US20220292900A1 - Information processing apparatus, information processing method, storage medium, and information processing system - Google Patents
Information processing apparatus, information processing method, storage medium, and information processing system Download PDFInfo
- Publication number
- US20220292900A1 US20220292900A1 US17/829,441 US202217829441A US2022292900A1 US 20220292900 A1 US20220292900 A1 US 20220292900A1 US 202217829441 A US202217829441 A US 202217829441A US 2022292900 A1 US2022292900 A1 US 2022292900A1
- Authority
- US
- United States
- Prior art keywords
- user
- target area
- user terminal
- control target
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0836—Recipient pick-ups
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Definitions
- the present invention relates to an information processing apparatus, an information processing method, a storage medium, and an information processing system.
- Patent Literature 1 discloses an access control system formed of an access control apparatus that controls an electric lock of a door provided at an entrance of a facility, a sign apparatus such as a two-dimensional barcode installed at or near the entrance of the facility, a server that manages information on entry to and exit from the facility, and a user terminal carried by the user of the facility.
- the user terminal receives a facility ID, which identifies a facility, from the server and stores the facility ID in a storage device. Then, if a facility ID read from the sign apparatus and the stored facility ID are matched, the user terminal outputs an unlock control signal for the electric lock to the access control apparatus.
- a user terminal outputs an unlock control signal to the access control apparatus based on a result of an authentication process at the user terminal.
- the user terminal is a terminal that is managed by a user rather than a manager of the system.
- the example object of the present invention is to provide an information processing apparatus, an information processing method, a storage medium, and an information processing system that can ensure security in control of entry to the control target area.
- an information processing apparatus including: a connection unit that establishes connection to a user terminal by wireless communication; an acquisition unit that acquires terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and a determination unit that determines whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- an information processing method including: establishing connection to a user terminal by wireless communication; acquiring terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and determining whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- a storage medium storing a program that causes a computer to perform: establishing connection to a user terminal by wireless communication; acquiring terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and determining whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- an information processing system including: a user terminal carried by a user and having a function of reading an image used for a request for entry to a control target area; and an information processing apparatus that wirelessly communicates with the user terminal, and the information processing apparatus includes a connection unit that establishes connection to the user terminal by the wireless communication, an acquisition unit that acquires terminal identification information transmitted via the wireless communication from the user terminal that read the image, and a determination unit that determines whether or not to permit the user to enter the control target area based on the terminal identification information.
- an information processing apparatus an information processing method, a storage medium, and an information processing system that can ensure security in control of entry to the control target area are provided.
- FIG. 1 is a diagram illustrating an overview of a delivery management system in a first example embodiment.
- FIG. 2 is a schematic diagram illustrating an overall configuration of the delivery management system in the first example embodiment.
- FIG. 3 is a block diagram illustrating a hardware configuration example of an edge gateway in the first example embodiment.
- FIG. 4 is a plan view of a storage room in the first example embodiment.
- FIG. 5 is a front view of shelves in the first example embodiment.
- FIG. 6 is an enlarged view in which one compartment of a shelf is enlarged in the first example embodiment.
- FIG. 7 is a diagram illustrating a method of confirming reception of an article in the first example embodiment.
- FIG. 8 is a diagram illustrating an example of management information stored in a management server in the first example embodiment.
- FIG. 9 is a diagram illustrating an example of permission information stored in an edge gateway in the first example embodiment.
- FIG. 10 is a sequence chart illustrating an example of an article distribution process in the first example embodiment.
- FIG. 11 is a diagram illustrating an example of a window displayed at a user terminal in the first example embodiment.
- FIG. 12 is a sequence chart illustrating an example of an article delivery process in the first example embodiment.
- FIG. 13 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment.
- FIG. 14 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment.
- FIG. 15 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment.
- FIG. 16 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment.
- FIG. 17 is a flowchart illustrating an example of an authentication process in the first example embodiment.
- FIG. 18 is a flowchart illustrating an example of an entry process in the first example embodiment.
- FIG. 19 is flowchart illustrating an example of a pickup confirmation process in the first example embodiment.
- FIG. 20 is a flowchart illustrating an example of an exit process in the first example embodiment.
- FIG. 21 is a sequence chart illustrating an example of a control process for entry and exit in a second example embodiment.
- FIG. 22 is a flowchart illustrating an example of an authentication process in the second example embodiment.
- FIG. 23 is a flowchart illustrating an example of a monitor process in a third example embodiment.
- FIG. 24 is a sequence chart illustrating an example of an article delivery process in a fourth example embodiment.
- FIG. 25 is a block diagram illustrating a user terminal in a fifth example embodiment.
- FIG. 26 is a block diagram illustrating an information processing apparatus in a sixth example embodiment.
- FIG. 27 is a block diagram illustrating an information processing system in a seventh example embodiment.
- FIG. 28 is a plan view of a storage room in a modified example embodiment.
- FIG. 1 a diagram illustrating an overview of a delivery management system 1 in the present example embodiment.
- the delivery management system 1 is an information processing system that manages article delivery in a control target area where a plurality of articles 200 are stored. Description will be provided below with a storage room 10 as an example of the control target area.
- the storage room 10 is a cargo container-type facility and is installed in a corner of a parking lot of a shop such as a convenience store.
- the user may designate pickup at the storage room 10 as a way to pick up the article 200 .
- the article 200 designated for pickup at the storage room 10 is distributed to the storage room 10 by a logistics company affiliated with the EC site.
- a message such as an electronic mail indicating the completion of distribution is transmitted from a company server 33 to a user terminal 21 .
- the company server 33 is a cloud server operated by a logistics company.
- the user terminal 21 is a mobile information terminal such as a smartphone.
- a user 20 carries the user terminal 21 and comes to the storage room 10 to pick up the article 200 .
- an application used for performing access control and article delivery confirmation in the storage room 10 (hereafter, referred to as “dedicated application”) is installed.
- the dedicated application may be downloaded from the company server 33 , for example.
- the user 20 starts up the dedicated application in the user terminal 21 when coming to picking up the article 200 .
- the dedicated application may be started up automatically when a predetermined signal is received from a management server 31 or the like or when a specified time to pick up the article 200 arrives.
- the dedicated application in the user terminal 21 establishes wireless communication by a short-distance wireless scheme (for example, Bluetooth (registered trademark), Wi-Fi, or the like) with an edge gateway (hereafter, referred to as “edge GW”) 101 installed in the storage room 10 .
- edge GW edge gateway
- the user 20 selects a key number corresponding to the storage room 10 in a window of the dedicated application of the user terminal 21 .
- the key number is a code set and registered in advance by the user 20 for each storage room 10 . A registration method of a key number will be described later.
- the user 20 uses and causes a camera function of the user terminal 21 to read an image of a keyhole seal 12 attached near a door 11 of the storage room 10 .
- the keyhole seal 12 is a sign member indicating the storage room 10 but may be a member other than a seal.
- a startup code of an authentication request process for the dedicated application is recorded. That is, this image is an image used for requesting entry to the storage room (control target area) 10 from the edge GW 101 .
- the image is a two-dimensional barcode, the type of the image is not limited thereto.
- the image may be any image that is detected by the dedicated application as a particular sign present near a control target region.
- the image may be a one-dimensional barcode, a figure, or the like, for example.
- no identification information on the storage room 10 is recorded in the image of the keyhole seal 12 of the present example embodiment. Accordingly, for example, even when a plurality of storage rooms 10 are provided together to one shop, a common keyhole seal 12 can be used for respective storage rooms 10 .
- the user terminal 21 transmits authentication information including a key number and terminal identification information to the edge GW 101 and requests authentication of the user 20 in response to completion of reading of an image (startup code) of the keyhole seal 12 as a trigger. Then, in response to authenticating the user 20 , the edge GW 101 unlocks the door 11 . This enables the user to enter the storage room 10 .
- the door 11 is once locked in order to prevent unauthorized taking-out of the article 200 . Further, when an open state of the door 11 continues for a predetermined time or longer, it is preferable to call attention by voice or the like.
- the user 20 takes the article 200 , the recipient of which is the user 20 (hereafter, referred to as “target article”), out of the articles 200 stored on the shelf 13 in accordance with a guidance mail notified to the user terminal 21 or voice guidance in the room when the user 20 is in the room.
- the edge GW 101 In response to confirming that the user 20 has picked up a target article in the storage room 10 , the edge GW 101 permits the user 20 to exit the room.
- the term “permit” refers to outputting an unlock signal for the door 11 (a drive control signal for a bar in a case of a passage restriction apparatus (not illustrated) such as a crossing gate). This enables the door 11 to be unlocked. After the door 11 is unlocked, the user 20 takes out the target article and exits the storage room 10 .
- FIG. 2 is a schematic diagram illustrating an overall configuration of the delivery management system in the present example embodiment.
- the delivery management system 1 has the edge GW 101 , an exit button 102 , an electric lock 103 , a telephone 104 , a live camera 105 , a shelf camera 106 , a hub 107 , an audio terminal 108 , a display 109 , and a router 110 .
- the edge GW 101 , the exit button 102 , the telephone 104 , the live camera 105 , the shelf camera 106 , the hub 107 , the audio terminal 108 , the display 109 , and the router 110 are installed inside the storage room 10 .
- the electric lock 103 is installed integrally with the door 11 that is the entrance and exit of the storage room 10 .
- the shelf 13 in which the plurality of articles 200 are arranged is installed inside the storage room 10 .
- the edge GW 101 is a computer apparatus that controls the overall delivery management system 1 in the storage room 10 .
- Information related to the user 20 who is permitted to enter the storage room 10 (hereafter, referred to as “permission information”) is registered in the edge GW 101 in advance. Specifically, identification information or the like on the user terminal 21 associated with the user 20 whose purchased article 200 is stored inside the storage room 10 is registered.
- the edge GW 101 performs authentication of the user 20 by matching information included in an authentication request received from the user terminal 21 with the permission information. In response to authenticating the user 20 , the edge GW 101 outputs an unlock signal to the electric lock 103 .
- the edge GW 101 collects data from the live camera 105 and the shelf camera 106 and performs processing, analysis, or the like on the collected data.
- the collected data is transmitted from the edge GW 101 to the management server 31 via the router 110 .
- the edge GW 101 may also transfer various information to the user 20 via the audio terminal 108 or the display 109 .
- the article 200 that can be associated with the user 20 of the user terminal 21 in advance is not limited to the purchased article in storage, and a particular article 200 may be associated with the user 20 of the user terminal 21 .
- the exit button 102 is a button used when the user 20 present in the room exits the storage room 10 .
- the edge GW 101 outputs an unlock signal to the electric lock 103 .
- the exit button 102 of the present example embodiment is set to an available state when exit from the room is permitted at the edge GW 101 .
- the electric lock 103 is formed of an actuator such as a solenoid, for example, a dead bolt (gate bar) moved by an actuator, an open/closure sensor, or the like.
- the electric lock 103 moves the position of the dead bolt in response to an unlock signal from the edge GW 101 and thereby enables the door 11 to be opened or closed. Further, the electric lock 103 can also detect open or closure of the door 11 in accordance with a signal from the open/closure sensor (not illustrated). Note that the electric lock 103 is normally locked and may be unlocked only when the user 20 is authenticated by the edge GW 101 .
- the telephone 104 is a direct connect telephone by which the user 20 communicates with an operator in case of emergency or the like. Further, when the exit button 102 described above is pressed for multiple times when not being in an active state, the telephone 104 may be ringed by the operator.
- the live camera 105 is a network camera used for monitoring and is used for capturing a moving image of behavior of the user 20 who has entered the room.
- the live camera 105 is connected to the edge GW 101 via the hub 107 , and the captured image data (live image) is stored in the edge GW 101 .
- the image data may be stored in a predetermined file format in order to prevent alteration.
- the shelf camera 106 is a network camera used for watching the shelf and is used for capturing the entire shelf 13 and detecting the arrangement of the article(s) 200 accommodated in the shelf 13 .
- the shelf camera 106 is connected to the edge GW 101 via the hub 107 , the captured image data (shelf image) is stored in the edge GW 101 .
- the shelf camera 106 has a wide view angle of 100 degrees or greater, for example, and can include the entire shelf 13 within one frame. Further, the shelf camera 106 can capture a full high definition (HD) image of 1920 by 1080 pixels, for example, and can record information (a shelf label, a voucher, or the like) attached to the shelf 13 and the article 200 in a high quality image.
- HD high definition
- the hub 107 is an interface unit based on a communication specification such as Ethernet (registered trademark), for example, and connects the edge GW 101 , the live camera 105 , and the shelf camera 106 to each other.
- Ethernet registered trademark
- the audio terminal 108 is a speaker, for example, and is used for guiding the user who has entered the storage room 10 by voice.
- the audio terminal 108 is connected to the edge GW 101 and outputs voice in accordance with audio data from the edge GW 101 .
- the audio terminal 108 may be a robotic apparatus that can perform communication by voice in addition to a speaker.
- the display 109 is a liquid crystal display or an organic electro luminescence (EL) display, for example, and is used for guiding the user who has entered the storage room 10 by using an image.
- the display 109 is connected to the edge GW 101 and performs display in accordance with image data from the edge GW 101 . For example, the position of the article(s) 200 on the shelf 13 is animated on the display 109 .
- the display 109 may be configured to cooperate with the audio terminal 108 to provide guidance. Further, the display 109 may be a touch panel and can accept touch entry performed by the user 20 .
- the router 110 has a third generation (3G)/Long Term Evolution (LTE) module, a wireless local area network (LAN), or the like, establishes connection to the management server 31 via a network 40 , and controls data communication between the edge GW 101 and the management server 31 .
- the router 110 may be one connected to the network 40 in a wired manner or may be built in the edge GW 101 .
- the management server 31 is a so-called cloud server and is connected to the edge GW 101 via the network 40 and the router 110 .
- the management server 31 can transmit and receive data to and from the company server 33 by using application programming interface (API).
- the management server 31 has a database (DB) 32 , and the database 32 stores a use history (entry/exit history), a shelf image, or a live image received from the edge GW 101 , information received from the company server 33 , or the like.
- DB database
- the company server 33 is a so-called cloud server and is connected to the management server 31 via the network 40 .
- the company server 33 can transmit and receive data to and from the management server 31 by using API.
- the company server 33 is operated by a logistics company and manages personal information on the user 20 , article information indicating association between the user 20 and the article 200 (such as a voucher number), the distribution status of the article 200 , or the like. Note that the number of company servers 33 is not limited, and servers of a plurality of different companies may be installed on the cloud.
- the network 40 is a wide area communication network such as the Internet, for example, and also includes a mobile communication network, a base station, or a relay server of the LTE or the like.
- a distributor worker terminal such as a smartphone, a tablet computer, or the like operated by a distributor worker of a logistics company may also be connected to the network 40 in addition to the user terminal 21 .
- FIG. 3 is a block diagram illustrating a hardware configuration example of the edge GW 101 in the present example embodiment.
- the edge GW 101 has a central processing unit (CPU) 131 , a random access memory (RAM) 132 , a read only memory (ROM) 133 , a storage device 134 , and an input/output interface (I/F) 135 .
- the CPU 131 controls a device connected to the edge GW 101 in accordance with a program stored in the ROM 133 or the storage device 134 and performs a predetermined process such as collection, processing, analysis, or the like on data.
- the RAM 132 is formed of a volatile memory and provides a memory region required for the operation of the CPU 131 .
- the ROM 133 is formed of a nonvolatile memory and stores a program, data, or the like required for operating the edge GW 101 .
- the storage device 134 is formed of a solid state drive (SSD), a hard disk drive (HDD), or the like.
- the storage device 134 stores in advance an application program used for image recognition, audio data and image data used for guidance, or the like. Further, the storage device 134 stores permission information, a use history, a shelf image, a live image, purchase information, or the like as required.
- the CPU 131 , the RAM 132 , and the ROM 133 may function as a connection unit, an acquisition unit, a determination unit, a deletion unit, a notification unit, and an output unit, and the storage device 134 may function as a storage unit.
- the input/output I/F 135 is a wired interface based on a specification such as Universal Serial Bus (USB), Ethernet, RS-232C, RS-485, or the like, and the hub 107 , the audio terminal 108 , the display 109 , and the router 110 are connected thereto.
- USB Universal Serial Bus
- Any device can be connected to the input/output I/F 135 , and a human-detection sensor, a microphone, a temperature and humidity sensor, a sensor that senses a malfunction of a device, or the like may be connected thereto, for example.
- the hardware configuration illustrated in FIG. 3 is an example, a device other than the above may be added, or some of the devices may not be provided. For example, a part of the function of the edge GW 101 may be provided by another device.
- FIG. 4 is a plan view of the storage room 10 in the present example embodiment.
- the storage room 10 is a unit house having an area of about 9.9 square meters, for example, and the door 11 is provided as the only entrance.
- the door 11 is locked by the electric lock 103 , and only the user 20 permitted by the edge GW 101 can enter and exit the room.
- the shelf 13 used for accommodating the plurality of articles 200 is installed inside the storage room 10 and along the wall of the storage room 10 .
- a guidance table 14 is installed near the shelf 13 , and the audio terminal 108 and the display 109 are placed on the guidance table 14 . In order for the user 20 to easily recognize the display 109 visually when entering the storage room 10 from the door 11 , the guidance table 14 is installed in front of the shelf 13 when viewed from the door 11 side.
- Each live camera 105 is installed above the corner or the like inside the storage room 10 so that the entire storage room 10 is included in the view angle.
- the shelf camera 106 is installed on a wall or the like facing the front of the shelf 13 so that the entire shelf 13 is included in the view angle.
- a clock (not illustrated) may be further installed within the view angle of the live camera 105 .
- the clock By using the clock, the operator monitoring the image from the live camera 105 is able to easily confirm that the live camera 105 is normally operating. Furthermore, if an identification number (location code) of the storage room 10 is indicated near the clock, the installation place of the storage room 10 is readily recognized, and this facilitates a countermeasure when an anomaly occurs.
- FIG. 5 is a front view of the shelf 13 in the present example embodiment. As illustrated in FIG. 5 , the shelf 13 is partitioned into 10 columns and 10 shelves in the horizontal direction and the vertical direction, respectively. A single article 200 can be accommodated in each partitioned compartment, and the maximum 100 articles 200 can be accommodated in the entire shelf 13 .
- each compartment of the shelf 13 be designed in accordance with the specification of the packing cardboard used by the logistics company. That is, it is preferable that the size of each compartment be slightly larger than a specification of a box in accordance with the specification such as the 60-size, the 80-size, or the like often used in logistics. As an example, the size of each compartment may be a width of 27 cm, a height of 19 cm, and a depth of 32 cm.
