EP2820624A1 - Procédé d'identification d'une personne - Google Patents
Procédé d'identification d'une personneInfo
- Publication number
- EP2820624A1 EP2820624A1 EP13705747.7A EP13705747A EP2820624A1 EP 2820624 A1 EP2820624 A1 EP 2820624A1 EP 13705747 A EP13705747 A EP 13705747A EP 2820624 A1 EP2820624 A1 EP 2820624A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- identification
- identification control
- identity
- detected
- control point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000004891 communication Methods 0.000 claims description 25
- 238000001514 detection method Methods 0.000 claims description 18
- 238000013507 mapping Methods 0.000 claims description 2
- 230000001815 facial effect Effects 0.000 description 9
- 238000012795 verification Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000012360 testing method Methods 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000005283 ground state Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 1
- 241000270295 Serpentes Species 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000004904 shortening Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/24—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature
- G07C9/247—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature electronically, e.g. by comparing signal of hand-writing with a reference signal from the pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C11/00—Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
- G07C2011/04—Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere related to queuing systems
Definitions
- a control system such as a border control system (Border Control System).
- each identification control point has a document reading device which reads out the identity data, for example a name of the person, on the basis of an identity document.
- the person himself or a border official can supply the identification document to the document reader.
- the multiple detection of the identity data at or by the identification control points is associated with a high level of complexity and with a high level of personnel expenditure and also leads to an increase in throughput times for persons to be identified who have to pass a plurality of identification checkpoints.
- the present invention is based on the finding that the above object can be achieved by a unique detection of identity data in an identification system of the aforementioned type.
- the captured identity data such as a person's name and place of residence, may then be transmitted to a central server entity and one or more of the spatially distributed ones
- identification control points of the identification system such that the identity data are displayed by the respective identification control point, for example, when their ads are needed.
- This can be realized by providing the identity data for the respective identification control point according to a queue criterion.
- the queue criterion can for example, an arrangement of a person in a queue in front of the respective identification control point.
- the reference identifier is an individual identifier and may be, for example, a biometric feature of the person, such as a fingerprint or an image of the eye iris. By capturing a fingerprint of the respective person at one of the distributed identification control points, this can be compared with the reference identification features pre-stored as data records. at
- the invention relates to a method for identifying a person based on an identity document in an identification system having a plurality of spatially distributed identification control points, detecting an identity date based on the identification document of the person by a first identification control point; and providing the acquired identity date for a second one
- the spatially distributed identification control points can communicate with each other via a wireless or a wired communication network.
- the first identification control point can use the detected identity data, which can include, for example, information from a MRZ, about the
- the first identification control point can be, for example, a so-called kiosk or eGate, which can be equipped with a document reader.
- the traveler can place his identity document on a document window of the document reading device, whereby the
- Identity date can be detected optically or electronically.
- the second identification control point may, for example, be a so-called primary, a secondary or a supervisor.
- the second identification control point may also be operated by an operator, such as a border guard.
- the detected identity date is in the step of
- the location of the person is recorded.
- the detection can be done, for example, by a camera-assisted personal monitoring with biometric features or based on the whereabouts of a
- Communication device of the person such as a smartphone, or on the basis of a bar code, by means of which it can be determined to which
- Identification control points should be provided with bar code readers.
- the step of providing comprises displaying the detected identity data by the second identification control point, which in particular comprises displaying the detected identity data in accordance with the queue criterion.
- the display can be effected for example by means of a display device, such as a screen.
- a known graphical display can be used, with which the respective identification control point can be equipped.
- the step of providing comprises selecting the second identification control location from the plurality of spatially distributed ones
- the step of providing comprises associating the detected identity data with the second identification control point.
- the providing step comprises storing the acquired identity data in a memory area allocated to the second identification control point, in particular in a memory area of a database of a central server device.
- the detected identity data is stored in a table of the memory area according to the queue criterion.
- the assignment of the detected identity date to the second identification checkpoint is resolved and the detected identity datum of the third identification checkpoint is provided according to another queue criterion.
- the respective queue criterion is one of the following criteria:
- Identification control authority seniority of providing the acquired identity data for the second
- Identification control point provided via a central server entity.
- the identity date is a date of one
- the identity date can include, for example, a name of a person, their place of birth, their date of birth and / or their place of residence.
