encrypted one-time password, it decrypts it and stores it in the one-time password storage unit 146.
- the server 50 If the generated one-time password matches the issued one-time password (S85: NO), the server 50 generates another one-time password again (S84) and repeats the above-described verification (S85). .
- server 50 performs normal processing according to the contents of the received data. (S88). Examples of the normal process include the above-described operation information reception / transfer process.
- the lock control of the work machine 1 can be performed by remote operation via the satellite communication network, and the work machine 1 can be controlled by local operation using the UI unit 150. Lock control can be performed. As a result, the lock control can be performed by an appropriate method according to the state of the work machine 1 and the usability is improved.
- both the user password and the one-time password can be used. Therefore, for example, even if the user 3 deliberately locks the work machine 1 in order to avoid seizures, etc., the maintenance personnel can unlock the work machine 1 by entering the one-time password. Workability such as collection is improved.
- the locked state of work machine 1 cannot be released by remote operation, notify the user or maintenance personnel of the one-time password via communication means such as a telephone. The user and maintenance personnel who are informed of the one-time password can release the lock state by inputting the one-time node password to the work machine 1.
- the one-time password can be used only once and cannot be reused, so that even if it is known to the user, it can prevent subsequent misuse.
- One-time passwords can only be used once and cannot be reused. Therefore, even if the one-time password is known to the user or a third party, the locked state cannot be released using the used one-time password, and misuse is prevented.
- the user password can be reset by remote operation. Therefore, even if the user 3 forgets the user password, the user 3 can set a new user password by resetting the user password by remote operation. There is no need for maintenance personnel to rush to the site and enter a one-time password into work machine 1. Work machine 1 can be used remotely, improving the efficiency of maintenance work.
- the lock operation time in the auto lock mode is delayed.
- FIG. 16 is a flowchart showing a lock process by manual operation according to the present embodiment.
- Steps S31 to S39 described in 1 are provided.
- a timer for measuring a predetermined delay time tl is started (S91).
- the auto-lock is not executed until a predetermined delay time tl elapses. Predetermined If the engine 170 restarts within the delay time tl, the process is terminated without performing auto-lock. As a result, for example, when an engine stall occurs or when the operator has just left the work machine 1 for a short time, it is possible to prevent the automatic lock from being executed immediately, thereby improving usability.
- FIG. 17 is a flowchart showing unlock control by local operation. This flowchart includes steps S61 to S72 common to those shown in FIG. Description of common steps will be omitted, and the description will focus on the steps characteristic of this embodiment.
- work machine 1 When the user password input via input unit 152 matches the user password stored in user password storage unit 144 (S62: YES), work machine 1 refers to the lock setting information ( S101). The work machine 1 determines whether or not the lock by the remote operation has already been set based on the lock setting information (S102). When the lock by the remote operation is set (S102: YES), the work machine 1 prohibits the unlocking by the user password and notifies an error (S72).
- the work machine 1 When the lock by remote operation is not set (S102: NO), the work machine 1 outputs the unlock signal to release the lock state (S63), and updates the lock setting information (S64).
- One-time passwords can be placed higher than user passwords and administrator passwords.
- the priority of passwords decreases in the order of one-time password (1st place), administrator password (2nd place), and user password (3rd place).
- the one-time password is positioned at the top of the multiple types of passwords. Therefore, the work machine 1 can be unlocked with a one-time password in any situation, further improving usability.
- the work machine 1 determines whether or not the lock can be made before it is locked.
- FIG. 18 is a flowchart showing a process for locking the work machine 1 by remote operation. This flowchart includes steps S21 to S27 common to those shown in FIG. Description of common steps will be omitted, and the description will focus on the steps characteristic of this embodiment.
- the work machine 1 When the work machine 1 receives the lock instruction from the server 50 (S25), the work machine 1 acquires the current state of the work machine 1 based on the signal of the sensor group shown in FIG. ). The work machine 1 determines whether or not the work machine 1 is placed in a lockable state based on the current state (S112). For example, if the work machine 1 is running, the lock suddenly can be applied suddenly!
