Summary of the invention
The present invention in case its objective is and provide after the login of a kind of personal information fairly simplely, just can not lend and borrow, the person authentication device that has only the he or she to utilize in view of the above-mentioned problems.
Solve the present invention of above-mentioned problem, be the authenticating tag installed on one's body of the user by the equipment in using facility, be arranged in the facility and authenticating tag is set to effective person authentication device, is attached on the more than one equipment in the facility and the protective device that is connected with the person authentication device network is constituted, and when the user will use equipment, just carry out the personal authentication, thereby guarantee the security personnel's of facility individual authentication system, authenticating tag and authenticating method.
At first, the second control device of person authentication device, when the requirement of passing through to authenticating tag, take off status information at the dress of the authenticating tag that receives from this authenticating tag and represent to be mounted in the user on one's body the time, and then will comprise the authenticating tag ID that receives from this authenticating tag and send in the id information memory storage by the id information of the authentication information of authentication information input media input (such as, user's name etc.).The id information memory storage is stored the information of this reception.Thus, user's personal information just is logged.In addition, second control device sends authenticating tag ID effective marker to authenticating tag and is set to effective indication information.The first control device of authenticating tag, when receiving this indication information, the authenticating tag ID effective marker that is stored in the authenticating tag ID effective marker storage part is set to effectively (' 1 ').Thus, as long as the user is installed with authenticating tag, authenticating tag is exactly effective.
Here, authenticating tag ID, be stored in advance in the authenticating tag ID storage part of authenticating tag, authenticating tag intrinsic numbering.And, when taking off pick-up unit, the authenticating tag of authenticating tag dress detects authenticating tag when having broken away from the user, first control device, and the authenticating tag ID effective marker that just is stored in the authenticating tag ID effective marker storage part is set to invalid (' 0 ').Thus, when user and authenticating tag break away from, even authenticating tag ID still is being stored, also can authenticating tag be set to invalid.
Then, be attached to the 3rd control device of the protective device on the equipment, when by claiming, and when being effective, then using control device to send indication information and be set to and use with indication equipment to equipment from the authenticating tag ID effective marker that this authenticating tag receives to authenticating tag.Equipment uses control device (locking and unlocking control device), and when receiving this indication information, then opertaing device makes the user can use equipment.Such as, the door of each room in the facility or cupboard is unblanked.Thus, the user as long as authenticating tag is installed, just can use the equipment in the facility.
In addition, the id information memory storage is the device that is possessed in the apparatus for management of information of person authentication device or setting in addition.And storage is the device that apparatus for management of information possesses from the location information storage device of the positional information (authenticating tag ID, the detection moment, detection place) of the authenticating tag of protective device reception.Thus, can accumulate the positional information of authenticating tag.
As the definition of the term in this instructions, ' installation ' expression ' being worn on the health ', the meaning of ' disengaging ' expression ' taking off ' from health.And, the meaning of ' dress takes off ' expression ' be worn on the health, take off ' from health.
According to the present invention of above explanation, the user as long as the authenticating tag that has carried out the personal information login is installed, just can use the equipment in the facility, and is therefore very convenient.
On the other hand, when authenticating tag left user's health, it is invalid that its authenticating tag just becomes, and therefore can't lend other people and use.Just, other people can't pretend to be and use authenticating tag in person.In other words, according to be installed in the user on one's body, the authenticating tag that carried out the personal information login, can guarantee the person of being to use.
Embodiment
Below, with reference to accompanying drawing, embodiments of the invention are elaborated.
