JP2006318429A - Access management mail security system - Google Patents
Access management mail security system Download PDFInfo
- Publication number
- JP2006318429A JP2006318429A JP2005167443A JP2005167443A JP2006318429A JP 2006318429 A JP2006318429 A JP 2006318429A JP 2005167443 A JP2005167443 A JP 2005167443A JP 2005167443 A JP2005167443 A JP 2005167443A JP 2006318429 A JP2006318429 A JP 2006318429A
- Authority
- JP
- Japan
- Prior art keywords
- user
- authentication
- security system
- storage medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Lock And Its Accessories (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
本発明は、利用者認証装置及び情報端末から構成される入退室管理セキュリティシステムに関する。The present invention relates to an entrance / exit management security system including a user authentication device and an information terminal.
従来のICカード等を利用した本人認証のための機器が低コストな入退室管理システムは運用が簡単だが、カード偽造等によるなりすましを把握する手段がなかった。
また、生体認証方式ではなりすましは困難だが導入コストが高くなる場合があり、運用面でも登録に手間がかかる、本人なのに認証でエラーになる、方式により抵抗感を感じる人がいる等の問題がある。A conventional entrance / exit management system using a low-cost device for personal authentication using an IC card or the like is easy to operate, but there is no means for grasping impersonation due to card forgery or the like.
In addition, impersonation is difficult with the biometric authentication method, but the introduction cost may be high, and there are problems such as troublesome registration in terms of operation, authentication error even though it is the person, and people who feel resistance due to the method. .
従来は導入コストが安く、運用が簡単で、利用者本人が不在時に不正入室を知ることが出来る入退室管理システムが存在しなかった。In the past, there was no entry / exit management system that was inexpensive to install, easy to operate, and that allowed unauthorized users to know when they were absent.
本発明は、このような点に鑑みて考案されたものであり、その目的は、導入コストが安く、ランニングクストが安く、運用が簡単で、不正入室を把握することである。The present invention has been devised in view of such a point, and its purpose is to grasp the unauthorized entry with low introduction cost, low running cost, simple operation.
メールを送信する情報端末に携帯電話を用いた場合には設置及び移設が簡単で、臨時的に入退室管理が必要な場所にも簡単に設置が可能となる。When a mobile phone is used as an information terminal for sending e-mail, installation and relocation are easy, and it is possible to easily install in a place where temporary entry / exit management is necessary.
利用者認証読取装置に接続された情報端末は利用者認証読取装置から読み込んだ利用者IDに対応するメールアドレスを取得します。The information terminal connected to the user authentication reader acquires the mail address corresponding to the user ID read from the user authentication reader.
情報端末は利用者IDに対応するメールアドレスにメールを送信します。The information terminal sends an email to the email address corresponding to the user ID.
不正入室者があれば本来の入室者にメールが届き、携帯電話にメールで送信するように設定していれば不正入室を迅速把握できます。If there is an unauthorized person entering the e-mail, the e-mail will be sent to the original person, and if it is set to send to the mobile phone by e-mail, the unauthorized person can be quickly grasped.
入室履歴をメールの送受信記録から蓄積し把握可能とします。It is possible to accumulate and grasp the entry history from the mail transmission / reception records.
導入コストが安く、ランニングクストが安く、運用が簡単で不正入室を把握できるシステムが構築できます。The introduction cost is low, the running cost is low, the operation is simple, and the system that can grasp unauthorized entry can be constructed.
使用者本人不在時に不正入室が迅速に把握できます。Unauthorized entry can be quickly grasped when the user is absent.
入室履歴がメールから作成可能です。The entry history can be created from email.
以下、本発明の実施方法を図面に基づき詳細に説明する。Hereinafter, the implementation method of this invention is demonstrated in detail based on drawing.
図1の構成で100の利用者ID記憶媒体にICタグ、200の利用者ID記憶媒体読取装置にICタグリーダ、300の情報端末にパソコンを使用し、400のインターネット、500のメールサーバを経由して600の情報端末を携帯電話の構成とします。In the configuration shown in FIG. 1, an IC tag is used as 100 user ID storage media, an IC tag reader is used as 200 user ID storage media reader, a personal computer is used as 300 information terminals, and is connected via 400 Internet and 500 mail servers. 600 information terminals are configured as mobile phones.
入室しようとする利用者はICタグが内蔵されたカードをICタグリーダで読取させます。The user who wants to enter the room uses an IC tag reader to read the card containing the IC tag.
ICタグリーダが接続されているパソコンはICタグの利用者IDを読取り、入室OKかどうかチェックをします。The personal computer connected to the IC tag reader reads the user ID of the IC tag and checks whether it is OK to enter the room.
入室OKの場合はあらかじめ利用者IDに対応して登録されているメールアドレスにメールを送信します。入室NGの場合は入退室管理者(守衛、警備員等)の携帯電話へメールを送信します。When entering the room is OK, an email will be sent to the email address registered in advance corresponding to the user ID. In the case of entering NG, an e-mail is sent to the mobile phone of the entrance / exit manager (guard, security guard, etc.).
