CN1606025A - Individual certification system, certification label and individual certification method - Google Patents

Individual certification system, certification label and individual certification method Download PDF

Info

Publication number
CN1606025A
CN1606025A CN200410012041.9A CN200410012041A CN1606025A CN 1606025 A CN1606025 A CN 1606025A CN 200410012041 A CN200410012041 A CN 200410012041A CN 1606025 A CN1606025 A CN 1606025A
Authority
CN
China
Prior art keywords
mentioned
authenticating tag
information
tag
authenticating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200410012041.9A
Other languages
Chinese (zh)
Other versions
CN1312630C (en
Inventor
栗山裕之
在塚俊之
伴秀行
相模太
大宫昭弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Industry and Control Solutions Co Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Publication of CN1606025A publication Critical patent/CN1606025A/en
Application granted granted Critical
Publication of CN1312630C publication Critical patent/CN1312630C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A personal identification system comprises an identification tag 1, a personal identification apparatus 2, an information management apparatus 3, and security apparatuses 4 and 5. The personal identification apparatus 2, and the security apparatuses 4 and 5 can radio communicate with the identification tag 1, and on the other hand, are connected with the information management apparatus 3 through a radio or cable network 6. When the identification tag 1 is attached to a user of a facility, the personal identification apparatus 2 performs personal information registration, and validates the identification tag 1. If the identification tag 1 is valid, the security apparatus 4 controls the facility so as to allow the user to use the facility. The identification tag 1 invalidates itself when detecting that it is removed from the user. Thereby, users can use equipments in the facility as long as the identification tag 1 is attached.