- the method comprises creating a
- the method comprises detecting a
- Identification feature of the person by a second identification control point and displaying the detected identity date by the second identification control point in accordance with the detected identification feature with the
- the reference identifier can be automatically generated by means of the first
- Identification control point for example, by the inclusion of a biometric feature created.
- identifiers of persons such as their biometric features, may be used to retrieve or display the acquired identity date.
- the detected identification feature with the
- the reference identifier and the detected identity datum are stored as mutually associated datasets.
- the each other Assigned records can for example be assigned to one another in a table in a database or stored together.
- the database can be provided, for example, by the central server entity.
- the detected reference identifier and / or detected identity data are stored in a database.
- the detected identification feature with the
- Reference Identification feature is compared, and upon coincidence of the detected identification feature and the reference identification feature, the detected identity data of the second identification control point is provided.
- the comparison of the detected identification feature with the reference identification feature can be carried out, for example, feature-wise. If the detected identity date is stored, for example, in a database of a central server entity, the detected identity data can be sent to the second identification control center via a
- the reference identification feature is one of the following features: a biometric feature, in particular a face image, a fingerprint, or an eye iris image, a barcode associated with the person or the identity document, a creatable by the first identification control point
- Document in particular a ticket, a feature of the identity document, in particular a content of a machine-readable zone of the identity document.
- the method comprises detecting a
- the third identification control point can be connected to the first
- Identification control point or communicate with the central server entity as stated above and below.
- the first identification control point comprises a
- Document reader for collecting the identity date on the basis of Identity document, wherein the identity date is detected by the document reader, in particular optically or electrically.
- the invention relates to an identification control system with a plurality of spatially distributed identification control points, which are designed to communicate with each other via a communication network, with a server entity, a first identification control point for detecting a
- Server identity is formed, the detected identity data for a second identification control point in accordance with a
- the first identification control point can be, for example, a so-called kiosk or eGate, which can be equipped with a document reader.
- the traveler can place his identity document on a document window of the document reading device, whereby the
- the second identification control point may, for example, be a so-called primary, a secondary or a supervisor.
- the second identification control point may also be operated by an operator, such as a border guard.
- the first identification control point comprises a
- the identification checkpoints can communicate with each other and / or with a central server entity via a
- the central server entity can, for example, the collected identity data as well as the created or recorded
- the first identification control point comprises a
- Document reader for collecting the identity date on the basis of Identity document, wherein the identity date is detected by the document reader, in particular optically or electrically.
- the identification control system comprises a
- Reference detection means for establishing a reference identification feature of the person, a first identification control point for detecting a date of identity of a person based on an identification document, wherein the
- Identification control point is further configured to assign the reference identifier to the detected identity date, and a second identification control point for detecting an identification feature of the person, the second
- Identification control point is further configured to compare the detected identification feature with the reference identification feature and the detected identity data by the second identification control point in accordance with the detected
- the reference identification feature is one of the following features: a biometric feature, in particular a face image, a fingerprint, or an eye iris image, a barcode associated with the person or the identity document, a creatable by the first identification control point
- Document in particular a ticket, a feature of the identity document, in particular a content of a machine-readable zone of the identity document.
- the reference detection device may be formed, for example, a device for receiving a biometric feature or for communication with a communication device of the respective person.
- the server entity comprises a database, wherein the first identification control point is configured to add the detected identity data to the database
- the reference detection means is adapted to transmit the reference identifier to the server entity, wherein the
- the identification control system is designed or program-technically configured to carry out the method according to the invention for identifying a person.
- the invention comprises a computer program with a program code for implementing a method according to the invention or for controlling the identification control points of the identification control system.
- 1 shows an identification control system with a plurality of spatially distributed
- FIG. 2 shows an example of a display of identity data using a
- 3 is a graphical user interface with a spatial plan of
- Identification control system 4 is a graphical user interface with a spatial plan of
- FIG. 5 is a block diagram showing software components for executing the
- FIG. 6 is a diagram of a method for identifying a person based on a
- FIG. 7 shows a dynamic administration of persons in an identification system with a first identification control point; and a diagram of a method for identifying a person based on an identity document in an identification system.
- Fig. 1 shows an identification control system with a plurality of spatially distributed identification control points 101, 103, 105, 107, 109, 1 1 1 and 1 13. Die
- Identification control stations are set up to communicate via a communication network 15.
- the identification control system comprises a central server entity 1 17, which is also set up, via the communication network 15
- the central server entity 17 includes, for example, a server 123 with a database 125 and an optional GCS SW 127.