- the work machine 1 waits for the lock setting until it is in a lockable state (S112: YES). For example, when the engine 170 of the work machine 1 has been stopped for a certain period of time or longer, it can be determined that it can be pocked.
- the lockable state is detected (S112: YES)
- the work machine 1 outputs a lock signal (S26) and updates the lock setting information (S27).
- a fifth embodiment will be described with reference to FIGS. 19 to 22.
- the work machine 1 and the server 50 can each generate a one-time password.
- FIG. 19 is an explanatory diagram showing a functional configuration of the lock setting device 140 mounted on the work machine 1 according to the present embodiment. The description of the configuration overlapping with the above-described embodiment will be omitted, and the configuration characteristic to this embodiment will be mainly described.
- the lock setting device 140 of this embodiment is provided with a one-time password management unit 147 for managing one-time passwords.
- One-time password manager 147 A one-time password erasure unit (“PW erasure unit” in the figure) 147A and a one-time password generation unit (“PW generation part” in the figure) 147B.
- the one-time password deletion unit 147A positively or passively deletes the one-time password stored in the one-time password storage unit 146 in a predetermined case.
- the specified case is when a one-time password stored in the one-time password storage unit 146 is used, or when a Z or one-time password generation request (issue request) is input from the input unit 152 It is.
- passively erasing a one-time password is when the used one-time password stored in the one-time password storage unit 146 is overwritten with a new one-time password!
- One-time password generation unit 147B generates a new one-time password and stores it in one-time password storage unit 146 in a predetermined case. In the same way as above, when a one-time password stored in the one-time password storage unit 146 is used, or when a Z or one-time password generation request is input from the input unit 152 It is.
- the one-time password generation unit 147B generates a new one-time according to a predetermined generation conditional expression based on the current time acquired from the time information generation unit 148 and the device number acquired from the device number storage unit 149. Generate a password.
- the time information is, for example, date (December 1, 2005, etc.), date, time (December 1, 13:00, etc.), date, time, and minute (December 2005).
- the current time should be indicated at a level as required, such as 13:30 on 1st), date and hour, minute and second (13:30 on 20th December 2005).
- explanation will be made using date.
- the device number is identification information for uniquely identifying the work machine 1, and is issued and managed by the vendor of the work machine 1. In the same vendor, the same equipment number is not issued repeatedly to different work machines.
- the time when the generation of a new one-time password is requested is “March 3, 2006”
- the device number is “13548”
- the predetermined coefficient is “0.05”
- the upper 4 digits (1358) or the upper 5 digits (13588) of this multiplication value are used as a one-time password.
- the time information described in the year, month and day format changes day by day, and the device number is a value unique to each work machine 1. Therefore, the power that varies depending on the number of digits to be used.
- the upper 4 digits or the upper 5 digits may be used instead of the upper 6 digits.
- the greater the number of digits the better the security, but the input effort increases.
- an external device such as an ID card or a mobile phone, an artificial input error is eliminated and an accurate one-time pass is used.
- a word can be input to the lock setting device 140.
- FIG. 20 is a flowchart showing unlock processing by local operation according to the present embodiment.
- This flowchart includes steps S 61 to S 68 and S 72 that are common to the flowchart described with reference to FIG. The same applies to the following description, but the description of common steps will be omitted, and the steps characteristic of this embodiment will be mainly described.
- the work machine 1 notifies the server 50 via the communication network 7 that the one-time password has been used (S121).
- This use notification includes the device number set for the work machine 1.
- the work machine 1 transmits a use notification to the server 50, and then deletes the used one-time password stored in the one-time password storage unit 146 (S122).
- the work machine 1 acquires the current time information from the time information generation unit 148 and Then, the device number is acquired from the device number storage unit 149 (S123), and a new one-time password is generated according to the above-described generation condition formula (S124).
- the work machine ⁇ stores the generated new one-time password in the one-time password storage unit 146 (S125).
- the one-time password update process (S122 to S 124) is started. That is, when invalid information is input, the one-time password stored in the one-time password storage unit 146 is deleted, and a new one-time password is updated and stored.
- FIG. 21 is a flowchart showing the one-time password issuance process by the server 50.