Description

Individual authentication system, authenticating tag and authenticating method
Technical field
The present invention relates to when the user wants to use equipment in the facility, guarantee individual authentication system, authenticating tag and the authenticating method of the safety of facility by carrying out the personal authentication.
Background technology
In facilities such as hotel, sauna, athletic club,, therefore require corresponding security measures because a lot of client comes in and goes out.Have during using facility the equipment such as cupboard, the room that can limit use or apparatus that valuables etc. is packed into, therefore must visit these facilities and manage the user according to the amount of money of qualification of being held or payment.Particularly, be key from the wrist strap type to the user that distribute, or IC (integrated circuit) card of distribution login a guy information.
And, in company or enterprise etc., also be to need security personnel certainly, for employee's the situation of turning out for work being carried out general management, require these employee's present located positions of management or enter the situation that withdraws from.To this, utilize time card to enter and withdraw from management.And, also have to allow the employee hold the IC-card of having logined personal information in advance, in the current location that detects the employee, entering the method for carrying out the personal authentication when withdrawing from.
On the other hand, obtained the progress that attracts people's attention in that the personal authentication is technical, the figure of having developed contrast people's Biont information carries out personal authentication's device or system.Such as, in patent documentation 1, announced: login the blood vessel configuration figure of people's finger etc. in advance, when holding handle in order to open the door, the technology that this blood vessel configuration figure is contrasted.
[patent documentation 1] spy opens 2003-93368 communique (paragraph 0007~0011,0020, Fig. 6,7)
But the key of above-mentioned facility or IC-card are not known even be lent to borrow yet, have used the problem that only limits the room that some people uses such as, the user that corresponding payment can take place not carry out.And, when can not find or lose key or IC-card, might be used by others.Equally, the IC-card of above-mentioned enterprise etc. also can be borrowed between the employee and be borrowed and do not know, and is at this moment, also just nonsensical to the management of current location.The employee is put into work position with IC-card, and the himself stays in other place, also can be same result.
On the other hand, the personal authentication's technology in the above-mentioned patent documentation 1 though be very effective for the specific individual of authentication, if be applied to above-mentioned facility or enterprise, from the viewpoint consideration of the authentication precision of required expense or requirement, then is appropriate hardly.And, keep the such personal information of Biont information, just not saying if undertake the tissue of special duty, and be not too suitable for above-mentioned facility or enterprise.
Summary of the invention
The present invention in case its objective is and provide after the login of a kind of personal information fairly simplely, just can not lend and borrow, the person authentication device that has only the he or she to utilize in view of the above-mentioned problems.
Solve the present invention of above-mentioned problem, be the authenticating tag installed on one's body of the user by the equipment in using facility, be arranged in the facility and authenticating tag is set to effective person authentication device, is attached on the more than one equipment in the facility and the protective device that is connected with the person authentication device network is constituted, and when the user will use equipment, just carry out the personal authentication, thereby guarantee the security personnel's of facility individual authentication system, authenticating tag and authenticating method.
At first, the second control device of person authentication device, when the requirement of passing through to authenticating tag, take off status information at the dress of the authenticating tag that receives from this authenticating tag and represent to be mounted in the user on one's body the time, and then will comprise the authenticating tag ID that receives from this authenticating tag and send in the id information memory storage by the id information of the authentication information of authentication information input media input (such as, user's name etc.).The id information memory storage is stored the information of this reception.Thus, user's personal information just is logged.In addition, second control device sends authenticating tag ID effective marker to authenticating tag and is set to effective indication information.The first control device of authenticating tag, when receiving this indication information, the authenticating tag ID effective marker that is stored in the authenticating tag ID effective marker storage part is set to effectively (' 1 ').Thus, as long as the user is installed with authenticating tag, authenticating tag is exactly effective.
Here, authenticating tag ID, be stored in advance in the authenticating tag ID storage part of authenticating tag, authenticating tag intrinsic numbering.And, when taking off pick-up unit, the authenticating tag of authenticating tag dress detects authenticating tag when having broken away from the user, first control device, and the authenticating tag ID effective marker that just is stored in the authenticating tag ID effective marker storage part is set to invalid (' 0 ').Thus, when user and authenticating tag break away from, even authenticating tag ID still is being stored, also can authenticating tag be set to invalid.
Then, be attached to the 3rd control device of the protective device on the equipment, when by claiming, and when being effective, then using control device to send indication information and be set to and use with indication equipment to equipment from the authenticating tag ID effective marker that this authenticating tag receives to authenticating tag.Equipment uses control device (locking and unlocking control device), and when receiving this indication information, then opertaing device makes the user can use equipment.Such as, the door of each room in the facility or cupboard is unblanked.Thus, the user as long as authenticating tag is installed, just can use the equipment in the facility.
In addition, the id information memory storage is the device that is possessed in the apparatus for management of information of person authentication device or setting in addition.And storage is the device that apparatus for management of information possesses from the location information storage device of the positional information (authenticating tag ID, the detection moment, detection place) of the authenticating tag of protective device reception.Thus, can accumulate the positional information of authenticating tag.
As the definition of the term in this instructions, ' installation ' expression ' being worn on the health ', the meaning of ' disengaging ' expression ' taking off ' from health.And, the meaning of ' dress takes off ' expression ' be worn on the health, take off ' from health.
According to the present invention of above explanation, the user as long as the authenticating tag that has carried out the personal information login is installed, just can use the equipment in the facility, and is therefore very convenient.
On the other hand, when authenticating tag left user's health, it is invalid that its authenticating tag just becomes, and therefore can't lend other people and use.Just, other people can't pretend to be and use authenticating tag in person.In other words, according to be installed in the user on one's body, the authenticating tag that carried out the personal information login, can guarantee the person of being to use.
Description of drawings
Fig. 1 is the block diagram of formation of the individual authentication system of expression embodiments of the invention.
Fig. 2 is the figure of concrete example of the authenticating tag of expression embodiments of the invention, (a) expression chest badge type, (b) expression wrist strap type, (c) expression ring type.
Fig. 3 is the figure of formation of the total information of expression embodiments of the invention, (a) formation of expression id information, (b) formation of expression positional information.
Fig. 4 is the process flow diagram that the login of the personal information of expression embodiments of the invention is moved.
Fig. 5 is the process flow diagram that makes the action that can utilize equipment of expression embodiments of the invention.
Fig. 6 is the process flow diagram that the login again of the personal information of expression embodiments of the invention is moved.
Fig. 7 is the process flow diagram of going into to move back the shop management activities of expression embodiments of the invention.
Among the figure: the 1-authenticating tag, the 2-person authentication device, the 3-apparatus for management of information, the 4-protective device, the 6-network, 11-radio communication device (first radio communication device), 12-control device (first control device), 13-ID storage part (authenticating tag ID storage part), 14-ID effective marker storage part (authenticating tag ID effective marker storage part), 15-dress take off pick-up unit (the authenticating tag dress takes off pick-up unit), 21-radio communication device (second radio communication device), 22-control device (second control device), 23-authentication information input media, 31-ID information-storing device, the 32-location information storage device, 41-radio communication device (the 3rd radio communication device), 42-control device (the 3rd control device), 43-locking and unlocking control device (equipment utilization control device)
Embodiment
Below, with reference to accompanying drawing, embodiments of the invention are elaborated.
" formation of individual authentication system and summary "