- the shelf 13 is formed of a shelf A and a shelf B partitioned into the same size of compartments in the example of FIG. 5 , however, while the size of each compartment of the shelf A may be designed in accordance with the 60-size, the size of each compartment of the shelf B may be designed in accordance with the 80-size, for example. Further, some partitions of the shelf 13 may be removable and a single article 200 may be accommodated by using a plurality of compartments so that the article 200 packed in a larger box can be accommodated.
- FIG. 6 is an enlarged view in which one compartment of the shelf 13 is enlarged and illustrates the article 200 accommodated in a compartment on the fifth shelf of the third column of the shelf 13 .
- Each compartment is labeled with a shelf label 13 a represented by combination of the column number and the shelf number of the shelf 13 .
- the compartment on the fifth shelf of the third column of the shelf A is labeled with the shelf label 13 a in which “A 35 ” is written.
- a back plate 13 b of each compartment of the shelf 13 be painted in black or the like for easier image detection of the article 200 .
- a voucher 201 used for identifying each article 200 is attached to the side face of the box of each of all the articles 200 arranged in the shelf 13 .
- the voucher 201 is attached at the time of dispatch of the article 200 .
- the voucher 201 is attached by a distributor worker when the article 200 is stored in the storage room 10 .
- the distributor worker carries a compact printer capable of creating the voucher 201 based on a barcode and is able to cause the printer to read a barcode of the original voucher 201 attached to the article 200 and create the voucher 201 at the site.
- a voucher number 201 a and a barcode 201 b are printed in the voucher 201 .
- the voucher number 201 a is identification information used for distribution management of the article 200 (article identification information) and is made up of a 12-digit number, for example. Any form of the voucher number 201 a is employed and may include both a numeral and an alphabet. To reduce erroneous detection in image recognition, the shelf label 13 a may be represented by only alphabets, and the voucher number 201 a may be represented by only numerals.
- the barcode 201 b is a two-dimensional barcode such as a QR code (registered trademark) recording the voucher number 201 a .
- the name of a destination (recipient), an order number at an EC site, a location code, or the like may be further printed in the voucher 201 .
- the voucher 201 is not limited to a paper medium, and various recording mediums that can be read by the user terminal 21 may be used.
- FIG. 7 is a diagram illustrating a method of confirming reception of the article 200 in the present example embodiment.
- a one-dimensional barcode 201 c recording the voucher number 201 a is further attached to the top face of the article 200 .
- the barcode 201 c is a part of the voucher 201 .
- a two-dimensional barcode may be used as the barcode 201 c in the same manner as the barcode 201 b .
- the user 20 gets the barcode 201 c (or the barcode 201 b ) read by using the dedicated application in the user terminal 21 .
- the user terminal 21 transmits the voucher number 201 a obtained by reading of the barcode 201 c to the edge GW 101 by wireless communication. Accordingly, the edge GW 101 determines whether or not a voucher number of the article 200 from which the barcode 201 c has been read and a voucher number associated with a target article of the user 20 are matched. If the two voucher numbers are matched, the edge GW 101 then determines that delivery of a target article is completed and permits the user 20 to exit the room.
- FIG. 8 is a diagram illustrating an example of management information stored by the management server 31 in the present example embodiment.
- a user ID, a name, a MAC address, start of an available date and time, end of an available date and time, key information, an enable flag, and the like are indicated as an example as data items of the management information.
- the data items are not limited to the above and may include a contact address, a voucher number, or the like, for example.
- the user ID is identification information that is unique to each user 20 of the delivery management system 1 .
- the MAC address is identification information that is unique to each user terminal 21 and used as authentication information on the user 20 in the present example embodiment.
- the start of an available date and time and the end of an available date and time are dates and times of the start and the end of a period in which the user 20 is able to use the storage room 10 as the distribution destination.
- the key information is a key number arbitrarily set by the user 20 for the storage room (BOX) 10 .
- the enable flag is a flag that is switched to ON when the user is allowed to enter the storage room 10 by using the key number and switched to OFF when entry is not allowed.
- the enable flag is turned to ON.
- the enable flag is turned back to OFF. Accordingly, entry of the user 20 to the storage room 10 is permitted only when a target article is stored in the storage room 10 .
- a registration method of a key number corresponding to the storage room 10 may be (A) a method of using the dedicated application to read the keyhole seal 12 (barcode) already attached to the storage room 10 and entering and registering a key number in a state where the user terminal 21 and the edge GW 101 are in wireless connection, (B) a method of logging in a web site managed by the management server 31 from the user terminal 21 or a personal computer and entering and registering identification information on the storage room 10 and a key number, or the like.
- the method of (A) described above there is an advantage that the user 20 can omit entry of a MAC address or identification information on the storage room 10 .
- FIG. 9 is a diagram illustrating an example of permission information stored by the edge GW 101 in the present example embodiment.
- a MAC address, an available period, an enable flag, a key number, an article position, a voucher number, and the like are indicated as an example as data items of the permission information.
- the data items are not limited to the above.
- a date and time when permission information is registered or an error code or a processing date and time when an authentication request is issued from an unregistered user terminal 21 may be included.
- the MAC address, the key number, and the enable flag are data items common to the management information described above.
- the available period is a period in which the user 20 can enter (access) the storage room 10 .
- the available period corresponds to a pickup period set by the user 20 by itself, a certain period from the time (for example, 24 hours, 3 days, 1 week, or the like) when the distributor stored the article 200 in the storage room 10 , or the like, for example.
- the article position is a storage position of the article 200 in the storage room 10 .
- the voucher number is identification information used for distribution management of the stored article 200 (article identification information).
- FIG. 10 is a sequence chart illustrating an example of an article distribution process in the present example embodiment. This sequence chart illustrates the process from purchase of the article 200 to completion of preparation for pickup of the article 200 .
- the user 20 accesses an EC site, which is managed by an EC server 41 , from a personal computer at home, the user terminal 21 , or the like and purchases the article 200 at the EC site (step S 11 ). It is assumed that, in the purchase, the storage room 10 is designated by the user 20 as a place where the article 200 is picked up.
- the EC server 41 transmits purchase information including information on the purchased article 200 , the user 20 who made the purchase, the designated storage room 10 , or the like to the company server 33 (step S 12 ).
- the company server 33 records the purchase information from the EC server 41 in the database 34 and transmits the purchase information together with a voucher number of the article 200 to the management server 31 (step S 13 ).
- the management server 31 stores the information from the company server 33 in the database 32 .
- the management server 31 If there is no available compartment in the shelf 13 of the storage room 10 , the management server 31 returns an NG notification to the company server 33 (step S 14 ).
- the company server 33 that has received the NG notification temporarily retains distribution of the article 200 until the shelf 13 of the storage room 10 becomes available.
- the company server 33 may transmit a mail or the like that requests the user terminal 21 to change a pickup place.
- the distributor worker In response to accommodating the article 200 in the shelf 13 of the storage room 10 , the distributor worker notifies the company server 33 of distribution completion from the distributor worker terminal or the like. In response to the notification from the distributor worker, the company server 33 confirms that the distribution of the article 200 to the storage room 10 is completed (step S 15 ). In response to confirming the completion of distribution, the company server 33 transmits the distribution status (for example, “distributed”) of the article 200 to the management server 31 (step S 16 ).
- the distribution status for example, “distributed”
- FIG. 11 is a diagram illustrating an example of a window displayed on the user terminal 21 .
- a message “The package you ordered has arrived in the designated box.” is displayed on a screen of the user terminal 21 .
- the user 20 who has received the arrival mail may use the link (not illustrated) written in the arrival mail to access the web site managed by the management server 31 and specify a pickup date and time of the article 200 , for example, at the user terminal 21 (step S 18 ).
- the specifying of a pickup date and time may be omitted.
- FIG. 12 is a sequence chart illustrating an example of an article delivery process in the present example embodiment. This sequence chart illustrates the process from completion of preparation for pickup of the article 200 in the storage room 10 to pickup of the article 200 (target article) by the user 20 .
- a case where target articles of different users 20 A, 20 B, and 20 C have been stored in the storage room 10 and the user 20 A picks up the target article will be described below as an example.
- the dedicated application has been installed in advance in the user terminals 21 carried by respective users 20 , and key numbers to the storage room 10 have been registered individually by respective users 20 .
- FIG. 13 to FIG. 16 illustrate an example of display windows of the user terminal 21 , respectively.
- the management server 31 transmits, to the edge GW 101 , permission information to the users 20 A, 20 B, and 20 C who are recipients of the target articles stored in the storage room 10 (step S 101 ).
- the permission information includes the MAC address of the user terminal 21 , key information, a voucher number, a pickup date and time, or the like, for example.
- the MAC address is unique identification information (ID) for each user terminal 21 .
- the voucher number is a voucher number of a target article associated with each user 20 .
- the pickup date and time is a date and time specified by the user in step S 18 of FIG. 10 .
- the edge GW 101 stores the permission information on the users 20 A, 20 B, and 20 C received from the management server 31 in the storage device 134 (step S 102 ). That is, the users 20 A, 20 B, and 20 C are registered in the storage device 134 as persons authorized to enter the storage room 10 . Note that the process of step S 101 and step S 102 is performed in a predetermined cycle (for example, at an interval of 15 minutes). Accordingly, the permission information registered in the edge GW 101 is updated to the latest status. For example, when a target article of a user 20 D is newly distributed to the storage room 10 , the permission information on the user 20 D is added and registered to the storage device 134 of the edge GW 101 .
- the dedicated application of the user terminal 21 issues a connection request to the edge GW 101 (step S 103 ).
- the edge GW 101 establishes communication connection to the user terminal 21 by wireless communication (step S 104 ).
- the user terminal 21 accepts selection of key information made by the user 20 A on the screen in a state of being connected to the edge GW 101 (step S 105 ) and then displays a message that prompts the user 20 A to get the keyhole seal 12 read.
- a message prompting the user to select a key (“Select a key of a box.”) are displayed on the screen of the user terminal 21 .
- a message prompting the user to get the keyhole seal 12 read (“Read a keyhole barcode next to the door read.”) is displayed.
- the user terminal 21 reads a two-dimensional barcode of the keyhole seal 12 , which is attached to the entrance side of the storage room 10 , in accordance with the operation made by the user 20 A (step S 106 ) and then transmits an authentication request to the edge GW 101 in accordance with a startup code recorded in the two-dimensional barcode (step S 107 ).
- the authentication request includes the selected key information and authentication information including the MAC address of the user terminal 21 .
- the read two-dimensional barcode and the selected key are displayed on the screen of the user terminal 21 . Such a window is displayed until the authentication process ends, for example.
- the authentication process in the present example embodiment refers to a process of determining whether or not to permit the user 20 to enter (access) the storage room 10 (control target area).
- the edge GW 101 performs an authentication process on the user 20 A based on the authentication request received from the user terminal 21 (step S 108 ) and, once authenticating the user 20 A, transmits an unlock signal to the electric lock 103 (step S 109 ).
- the electric lock 103 is unlocked, and the door 11 is ready to be opened and closed.
- the electric lock 103 is automatically locked.
- the electric lock 103 is locked before the user 20 A enters the room, it is possible for the user 20 A to be re-authenticated by using the user terminal 21 to perform key selection and image reading again.
- the authentication of the user 20 A is permitted, it is preferable to allow a companion of the user 20 A to enter the room at the same time.
- the electric lock 103 detects opening and closure of the door 11 and transmits an open/close notification to the edge GW 101 (step S 110 ). Further, the open/close detection may be performed by an open/close sensor provided to the door 11 .
- the edge GW 101 extracts a storage place of the target article by searching for shelf allocation data stored in the storage device 134 by using the MAC address as a key and notifies the user terminal 21 of the extracted storage place (step S 111 ).
- the user terminal 21 displays information on the storage place received from the edge GW 101 on the screen (step S 112 ).
- a message for guidance of the storage position of the target article (“XXX's package is stored at the following position. A 35 ”) is displayed on the screen of the user terminal 21 .
- the edge GW 101 performs an entry process (step S 113 ).
- the user terminal 21 reads the barcode 201 c written in the voucher 201 of the article 200 as illustrated in FIG. 7 in accordance with the operation performed by the user 20 A who has entered the room (step S 114 ) and then transmits read information to the edge GW 101 (step S 115 ).
- the read information includes the voucher number of the article on reading and the MAC address of the user terminal 21 that has performed the reading, for example.
- the edge GW 101 performs a delivery confirmation process for the target article based on the received read information (step S 116 ).
- the edge GW 101 permits the user 20 A to exit the room.
- the edge GW 101 sets the exit button 102 to an available state (active state).
- the edge GW 101 transmits an unlock signal to the electric lock 103 (step S 117 ).
- the electric lock 103 is unlocked, and the door 11 is ready to be opened and closed. If neither opening nor closure of the door 11 is detected for a certain period (for example, 5 seconds), the electric lock 103 is automatically locked. If the electric lock 103 is locked before the user 20 A exits the room, it is possible for the user 20 A to exit the room by pressing the exit button 102 again.
- the user 20 A opens the door 11 , and the electric lock 103 then detects opening and closure of the door 11 and transmits an open/close notification to the edge GW 101 (step S 118 ). In response to receiving the open/close notification about the door 11 , the edge GW 101 performs an exit process (step S 119 ).
- the edge GW 101 transmits, to the management server 31 , delivery information on the target article related to the user 20 A who has exited the room (step S 120 ).
- the delivery information includes a voucher number of a target article and the MAC address of the user terminal 21 , for example.
- the management server 31 updates the management information. Specifically, the status associated with the voucher number is updated to “delivered”, and the enable flag is updated to “OFF”.
- the edge GW 101 then disconnects the wireless connection from the user terminal 21 (step S 121 ) and deletes the permission information related to the user terminal 21 , which was connected, from the storage device 134 (step S 122 ).
- the record may be deleted on a MAC address basis from the database 32
- the enable flag associated to the MAC address may be updated to “OFF”.
- the key information associated with the MAC address may be deleted.
- the edge GW 101 can restrict re-entry after the user 20 A has exited the room.
- FIG. 17 is a flowchart illustrating an example of an authentication process in the present example embodiment. This process represents the details of step S 108 of FIG. 12 .
- the edge GW 101 acquires the authentication information transmitted from the user terminal 21 (step S 201 ) and then determines whether or not the MAC address included in the authentication information and the MAC address registered as the permission information are matched each other (step S 202 ).
- step S 202 determines that the MAC addresses are matched
- the process proceeds to step S 204 .
- step S 203 the edge GW 101 outputs error information to the user terminal 21 (step S 203 ) and ends the process.
- error information in step S 203 may be a message such as “Your package is not stored in the box.”, for example.
- step S 204 the edge GW 101 determines whether or not the key number included in the authentication information and the key number in the storage device 134 are matched each other.
- the process proceeds to step S 206 .
- the edge GW 101 determines that the key numbers are not matched (step S 204 : NO)
- the edge GW 101 outputs error information to the user terminal 21 (step S 205 ) and ends the process.
- An example of the error information in step S 205 may be a message such as “Key numbers are not matched.”, “Key is invalid.”, or the like, for example.
- step S 206 the edge GW 101 determines whether or not the storage room 10 is vacant based on information or the like from the live camera 105 .
- the process proceeds to step S 208 .
- the edge GW 101 determines that the storage room 10 is not vacant (step S 206 : NO)
- the edge GW 101 outputs error information to the user terminal 21 (step S 207 ) and ends the process. That is, when a certain user 20 is present in the room, entry of another user 20 to the room is refused.
- An example of the error information in step S 207 may be a message such as “The storage room is currently occupied.
- the edge GW 101 may perform control not to display a barcode reading window on the user terminal 21 instead of error output of step S 207 . Similarly, the edge GW 101 may instruct the user terminal 21 to display a message such as “The room is occupied. No barcode reading is available.” or the like.
- step S 208 the edge GW 101 permits the user 20 A carrying the user terminal 21 to enter the room and ends the process. This enables the edge GW 101 to output an unlock signal to the electric lock 103 .
- FIG. 18 is a flowchart illustrating an example of an entry process in the present example embodiment. This process illustrates the details of step S 113 of FIG. 12 .
- the edge GW 101 starts capturing a moving image by using the live camera 105 (step S 301 ) and determines whether or not entry of the user 20 A to the room is detected (step S 302 ).
- the edge GW 101 performs motion detection by analyzing image data from the live camera 105 .
- the live camera 105 may have a function of motion detection.
- a human-detection sensor or the like may be provided inside the storage room 10 . Note that, without being limited to a moving image, the edge GW 101 may acquire static images captured at predetermined intervals from the live camera 105 .
- step S 302 If no entry to the room is detected (step S 302 : NO), the edge GW 101 stands by until entry to the room is detected. If entry to the room is detected (step S 302 : YES), the edge GW 101 uses the live camera 105 to acquire a face image of the user 20 A who has entered the room (step S 303 ) and uses the shelf camera 106 to acquire a shelf image (step S 304 ).
- the acquired shelf image is an image of the shelf 13 immediately after the user 20 A has entered the storage room 10 , which indicates the state before the article 200 arranged on the shelf 13 is taken out by the user 20 A.
- the process from step S 301 to step S 304 is not necessarily performed sequentially and may be performed in parallel.
- the edge GW 101 stores the arrangement of all the articles 200 accommodated in the shelf 13 based on the shelf image (step S 305 ).
- the edge GW 101 reads information of the voucher 201 and the shelf label 13 a by using an image recognition technology such as Optical Character Recognition (OCR) and stores the voucher number of the article 200 in the storage device 134 in association with the shelf label 13 a . That is, a list of the articles 200 accommodated in the shelf 13 (shelf allocation data) is created.
- OCR Optical Character Recognition
- the edge GW 101 guides the user 20 A who has entered the room for the position of the article 200 (step S 306 ).
- the edge GW 101 makes announcement such as “Your package is on the second shelf of the first column of shelf A. See the screen for details.” by using the audio terminal 108 and displays the layout of the shelf 13 and the position of the article 200 by using the display 109 .
- the user 20 A confirms the position of the article 200 displayed on the display 109 in accordance with voice guidance.
- the user 20 A then moves to the front of the shelf 13 and takes the article 200 out of the shelf 13 .
- the process of step S 306 may be omitted.
- FIG. 19 is a flowchart illustrating an example of a delivery confirmation process in the present example embodiment. This process represents the details of step S 116 of FIG. 12 and is performed when the user terminal 21 reads the barcode 201 c of the voucher 201 attached to the article 200 .
- the edge GW 101 acquires a voucher number of the target article from the storage device 134 based on the MAC address of the user terminal 21 of the user 20 A who has entered the room (step S 401 ) and acquires a voucher number of the article on the reading from the read information (step S 402 ).
- the edge GW 101 determines whether or not the two acquired voucher numbers are matched each other (step S 403 ).