" formation of individual authentication system and summary "
At first, formation and the summary to the individual authentication system of embodiments of the invention describes.Shown in the formation block diagram of Fig. 1, individual authentication system is by authenticating tag 1, person authentication device 2, apparatus for management of information 3, protective device 4 and 5 and constitute.Person authentication device 2, protective device 4 and 5 can carry out radio communication with authenticating tag 1, on the other hand, link together by wireless or wired network 6 and apparatus for management of information 3.Arrangement place to the various inscapes in the facility of regulation describes below.Authenticating tag 1 is installed on one's body the user of facility.Person authentication device 2 is installed in the reception centre in the facility, and apparatus for management of information 3 is arranged near the of person authentication device 2 or locates at other facilities management center etc.Protective device 4 is installed on the interior equipment of facility.Protective device 5 is arranged on the gateway of facility.The user of facility goes into the shop from the gateway of facility usually, after carrying out the login of personal information, just can utilize the equipment in the facility as going into the shop formality in the reception centre.Then, handle in the reception centre to move back and move back the shop by the gateway after the formality of shop.In addition, in Fig. 1, the installation site of each inscape is illustrated in the bracket.
Authenticating tag 1 is owing to be installed on one's body the user of facility, so this facility user just can use the interior equipment of facility.Authenticating tag 1 takes off pick-up unit 15 etc. by radio communication device 11, control device 12, dress and constitutes.Radio communication device 11 carries out radio communication with person authentication device 2, protective device 4 and 5, by realizations such as wireless antenna or transmitter-receivers.And, also can carry out infrared communication, perhaps other radio communication.And, in order to prevent to obtain wrongly or duplicate the information that wireless transceiver communication is arranged of using, the information of transmitting-receiving should be carried out encipherment.In addition, the radio communication device of other device also can similarly be realized.The maincenter function of control device 12 performance authenticating tags 1 is by realizations such as CPU (central processing unit), storeies.In addition, the control device of other device also can be realized equally.Control device 12 as the part of its storer, possesses ID (Identification) storage part 13 and ID effective marker storage part 14.ID storage part 13 is the storeies that are stored on the authenticating tag as the authenticating tag ID (hereinafter to be referred as ' ID ') of intrinsic numbering, such as.Can realize by ROM (ROM (read-only memory)).ID effective marker storage part 14 is storeies of authenticating tag ID effective marker (hereinafter to be referred as ' ID effective marker ') of sign of the validity of storage representation authenticating tag ID, such as being realized by RAM (random access memory).In addition, the ID effective marker represents that then ID is effectively if ' 1 ', if ' 0 ', represent that then the ID sign is invalid.Dress takes off pick-up unit 15, detects authenticating tag 1 and itself is mounted on user's the health, has still broken away from health, and should take off state notifying to control device 12 by detected dress.
Fig. 2 represents to comprise the concrete example that dress takes off the authenticating tag 1 of device 15.Fig. 2 (a) is by the example of chest badge realizations such as the employee demonstrate,proves, and on the part of clip 101, is provided with switch 103, utilize electrode or infrared ray sensor, when the words of the insertion of diaper 102 then are contactless state,, then become contact condition if do not insert whatever.According to the electric current of contactless state, contact condition or the difference of infrared reflection amount, detect the installation and the disengaging of authenticating tag 1.Fig. 2 (b) is the example of being realized by wrist strap, be with 104 to be provided with conductor wire 105, if be installed on the wrist, thereby then on conductor wire 105, just there is electric current to flow through and detects installment state, if throw off from wrist, then, will detect disengaged position because the electric current on the conductor wire 105 is cut off.In this wrist strap type, also can consider to detect the method for the pulse of wrist inside by near infrared ray.Fig. 2 (c) is the example of being realized by ring, and the dress that detects authenticating tag 1 that has or not of the pulse by being detected finger interior by near infrared ray takes off state.In addition, the Biont information of the detection of throwing off as the installation that can be used for such authenticating tag 1 except that pulse, can also be enumerated blood pressure, cardiogram, body temperature etc.
Person authentication device 2, be arranged within the facility, particularly be positioned near the reception centre gateway etc., be to be used for the user to handle into the shop, move back the device of shop formality.As shown in Figure 1, person authentication device 2 is made of radio communication device 21, control device 22, authentication information input media 23 etc.Radio communication device 21 is the devices that carry out radio communication with authenticating tag 1.Control device 22 is devices of the maincenter function of performance person authentication device 2.And, have the function of carrying out the transmission reception of information by network 6 and apparatus for management of information 3.Authentication information input media 23 can carry out confirming in person of user, is the device of the intrinsic authentication information of input user.Particularly, with reference to the driving license, passport that can be confirmed to be the user etc. and use the keyboard input, perhaps authenticate the person of being to use by the Biont information of the fingerprint etc. of login in advance, and corresponding its Biont information of input and the personal information logined in advance.