- an optional server entity 1 19 is provided, which may include, for example, a blacklist server 129, a database 131, and a blacklist SW device 133.
- a blacklist server 129 for example, a blacklist server 129, a database 131, and a blacklist SW device 133.
- the database 131 for example, a blacklist with
- surveillance cameras 135, 137 may be provided, which may communicate via the communication network 15.
- the identification system can be set up, for example, with
- Communication devices 139, 141 for example via a wireless
- Communication network 1 15 to communicate. This communication can
- Communication devices such as a number of a SIM card, which can serve as reference identification features.
- the identification checkpoints 101, 103 can be set up as first identification checkpoints, which can capture identity data of persons on the basis of identity documents.
- first identification control points 101, 103 can capture identity data of persons on the basis of identity documents.
- Document readers 143, 145 which are set up, the identity data, which are included for example in a MRZ of an identity document, for example, optically to capture and this via the communication network 1 15 to the central server entity 1 17 or to another identification control point 105, 107, 109th , 1 1 1, 1 13 to transfer.
- the first identification checkpoints 101, 103 can be set up, for example, as so-called kiosks or eGates, which can be self-operated by the enable the person to identify. For example, the travelers can independently supply their identity documents to the document readers 143, 145.
- the server entity 1 17 is preferably designed to provide the detected identity data for a second identification control point in accordance with a queue criterion.
- the queue criterion is, for example, one of the following criteria: time of occurrence of the acquired identity date, location of the acquired identity date in an order of acquired identity data, priority of assignment of the acquired identity date to the second identification control point, priority of providing the acquired identity date for the second identification control point, location of the acquired identity date in an order of
- the first identification control points 101, 103 may be optional
- Reference detection means 102, 104 comprise, which are formed
- the first identification control points 101, 103 may further comprise PC entities 147, 149 communicating with the
- the identification control points 105, 107, 109, 1 1 1 and 1 13 can each with
- Display devices 151, 153, 155, 157 and 159 be equipped.
- Display devices 151, 153, 155, 157, and 159 may be provided to display, respectively, an identity data or identity data, for example, in a graphical viewing window.
- the identification checkpoints 105, 107, 109, 1131, and 13 may also be provided with feature detectors 161, 163, 165, 167, which are arranged to receive identification features of persons and to compare them with prestored reference identification features associated with the respective person and previously captured identity data.
- the Identification control stations 105, 107, 109, 1131, and 13 may each be provided with personal computers 169, 171, 173, 175, and 177 communicating over the network 15, for example, with the central server entity 11 to deliver the detected identification features thereto transmit or retrieve the acquired identity data.
- Reference detection means for detecting reference identification features could also be obtained by means of
- Feature detection means 161, 163, 165, 167 are recorded.
- the identification checkpoints 105, 107, 109, 1131 and 13 may be formed for example as so-called primary or secondary checkpoints with an administration functionality or without an administration functionality.
- the display devices 151, 153, 155, 157 and 159 may represent, for example, graphical user interfaces, wherein in a browser window identity data of the persons and / or their
- Identification documents can be displayed.
- one of the identification control stations 105, 107, 109, 1 1 1 and 1 13 is designed as a so-called supervisor control point, this can, for example, all detected
- identification control points If one of the identification control points is provided with an administration functionality, then there can be created, deleted or changed roles, rights or
- the central server entity 1 17 is provided to store the identity data of the persons as well as their documents, such as document numbers. In addition, the central server entity 1 17 can be provided to store the results of a verification of persons and / or documents for authenticity and possibly status information.
- the server entity 1 17 can be provided to compile the data to be displayed at the identification control points, to reprogram them graphically, for example, by entering them in a graphic window, and via the Communication network 1 15 to the server entities of the control points or to transmit to their browsers. This information can be displayed by the browsers.
- central server entity 1 17 may be provided to query internal or external databases, for example, to retrieve identity data associated with particular reference identifier features.
- the central server entity 1 17 may be provided to query internal or external databases, for example, to retrieve identity data associated with particular reference identifier features.
- Server entity 1 17 can also be provided to manage login data as well
- the central server entity 1 17 can also be provided to run any applications of the identification system.
- the components of database 125 may be configured to store all person identification data, monitoring or login data.
- the central server entity 117 can also be provided for logging and storing the decisions made by, for example, a border official.
- the central server entity 1 17 may further be configured to perform document forgery detection.
- the central server entity 1 17 may further be configured to perform document forgery detection.