- step S 403 determines that the voucher numbers are matched (step S 403 : YES)
- the edge GW 101 permits the user 20 A to exit the room (step S 405 ) and ends the process.
- step S 403 determines that the voucher numbers are not matched (step S 403 : NO)
- the edge GW 101 outputs error information to the user terminal 21 or the audio terminal 108 (step S 404 ), and the process returns to step S 402 .
- An example of the error information in step S 404 may be a message such as “Please check the contents of the voucher. It is not your package.”, “Your package is on the second shelf of the first column of shelf A. See the screen for details.”, or the like.
- FIG. 20 is a flowchart illustrating an example of an exit process in the present example embodiment. This process represents the details of step S 119 of FIG. 12 .
- the edge GW 101 determines whether or not exit of the user 20 A from the room is detected by using the live camera 105 (step S 501 ). If exit from the room is not detected (step S 501 : NO), the edge GW 101 stands by until exit from the room is detected.
- the edge GW 101 acquires a shelf image of the shelf 13 by using the shelf camera 106 (step S 502 ).
- the acquired shelf image is an image of the shelf 13 captured immediately after the user 20 A has exited the storage room 10 , which indicates the state after the article 200 arranged on the shelf 13 has been taken out by the user 20 A.
- the edge GW 101 stores the arrangement of all the articles 200 accommodated on the shelf 13 based on the shelf image (step S 503 ).
- the edge GW 101 reads information of the voucher 201 and the shelf label 13 a and stores the information of the voucher 201 of the article 200 in the storage device 134 in association with the shelf label 13 a . Further, the edge GW 101 stops capturing a moving image performed by the live camera 105 (step S 504 ).
- the edge GW 101 stores a use history of the user 20 A in the storage device 134 (step S 505 ).
- the use history includes the MAC address of the user terminal 21 carried by the user 20 A or entry/exit time information, for example.
- the edge GW 101 stores data of a face image of the user 20 A, a shelf image at entry/exit, the article arrangement on the shelf 13 acquired from the shelf image, a moving image from the time of entry to the time of exit, or the like in the storage device 134 .
- the moving image is stored as a file on a unit of one minute, for example.
- the edge GW 101 transmits data of a use history, a face image, the article arrangement, a moving image, or the like stored in the storage device 134 to the management server 31 . Such data may be transmitted to the management server 31 in response to a request from the management server 31 .
- the user terminal 21 reads the barcode of the keyhole seal 12 near the entrance of the storage room 10 , and the edge GW 101 then receives an authentication request including terminal identification information (MAC address) from the user terminal 21 in a state where wireless communication connection between the edge GW 101 and the user terminal 21 is established. Since the wireless communication connection is established, the edge GW 101 can readily determine whether or not to permit the user 20 carrying the user terminal 21 to enter (access) the storage room 10 based on the received terminal identification information. Accordingly, it is possible to shorten the required time from the time the user terminal 21 transmits an authentication request to the edge GW 101 to the time the edge GW 101 unlocks the electric lock 103 and ensure security in access control of the storage room (control target area) 10 .
- MAC address terminal identification information
- the edge GW 101 permits entry to the storage room 10 provided that the user 20 is the recipient of the article 200 stored inside the storage room 10 .
- the edge GW 101 can restrict entry to the storage room 10 attempted by a person when no target article of the person is stored in the storage room 10 .
- the edge GW 101 refuses authentication (does not allow entry) of the user 20 even when the permission information (terminal identification information) thereon is registered in the storage device 134 , it is possible to individually control entry to and exit from the storage room 10 .
- the user 20 when the user 20 takes an article out of the shelf 13 of the storage room 10 and if a voucher number (identification information) of the article 200 from which the voucher has been read and a voucher number of a target article associated with the user terminal 21 are matched each other, the user 20 is permitted to exit the storage room 10 . Accordingly, it is possible to suppress the user 20 from taking a wrong article 200 out of the storage room 10 thus manage delivery of the article 200 in an unattended manner.
- the conventional delivery box requires a locking mechanism to be provided for each box that accommodates an article and thus is expensive.
- the storage room 10 since only a single locking mechanism is required for the storage room 10 in which many articles 200 may be stored, it is possible to configure a relatively less expensive system.
- the storage room 10 can be installed outside a shop, it is possible to avoid a reduction in a sales floor space.
- the article 200 can be accommodated in a simple shelf 13 , and it is therefore possible to efficiently store many articles 200 .
- the user 20 since authentication is performed using the user terminal 21 carried by the user 20 , the keyhole seal 12 , and the edge GW 101 , it is no longer required to install a card reader apparatus that reads an IC card used for authentication at the entrance as seen in the conventional configuration, and it is possible to reduce the cost for construction and operation of the facility. Further, the user 20 is no longer required to carry an IC card used for authentication and is able to enter and exit the storage room 10 by using only the user terminal 21 .
- a two-dimensional barcode printed in the keyhole seal 12 of the present example embodiment does not include identification information on the storage room 10 , the same keyhole seal 12 can be similarly attached to a different storage room 10 . It is therefore possible to avoid wrong attachment of the keyhole seal 12 that would be caused by a worker, and it is possible to reduce the manufacturing cost of the keyhole seal 12 . Further, because of the common seal, there is an advantage of easier replacement of the keyhole seal 12 when the keyhole seal 12 is broken.
- the security level can be improved.
- the present example embodiment differs from the first example embodiment in that a target article of the user 20 is not required to be stored inside the control target area and that no key information is used.
- the control target area in the present example embodiment may be not only an indoor area such as a guest room in a hotel, a laboratory in a company, a factory, and the like but also an outdoor facility such as a theme park, for example.
- the hardware configuration of the present example embodiment is common to that of the first example embodiment, a control method for entry to and exit from a room (entry to and exit from a facility) is partially different.
- the process such as the delivery confirmation process for the article 200 , the notification process for a guidance mail of the article position, the analysis process of the article position based on a shelf image, and the like in the first example embodiment will be omitted.
- the operation of the access control system in the present example embodiment will be described below.
- FIG. 21 is a sequence chart illustrating an example of a control process for entry and exit in the present example embodiment.
- a case where the user 20 A enters and exits a control target area will be described as an example.
- the dedicated application has been installed in advance in the user terminal 21 carried by the user 20 A.
- the management server 31 transmits, to the edge GW 101 , permission information for the users 20 A, 20 B, and 20 C to be permitted to enter the control target area (step S 601 ).
- the permission information includes the MAC address of the user terminal 21 , an available date and time of a facility that is the control target area, or the like, for example.
- the edge GW 101 stores the permission information on the users 20 A, 20 B, and 20 C received from the management server 31 in the storage device 134 (step S 602 ).
- the process of step S 601 to step S 602 is performed in a predetermined cycle (for example, at an interval of 15 minutes). Accordingly, the permission information registered in the edge GW 101 is updated to the latest status.
- the dedicated application in the user terminal 21 issues a connection request to the edge GW 101 (step S 603 ).
- the edge GW 101 establishes communication connection to the user terminal 21 by wireless communication (step S 604 ).
- the user terminal 21 reads the two-dimensional barcode of the keyhole seal 12 in response to the operation performed by the user 20 A in accordance with guidance displayed on the screen (step S 605 ) and then transmits an authentication request to the edge GW 101 in accordance with a startup code recorded in the two-dimensional barcode (step S 606 ).
- the authentication request includes authentication information including the MAC address of the user terminal 21 .
- the edge GW 101 performs an authentication process on the user 20 A based on the authentication request received from the user terminal 21 (step S 607 ).
- the edge GW 101 transmits an unlock signal to the electric lock 103 (step S 608 ).
- This causes the electric lock 103 to be unlocked and enable the door 11 to be opened and closed. Note that, if neither opening nor closure of the door 11 is detected for a certain period (for example, 5 seconds), the electric lock 103 is automatically locked. Also if the electric lock 103 is locked before the user 20 A enters the room, it is possible for the user 20 A to be re-authenticated by using the user terminal 21 to perform barcode reading of the keyhole seal 12 again.
- the electric lock 103 detects opening and closure of the door 11 and transmits an open/close notification to the edge GW 101 (step S 609 ). Further, the open/close detection may be performed by an open/close sensor provided to the door 11 .
- the edge GW 101 performs an entry process (step S 610 , see FIG. 18 ). If pressing of the exit button 102 by the user 20 A present in the room is not detected (step S 611 : NO), the edge GW 101 stands by until pressing of the exit button 102 is detected. If the edge GW 101 detects pressing of the exit button 102 (step S 611 : YES), the edge GW 101 then transmits an unlock signal to the electric lock 103 (step S 612 ). Thereby, the electric lock 103 is unlocked, and the door 11 is ready to be opened and closed. If neither opening nor closure of the door 11 is detected for a certain period (for example, 5 seconds), the electric lock 103 is automatically locked. If the electric lock 103 is locked before the user 20 A exits the room, it is possible for the user 20 A to exit the room by pressing the exit button 102 again.
- the user 20 A opens the door 11 , and the electric lock 103 then detects opening and closure of the door 11 and transmits an open/close notification to the edge GW 101 (step S 613 ).
- the edge GW 101 performs an exit process (step S 614 , see FIG. 20 ).
- the edge GW 101 transmits, to the management server 31 , exit information related to the user 20 A who has exited the room (step S 615 ).
- the exit information includes the MAC address of the user terminal 21 or entry/exit time information, for example.
- the management server 31 updates the management information in the database 32 .
- the edge GW 101 then disconnects the wireless connection from the user terminal 21 (step S 616 ) and deletes the permission information related to the user terminal 21 , which was connected, from the storage device 134 (step S 617 ).
- the record may be deleted on a MAC address basis from the database 32
- the enable flag associated to the MAC address may be updated to “OFF”.
- the key information associated with the MAC address may be deleted.
- the edge GW 101 can restrict re-entry after the user 20 A has exited the room.
- FIG. 22 is a flowchart illustrating an example of an authentication process in the present example embodiment. This process represents the details of step S 607 of FIG. 21 .
- the edge GW 101 acquires authentication information transmitted from the user terminal 21 (step S 701 ) and then determines whether or not the MAC address included in the authentication information and the MAC address registered as the permission information are matched each other (step S 702 ).
- step S 702 determines whether or not the MAC address included in the authentication information and the MAC address registered as the permission information are matched each other.
- step S 702 determines that the two MAC addresses are matched.
- step S 703 the edge GW 101 outputs error information to the user terminal 21 (step S 703 ) and ends the process.
- error information in step S 703 may be a message such as “Your terminal is not registered.”, for example.
- step S 704 the edge GW 101 permits the user 20 A carrying the user terminal 21 to enter the room and ends the process. This enables the edge GW 101 to output an unlock signal to the electric lock 103 .
- entry of the user 20 to a control target area can be controlled based on wireless communication between the user terminal 21 carried by the user 20 and the edge GW 101 in the same manner as in the first example embodiment.
- the delivery management system 1 in a third example embodiment will be described below.
- the present example embodiment further has a function of outputting alert information based on a staying time period of the user 20 inside the storage room 10 , which makes a difference from the first example embodiment.
- the operation of the delivery management system 1 in the present example embodiment will be described below.
- FIG. 23 is a flowchart illustrating an example of a monitoring process in the present example embodiment. This process is performed when entry of the user 20 to the room is detected.
- the edge GW 101 measures the staying time period that the user 20 stays in the storage room 10 (step S 801 ) and determines whether or not the staying time period exceeds a predetermined threshold (for example, 5 minutes) (step S 802 ).
- a predetermined threshold for example, 5 minutes
- the edge GW 101 outputs an alert to the user terminal 21 , the audio terminal 108 , the display 109 , the management server 31 , and the like (step S 803 ).
- the edge GW 101 determines that the staying time period is less than or equal to the predetermined threshold (step S 802 : NO)
- the process proceeds to step S 804 .
- step S 804 the edge GW 101 determines whether or not exit of the user 20 from the room is detected. Herein, if the edge GW 101 detects exit of the user 20 from the room (step S 804 : YES), the process ends. In contrast, if the edge GW 101 does not detect exit of the user 20 from the room (step S 804 : NO), the process returns to step S 801 .
- the edge GW 101 detects a state where the user 20 has stayed in the storage room 10 over a predetermined time period and outputs alert information.
- the edge GW 101 can suitably manage the staying time period of the user 20 inside the storage room 10 and thereby can suppress an unauthorized activity and early detect an anomaly in the storage room 10 .
- the delivery management system 1 in a fourth example embodiment will be described below.
- the present example embodiment differs from the first example embodiment in the order of process steps in the article delivery process.
- the operation of the delivery management system 1 in the present example embodiment will be described below.
- FIG. 24 is a sequence chart illustrating an example of the article delivery process in the present example embodiment. This sequence chart represents the process from completion of preparation for pickup of the article 200 in the storage room 10 to pickup of the article 200 by the user 20 .
- a case where target articles of the different users 20 A, 20 B, and 20 C have been stored in the storage room 10 and the user 20 A picks up the target article will be described below as an example.
- the dedicated application has been installed in advance in the user terminals 21 carried by respective users 20 , and key numbers to the storage room 10 have been registered individually by respective users 20 .
- the management server 31 transmits, to the edge GW 101 , permission information to the users 20 A, 20 B, and 20 C who are recipients of the articles stored in the storage room 10 (step S 901 ).
- the permission information includes the MAC address of the user terminal 21 , key information, a voucher number, a pickup date and time, or the like, for example.
- the MAC address is unique identification information (ID) for each user terminal 21 .
- the voucher number is a voucher number of a target article associated with each user 20 .
- the pickup date and time is a date and time specified by the user in step S 18 of FIG. 10 .
- the edge GW 101 stores the permission information on the users 20 A, 20 B, and 20 C received from the management server 31 in the storage device 134 (step S 902 ).
- the process of step S 901 to step S 902 is performed in a predetermined cycle (for example, at an interval of 15 minutes). Accordingly, the permission information registered in the edge GW 101 is updated to the latest status. For example, when the article of the user 20 D is newly distributed to the storage room 10 , the permission information on the user 20 D is added and registered to the storage device 134 of the edge GW 101 .
- the user terminal 21 starts up the dedicated application in accordance with the operation of the user 20 A and accepts selection of key information made by the user 20 A on the screen (step S 903 , see FIG. 13 ) and then displays a message that prompts the user 20 A to get the keyhole seal 12 read (see FIG. 14 ).
- the user terminal 21 reads a two-dimensional barcode of the keyhole seal 12 (step S 904 ) and then issues a connection request to the edge GW 101 (step S 905 ). That is, the dedicated application of the user terminal 21 defines completion of reading of the two-dimensional barcode as the transmission condition for a connection request. Note that, when the user terminal 21 is present in communication coverages of a plurality of edge GWs 101 , it is preferable for the user terminal 21 to issue a connection request targeted to the edge GW 101 having the highest radio intensity. In response to receiving the connection request from the user terminal 21 , the edge GW 101 establishes communication connection with the user terminal 21 via wireless communication (step S 906 ).
- the user terminal 21 transmits an authentication request to the edge GW 101 in accordance with a startup code recorded in the two-dimensional barcode (step S 907 ).
- the authentication request includes the selected key information and authentication information including the MAC address of the user terminal 21 .
- the edge GW 101 performs an authentication process on the user 20 A based on the authentication request received from the user terminal 21 (step S 908 ) and, once authenticating the user 20 A, transmits an unlock signal to the electric lock 103 (step S 909 ).
- the electric lock 103 is unlocked, and the door 11 is ready to be opened and closed.
- the electric lock 103 is automatically locked. Also if the electric lock 103 is locked before the user 20 A enters the room, it is possible for the user 20 A to be re-authenticated by using the user terminal 21 to perform key selection and barcode reading again.
- the electric lock 103 detects opening and closure of the door 11 and transmits an open/close notification to the edge GW 101 (step S 910 ). Further, the open/close detection may be performed by an open/close sensor provided to the door 11 .
- the edge GW 101 extracts a storage place of the target article by searching for shelf allocation data stored in the storage device 134 by using the MAC address as a key and notifies the user terminal 21 of the extracted storage place (step S 911 ).
- the user terminal 21 displays information on the storage place received from the edge GW 101 on the screen (step S 912 , see FIG. 16 ).
- the edge GW 101 performs an entry process (step S 913 ).
- the user terminal 21 reads the barcode 201 c written in the voucher 201 of the article 200 as illustrated in FIG. 7 in accordance with the operation performed by the user 20 A who has entered the room (step S 914 ) and then transmits read information to the edge GW 101 (step S 915 ).
- the read information includes the voucher number of the article on reading and the MAC address of the user terminal 21 that has performed the reading, for example.
- the edge GW 101 performs a delivery confirmation process for the target article based on the received read information (step S 916 ).
- the edge GW 101 permits the user 20 A to exit the room.
- the edge GW 101 sets the exit button 102 to an available state (active state).
- the edge GW 101 transmits an unlock signal to the electric lock 103 (step S 917 ).
- the electric lock 103 is unlocked, and the door 11 is ready to be opened and closed. If neither opening nor closure of the door 11 is detected for a certain period (for example, 5 seconds), the electric lock 103 is automatically locked. If the electric lock 103 is locked before the user 20 A exits the room, it is possible for the user 20 A to exit the room by pressing the exit button 102 again.
- the user 20 A opens the door 11 , and the electric lock 103 then detects opening and closure of the door 11 and transmits the open/close notification to the edge GW 101 (step S 918 ).
- the edge GW 101 performs an exit process (step S 919 ).
- the edge GW 101 transmits, to the management server 31 , delivery information on the target article related to the user 20 A who has exited the room (step S 920 ).
- the delivery information includes a voucher number of a target article and the MAC address of the user terminal 21 , for example.
- the management server 31 updates the management information. Specifically, the status associated with the voucher number is updated to “delivered”, and the enable flag is updated to “OFF”.
- the edge GW 101 then disconnects the wireless connection from the user terminal 21 (step S 921 ) and deletes the permission information related to the user terminal 21 , which was connected, from the storage device 134 (step S 922 ).
- the enable flag associated with the MAC address may be set to “OFF”. Accordingly, after taking the article out of the storage room 10 , the user 20 A is restricted to enter the storage room 10 .
- entry to the storage room 10 and exit from the storage room 10 made by the user 20 can be controlled based on wireless communication between the user terminal 21 carried by the user 20 and the edge GW 101 in the same manner as in the first example embodiment.
- FIG. 25 is a block diagram illustrating the user terminal 21 in the present example embodiment. As illustrated in FIG. 25 , the user terminal 21 has a wireless communication unit 21 a , a determination unit 21 b , and a display control unit 21 c . The function of each unit is implemented by the dedicated application installed in the user terminal 21 .