Apparatus for management of information 3, be arranged on person authentication device 2 near, perhaps being arranged on other facilities management center etc., is the device of total information of accumulation, management individual authentication system, and by realizations such as NAS (network attached storage device, be directly connected in the dedicated file server on the network).Apparatus for management of information 3 is made of id information memory storage 31, location information storage device 32 etc.Id information memory storage 31 is when by person authentication device 2 user's personal information being logined, and storage comprises the device of id information of the ID of the authenticating tag 1 that this user installs and this user's authentication information, is waited by hard disk unit and realizes.In addition, id information memory storage 31 can not be arranged in the person authentication device yet.Location information storage device 32 is that being used to store by the ID of protective device 4 or 5 detected authenticating tags 1, at that time information such as the moment, place is the device of position information, and is waited by hard disk unit and to realize.
Fig. 3 has represented the formation of these information.Shown in Fig. 3 (a), be stored in the id information on the id information memory storage 31, by authenticating tag ID, user's name, cupboard numbering, go into the shop constantly, move back the shop constantly, buy the amount of money and password constitutes.Authenticating tag ID is mounted in the ID of user's authenticating tag 1 on one's body.User's name is the name by the user of authentication information input media 23 input of person authentication device 2.The numbering of user's cupboard is distributed in the expression of cupboard numbering.Go into the shop constantly, the person of being to use enters the moment of facility.Have by person authentication device 2 record, also have by protective device 5 records.Moving back the shop is not to use the person from moment that facility withdraws from constantly.This also is, has by person authentication device 2 records, also has by protective device 5 records.Password is provided with by person authentication device 2 login, in case when the user breaks away from authenticating tag 1, for personal information is logined again, and contrast affirmation by person authentication device 2.Shown in Fig. 3 (b), be stored in the positional information on the location information storage device 32, constitute by authenticating tag ID, the detection moment and detection place.Authenticating tag ID is mounted in the ID of user's authenticating tag 1 on one's body.Detect the moment and detect the place, the moment and the place of expression when detecting authenticating tag ID by protective device 4 or 5.
Protective device 4 is the equipment that is attached in the facility, on the door such as each room or cupboard etc., is used to make the user can use this equipment maybe can't use the device of this equipment.As shown in Figure 1, protective device 4 is made of radio communication device 41, control device 42, locking and unlocking control device 43, door 44 etc.Radio communication device 41 is the devices that carry out radio communication with authenticating tag 1.Control device 42 is devices of the maincenter function of performance protective device 4.And, have the function of carrying out the transmission reception of information by network 6 and apparatus for management of information 3.Locking and unlocking control device 43 is the devices of locking or unblanking according to from the indication information opposite house 44 of control device 42.
Protective device 5 is arranged on the gateway of facility, be used for to be installed with the ID effective marker become ' 1 ' authenticating tag 1 the user go into to move back the device that the shop is detected.Protective device 5 is by radio communication device 51, control device 52, go into to move back shop pick-up unit 53 etc. and constitute.Radio communication device 51 is the devices that carry out radio communication with authenticating tag 1.Control device 52 is devices of the maincenter function of performance protective device 5.And, have the function of carrying out the transmission reception of information by network 6 and apparatus for management of information 3.Go into to move back shop pick-up unit 53, be used to detect the ID effective marker become ' 1 ' authenticating tag 1 pass through with and the device of direction (go into shop/move back shop).Particularly, be provided with that a user goes into to move back the shop and the door that passes through is provided with two sensors with the distance of regulation on this top on the direction that the user passes through.This sensor is to be used for reading the ID that is stored in authenticating tag 1 and the device of ID effective marker, is realized by wireless antenna and CPU.These two sensors, the ID of the authenticating tag 1 that reads in by identification and the order of ID effective marker, direction of passage that can specific user.Such as, during as sensors A (outside of facility) and sensor B (inboard of facility), said sequence is if A, B then are from the direction (go into shop) of A to B with two sensors, said sequence is if B, A then are from the direction (move back shop) of B to A.