- the server 50 determines whether or not a one-time password use notification (see S121 in FIG. 20) has been received from the work machine 1 (S131). Further, the server 50 determines whether or not generation of a new one-time password is requested (S132).
- the user or the like makes a new one-way communication with the administrator of the server 50 (an administrator who has the authority to issue a one-time password) via communication means (contact means) such as telephone, facsimile, or e-mail.
- communication means such as telephone, facsimile, or e-mail.
- You can request the generation of a time password.
- the administrator who confirmed this request can generate a new one-time password by instructing the server 50.
- a new one-time password is generated. That is, the server 50 acquires the current time and device number (S 133), and generates a new one-time password according to the above-described predetermined generation conditional expression (S 134). The server 50 stores the newly generated one-time password in the database of the storage unit 53 (S135).
- the server 50 can incorporate a function such as a timer for generating time information, or can receive the latest time information from an external time sano. Similarly, the work machine 1 may also receive the latest time information from an external time server.
- FIG. 22 is a flowchart showing a process for notifying the latest one-time password in response to a request from a user at the work site or the like.
- the server 50 determines whether the latest one-time password (that is, the currently valid one-time password) has been inquired (S141).
- the one-time password inquiry request includes at least the device number.
- the server 50 When the server 50 receives the one-time password inquiry (S141: YES), the server 50 acquires the device number (S142), and searches the database for the one-time password corresponding to the device number (S143). Then, the server 50 notifies the detected user or the like of the one-time password (S 144).
- the user or the like notifies the server 50 administrator of the device number and inquires the latest one-time password via means such as a telephone. For example, after confirming the identity of the inquiring user by the caller telephone number, etc., the administrator generates the latest one-time password corresponding to the reported device number as described in the flowchart of FIG. (S132 ⁇ S133-S134 in Fig. 21)
- the administrator notifies the user or the like of the stored new one-time password via means such as a telephone.
- the user or the like can release the locked state of the work machine 1 by inputting the notified one-time password via the input unit 152.
- work machine 1 and server 50 each generate a one-time password using the same generation condition expression based on the same basic information (time information and device number). It is said. Therefore, the one-time password generated on work machine 1 and server 5 The one-time password generated with 0 is the same.
- the one-time password when used, the one-time password is generated in each of the work machine 1 and the server 50. Therefore, compared to the configuration in which the one-time password generated by the server 50 is transmitted to the work machine 1 and stored as in the above-described embodiment, the one-time password can be managed more securely, and the security can be improved. Will improve.