- the wireless communication unit 21 a wirelessly communicates with the edge GW 101 , the management server 31 , the company server 33 , and the like based on a communication specification such as Bluetooth, Wi-Fi, LTE, or the like.
- the determination unit 21 b determines necessity of a window transition, a window content to be displayed on the display, or the like based on reception information from the edge GW 101 .
- a specific example of the information received from the edge GW 101 may be, for example, the use status of the storage room 10 , an error code (an error related to no registration of terminal identification information, an error related to invalidation of key information, an error of wireless connection to the edge GW 101 , or the like), data of a processed result in the edge GW 101 , or the like.
- the display control unit 21 c controls the window content to be displayed on the display based on a determination result from the determination unit 21 b.
- the determination unit 21 b can receive, from the edge GW 101 , reception information indicating that any of users 20 is using the storage room 10 at a timing when wireless connection between the wireless communication unit 21 a and the edge GW 101 is established, for example. In such a case, the determination unit 21 b determines not to allow a transition to the barcode reading window in the dedicated application. Based on the determination result, the display control unit 21 c may then display a message such as “The room is occupied. No entry now.”, “The room is occupied. No barcode reading now.”, or the like in the window and change the window content so that a transition to the barcode reading window is disabled.
- the user 20 is not required to move to the front of the storage room 10 and use and operate the user terminal 21 to read the keyhole seal 12 , and the user 20 can be notified of a message on the screen indicating that entry to the room is not allowed.
- FIG. 26 is a block diagram illustrating an information processing apparatus 60 in a sixth example embodiment.
- the information processing apparatus 60 has a connection unit 61 that establishes connection to a user terminal by wireless communication, an acquisition unit 62 that acquires terminal identification information transmitted from the user terminal via the wireless communication when the user terminal has read an image used for a request for entry to a control target area, and a determination unit 63 that determines whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- the information processing apparatus 60 in the present example embodiment it is possible to ensure security in control of entry to a control target area.
- FIG. 27 is a block diagram illustrating an information processing system 700 in a seventh example embodiment.
- the information processing system 700 has a user terminal 710 carried by a user and having a function of reading an image used for a request for entry to a control target area and an information processing apparatus 720 that wirelessly communicates with the user terminal 710 .
- the information processing apparatus 720 has a connection unit 721 that establishes connection to the user terminal 710 by wireless communication, an acquisition unit 722 that acquires terminal identification information transmitted from the user terminal 710 via the wireless communication that has read the image, and a determination unit 723 that determines whether or not to permit the user to enter the control target area based on the terminal identification information.
- the article 200 is stored in the storage room 10 , and when the door 11 of the storage room 10 is unlocked, the user 20 is permitted to enter the storage room 10 and exit the storage room 10 .
- the control target area is not limited to a separate space surrounded by walls, a floor, and a ceiling as with the storage room 10 and may be a space where some of the walls is opened.
- a delivery space partitioned by partitions or the like may be installed in a corner of a shop.
- a passage restriction apparatus may be installed at the entrance of the control target area in order to restrict entry and exit of a user to and from the control target area.
- the passage restriction apparatus is a left-right open/closure type gate apparatus, for example, which is normally closed and is controlled by the edge GW 101 to be opened when the user is permitted to enter and exit the control target area.
- the passage restriction apparatus may have an electric lock 103 . Any configuration of the passage restriction apparatus may be employed, and the door 11 in the example embodiments described above is also included in the category of the passage restriction apparatus.
- an example embodiment may be configured to permit a plurality of persons carrying the user terminals 21 , which are different from each other, to enter the room at the same time.
- a predetermined maximum number of users upper limit number of occupying users.
- the edge GW 101 may acquire a shelf image at any timing to confirm the arrangement of articles while the user 20 is present in the room.
- the edge GW 101 compares a list of the articles 200 created and stored at entry to the room (first list) with a newly created list of the articles 200 (second list), matches voucher numbers of the lists with each other, and thereby can recognize the article 200 not included in the second list from the articles 200 included in the first list.
- the edge GW 101 can determine that the article 200 not included in the second list has been taken by the user 20 out of the shelf 13 .
- the edge GW 101 can determine that the article 200 of the voucher number has been moved by the user 20 . These determination results can be used for unlock control of the electric lock 103 and notification to the user terminal 21 .
- FIG. 28 is a plan view of the storage room 10 in the present example embodiment.
- the storage room 10 is a walk-through type room and has an entry-only door 11 A and an exit-only door 11 B.
- a plurality of shelves 13 are arranged side by side, and a backyard 15 used for storing an article not accommodated in the shelves 13 is provided behind the plurality of shelves 13 . Only the salesclerk of the shop or the distributor worker of a logistics company can enter the backyard 15 via the control door 16 .
- the user 20 takes its own article 200 out of the shelves 13 in accordance with a guidance mail notified to the user terminal 21 or guidance made by the display 109 and the audio terminal 108 . Since the shelf cameras 106 are provided for on a single or multiple shelves 13 basis, inclusion of the user 20 in the view angles of the shelf cameras 106 is reduced.
- the edge GW 101 determines whether or not to permit entry to the storage room 10 by matching list information on MAC addresses of the user terminals 21 carried by the users 20 having passage authority with a MAC address acquired from the user terminal 21 that has read the image of the keyhole seal 12 .
- the edge GW 101 does not store list information in the storage device 134 .
- the edge GW 101 may acquire list information from the management server 31 at a timing of receiving authentication information from the user terminal 21 .
- the edge GW 101 may determine whether or not to permit entry to the storage room 10 by matching list information on MAC addresses of the user terminals 21 that have already established wireless connection currently with a MAC address acquired from the user terminal 21 that has read the image of the keyhole seal 12 .
- the dedicated application is installed in only the user terminals 21 of the users 20 having passage authority and the user terminals 21 can wirelessly connect to the edge GW 101 , it is possible to perform determination of passage permission on the user 20 of the user terminal 21 which has read the image of the keyhole seal 12 out of the terminals wirelessly connected to the edge GW 101 .
- the scope of the example embodiments also includes a processing method that stores, in a storage medium, a program that causes the configuration of each of the example embodiments to operate so as to implement the function of each of the example embodiments described above, reads the program stored in the storage medium as a code, and executes the program in a computer. That is, the scope of each of the example embodiments also includes a computer readable storage medium. Further, each of the example embodiments includes not only the storage medium in which the program described above is stored but also the program itself.
- the storage medium for example, a floppy (registered trademark) disk, a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a magnetic tape, a nonvolatile memory card, or a ROM can be used.
- a floppy (registered trademark) disk for example, a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a magnetic tape, a nonvolatile memory card, or a ROM
- the scope of each of the example embodiments includes an example that operates on OS to perform a process in cooperation with another software or a function of an add-in board without being limited to an example that performs a process by an individual program stored in the storage medium.
- An information processing apparatus comprising:
- connection unit that establishes connection to a user terminal by wireless communication
- an acquisition unit that acquires terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area
- a determination unit that determines whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- the information processing apparatus according to supplementary note 1, wherein the determination unit permits the user to enter the control target area when the terminal identification information is associated with a particular article in the control target area.
- the acquisition unit acquires article identification information transmitted from the user terminal via the wireless communication when the user terminal read a recording medium attached to the article
- the determination unit permits the user to exit the control target area when the article identification information is associated with the terminal identification information.
- the information processing apparatus according to supplementary note 2 or 3, wherein the determination unit refuses entry of a person other than the user to the control target area while the user is present in the control target area.
- the information processing apparatus according to any one of supplementary notes 2 to 4 further comprising a notification unit that notifies the user terminal, which is associated with the user permitted to enter the control target area, of a storage place of the article in the control target area.
- the information processing apparatus according to any one of supplementary notes 1 to 5 further comprising an output unit that outputs alert information when a staying time period in which the user is present in the control target area exceeds a predetermined time period.
- the information processing apparatus according to any one of supplementary notes 1 to 6 further comprising a storage unit that stores the terminal identification information associated with the user authorized to enter the control target area,
- the determination unit permits the user to enter the control target area when the terminal identification information stored in the storage unit matches the terminal identification information acquired by the acquisition unit.
- the storage unit stores key information corresponding to the control target area in association with the terminal identification information
- the acquisition unit acquires the terminal identification information and the key information from the user terminal, and
- the determination unit determines whether or not to permit the user to enter the control target area based on the terminal identification information and the key information.
- the information processing apparatus further comprising a deletion unit that deletes the key information from the storage unit when the user exits the control target area.
- An information processing method comprising:
- a storage medium storing a program that causes a computer to perform:
- An information processing system comprising:
- a user terminal carried by a user and having a function of reading an image used for a request for entry to a control target area
- the information processing apparatus includes
- connection unit that establishes connection to the user terminal by the wireless communication
- an acquisition unit that acquires terminal identification information transmitted via the wireless communication from the user terminal that read the image
- a determination unit that determines whether or not to permit the user to enter the control target area based on the terminal identification information.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Lock And Its Accessories (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
An information processing apparatus includes: a connection unit that establishes connection to a user terminal by wireless communication; an acquisition unit that acquires terminal identification information transmitted from the user terminal via the wireless communication when the user terminal has read an image used for a request for entry to a control target area; and a determination unit that determines whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
Description
- The present application is a continuation application of U.S. patent application Ser. No. 17/287,209 filed on Apr. 21, 2021, which is a National Stage Entry of international application PCT/JP2019/042373 filed on Oct. 29, 2019, which claims the benefit of priority from Japanese Patent Application No. 2018-205060 filed on Oct. 31, 2018, the disclosures of all of which are incorporated in their entirety by reference herein.
- The present invention relates to an information processing apparatus, an information processing method, a storage medium, and an information processing system.
-
Patent Literature 1 discloses an access control system formed of an access control apparatus that controls an electric lock of a door provided at an entrance of a facility, a sign apparatus such as a two-dimensional barcode installed at or near the entrance of the facility, a server that manages information on entry to and exit from the facility, and a user terminal carried by the user of the facility. In this system, the user terminal receives a facility ID, which identifies a facility, from the server and stores the facility ID in a storage device. Then, if a facility ID read from the sign apparatus and the stored facility ID are matched, the user terminal outputs an unlock control signal for the electric lock to the access control apparatus. - PTL 1: Japanese Patent Application Laid-open No. 2016-44402
- In the system disclosed in
Patent Literature 1, a user terminal outputs an unlock control signal to the access control apparatus based on a result of an authentication process at the user terminal. However, the user terminal is a terminal that is managed by a user rather than a manager of the system. Thus, there is room for improvement in terms of security in a system configuration having, on the user terminal side, a function of outputting an unlock control signal. - Accordingly, in view of the problem described above, the example object of the present invention is to provide an information processing apparatus, an information processing method, a storage medium, and an information processing system that can ensure security in control of entry to the control target area.
- According to one example aspect of the present invention, provided is an information processing apparatus including: a connection unit that establishes connection to a user terminal by wireless communication; an acquisition unit that acquires terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and a determination unit that determines whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- According to another example aspect of the present invention, provided is an information processing method including: establishing connection to a user terminal by wireless communication; acquiring terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and determining whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- According to yet another example aspect of the present invention, provided is a storage medium storing a program that causes a computer to perform: establishing connection to a user terminal by wireless communication; acquiring terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and determining whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- According to yet another example aspect of the present invention, provided is an information processing system including: a user terminal carried by a user and having a function of reading an image used for a request for entry to a control target area; and an information processing apparatus that wirelessly communicates with the user terminal, and the information processing apparatus includes a connection unit that establishes connection to the user terminal by the wireless communication, an acquisition unit that acquires terminal identification information transmitted via the wireless communication from the user terminal that read the image, and a determination unit that determines whether or not to permit the user to enter the control target area based on the terminal identification information.
- According to the present invention, an information processing apparatus, an information processing method, a storage medium, and an information processing system that can ensure security in control of entry to the control target area are provided.
-
FIG. 1 is a diagram illustrating an overview of a delivery management system in a first example embodiment. -
FIG. 2 is a schematic diagram illustrating an overall configuration of the delivery management system in the first example embodiment. -
FIG. 3 is a block diagram illustrating a hardware configuration example of an edge gateway in the first example embodiment. -
FIG. 4 is a plan view of a storage room in the first example embodiment. -
FIG. 5 is a front view of shelves in the first example embodiment. -
FIG. 6 is an enlarged view in which one compartment of a shelf is enlarged in the first example embodiment. -
FIG. 7 is a diagram illustrating a method of confirming reception of an article in the first example embodiment. -
FIG. 8 is a diagram illustrating an example of management information stored in a management server in the first example embodiment. -
FIG. 9 is a diagram illustrating an example of permission information stored in an edge gateway in the first example embodiment. -
FIG. 10 is a sequence chart illustrating an example of an article distribution process in the first example embodiment. -
FIG. 11 is a diagram illustrating an example of a window displayed at a user terminal in the first example embodiment. -
FIG. 12 is a sequence chart illustrating an example of an article delivery process in the first example embodiment. -
FIG. 13 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment. -
FIG. 14 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment. -
FIG. 15 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment. -
FIG. 16 is a diagram illustrating an example of a window displayed on the user terminal in the first example embodiment. -
FIG. 17 is a flowchart illustrating an example of an authentication process in the first example embodiment. -
FIG. 18 is a flowchart illustrating an example of an entry process in the first example embodiment. -
FIG. 19 is flowchart illustrating an example of a pickup confirmation process in the first example embodiment. -
FIG. 20 is a flowchart illustrating an example of an exit process in the first example embodiment. -
FIG. 21 is a sequence chart illustrating an example of a control process for entry and exit in a second example embodiment. -
FIG. 22 is a flowchart illustrating an example of an authentication process in the second example embodiment. -
FIG. 23 is a flowchart illustrating an example of a monitor process in a third example embodiment. -
FIG. 24 is a sequence chart illustrating an example of an article delivery process in a fourth example embodiment. -
FIG. 25 is a block diagram illustrating a user terminal in a fifth example embodiment. -
FIG. 26 is a block diagram illustrating an information processing apparatus in a sixth example embodiment. -
FIG. 27 is a block diagram illustrating an information processing system in a seventh example embodiment. -
FIG. 28 is a plan view of a storage room in a modified example embodiment. - Exemplary example embodiments of the present invention will be described below with reference to the drawings. Throughout the drawings, the same components or corresponding components are labeled with the same references, and the description thereof may be omitted or simplified.