" action of individual authentication system "
Then, the action to the individual authentication system of embodiments of the invention describes (suitably with reference to figure and Fig. 3).At first, the action that authenticating tag 1 carries out separately is described.In authenticating tag 1, dress takes off pick-up unit 15 every official hour, monitors whether whether authenticating tag 1 unload from the user on one's body.Then, when detecting authenticating tag when biosome throws off, just this message is sent to control device 12.Control device 12 takes off pick-up unit 15 from dress and receives when being the message of disengaged condition at present, and the ID effective marker that just will be stored in the ID effective marker storage part 14 is arranged to ' 0 '.Thus, when authenticating tag 1 broke away from the user, it was invalid ID can be arranged to, and the use beyond me can be arranged to can not.In addition, ID is the intrinsic numbering on the authenticating tag 1 that is stored in advance in the ID storage part 13.
Then, along the process flow diagram of Fig. 4, the action to by person authentication device 2 login personal information the time describes.Enter the user of facility, arrive first the reception centre, obtain authenticating tag 1 there and be installed on the health of oneself from the receptionist.The receptionist presses the login button (figure does not show) of person authentication device 2 then.Thus, the login action of person authentication device 2 beginning personal information.At first, the control device 22 of person authentication device 2 sends to authenticating tag 1 (step S201) through radio communication device 21 with the message that requires current dress to take off state.In authenticating tag 1, control device 12 receives this message through radio communication device 11, and recognizes that the message of this reception is the requirement that dress takes off state, and takes off the message that pick-up unit 15 transmissions require dress to take off state to dress.Dress takes off pick-up unit 15, receive this message after, the dress of current authenticating tag 1 is taken off status information sends to control device 12.Control device 12 takes off status information with this dress that receives, and sends to (step S202) on the person authentication device 2 through radio communication device 11.
In person authentication device 2, control device 22 receives this dress and takes off status information, takes off status information by this dress that receives and determines whether authenticating tag 1 has been installed in user (step S203) on one's body.If (step S203: be) is installed, then send the message (step S204) that requires the ID content to authenticating tag 1.If the login action that does not have (step S203: deny) is installed then end personal information.In authenticating tag 1, control device 12 receives message, and to be familiar with this message be requirement ID.Then, the ID that is stored in the ID storage part 13 is sent to (step S205) in the person authentication device 2.
And then in person authentication device 2, control device 22 receives this ID.Then, by authentication information input media 23 input users intrinsic information authentication authorization and accounting information (step S206).At this moment, the driving license that the receptionist can the person of consulting and using holds, passport etc. are from the keyboard input, and whether also can be authenticated by the Biont informations such as fingerprint of login in advance is me, and input is to personal information that should Biont information.Then, necessary password (step S207) when personal information is logined again is set.This can be undertaken by the user, also can be undertaken by the receptionist, but in any case, the user must remember the password of this setting.Then, control device 22 signs in to id information in the id information memory storage 31 of apparatus for management of information 3 (step S208) through network 6.As the id information of login here, be that the part of the authentication information of the ID that receives from authenticating tag 1, input is user's name, distribute to user's cupboard numbering, go into the shop constantly and the password that is provided with as current time.In addition, the cupboard numbering is to be selected from the cupboard of current sky by the algorithm of regulation.Such as, although a lot of cupboard all is empty, is regardless of and connects near cupboard.In addition, send a message, the ID effective marker on the authenticating tag 1 is arranged to ' 1 ' (step S209) with indication.In authenticating tag 1, control device 12 receives this message, and the ID effective marker that will be stored in the ID effective marker storage part 14 is arranged to ' 1 ' (step S210).