- Document readers 143, 145 may be provided, for example, to record security features of identity documents optically or electronically and to transmit these to the central server entity 17.
- the central server entity 1 17 can compare the recorded security features with pre-stored patterns and thus perform a verification of the identity documents. All test results associated with the traveler's identity data may be stored in the database 125 and provided to the identification checkpoints. This eliminates the need to constantly check the authenticity of identity documents.
- the central server entity 1 17 can also be designed to guide the persons to the respective identification checkpoints.
- the central server entity can decide based on predetermined rules, for example.
- the predetermined rules can be in the form of a rule engine or an executable, for example Computer program are provided.
- instructions can be made available, for example, to guide certain persons to lead identification control posts.
- Identification system are located.
- a status of a documentary check for authenticity, in particular passed, failed or incomplete can be represented.
- the identification control point set up as a supervisor can be used, for example, with the primaries or
- Secondaries established identification control points are linked to turn on the respective user interface.
- the identification control point set up as a supervisor can link the webcams shown in FIG.
- the document readers can, for example, be set up as document testers. They can be stationary or mobile.
- the identity data, or the identity data if appropriate, together with a content of an identification document, such as an image of a person, can be displayed by means of a graphic user interface (GUI).
- GUI graphic user interface
- one of the identification checkpoints shown in FIG. 1 is set up as a supervisor, it can display a picture of some identification checkpoints and, for example, travelers on a graphical user interface.
- Fig. 2 shows an example of a display of identity data using a graphical user interface, with a map 201 of a person, which can be created for example by capturing a passport photo.
- a window 203 can be arranged, in which identity data, in particular data of the machine-readable zone (MRZ: machine-readable zone) are combined.
- MMRZ machine-readable zone
- These data may include, for example, a first name, a last name, the gender of the respective person and the expiration date of an identification document, a date of birth, the issuing state, the nationality or the Include document number.
- an entry date can be displayed in the identification control system.
- the graphical user interface may further include controls, such as
- Access denial field 205 or an admission permit field 207 By actuating the access rejection field 205, the access rejection is documented and, if necessary,
- the graphical user interface may further include an area 209 in which mappings 209a, 209b, 209c of FIG
- further selectable areas may be provided, such as for displaying a facial image of a person on a chip of a person
- Identification document is stored 210, an area with a document display 21 1, in the white light, infrared (IR) and / or ultraviolet (UV) images of
- an area 213 may be provided by, for example, displaying recorded biometric features such as fingerprints.
- an area 215 can be provided by the on the examination of a
- FIGS. 3 and 4 show a graphical user interface with a spatial plan of rooms in which the identification control system is installed.
- the graphical user interface can, for example, display first identification control points 301, 303, 305, which are provided, for example, for collecting identity data.
- the graphical user interface may further second Identification control points 307, 309 and 31 1 show. These can be set up, for example, as secondaries or as primaries.
- locations may be displayed with surveillance cameras 321, 323.
- the graphical user interface may also display pictograms of persons waiting, for example, in queues in front of the respective locks or in front of the respective identification control points 305, 309.
- the personal pictograms can be highlighted in color, for example.
- person pictograms shown as green 325 may indicate that an examination of the
- Gray-shaded personal pictograms 339 show, for example, that verification of the identity documents has not been completed.
- the corresponding graphical user interfaces of these stations can be retrieved at the identification control points, for example by clicking on a field 305, 307, 309, 31 1. This allows the data displayed at the respective identification control points to be displayed.
- the surveillance camera symbols 321, 323 can be connected, for example, to controlled cameras via a communication network or via a link, so that when the respective camera symbol 321, 323 is selected, a browser window is opened which displays a real-time image of the respective camera.
- the color representation or highlighting of the person from a number of persons, for example, from five persons, are summarily presented.
- the functionality of the identification system can be realized, for example, by means of a software program whose routines are centrally located on a
- FIG. 5 shows a block diagram with software components for executing the
- the software architecture includes the
- the software architecture further comprises a peripheral support 509,
- Database components 51 1 and application server components 513 which run, for example, on the central server entity.
- FIG. 6 shows a flow diagram of a method for identifying a person based on an identity document in an identification system with a plurality of spatially distributed identification control points, with detection 601 of an identity date based on the identification document of the person by a first
- Identification control point and providing 603 the detected identity data for a second identification control point according to a queue criterion.