-
FIG. 1 a diagram illustrating an overview of adelivery management system 1 in the present example embodiment. Thedelivery management system 1 is an information processing system that manages article delivery in a control target area where a plurality ofarticles 200 are stored. Description will be provided below with astorage room 10 as an example of the control target area. Thestorage room 10 is a cargo container-type facility and is installed in a corner of a parking lot of a shop such as a convenience store. - When purchasing the
article 200 at an EC site, the user may designate pickup at thestorage room 10 as a way to pick up thearticle 200. Thearticle 200 designated for pickup at thestorage room 10 is distributed to thestorage room 10 by a logistics company affiliated with the EC site. In response to completion of distribution of thearticle 200 to thestorage room 10, a message such as an electronic mail indicating the completion of distribution is transmitted from acompany server 33 to auser terminal 21. Thecompany server 33 is a cloud server operated by a logistics company. Theuser terminal 21 is a mobile information terminal such as a smartphone. - Once an electronic mail is received at the
user terminal 21, auser 20 carries theuser terminal 21 and comes to thestorage room 10 to pick up thearticle 200. In theuser terminal 21, an application used for performing access control and article delivery confirmation in the storage room 10 (hereafter, referred to as “dedicated application”) is installed. The dedicated application may be downloaded from thecompany server 33, for example. - The
user 20 starts up the dedicated application in theuser terminal 21 when coming to picking up thearticle 200. Note that the dedicated application may be started up automatically when a predetermined signal is received from amanagement server 31 or the like or when a specified time to pick up thearticle 200 arrives. - When the
user 20 approaches a place within a predetermined distance (for example, within 33 m) from thestorage room 10, the dedicated application in theuser terminal 21 establishes wireless communication by a short-distance wireless scheme (for example, Bluetooth (registered trademark), Wi-Fi, or the like) with an edge gateway (hereafter, referred to as “edge GW”) 101 installed in thestorage room 10. Theuser 20 selects a key number corresponding to thestorage room 10 in a window of the dedicated application of theuser terminal 21. The key number is a code set and registered in advance by theuser 20 for eachstorage room 10. A registration method of a key number will be described later. - Then, after arriving at the entrance of the
storage room 10, theuser 20 uses and causes a camera function of theuser terminal 21 to read an image of akeyhole seal 12 attached near adoor 11 of thestorage room 10. Thekeyhole seal 12 is a sign member indicating thestorage room 10 but may be a member other than a seal. In the image in the present example embodiment, a startup code of an authentication request process for the dedicated application is recorded. That is, this image is an image used for requesting entry to the storage room (control target area) 10 from theedge GW 101. Further, in the example ofFIG. 1 , while the image is a two-dimensional barcode, the type of the image is not limited thereto. The image may be any image that is detected by the dedicated application as a particular sign present near a control target region. The image may be a one-dimensional barcode, a figure, or the like, for example. Further, no identification information on thestorage room 10 is recorded in the image of thekeyhole seal 12 of the present example embodiment. Accordingly, for example, even when a plurality ofstorage rooms 10 are provided together to one shop, acommon keyhole seal 12 can be used forrespective storage rooms 10. - Further, the
user terminal 21 transmits authentication information including a key number and terminal identification information to theedge GW 101 and requests authentication of theuser 20 in response to completion of reading of an image (startup code) of thekeyhole seal 12 as a trigger. Then, in response to authenticating theuser 20, theedge GW 101 unlocks thedoor 11. This enables the user to enter thestorage room 10. - After the
user 20 enters thestorage room 10, thedoor 11 is once locked in order to prevent unauthorized taking-out of thearticle 200. Further, when an open state of thedoor 11 continues for a predetermined time or longer, it is preferable to call attention by voice or the like. Theuser 20 takes thearticle 200, the recipient of which is the user 20 (hereafter, referred to as “target article”), out of thearticles 200 stored on theshelf 13 in accordance with a guidance mail notified to theuser terminal 21 or voice guidance in the room when theuser 20 is in the room. - In response to confirming that the
user 20 has picked up a target article in thestorage room 10, theedge GW 101 permits theuser 20 to exit the room. Herein, the term “permit” refers to outputting an unlock signal for the door 11 (a drive control signal for a bar in a case of a passage restriction apparatus (not illustrated) such as a crossing gate). This enables thedoor 11 to be unlocked. After thedoor 11 is unlocked, theuser 20 takes out the target article and exits thestorage room 10. -
FIG. 2 is a schematic diagram illustrating an overall configuration of the delivery management system in the present example embodiment. Thedelivery management system 1 has theedge GW 101, anexit button 102, anelectric lock 103, atelephone 104, alive camera 105, ashelf camera 106, ahub 107, anaudio terminal 108, adisplay 109, and arouter 110. Theedge GW 101, theexit button 102, thetelephone 104, thelive camera 105, theshelf camera 106, thehub 107, theaudio terminal 108, thedisplay 109, and therouter 110 are installed inside thestorage room 10. Theelectric lock 103 is installed integrally with thedoor 11 that is the entrance and exit of thestorage room 10. Further, theshelf 13 in which the plurality ofarticles 200 are arranged is installed inside thestorage room 10. - The
edge GW 101 is a computer apparatus that controls the overalldelivery management system 1 in thestorage room 10. Information related to theuser 20 who is permitted to enter the storage room 10 (hereafter, referred to as “permission information”) is registered in theedge GW 101 in advance. Specifically, identification information or the like on theuser terminal 21 associated with theuser 20 whose purchasedarticle 200 is stored inside thestorage room 10 is registered. Theedge GW 101 performs authentication of theuser 20 by matching information included in an authentication request received from theuser terminal 21 with the permission information. In response to authenticating theuser 20, theedge GW 101 outputs an unlock signal to theelectric lock 103. Further, theedge GW 101 collects data from thelive camera 105 and theshelf camera 106 and performs processing, analysis, or the like on the collected data. The collected data is transmitted from theedge GW 101 to themanagement server 31 via therouter 110. Theedge GW 101 may also transfer various information to theuser 20 via theaudio terminal 108 or thedisplay 109. Note that thearticle 200 that can be associated with theuser 20 of theuser terminal 21 in advance is not limited to the purchased article in storage, and aparticular article 200 may be associated with theuser 20 of theuser terminal 21. - The
exit button 102 is a button used when theuser 20 present in the room exits thestorage room 10. In response to theexit button 102 being pressed, theedge GW 101 outputs an unlock signal to theelectric lock 103. Note that theexit button 102 of the present example embodiment is set to an available state when exit from the room is permitted at theedge GW 101. - The
electric lock 103 is formed of an actuator such as a solenoid, for example, a dead bolt (gate bar) moved by an actuator, an open/closure sensor, or the like. Theelectric lock 103 moves the position of the dead bolt in response to an unlock signal from theedge GW 101 and thereby enables thedoor 11 to be opened or closed. Further, theelectric lock 103 can also detect open or closure of thedoor 11 in accordance with a signal from the open/closure sensor (not illustrated). Note that theelectric lock 103 is normally locked and may be unlocked only when theuser 20 is authenticated by theedge GW 101. - The
telephone 104 is a direct connect telephone by which theuser 20 communicates with an operator in case of emergency or the like. Further, when theexit button 102 described above is pressed for multiple times when not being in an active state, thetelephone 104 may be ringed by the operator. - The
live camera 105 is a network camera used for monitoring and is used for capturing a moving image of behavior of theuser 20 who has entered the room. Thelive camera 105 is connected to theedge GW 101 via thehub 107, and the captured image data (live image) is stored in theedge GW 101. The image data may be stored in a predetermined file format in order to prevent alteration. - The
shelf camera 106 is a network camera used for watching the shelf and is used for capturing theentire shelf 13 and detecting the arrangement of the article(s) 200 accommodated in theshelf 13. Theshelf camera 106 is connected to theedge GW 101 via thehub 107, the captured image data (shelf image) is stored in theedge GW 101. Theshelf camera 106 has a wide view angle of 100 degrees or greater, for example, and can include theentire shelf 13 within one frame. Further, theshelf camera 106 can capture a full high definition (HD) image of 1920 by 1080 pixels, for example, and can record information (a shelf label, a voucher, or the like) attached to theshelf 13 and thearticle 200 in a high quality image. - The
hub 107 is an interface unit based on a communication specification such as Ethernet (registered trademark), for example, and connects theedge GW 101, thelive camera 105, and theshelf camera 106 to each other. - The
audio terminal 108 is a speaker, for example, and is used for guiding the user who has entered thestorage room 10 by voice. Theaudio terminal 108 is connected to theedge GW 101 and outputs voice in accordance with audio data from theedge GW 101. Theaudio terminal 108 may be a robotic apparatus that can perform communication by voice in addition to a speaker. - The
display 109 is a liquid crystal display or an organic electro luminescence (EL) display, for example, and is used for guiding the user who has entered thestorage room 10 by using an image. Thedisplay 109 is connected to theedge GW 101 and performs display in accordance with image data from theedge GW 101. For example, the position of the article(s) 200 on theshelf 13 is animated on thedisplay 109. Thedisplay 109 may be configured to cooperate with theaudio terminal 108 to provide guidance. Further, thedisplay 109 may be a touch panel and can accept touch entry performed by theuser 20. - The
router 110 has a third generation (3G)/Long Term Evolution (LTE) module, a wireless local area network (LAN), or the like, establishes connection to themanagement server 31 via anetwork 40, and controls data communication between theedge GW 101 and themanagement server 31. Therouter 110 may be one connected to thenetwork 40 in a wired manner or may be built in theedge GW 101. - The
management server 31 is a so-called cloud server and is connected to theedge GW 101 via thenetwork 40 and therouter 110. Themanagement server 31 can transmit and receive data to and from thecompany server 33 by using application programming interface (API). Themanagement server 31 has a database (DB) 32, and thedatabase 32 stores a use history (entry/exit history), a shelf image, or a live image received from theedge GW 101, information received from thecompany server 33, or the like. - The
company server 33 is a so-called cloud server and is connected to themanagement server 31 via thenetwork 40. Thecompany server 33 can transmit and receive data to and from themanagement server 31 by using API. Thecompany server 33 is operated by a logistics company and manages personal information on theuser 20, article information indicating association between theuser 20 and the article 200 (such as a voucher number), the distribution status of thearticle 200, or the like. Note that the number ofcompany servers 33 is not limited, and servers of a plurality of different companies may be installed on the cloud. - The
network 40 is a wide area communication network such as the Internet, for example, and also includes a mobile communication network, a base station, or a relay server of the LTE or the like. A distributor worker terminal such as a smartphone, a tablet computer, or the like operated by a distributor worker of a logistics company may also be connected to thenetwork 40 in addition to theuser terminal 21. -
FIG. 3 is a block diagram illustrating a hardware configuration example of theedge GW 101 in the present example embodiment. Theedge GW 101 has a central processing unit (CPU) 131, a random access memory (RAM) 132, a read only memory (ROM) 133, astorage device 134, and an input/output interface (I/F) 135. TheCPU 131 controls a device connected to theedge GW 101 in accordance with a program stored in theROM 133 or thestorage device 134 and performs a predetermined process such as collection, processing, analysis, or the like on data. - The
RAM 132 is formed of a volatile memory and provides a memory region required for the operation of theCPU 131. TheROM 133 is formed of a nonvolatile memory and stores a program, data, or the like required for operating theedge GW 101. Thestorage device 134 is formed of a solid state drive (SSD), a hard disk drive (HDD), or the like. Thestorage device 134 stores in advance an application program used for image recognition, audio data and image data used for guidance, or the like. Further, thestorage device 134 stores permission information, a use history, a shelf image, a live image, purchase information, or the like as required. TheCPU 131, theRAM 132, and theROM 133 may function as a connection unit, an acquisition unit, a determination unit, a deletion unit, a notification unit, and an output unit, and thestorage device 134 may function as a storage unit. - The input/output I/
F 135 is a wired interface based on a specification such as Universal Serial Bus (USB), Ethernet, RS-232C, RS-485, or the like, and thehub 107, theaudio terminal 108, thedisplay 109, and therouter 110 are connected thereto. Any device can be connected to the input/output I/F 135, and a human-detection sensor, a microphone, a temperature and humidity sensor, a sensor that senses a malfunction of a device, or the like may be connected thereto, for example. - Note that the hardware configuration illustrated in
FIG. 3 is an example, a device other than the above may be added, or some of the devices may not be provided. For example, a part of the function of theedge GW 101 may be provided by another device. -
FIG. 4 is a plan view of thestorage room 10 in the present example embodiment. Thestorage room 10 is a unit house having an area of about 9.9 square meters, for example, and thedoor 11 is provided as the only entrance. Thedoor 11 is locked by theelectric lock 103, and only theuser 20 permitted by theedge GW 101 can enter and exit the room. Theshelf 13 used for accommodating the plurality ofarticles 200 is installed inside thestorage room 10 and along the wall of thestorage room 10. A guidance table 14 is installed near theshelf 13, and theaudio terminal 108 and thedisplay 109 are placed on the guidance table 14. In order for theuser 20 to easily recognize thedisplay 109 visually when entering thestorage room 10 from thedoor 11, the guidance table 14 is installed in front of theshelf 13 when viewed from thedoor 11 side. - Each
live camera 105 is installed above the corner or the like inside thestorage room 10 so that theentire storage room 10 is included in the view angle. Theshelf camera 106 is installed on a wall or the like facing the front of theshelf 13 so that theentire shelf 13 is included in the view angle. - In the
storage room 10, a clock (not illustrated) may be further installed within the view angle of thelive camera 105. By using the clock, the operator monitoring the image from thelive camera 105 is able to easily confirm that thelive camera 105 is normally operating. Furthermore, if an identification number (location code) of thestorage room 10 is indicated near the clock, the installation place of thestorage room 10 is readily recognized, and this facilitates a countermeasure when an anomaly occurs. -
FIG. 5 is a front view of theshelf 13 in the present example embodiment. As illustrated inFIG. 5 , theshelf 13 is partitioned into 10 columns and 10 shelves in the horizontal direction and the vertical direction, respectively. Asingle article 200 can be accommodated in each partitioned compartment, and the maximum 100articles 200 can be accommodated in theentire shelf 13. - It is preferable that the size of each compartment of the
shelf 13 be designed in accordance with the specification of the packing cardboard used by the logistics company. That is, it is preferable that the size of each compartment be slightly larger than a specification of a box in accordance with the specification such as the 60-size, the 80-size, or the like often used in logistics. As an example, the size of each compartment may be a width of 27 cm, a height of 19 cm, and a depth of 32 cm. - The
shelf 13 is formed of a shelf A and a shelf B partitioned into the same size of compartments in the example ofFIG. 5 , however, while the size of each compartment of the shelf A may be designed in accordance with the 60-size, the size of each compartment of the shelf B may be designed in accordance with the 80-size, for example. Further, some partitions of theshelf 13 may be removable and asingle article 200 may be accommodated by using a plurality of compartments so that thearticle 200 packed in a larger box can be accommodated. -
FIG. 6 is an enlarged view in which one compartment of theshelf 13 is enlarged and illustrates thearticle 200 accommodated in a compartment on the fifth shelf of the third column of theshelf 13. Each compartment is labeled with ashelf label 13 a represented by combination of the column number and the shelf number of theshelf 13. For example, the compartment on the fifth shelf of the third column of the shelf A is labeled with theshelf label 13 a in which “A35” is written. Further, it is preferable that aback plate 13 b of each compartment of theshelf 13 be painted in black or the like for easier image detection of thearticle 200. - A
voucher 201 used for identifying eacharticle 200 is attached to the side face of the box of each of all thearticles 200 arranged in theshelf 13. For thearticle 200 designated, at the order placement at an EC site, to be picked up at the delivery space (storage room 10), thevoucher 201 is attached at the time of dispatch of thearticle 200. Further, for thearticle 200 initially designated to be received at home at the time of the order but changed to be picked up at thestorage room 10 because of absence of the recipient or the like, thevoucher 201 is attached by a distributor worker when thearticle 200 is stored in thestorage room 10. For example, the distributor worker carries a compact printer capable of creating thevoucher 201 based on a barcode and is able to cause the printer to read a barcode of theoriginal voucher 201 attached to thearticle 200 and create thevoucher 201 at the site. - As illustrated in
FIG. 6 , avoucher number 201 a and abarcode 201 b are printed in thevoucher 201. Thevoucher number 201 a is identification information used for distribution management of the article 200 (article identification information) and is made up of a 12-digit number, for example. Any form of thevoucher number 201 a is employed and may include both a numeral and an alphabet. To reduce erroneous detection in image recognition, theshelf label 13 a may be represented by only alphabets, and thevoucher number 201 a may be represented by only numerals. Thebarcode 201 b is a two-dimensional barcode such as a QR code (registered trademark) recording thevoucher number 201 a. Note that the name of a destination (recipient), an order number at an EC site, a location code, or the like may be further printed in thevoucher 201. Note that thevoucher 201 is not limited to a paper medium, and various recording mediums that can be read by theuser terminal 21 may be used. -
FIG. 7 is a diagram illustrating a method of confirming reception of thearticle 200 in the present example embodiment. As illustrated inFIG. 7 , a one-dimensional barcode 201 c recording thevoucher number 201 a is further attached to the top face of thearticle 200. Thebarcode 201 c is a part of thevoucher 201. Note that a two-dimensional barcode may be used as thebarcode 201 c in the same manner as thebarcode 201 b. After taking thearticle 200 out from theshelf 13, theuser 20 gets thebarcode 201 c (or thebarcode 201 b) read by using the dedicated application in theuser terminal 21. At this time, theuser terminal 21 transmits thevoucher number 201 a obtained by reading of thebarcode 201 c to theedge GW 101 by wireless communication. Accordingly, theedge GW 101 determines whether or not a voucher number of thearticle 200 from which thebarcode 201 c has been read and a voucher number associated with a target article of theuser 20 are matched. If the two voucher numbers are matched, theedge GW 101 then determines that delivery of a target article is completed and permits theuser 20 to exit the room. - Subsequently, information stored respectively in the
management server 31 and theedge GW 101 for confirming entry/exit of theuser 20 and delivery of thearticle 200 will be described. -
FIG. 8 is a diagram illustrating an example of management information stored by themanagement server 31 in the present example embodiment. Herein, a user ID, a name, a MAC address, start of an available date and time, end of an available date and time, key information, an enable flag, and the like are indicated as an example as data items of the management information. The data items are not limited to the above and may include a contact address, a voucher number, or the like, for example. The user ID is identification information that is unique to eachuser 20 of thedelivery management system 1. The MAC address is identification information that is unique to eachuser terminal 21 and used as authentication information on theuser 20 in the present example embodiment. The start of an available date and time and the end of an available date and time are dates and times of the start and the end of a period in which theuser 20 is able to use thestorage room 10 as the distribution destination. The key information is a key number arbitrarily set by theuser 20 for the storage room (BOX) 10. The enable flag is a flag that is switched to ON when the user is allowed to enter thestorage room 10 by using the key number and switched to OFF when entry is not allowed. For thestorage room 10 for which a key number has been set, when the distribution status indicating completion of distribution is notified from thecompany server 33, the enable flag is turned to ON. When delivery of a target article to theuser 20 is then completed, the enable flag is turned back to OFF. Accordingly, entry of theuser 20 to thestorage room 10 is permitted only when a target article is stored in thestorage room 10. - A registration method of a key number corresponding to the
storage room 10 may be (A) a method of using the dedicated application to read the keyhole seal 12 (barcode) already attached to thestorage room 10 and entering and registering a key number in a state where theuser terminal 21 and theedge GW 101 are in wireless connection, (B) a method of logging in a web site managed by themanagement server 31 from theuser terminal 21 or a personal computer and entering and registering identification information on thestorage room 10 and a key number, or the like. In the case of the method of (A) described above, there is an advantage that theuser 20 can omit entry of a MAC address or identification information on thestorage room 10. -