- the server 50 does not need to send the newly generated one-time password to the work machine 1, so the load on the server 50 can be reduced.
- a performance of 0 can be assigned to another process.
- the UI unit 150 does not need to be fixed in the cab of the work machine 1.
- the UI unit 150 may be configured as a mobile terminal capable of short-range wireless communication. Lock control can be performed by local operation from outside the machine body 1.
Landscapes
- Engineering & Computer Science (AREA)
- Mining & Mineral Resources (AREA)
- Civil Engineering (AREA)
- General Engineering & Computer Science (AREA)
- Structural Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mechanical Engineering (AREA)
- Lock And Its Accessories (AREA)
- Operation Control Of Excavators (AREA)
- Component Parts Of Construction Machinery (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/793,615 US8098128B2 (en) | 2005-01-11 | 2006-01-06 | Lock control system and method for working machine, working machine, lock control device and lock control management device for working machine |
JP2006552902A JP4519860B2 (ja) | 2005-01-11 | 2006-01-06 | 作業機械のロック制御システム及び作業機械のロック制御方法及び作業機械及び作業機械のロック制御装置及び作業機械のロック制御管理装置 |
EP20060702053 EP1837255B1 (en) | 2005-01-11 | 2006-01-06 | Lock control system and method for working machine, working machine, lock control device and lock control management device for working machine |
DE200660008890 DE602006008890D1 (de) | 2005-01-11 | 2006-01-06 | Schlosssteuerungssystem und -verfahren für arbeitsmaschine, arbeitsmaschine, schlosssteuerungsvorrichtung und schlosssteuerungsverwaltungsvorrichtung für arbeitsmaschinen |
AU2006205466A AU2006205466B9 (en) | 2005-01-11 | 2006-01-06 | Lock control system and method for working machine |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005003434 | 2005-01-11 | ||
JP2005-003434 | 2005-01-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006075562A1 true WO2006075562A1 (ja) | 2006-07-20 |
Family
ID=36677587
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/300109 WO2006075562A1 (ja) | 2005-01-11 | 2006-01-06 | 作業機械のロック制御システム及び作業機械のロック制御方法及び作業機械及び作業機械のロック制御装置及び作業機械のロック制御管理装置 |
Country Status (7)
Country | Link |
---|---|
US (1) | US8098128B2 (ja) |
EP (2) | EP1837255B1 (ja) |
JP (1) | JP4519860B2 (ja) |
CN (1) | CN100545010C (ja) |
AU (2) | AU2006205466B9 (ja) |
DE (1) | DE602006008890D1 (ja) |
WO (1) | WO2006075562A1 (ja) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008144435A (ja) * | 2006-12-08 | 2008-06-26 | Shin Caterpillar Mitsubishi Ltd | 作業機械管理システム |
JP2011000905A (ja) * | 2009-06-16 | 2011-01-06 | Hitachi Constr Mach Co Ltd | 建設機械の盗難防止システム |
JP2012023851A (ja) * | 2010-07-14 | 2012-02-02 | Nippon Signal Co Ltd:The | 車両用充電システム |
JP2021031854A (ja) * | 2019-08-16 | 2021-03-01 | 株式会社クボタ | 作業機 |
TWI723263B (zh) * | 2018-05-18 | 2021-04-01 | 黃暐皓 | 機械設備監控系統及其方法 |
JPWO2022049642A1 (ja) * | 2020-09-01 | 2022-03-10 |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7453685B2 (en) * | 2005-02-18 | 2008-11-18 | Wells Gardner Electronics Corporation | Mountable frame for holding flat panel display and methods of mounting frame for holding flat panel display |