- a document reader For detecting the identity date, a document reader can be used which, for example, can optically read out the data of the MRZ or electronically store the data stored on a chip of the identity document. According to one embodiment, the persons who are within the
- Fig. 7 illustrates dynamic management of persons in an identification system using a graphical user interface, with an image of a first one
- Identification control point 701 which is set up, for example, as a kiosk, with an image of a second identification control point 703, which is set up, for example, as a primary, with an image of a third identification control point 705, which is set up, for example, as secondary, and with an image of a fourth identification check point 707 which is an eGate, for example. Further, states "access” 709 and "rejection" 71 1 are displayed. In addition, a ground state 713 is provided.
- the persons may for example be continued by the second identification control point 703 to the third identification control point 705, if, for example, a automatic verification of identity data failed. Otherwise the persons are granted access.
- the third identification control point 705 may be the
- Identification control point 707 fails, the affected persons can be forwarded to the third identification control point 705.
- the method includes detecting 801 an identity date using the
- An identification document by a first identification control point optionally creating 803 a reference identifier of the person, assigning 804 the reference identifier to the detected identity date, for example by linking records, detecting 805 an identification feature of the person by a second identification control point and displaying 807 the detected identity date by the second identification control body, if the detected
- Identifier matches the reference identifier.
- An advantage of the concept according to the invention is the shortening of the throughput times for travelers, with the use of fewer personnel and, as a result, cost savings for the operator.
- the throughput times consist of the following steps:
- the travelers are stopped, for example, at a first
- Identification control point which a second identification control point, such as a checkpoint, independently to put the identity document on a document reader, which may be a document tester.
- a document reader which may be a document tester.
- the identity data for the traveler are read in and checked, step 2, while the border guard serves another passenger for whom step 2 is already completed, step 3.
- the traveler assumes the task of document placement itself, which was previously undertaken by the border official.
- the document verification takes place automatically and can not be influenced by the traveler.
- a traveler can always be uniquely connected and identified with his identity data in the identification system based on individual identification features.
- a traveler may be subject to registration of a document, active or passive, e.g. by placing a passport on a document tester in the
- Identification feature can be identified at any time in the identification system. Possible individual identification features are, for example: ⁇ facial image, which can be recorded by a video or camera identification system
- Communication devices such as mobile phones or smartphones, which can communicate via Bluetooth or NFC, for example, and
- Identification control points can be read. The validity of an individual identifier may expire upon the final decision by a border official to allow passage.
- a traveler can place his identity document on a
- Document verification device in the identification system and a facial image of the traveler are recorded.
- the traveler is then found in the identification system by using the individual identifier in the identification system data.
- the traveler can be identified by comparing a real-time image of a video camera with the previously acquired reference identifier and the associated one
- An identification control system may, in one embodiment, be implemented by a
- Linking two or more identification checkpoints e.g. a kiosk system is created, realized. It will be at a first
- Identification control point recorded the identity data and processed at the second, linked to the first identification control point.
- Such a link can be realized between kiosks with self-service and primary or between primary and secondary or e-gates with a slave station.
- a first identification control point as a kiosk and a second identification control point as a primary are linked together.
- the travelers will arrive at Primary in the order in which they have their identity documents on the document reader of the first identification control point.
- the border guards receive the identity document from the traveler.
- the assignment of the traveler to his identity data can be based on the facial image and the order of the in the Queue waiting by the border official or automatically using one of the defined individual identification features.
- Two travelers A and B arrive at a first identification control station, e.g. to a kiosk, and sequentially place their identity documents on the document reader. Since the traveler A is in the queue in front of a second identification control point in front of the traveler B, his identity data is there automatically displayed first. If the traveler A passes the second identification control point, his identity data can be replaced by identity data of the traveler B.
- one or more kiosks and primaries are linked together in a group.
- the travelers are forwarded from a kiosk to suitable Primarys.
- the first standing traveler When forwarding to an end of a queue, at the beginning of which several Primarys are available, the first standing traveler can be forwarded to an appropriate Primary.
- the forwarding information (who, where and when) is automatically entered at the beginning of the queue based on the defined individual
- a border official receives the identity document from the traveler.
- the assignment of the traveler to his identity data is done, for example, based on the facial image and the order of waiting in line by the border officials.
- the order of the waiting travelers results either automatically from a time of their forwarding to a primary or from the use of one of the defined individual identification features.