At the authenticating tag 1 of reception centre keeping, because the above at the appointed time maintenance disengaged position that continues, therefore, the ID effective marker that is stored on the effective marker storage part 14 just becomes ' 0 ' state.If just this authenticating tag 1 is installed on one's body the user, the ID effective marker can not become ' 1 ' automatically.In person authentication device 2, carry out user's personal authentication, that the ID of the authenticating tag 1 that this user is installed and this user's authentication information carry out is corresponding, will carry out should correspondence id information login after, the ID effective marker becomes ' 1 '.Because as long as this authenticating tag 1 is installed, then the ID effective marker will become ' 1 ', so the user just can use the equipment in the facility.
Along the process flow diagram of Fig. 5, make the operable action of equipment in the facility describe to protective device 4.At first, the control device 42 of protective device 4 will require the message of the content of ID and ID effective marker to send to authenticating tag 1 (step S301) through radio communication device 41.This sends the action of message, carries out every official hour.In authenticating tag 1, control device 12 receives this message via radio communication device 11.Then, will send to protective device 4 (step S302) at the ID of ID storage part 13 storages and the ID effective marker of storing at ID effective marker storage part 14.The control device 42 of protective device 4 receives ID and ID effective marker from authenticating tag 1.Then, whether the ID effective marker of checking this reception is ' 1 ' (step S303).If ' 1 ' (step S303: be), whether the ID that checks its reception is in the id information memory storage 31 of apparatus for management of information 3 (step S304).If this ID is (step 304: be) in id information memory storage 31, then for permission to use equipment, such as, control device 42 just sends the message that indication is unblanked to locking and unlocking control device 43.Locking and unlocking control device 43 receives these message, opposite house 44 unblank (step S305).Thus, the user just can open equipment in the facility, use such as the door 44 of room, cupboard etc.(step S303: not) when the ID effective marker is not ' 1 ', when perhaps ID is not in id information memory storage 31 (step S304: not), control device 42 is done nothing and tenth skill, such as, door 44 is not opened, and the user also just can't use room, cupboard etc.
In the action of such protective device 4, if confirm that the ID effective marker of authenticating tag 1 is ' 1 ' (step S303: be), then also can omit the whether affirmation (step S304) in id information memory storage 31 to ID, and be used as ID in the id information memory storage, make the operable action of equipment (step S305).And protective device 4 also goes for the automatic vending machine in the facility.Such as, when the action by protective device 4 makes the user use automatic vending machine, after the selector button of pressing automatic vending machine is obtained commodity, its amount of money data just send to id information memory storage 31 by network 6 from control device 42, and with add the buying of id information (with reference to Fig. 3 (a)) on the amount of money of corresponding authenticating tag 1ID of this amount of money.In addition, use, preferably will be sent to again on the network 6 after this amount of money data cryptogramization in order to prevent to obtain these amount of money data wrongly or to be replicated the back.
Then, along the process flow diagram of Fig. 6, describe carry out the action of personal information when logining again by person authentication device 2.Therefore this action just carries out simple explanation for this part because the action when personal information is logined has common part.The login again of personal information, the person of being to use carries out the reception centre in facility after the personal information login, owing to beyond error when making situation that authenticating tag comes off etc., the password that is provided with when using login, the ID effective marker of authenticating tag 1 is set to ' 1 ' operation.At first, the user with in case the authenticating tag 1 that breaks away from is loaded onto the back to the reception centre, requires to carry out the login again of personal information.To should requiring, the receptionist pushes the (not shown) of login button again of person authentication device 2.Thus, the action of login again of person authentication device 2 beginning personal information.At first, the control device 22 of person authentication device 2 message that will require current dress to take off the content of state sends to authenticating tag 1 (step S401).In authenticating tag 1, control device 12 takes off pick-up unit 15 to dress and requires dress to take off state, and dress takes off pick-up unit 15 and the dress of current authenticating tag 1 is taken off status information sends to control device 12.Control device 12 takes off status information with the dress of this reception and sends to person authentication device 2 (step S402).