US9625275B2 (en) * | 2006-09-28 | 2017-04-18 | Landis+Gyr, Inc. | External access to meter display |
CZ306790B6 (cs) * | 2007-10-12 | 2017-07-07 | Aducid S.R.O. | Způsob navazování chráněné elektronické komunikace mezi různými elektronickými prostředky, zejména mezi elektronickými prostředky poskytovatelů elektronických služeb a elektronickými prostředky uživatelů elektronických služeb |
GB2475628B (en) * | 2008-07-31 | 2012-08-01 | Hewlett Packard Development Co | Unlocking a locked user device using a computer generated unlock code provided by user |
US8384250B2 (en) * | 2008-08-01 | 2013-02-26 | Verizon Patent And Licensing Inc. | Computer-controlled connector-panel system |
US7865937B1 (en) | 2009-08-05 | 2011-01-04 | Daon Holdings Limited | Methods and systems for authenticating users |
US8443202B2 (en) | 2009-08-05 | 2013-05-14 | Daon Holdings Limited | Methods and systems for authenticating users |
US8826030B2 (en) | 2010-03-22 | 2014-09-02 | Daon Holdings Limited | Methods and systems for authenticating users |
JP5531361B2 (ja) * | 2010-04-20 | 2014-06-25 | 日立建機株式会社 | 建設機械の盗難予防装置および盗難予防システム |
US8527417B2 (en) * | 2010-07-12 | 2013-09-03 | Mastercard International Incorporated | Methods and systems for authenticating an identity of a payer in a financial transaction |
JP5672313B2 (ja) * | 2011-02-04 | 2015-02-18 | 富士通株式会社 | 情報処理装置及び設定情報管理方法 |
CN102182360B (zh) * | 2011-03-28 | 2013-01-23 | 中联重科股份有限公司 | 工程机械的锁车方法与锁车系统以及工程机械 |
CN102592191B (zh) * | 2011-12-27 | 2016-06-01 | 深圳市金鹏源辐照技术有限公司 | 辐照加工管理系统 |
CN103294938B (zh) | 2012-02-29 | 2016-08-24 | 国际商业机器公司 | 访问请求验证方法及系统、授权信息生成方法、硬件设备 |
CN102529888A (zh) * | 2012-03-13 | 2012-07-04 | 鸿富锦精密工业(深圳)有限公司 | 汽车使用权限控制系统及方法 |
CN102637312B (zh) * | 2012-03-29 | 2015-03-11 | 中联重科股份有限公司 | 一种工程机械解锁处理的方法、装置及系统 |
WO2013179517A1 (ja) * | 2012-05-28 | 2013-12-05 | 株式会社小松製作所 | 作業車両及び作業車両の制御方法 |
EP2903248B1 (en) * | 2012-09-28 | 2020-06-24 | Kubota Corporation | Data communication system for work machine |
JP5997564B2 (ja) * | 2012-09-28 | 2016-09-28 | 株式会社クボタ | 農業機械のデータ通信システム |
CN103707845B (zh) * | 2012-09-29 | 2016-12-21 | 上海汽车集团股份有限公司 | 远程行车限制的控制方法 |
JP6073165B2 (ja) | 2013-03-22 | 2017-02-01 | シチズン時計株式会社 | 起動制限装置および工作機械 |
GB2513880B (en) * | 2013-05-08 | 2016-06-01 | Caterpillar Inc | Vehicle anti-theft apparatus and method |
CN104520516B (zh) * | 2013-07-26 | 2016-04-06 | 株式会社小松制作所 | 作业车辆和作业车辆的控制方法 |
CN103437396B (zh) * | 2013-08-14 | 2015-08-26 | 上海华兴数字科技有限公司 | 一种工程机械锁机系统及包括该系统的工程机械 |
JP6413330B2 (ja) * | 2014-05-09 | 2018-10-31 | 株式会社タダノ | 作業車両の盗難防止解除システム、および作業車両の盗難防止装置 |
CN104554144A (zh) * | 2014-12-22 | 2015-04-29 | 潍柴动力股份有限公司 | 一种紧急解锁方法、装置及系统 |
US11281703B1 (en) * | 2015-09-14 | 2022-03-22 | Ivanti, Inc. | System and methods for providing computer-related support |
DE102015122469A1 (de) * | 2015-12-21 | 2017-06-22 | Huf Hülsbeck & Fürst Gmbh & Co. Kg | System und Verfahren zur Übergabe von Fahrzeug-Zugriffsrechten |
CN107444337A (zh) * | 2017-06-12 | 2017-12-08 | 江苏理工学院 | 具有双重认证的汽车防盗系统 |
JP2019148893A (ja) | 2018-02-26 | 2019-09-05 | 京セラ株式会社 | 設定システム、電子機器、設定方法、及び設定プログラム |
DE102018003111A1 (de) | 2018-04-17 | 2019-10-17 | Daimler Ag | Verfahren zum Ver- und/oder Entriegeln eines Fahrzeugs |