- the identification system is configured to take English-speaking travelers to a control point with an English-speaking
- the traveler receives a message, in English, to which checkpoint he should go. Its identity data record is assigned to the queue of the corresponding control point. As soon as he arrives in front of the local border official, his identity data is automatically determined by e.g. his facial image displayed.
- the following describes a dynamic wait management of travelers.
- an individual identification feature when reading an identity document for the first time, which serves as a reference identification feature, the same data set can be repeatedly accessed at all other accesses at different identification control points, thereby avoiding the generation of duplicates. That also means that there are no virtual long ones
- snake hopping also called line hoping
- An exemplary embodiment is, for example, the laying on of an identity document by a traveler at a first identification checkpoint, for example at a kiosk, with an automatic forwarding to a second checkpoint
- Identification control point for example to an associated Primary. While waiting in line at the primary, the traveler spontaneously decides to leave to use an eGate. At eGate he is registered and in the same Moment automatically removed from the queue at the primary - his identity data is now linked to the eGate used.
- a traveler can not pass an eGate and, for example, subsequently registers to the reader of a first identification control point, for example a kiosk, it is sorted into the corresponding queue of a primary and is no longer linked to the eGate.
- mobile terminals such as smartphones, may replace or assist, for example, the identification control posts
- the traveler's identity data may be retrieved and assigned to that mobile checkpoint.
- the identity data can be deleted from the original queue of the identification control point A. This can shorten the queue.
- the exemplary embodiments described above by way of example can be used in any control, entry and ticket identification systems, for example for stadiums, exhibition centers or railways.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102012203313A DE102012203313A1 (de) | 2012-03-02 | 2012-03-02 | Verfahren zum Identifizieren einer Person |
PCT/EP2013/052755 WO2013127624A1 (fr) | 2012-03-02 | 2013-02-12 | Procédé d'identification d'une personne |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2820624A1 true EP2820624A1 (fr) | 2015-01-07 |
EP2820624B1 EP2820624B1 (fr) | 2021-06-09 |
Family
ID=47748590
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13705747.7A Active EP2820624B1 (fr) | 2012-03-02 | 2013-02-12 | Procédé d'identification d'une personne |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP2820624B1 (fr) |
CN (1) | CN104169977B (fr) |
DE (1) | DE102012203313A1 (fr) |
WO (1) | WO2013127624A1 (fr) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014010339A1 (de) * | 2014-07-11 | 2016-01-14 | Giesecke & Devrient Gmbh | Verfahren zum Auslesen eines Ausweisdokumentes |
DE102015220244A1 (de) * | 2015-10-16 | 2017-04-20 | Bundesdruckerei Gmbh | Verfahren zur Überprüfung eines Dokumentes, Dokument und Computersystem |
DE102017009430B4 (de) | 2017-10-11 | 2024-04-25 | Mühlbauer Gmbh & Co. Kg | System zur Kontrolle einer Person |
CN108156504B (zh) * | 2017-12-20 | 2020-08-14 | 浙江大华技术股份有限公司 | 一种视频显示方法及装置 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009020145A1 (de) * | 2009-05-05 | 2010-11-11 | Kurt Hops | Vorrichtung und Verfahren zur Differenzierung von Passagierströmen |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5815252A (en) * | 1995-09-05 | 1998-09-29 | Canon Kabushiki Kaisha | Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives |
US6690673B1 (en) * | 1999-05-27 | 2004-02-10 | Jeffeerson J. Jarvis | Method and apparatus for a biometric transponder based activity management system |
SE0002251D0 (sv) * | 2000-06-16 | 2000-06-16 | Matic Sweden Ab Q | Customer queue management method and device therefore |
CN201142097Y (zh) * | 2007-12-13 | 2008-10-29 | 西安理工大学 | 基于生物识别技术的防伪造安全排队装置 |
DE102010016098A1 (de) * | 2010-03-23 | 2011-09-29 | Kaba Gallenschütz GmbH | Zugangskontrollvorrichtung |
-
2012
- 2012-03-02 DE DE102012203313A patent/DE102012203313A1/de active Pending
-
2013
- 2013-02-12 WO PCT/EP2013/052755 patent/WO2013127624A1/fr active Application Filing
- 2013-02-12 EP EP13705747.7A patent/EP2820624B1/fr active Active
- 2013-02-12 CN CN201380012261.9A patent/CN104169977B/zh active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009020145A1 (de) * | 2009-05-05 | 2010-11-11 | Kurt Hops | Vorrichtung und Verfahren zur Differenzierung von Passagierströmen |
Non-Patent Citations (1)
Title |
---|
See also references of WO2013127624A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2013127624A1 (fr) | 2013-09-06 |
CN104169977A (zh) | 2014-11-26 |
CN104169977B (zh) | 2017-08-04 |