In person authentication device 2, control device 22 receives these dresses and takes off status information, and takes off status information by the dress of this reception and confirm whether authenticating tag 1 is installed in user (step S403) on one's body.If (step S403: be) is installed, then send the message (step S404) of the content that requires ID to authenticating tag 1.If (step 403: not), then end the action that personal information is logined again is not installed.In authenticating tag 1, control device 12 receives the message that ID requires, and the ID that will be stored in the ID storage part 13 message that should receive sends to person authentication device 2 (step S405).
And then in person authentication device 2, control device 22 receives this ID.Then, confirm corresponding to the id information of the ID of this reception whether in id information memory storage 31 (step S406), and check the record that whether exists into the shop, just check just in the shop (step S407) whether now.Particularly, in being stored in id information memory storage 31, in the id information (with reference to Fig. 3 (a)) corresponding to the ID of this reception,, be exactly just in the shop if charged to the shop constantly and do not charge to and move back the shop constantly.If do not go into shop (step S407: not), then end the action of login again of personal information.Just if in the shop (step S407: be).The password of user's memory is imported (step S408) by keyboard.In id information, if ID consistent with the password of this input (step 409: be) then sends message to authenticating tag 1, it is ' 1 ' (step S410) that indication makes the ID effective marker in the authenticating tag 1.In authenticating tag 1, control device 12 receives this message, and the ID effective marker that is stored in the ID effective marker storage part 14 is set to ' 1 ' (step S411).If inconsistent (the step S409: not), then tentative once more of ID and password from password input (step S408) beginning.
In the action of such person authentication device 2, as inconsistent (the step S409 :) do not repeated the number of times of regulation when above, also can end the login again of personal information of ID and password.The state of affairs that this takes place when belonging to the password that has been provided with when the user has forgotten the login of personal information etc., but such the time, need the login of the personal information of input authentication information again.
Then, along the process flow diagram of Fig. 7, protective device 5 is moved back the action in shop and describes in management user's the shop of going into.This action owing to the action with protective device 4 has common part, is therefore just done simple explanation to these parts.At first, protective device 5 go into to move back shop pick-up unit 53, detect the passing through of user after, send its direction of passage to control device 52.Control device 52, if the direction of passage of its reception is into shop (step S501: ' going into the shop '), the just action that finishes this moment.If direction of passage is to move back shop (step S501: ' moving back the shop '), just will require the message of the content of ID and ID effective marker to send to authenticating tag 1 (step S502) by radio communication device 51.In authenticating tag 1, control device 12 receives this message through radio communication device 11, and ID and ID effective marker are sent to protective device 5 (step S503).The control device 52 of protective device 5 receives ID and ID effective marker from authenticating tag 1.Whether the ID effective marker of checking this reception then is ' 1 ' (step S504).If ' 1 ' words (step S504: be), whether the ID that reexamines this reception is in the id information memory storage 31 of apparatus for management of information 3 (step S505).If this ID is (step S505: be) in id information memory storage 31, with the record of current moment for id information that should ID moved back shop (step S506) constantly, and transmission message, the ID effective marker on the indication authenticating tag 1 is arranged to ' 0 ' (step S507).In authentication marks 1, control device 12 receives this message, and the ID effective marker that is stored in the ID effective marker storage part 14 is arranged to ' 0 ' (step S508).In addition, (step S504: not), perhaps (step S505: not), then control device 52 is done nothing and tenth skill when ID is not in id information memory storage 31 when the ID effective marker is not ' 1 '.
Enter the user in the shop, because the formality that must go into the shop in the reception centre, therefore, protective device 5 when detecting the discrepancy shop (step S501: go into the shop), also can send to the user and impel it to remove the guiding sound of reception centre.And the user usually when withdrawing from facility, earlier to finish in the reception centre and withdraws from after moving back the shop formality again.But, if do not move back the shop formality when just withdrawing from, because on one's body authenticating tag 1 was installed in, the ID effective marker be ' 1 ', so when this ID is present in the id information memory storage 31, just writes down and move back the shop moment because carelessness is done.At this moment, also can send sound guidance to impel him to go to handle the formal shop formality of moving back to the user to the reception centre.