JP7080783B2 (ja) * | 2018-09-27 | 2022-06-06 | 日立建機株式会社 | 作業機械 |
CN109656212B (zh) * | 2018-12-20 | 2020-12-01 | 北京长城华冠汽车科技股份有限公司 | 一种用于bcm控制器的信号调理控制方法及装置 |
US11410170B2 (en) * | 2019-09-04 | 2022-08-09 | Mastercard International Incorporated | Systems, methods and computer program products for securing OTPS |
FI128754B (en) * | 2019-10-04 | 2020-11-30 | Telia Co Ab | Access to the service |
EP4074893A1 (de) * | 2021-04-16 | 2022-10-19 | BOMAG GmbH | Verfahren zur wartung oder funktionsumfangserweiterung einer selbstfahrenden maschine sowie funktions- oder wartungsmanagementsystem |
CN113173141B (zh) * | 2021-04-20 | 2023-03-14 | 上海宏英智能科技股份有限公司 | 一种车辆安全密钥运行系统 |
KR20240038922A (ko) * | 2021-08-06 | 2024-03-26 | 두산 밥캣 노스 아메리카, 인크. | 동력기계 기능에 대한 접근 제어 |
US20230272599A1 (en) * | 2022-02-28 | 2023-08-31 | Caterpillar Inc. | Work machine safety zone control |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0948324A (ja) * | 1995-05-26 | 1997-02-18 | Hitachi Constr Mach Co Ltd | 油圧機械の盗難防止装置 |
JP2002264768A (ja) * | 2001-03-13 | 2002-09-18 | Shin Caterpillar Mitsubishi Ltd | 車両の監視方法およびその監視システム |
JP2002302973A (ja) * | 2001-04-05 | 2002-10-18 | Hitachi Constr Mach Co Ltd | 建設機械の盗難防止装置 |
JP2003137066A (ja) * | 2001-10-31 | 2003-05-14 | Sumitomo (Shi) Construction Machinery Manufacturing Co Ltd | 建設機械の盗難防止システム |
JP2004074832A (ja) * | 2002-08-09 | 2004-03-11 | Mitsubishi Automob Eng Co Ltd | 車両管理方法、車両管理システム、中央管理装置、車両制御装置及びコンピュータプログラム |
JP2004114893A (ja) | 2002-09-27 | 2004-04-15 | Hitachi Constr Mach Co Ltd | 盗難防止装置および盗難防止システム |
EP1440855A1 (en) | 2003-01-24 | 2004-07-28 | Komatsu Ltd. | Movable body start-up locking device |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2610850B2 (ja) | 1986-12-19 | 1997-05-14 | ヤマハ発動機株式会社 | 車両の電源入力装置 |
WO1988006110A1 (en) | 1987-02-20 | 1988-08-25 | Failproof Anti-Theft Systems Pty. Ltd. | Anti-theft vehicle system |
US5060263A (en) * | 1988-03-09 | 1991-10-22 | Enigma Logic, Inc. | Computer access control system and method |
US4852680A (en) | 1988-04-07 | 1989-08-01 | J. I. Case Company | Vehicle anti-theft system with remote security module |
US5414418A (en) * | 1993-05-03 | 1995-05-09 | Motorola, Inc. | Method and apparatus for pre-programming and subsequently designating a response characteristic of a selective call receiver |
US5547039A (en) | 1994-11-25 | 1996-08-20 | New Holland North America, Inc. | Security and safety interlocks for a loader |
US5632190A (en) * | 1995-05-26 | 1997-05-27 | Hitachi Construction Machinery Co., Ltd. | Burglarproof device for hydraulic machine |
DE29613136U1 (de) * | 1996-08-02 | 1997-11-27 | Rösler, Klaus-Dieter, Dipl.-Ing., 28844 Weyhe | Schloß- oder Zugangsberechtigungssystem |
US5821631A (en) | 1997-02-07 | 1998-10-13 | Clark Equipment Company | Keyless ignition system with delayed security |
US7394347B2 (en) | 1997-10-27 | 2008-07-01 | World Wide Innovations, Llc | Locking device for electronic equipment |
JP3184153B2 (ja) | 1998-07-17 | 2001-07-09 | 住友建機株式会社 | 土木・建築機械の盗難防止装置 |
JP2000255382A (ja) | 1999-03-10 | 2000-09-19 | Sumitomo Constr Mach Co Ltd | 土木・建設機械の盗難防止装置 |
US7392388B2 (en) * | 2000-09-07 | 2008-06-24 | Swivel Secure Limited | Systems and methods for identity verification for secure transactions |