DE102012203313A1 (de) | 2013-09-05 |
EP2820624B1 (fr) | 2021-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2820623A1 (fr) | Procédé d'identification d'une personne | |
EP2203900B1 (fr) | Système de contrôle des personnes et procédé en vue d'exécuter un contrôle de personnes | |
DE60209388T2 (de) | System und verfahren zum lesen einer sicherheitsfreigabekarte | |
EP3033708B1 (fr) | Procédé d'évaluation d'un document | |
DE102010016098A1 (de) | Zugangskontrollvorrichtung | |
CN102708606A (zh) | 基于人脸识别的监狱会见区域进出监控系统 | |
EP2820624B1 (fr) | Procédé d'identification d'une personne | |
EP3471068A1 (fr) | Système distribué de génération des données à caractère personnel, procédé et produit programme informatique | |
EP3249615A1 (fr) | Procede de lecture d'autorisation d'acces ou d'id provenant au moins d'un moyen client a l'aide de plusieurs dispositifs de lecture d'un dispositif de controle d'acces et destine a estimer les id ou les autorisations d'acces lus | |
EP3215974A1 (fr) | Procédé pour fournir un code d'accès à un appareil portable, et appareil portable | |
DE202021102756U1 (de) | Elektronisches Veranstaltungsticket mit einem Gesundheitsindikator und Ticketshop zum Erzeugen eines elektronischen Veranstaltungstickets | |
CH712285B1 (de) | Daten-Netzwerk zur Umwandlung personalisierter persönlicher Daten in de-personalisierte persönliche Daten und Übermittlung der de-personalisierten Daten an einen Server. | |
DE102007012966A1 (de) | Verfahren zur Authentifizierung einer Person gegenüber einer Kontrolleinrichtung und gegenüber einem Gerät | |
DE102011054449B4 (de) | Selbstlernende personallose biometrische Zutrittskontrolle | |
DE102022106241A1 (de) | Kontaktlose Identifizierung und Authentifizierung einer Person | |
CN202854918U (zh) | 基于人脸识别的监狱会见区域进出监控装置 | |
DE102017126353A1 (de) | Authentifizierungssystem zur authentifizierung einer person, verfahren zur authentifizierung und computerprogrammprodukt | |
EP3192014A1 (fr) | Système d'identification, procédé et support d'informations d'utilisateur | |
DE102022116347A1 (de) | Hintergrundsystem für ein Personentransportsystem | |
WO2019149490A1 (fr) | Procédé permettant d'assurer à une personne l'accès à des zones protégées dans lesquelles la personne doit entrer | |
DE102022123056A1 (de) | Verfahren zur präzisen Gesichtserkennung und Detektion von Gesichtsbildmanipulationen | |
EP1244040A2 (fr) | Appareil et procédé de gestion automatique de données temporelles relatives à des caractéristiques | |
DE102008004480A1 (de) | System zur Bearbeitung von Werteinheiten | |
DE102014219713A1 (de) | Verfahren und System zum Erfassen des Aufenthalts eines Nutzers in einem begrenzten Bereich | |
DE102010022710A1 (de) | System und Verfahren zur Verifikation einer Person |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20140820 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: PFLAEGING, THILO Inventor name: KUETER, JOACHIM Inventor name: STANKE, RUEDIGER Inventor name: MEINICKE, CARSTEN Inventor name: SCHUSTER, ARMIN Inventor name: MAGGIONI, CHRISTOPH |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20161220 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20210119 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: BUNDESDRUCKEREI GMBH |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1401132 Country of ref document: AT Kind code of ref document: T Effective date: 20210615 Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 502013015762 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: FP |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210909 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210909 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210910 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211011 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502013015762 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
26N | No opposition filed |
Effective date: 20220310 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20220228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220212 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220228 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220212 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220228 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MM01 Ref document number: 1401132 Country of ref document: AT Kind code of ref document: T Effective date: 20220212 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220212 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230526 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20130212 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20240220 Year of fee payment: 12 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240216 Year of fee payment: 12 Ref country code: GB Payment date: 20240222 Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240221 Year of fee payment: 12 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20210609 |