FIG. 9 is a diagram illustrating an example of permission information stored by theedge GW 101 in the present example embodiment. Herein, a MAC address, an available period, an enable flag, a key number, an article position, a voucher number, and the like are indicated as an example as data items of the permission information. The data items are not limited to the above. For example, a date and time when permission information is registered or an error code or a processing date and time when an authentication request is issued from anunregistered user terminal 21 may be included. The MAC address, the key number, and the enable flag are data items common to the management information described above. The available period is a period in which theuser 20 can enter (access) thestorage room 10. The available period corresponds to a pickup period set by theuser 20 by itself, a certain period from the time (for example, 24 hours, 3 days, 1 week, or the like) when the distributor stored thearticle 200 in thestorage room 10, or the like, for example. The article position is a storage position of thearticle 200 in thestorage room 10. The voucher number is identification information used for distribution management of the stored article 200 (article identification information). - Subsequently, an operation in the
delivery management system 1 configured as described above will be described with reference to the drawings. -
FIG. 10 is a sequence chart illustrating an example of an article distribution process in the present example embodiment. This sequence chart illustrates the process from purchase of thearticle 200 to completion of preparation for pickup of thearticle 200. First, theuser 20 accesses an EC site, which is managed by anEC server 41, from a personal computer at home, theuser terminal 21, or the like and purchases thearticle 200 at the EC site (step S11). It is assumed that, in the purchase, thestorage room 10 is designated by theuser 20 as a place where thearticle 200 is picked up. - The
EC server 41 transmits purchase information including information on the purchasedarticle 200, theuser 20 who made the purchase, the designatedstorage room 10, or the like to the company server 33 (step S12). Thecompany server 33 records the purchase information from theEC server 41 in thedatabase 34 and transmits the purchase information together with a voucher number of thearticle 200 to the management server 31 (step S13). Themanagement server 31 stores the information from thecompany server 33 in thedatabase 32. - If there is no available compartment in the
shelf 13 of thestorage room 10, themanagement server 31 returns an NG notification to the company server 33 (step S14). Thecompany server 33 that has received the NG notification temporarily retains distribution of thearticle 200 until theshelf 13 of thestorage room 10 becomes available. Thecompany server 33 may transmit a mail or the like that requests theuser terminal 21 to change a pickup place. - In response to accommodating the
article 200 in theshelf 13 of thestorage room 10, the distributor worker notifies thecompany server 33 of distribution completion from the distributor worker terminal or the like. In response to the notification from the distributor worker, thecompany server 33 confirms that the distribution of thearticle 200 to thestorage room 10 is completed (step S15). In response to confirming the completion of distribution, thecompany server 33 transmits the distribution status (for example, “distributed”) of thearticle 200 to the management server 31 (step S16). - Furthermore, the
company server 33 transmits, to theuser terminal 21, an electronic mail (arrival mail) indicating that thearticle 200 has arrived at the storage room 10 (step S17).FIG. 11 is a diagram illustrating an example of a window displayed on theuser terminal 21. Herein, a message “The package you ordered has arrived in the designated box.” is displayed on a screen of theuser terminal 21. - The
user 20 who has received the arrival mail may use the link (not illustrated) written in the arrival mail to access the web site managed by themanagement server 31 and specify a pickup date and time of thearticle 200, for example, at the user terminal 21 (step S18). The specifying of a pickup date and time may be omitted. -
FIG. 12 is a sequence chart illustrating an example of an article delivery process in the present example embodiment. This sequence chart illustrates the process from completion of preparation for pickup of thearticle 200 in thestorage room 10 to pickup of the article 200 (target article) by theuser 20. A case where target articles of different users 20A, 20B, and 20C have been stored in thestorage room 10 and the user 20A picks up the target article will be described below as an example. Further, the dedicated application has been installed in advance in theuser terminals 21 carried byrespective users 20, and key numbers to thestorage room 10 have been registered individually byrespective users 20. Further,FIG. 13 toFIG. 16 illustrate an example of display windows of theuser terminal 21, respectively. - First, the
management server 31 transmits, to theedge GW 101, permission information to the users 20A, 20B, and 20C who are recipients of the target articles stored in the storage room 10 (step S101). The permission information includes the MAC address of theuser terminal 21, key information, a voucher number, a pickup date and time, or the like, for example. The MAC address is unique identification information (ID) for eachuser terminal 21. The voucher number is a voucher number of a target article associated with eachuser 20. The pickup date and time is a date and time specified by the user in step S18 ofFIG. 10 . - Next, the
edge GW 101 stores the permission information on the users 20A, 20B, and 20C received from themanagement server 31 in the storage device 134 (step S102). That is, the users 20A, 20B, and 20C are registered in thestorage device 134 as persons authorized to enter thestorage room 10. Note that the process of step S101 and step S102 is performed in a predetermined cycle (for example, at an interval of 15 minutes). Accordingly, the permission information registered in theedge GW 101 is updated to the latest status. For example, when a target article of a user 20D is newly distributed to thestorage room 10, the permission information on the user 20D is added and registered to thestorage device 134 of theedge GW 101. - When the user 20A who has received the arrival mail (see step S17 of
FIG. 10 ) enters the wireless communication coverage of theedge GW 101 from thestorage room 10, the dedicated application of theuser terminal 21 issues a connection request to the edge GW 101 (step S103). In response to receiving the connection request from theuser terminal 21, theedge GW 101 establishes communication connection to theuser terminal 21 by wireless communication (step S104). - Next, the
user terminal 21 accepts selection of key information made by the user 20A on the screen in a state of being connected to the edge GW 101 (step S105) and then displays a message that prompts the user 20A to get thekeyhole seal 12 read. In the example ofFIG. 13 , two types of keys A and B and a message prompting the user to select a key (“Select a key of a box.”) are displayed on the screen of theuser terminal 21. Further, in the example ofFIG. 14 , when the key A has been selected, a message prompting the user to get thekeyhole seal 12 read (“Read a keyhole barcode next to the door read.”) is displayed. - Next, the
user terminal 21 reads a two-dimensional barcode of thekeyhole seal 12, which is attached to the entrance side of thestorage room 10, in accordance with the operation made by the user 20A (step S106) and then transmits an authentication request to theedge GW 101 in accordance with a startup code recorded in the two-dimensional barcode (step S107). The authentication request includes the selected key information and authentication information including the MAC address of theuser terminal 21. In the example ofFIG. 15 , the read two-dimensional barcode and the selected key are displayed on the screen of theuser terminal 21. Such a window is displayed until the authentication process ends, for example. The authentication process in the present example embodiment refers to a process of determining whether or not to permit theuser 20 to enter (access) the storage room 10 (control target area). - Next, the
edge GW 101 performs an authentication process on the user 20A based on the authentication request received from the user terminal 21 (step S108) and, once authenticating the user 20A, transmits an unlock signal to the electric lock 103 (step S109). Thereby, theelectric lock 103 is unlocked, and thedoor 11 is ready to be opened and closed. Note that, if neither opening nor closure of thedoor 11 is detected for a certain period (for example, 5 seconds), theelectric lock 103 is automatically locked. Also if theelectric lock 103 is locked before the user 20A enters the room, it is possible for the user 20A to be re-authenticated by using theuser terminal 21 to perform key selection and image reading again. Furthermore, if the authentication of the user 20A is permitted, it is preferable to allow a companion of the user 20A to enter the room at the same time. - Once the user 20A opens the
door 11, theelectric lock 103 detects opening and closure of thedoor 11 and transmits an open/close notification to the edge GW 101 (step S110). Further, the open/close detection may be performed by an open/close sensor provided to thedoor 11. - Next, in response to authenticating the user 20A, the
edge GW 101 extracts a storage place of the target article by searching for shelf allocation data stored in thestorage device 134 by using the MAC address as a key and notifies theuser terminal 21 of the extracted storage place (step S111). Theuser terminal 21 displays information on the storage place received from theedge GW 101 on the screen (step S112). In the example ofFIG. 16 , a message for guidance of the storage position of the target article (“XXX's package is stored at the following position. A35”) is displayed on the screen of theuser terminal 21. - Next, the
edge GW 101 performs an entry process (step S113). On the other hand, theuser terminal 21 reads thebarcode 201 c written in thevoucher 201 of thearticle 200 as illustrated inFIG. 7 in accordance with the operation performed by the user 20A who has entered the room (step S114) and then transmits read information to the edge GW 101 (step S115). The read information includes the voucher number of the article on reading and the MAC address of theuser terminal 21 that has performed the reading, for example. - Next, the
edge GW 101 performs a delivery confirmation process for the target article based on the received read information (step S116). In response to confirming delivery of the target article to the user 20A, theedge GW 101 permits the user 20A to exit the room. Specifically, theedge GW 101 sets theexit button 102 to an available state (active state). - Next, in response to detecting pressing of the
exit button 102 in an active state, theedge GW 101 transmits an unlock signal to the electric lock 103 (step S117). Thereby, theelectric lock 103 is unlocked, and thedoor 11 is ready to be opened and closed. If neither opening nor closure of thedoor 11 is detected for a certain period (for example, 5 seconds), theelectric lock 103 is automatically locked. If theelectric lock 103 is locked before the user 20A exits the room, it is possible for the user 20A to exit the room by pressing theexit button 102 again. - The user 20A opens the
door 11, and theelectric lock 103 then detects opening and closure of thedoor 11 and transmits an open/close notification to the edge GW 101 (step S118). In response to receiving the open/close notification about thedoor 11, theedge GW 101 performs an exit process (step S119). - Next, the
edge GW 101 transmits, to themanagement server 31, delivery information on the target article related to the user 20A who has exited the room (step S120). The delivery information includes a voucher number of a target article and the MAC address of theuser terminal 21, for example. In response to receiving the delivery information, themanagement server 31 updates the management information. Specifically, the status associated with the voucher number is updated to “delivered”, and the enable flag is updated to “OFF”. - The
edge GW 101 then disconnects the wireless connection from the user terminal 21 (step S121) and deletes the permission information related to theuser terminal 21, which was connected, from the storage device 134 (step S122). Note that, while the record may be deleted on a MAC address basis from thedatabase 32, the enable flag associated to the MAC address may be updated to “OFF”. Further, the key information associated with the MAC address may be deleted. In any cases, theedge GW 101 can restrict re-entry after the user 20A has exited the room. -
FIG. 17 is a flowchart illustrating an example of an authentication process in the present example embodiment. This process represents the details of step S108 ofFIG. 12 . First, theedge GW 101 acquires the authentication information transmitted from the user terminal 21 (step S201) and then determines whether or not the MAC address included in the authentication information and the MAC address registered as the permission information are matched each other (step S202). Herein, if theedge GW 101 determines that the MAC addresses are matched (step S202: YES), the process proceeds to step S204. - In contrast, if the
edge GW 101 determines that the MAC addresses are not matched (step S202: NO), theedge GW 101 outputs error information to the user terminal 21 (step S203) and ends the process. An example of the error information in step S203 may be a message such as “Your package is not stored in the box.”, for example. - In step S204, the
edge GW 101 determines whether or not the key number included in the authentication information and the key number in thestorage device 134 are matched each other. Herein, if theedge GW 101 determines that the key numbers are matched (step S204: YES), the process proceeds to step S206. In contrast, if theedge GW 101 determines that the key numbers are not matched (step S204: NO), theedge GW 101 outputs error information to the user terminal 21 (step S205) and ends the process. An example of the error information in step S205 may be a message such as “Key numbers are not matched.”, “Key is invalid.”, or the like, for example. - In step S206, the
edge GW 101 determines whether or not thestorage room 10 is vacant based on information or the like from thelive camera 105. Herein, if theedge GW 101 determines that thestorage room 10 is vacant (step S206: YES), the process proceeds to step S208. In contrast, if theedge GW 101 determines that thestorage room 10 is not vacant (step S206: NO), theedge GW 101 outputs error information to the user terminal 21 (step S207) and ends the process. That is, when acertain user 20 is present in the room, entry of anotheruser 20 to the room is refused. An example of the error information in step S207 may be a message such as “The storage room is currently occupied. Please wait for a while.” or the like, for example. Note that theedge GW 101 may perform control not to display a barcode reading window on theuser terminal 21 instead of error output of step S207. Similarly, theedge GW 101 may instruct theuser terminal 21 to display a message such as “The room is occupied. No barcode reading is available.” or the like. - In step S208, the
edge GW 101 permits the user 20A carrying theuser terminal 21 to enter the room and ends the process. This enables theedge GW 101 to output an unlock signal to theelectric lock 103. -
FIG. 18 is a flowchart illustrating an example of an entry process in the present example embodiment. This process illustrates the details of step S113 ofFIG. 12 . First, theedge GW 101 starts capturing a moving image by using the live camera 105 (step S301) and determines whether or not entry of the user 20A to the room is detected (step S302). For example, theedge GW 101 performs motion detection by analyzing image data from thelive camera 105. Thelive camera 105 may have a function of motion detection. Further, a human-detection sensor or the like may be provided inside thestorage room 10. Note that, without being limited to a moving image, theedge GW 101 may acquire static images captured at predetermined intervals from thelive camera 105. - If no entry to the room is detected (step S302: NO), the
edge GW 101 stands by until entry to the room is detected. If entry to the room is detected (step S302: YES), theedge GW 101 uses thelive camera 105 to acquire a face image of the user 20A who has entered the room (step S303) and uses theshelf camera 106 to acquire a shelf image (step S304). Herein, the acquired shelf image is an image of theshelf 13 immediately after the user 20A has entered thestorage room 10, which indicates the state before thearticle 200 arranged on theshelf 13 is taken out by the user 20A. The process from step S301 to step S304 is not necessarily performed sequentially and may be performed in parallel. - Next, the
edge GW 101 stores the arrangement of all thearticles 200 accommodated in theshelf 13 based on the shelf image (step S305). For example, theedge GW 101 reads information of thevoucher 201 and theshelf label 13 a by using an image recognition technology such as Optical Character Recognition (OCR) and stores the voucher number of thearticle 200 in thestorage device 134 in association with theshelf label 13 a. That is, a list of thearticles 200 accommodated in the shelf 13 (shelf allocation data) is created. - Next, the
edge GW 101 guides the user 20A who has entered the room for the position of the article 200 (step S306). For example, theedge GW 101 makes announcement such as “Your package is on the second shelf of the first column of shelf A. See the screen for details.” by using theaudio terminal 108 and displays the layout of theshelf 13 and the position of thearticle 200 by using thedisplay 109. The user 20A confirms the position of thearticle 200 displayed on thedisplay 109 in accordance with voice guidance. The user 20A then moves to the front of theshelf 13 and takes thearticle 200 out of theshelf 13. Note that, since theedge GW 101 guides theuser terminal 21 for the article position after completion of the authentication process (see step S112 ofFIG. 12 ), the process of step S306 may be omitted. -
FIG. 19 is a flowchart illustrating an example of a delivery confirmation process in the present example embodiment. This process represents the details of step S116 ofFIG. 12 and is performed when theuser terminal 21 reads thebarcode 201 c of thevoucher 201 attached to thearticle 200. - First, the
edge GW 101 acquires a voucher number of the target article from thestorage device 134 based on the MAC address of theuser terminal 21 of the user 20A who has entered the room (step S401) and acquires a voucher number of the article on the reading from the read information (step S402). - Next, the
edge GW 101 determines whether or not the two acquired voucher numbers are matched each other (step S403). Herein, if theedge GW 101 determines that the voucher numbers are matched (step S403: YES), theedge GW 101 permits the user 20A to exit the room (step S405) and ends the process. In contrast, if theedge GW 101 determines that the voucher numbers are not matched (step S403: NO), theedge GW 101 outputs error information to theuser terminal 21 or the audio terminal 108 (step S404), and the process returns to step S402. - An example of the error information in step S404 may be a message such as “Please check the contents of the voucher. It is not your package.”, “Your package is on the second shelf of the first column of shelf A. See the screen for details.”, or the like.
-
FIG. 20 is a flowchart illustrating an example of an exit process in the present example embodiment. This process represents the details of step S119 ofFIG. 12 . First, theedge GW 101 determines whether or not exit of the user 20A from the room is detected by using the live camera 105 (step S501). If exit from the room is not detected (step S501: NO), theedge GW 101 stands by until exit from the room is detected. - Next, if exit of the user 20A from the room is detected (step S501: YES), the
edge GW 101 acquires a shelf image of theshelf 13 by using the shelf camera 106 (step S502). Herein, the acquired shelf image is an image of theshelf 13 captured immediately after the user 20A has exited thestorage room 10, which indicates the state after thearticle 200 arranged on theshelf 13 has been taken out by the user 20A. - Next, the
edge GW 101 stores the arrangement of all thearticles 200 accommodated on theshelf 13 based on the shelf image (step S503). Theedge GW 101 reads information of thevoucher 201 and theshelf label 13 a and stores the information of thevoucher 201 of thearticle 200 in thestorage device 134 in association with theshelf label 13 a. Further, theedge GW 101 stops capturing a moving image performed by the live camera 105 (step S504). - Finally, the
edge GW 101 stores a use history of the user 20A in the storage device 134 (step S505). The use history includes the MAC address of theuser terminal 21 carried by the user 20A or entry/exit time information, for example. Furthermore, theedge GW 101 stores data of a face image of the user 20A, a shelf image at entry/exit, the article arrangement on theshelf 13 acquired from the shelf image, a moving image from the time of entry to the time of exit, or the like in thestorage device 134. The moving image is stored as a file on a unit of one minute, for example. Furthermore, theedge GW 101 transmits data of a use history, a face image, the article arrangement, a moving image, or the like stored in thestorage device 134 to themanagement server 31. Such data may be transmitted to themanagement server 31 in response to a request from themanagement server 31. - As described above, according to the present example embodiment, the
user terminal 21 reads the barcode of thekeyhole seal 12 near the entrance of thestorage room 10, and theedge GW 101 then receives an authentication request including terminal identification information (MAC address) from theuser terminal 21 in a state where wireless communication connection between theedge GW 101 and theuser terminal 21 is established. Since the wireless communication connection is established, theedge GW 101 can readily determine whether or not to permit theuser 20 carrying theuser terminal 21 to enter (access) thestorage room 10 based on the received terminal identification information. Accordingly, it is possible to shorten the required time from the time theuser terminal 21 transmits an authentication request to theedge GW 101 to the time theedge GW 101 unlocks theelectric lock 103 and ensure security in access control of the storage room (control target area) 10. - Further, according to the present example embodiment, the
edge GW 101 permits entry to thestorage room 10 provided that theuser 20 is the recipient of thearticle 200 stored inside thestorage room 10. Thus, even when the person is theuser 20 whose key information and terminal identification information are registered in themanagement server 31, theedge GW 101 can restrict entry to thestorage room 10 attempted by a person when no target article of the person is stored in thestorage room 10. - Further, according to the present example embodiment, when the
user 20 is present in the lockedstorage room 10, since theedge GW 101 refuses authentication (does not allow entry) of theuser 20 even when the permission information (terminal identification information) thereon is registered in thestorage device 134, it is possible to individually control entry to and exit from thestorage room 10. - Further, according to the present example embodiment, when the
user 20 takes an article out of theshelf 13 of thestorage room 10 and if a voucher number (identification information) of thearticle 200 from which the voucher has been read and a voucher number of a target article associated with theuser terminal 21 are matched each other, theuser 20 is permitted to exit thestorage room 10. Accordingly, it is possible to suppress theuser 20 from taking awrong article 200 out of thestorage room 10 thus manage delivery of thearticle 200 in an unattended manner. - Further, the conventional delivery box requires a locking mechanism to be provided for each box that accommodates an article and thus is expensive. In contrast, according to the present example embodiment, since only a single locking mechanism is required for the