入室OK、入室NGのどちらの場合でも入退室ログ作成用メールアドレスにメールを送信します。An e-mail is sent to the e-mail address for entry / exit log creation in either case of entering or leaving NG
ICタグ方式であれば導入コストが安く、運用が簡単で、利用者本人が不在時に不正入室を知ることが出来る入退室管理システムを構築できます。With the IC tag method, the introduction cost is low, the operation is simple, and an entrance / exit management system can be constructed that allows unauthorized users to know when they are not present.
個人情報漏洩が社会的問題となっているおり企業の入退室管理システムのセキョリティ強化に利用の可能性がある。Leakage of personal information has become a social problem, and it can be used to strengthen the security of corporate entrance / exit management systems.
Claims (12)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005167443A JP2006318429A (en) | 2005-05-10 | 2005-05-10 | Access management mail security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005167443A JP2006318429A (en) | 2005-05-10 | 2005-05-10 | Access management mail security system |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2006318429A true JP2006318429A (en) | 2006-11-24 |
Family
ID=37539018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2005167443A Pending JP2006318429A (en) | 2005-05-10 | 2005-05-10 | Access management mail security system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JP2006318429A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010021567A1 (en) * | 2008-08-15 | 2010-02-25 | Zhukov Vladimir Gennadyevich | System for readdressing calls simultaneously with movement of the persons on an enterprise territory or in production or office spaces |
JP2011128770A (en) * | 2009-12-16 | 2011-06-30 | Nec Corp | Ic card authentication system and ic card authentication method |
CN102194267A (en) * | 2010-03-18 | 2011-09-21 | 天津市委培劳务服务有限公司 | Safe and reliable intelligent door access control method and device thereof for non-motor vehicle |
JP6257823B1 (en) * | 2017-04-28 | 2018-01-10 | 株式会社 全日警 | Information security system and information security method |
CN108986262A (en) * | 2018-06-14 | 2018-12-11 | 西安艾润物联网技术服务有限责任公司 | access control method, system and storage medium |
JP2021082159A (en) * | 2019-11-22 | 2021-05-27 | 東日本旅客鉄道株式会社 | Store support program and server device |
-
2005
- 2005-05-10 JP JP2005167443A patent/JP2006318429A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010021567A1 (en) * | 2008-08-15 | 2010-02-25 | Zhukov Vladimir Gennadyevich | System for readdressing calls simultaneously with movement of the persons on an enterprise territory or in production or office spaces |
JP2011128770A (en) * | 2009-12-16 | 2011-06-30 | Nec Corp | Ic card authentication system and ic card authentication method |
CN102194267A (en) * | 2010-03-18 | 2011-09-21 | 天津市委培劳务服务有限公司 | Safe and reliable intelligent door access control method and device thereof for non-motor vehicle |
CN102194267B (en) * | 2010-03-18 | 2014-04-02 | 天津市委培劳务服务有限公司 | Safe and reliable intelligent door access control method and device thereof for non-motor vehicle |
JP6257823B1 (en) * | 2017-04-28 | 2018-01-10 | 株式会社 全日警 | Information security system and information security method |
JP2018190051A (en) * | 2017-04-28 | 2018-11-29 | 株式会社 全日警 | Information security system, and information security method |
CN108986262A (en) * | 2018-06-14 | 2018-12-11 | 西安艾润物联网技术服务有限责任公司 | access control method, system and storage medium |
JP2021082159A (en) * | 2019-11-22 | 2021-05-27 | 東日本旅客鉄道株式会社 | Store support program and server device |
JP7350633B2 (en) | 2019-11-22 | 2023-09-26 | 東日本旅客鉄道株式会社 | Store support program and server equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9801048B1 (en) | Uniquely identifying a mobile electronic device | |
RU2406163C2 (en) | User authentication by combining speaker verification and reverse turing test | |
US8396711B2 (en) | Voice authentication system and method | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
US8751801B2 (en) | System and method for authenticating users using two or more factors | |
US8943561B2 (en) | Text message authentication system | |
US20070143825A1 (en) | Apparatus and method of tiered authentication | |
US20080120707A1 (en) | Systems and methods for authenticating a device by a centralized data server | |
EP1338940A1 (en) | Universal password generator | |
JP2009003805A (en) | Validity authentication system and validity authentication method | |
CN101310286A (en) | Improved single sign on | |
CN101933286A (en) | Wireless authentication | |
WO2008030184A1 (en) | Improved authentication system | |
JP2009181561A (en) | Security management system using biometric authentication | |
JP2006318429A (en) | Access management mail security system | |
JP2007034974A (en) | Security system | |
WO2021244471A1 (en) | Real-name authentication method and device | |
JP4303952B2 (en) | Multiple authentication system, computer program, and multiple authentication method | |
JP7544145B2 (en) | Information processing device, information processing method, and program | |
Jones et al. | Digital forensics and the issues of identity | |
RU2760440C2 (en) | System and method for counting votes in electronic voting system | |
JP3991117B2 (en) | User discrimination method in computer network | |
CN106485100A (en) | A kind of method of internet computer software lock and its service system | |
CN101145916A (en) | Network secure authentication system | |
JP2006163715A (en) | User authentication system |