JP2002264786A (ja) | 2001-03-13 | 2002-09-18 | Ntn Corp | アンチロックブレーキ装置およびその制御方法 |
DE10116445B4 (de) * | 2001-04-02 | 2004-04-22 | Rösler, Klaus-Dieter, Dipl.-Ing. | Freigabeeinrichtung für eine bewegliche oder fahrbare Vorrichtung, insbesondere für eine Baumaschine |
KR100517569B1 (ko) * | 2001-04-05 | 2005-09-28 | 히다치 겡키 가부시키 가이샤 | 건설기계의 보안시스템 |
US20030125836A1 (en) | 2002-11-23 | 2003-07-03 | Munroe Chirnomas | Method and apparatus for controlling a vending machine |
US7177738B2 (en) | 2001-05-30 | 2007-02-13 | Alpine Electronics, Inc. | Vehicle management system |
JP4712237B2 (ja) | 2001-07-26 | 2011-06-29 | 株式会社小松製作所 | 移動体の始動ロック装置 |
EP1425757B1 (en) * | 2001-08-13 | 2018-09-05 | EM Microelectronic-Marin SA | Programming an electronic device including a non-volatile memory, in particular for adjusting the features of an oscillator |
JP2003161199A (ja) | 2001-11-27 | 2003-06-06 | Sumitomo (Shi) Construction Machinery Manufacturing Co Ltd | 土木・建設機械の盗難防止装置 |
US6968998B2 (en) | 2002-12-18 | 2005-11-29 | M&R Printing Equipment, Inc. | System and method for ensuring payment for sold or leased equipment |
JP2004220433A (ja) * | 2003-01-16 | 2004-08-05 | Komatsu Ltd | 移動機械の管理システム |
KR100528328B1 (ko) * | 2003-01-21 | 2005-11-15 | 삼성전자주식회사 | 사용자 인증 방법 및 장치 |
US20050044906A1 (en) * | 2003-07-25 | 2005-03-03 | Spielman Timothy G. | Method and system for setting entry codes via a communications network for access to moveable enclosures |
US20050177744A1 (en) * | 2004-02-06 | 2005-08-11 | Herman Barry S. | Secure key reset |
US7394352B2 (en) | 2005-04-11 | 2008-07-01 | International Truck Intellectual Property Company, Llc | Vehicle control network integrated theft deterrent system |
US7388471B2 (en) | 2005-07-25 | 2008-06-17 | Deere & Company | Anti-theft system and method |
-
2006
- 2006-01-06 EP EP20060702053 patent/EP1837255B1/en not_active Not-in-force
- 2006-01-06 JP JP2006552902A patent/JP4519860B2/ja active Active
- 2006-01-06 DE DE200660008890 patent/DE602006008890D1/de active Active
- 2006-01-06 WO PCT/JP2006/300109 patent/WO2006075562A1/ja active Application Filing
- 2006-01-06 EP EP20090000101 patent/EP2042393B1/en not_active Not-in-force
- 2006-01-06 AU AU2006205466A patent/AU2006205466B9/en not_active Ceased
- 2006-01-06 CN CNB2006800020047A patent/CN100545010C/zh not_active Expired - Fee Related
- 2006-01-06 US US11/793,615 patent/US8098128B2/en active Active
-
2009
- 2009-06-11 AU AU2009202325A patent/AU2009202325B2/en not_active Ceased
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0948324A (ja) * | 1995-05-26 | 1997-02-18 | Hitachi Constr Mach Co Ltd | 油圧機械の盗難防止装置 |
JP2002264768A (ja) * | 2001-03-13 | 2002-09-18 | Shin Caterpillar Mitsubishi Ltd | 車両の監視方法およびその監視システム |
JP2002302973A (ja) * | 2001-04-05 | 2002-10-18 | Hitachi Constr Mach Co Ltd | 建設機械の盗難防止装置 |
JP2003137066A (ja) * | 2001-10-31 | 2003-05-14 | Sumitomo (Shi) Construction Machinery Manufacturing Co Ltd | 建設機械の盗難防止システム |
JP2004074832A (ja) * | 2002-08-09 | 2004-03-11 | Mitsubishi Automob Eng Co Ltd | 車両管理方法、車両管理システム、中央管理装置、車両制御装置及びコンピュータプログラム |
JP2004114893A (ja) | 2002-09-27 | 2004-04-15 | Hitachi Constr Mach Co Ltd | 盗難防止装置および盗難防止システム |
EP1440855A1 (en) | 2003-01-24 | 2004-07-28 | Komatsu Ltd. | Movable body start-up locking device |
Non-Patent Citations (1)
Title |
---|
See also references of EP1837255A4 |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008144435A (ja) * | 2006-12-08 | 2008-06-26 | Shin Caterpillar Mitsubishi Ltd | 作業機械管理システム |
JP2011000905A (ja) * | 2009-06-16 | 2011-01-06 | Hitachi Constr Mach Co Ltd | 建設機械の盗難防止システム |
JP2012023851A (ja) * | 2010-07-14 | 2012-02-02 | Nippon Signal Co Ltd:The | 車両用充電システム |
TWI723263B (zh) * | 2018-05-18 | 2021-04-01 | 黃暐皓 | 機械設備監控系統及其方法 |
JP2021031854A (ja) * | 2019-08-16 | 2021-03-01 | 株式会社クボタ | 作業機 |
JP7254660B2 (ja) | 2019-08-16 | 2023-04-10 | 株式会社クボタ | 作業機 |
JPWO2022049642A1 (ja) * | 2020-09-01 | 2022-03-10 | ||
WO2022049642A1 (ja) * | 2020-09-01 | 2022-03-10 | 日立建機株式会社 | 作業機械の制御システム |
JP7387011B2 (ja) | 2020-09-01 | 2023-11-27 | 日立建機株式会社 | 作業機械の制御システム |
Also Published As
Publication number | Publication date |
---|---|
EP2042393B1 (en) | 2013-05-29 |
EP2042393A2 (en) | 2009-04-01 |
AU2006205466B2 (en) | 2009-08-13 |
JPWO2006075562A1 (ja) | 2008-06-12 |
AU2006205466A1 (en) | 2006-07-20 |
JP4519860B2 (ja) | 2010-08-04 |
EP1837255B1 (en) | 2009-09-02 |
AU2009202325A1 (en) | 2009-07-02 |
CN100545010C (zh) | 2009-09-30 |
AU2006205466B9 (en) | 2009-11-26 |
AU2009202325B2 (en) | 2011-09-29 |
CN101102924A (zh) | 2008-01-09 |
EP2042393A3 (en) | 2009-08-26 |
EP1837255A4 (en) | 2008-11-19 |
EP1837255A1 (en) | 2007-09-26 |
DE602006008890D1 (de) | 2009-10-15 |
US20080150677A1 (en) | 2008-06-26 |
US8098128B2 (en) | 2012-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4519860B2 (ja) | 作業機械のロック制御システム及び作業機械のロック制御方法及び作業機械及び作業機械のロック制御装置及び作業機械のロック制御管理装置 | |
JP4901027B2 (ja) | 建設機械の位置確認方法および位置表示システム並びに建設機械 | |
CN107923149B (zh) | 工程机械 | |
JP4863801B2 (ja) | 作業機械の部品監視装置 | |
JP4900677B2 (ja) | 作業機械の部品監視装置 | |
JP4794617B2 (ja) | 建設機械の盗難防止装置 | |
JP5583871B1 (ja) | 作業機械、作業機械の管理システム及び作業機械の管理方法 | |
EP1837254A1 (en) | Lock controller of working machine and working machine | |
WO2005043433A1 (ja) | 作業機械の管理システム及び作業機械 | |
US11107301B2 (en) | Operation management system and method for disclosing operational information | |
WO2020203170A1 (ja) | スキル情報提示システム及びスキル情報提示方法 | |
JP5425752B2 (ja) | モニタ装置、モニタ装置を搭載した機械、及びモニタ装置のためのデータ保存方法 | |
JP5748627B2 (ja) | 作業機及び作業機のレンタル管理システム | |
JP5941123B2 (ja) | 作業機械の管理方法、管理用コンピュータプログラム及び管理システム | |
JP2021111154A (ja) | 作業機械 | |
EP4099197A1 (en) | User authentication method for construction equipment | |
JP6487353B2 (ja) | 産業車両の認証システム | |
JP5243589B2 (ja) | 作業機械の部品監視装置及び作業機械の部品監視方法 | |
JP3785954B2 (ja) | 建設機械の盗難防止システム | |
JP2011238287A (ja) | 作業機械の部品監視装置及び作業機械の部品監視方法 | |
WO2020203171A1 (ja) | 技能評価システム及び技能評価方法 | |
KR20080050687A (ko) | 시동키를 이용한 건설기계의 도난방지장치 및 그 제어시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11793615 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006702053 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006205466 Country of ref document: AU Ref document number: 2006552902 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680002004.7 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2006205466 Country of ref document: AU Date of ref document: 20060106 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2006205466 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2006702053 Country of ref document: EP |