At first, formation and the summary to the individual authentication system of embodiments of the invention describes.Shown in the formation block diagram of Fig. 1, individual authentication system is by authenticating tag 1, person authentication device 2, apparatus for management of information 3, protective device 4 and 5 and constitute.Person authentication device 2, protective device 4 and 5 can carry out radio communication with authenticating tag 1, on the other hand, link together by wireless or wired network 6 and apparatus for management of information 3.Arrangement place to the various inscapes in the facility of regulation describes below.Authenticating tag 1 is installed on one's body the user of facility.Person authentication device 2 is installed in the reception centre in the facility, and apparatus for management of information 3 is arranged near the of person authentication device 2 or locates at other facilities management center etc.Protective device 4 is installed on the interior equipment of facility.Protective device 5 is arranged on the gateway of facility.The user of facility goes into the shop from the gateway of facility usually, after carrying out the login of personal information, just can utilize the equipment in the facility as going into the shop formality in the reception centre.Then, handle in the reception centre to move back and move back the shop by the gateway after the formality of shop.In addition, in Fig. 1, the installation site of each inscape is illustrated in the bracket.
Authenticating tag 1 is owing to be installed on one's body the user of facility, so this facility user just can use the interior equipment of facility.Authenticating tag 1 takes off pick-up unit 15 etc. by radio communication device 11, control device 12, dress and constitutes.Radio communication device 11 carries out radio communication with person authentication device 2, protective device 4 and 5, by realizations such as wireless antenna or transmitter-receivers.And, also can carry out infrared communication, perhaps other radio communication.And, in order to prevent to obtain wrongly or duplicate the information that wireless transceiver communication is arranged of using, the information of transmitting-receiving should be carried out encipherment.In addition, the radio communication device of other device also can similarly be realized.The maincenter function of control device 12 performance authenticating tags 1 is by realizations such as CPU (central processing unit), storeies.In addition, the control device of other device also can be realized equally.Control device 12 as the part of its storer, possesses ID (Identification) storage part 13 and ID effective marker storage part 14.ID storage part 13 is the storeies that are stored on the authenticating tag as the authenticating tag ID (hereinafter to be referred as ' ID ') of intrinsic numbering, such as.Can realize by ROM (ROM (read-only memory)).ID effective marker storage part 14 is storeies of authenticating tag ID effective marker (hereinafter to be referred as ' ID effective marker ') of sign of the validity of storage representation authenticating tag ID, such as being realized by RAM (random access memory).In addition, the ID effective marker represents that then ID is effectively if ' 1 ', if ' 0 ', represent that then the ID sign is invalid.Dress takes off pick-up unit 15, detects authenticating tag 1 and itself is mounted on user's the health, has still broken away from health, and should take off state notifying to control device 12 by detected dress.
Fig. 2 represents to comprise the concrete example that dress takes off the authenticating tag 1 of device 15.Fig. 2 (a) is by the example of chest badge realizations such as the employee demonstrate,proves, and on the part of clip 101, is provided with switch 103, utilize electrode or infrared ray sensor, when the words of the insertion of diaper 102 then are contactless state,, then become contact condition if do not insert whatever.According to the electric current of contactless state, contact condition or the difference of infrared reflection amount, detect the installation and the disengaging of authenticating tag 1.Fig. 2 (b) is the example of being realized by wrist strap, be with 104 to be provided with conductor wire 105, if be installed on the wrist, thereby then on conductor wire 105, just there is electric current to flow through and detects installment state, if throw off from wrist, then, will detect disengaged position because the electric current on the conductor wire 105 is cut off.In this wrist strap type, also can consider to detect the method for the pulse of wrist inside by near infrared ray.Fig. 2 (c) is the example of being realized by ring, and the dress that detects authenticating tag 1 that has or not of the pulse by being detected finger interior by near infrared ray takes off state.In addition, the Biont information of the detection of throwing off as the installation that can be used for such authenticating tag 1 except that pulse, can also be enumerated blood pressure, cardiogram, body temperature etc.
Person authentication device 2, be arranged within the facility, particularly be positioned near the reception centre gateway etc., be to be used for the user to handle into the shop, move back the device of shop formality.As shown in Figure 1, person authentication device 2 is made of radio communication device 21, control device 22, authentication information input media 23 etc.Radio communication device 21 is the devices that carry out radio communication with authenticating tag 1.Control device 22 is devices of the maincenter function of performance person authentication device 2.And, have the function of carrying out the transmission reception of information by network 6 and apparatus for management of information 3.Authentication information input media 23 can carry out confirming in person of user, is the device of the intrinsic authentication information of input user.Particularly, with reference to the driving license, passport that can be confirmed to be the user etc. and use the keyboard input, perhaps authenticate the person of being to use by the Biont information of the fingerprint etc. of login in advance, and corresponding its Biont information of input and the personal information logined in advance.
Apparatus for management of information 3, be arranged on person authentication device 2 near, perhaps being arranged on other facilities management center etc., is the device of total information of accumulation, management individual authentication system, and by realizations such as NAS (network attached storage device, be directly connected in the dedicated file server on the network).Apparatus for management of information 3 is made of id information memory storage 31, location information storage device 32 etc.Id information memory storage 31 is when by person authentication device 2 user's personal information being logined, and storage comprises the device of id information of the ID of the authenticating tag 1 that this user installs and this user's authentication information, is waited by hard disk unit and realizes.In addition, id information memory storage 31 can not be arranged in the person authentication device yet.Location information storage device 32 is that being used to store by the ID of protective device 4 or 5 detected authenticating tags 1, at that time information such as the moment, place is the device of position information, and is waited by hard disk unit and to realize.
Fig. 3 has represented the formation of these information.Shown in Fig. 3 (a), be stored in the id information on the id information memory storage 31, by authenticating tag ID, user's name, cupboard numbering, go into the shop constantly, move back the shop constantly, buy the amount of money and password constitutes.Authenticating tag ID is mounted in the ID of user's authenticating tag 1 on one's body.User's name is the name by the user of authentication information input media 23 input of person authentication device 2.The numbering of user's cupboard is distributed in the expression of cupboard numbering.Go into the shop constantly, the person of being to use enters the moment of facility.Have by person authentication device 2 record, also have by protective device 5 records.Moving back the shop is not to use the person from moment that facility withdraws from constantly.This also is, has by person authentication device 2 records, also has by protective device 5 records.Password is provided with by person authentication device 2 login, in case when the user breaks away from authenticating tag 1, for personal information is logined again, and contrast affirmation by person authentication device 2.Shown in Fig. 3 (b), be stored in the positional information on the location information storage device 32, constitute by authenticating tag ID, the detection moment and detection place.Authenticating tag ID is mounted in the ID of user's authenticating tag 1 on one's body.Detect the moment and detect the place, the moment and the place of expression when detecting authenticating tag ID by protective device 4 or 5.
Protective device 4 is the equipment that is attached in the facility, on the door such as each room or cupboard etc., is used to make the user can use this equipment maybe can't use the device of this equipment.As shown in Figure 1, protective device 4 is made of radio communication device 41, control device 42, locking and unlocking control device 43, door 44 etc.Radio communication device 41 is the devices that carry out radio communication with authenticating tag 1.Control device 42 is devices of the maincenter function of performance protective device 4.And, have the function of carrying out the transmission reception of information by network 6 and apparatus for management of information 3.Locking and unlocking control device 43 is the devices of locking or unblanking according to from the indication information opposite house 44 of control device 42.
Protective device 5 is arranged on the gateway of facility, be used for to be installed with the ID effective marker become ' 1 ' authenticating tag 1 the user go into to move back the device that the shop is detected.Protective device 5 is by radio communication device 51, control device 52, go into to move back shop pick-up unit 53 etc. and constitute.Radio communication device 51 is the devices that carry out radio communication with authenticating tag 1.Control device 52 is devices of the maincenter function of performance protective device 5.And, have the function of carrying out the transmission reception of information by network 6 and apparatus for management of information 3.Go into to move back shop pick-up unit 53, be used to detect the ID effective marker become ' 1 ' authenticating tag 1 pass through with and the device of direction (go into shop/move back shop).Particularly, be provided with that a user goes into to move back the shop and the door that passes through is provided with two sensors with the distance of regulation on this top on the direction that the user passes through.This sensor is to be used for reading the ID that is stored in authenticating tag 1 and the device of ID effective marker, is realized by wireless antenna and CPU.These two sensors, the ID of the authenticating tag 1 that reads in by identification and the order of ID effective marker, direction of passage that can specific user.Such as, during as sensors A (outside of facility) and sensor B (inboard of facility), said sequence is if A, B then are from the direction (go into shop) of A to B with two sensors, said sequence is if B, A then are from the direction (move back shop) of B to A.
" action of individual authentication system "
Then, the action to the individual authentication system of embodiments of the invention describes (suitably with reference to figure and Fig. 3).At first, the action that authenticating tag 1 carries out separately is described.In authenticating tag 1, dress takes off pick-up unit 15 every official hour, monitors whether whether authenticating tag 1 unload from the user on one's body.Then, when detecting authenticating tag when biosome throws off, just this message is sent to control device 12.Control device 12 takes off pick-up unit 15 from dress and receives when being the message of disengaged condition at present, and the ID effective marker that just will be stored in the ID effective marker storage part 14 is arranged to ' 0 '.Thus, when authenticating tag 1 broke away from the user, it was invalid ID can be arranged to, and the use beyond me can be arranged to can not.In addition, ID is the intrinsic numbering on the authenticating tag 1 that is stored in advance in the ID storage part 13.
Then, along the process flow diagram of Fig. 4, the action to by person authentication device 2 login personal information the time describes.Enter the user of facility, arrive first the reception centre, obtain authenticating tag 1 there and be installed on the health of oneself from the receptionist.The receptionist presses the login button (figure does not show) of person authentication device 2 then.Thus, the login action of person authentication device 2 beginning personal information.At first, the control device 22 of person authentication device 2 sends to authenticating tag 1 (step S201) through radio communication device 21 with the message that requires current dress to take off state.In authenticating tag 1, control device 12 receives this message through radio communication device 11, and recognizes that the message of this reception is the requirement that dress takes off state, and takes off the message that pick-up unit 15 transmissions require dress to take off state to dress.Dress takes off pick-up unit 15, receive this message after, the dress of current authenticating tag 1 is taken off status information sends to control device 12.Control device 12 takes off status information with this dress that receives, and sends to (step S202) on the person authentication device 2 through radio communication device 11.
In person authentication device 2, control device 22 receives this dress and takes off status information, takes off status information by this dress that receives and determines whether authenticating tag 1 has been installed in user (step S203) on one's body.If (step S203: be) is installed, then send the message (step S204) that requires the ID content to authenticating tag 1.If the login action that does not have (step S203: deny) is installed then end personal information.In authenticating tag 1, control device 12 receives message, and to be familiar with this message be requirement ID.Then, the ID that is stored in the ID storage part 13 is sent to (step S205) in the person authentication device 2.
And then in person authentication device 2, control device 22 receives this ID.Then, by authentication information input media 23 input users intrinsic information authentication authorization and accounting information (step S206).At this moment, the driving license that the receptionist can the person of consulting and using holds, passport etc. are from the keyboard input, and whether also can be authenticated by the Biont informations such as fingerprint of login in advance is me, and input is to personal information that should Biont information.Then, necessary password (step S207) when personal information is logined again is set.This can be undertaken by the user, also can be undertaken by the receptionist, but in any case, the user must remember the password of this setting.Then, control device 22 signs in to id information in the id information memory storage 31 of apparatus for management of information 3 (step S208) through network 6.As the id information of login here, be that the part of the authentication information of the ID that receives from authenticating tag 1, input is user's name, distribute to user's cupboard numbering, go into the shop constantly and the password that is provided with as current time.In addition, the cupboard numbering is to be selected from the cupboard of current sky by the algorithm of regulation.Such as, although a lot of cupboard all is empty, is regardless of and connects near cupboard.In addition, send a message, the ID effective marker on the authenticating tag 1 is arranged to ' 1 ' (step S209) with indication.In authenticating tag 1, control device 12 receives this message, and the ID effective marker that will be stored in the ID effective marker storage part 14 is arranged to ' 1 ' (step S210).
At the authenticating tag 1 of reception centre keeping, because the above at the appointed time maintenance disengaged position that continues, therefore, the ID effective marker that is stored on the effective marker storage part 14 just becomes ' 0 ' state.If just this authenticating tag 1 is installed on one's body the user, the ID effective marker can not become ' 1 ' automatically.In person authentication device 2, carry out user's personal authentication, that the ID of the authenticating tag 1 that this user is installed and this user's authentication information carry out is corresponding, will carry out should correspondence id information login after, the ID effective marker becomes ' 1 '.Because as long as this authenticating tag 1 is installed, then the ID effective marker will become ' 1 ', so the user just can use the equipment in the facility.
Along the process flow diagram of Fig. 5, make the operable action of equipment in the facility describe to protective device 4.At first, the control device 42 of protective device 4 will require the message of the content of ID and ID effective marker to send to authenticating tag 1 (step S301) through radio communication device 41.This sends the action of message, carries out every official hour.In authenticating tag 1, control device 12 receives this message via radio communication device 11.Then, will send to protective device 4 (step S302) at the ID of ID storage part 13 storages and the ID effective marker of storing at ID effective marker storage part 14.The control device 42 of protective device 4 receives ID and ID effective marker from authenticating tag 1.Then, whether the ID effective marker of checking this reception is ' 1 ' (step S303).If ' 1 ' (step S303: be), whether the ID that checks its reception is in the id information memory storage 31 of apparatus for management of information 3 (step S304).If this ID is (step 304: be) in id information memory storage 31, then for permission to use equipment, such as, control device 42 just sends the message that indication is unblanked to locking and unlocking control device 43.Locking and unlocking control device 43 receives these message, opposite house 44 unblank (step S305).Thus, the user just can open equipment in the facility, use such as the door 44 of room, cupboard etc.(step S303: not) when the ID effective marker is not ' 1 ', when perhaps ID is not in id information memory storage 31 (step S304: not), control device 42 is done nothing and tenth skill, such as, door 44 is not opened, and the user also just can't use room, cupboard etc.
In the action of such protective device 4, if confirm that the ID effective marker of authenticating tag 1 is ' 1 ' (step S303: be), then also can omit the whether affirmation (step S304) in id information memory storage 31 to ID, and be used as ID in the id information memory storage, make the operable action of equipment (step S305).And protective device 4 also goes for the automatic vending machine in the facility.Such as, when the action by protective device 4 makes the user use automatic vending machine, after the selector button of pressing automatic vending machine is obtained commodity, its amount of money data just send to id information memory storage 31 by network 6 from control device 42, and with add the buying of id information (with reference to Fig. 3 (a)) on the amount of money of corresponding authenticating tag 1ID of this amount of money.In addition, use, preferably will be sent to again on the network 6 after this amount of money data cryptogramization in order to prevent to obtain these amount of money data wrongly or to be replicated the back.
Then, along the process flow diagram of Fig. 6, describe carry out the action of personal information when logining again by person authentication device 2.Therefore this action just carries out simple explanation for this part because the action when personal information is logined has common part.The login again of personal information, the person of being to use carries out the reception centre in facility after the personal information login, owing to beyond error when making situation that authenticating tag comes off etc., the password that is provided with when using login, the ID effective marker of authenticating tag 1 is set to ' 1 ' operation.At first, the user with in case the authenticating tag 1 that breaks away from is loaded onto the back to the reception centre, requires to carry out the login again of personal information.To should requiring, the receptionist pushes the (not shown) of login button again of person authentication device 2.Thus, the action of login again of person authentication device 2 beginning personal information.At first, the control device 22 of person authentication device 2 message that will require current dress to take off the content of state sends to authenticating tag 1 (step S401).In authenticating tag 1, control device 12 takes off pick-up unit 15 to dress and requires dress to take off state, and dress takes off pick-up unit 15 and the dress of current authenticating tag 1 is taken off status information sends to control device 12.Control device 12 takes off status information with the dress of this reception and sends to person authentication device 2 (step S402).
In person authentication device 2, control device 22 receives these dresses and takes off status information, and takes off status information by the dress of this reception and confirm whether authenticating tag 1 is installed in user (step S403) on one's body.If (step S403: be) is installed, then send the message (step S404) of the content that requires ID to authenticating tag 1.If (step 403: not), then end the action that personal information is logined again is not installed.In authenticating tag 1, control device 12 receives the message that ID requires, and the ID that will be stored in the ID storage part 13 message that should receive sends to person authentication device 2 (step S405).
And then in person authentication device 2, control device 22 receives this ID.Then, confirm corresponding to the id information of the ID of this reception whether in id information memory storage 31 (step S406), and check the record that whether exists into the shop, just check just in the shop (step S407) whether now.Particularly, in being stored in id information memory storage 31, in the id information (with reference to Fig. 3 (a)) corresponding to the ID of this reception,, be exactly just in the shop if charged to the shop constantly and do not charge to and move back the shop constantly.If do not go into shop (step S407: not), then end the action of login again of personal information.Just if in the shop (step S407: be).The password of user's memory is imported (step S408) by keyboard.In id information, if ID consistent with the password of this input (step 409: be) then sends message to authenticating tag 1, it is ' 1 ' (step S410) that indication makes the ID effective marker in the authenticating tag 1.In authenticating tag 1, control device 12 receives this message, and the ID effective marker that is stored in the ID effective marker storage part 14 is set to ' 1 ' (step S411).If inconsistent (the step S409: not), then tentative once more of ID and password from password input (step S408) beginning.
In the action of such person authentication device 2, as inconsistent (the step S409 :) do not repeated the number of times of regulation when above, also can end the login again of personal information of ID and password.The state of affairs that this takes place when belonging to the password that has been provided with when the user has forgotten the login of personal information etc., but such the time, need the login of the personal information of input authentication information again.
Then, along the process flow diagram of Fig. 7, protective device 5 is moved back the action in shop and describes in management user's the shop of going into.This action owing to the action with protective device 4 has common part, is therefore just done simple explanation to these parts.At first, protective device 5 go into to move back shop pick-up unit 53, detect the passing through of user after, send its direction of passage to control device 52.Control device 52, if the direction of passage of its reception is into shop (step S501: ' going into the shop '), the just action that finishes this moment.If direction of passage is to move back shop (step S501: ' moving back the shop '), just will require the message of the content of ID and ID effective marker to send to authenticating tag 1 (step S502) by radio communication device 51.In authenticating tag 1, control device 12 receives this message through radio communication device 11, and ID and ID effective marker are sent to protective device 5 (step S503).The control device 52 of protective device 5 receives ID and ID effective marker from authenticating tag 1.Whether the ID effective marker of checking this reception then is ' 1 ' (step S504).If ' 1 ' words (step S504: be), whether the ID that reexamines this reception is in the id information memory storage 31 of apparatus for management of information 3 (step S505).If this ID is (step S505: be) in id information memory storage 31, with the record of current moment for id information that should ID moved back shop (step S506) constantly, and transmission message, the ID effective marker on the indication authenticating tag 1 is arranged to ' 0 ' (step S507).In authentication marks 1, control device 12 receives this message, and the ID effective marker that is stored in the ID effective marker storage part 14 is arranged to ' 0 ' (step S508).In addition, (step S504: not), perhaps (step S505: not), then control device 52 is done nothing and tenth skill when ID is not in id information memory storage 31 when the ID effective marker is not ' 1 '.
Enter the user in the shop, because the formality that must go into the shop in the reception centre, therefore, protective device 5 when detecting the discrepancy shop (step S501: go into the shop), also can send to the user and impel it to remove the guiding sound of reception centre.And the user usually when withdrawing from facility, earlier to finish in the reception centre and withdraws from after moving back the shop formality again.But, if do not move back the shop formality when just withdrawing from, because on one's body authenticating tag 1 was installed in, the ID effective marker be ' 1 ', so when this ID is present in the id information memory storage 31, just writes down and move back the shop moment because carelessness is done.At this moment, also can send sound guidance to impel him to go to handle the formal shop formality of moving back to the user to the reception centre.
" being applicable to the embodiment of enterprise "
Then, the individual authentication system that will illustrate is applicable to that the embodiment of enterprise describes.In addition, omitting and the explanation that occurs the part repetition, is that the center describes to be applicable to enterprises'features.
At first, under the situation that is applicable to enterprise,, can think that its personal information logined in advance because the user is the employee.So, as the employee go into the shop formality, not as shown in the process flow diagram of Fig. 4 like that, carry out the input of authentication information and the setting of password, and directly input password.If the password of confirming this input is consistent with password corresponding to the id information of the ID of the authenticating tag of installing 1, just there is no need to login again personal information, directly the ID effective marker of authenticating tag 1 is set to ' 1 '.And, owing to having lunch, go on business etc., the employee goes out, so when moving back the shop strictness handle move back the shop formality the management on pretty troublesome, therefore, such as, can consider: go into after the formality of shop in 24 hours, just the ID effective marker is arranged to ' 1 ' as long as authenticating tag 1 is installed, but surpass after 24 hours, just it is set to ' 0 '.The ID effective marker of this authenticating tag 1 is set to ' 0 ' action, and protective device 4 nearest in the time of thus carries out.
Then, as the purpose that individual authentication system is applicable to enterprise, one is in order to ensure public security, and has exactly will be all sidedly employee's work attendance to be managed again, and such as enumerating employee's present located position is managed.Therefore, in the process flow diagram of Fig. 5, when the control device 42 that is attached to the protective device 4 on the equipment is ' 1 ' (step S303: be) from the ID effective marker that authenticating tag 1 receives, the same ID that receives is present in also that (step S304: be) is arranged to equipment can use (step S305) under the situation in the id information memory storage 31, and keeps the positional information of authenticating tag 1 again.Just, control device 42 shown in Fig. 3 (b), is a position information with the ID of detected authenticating tag 1, the detected moment and place, sends to by network 6 on the location information storage device 32 of apparatus for management of information 3.Then, the positional information of location information storage device 32 these receptions of storage.In addition, detecting the place, be not limited to the identiflication number in room, also can be the such implementor name of automatic vending machine.And, if the protective device 5 that is arranged on the gateway also carries out same action, then can keep into the record that moves back the shop.
Then, as the equipment that often uses in enterprise PC (personal computer) is arranged.By in PC, being assembled into the function of protective device 4, and, the key of authenticating tag 1 as visit PC can be used being connected of this PC and network 6.At this moment, if the employee is not installed with authenticating tag 1, just can not use PC.And, if on the id information of storage on the id information memory storage 31, set in advance security personnel's rank, just can be to the rank of should ensuring public security, the information that restriction can be read.At this moment, as the countermeasure of Tempest, the fact of the information of having read is noted as a daily record.And, when authenticating tag 1 comes off, when the ID effective marker becomes ' 0 ',, can be set to ' 1 ' by the ID effective marker by importing password or carry out finger print identifying etc. from PC.This is equivalent to carry out the login again of personal information.But,, in PC, must be assembled into the function of person authentication device 2 in order to carry out the login again of this personal information.
More than, embodiments of the invention are illustrated, the program of carrying out on each device of Fig. 1 can be recorded on the recording medium that can be read by computing machine, and the program on this recording medium of will being recorded in reads in computer system and carries out, thereby realizes the individual authentication system of embodiments of the invention.Here said computer system comprises hardware such as OS softwares such as (operating systems), peripherals.
And, more than recorded and narrated and be suitable for one embodiment of the present of invention, but the present invention is not limited to the above embodiments, can carry out suitable change in the scope that does not break away from theme of the present invention.Such as, in order to increase public security, when authenticating tag 1 breaks away from or when the employee that authenticating tag 1 is installed has left work position, also can allow this authenticating tag 1 send the sound of warning.

Claims (12)

1. individual authentication system, the authenticating tag of installing on one's body by the user of the equipment in using facility, be arranged on person authentication device in the above-mentioned facility, be attached on the more than one equipment in the above-mentioned facility and the protective device that is connected with above-mentioned person authentication device network is constituted, and, when above-mentioned user will use the said equipment, just carry out the personal authentication, thereby guarantee the safety of above-mentioned facility, it is characterized in that:
Above-mentioned authenticating tag possesses first communicator, authenticating tag dress and takes off pick-up unit and first control device,
Above-mentioned first communicator has the function that communicates with above-mentioned person authentication device and above-mentioned protective device,
Above-mentioned authenticating tag dress takes off pick-up unit, has the function that the dress that detects above-mentioned authenticating tag takes off state,
Above-mentioned first control device, possess: store above-mentioned authenticating tag the authenticating tag ID storage part of intrinsic numbering authentication authorization and accounting label ID, and the authenticating tag ID effective marker storage part of the authenticating tag ID effective marker of the validity of this authenticating tag of storage representation ID, and have: detect above-mentioned authenticating tag when above-mentioned user breaks away from when above-mentioned authenticating tag dress takes off pick-up unit, above-mentioned authenticating tag ID effective marker is arranged to invalid function, when receiving above-mentioned authenticating tag ID effective marker when being set to effective indication information from above-mentioned person authentication device by above-mentioned first communicator, above-mentioned authenticating tag ID effective marker is set to effective function, and by above-mentioned first communicator, be sent in the function of the authenticating tag ID effective marker of storing the above-mentioned authenticating tag ID effective marker storage part corresponding to the requirement that comes from above-mentioned protective device
Above-mentioned person authentication device possesses second communication device and second control device,
Above-mentioned second communication device has the function that communicates with above-mentioned authenticating tag,
Above-mentioned second control device has by sending to above-mentioned authenticating tag that above-mentioned authenticating tag ID effective marker is set to effective indication information and above-mentioned authenticating tag is set to effective function,
Above-mentioned protective device possesses third communication device, equipment use control device and the 3rd control device,
Above-mentioned third communication device has the function that communicates with above-mentioned authenticating tag,
The said equipment uses control device, has control the said equipment so that above-mentioned user can use the said equipment or cannot use the function of the said equipment,
Above-mentioned the 3rd control device, have when the authenticating tag ID effective marker that receives from above-mentioned authenticating tag by above-mentioned third communication device when being effective, use control device to send indication information to the said equipment and be set to operable function with indication the said equipment.
2. individual authentication system, the authenticating tag of installing on one's body by the user of the equipment in using facility, be arranged in the above-mentioned facility and make the effective person authentication device of above-mentioned authenticating tag, be attached on the more than one equipment in the above-mentioned facility and the protective device that is connected with above-mentioned person authentication device network is constituted, and, when above-mentioned user will use the said equipment, just carry out the personal authentication, thereby guarantee the safety of above-mentioned facility, it is characterized in that:
Above-mentioned authenticating tag possesses first radio communication device, authenticating tag dress and takes off pick-up unit and first control device,
Above-mentioned first radio communication device has the function of carrying out radio communication with above-mentioned person authentication device and above-mentioned protective device,
Above-mentioned authenticating tag dress takes off pick-up unit, has the function that the dress that detects above-mentioned authenticating tag takes off state,
Above-mentioned first control device, possess: store above-mentioned authenticating tag the authenticating tag ID storage part of intrinsic numbering authentication authorization and accounting label ID, and the authenticating tag ID effective marker storage part of the authenticating tag ID effective marker of the validity of this authenticating tag of storage representation ID, and has following function: detect above-mentioned authenticating tag when above-mentioned user breaks away from when above-mentioned authenticating tag dress takes off pick-up unit, it is invalid that above-mentioned authenticating tag ID effective marker is arranged to, simultaneously, by above-mentioned first radio communication device, corresponding to the requirement that comes from above-mentioned person authentication device, the authenticating tag ID that will take off status information by the dress that above-mentioned authenticating tag dress takes off the detected authenticating tag of pick-up unit or store in above-mentioned authenticating tag ID storage part sends, and passing through above-mentioned first radio communication device, receive above-mentioned authenticating tag ID effective marker when being set to effective indication information from above-mentioned person authentication device, above-mentioned authenticating tag ID effective marker is set to effectively, and by above-mentioned first radio communication device, be sent in the authenticating tag ID effective marker of storing the above-mentioned authenticating tag ID effective marker storage part corresponding to the requirement that comes from above-mentioned protective device
Above-mentioned person authentication device possesses second radio communication device, authentication information input media, id information memory storage and second control device,
Above-mentioned second radio communication device has the function of carrying out radio communication with above-mentioned authenticating tag,
Above-mentioned authentication information input media, have input as above-mentioned user the function of authentication information of intrinsic information,
Above-mentioned id information memory storage has the function that storage comprises the id information of above-mentioned authenticating tag ID and above-mentioned authentication information,
Above-mentioned second control device; Has following function: take off status information when being expressed as installment state at the dress of the authenticating tag that receives from above-mentioned authenticating tag by above-mentioned second radio communication device; To comprise the authenticating tag ID that receives from above-mentioned authenticating tag and send to above-mentioned id information storage device by the id information of the authentication information of above-mentioned authentication information input unit input; And by sending to above-mentioned authenticating tag that above-mentioned authenticating tag ID effective marker is set to effective indication information and above-mentioned authenticating tag is set to effectively
Above-mentioned protective device possesses the 3rd radio communication device, equipment use control device and the 3rd control device,
Above-mentioned the 3rd radio communication device has the function of carrying out radio communication with above-mentioned authenticating tag,
The said equipment uses control device, has control the said equipment so that above-mentioned user can use the said equipment or cannot use the function of the said equipment,
Above-mentioned the 3rd control device, have when the authenticating tag ID effective marker that receives from above-mentioned authenticating tag by above-mentioned the 3rd radio communication device when being effective, use control device to send indication information to the said equipment and be set to operable function with indication the said equipment.
3. individual authentication system, the authenticating tag of installing on one's body by the user of the equipment in using facility, be arranged in the above-mentioned facility and make the effective person authentication device of above-mentioned authenticating tag, the apparatus for management of information that is attached to protective device on the more than one equipment in the above-mentioned facility, is connected with above-mentioned person authentication device and above-mentioned protective device network and stores the information of having constituted, and, when above-mentioned user will use the said equipment, just carry out the personal authentication, thereby guarantee the safety of above-mentioned facility, it is characterized in that:
Above-mentioned authenticating tag possesses first radio communication device, authenticating tag dress and takes off pick-up unit and first control device,
Above-mentioned first radio communication device has the function of carrying out radio communication with above-mentioned person authentication device and above-mentioned protective device,
Above-mentioned authenticating tag dress takes off pick-up unit, has the function that the dress that detects above-mentioned authenticating tag takes off state,
Above-mentioned first control device, possess: store above-mentioned authenticating tag the authenticating tag ID storage part of intrinsic numbering authentication authorization and accounting label ID, and the authenticating tag ID effective marker storage part of the authenticating tag ID effective marker of the validity of this authenticating tag of storage representation ID, and has following function: detect above-mentioned authenticating tag when above-mentioned user breaks away from when above-mentioned authenticating tag dress takes off pick-up unit, it is invalid that above-mentioned authenticating tag ID effective marker is arranged to, simultaneously, by above-mentioned first radio communication device, corresponding to the requirement that comes from above-mentioned person authentication device, the authenticating tag ID that will take off status information by the dress that above-mentioned authenticating tag dress takes off the detected authenticating tag of pick-up unit or store in above-mentioned authenticating tag ID storage part sends, and passing through above-mentioned first radio communication device, receive above-mentioned authenticating tag ID effective marker when being set to effective indication information from above-mentioned person authentication device, above-mentioned authenticating tag ID effective marker is set to effectively, and by above-mentioned first radio communication device, be sent in the authenticating tag ID effective marker of storing the above-mentioned authenticating tag ID effective marker storage part corresponding to the requirement that comes from above-mentioned protective device
Above-mentioned person authentication device possesses second radio communication device, authentication information input media and second control device,
Above-mentioned second radio communication device has the function of carrying out radio communication with above-mentioned authenticating tag,
Above-mentioned authentication information input media, have input as above-mentioned user the function of authentication information of intrinsic information,
Above-mentioned second control device; Has following function: take off status information when being expressed as installment state at the dress of the authenticating tag that receives from above-mentioned authenticating tag by above-mentioned second radio communication device; To comprise the authenticating tag ID that receives from above-mentioned authenticating tag and send to above-mentioned apparatus for management of information by the id information of the authentication information of above-mentioned authentication information input unit input; And by sending to above-mentioned authenticating tag that above-mentioned authenticating tag ID effective marker is set to effective indication information and above-mentioned authenticating tag is set to effectively
Above-mentioned protective device possesses the 3rd radio communication device, equipment use control device and the 3rd control device,
Above-mentioned the 3rd radio communication device has the function of carrying out radio communication with above-mentioned authenticating tag,
The said equipment uses control device, has control the said equipment so that above-mentioned user can use the said equipment or cannot use the function of the said equipment,
Above-mentioned the 3rd control device, have when the authenticating tag ID effective marker that receives from above-mentioned authenticating tag by above-mentioned the 3rd radio communication device when being effective, use control device to send indication information to the said equipment and be set to operable function with indication the said equipment
Above-mentioned apparatus for management of information possesses the id information memory storage,
Above-mentioned id information memory storage has from above-mentioned second control device and receives above-mentioned id information, and the function that the id information that receives is stored.
4. individual authentication system as claimed in claim 3 is characterized in that:
Above-mentioned the 3rd control device, have when the authenticating tag ID effective marker that receives from above-mentioned authenticating tag by above-mentioned the 3rd radio communication device when being effective, send the function that comprises above-mentioned authenticating tag ID, detects the positional information in the moment of this authenticating tag ID and place to above-mentioned apparatus for management of information
Above-mentioned apparatus for management of information possesses location information storage device,
Above-mentioned location information storage device has from above-mentioned the 3rd control device and receives above-mentioned positional information, and the positional information that will the receive function of storing.
5. as each described individual authentication system in the claim 2~4, it is characterized in that:
Above-mentioned first control device has by above-mentioned first radio communication device, sends the function that is stored in the authenticating tag ID the above-mentioned authenticating tag ID storage part corresponding to the requirement that comes from above-mentioned protective device,
Above-mentioned the 3rd control device, have when passing through the 3rd radio communication device, the authenticating tag ID effective marker that receives from above-mentioned authenticating tag is effectively, and when the authenticating tag ID that above-mentioned authenticating tag receives is stored in the above-mentioned id information memory storage, uses control device to send indication information to the said equipment and be set to operable function with indication the said equipment.
6. as each described individual authentication system in the claim 2~5, it is characterized in that:
Above-mentioned authenticating tag dress takes off pick-up unit, is to utilize dress by authenticating tag to take off and make the two ends of conductor wire become contact condition or contactless state, thus the device that the electric current generation difference that flows through conductor wire is detected.
7. as each described individual authentication system in the claim 2~5, it is characterized in that:
Above-mentioned authenticating tag dress takes off pick-up unit, is to utilize dress by authenticating tag to take off and the device that detects to the pulse that has or not human body by infrared detection.
8. as each described individual authentication system in the claim 2~5, it is characterized in that:
Above-mentioned authentication information input media is to be confirmed to be the device that the content put down in writing on user's the certificate of identity is imported as authentication information.
9. as each described individual authentication system in the claim 2~5, it is characterized in that:
Above-mentioned authentication information input media, be to login the Biont information of the user in above-mentioned individual authentication system in advance and this user's self Biont information contrasts, when both are consistent, the device of will the personal information corresponding importing as authentication information with the user's of this login Biont information.
10. authenticating tag is installed on one's body the user who uses the equipment in the facility, and is used for the personal authentication that carries out when this user will use equipment, it is characterized in that:
Above-mentioned authenticating tag possesses radio communication device, authenticating tag dress and takes off pick-up unit and control device,
Above-mentioned radio communication device has the function of carrying out radio communication with other device,
Above-mentioned authenticating tag dress takes off pick-up unit, has the function that the dress that detects above-mentioned authenticating tag takes off state,
Above-mentioned control device, possess: store above-mentioned authenticating tag the authenticating tag ID storage part of intrinsic numbering authentication authorization and accounting label ID, and the authenticating tag ID effective marker storage part of the authenticating tag ID effective marker of the validity of this authenticating tag of storage representation ID, and has following function: detect above-mentioned authenticating tag when above-mentioned user breaks away from when above-mentioned authenticating tag dress takes off pick-up unit, it is invalid that above-mentioned authenticating tag ID effective marker is arranged to, simultaneously, by above-mentioned radio communication device, corresponding to the requirement that comes from other device, to take off status information at the dress that takes off the detected authenticating tag of pick-up unit by above-mentioned authenticating tag dress, the authenticating tag ID effective marker that is stored in the authenticating tag ID of above-mentioned authenticating tag ID storage part or is stored in above-mentioned authenticating tag ID effective marker storage part sends, and by above-mentioned radio communication device, receive above-mentioned authenticating tag ID effective marker when being set to effective indication information from other device, above-mentioned authenticating tag ID effective marker is set to effectively.
11. an authenticating method is the authenticating method that authenticates according to the authenticating tag ID effective marker that accessory rights requirement 10 described authenticating tags send, and it is characterized in that, comprises:
The authenticating tag ID effective marker that judgement sends from above-mentioned authenticating tag is effectively or invalid step;
If above-mentioned authenticating tag ID effective marker is invalid, then make the step of authentification failure;
If above-mentioned authenticating tag ID effective marker is effectively, then make the step of authentication success.
12. an authenticating method is the authenticating method that authenticates according to the authenticating tag ID effective marker that accessory rights requirement 10 described authenticating tags send, and it is characterized in that, comprises:
The authenticating tag ID effective marker that judgement sends from above-mentioned authenticating tag is effectively or invalid step;
If above-mentioned authenticating tag ID effective marker is invalid, then make the step of authentification failure;
If above-mentioned authenticating tag ID effective marker is effectively, judge that then the authenticating tag ID that sends from above-mentioned authenticating tag is consistent or inconsistent step with the authenticating tag ID that logins in advance;
If above-mentioned authenticating tag ID unanimity then makes the step of authentication success;
If above-mentioned authenticating tag ID is inconsistent, then make the step of authentification failure.
CNB2004100120419A 2003-10-09 2004-09-28 Individual certification system, certification label and individual certification method Expired - Lifetime CN1312630C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP351301/2003 2003-10-09
JP2003351301A JP4150320B2 (en) 2003-10-09 2003-10-09 Personal authentication system and personal authentication method
JP2003351301 2003-10-09

Publications (2)

Publication Number Publication Date
CN1606025A true CN1606025A (en) 2005-04-13
CN1312630C CN1312630C (en) 2007-04-25

Family

ID=34542601

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100120419A Expired - Lifetime CN1312630C (en) 2003-10-09 2004-09-28 Individual certification system, certification label and individual certification method

Country Status (3)

Country Link
JP (1) JP4150320B2 (en)
CN (1) CN1312630C (en)
SG (1) SG111219A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162530B (en) * 2006-10-12 2012-10-17 霍尼韦尔国际公司 Method and system for controlling a security system using near field communication
CN103530589A (en) * 2012-07-03 2014-01-22 达尔特科技有限公司 Apparatus for retrieving data from multiple media and method of the same
CN104077621A (en) * 2013-03-26 2014-10-01 邵文玉 Identification registration system and method, identification label and generation method thereof

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5596342B2 (en) * 2006-04-18 2014-09-24 シーエフピーエイチ, エル.エル.シー. System and method for providing access to a wireless gaming device
JP4699939B2 (en) * 2006-05-11 2011-06-15 日立電子サービス株式会社 Access control method
JP4699940B2 (en) * 2006-05-11 2011-06-15 日立電子サービス株式会社 Access control method
JP5027492B2 (en) * 2006-12-08 2012-09-19 株式会社日立製作所 Biometric / IC tag connection authentication method and biometric / IC tag connection authentication system
JP2008198018A (en) * 2007-02-14 2008-08-28 Nippon Telegr & Teleph Corp <Ntt> Wrist band type authentication operation assistance system
JP5018159B2 (en) * 2007-03-20 2012-09-05 大日本印刷株式会社 Usage authorization information update system
CN106204777A (en) * 2016-06-23 2016-12-07 浪潮集团有限公司 A kind of wireless bracelet Work attendance method based on human body infrared detection
JP6677617B2 (en) * 2016-09-30 2020-04-08 富士通フロンテック株式会社 Authentication system and authentication method
JP7070617B2 (en) * 2020-08-18 2022-05-18 コニカミノルタ株式会社 Information equipment management system, personal identification device and program

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4885571A (en) * 1986-04-15 1989-12-05 B. I. Incorperated Tag for use with personnel monitoring system
JPH10301984A (en) * 1997-04-22 1998-11-13 Yazaki Corp Facility user management system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162530B (en) * 2006-10-12 2012-10-17 霍尼韦尔国际公司 Method and system for controlling a security system using near field communication
CN103530589A (en) * 2012-07-03 2014-01-22 达尔特科技有限公司 Apparatus for retrieving data from multiple media and method of the same
CN104077621A (en) * 2013-03-26 2014-10-01 邵文玉 Identification registration system and method, identification label and generation method thereof

Also Published As

Publication number Publication date
CN1312630C (en) 2007-04-25
SG111219A1 (en) 2005-05-30
JP4150320B2 (en) 2008-09-17
JP2005115786A (en) 2005-04-28

Similar Documents

Publication Publication Date Title
US10313336B2 (en) Proximity-based system for object tracking
US6219439B1 (en) Biometric authentication system
JP4996175B2 (en) Entrance management system and entrance management method
US7907753B2 (en) Access control system with symbol recognition
JP5064663B2 (en) Document management system
US20130076482A1 (en) Secure access system employing biometric identification
TWI414669B (en) Out of the room management system and out of the room management methods
CN106104548B (en) Integrated access control and identity management system
WO2006014863A1 (en) Identification with rfid asset locator for entry authorization
JPH11280317A (en) Access control system and access control method
JP5736689B2 (en) Security management system and security management method
CN1312630C (en) Individual certification system, certification label and individual certification method
CN101208491A (en) Use management system
WO2011033839A1 (en) Asset management system
JP3527693B2 (en) Article storage and article management system
CN109064580B (en) Sign-in and electronic equipment access integrated system
US20070006298A1 (en) Controlling access to a workstation system via wireless communication
SE526732C2 (en) Security arrangement for ensuring access to device such as portable computer, has key unit with input and communication units to identify user before key unit accepts locking-unlocking
JP2011002918A (en) Security management system
CN101124769A (en) Biometric personal data key (PDK) authentication
JP2002297256A (en) Personal identification system
CN109903432A (en) A kind of effective building management method and system for promoting safety
JP7230583B2 (en) storage management system
JP4701082B2 (en) Security-enhanced automatic locking device
JPH07313712A (en) Pachinko machine, slot machine and game machine managing system using fingerprint identifier

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: HITACHI?INDUSTRIAL?CONTROL INFORMATION SYSTEM CO.,

Free format text: FORMER OWNER: HITACHI,LTD.

Effective date: 20150105

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150105

Address after: Ibaraki

Patentee after: Hitachi industrial control information system

Address before: Tokyo, Japan

Patentee before: Hitachi, Ltd.

C56 Change in the name or address of the patentee

Owner name: HITACHI INDUSTRIAL CONTROL SOLUTIONS LTD.

Free format text: FORMER NAME: HITACHI?INDUSTRIAL?CONTROL INFORMATION SYSTEM CO., LTD.

CP01 Change in the name or title of a patent holder

Address after: Ibaraki

Patentee after: HITACHI INDUSTRY & CONTROL SOLUTIONS, LTD.

Address before: Ibaraki

Patentee before: Hitachi industrial control information system

CP03 Change of name, title or address

Address after: Japan

Patentee after: HITACHI INDUSTRY & CONTROL SOLUTIONS, LTD.

Country or region after: Japan

Address before: Ibaraki

Patentee before: HITACHI INDUSTRY & CONTROL SOLUTIONS, LTD.

Country or region before: Japan

CP03 Change of name, title or address
CX01 Expiry of patent term

Granted publication date: 20070425

CX01 Expiry of patent term