storage room 10 in whichmany articles 200 may be stored, it is possible to configure a relatively less expensive system. Further, since thestorage room 10 can be installed outside a shop, it is possible to avoid a reduction in a sales floor space. Further, unlike the delivery box, thearticle 200 can be accommodated in asimple shelf 13, and it is therefore possible to efficiently storemany articles 200. - Further, according to the present example embodiment, since authentication is performed using the
user terminal 21 carried by theuser 20, thekeyhole seal 12, and theedge GW 101, it is no longer required to install a card reader apparatus that reads an IC card used for authentication at the entrance as seen in the conventional configuration, and it is possible to reduce the cost for construction and operation of the facility. Further, theuser 20 is no longer required to carry an IC card used for authentication and is able to enter and exit thestorage room 10 by using only theuser terminal 21. - Further, since a two-dimensional barcode printed in the
keyhole seal 12 of the present example embodiment does not include identification information on thestorage room 10, thesame keyhole seal 12 can be similarly attached to adifferent storage room 10. It is therefore possible to avoid wrong attachment of thekeyhole seal 12 that would be caused by a worker, and it is possible to reduce the manufacturing cost of thekeyhole seal 12. Further, because of the common seal, there is an advantage of easier replacement of thekeyhole seal 12 when thekeyhole seal 12 is broken. - Furthermore, in the authentication process of the present example embodiment, since authentication is performed by matching key information selected by the
user terminal 21 and terminal identification information on theuser terminal 21 with key information (key number) and terminal identification information registered by theuser 20 in themanagement server 31, respectively, the security level can be improved. - An access control system in a second example embodiment will be described below. The present example embodiment differs from the first example embodiment in that a target article of the
user 20 is not required to be stored inside the control target area and that no key information is used. The control target area in the present example embodiment may be not only an indoor area such as a guest room in a hotel, a laboratory in a company, a factory, and the like but also an outdoor facility such as a theme park, for example. Further, while the hardware configuration of the present example embodiment is common to that of the first example embodiment, a control method for entry to and exit from a room (entry to and exit from a facility) is partially different. Specifically, the process such as the delivery confirmation process for thearticle 200, the notification process for a guidance mail of the article position, the analysis process of the article position based on a shelf image, and the like in the first example embodiment will be omitted. The operation of the access control system in the present example embodiment will be described below. -
FIG. 21 is a sequence chart illustrating an example of a control process for entry and exit in the present example embodiment. Herein, a case where the user 20A enters and exits a control target area will be described as an example. Further, the dedicated application has been installed in advance in theuser terminal 21 carried by the user 20A. - First, the
management server 31 transmits, to theedge GW 101, permission information for the users 20A, 20B, and 20C to be permitted to enter the control target area (step S601). The permission information includes the MAC address of theuser terminal 21, an available date and time of a facility that is the control target area, or the like, for example. - Next, the
edge GW 101 stores the permission information on the users 20A, 20B, and 20C received from themanagement server 31 in the storage device 134 (step S602). Note that the process of step S601 to step S602 is performed in a predetermined cycle (for example, at an interval of 15 minutes). Accordingly, the permission information registered in theedge GW 101 is updated to the latest status. - When the user 20A enters the wireless communication coverage of the
edge GW 101 from the control target area, the dedicated application in theuser terminal 21 issues a connection request to the edge GW 101 (step S603). In response to receiving the connection request from theuser terminal 21, theedge GW 101 establishes communication connection to theuser terminal 21 by wireless communication (step S604). - Next, the
user terminal 21 reads the two-dimensional barcode of thekeyhole seal 12 in response to the operation performed by the user 20A in accordance with guidance displayed on the screen (step S605) and then transmits an authentication request to theedge GW 101 in accordance with a startup code recorded in the two-dimensional barcode (step S606). The authentication request includes authentication information including the MAC address of theuser terminal 21. - Next, the
edge GW 101 performs an authentication process on the user 20A based on the authentication request received from the user terminal 21 (step S607). After the authentication of the user 20A, theedge GW 101 transmits an unlock signal to the electric lock 103 (step S608). This causes theelectric lock 103 to be unlocked and enable thedoor 11 to be opened and closed. Note that, if neither opening nor closure of thedoor 11 is detected for a certain period (for example, 5 seconds), theelectric lock 103 is automatically locked. Also if theelectric lock 103 is locked before the user 20A enters the room, it is possible for the user 20A to be re-authenticated by using theuser terminal 21 to perform barcode reading of thekeyhole seal 12 again. - Once the user 20A opens the
door 11, theelectric lock 103 detects opening and closure of thedoor 11 and transmits an open/close notification to the edge GW 101 (step S609). Further, the open/close detection may be performed by an open/close sensor provided to thedoor 11. - Next, the
edge GW 101 performs an entry process (step S610, seeFIG. 18 ). If pressing of theexit button 102 by the user 20A present in the room is not detected (step S611: NO), theedge GW 101 stands by until pressing of theexit button 102 is detected. If theedge GW 101 detects pressing of the exit button 102 (step S611: YES), theedge GW 101 then transmits an unlock signal to the electric lock 103 (step S612). Thereby, theelectric lock 103 is unlocked, and thedoor 11 is ready to be opened and closed. If neither opening nor closure of thedoor 11 is detected for a certain period (for example, 5 seconds), theelectric lock 103 is automatically locked. If theelectric lock 103 is locked before the user 20A exits the room, it is possible for the user 20A to exit the room by pressing theexit button 102 again. - The user 20A opens the
door 11, and theelectric lock 103 then detects opening and closure of thedoor 11 and transmits an open/close notification to the edge GW 101 (step S613). In response to receiving the open/close notification about thedoor 11, theedge GW 101 performs an exit process (step S614, seeFIG. 20 ). - Next, the
edge GW 101 transmits, to themanagement server 31, exit information related to the user 20A who has exited the room (step S615). The exit information includes the MAC address of theuser terminal 21 or entry/exit time information, for example. In response to receiving the exit information, themanagement server 31 updates the management information in thedatabase 32. - The
edge GW 101 then disconnects the wireless connection from the user terminal 21 (step S616) and deletes the permission information related to theuser terminal 21, which was connected, from the storage device 134 (step S617). Note that, while the record may be deleted on a MAC address basis from thedatabase 32, the enable flag associated to the MAC address may be updated to “OFF”. Further, the key information associated with the MAC address may be deleted. In any cases, theedge GW 101 can restrict re-entry after the user 20A has exited the room. -
FIG. 22 is a flowchart illustrating an example of an authentication process in the present example embodiment. This process represents the details of step S607 ofFIG. 21 . First, theedge GW 101 acquires authentication information transmitted from the user terminal 21 (step S701) and then determines whether or not the MAC address included in the authentication information and the MAC address registered as the permission information are matched each other (step S702). Herein, if theedge GW 101 determines that the two MAC addresses are matched (step S702: YES), the process proceeds to step S704. - In contrast, if the
edge GW 101 determines that the MAC addresses are not matched (step S702: NO), theedge GW 101 outputs error information to the user terminal 21 (step S703) and ends the process. An example of the error information in step S703 may be a message such as “Your terminal is not registered.”, for example. - In step S704, the
edge GW 101 permits the user 20A carrying theuser terminal 21 to enter the room and ends the process. This enables theedge GW 101 to output an unlock signal to theelectric lock 103. - As described above, according to the present example embodiment, entry of the
user 20 to a control target area can be controlled based on wireless communication between theuser terminal 21 carried by theuser 20 and theedge GW 101 in the same manner as in the first example embodiment. - The
delivery management system 1 in a third example embodiment will be described below. The present example embodiment further has a function of outputting alert information based on a staying time period of theuser 20 inside thestorage room 10, which makes a difference from the first example embodiment. The operation of thedelivery management system 1 in the present example embodiment will be described below. -
FIG. 23 is a flowchart illustrating an example of a monitoring process in the present example embodiment. This process is performed when entry of theuser 20 to the room is detected. - First, the
edge GW 101 measures the staying time period that theuser 20 stays in the storage room 10 (step S801) and determines whether or not the staying time period exceeds a predetermined threshold (for example, 5 minutes) (step S802). Herein, if theedge GW 101 determines that the staying time period exceeds the predetermined threshold (step S802: YES), theedge GW 101 outputs an alert to theuser terminal 21, theaudio terminal 108, thedisplay 109, themanagement server 31, and the like (step S803). In contrast, if theedge GW 101 determines that the staying time period is less than or equal to the predetermined threshold (step S802: NO), the process proceeds to step S804. - In step S804, the
edge GW 101 determines whether or not exit of theuser 20 from the room is detected. Herein, if theedge GW 101 detects exit of theuser 20 from the room (step S804: YES), the process ends. In contrast, if theedge GW 101 does not detect exit of theuser 20 from the room (step S804: NO), the process returns to step S801. - As described above, according to the
delivery management system 1 in the present example embodiment, theedge GW 101 detects a state where theuser 20 has stayed in thestorage room 10 over a predetermined time period and outputs alert information. Thus, theedge GW 101 can suitably manage the staying time period of theuser 20 inside thestorage room 10 and thereby can suppress an unauthorized activity and early detect an anomaly in thestorage room 10. - The
delivery management system 1 in a fourth example embodiment will be described below. The present example embodiment differs from the first example embodiment in the order of process steps in the article delivery process. The operation of thedelivery management system 1 in the present example embodiment will be described below. -
FIG. 24 is a sequence chart illustrating an example of the article delivery process in the present example embodiment. This sequence chart represents the process from completion of preparation for pickup of thearticle 200 in thestorage room 10 to pickup of thearticle 200 by theuser 20. A case where target articles of the different users 20A, 20B, and 20C have been stored in thestorage room 10 and the user 20A picks up the target article will be described below as an example. Further, the dedicated application has been installed in advance in theuser terminals 21 carried byrespective users 20, and key numbers to thestorage room 10 have been registered individually byrespective users 20. - First, the
management server 31 transmits, to theedge GW 101, permission information to the users 20A, 20B, and 20C who are recipients of the articles stored in the storage room 10 (step S901). The permission information includes the MAC address of theuser terminal 21, key information, a voucher number, a pickup date and time, or the like, for example. The MAC address is unique identification information (ID) for eachuser terminal 21. The voucher number is a voucher number of a target article associated with eachuser 20. The pickup date and time is a date and time specified by the user in step S18 ofFIG. 10 . - Next, the
edge GW 101 stores the permission information on the users 20A, 20B, and 20C received from themanagement server 31 in the storage device 134 (step S902). Note that the process of step S901 to step S902 is performed in a predetermined cycle (for example, at an interval of 15 minutes). Accordingly, the permission information registered in theedge GW 101 is updated to the latest status. For example, when the article of the user 20D is newly distributed to thestorage room 10, the permission information on the user 20D is added and registered to thestorage device 134 of theedge GW 101. - Next, the
user terminal 21 starts up the dedicated application in accordance with the operation of the user 20A and accepts selection of key information made by the user 20A on the screen (step S903, seeFIG. 13 ) and then displays a message that prompts the user 20A to get thekeyhole seal 12 read (seeFIG. 14 ). - Next, the
user terminal 21 reads a two-dimensional barcode of the keyhole seal 12 (step S904) and then issues a connection request to the edge GW 101 (step S905). That is, the dedicated application of theuser terminal 21 defines completion of reading of the two-dimensional barcode as the transmission condition for a connection request. Note that, when theuser terminal 21 is present in communication coverages of a plurality ofedge GWs 101, it is preferable for theuser terminal 21 to issue a connection request targeted to theedge GW 101 having the highest radio intensity. In response to receiving the connection request from theuser terminal 21, theedge GW 101 establishes communication connection with theuser terminal 21 via wireless communication (step S906). - Next, the
user terminal 21 transmits an authentication request to theedge GW 101 in accordance with a startup code recorded in the two-dimensional barcode (step S907). The authentication request includes the selected key information and authentication information including the MAC address of theuser terminal 21. - Next, the
edge GW 101 performs an authentication process on the user 20A based on the authentication request received from the user terminal 21 (step S908) and, once authenticating the user 20A, transmits an unlock signal to the electric lock 103 (step S909). Thereby, theelectric lock 103 is unlocked, and thedoor 11 is ready to be opened and closed. Note that, if neither opening nor closure of thedoor 11 is detected for a certain period (for example, 5 seconds), theelectric lock 103 is automatically locked. Also if theelectric lock 103 is locked before the user 20A enters the room, it is possible for the user 20A to be re-authenticated by using theuser terminal 21 to perform key selection and barcode reading again. - Once the user 20A opens the
door 11, theelectric lock 103 detects opening and closure of thedoor 11 and transmits an open/close notification to the edge GW 101 (step S910). Further, the open/close detection may be performed by an open/close sensor provided to thedoor 11. - Next, in response to authenticating the user 20A, the
edge GW 101 extracts a storage place of the target article by searching for shelf allocation data stored in thestorage device 134 by using the MAC address as a key and notifies theuser terminal 21 of the extracted storage place (step S911). Theuser terminal 21 displays information on the storage place received from theedge GW 101 on the screen (step S912, seeFIG. 16 ). - Next, the
edge GW 101 performs an entry process (step S913). On the other hand, theuser terminal 21 reads thebarcode 201 c written in thevoucher 201 of thearticle 200 as illustrated inFIG. 7 in accordance with the operation performed by the user 20A who has entered the room (step S914) and then transmits read information to the edge GW 101 (step S915). The read information includes the voucher number of the article on reading and the MAC address of theuser terminal 21 that has performed the reading, for example. - Next, the
edge GW 101 performs a delivery confirmation process for the target article based on the received read information (step S916). In response to confirming delivery of thearticle 200 to the user 20A, theedge GW 101 permits the user 20A to exit the room. Specifically, theedge GW 101 sets theexit button 102 to an available state (active state). - Next, in response to detecting pressing of the
exit button 102 in an active state, theedge GW 101 transmits an unlock signal to the electric lock 103 (step S917). Thereby, theelectric lock 103 is unlocked, and thedoor 11 is ready to be opened and closed. If neither opening nor closure of thedoor 11 is detected for a certain period (for example, 5 seconds), theelectric lock 103 is automatically locked. If theelectric lock 103 is locked before the user 20A exits the room, it is possible for the user 20A to exit the room by pressing theexit button 102 again. - The user 20A opens the
door 11, and theelectric lock 103 then detects opening and closure of thedoor 11 and transmits the open/close notification to the edge GW 101 (step S918). In response to receiving the open/close notification about thedoor 11, theedge GW 101 performs an exit process (step S919). - Next, the
edge GW 101 transmits, to themanagement server 31, delivery information on the target article related to the user 20A who has exited the room (step S920). The delivery information includes a voucher number of a target article and the MAC address of theuser terminal 21, for example. In response to receiving the delivery information, themanagement server 31 updates the management information. Specifically, the status associated with the voucher number is updated to “delivered”, and the enable flag is updated to “OFF”. - The
edge GW 101 then disconnects the wireless connection from the user terminal 21 (step S921) and deletes the permission information related to theuser terminal 21, which was connected, from the storage device 134 (step S922). Note that, while the record may be deleted from thedatabase 32, the enable flag associated with the MAC address may be set to “OFF”. Accordingly, after taking the article out of thestorage room 10, the user 20A is restricted to enter thestorage room 10. - As described above, according to the present example embodiment, entry to the
storage room 10 and exit from thestorage room 10 made by theuser 20 can be controlled based on wireless communication between theuser terminal 21 carried by theuser 20 and theedge GW 101 in the same manner as in the first example embodiment. - The
delivery management system 1 in a fifth example embodiment will be described below. The present example embodiment differs from the first example embodiment in that theuser terminal 21 further has a determination function and a display control function.FIG. 25 is a block diagram illustrating theuser terminal 21 in the present example embodiment. As illustrated inFIG. 25 , theuser terminal 21 has awireless communication unit 21 a, a determination unit 21 b, and adisplay control unit 21 c. The function of each unit is implemented by the dedicated application installed in theuser terminal 21. - The
wireless communication unit 21 a wirelessly communicates with theedge GW 101, themanagement server 31, thecompany server 33, and the like based on a communication specification such as Bluetooth, Wi-Fi, LTE, or the like. The determination unit 21 b determines necessity of a window transition, a window content to be displayed on the display, or the like based on reception information from theedge GW 101. A specific example of the information received from theedge GW 101 may be, for example, the use status of thestorage room 10, an error code (an error related to no registration of terminal identification information, an error related to invalidation of key information, an error of wireless connection to theedge GW 101, or the like), data of a processed result in theedge GW 101, or the like. Thedisplay control unit 21 c controls the window content to be displayed on the display based on a determination result from the determination unit 21 b. - The determination unit 21 b can receive, from the
edge GW 101, reception information indicating that any ofusers 20 is using thestorage room 10 at a timing when wireless connection between thewireless communication unit 21 a and theedge GW 101 is established, for example. In such a case, the determination unit 21 b determines not to allow a transition to the barcode reading window in the dedicated application. Based on the determination result, thedisplay control unit 21 c may then display a message such as “The room is occupied. No entry now.”, “The room is occupied. No barcode reading now.”, or the like in the window and change the window content so that a transition to the barcode reading window is disabled. Accordingly, in a situation where entry to thestorage room 10 is restricted, theuser 20 is not required to move to the front of thestorage room 10 and use and operate theuser terminal 21 to read thekeyhole seal 12, and theuser 20 can be notified of a message on the screen indicating that entry to the room is not allowed. -
FIG. 26 is a block diagram illustrating aninformation processing apparatus 60 in a sixth example embodiment. Theinformation processing apparatus 60 has aconnection unit 61 that establishes connection to a user terminal by wireless communication, anacquisition unit 62 that acquires terminal identification information transmitted from the user terminal via the wireless communication when the user terminal has read an image used for a request for entry to a control target area, and adetermination unit 63 that determines whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information. According to theinformation processing apparatus 60 in the present example embodiment, it is possible to ensure security in control of entry to a control target area. -
FIG. 27 is a block diagram illustrating aninformation processing system 700 in a seventh example embodiment. Theinformation processing system 700 has auser terminal 710 carried by a user and having a function of reading an image used for a request for entry to a control target area and aninformation processing apparatus 720 that wirelessly communicates with theuser terminal 710. Theinformation processing apparatus 720 has aconnection unit 721 that establishes connection to theuser terminal 710 by wireless communication, anacquisition unit 722 that acquires terminal identification information transmitted from theuser terminal 710 via the wireless communication that has read the image, and adetermination unit 723 that determines whether or not to permit the user to enter the control target area based on the terminal identification information. According to theinformation processing system 700 in the present example embodiment, it is possible to ensure security in control of entry to a control target area. - Although the present invention has been described above with reference to the example embodiments, the present invention is not limited to the example embodiments described above. Various modifications that can be understood by those skilled in the art can be made to the configuration and details of the present invention within the scope not departing from the spirit of the present invention. For example, it should be understood that an example embodiment in which a configuration of a part of any of the example embodiments is added to another example embodiment or replaced with a configuration of a part of another example embodiment is an example embodiment to which the present invention may be applied.