" being applicable to the embodiment of enterprise "
Then, the individual authentication system that will illustrate is applicable to that the embodiment of enterprise describes.In addition, omitting and the explanation that occurs the part repetition, is that the center describes to be applicable to enterprises'features.
At first, under the situation that is applicable to enterprise,, can think that its personal information logined in advance because the user is the employee.So, as the employee go into the shop formality, not as shown in the process flow diagram of Fig. 4 like that, carry out the input of authentication information and the setting of password, and directly input password.If the password of confirming this input is consistent with password corresponding to the id information of the ID of the authenticating tag of installing 1, just there is no need to login again personal information, directly the ID effective marker of authenticating tag 1 is set to ' 1 '.And, owing to having lunch, go on business etc., the employee goes out, so when moving back the shop strictness handle move back the shop formality the management on pretty troublesome, therefore, such as, can consider: go into after the formality of shop in 24 hours, just the ID effective marker is arranged to ' 1 ' as long as authenticating tag 1 is installed, but surpass after 24 hours, just it is set to ' 0 '.The ID effective marker of this authenticating tag 1 is set to ' 0 ' action, and protective device 4 nearest in the time of thus carries out.
Then, as the purpose that individual authentication system is applicable to enterprise, one is in order to ensure public security, and has exactly will be all sidedly employee's work attendance to be managed again, and such as enumerating employee's present located position is managed.Therefore, in the process flow diagram of Fig. 5, when the control device 42 that is attached to the protective device 4 on the equipment is ' 1 ' (step S303: be) from the ID effective marker that authenticating tag 1 receives, the same ID that receives is present in also that (step S304: be) is arranged to equipment can use (step S305) under the situation in the id information memory storage 31, and keeps the positional information of authenticating tag 1 again.Just, control device 42 shown in Fig. 3 (b), is a position information with the ID of detected authenticating tag 1, the detected moment and place, sends to by network 6 on the location information storage device 32 of apparatus for management of information 3.Then, the positional information of location information storage device 32 these receptions of storage.In addition, detecting the place, be not limited to the identiflication number in room, also can be the such implementor name of automatic vending machine.And, if the protective device 5 that is arranged on the gateway also carries out same action, then can keep into the record that moves back the shop.
Then, as the equipment that often uses in enterprise PC (personal computer) is arranged.By in PC, being assembled into the function of protective device 4, and, the key of authenticating tag 1 as visit PC can be used being connected of this PC and network 6.At this moment, if the employee is not installed with authenticating tag 1, just can not use PC.And, if on the id information of storage on the id information memory storage 31, set in advance security personnel's rank, just can be to the rank of should ensuring public security, the information that restriction can be read.At this moment, as the countermeasure of Tempest, the fact of the information of having read is noted as a daily record.And, when authenticating tag 1 comes off, when the ID effective marker becomes ' 0 ',, can be set to ' 1 ' by the ID effective marker by importing password or carry out finger print identifying etc. from PC.This is equivalent to carry out the login again of personal information.But,, in PC, must be assembled into the function of person authentication device 2 in order to carry out the login again of this personal information.
More than, embodiments of the invention are illustrated, the program of carrying out on each device of Fig. 1 can be recorded on the recording medium that can be read by computing machine, and the program on this recording medium of will being recorded in reads in computer system and carries out, thereby realizes the individual authentication system of embodiments of the invention.Here said computer system comprises hardware such as OS softwares such as (operating systems), peripherals.
And, more than recorded and narrated and be suitable for one embodiment of the present of invention, but the present invention is not limited to the above embodiments, can carry out suitable change in the scope that does not break away from theme of the present invention.Such as, in order to increase public security, when authenticating tag 1 breaks away from or when the employee that authenticating tag 1 is installed has left work position, also can allow this authenticating tag 1 send the sound of warning.