- For example, in the first example embodiment described above, the
article 200 is stored in thestorage room 10, and when thedoor 11 of thestorage room 10 is unlocked, theuser 20 is permitted to enter thestorage room 10 and exit thestorage room 10. However, the control target area is not limited to a separate space surrounded by walls, a floor, and a ceiling as with thestorage room 10 and may be a space where some of the walls is opened. For example, as a control target area, a delivery space partitioned by partitions or the like may be installed in a corner of a shop. Furthermore, a passage restriction apparatus may be installed at the entrance of the control target area in order to restrict entry and exit of a user to and from the control target area. The passage restriction apparatus is a left-right open/closure type gate apparatus, for example, which is normally closed and is controlled by theedge GW 101 to be opened when the user is permitted to enter and exit the control target area. The passage restriction apparatus may have anelectric lock 103. Any configuration of the passage restriction apparatus may be employed, and thedoor 11 in the example embodiments described above is also included in the category of the passage restriction apparatus. - Further, although it is determined whether or not to permit the entry of the
user 20 to the room based on whether or not thestorage room 10 is vacant in the first example embodiment described above, an example embodiment may be configured to permit a plurality of persons carrying theuser terminals 21, which are different from each other, to enter the room at the same time. For example, in thestorage room 10 storing bicycles or the like, it may be possible to permit entry to the room when the number ofusers 20 present in the room is less than a predetermined maximum number of users (upper limit number of occupying users). - Further, although the arrangement of articles is acquired from the shelf image only when the user is entering and exiting the room in the example embodiments described above, the
edge GW 101 may acquire a shelf image at any timing to confirm the arrangement of articles while theuser 20 is present in the room. Theedge GW 101 compares a list of thearticles 200 created and stored at entry to the room (first list) with a newly created list of the articles 200 (second list), matches voucher numbers of the lists with each other, and thereby can recognize thearticle 200 not included in the second list from thearticles 200 included in the first list. Theedge GW 101 can determine that thearticle 200 not included in the second list has been taken by theuser 20 out of theshelf 13. Further, when information in theshelf label 13 a associated with the same voucher number is different between lists, theedge GW 101 can determine that thearticle 200 of the voucher number has been moved by theuser 20. These determination results can be used for unlock control of theelectric lock 103 and notification to theuser terminal 21. - Further, although the case where the
storage room 10 has one entrance has been illustrated as an example in the above example embodiments, the number of entrances is not limited to one.FIG. 28 is a plan view of thestorage room 10 in the present example embodiment. Thestorage room 10 is a walk-through type room and has an entry-onlydoor 11A and an exit-only door 11B. In thestorage room 10, a plurality ofshelves 13 are arranged side by side, and abackyard 15 used for storing an article not accommodated in theshelves 13 is provided behind the plurality ofshelves 13. Only the salesclerk of the shop or the distributor worker of a logistics company can enter thebackyard 15 via thecontrol door 16. In thestorage room 10, while moving from theentry door 11A to theexit door 11B, theuser 20 takes itsown article 200 out of theshelves 13 in accordance with a guidance mail notified to theuser terminal 21 or guidance made by thedisplay 109 and theaudio terminal 108. Since theshelf cameras 106 are provided for on a single ormultiple shelves 13 basis, inclusion of theuser 20 in the view angles of theshelf cameras 106 is reduced. - Further, in the example embodiments described above, the
edge GW 101 determines whether or not to permit entry to thestorage room 10 by matching list information on MAC addresses of theuser terminals 21 carried by theusers 20 having passage authority with a MAC address acquired from theuser terminal 21 that has read the image of thekeyhole seal 12. However, there may be an example embodiment in which theedge GW 101 does not store list information in thestorage device 134. For example, theedge GW 101 may acquire list information from themanagement server 31 at a timing of receiving authentication information from theuser terminal 21. Further, theedge GW 101 may determine whether or not to permit entry to thestorage room 10 by matching list information on MAC addresses of theuser terminals 21 that have already established wireless connection currently with a MAC address acquired from theuser terminal 21 that has read the image of thekeyhole seal 12. For example, when the dedicated application is installed in only theuser terminals 21 of theusers 20 having passage authority and theuser terminals 21 can wirelessly connect to theedge GW 101, it is possible to perform determination of passage permission on theuser 20 of theuser terminal 21 which has read the image of thekeyhole seal 12 out of the terminals wirelessly connected to theedge GW 101. - The scope of the example embodiments also includes a processing method that stores, in a storage medium, a program that causes the configuration of each of the example embodiments to operate so as to implement the function of each of the example embodiments described above, reads the program stored in the storage medium as a code, and executes the program in a computer. That is, the scope of each of the example embodiments also includes a computer readable storage medium. Further, each of the example embodiments includes not only the storage medium in which the program described above is stored but also the program itself.
- As the storage medium, for example, a floppy (registered trademark) disk, a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a magnetic tape, a nonvolatile memory card, or a ROM can be used. Further, the scope of each of the example embodiments includes an example that operates on OS to perform a process in cooperation with another software or a function of an add-in board without being limited to an example that performs a process by an individual program stored in the storage medium.
- The whole or part of the example embodiments disclosed above can be described as, but not limited to, the following supplementary notes.
- An information processing apparatus comprising:
- a connection unit that establishes connection to a user terminal by wireless communication;
- an acquisition unit that acquires terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and
- a determination unit that determines whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- The information processing apparatus according to
supplementary note 1, wherein the determination unit permits the user to enter the control target area when the terminal identification information is associated with a particular article in the control target area. - The information processing apparatus according to
supplementary note 2, - wherein the acquisition unit acquires article identification information transmitted from the user terminal via the wireless communication when the user terminal read a recording medium attached to the article, and
- wherein the determination unit permits the user to exit the control target area when the article identification information is associated with the terminal identification information.
- The information processing apparatus according to
supplementary note - The information processing apparatus according to any one of
supplementary notes 2 to 4 further comprising a notification unit that notifies the user terminal, which is associated with the user permitted to enter the control target area, of a storage place of the article in the control target area. - The information processing apparatus according to any one of
supplementary notes 1 to 5 further comprising an output unit that outputs alert information when a staying time period in which the user is present in the control target area exceeds a predetermined time period. - The information processing apparatus according to any one of
supplementary notes 1 to 6 further comprising a storage unit that stores the terminal identification information associated with the user authorized to enter the control target area, - wherein the determination unit permits the user to enter the control target area when the terminal identification information stored in the storage unit matches the terminal identification information acquired by the acquisition unit.
- The information processing apparatus according to supplementary note 7,
- wherein the storage unit stores key information corresponding to the control target area in association with the terminal identification information,
- wherein the acquisition unit acquires the terminal identification information and the key information from the user terminal, and
- wherein the determination unit determines whether or not to permit the user to enter the control target area based on the terminal identification information and the key information.
- The information processing apparatus according to supplementary note 8 further comprising a deletion unit that deletes the key information from the storage unit when the user exits the control target area.
- An information processing method comprising:
- establishing connection to a user terminal by wireless communication;
- acquiring terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and
- determining whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- A storage medium storing a program that causes a computer to perform:
- establishing connection to a user terminal by wireless communication;
- acquiring terminal identification information transmitted from the user terminal via the wireless communication when the user terminal read an image used for a request for entry to a control target area; and
- determining whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information.
- An information processing system comprising:
- a user terminal carried by a user and having a function of reading an image used for a request for entry to a control target area; and
- an information processing apparatus that wirelessly communicates with the user terminal,
- wherein the information processing apparatus includes
- a connection unit that establishes connection to the user terminal by the wireless communication,
- an acquisition unit that acquires terminal identification information transmitted via the wireless communication from the user terminal that read the image, and
- a determination unit that determines whether or not to permit the user to enter the control target area based on the terminal identification information.
- This application is based upon and claims the benefit of priority from Japanese Patent Application No. 2018-205060, filed on Oct. 31, 2018, the disclosure of which is incorporated herein in its entirety by reference.
-
- 1 delivery management system
- 10 storage room (control target area)
- 11 door
- 12 keyhole seal (sign member)
- 13 shelf
- 13 a shelf label
- 13 b back plate
- 14 guidance table
- 15 backyard
- 16 control door
- 101 edge GW
- 102 exit button
- 103 electric lock
- 104 telephone
- 105 live camera
- 106 shelf camera
- 107 hub
- 108 audio terminal
- 109 display
- 110 router
- 131 CPU
- 132 RAM
- 133 ROM
- 134 storage device
- 135 input/output I/F
- 20, 20A, 20B, 20C, 20D user
- 21 user terminal
- 21 a wireless communication unit
- 21 b determination unit
- 21 c display control unit
- 200 article
- 201 voucher
- 31 management server
- 32 database
- 33 company server
- 34 database
- 41 EC server
- 60 information processing apparatus
- 61 connection unit
- 62 acquisition unit
- 63 determination unit
- 700 information processing system
- 710 user terminal
- 720 information processing apparatus
- 721 connection unit
- 722 acquisition unit
- 723 determination unit
Claims (10)
1. An information processing apparatus comprising:
a storage that stores terminal identification information associated with a user authorized to enter a control target area;
a memory configured to store instructions; and
a processor configured to execute the instructions to:
connect to a user terminal by wireless communication;
acquire terminal identification information transmitted from the user terminal via the wireless communication when the user terminal reads an image used for a request for entry to a control target area;
determine whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information that is stored in the storage and the terminal identification information that is acquired; and
delete the terminal identification information from the storage when the user exits the control target area.
2. The information processing apparatus according to claim 1 , wherein the processor is configured to execute the instructions to permit the user to enter the control target area when the terminal identification information is associated with a particular article in the control target area.
3. The information processing apparatus according to claim 2 ,
wherein the processor is configured to execute the instructions to acquire article identification information transmitted from the user terminal via the wireless communication when the user terminal read a recording medium attached to the article, and
permit the user to exit the control target area when the article identification information is associated with the terminal identification information.
4. The information processing apparatus according to claim 2 , wherein the processor is configured to execute the instructions to refuse entry of a person other than the user to the control target area while the user is present in the control target area.
5. The information processing apparatus according to claim 2 , wherein the processor is further configured to execute the instructions to notify the user terminal, which is associated with the user permitted to enter the control target area, of a storage place of the article in the control target area.
6. The information processing apparatus according to claim 1 , wherein the processor is further configured to execute the instructions to output alert information when a staying time period in which the user is present in the control target area exceeds a predetermined time period.
7. The information processing apparatus according to claim 1 ,
wherein the processor is configured to execute the instructions to permit the user to enter the control target area when the terminal identification information that is stored in the storage matches the terminal identification information that is acquired.
8. The information processing apparatus according to claim 7 ,
wherein the storage stores key information corresponding to the control target area in association with the terminal identification information,
wherein the processor is configured to execute the instructions to acquire the terminal identification information and the key information from the user terminal, and
determine whether or not to permit the user to enter the control target area based on the terminal identification information and the key information.
9. An information processing method comprising:
storing terminal identification information in a storage associated with a user authorized to enter a control target area;
connecting to a user terminal by wireless communication;
acquiring terminal identification information transmitted from the user terminal via the wireless communication when the user terminal reads an image used for a request for entry to a control target area;
determining whether or not to permit a user carrying the user terminal to enter the control target area based on the terminal identification information that is stored in the storage and the terminal identification information that is acquired; and
deleting the terminal identification information from the storage when the user exits the control target area.
10. An information processing system comprising:
a user terminal carried by a user and having a function of reading an image used for a request for entry to a control target area; and
an information processing apparatus that wirelessly communicates with the user terminal,
wherein the information processing apparatus includes
a storage that stores terminal identification information associated with a user authorized to enter a control target area;
a memory configured to store instructions; and
a processor configured to execute the instructions to:
connect to the user terminal by the wireless communication,
acquire terminal identification information transmitted via the wireless communication from the user terminal that reads the image,
determine whether or not to permit the user to enter the control target area based on the terminal identification information that is stored in the storage and the terminal identification information that is acquired; and
delete the terminal identification information from the storage when the user exits the control target area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/829,441 US20220292900A1 (en) | 2018-10-31 | 2022-06-01 | Information processing apparatus, information processing method, storage medium, and information processing system |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2018205060 | 2018-10-31 | ||
JP2018-205060 | 2018-10-31 | ||
PCT/JP2019/042373 WO2020090815A1 (en) | 2018-10-31 | 2019-10-29 | Information processing device, information processing method, recording medium, and information processing system |
US202117287209A | 2021-04-21 | 2021-04-21 | |
US17/829,441 US20220292900A1 (en) | 2018-10-31 | 2022-06-01 | Information processing apparatus, information processing method, storage medium, and information processing system |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/287,209 Continuation US11410480B2 (en) | 2018-10-31 | 2019-10-29 | Information processing apparatus, information processing method, storage medium, and information processing system |
PCT/JP2019/042373 Continuation WO2020090815A1 (en) | 2018-10-31 | 2019-10-29 | Information processing device, information processing method, recording medium, and information processing system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220292900A1 true US20220292900A1 (en) | 2022-09-15 |
Family
ID=70463226
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/287,209 Active US11410480B2 (en) | 2018-10-31 | 2019-10-29 | Information processing apparatus, information processing method, storage medium, and information processing system |
US17/829,441 Abandoned US20220292900A1 (en) | 2018-10-31 | 2022-06-01 | Information processing apparatus, information processing method, storage medium, and information processing system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/287,209 Active US11410480B2 (en) | 2018-10-31 | 2019-10-29 | Information processing apparatus, information processing method, storage medium, and information processing system |
Country Status (4)
Country | Link |
---|---|
US (2) | US11410480B2 (en) |
JP (1) | JP7393724B2 (en) |
CN (1) | CN112997221B (en) |
WO (1) | WO2020090815A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11410480B2 (en) * | 2018-10-31 | 2022-08-09 | Nec Corporation | Information processing apparatus, information processing method, storage medium, and information processing system |
FI130737B1 (en) * | 2022-01-14 | 2024-02-20 | Framery Oy | Controlling communication of a detector-defined space |
JP2024088284A (en) * | 2022-12-20 | 2024-07-02 | 株式会社ダイフク | Automatic Driving Equipment Control System |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130124855A1 (en) * | 2011-11-14 | 2013-05-16 | Ca, Inc. | Using qr codes for authenticating users to atms and other secure machines for cardless transactions |
US20170257358A1 (en) * | 2016-03-04 | 2017-09-07 | ShoCard, Inc. | Method and System for Authenticated Login Using Static or Dynamic Codes |
US20180107880A1 (en) * | 2016-10-18 | 2018-04-19 | Axis Ab | Method and system for tracking an object in a defined area |
US20200099892A1 (en) * | 2018-09-20 | 2020-03-26 | Board Of Regents, The University Of Texas System | Surveillance systems and methods for automatic real-time monitoring |
US11410480B2 (en) * | 2018-10-31 | 2022-08-09 | Nec Corporation | Information processing apparatus, information processing method, storage medium, and information processing system |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005120579A (en) | 2003-10-14 | 2005-05-12 | Mitsubishi Electric Corp | Entrance/exit managing system |
JP4339707B2 (en) * | 2004-01-23 | 2009-10-07 | 株式会社エヌ・ティ・ティ・ドコモ | Electronic lock control system and electronic lock control method |
JP4344303B2 (en) | 2004-10-06 | 2009-10-14 | 三菱電機ビルテクノサービス株式会社 | Entrance / exit management system |
CN103337110B (en) * | 2012-08-15 | 2015-06-24 | 上海达速物联网科技发展有限公司 | Locker system and method adopting locker system for goods storage and pickup |
JP6142672B2 (en) | 2013-05-28 | 2017-06-07 | 三菱電機株式会社 | Entrance / exit management system |
CN105447659B (en) * | 2014-08-18 | 2020-02-07 | 江苏苏宁物流有限公司 | Method and system for realizing logistics self-service |
JP6232354B2 (en) | 2014-08-20 | 2017-11-15 | ホーチキ株式会社 | Entrance / exit management system |
JP5686269B1 (en) | 2014-10-06 | 2015-03-18 | 株式会社東京保証 | Lock opening and closing device and lock opening and closing system |
EP3330908A1 (en) * | 2016-12-02 | 2018-06-06 | Starship Technologies OÜ | System and method for securely delivering packages to different delivery recipients with a single vehicle |
JP2018145601A (en) | 2017-03-01 | 2018-09-20 | Connected Design株式会社 | Mobile terminal, unlocking management system, unlocking management method and program |
CN108198296B (en) | 2017-12-27 | 2020-12-15 | 广东林盟科技有限公司 | WIFI positioning-based access control method and system |
CN108537479B (en) | 2018-03-16 | 2020-08-04 | 河海大学常州校区 | Intelligent carpet type self-service express delivery signing-in system based on Internet of things |
CN108597132A (en) | 2018-04-03 | 2018-09-28 | 广州市宝比万像软件科技有限公司 | Unmanned delivery of cargo point management-control method, management and control devices and unmanned delivery of cargo point control platform |
US11380150B2 (en) * | 2020-02-04 | 2022-07-05 | Alarm.Com Incorporated | User detection |
-
2019
- 2019-10-29 US US17/287,209 patent/US11410480B2/en active Active
- 2019-10-29 JP JP2020553936A patent/JP7393724B2/en active Active
- 2019-10-29 WO PCT/JP2019/042373 patent/WO2020090815A1/en active Application Filing
- 2019-10-29 CN CN201980072103.XA patent/CN112997221B/en active Active
-
2022
- 2022-06-01 US US17/829,441 patent/US20220292900A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130124855A1 (en) * | 2011-11-14 | 2013-05-16 | Ca, Inc. | Using qr codes for authenticating users to atms and other secure machines for cardless transactions |
US20170257358A1 (en) * | 2016-03-04 | 2017-09-07 | ShoCard, Inc. | Method and System for Authenticated Login Using Static or Dynamic Codes |
US20180107880A1 (en) * | 2016-10-18 | 2018-04-19 | Axis Ab | Method and system for tracking an object in a defined area |
US20200099892A1 (en) * | 2018-09-20 | 2020-03-26 | Board Of Regents, The University Of Texas System | Surveillance systems and methods for automatic real-time monitoring |
US11410480B2 (en) * | 2018-10-31 | 2022-08-09 | Nec Corporation | Information processing apparatus, information processing method, storage medium, and information processing system |
Also Published As
Publication number | Publication date |
---|---|
CN112997221B (en) | 2023-06-16 |
WO2020090815A1 (en) | 2020-05-07 |
JPWO2020090815A1 (en) | 2021-09-24 |
CN112997221A (en) | 2021-06-18 |
US11410480B2 (en) | 2022-08-09 |
JP7393724B2 (en) | 2023-12-07 |
US20210383627A1 (en) | 2021-12-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220292900A1 (en) | Information processing apparatus, information processing method, storage medium, and information processing system | |
US11798334B2 (en) | Locker adaption system and related method for consumer in-door, out-door and curbside goods delivery and pickup services and for merchant store pickup services | |
JP7482383B2 (en) | Delivery management system, management server, delivery management method, and program recording medium | |
EP2229767B1 (en) | Method and apparatus for connecting and operating lockers for home deliveries via video interphones and remotely via a virtual doorman | |
WO2020171635A1 (en) | Smart vending machine allowing product to be selected by opening door | |
KR101945688B1 (en) | Method for managing apartment using local area network | |
US10777056B2 (en) | Mobile storage, tracking and security system and method thereof | |
KR102107203B1 (en) | Parking breaker open/close system using portable phone of resident to automatically enter vehicle by parking breaker using KIOSK terminal or tablet PC | |
JP5584604B2 (en) | Apartment house system | |
JP6782387B1 (en) | Delivery system, delivery method, and open / close control device | |
JP2011090395A (en) | Security system | |
JP2008025278A (en) | Comings/goings management system and method | |
JP2014233564A (en) | Article collection device | |
JP2003196765A (en) | System for confirming moving object and authentication recording medium | |
JP2020115247A (en) | Unlocking system for auto-locking door | |
JP7004946B2 (en) | Containment Box System, Containment Box Management Equipment and Methods | |
JP2002117426A (en) | Report system for customer information, in-coming and out-going management system, report method for customer information, and in-coming and out-going management method | |
JP2006163788A (en) | Visitor management method and management system | |
JP2018072885A (en) | Storage information providing system | |
KR20080071227A (en) | System and method for managing articles | |
CA3191879A1 (en) | Monitoring package pickups using video | |
JP2024104161A (en) | Locking and unlocking control system | |
CN117831184A (en) | License plate intelligent recognition system suitable for wisdom garden |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |