WO2006006533A1 - Personal identification system, personal identification method, personal identification program, and recording medium - Google Patents

Personal identification system, personal identification method, personal identification program, and recording medium Download PDF

Info

Publication number
WO2006006533A1
WO2006006533A1 PCT/JP2005/012676 JP2005012676W WO2006006533A1 WO 2006006533 A1 WO2006006533 A1 WO 2006006533A1 JP 2005012676 W JP2005012676 W JP 2005012676W WO 2006006533 A1 WO2006006533 A1 WO 2006006533A1
Authority
WO
WIPO (PCT)
Prior art keywords
personal
sensor
individual
personal identification
personal authentication
Prior art date
Application number
PCT/JP2005/012676
Other languages
French (fr)
Japanese (ja)
Inventor
Atsuyoshi Nakamura
Mineichi Kudo
Jun Toyama
Hidetoshi Nonaka
Original Assignee
National University Corporation Hokkaido University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University Corporation Hokkaido University filed Critical National University Corporation Hokkaido University
Priority to JP2006529007A priority Critical patent/JPWO2006006533A1/en
Publication of WO2006006533A1 publication Critical patent/WO2006006533A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities

Definitions

  • the present invention relates to a personal authentication method, and particularly to a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium that authenticate an individual by integrating a plurality of pieces of information obtained at low cost. .
  • Patent Document 1 Japanese Patent Laid-Open No. 08-16788
  • Patent Document 1 the user must be aware of the authentication operation such as bringing his face close to the camera or placing his finger on the sensor. There is a problem that the operation is both cumbersome and also has a great psychological influence such as making the user feel uneasy!
  • the conventional authentication method is vulnerable to environmental changes during authentication. For example, if the illumination, its brightness, angle, etc. change, the accuracy of face authentication will decrease drastically, and fingerprint authentication may not be possible if your finger is injured.
  • the present invention provides a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium capable of executing personal authentication using information obtained at low cost without making the user aware of it.
  • the purpose is to provide.
  • a personal authentication system includes a personal feature extraction sensor for extracting a personal feature to be authenticated, an environmental information sensor for detecting the personal environmental information, and the personal Personal authentication means for authenticating the individual based on the characteristics and the environmental information.
  • the personal feature extraction sensor authenticates the individual based on the personal feature extracted from the individual to be authenticated, and the environmental information sensor detects the environmental information detected from the individual. It is possible to perform personal authentication by integrating multiple personal characteristics and environmental information, which are information that can be obtained at low cost.
  • FIG. 1 is a block diagram showing a configuration of a personal authentication device according to an embodiment of the present invention.
  • FIG.2 A diagram showing an example of a personal identification rule configured by a Bayesian network
  • FIG.3 Diagram showing a specific example of personal authentication using a personal identification rule configured by Bayesian network
  • FIG. 1 is a block diagram showing a configuration of a personal authentication system 100 according to an embodiment of the present invention.
  • the personal authentication system 100 includes a personal authentication device 10, a plurality of personal feature extraction sensors 20-1 to 20-n (n is a natural number), and a plurality of environmental information sensors 30-1 to 30.
  • M m is a natural number
  • clock 40 clock 40
  • Internet 50 multiple tracking sensors 60—1 to 60—k (k is a natural number)
  • high-precision personal identification device 70 and personal schedule 80.
  • the personal authentication device 10 includes a personal authentication unit 11, a candidate narrowing unit 12, a personal identification rule 13, and a personal identification rule update unit 14.
  • the personal authentication means 11 includes personal feature information from a plurality of personal feature extraction sensors 20-l to 20-n, a plurality of environmental information sensors 30-l to 30-m, a clock 40, and the Internet 50. And the personal identification according to the personal identification rule 13 shown in Figure 2 below. I testify.
  • Candidate narrowing means 12 includes sensor outputs from a plurality of tracking sensors 60-l-60-k and authentication information from high-precision personal authentication device 70 (for example, an ID card, a password, a face image). , Fingerprint, iris) and candidates to be authenticated based on personal schedule 80.
  • the candidate narrowing means 12 may be omitted when the number of candidates to be authenticated is not necessarily required for the system, for example, when the candidate to be authenticated is a family or the like.
  • the authentication information from the high-accuracy personal authentication device 70 can be used, and if there are many candidates to be authenticated, it is effective because the candidates to be authenticated can be narrowed down.
  • the personal identification rule 13 is stored in advance in a database (not shown), and is used by the personal authentication means 11 for authentication.
  • the personal identification rule update means 14 Since the personal identification rule update means 14 has begun to use this device, it is possible to correctly authenticate the user power when the authentication accuracy of the personal authentication device 10 is poor or when personal authentication is difficult. The result of failure is fed back by voice or the like, and the personal identification rule 13 used by the personal authentication means 11 is updated.
  • This personal identification rule updating means 14 may also be omitted if the personal identification rule 13 which is not necessarily required for this system can be designed with high initial authentication accuracy. However, if it is difficult to authenticate the individual, such as when individual characteristics change, the parameters of the personal identification rule 13 are changed so that the authentication accuracy is improved while authenticating according to the personal identification rule 13, and personal identification is performed. This is effective because it can improve the authentication accuracy of Rule 13.
  • the plurality of personal feature extraction sensors 20-1 to 20-n are used to collect the user's personal feature information such as the individual's position, height, weight, sitting height, face width, shoulder height, odor, and clothing color. Obtain and output to personal authentication means 11. Further, the plurality of environmental information sensors 30-1 to 30-m acquire environmental information such as temperature, humidity, atmospheric pressure, sunshine, solar radiation, wind, rain, snow, and the like, and output them to the personal authentication means 11. The clock 40 measures the time and outputs it to the personal authentication means 11. In addition, the Internet 50 acquires weather information and other Web page information and outputs them to the personal authentication means 11.
  • the user is authenticated by the high-precision authentication device 70 using an ID card, a password, a face image, a fingerprint, and an iris and enters the office or the hall.
  • tracking sensors 60-1 to 60-k for example, multiple infrared sensors are embedded in the ceiling of the office or in the building, or multiple pressure sensors are embedded on the floor. The movement of the user after entering the building is sensed by these tracking sensors 61-l-60-k. In addition, as the tracking sensors 60-1 to 60-k, it is also possible to grasp personal movement information using GPS (Global Positioning System).
  • GPS Global Positioning System
  • the personal authentication system 100 performs personal authentication by the following processing.
  • the position, height, weight, sitting height, face width, shoulders of the individual are detected by a plurality of personal feature extraction sensors 20-1 to 20-n arranged near the location.
  • the user's personal characteristic information such as height, smell, and clothing color is acquired and output to the personal authentication means 11.
  • distance sensors provided on the ceiling, walls, pillars, etc. in offices and buildings can be used.
  • a pressure sensor embedded in the floor of the office or the building.
  • an individual's odor can be used.
  • a color sensor can be used to detect the color of clothes.
  • the information obtained from the distance sensor and the color sensor can extract the power of one or more cameras.
  • environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, snow, etc. in the office or in the hall where the environmental information sensor is located
  • environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, snow, etc. in the office or in the hall where the environmental information sensor is located
  • environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, snow, etc.
  • a barometric sensor can be used to detect barometric pressure.
  • a wind sensor can be used to detect wind. If it detects rain, a rain sensor can be used. If it detects snow, a snow sensor can be used.
  • the clock 40 can be used for detecting the day of the week and the time.
  • the Internet 50 can be used to detect weather information and other Web page information.
  • the personal authentication means 11 uses the personal feature extraction sensors 20-1 to 20-n to determine the position, height, weight, sitting height, face width, shoulder height, smell, Acquire personal characteristics such as color, and acquire environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, and snow from environmental information sensors 30-1 to 30-m, clock 40 and Internet 50.
  • the personal characteristics and environment information acquired by the personal authentication means 11 of the present embodiment for performing personal authentication are an infrared sensor, a pressure sensor, an odor sensor, a personal feature extraction sensor such as an image processing result, etc. 20 — It is low-cost information that can be obtained without making the user aware of it using l-20-n. Therefore, the user does not need to perform troublesome operations or operations such as bringing his face close to the camera or inputting an ID or password for authentication.
  • the high-precision personal information such as fingerprints and irises from the high-precision personal authentication device 70 is used by the candidate narrowing down means 12 to narrow down the user candidates, the personal authentication means 11 Do not use accurate information for personal authentication. In the present embodiment, it is not essential to detect all of the individual position, height, weight, sitting height, face width, shoulder height, odor, clothing color, etc. Of course, it is also possible to detect one or more pieces of information.
  • the candidate narrowing means 12 includes high-precision authentication information such as fingerprints and irises from the high-precision personal authentication device 70, tracking information from the tracking sensors 60-1 to 60-k, and a database. From the personal schedule 80 stored in the service (not shown), the user candidates who receive the service at that location are narrowed down. It should be noted that the candidate narrowing down means 12 is not necessarily required to use all of the tracking information from the tracking sensors 60-l to 60-k and the personal schedule 80. Of course, you can use it in combination with the high-precision authentication information from the high-precision personal authentication device 70!
  • personal authentication means 1 1 is the personal information obtained from the personal feature extraction sensors 20-l to 20-n, such as personal position, height, weight, sitting height, face width, shoulder height, odor, clothing color, and environmental information sensor 30 — 1-30—m
  • It is not mandatory to use all environmental information such as temperature, humidity, weather information, day of the week, time of day, etc. obtained from the clock, clock 40 and Internet 50. It is advisable to use personal features and use any one or more environmental information to identify the individual.
  • the personal authentication device 10 of the present embodiment confirmation is made to the user, for example, by voice or display.
  • the user refers to the voice, display, etc. to determine whether the authentication of the personal authentication means 11 is correct, and feeds back the result by voice, key operation, etc., and inputs it to the personal identification rule update means 14 To do.
  • the personal identification rule update means 14 updates the personal identification rule 13 used by the personal authentication means 11 based on the authentication result fed back by voice or key operation. As a result, even if the authentication accuracy of the personal authentication device 10 is poor or it is difficult to identify an individual because it is starting to use, the personal identification rule 13 is updated according to the user who uses this device. , It will be possible to authenticate correctly.
  • FIG. 2 is a diagram illustrating an example of a personal identification rule configured by a Bayesian network.
  • the personal identification rule 13 used by the personal authentication means 11 for personal authentication is constituted by a Bayesian network.
  • a Bayesian network is a form of representation of the joint probability distribution of multiple variables, and it can be used to calculate the probability distribution of unknown variable values.
  • variable nodes 1, Y2, ⁇ , Ym corresponding to the temperature, humidity, weather, time, etc., which are the environmental information from the environmental information sensors 30-1 to 30-m, respectively. It has a personal identification variable node Z as a child, and as a child of the personal identification variable node Z, from the personal feature extraction sensor 2 0-1 to 20-n, individual height, weight, face width, shoulder height, etc.
  • This is a Bayesian network with a structure having individual characteristic information variable nodes XI, X2,.
  • the Z value z that maximizes the posterior probability in S can be found by the following (Equation 2). Is possible.
  • the personal authentication means 11 recognizes the user corresponding to z thus obtained as the user who is going to receive the service.
  • the personal identification rule update means 14 the output when the obtained personal characteristics and environmental information are input to the personal identification rule 13 is close to the personal identification result obtained by feedback. Update identification rule 13.
  • the updating method by the personal identification rule updating means 14 differs depending on what personal identification rule 13 is used. For example, in the case of Fig. 2, the probabilities P (Y), ⁇ ( ⁇ ), ...
  • the estimated value of I z) will be updated. Updates to estimates are obtained through feedback.
  • the inference result data can be estimated by adding to the existing data.
  • the probabilities P (Y), ⁇ ( ⁇ ), ⁇ , ⁇ ( ⁇ ) are not used in (Equation 1) and (Equation 2).
  • the personal characteristics and the environmental information of the past three times of the personal characteristics and the environmental information when the user ⁇ and the user ⁇ have come to the place where the personal authentication device 10 is arranged are as shown in Table 1.
  • Table 2 shows the personal characteristics and environmental information of the users who came to the location. In this example, for simplification, only height and weight are used as personal characteristics, and only weather, day of the week, and time are used as environmental information.
  • the user candidates receiving the service are narrowed down to user A or user B by the candidate narrowing means 12.
  • This estimation is actually automatically performed based on the identification rule learned from the data in Table 1. Specifically, if the conditional probabilities of various data in Table 1 are obtained by Laplace estimation, a Bayesian network as shown in Fig. 3 is created. When a certain probability and a certain probability of B are obtained, they become 1Z4 and 3Z4, respectively, and therefore it can be estimated that the probability of being a user power is high.
  • the present invention is not limited to this.
  • the user power will come to the place where the personal authentication device 10 is installed or will not come, or the time required to come to the place where the personal authentication device 10 is placed will be greatly affected by the result of a sport game being broadcast on television. If it is possible to use it, it is possible to use the information on the game results that can be obtained from a specific page of the Internet as environmental information.
  • the user can receive a personalized service without performing a special operation for authentication, that is, without being aware of the authentication, thereby improving user convenience. Can do.
  • the candidate narrowing down means 12 uses high-precision personal authentication information such as an ID card, a personal identification number, a face image, and a fingerprint from the high-precision personal authentication device 70, and Tracking information such as infrared sensors embedded in the ceiling and pressure sensors embedded in the floor 60-l-60-k user movement detection information, and information stored in a database etc. Therefore, the personal authentication means 11 narrows down the individual candidates to be authenticated, so that the number of individual candidates to be authenticated by the personal authentication means 11 decreases, and the speed and burden of the authentication process is reduced. Can be reduced.
  • high-precision personal authentication information such as an ID card, a personal identification number, a face image, and a fingerprint from the high-precision personal authentication device 70
  • Tracking information such as infrared sensors embedded in the ceiling and pressure sensors embedded in the floor 60-l-60-k user movement detection information, and information stored in a database etc. Therefore, the personal authentication means 11 narrows down the individual candidates to be authenticated, so that the number of individual candidates to be authentic
  • the personal authentication means 11 since the personal authentication means 11 inputs various personal characteristics and environmental information into the personal identification rule 13 by the Bayesian network, personal identification is performed. Personal authentication can be performed accurately and easily.
  • the personal identification rule update means 14 feeds back the personal authentication result of the personal identification rule 13 and updates the personal identification rule 13. Even if the authentication accuracy of the personal authentication device 10 is low or it is difficult to identify an individual when using this device, it is possible to adaptively change the number of personal identification rules 13 through actual personal authentication processing. Therefore, the accuracy of personal authentication can be improved.
  • the configuration of personal authentication system 100 has been described in terms of hardware by showing a block diagram, but the present invention is not limited to this.
  • a CPU and a node data that stores a program for executing the CPU as described above.
  • a general-purpose computer-powered personal authentication system 100 such as a PC having a storage device such as a disk memory may be executed in software.
  • the personal authentication program for performing the function as the personal authentication system 100 can be recorded on a recording medium such as a CD, a flash memory, or a USB memory.
  • the recording medium strength personal authentication program is read and installed in a storage device in the computer, or downloaded and stored from a server or the like via a network such as the Internet. Store in the device.
  • a general-purpose computer such as a PC can execute the personal authentication described above by executing the personal authentication program that functions as the personal authentication system 100 described above.
  • the personal authentication system, personal authentication method, personal authentication program, and recording medium according to the present invention can execute personal authentication using information obtained at low cost without making the user aware of it. It is useful as a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium for authenticating an individual by integrating a plurality of information. It is also useful for providing personalized services to users of home appliances connected to multiple home appliances such as TVs, personal computers, refrigerators, lighting, and air conditioning.

Abstract

A personal identification system for identifying a person without causing the person to perceive it by using information collected at low cost. In the system, personal feature extracting sensors (20-1 to no-n) extracts personal features such as the height and weight from the person to be identified, environment information sensors (30-1 to 30-m) detect environment information including the temperature, weather, and time, personal identification means (11) performs personal identification on the basis of the personal features and the environment information by using a personal identification rule (13). Candidate screening means (12) screens the candidates to be identified by the personal identification means (11) on the basis of high-accuracy personal identification information such as the password and the fingerprint from a high-accuracy personal identification device (70), user move sensing information by tracking sensors (60-1 to 60-k) sucha as infrared sensor and a pressure sensor, and information of a personal schedule (80). Personal identification rule updating means (14) updates the personal identification rule (13) by feeding back the identification result.

Description

明 細 書  Specification
個人認証システム、個人認証方法、個人認証用プログラムおよび記録媒 体  Personal authentication system, personal authentication method, personal authentication program, and recording medium
技術分野  Technical field
[0001] 本発明は、個人認証方式に関し、特に、低コストで得られる複数の情報を統合して 個人を認証する個人認証システム、個人認証方法、個人認証用プログラムおよび記 録媒体に関するものである。  TECHNICAL FIELD [0001] The present invention relates to a personal authentication method, and particularly to a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium that authenticate an individual by integrating a plurality of pieces of information obtained at low cost. .
背景技術  Background art
[0002] 従来から、個人認証方式として、顔画像や音声、指紋、虹彩その他の生体情報を 利用した方式が開発されている。例えば、特許文献 1記載の方式においては、複数 の生体情報を利用して、個人を認証している。  Conventionally, as a personal authentication method, a method using a face image, voice, fingerprint, iris or other biological information has been developed. For example, in the method described in Patent Document 1, an individual is authenticated using a plurality of pieces of biological information.
特許文献 1:特開平 08 - 16788号公報  Patent Document 1: Japanese Patent Laid-Open No. 08-16788
発明の開示  Disclosure of the invention
発明が解決しょうとする課題  Problems to be solved by the invention
[0003] しかし、前記特許文献 1の従来技術では、顔をカメラに近づけたり、指をセンサーの 上に置く等、ユーザが意識して認証のための動作を行わなければならず、ユーザに とってその動作がわずらわ 、と共に、監視されて!、ると!/、う不安などをユーザに抱 かせる等の心理的影響も大きい、という課題がある。 [0003] However, in the prior art disclosed in Patent Document 1, the user must be aware of the authentication operation such as bringing his face close to the camera or placing his finger on the sensor. There is a problem that the operation is both cumbersome and also has a great psychological influence such as making the user feel uneasy!
[0004] また、従来の認証方式は、認証の際の環境変化に弱い。例えば、照明やその明る さ、角度等が変ると、顔認証の精度等が極端に低下し、また、指を怪我している場合 には、指紋認証ができない場合がある。 [0004] Also, the conventional authentication method is vulnerable to environmental changes during authentication. For example, if the illumination, its brightness, angle, etc. change, the accuracy of face authentication will decrease drastically, and fingerprint authentication may not be possible if your finger is injured.
[0005] さらに、家庭で使用するテレビ等で家族メンバー毎にパーソナライズされたサービス を行う場合には、それほど厳し 、セキュリティは必要な 、。 [0005] Furthermore, when providing a personalized service for each family member on a television or the like used at home, security is so strict.
[0006] そこで、本発明は、ユーザに意識させることなぐ低コストで得られる情報を使用して 個人認証を実行することができる個人認証システム、個人認証方法、個人認証用プ ログラム、記録媒体を提供することを目的とする。 [0006] Therefore, the present invention provides a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium capable of executing personal authentication using information obtained at low cost without making the user aware of it. The purpose is to provide.
課題を解決するための手段 [0007] 前記課題を解決するため、本発明に係る個人認証システムは、認証すべき個人の 特徴を抽出する個人特徴抽出センサーと、前記個人の環境情報を検出する環境情 報センサーと、前記個人特徴と前記環境情報とに基づいて前記個人を認証する個 人認証手段と、を有するようにした。 Means for solving the problem [0007] In order to solve the above problems, a personal authentication system according to the present invention includes a personal feature extraction sensor for extracting a personal feature to be authenticated, an environmental information sensor for detecting the personal environmental information, and the personal Personal authentication means for authenticating the individual based on the characteristics and the environmental information.
発明の効果  The invention's effect
[0008] 本発明によれば、個人特徴抽出センサーが認証すべき個人から抽出した個人特徴 と、環境情報センサーが前記個人から検出した環境情報とに基づいて個人を認証す るので、ユーザに意識させることなぐ低コストで得られる情報である個人特徴と環境 情報とを複数統合して、個人認証を実行することができる。  [0008] According to the present invention, the personal feature extraction sensor authenticates the individual based on the personal feature extracted from the individual to be authenticated, and the environmental information sensor detects the environmental information detected from the individual. It is possible to perform personal authentication by integrating multiple personal characteristics and environmental information, which are information that can be obtained at low cost.
図面の簡単な説明  Brief Description of Drawings
[0009] [図 1]本発明の一実施の形態に係る個人認証装置の構成を示すブロック図  FIG. 1 is a block diagram showing a configuration of a personal authentication device according to an embodiment of the present invention.
[図 2]ベイジアンネットにより構成した個人識別ルールの一例を示す図  [Fig.2] A diagram showing an example of a personal identification rule configured by a Bayesian network
[図 3]ベイジアンネットにより構成した個人識別ルールを用いた個人認証の具体例を 示す図  [Fig.3] Diagram showing a specific example of personal authentication using a personal identification rule configured by Bayesian network
発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION
[0010] 以下、本発明の実施の形態について、図面を参照しながら説明する。 Hereinafter, embodiments of the present invention will be described with reference to the drawings.
[0011] 図 1は、本発明の一実施の形態に係る個人認証システム 100の構成を示すブロック 図である。 FIG. 1 is a block diagram showing a configuration of a personal authentication system 100 according to an embodiment of the present invention.
[0012] 図 1において、個人認証システム 100は、個人認証装置 10と、複数の個人特徴抽 出センサー 20— 1〜20— n (nは自然数)と、複数の環境情報センサー 30— 1〜30 —m (mは自然数)と、時計 40と、インターネット 50と、複数の追跡用センサー 60— 1 〜60— k(kは自然数)と、高精度個人認証装置 70と、個人スケジュール 80とを有す る。  In FIG. 1, the personal authentication system 100 includes a personal authentication device 10, a plurality of personal feature extraction sensors 20-1 to 20-n (n is a natural number), and a plurality of environmental information sensors 30-1 to 30. —M (m is a natural number), clock 40, Internet 50, multiple tracking sensors 60—1 to 60—k (k is a natural number), high-precision personal identification device 70, and personal schedule 80 The
[0013] 個人認証装置 10は、個人認証手段 11と、候補絞り込み手段 12と、個人識別ルー ル 13と、個人識別ルール更新手段 14とを有する。  The personal authentication device 10 includes a personal authentication unit 11, a candidate narrowing unit 12, a personal identification rule 13, and a personal identification rule update unit 14.
[0014] 個人認証手段 11は、複数の個人特徴抽出センサー 20— l〜20—nからの個人特 徴情報と、複数の環境情報センサー 30— l〜30—mや時計 40、インターネット 50か らの環境情報とを入力して、後述する図 2に示す個人識別ルール 13に従い個人認 証する。 [0014] The personal authentication means 11 includes personal feature information from a plurality of personal feature extraction sensors 20-l to 20-n, a plurality of environmental information sensors 30-l to 30-m, a clock 40, and the Internet 50. And the personal identification according to the personal identification rule 13 shown in Figure 2 below. I testify.
[0015] 候補絞り込み手段 12は、複数の追跡用センサー 60— l〜60—kからのセンサー出 力と、高精度個人認証装置 70からの認証情報 (例えば、 IDカードや暗証番号、顔画 像、指紋、虹彩)と、個人スケジュール 80に基づいて認証すべき候補の絞り込みを行 う。なお、候補絞り込み手段 12は、本システムに必ずしも必要なものではなぐ認証 すべき候補数が少ない場合、例えば、認証すべき候補が家族等である場合は、省略 してもよい。しかし、例えば、高精度個人認証装置 70からの認証情報が使用でき、認 証すべき候補の数が多 、場合には、認証すべき候補を絞り込むことができるので、 有効である。  [0015] Candidate narrowing means 12 includes sensor outputs from a plurality of tracking sensors 60-l-60-k and authentication information from high-precision personal authentication device 70 (for example, an ID card, a password, a face image). , Fingerprint, iris) and candidates to be authenticated based on personal schedule 80. The candidate narrowing means 12 may be omitted when the number of candidates to be authenticated is not necessarily required for the system, for example, when the candidate to be authenticated is a family or the like. However, for example, the authentication information from the high-accuracy personal authentication device 70 can be used, and if there are many candidates to be authenticated, it is effective because the candidates to be authenticated can be narrowed down.
[0016] 個人識別ルール 13は、データベース(図示せず)に予め格納されており、個人認証 手段 11が認証するために使用される。  The personal identification rule 13 is stored in advance in a database (not shown), and is used by the personal authentication means 11 for authentication.
[0017] 個人識別ルール更新手段 14は、本装置を使い始めであるために、個人認証装置 10の認証精度が悪い場合または個人の認証が困難な場合に、ユーザ力 認証が正 しく行えた力否かの結果を音声等によりフィードバックさせて、個人認証手段 11が利 用する個人識別ルール 13の更新を行う。なお、この個人識別ルール更新手段 14も 、本システムに必ずしも必要なものではなぐ個人識別ルール 13を最初力 認証精 度良く設計できる場合には、省略してもよい。しかし、個人特徴が変化した場合等、 個人の認証が困難な場合には、個人識別ルール 13により認証しながらその認証精 度が向上するよう個人識別ルール 13のパラメータ等を変更して、個人識別ルール 13 の認証精度を向上させることができるので、有効である。  [0017] Since the personal identification rule update means 14 has begun to use this device, it is possible to correctly authenticate the user power when the authentication accuracy of the personal authentication device 10 is poor or when personal authentication is difficult. The result of failure is fed back by voice or the like, and the personal identification rule 13 used by the personal authentication means 11 is updated. This personal identification rule updating means 14 may also be omitted if the personal identification rule 13 which is not necessarily required for this system can be designed with high initial authentication accuracy. However, if it is difficult to authenticate the individual, such as when individual characteristics change, the parameters of the personal identification rule 13 are changed so that the authentication accuracy is improved while authenticating according to the personal identification rule 13, and personal identification is performed. This is effective because it can improve the authentication accuracy of Rule 13.
[0018] 複数の個人特徴抽出センサー 20— 1〜20— nは、個人の位置や身長、体重、座 高、顔幅、肩の高さ、臭い、服の色等のユーザの個人特徴情報を取得して、個人認 証手段 11へ出力する。また、複数の環境情報センサー 30— 1〜30— mは、例えば、 気温、湿度、気圧、日照,日射、風、雨、雪等の環境情報を取得して個人認証手段 1 1へ出力する。また、時計 40は、時刻を計測して個人認証手段 11へ出力する。また 、インターネット 50は、天気情報その他の Webページ情報を取得して、個人認証手 段 11へ出力する。  [0018] The plurality of personal feature extraction sensors 20-1 to 20-n are used to collect the user's personal feature information such as the individual's position, height, weight, sitting height, face width, shoulder height, odor, and clothing color. Obtain and output to personal authentication means 11. Further, the plurality of environmental information sensors 30-1 to 30-m acquire environmental information such as temperature, humidity, atmospheric pressure, sunshine, solar radiation, wind, rain, snow, and the like, and output them to the personal authentication means 11. The clock 40 measures the time and outputs it to the personal authentication means 11. In addition, the Internet 50 acquires weather information and other Web page information and outputs them to the personal authentication means 11.
[0019] 次に、以上のように構成された個人認証システム 100の動作を説明する。なお、こ の個人認証システム 100は、会社のオフィスや図書館などに設けられているとする。 Next, the operation of the personal authentication system 100 configured as described above will be described. In addition, this It is assumed that the personal authentication system 100 is installed in a company office or library.
[0020] まず、ユーザは、 IDカードや暗証番号、顔画像、指紋、虹彩を利用した高精度認 証装置 70により認証されてオフィス内または館内に入る。  First, the user is authenticated by the high-precision authentication device 70 using an ID card, a password, a face image, a fingerprint, and an iris and enters the office or the hall.
[0021] オフィス内や館内の天井には、追跡用センサー 60— 1〜60— kとして、例えば、複 数の赤外線センサーが埋め込まれていたり、床に複数の圧力センサーが埋め込まれ ているので、入館後のユーザの移動がこれらの追跡用センサー 61— l〜60—kによ り感知される。また、追跡用センサー 60— 1〜60— kとして、 GPS (Global Positioning System)を用いて個人の移動情報を把握することもできる。  [0021] As the tracking sensors 60-1 to 60-k, for example, multiple infrared sensors are embedded in the ceiling of the office or in the building, or multiple pressure sensors are embedded on the floor. The movement of the user after entering the building is sensed by these tracking sensors 61-l-60-k. In addition, as the tracking sensors 60-1 to 60-k, it is also possible to grasp personal movement information using GPS (Global Positioning System).
[0022] そして、ユーザがオフィス内や館内のある場所において、あるサービスを受けようと する場合、個人認証システム 100は、以下の処理により個人認証を行う。  [0022] Then, when the user intends to receive a certain service in an office or a certain place in the hall, the personal authentication system 100 performs personal authentication by the following processing.
[0023] まず、個人認証装置 10では、その場所の近くに配置された複数の個人特徴抽出セ ンサー 20— 1〜20— nにより、その個人の位置や身長、体重、座高、顔幅、肩の高さ 、臭い、服の色等のユーザの個人特徴情報を取得して、個人認証手段 11へ出力す る。なお、個人の位置や身長、顔幅、肩の高さ等を検出するのであれば、オフィス内 や館内の天井、壁、柱等に設けられた距離センサーが使用できる。個人の体重を検 出するのであれば、オフィス内や館内の床などに埋め込まれた圧力センサーが使用 できる。個人の臭いを検出するのであれば、臭いセンサーが使用できる。服の色を検 出するのであれば、色センサーが使用できる。また、距離センサーおよび色センサー 力 得られる情報は、 1台または複数台のカメラ力 抽出することができる。  [0023] First, in the personal authentication device 10, the position, height, weight, sitting height, face width, shoulders of the individual are detected by a plurality of personal feature extraction sensors 20-1 to 20-n arranged near the location. The user's personal characteristic information such as height, smell, and clothing color is acquired and output to the personal authentication means 11. If the position, height, face width, shoulder height, etc. of an individual are to be detected, distance sensors provided on the ceiling, walls, pillars, etc. in offices and buildings can be used. If you want to detect an individual's weight, you can use a pressure sensor embedded in the floor of the office or the building. If an individual's odor is detected, an odor sensor can be used. A color sensor can be used to detect the color of clothes. In addition, the information obtained from the distance sensor and the color sensor can extract the power of one or more cameras.
[0024] 一方、個人認証装置 10では、個人特徴抽出センサー 20— 1〜20— nによる個人 特徴の抽出と同時に、その場所の近くに配置された複数の環境情報センサー 30— 1 〜30—mにより、環境情報センサーが配置されたオフィス内または館内の気温や湿 度、気圧、日照、日射、風、雨、雪等の環境情報を取得して、個人認証手段 11へ出 力する。なお、気温を検出するのであれば、温度センサーが使用できる。湿度を検出 するのであれば、湿度センサーが使用できる。気圧を検出するのであれば、気圧セン サ一が使用できる。風を検出するのであれば、風センサーが使用できる。雨を検出す るのであれば、雨センサーが使用できる。雪を検出するのであれば、雪センサーが使 用できる。さらに、曜日や時刻を検出するのであれば、時計 40が使用できる。また、 天気情報その他の Webページ情報を検出するのであれば、インターネット 50が使用 できる。 [0024] On the other hand, in the personal authentication device 10, a plurality of environmental information sensors 30-1 to 30-m arranged near the location simultaneously with the extraction of the personal features by the personal feature extraction sensors 20-1 to 20-n. By acquiring environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, snow, etc. in the office or in the hall where the environmental information sensor is located, it is output to the personal authentication means 11. If the temperature is detected, a temperature sensor can be used. A humidity sensor can be used to detect humidity. A barometric sensor can be used to detect barometric pressure. A wind sensor can be used to detect wind. If it detects rain, a rain sensor can be used. If it detects snow, a snow sensor can be used. Furthermore, the clock 40 can be used for detecting the day of the week and the time. Also, The Internet 50 can be used to detect weather information and other Web page information.
[0025] 以上のようにして、個人認証手段 11は、個人特徴抽出センサー 20— 1〜20— nか ら個人の位置や身長、体重、座高、顔幅、肩の高さ、臭い、服の色等の個人特徴を 取得し、環境情報センサー 30— 1〜30— m、時計 40およびインターネット 50から温 度や湿度、気圧、日照、日射、風、雨、雪等の環境情報を取得する。  [0025] As described above, the personal authentication means 11 uses the personal feature extraction sensors 20-1 to 20-n to determine the position, height, weight, sitting height, face width, shoulder height, smell, Acquire personal characteristics such as color, and acquire environmental information such as temperature, humidity, atmospheric pressure, sunlight, solar radiation, wind, rain, and snow from environmental information sensors 30-1 to 30-m, clock 40 and Internet 50.
[0026] ここで、個人認証を行う本実施の形態の個人認証手段 11が取得する個人特徴およ び環境情報は、赤外線センサーや圧力センサー、臭いセンサー、画像処理結果等 の個人特徴抽出センサー 20— l〜20—nを利用した、ユーザに意識させることなく 得られる低コストな情報である。従って、ユーザは、認証のためにカメラに顔を近づけ たり、 IDやパスワードを入力する等の面倒な動作や操作を行う必要がない。また、高 精度個人認証装置 70からの指紋や虹彩等の高精度個人情報は、候補絞り込み手 段 12がユーザの候補を絞り込むために使用するものであるため、個人認証手段 11 は、これらの高精度な情報を個人認証に使用しない。なお、本実施の形態では、個 人の位置や身長、体重、座高、顔幅、肩の高さ、臭い、服の色等の全てを検出するこ とは必須ではなぐこれらの内、任意の 1または複数の情報を検出するようにしても勿 論よい。  Here, the personal characteristics and environment information acquired by the personal authentication means 11 of the present embodiment for performing personal authentication are an infrared sensor, a pressure sensor, an odor sensor, a personal feature extraction sensor such as an image processing result, etc. 20 — It is low-cost information that can be obtained without making the user aware of it using l-20-n. Therefore, the user does not need to perform troublesome operations or operations such as bringing his face close to the camera or inputting an ID or password for authentication. In addition, since the high-precision personal information such as fingerprints and irises from the high-precision personal authentication device 70 is used by the candidate narrowing down means 12 to narrow down the user candidates, the personal authentication means 11 Do not use accurate information for personal authentication. In the present embodiment, it is not essential to detect all of the individual position, height, weight, sitting height, face width, shoulder height, odor, clothing color, etc. Of course, it is also possible to detect one or more pieces of information.
[0027] そして、候補絞り込み手段 12は、高精度個人認証装置 70からの指紋や虹彩等の 高精度な認証情報と、追跡用センサー 60— 1〜60— kからの追跡情報と、データべ ース(図示せず)に格納されている個人スケジュール 80とから、その場所でサービス を受けているユーザ候補の絞り込みを行う。なお、候補絞り込み手段 12は、追跡用 センサー 60— l〜60—kからの追跡情報と、個人スケジュール 80の全てを使用する ことは必須ではなぐこれらの内、任意の 1または複数の情報と高精度個人認証装置 70からの高精度認証情報とを組み合わせて使用するようにしても勿論よ!/、。  [0027] The candidate narrowing means 12 includes high-precision authentication information such as fingerprints and irises from the high-precision personal authentication device 70, tracking information from the tracking sensors 60-1 to 60-k, and a database. From the personal schedule 80 stored in the service (not shown), the user candidates who receive the service at that location are narrowed down. It should be noted that the candidate narrowing down means 12 is not necessarily required to use all of the tracking information from the tracking sensors 60-l to 60-k and the personal schedule 80. Of course, you can use it in combination with the high-precision authentication information from the high-precision personal authentication device 70!
[0028] すると、個人認証手段 11では、候補絞り込み手段 12により絞り込まれた候補の中 から、個人特徴抽出センサー 20— l〜20—nから得られた個人特徴と、環境情報セ ンサー 30— 1〜30— mから得られた環境情報とを、データベース(図示せず)に格納 されている個人識別ルール 13に適用して個人を特定する。その際、個人認証手段 1 1は、個人特徴抽出センサー 20— l〜20—nから取得した個人の位置や身長、体重 、座高、顔幅、肩の高さ、臭い、服の色等の個人特徴と、環境情報センサー 30— 1〜 30—mや時計 40、インターネット 50から取得した温度や湿度、天気情報、曜日、時 刻等の環境情報とを全て使用することは必須ではなぐこれらの内、任意の 1または 複数の個人特徴を使用し、任意の 1または複数の環境情報を使用して個人を識別す るようにしてち勿餘よい。 [0028] Then, in the personal authentication means 11, the personal features obtained from the personal feature extraction sensors 20-l to 20-n and the environmental information sensor 30-1 from the candidates narrowed down by the candidate narrowing-down means 12. Apply the environmental information obtained from ~ 30-m to the personal identification rule 13 stored in the database (not shown) to identify the individual. At that time, personal authentication means 1 1 is the personal information obtained from the personal feature extraction sensors 20-l to 20-n, such as personal position, height, weight, sitting height, face width, shoulder height, odor, clothing color, and environmental information sensor 30 — 1-30—m It is not mandatory to use all environmental information such as temperature, humidity, weather information, day of the week, time of day, etc. obtained from the clock, clock 40 and Internet 50. It is advisable to use personal features and use any one or more environmental information to identify the individual.
[0029] ここで、個人識別ルール 13が使 、始めであるために、個人認証装置 10の認証精 度が悪い場合または個人の認証が困難な場合は、認証が正しく行われたかを確かめ るために、本実施の形態の個人認証装置 10では、例えば、音声や表示等によりユー ザに確認を行う。ユーザは、その音声や表示等を参照して、個人認証手段 11の認証 が正しいか否かを判断し、その結果を、音声やキー操作等によりフィードバックして、 個人識別ルール更新手段 14へ入力する。  [0029] Here, if the authentication accuracy of the personal authentication device 10 is poor or if it is difficult to authenticate the individual because the personal identification rule 13 is used and started, in order to confirm whether the authentication has been performed correctly. In addition, in the personal authentication device 10 of the present embodiment, confirmation is made to the user, for example, by voice or display. The user refers to the voice, display, etc. to determine whether the authentication of the personal authentication means 11 is correct, and feeds back the result by voice, key operation, etc., and inputs it to the personal identification rule update means 14 To do.
[0030] 個人識別ルール更新手段 14では、音声やキー操作等によりフィードバックされた 認証結果に基づ!/、て、個人認証手段 11が用いる個人識別ルール 13の更新を行う。 これにより、使い始めであるために、個人認証装置 10の認証精度が悪い場合または 個人の特定が困難な場合においても、本装置を使用するユーザに合わせて個人識 別ルール 13を更新することにより、正しく個人認証が行えるようになる。  [0030] The personal identification rule update means 14 updates the personal identification rule 13 used by the personal authentication means 11 based on the authentication result fed back by voice or key operation. As a result, even if the authentication accuracy of the personal authentication device 10 is poor or it is difficult to identify an individual because it is starting to use, the personal identification rule 13 is updated according to the user who uses this device. , It will be possible to authenticate correctly.
[0031] ここで、個人認証手段 11が個人認証に使用する個人識別ルールの具体例につ!、 て説明する。  Here, a specific example of the personal identification rule used by the personal authentication means 11 for personal authentication will be described.
[0032] 図 2は、ベイジアンネットにより構成した個人識別ルールの一例を示す図である。  FIG. 2 is a diagram illustrating an example of a personal identification rule configured by a Bayesian network.
[0033] 本実施の形態では、個人認証手段 11が個人認証に使用する個人識別ルール 13 を、ベイジアンネットにより構成している。ベイジアンネットは、複数変数の同時確率分 布の 1つの表現形態であり、これを用いて既知の変数値力 未知の変数値の確率分 布を計算することができる。 In the present embodiment, the personal identification rule 13 used by the personal authentication means 11 for personal authentication is constituted by a Bayesian network. A Bayesian network is a form of representation of the joint probability distribution of multiple variables, and it can be used to calculate the probability distribution of unknown variable values.
[0034] 図 2の例では、環境情報センサー 30— 1〜30— mからの環境情報である気温、湿 度、天候、時刻等それぞれに対応する変数ノード 1, Y2, · · · , Ymの子として個人 識別変数ノード Zを持ち、個人識別変数ノード Zの子として、個人特徴抽出センサー 2 0— 1〜20— nから個人特徴である身長、体重、顔幅、肩の高さ等それぞれに対応す る個人特徴情報変数ノード XI, X2, ···, Xnを持つ構造のベイジアンネットである。 [0034] In the example of Fig. 2, variable nodes 1, Y2, ···, Ym corresponding to the temperature, humidity, weather, time, etc., which are the environmental information from the environmental information sensors 30-1 to 30-m, respectively. It has a personal identification variable node Z as a child, and as a child of the personal identification variable node Z, from the personal feature extraction sensor 2 0-1 to 20-n, individual height, weight, face width, shoulder height, etc. Corresponding This is a Bayesian network with a structure having individual characteristic information variable nodes XI, X2,.
[0035] このベイジアンネットにより、同時確率分布を表現するためには、確率 P(Y ), Ρ(Υ [0035] In order to express the joint probability distribution by this Bayesian network, the probability P (Y),, (Υ
), ···, Ρ(Υ )と、条件付確率 ρ(ζ I γ , γ , ···, γ ), ρ(χ I ζ), ρ(χ I ζ), · ), ..., Ρ (Υ) and conditional probability ρ (ζ I γ, γ, ..., γ), ρ (χ I ζ), ρ (χ I ζ),
2 m 1 2 m l 2 2 m 1 2 m l 2
··, ρ(χη I ζ)の値が必要である。 ..., ρ (χ η I ζ) is required.
[0036] これらの確率は、出現頻度力も推定することができる。個人認証時にお!、ては、そ の場で得られた個人特徴と環境情報 (X , Χ , ···, Χ , Υ , Υ , ···, Υ ) = (χ , χ  [0036] These probabilities can also estimate the appearance frequency power. At the time of personal authentication, personal characteristics and environmental information (X, Χ, ···, Χ, Υ, Υ, ···,)) = (χ, χ)
1 2 η 1 2 m 1 2 1 2 η 1 2 m 1 2
, ···, χ , y , y , ···, y )から Ζの事後確率分布 Ρ (Ζ | χ , χ , ···, χ , y , y , ·· η 1 2 m 1 2 η 1 2, ..., χ, y, y, ..., y) to posterior probability distribution Ζ (Ζ | χ, χ, ..., χ, y, y, · η 1 2 m 1 2 η 1 2
·, y )を、次の(式 1)により計算できる。 ·, Y) can be calculated by the following (Equation 1).
[0037] [数 1]
Figure imgf000009_0001
[0037] [Equation 1]
Figure imgf000009_0001
い …, ) …(式  I…,)… (Formula
z (Z| j '.j n: z (Z | j '.jn:
[0038] 候補絞り込み手段 12により絞り込まれた候補に対する変数 Zの値の集合を Sとすれ ば、 Sの中で事後確率が最大になる Zの値 zは、次の(式 2)により求めることが可能と なる。  [0038] If the set of variable Z values for the candidates narrowed down by the candidate narrowing means 12 is S, then the Z value z that maximizes the posterior probability in S can be found by the following (Equation 2). Is possible.
[0039] [数 2] z=argmaxP(z| 1 ,χ, ,···,χ„ ,y2 ,· ",^) … (式 2)[0039] [Equation 2] z = argmaxP (z | 1 , χ,, ..., χ „, y 2 , ·", ^)… (Formula 2)
Figure imgf000009_0002
Figure imgf000009_0002
[0040] 個人認証手段 11では、このようにして求めた zに対応するユーザを、サービスを受 けようとしているユーザであると認識する。  [0040] The personal authentication means 11 recognizes the user corresponding to z thus obtained as the user who is going to receive the service.
[0041] そして、個人識別ルール更新手段 14では、得られた個人特徴および環境情報を 個人識別ルール 13に入力した場合の出力が、フィードバックにより得られた個人識 別結果に近くなるように、個人識別ルール 13を更新する。 [0041] Then, in the personal identification rule update means 14, the output when the obtained personal characteristics and environmental information are input to the personal identification rule 13 is close to the personal identification result obtained by feedback. Update identification rule 13.
[0042] その際、個人識別ルール更新手段 14による更新の方法は、どのような個人識別ル ール 13を使うかによつて異なる。例えば、図 2の場合は、確率 P(Y ), Ρ(Υ ), ···, At that time, the updating method by the personal identification rule updating means 14 differs depending on what personal identification rule 13 is used. For example, in the case of Fig. 2, the probabilities P (Y), Υ (Υ), ...
1 2  1 2
Ρ(Υ )と、条件付確率 Ρ(Ζ I Υ, Υ, ···, Υ ), P(X I Z), P(X I Z), ···, P(X m 1 2 m l 2  Ρ (Υ) and conditional probability Ρ (Ζ I Υ, Υ, ···, Υ), P (X I Z), P (X I Z), ···, P (X m 1 2 ml 2
I z)の推定値を更新することになる。推定値の更新は、フィードバックによって得ら れた推論結果データを、今までのデータに追加して推定することにより行うことができ る。 The estimated value of I z) will be updated. Updates to estimates are obtained through feedback. The inference result data can be estimated by adding to the existing data.
[0043] ここで、確率 P (Y ) , Ρ (Υ ) , · · · , Ρ (Υ )は、(式 1)および (式 2)に使用されてい ないが、この値は、 Y 、 Y · · · , Y のいずれかの値が、センサーの故障等で分からな い場合に必要である。例えば、 Yの値が不明な場合には、(式 1)および (式 2)の代 わりに (式 3)および (式 4)を用いて計算を行う。  [0043] Here, the probabilities P (Y), Ρ (Υ), ···, Ρ (Υ) are not used in (Equation 1) and (Equation 2). · · · · Necessary when Y is unknown due to sensor failure. For example, if the value of Y is unknown, use (Equation 3) and (Equation 4) instead of (Equation 1) and (Equation 2).
[0044] [数 3] ,一、 [0044] [Equation 3]
Figure imgf000010_0001
Figure imgf000010_0001
[0045] [数 4] (xi \z) … (式 4)[0045] [Equation 4 ] ( x i \ z )… (Formula 4 )
Figure imgf000010_0002
Figure imgf000010_0002
[0046] 次に、ベイジアンネットにより構成した個人識別ルールを用いた個人認証の具体例 を示す。  Next, a specific example of personal authentication using a personal identification rule configured by a Bayesian network will be shown.
[0047] 例えば、個人認証装置 10が配置された場所にユーザ Αおよびユーザ Βが来たとき の個人特徴および環境情報の過去 3回の個人特徴および環境情報が表 1のようであ つたとする。また、当該場所に来たユーザの個人特徴および環境情報が表 2のようで あつたとする。なお、この例においては、簡単化のため、個人特徴として、身長および 体重のみを使用しており、環境情報として、天気、曜日および時刻のみを使用してい る。また、サービスを受けているユーザ候補は、候補絞り込み手段 12によって、ユー ザ Aまたはユーザ Bに絞り込まれているものとする。  [0047] For example, it is assumed that the personal characteristics and the environmental information of the past three times of the personal characteristics and the environmental information when the user Β and the user Β have come to the place where the personal authentication device 10 is arranged are as shown in Table 1. . Table 2 shows the personal characteristics and environmental information of the users who came to the location. In this example, for simplification, only height and weight are used as personal characteristics, and only weather, day of the week, and time are used as environmental information. In addition, it is assumed that the user candidates receiving the service are narrowed down to user A or user B by the candidate narrowing means 12.
[表 1]  [table 1]
ユーザ 身長 体重 天 曜日 時刻  User Height Weight Day of the week Time
A 165-170 60 - 63 晴 月 16:00 - 17:00  A 165-170 60-63 Sunny Moon 16:00-17:00
A 165-170 57-60 雨 火 17:00— 18:00  A 165-170 57-60 Rain Fire 17: 00— 18:00
A 165-170 57-60 雨 水 17:00 - 18:00  A 165-170 57-60 Rain Water 17:00-18:00
B 165-170 57-60 晴 火 16:00 - 17:00  B 165-170 57-60 Sunny Tuesday 16:00-17:00
B 170-175 57-60 雨 火 16:00 - 17:00  B 170-175 57-60 Rain Fire 16:00-17:00
B 165-170 57-60 雨 火 16:00一 17:00 [表 2]
Figure imgf000011_0001
B 165-170 57-60 Rain Fire 16: 00-17: 00 [Table 2]
Figure imgf000011_0001
[0048] この場合、身長および体重に関しては、ユーザ Aおよびユーザ Bの特徴は類似して おり、身長および体重力もユーザ Aまたはユーザ Bの絞込みを行うことは困難である。 しかし、環境情報である天気、曜日および時刻から、サービスを受けているユーザは 、ユーザ Bである可能性が高いと推定できる。なぜなら、ユーザ Aは、火曜日は 17 : 0 0〜18: 00の間にしか来たことがなぐ雨の日は 16 : 00〜17: 00の間に来たことがな V、のに対し、ユーザ Bは、雨の日の火曜日の 16: 00〜 17: 00の間に 2度来て!/、るか らである。  [0048] In this case, with regard to height and weight, the characteristics of user A and user B are similar, and it is difficult to narrow down user A or user B for height and body gravity. However, it can be estimated from the weather, day of the week, and time that are the environmental information that the user receiving the service is likely to be the user B. Because user A has a rainy day that only came between 17:00 and 18:00 on Tuesday, whereas V has never come between 16:00 and 17:00. User B comes twice between 16:00 and 17:00 on Tuesday on a rainy day!
[0049] この推測は、実際には、表 1のデータから学習した識別ルールにより自動的に行わ れる。具体的には、表 1のデータ力 各種の条件付き確率をラプラス推定で求めれば 、図 3のようなベイジアンネットが作られ、このベイジアンネットを用いて、表 2の条件に おけるユーザが Aである確率および Bである確率を求めると、それぞれ 1Z4、 3Z4と なり、従って、ユーザ力 ¾である確率が高いと推定することができる。  [0049] This estimation is actually automatically performed based on the identification rule learned from the data in Table 1. Specifically, if the conditional probabilities of various data in Table 1 are obtained by Laplace estimation, a Bayesian network as shown in Fig. 3 is created. When a certain probability and a certain probability of B are obtained, they become 1Z4 and 3Z4, respectively, and therefore it can be estimated that the probability of being a user power is high.
[0050] なお、ここでは、環境情報として、天気情報、曜日および時刻のみを使用して個人 認証を行う具体例を示したが、勿論、本発明はこれに限定されない。例えば、ユーザ 力 個人認証装置 10が設置された場所に来るか来ないか、または、個人認証装置 1 0が配置された場所に来る時間力 テレビ放映されているあるスポーツの試合結果に 大きく左右されるのであれば、インターネットの特定のページ力 得られる試合結果 の情報を環境情報として使用することができる。  Here, a specific example in which personal authentication is performed using only weather information, day of the week, and time as environment information has been shown, but the present invention is not limited to this. For example, the user power will come to the place where the personal authentication device 10 is installed or will not come, or the time required to come to the place where the personal authentication device 10 is placed will be greatly affected by the result of a sport game being broadcast on television. If it is possible to use it, it is possible to use the information on the game results that can be obtained from a specific page of the Internet as environmental information.
[0051] また、ここでは、個人特徴から個人認証を行うことが困難な場合における具体例を 示したが、勿論、本発明はこれに限定されない。例えば、身長や体重のみの個人特 徴のみで個人認証を行うことができる場合にも、環境情報および個人情報の両方を 使った識別ルールにより正しく個人認証を行うことが可能である。すなわち、取得した 個人特徴および環境情報の中から、ユーザの個人認証を行うのに有効な情報を使つ て個人認証を行うのである。  [0051] Although a specific example in the case where it is difficult to perform personal authentication from personal characteristics is shown here, of course, the present invention is not limited to this. For example, even if personal authentication can be performed using only the personal characteristics of height and weight, it is possible to correctly perform personal authentication using an identification rule that uses both environmental information and personal information. In other words, personal authentication is performed using information that is effective for personal authentication of the user from the acquired personal characteristics and environmental information.
[0052] このように、本実施の形態の個人認証システム 100では、個人特徴抽出センサー 2 0— 1〜20— nが認証すべき個人から抽出した身長や体重、顔幅、肩の高さ等の個 人特徴と、環境情報センサー 30— l〜30—m力も検出した気温や湿度、天候、時刻 等の環境情報とに基づいて個人を認証するようにしたので、ユーザに意識させること なぐ低コストで得られる情報である個人特徴と環境情報とを複数統合して、個人認 証を実行することができる。 As described above, in the personal authentication system 100 of the present embodiment, the personal feature extraction sensor 2 0— 1 to 20 — n personal characteristics such as height, weight, face width, shoulder height, etc. extracted from individuals to be authenticated, environmental information sensor 30—l-30—m Since individuals are authenticated based on environmental information such as weather, time, etc., individual authentication is performed by integrating multiple personal features and environmental information, which are information that can be obtained at low cost without making the user aware of it. Can be executed.
[0053] その結果、ユーザは、認証のための特別な動作を行うことなぐつまり、認証されて いることを意識することなぐパーソナライズされたサービスを受けることができ、ユー ザの利便性を高めることができる。  [0053] As a result, the user can receive a personalized service without performing a special operation for authentication, that is, without being aware of the authentication, thereby improving user convenience. Can do.
[0054] また、本実施の形態の個人認証システム 100では、候補絞り込み手段 12により、高 精度個人認証装置 70からの IDカードや暗証番号、顔画像、指紋等の高精度個人認 証情報と、天井に埋め込まれた赤外線センサーや床に埋め込まれた圧力センサー 等の追跡用センサー 60— l〜60—kによるユーザ移動感知情報と、データベース等 に格納されて 、るユーザの個人スケジュール 80の情報とに基づ 、て、個人認証手段 11が認証すべき個人の候補の絞り込みを行うようにしたので、個人認証手段 11が認 証すべき個人の候補が減少することになり、認証処理の速度や負担を軽減すること ができる。  [0054] Further, in the personal authentication system 100 of the present embodiment, the candidate narrowing down means 12 uses high-precision personal authentication information such as an ID card, a personal identification number, a face image, and a fingerprint from the high-precision personal authentication device 70, and Tracking information such as infrared sensors embedded in the ceiling and pressure sensors embedded in the floor 60-l-60-k user movement detection information, and information stored in a database etc. Therefore, the personal authentication means 11 narrows down the individual candidates to be authenticated, so that the number of individual candidates to be authenticated by the personal authentication means 11 decreases, and the speed and burden of the authentication process is reduced. Can be reduced.
[0055] また、本実施の形態の個人認証システム 100では、個人認証手段 11がベイジアン ネットによる個人識別ルール 13に、各種個人特徴および環境情報を入力して個人識 別を行うようにしたので、精度良く簡単に個人認証を行うことができる。  [0055] Further, in the personal authentication system 100 of the present embodiment, since the personal authentication means 11 inputs various personal characteristics and environmental information into the personal identification rule 13 by the Bayesian network, personal identification is performed. Personal authentication can be performed accurately and easily.
[0056] さらに、本実施の形態の個人認証システム 100では、個人識別ルール更新手段 14 により、個人識別ルール 13による個人認証結果をフィードバックして、個人識別ルー ル 13を更新するようにしたので、本装置を使い始めで個人認証装置 10の認証精度 が悪い場合や、個人の特定が困難な場合でも、実際の個人認証処理を通じて適応 的に個人識別ルール 13のノ メータ等を変更することが可能となり、個人認証の精 度を向上させることができる。  [0056] Furthermore, in the personal authentication system 100 of the present embodiment, the personal identification rule update means 14 feeds back the personal authentication result of the personal identification rule 13 and updates the personal identification rule 13. Even if the authentication accuracy of the personal authentication device 10 is low or it is difficult to identify an individual when using this device, it is possible to adaptively change the number of personal identification rules 13 through actual personal authentication processing. Therefore, the accuracy of personal authentication can be improved.
[0057] なお、本実施の形態では、図 1に示すように、個人認証システム 100の構成をブロッ ク図により示してハードウェア的に説明したが、本発明は、これに限定されない。例え ば、 CPU、当該 CPUを上記のように実行させるためのプログラムを記憶したノヽードデ イスクゃメモリ等の記憶装置を有する PC等の汎用のコンピュータ力 個人認証システ ム 100を、ソフトウェア的に実行するようにしても勿論よい。この場合、上記の個人認 証システム 100としての機能を果たすための個人認証用プログラムは、 CD、フラッシ ュメモリ、 USBメモリ等の記録媒体に記録することができる。そして、個人認証用プロ グラムを使用するときは、記録媒体力 個人認証用プログラムを読み出してコンビュ ータ内の記憶装置にインストールしたり、インターネット等のネットワークを介してサー バ等からダウンロードして記憶装置に記憶させる。このようにすれば、 PC等の汎用の コンピュータでも、前述の個人認証システム 100としての機能を果たす個人認証用プ ログラムを実行することにより、上記の個人認証を実行することができる。 In the present embodiment, as shown in FIG. 1, the configuration of personal authentication system 100 has been described in terms of hardware by showing a block diagram, but the present invention is not limited to this. For example, a CPU and a node data that stores a program for executing the CPU as described above. Of course, a general-purpose computer-powered personal authentication system 100 such as a PC having a storage device such as a disk memory may be executed in software. In this case, the personal authentication program for performing the function as the personal authentication system 100 can be recorded on a recording medium such as a CD, a flash memory, or a USB memory. When using a personal authentication program, the recording medium strength personal authentication program is read and installed in a storage device in the computer, or downloaded and stored from a server or the like via a network such as the Internet. Store in the device. In this way, a general-purpose computer such as a PC can execute the personal authentication described above by executing the personal authentication program that functions as the personal authentication system 100 described above.
[0058] 本明細書は、 2004年 7月 13日出願の特願 2004— 206380に基づく。この内容は すべてここに含めておく。 [0058] This specification is based on Japanese Patent Application No. 2004-206380 filed on Jul. 13, 2004. All this content is included here.
産業上の利用可能性  Industrial applicability
[0059] 本発明に係る個人認証システム、個人認証方法、個人認証用プログラムおよび記 録媒体は、ユーザに意識させることなぐ低コストで得られる情報を使用して個人認証 を実行することができるため、複数の情報を統合して個人を認証する個人認証システ ム、個人認証方法、個人認証用プログラムおよび記録媒体として有用である。また、 テレビやパソコン、冷蔵庫、照明、冷暖房等の複数の家電等に接続されて、パーソナ ライズされたサービスの当該家電のユーザへの提供にも有用である。 [0059] The personal authentication system, personal authentication method, personal authentication program, and recording medium according to the present invention can execute personal authentication using information obtained at low cost without making the user aware of it. It is useful as a personal authentication system, a personal authentication method, a personal authentication program, and a recording medium for authenticating an individual by integrating a plurality of information. It is also useful for providing personalized services to users of home appliances connected to multiple home appliances such as TVs, personal computers, refrigerators, lighting, and air conditioning.

Claims

請求の範囲 The scope of the claims
[1] 認証すべき個人の特徴を抽出する個人特徴抽出センサーと、  [1] A personal feature extraction sensor that extracts the personal features to be authenticated;
前記個人の環境情報を検出する環境情報センサーと、  An environmental information sensor for detecting the personal environmental information;
前記個人特徴と前記環境情報とに基づいて前記個人を認証する個人認証手段と、 を有する個人認証システム。  A personal authentication system comprising: personal authentication means for authenticating the individual based on the personal characteristics and the environmental information.
[2] 前記個人の高精度な個人認証情報、移動情報およびスケジュール情報の少なくと も 1つに基づいて、前記個人認証手段が認証する候補の絞り込みを行う候補絞り込 み手段をさらに有する、請求項 1記載の個人認証システム。  [2] The apparatus further comprises candidate narrowing means for narrowing down candidates to be authenticated by the personal authentication means based on at least one of the high-precision personal authentication information, movement information and schedule information of the individual. Item 1. Personal authentication system.
[3] 前記個人認証手段は、環境情報変数ノードの子として個人識別変数ノードを持ち、 個人識別変数ノードの子として個人特徴変数ノードを持つベイジアンネットにより表 現される個人識別ルールにより個人認証を行う、請求項 1記載の個人認証システム。  [3] The personal authentication means performs personal authentication according to a personal identification rule expressed by a Bayesian network having a personal identification variable node as a child of the environment information variable node and a personal characteristic variable node as a child of the personal identification variable node. The personal authentication system according to claim 1 to be performed.
[4] 前記個人識別ルールによる個人認証結果をフィードバックして、前記個人識別ル ールを更新する個人識別ルール更新手段をさらに有する、請求項 3記載の個人認証 システム。  4. The personal authentication system according to claim 3, further comprising a personal identification rule updating unit that feeds back a personal authentication result based on the personal identification rule and updates the personal identification rule.
[5] 前記個人特徴抽出センサーは、前記個人の位置を検出するセンサー、前記個人 の身長を検出するセンサー、前記個人の体重を検出するセンサー、前記個人の座高 を検出するセンサー、前記個人の顔幅を検出するセンサー、前記個人の肩の高さを 検出するセンサー、前記個人の臭いを検出するセンサー、前記個人の服の色を検出 するセンサー、の少なくとも 1つを含み、  [5] The personal feature extraction sensor includes a sensor that detects the position of the individual, a sensor that detects the height of the individual, a sensor that detects the weight of the individual, a sensor that detects the sitting height of the individual, and a face of the individual Including at least one of a sensor for detecting a width, a sensor for detecting a height of a shoulder of the individual, a sensor for detecting the smell of the individual, and a sensor for detecting a color of the clothes of the individual,
前記環境情報抽出センサーは、時間を検出するセンサー、気温を検出するセンサ 一、湿度を検出するセンサー、気圧を検出するセンサー、 日照を検出するセンサー、 日射を検出するセンサー、風を検出するセンサー、雨を検出するセンサー、雪を検 出するセンサー、インターネットから得られる情報を検出するセンサー、の少なくとも 1 つを含む、請求項 1記載の個人認証システム。  The environmental information extraction sensor is a sensor that detects time, a sensor that detects air temperature, a sensor that detects humidity, a sensor that detects atmospheric pressure, a sensor that detects sunlight, a sensor that detects sunlight, a sensor that detects wind, The personal authentication system according to claim 1, comprising at least one of a sensor that detects rain, a sensor that detects snow, and a sensor that detects information obtained from the Internet.
[6] 認証すべき個人の特徴を抽出するステップと、  [6] extracting individual characteristics to be authenticated;
前記個人の環境情報を検出するステップと、  Detecting the personal environmental information;
前記個人特徴と前記環境情報とに基づいて前記個人を認証するステップと、 を有する個人認証方法。 Authenticating the individual based on the personal characteristics and the environmental information.
[7] 認証すべき個人の特徴を抽出するステップと、 [7] extracting individual characteristics to be authenticated;
前記個人の環境情報を検出するステップと、  Detecting the personal environmental information;
前記個人特徴と前記環境情報とに基づいて前記個人を認証するステップと、 をコンピュータに実行させる個人認証用プログラム。  A step of authenticating the individual based on the personal characteristics and the environmental information;
[8] 認証すべき個人の特徴を抽出するステップと、 [8] extracting individual characteristics to be authenticated;
前記個人の環境情報を検出するステップと、  Detecting the personal environmental information;
前記個人特徴と前記環境情報とに基づいて前記個人を認証するステップと、 をコンピュータに実行させる個人認証用プログラムが記録された記録媒体。  A step of authenticating the individual based on the personal characteristics and the environmental information, and a recording medium on which a personal authentication program is executed for causing a computer to execute.
PCT/JP2005/012676 2004-07-13 2005-07-08 Personal identification system, personal identification method, personal identification program, and recording medium WO2006006533A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2006529007A JPWO2006006533A1 (en) 2004-07-13 2005-07-08 Personal authentication system, personal authentication method, personal authentication program and recording medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004-206380 2004-07-13
JP2004206380 2004-07-13

Publications (1)

Publication Number Publication Date
WO2006006533A1 true WO2006006533A1 (en) 2006-01-19

Family

ID=35783876

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/012676 WO2006006533A1 (en) 2004-07-13 2005-07-08 Personal identification system, personal identification method, personal identification program, and recording medium

Country Status (2)

Country Link
JP (1) JPWO2006006533A1 (en)
WO (1) WO2006006533A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008181253A (en) * 2007-01-23 2008-08-07 Nippon Telegr & Teleph Corp <Ntt> Authentication device, authentication method, and authentication program
JP2010117971A (en) * 2008-11-14 2010-05-27 Fujitsu Ltd Biometric authentication device, method and program
US8264326B2 (en) 2006-08-31 2012-09-11 Kyushu University Biometrics sensor
JP2017130017A (en) * 2016-01-20 2017-07-27 ヤフー株式会社 Information processing apparatus, information processing method, and program
JP2018036946A (en) * 2016-09-01 2018-03-08 日本電信電話株式会社 User authentication system, user authentication method, and program
JP2018045698A (en) * 2017-10-20 2018-03-22 ヤフー株式会社 Information processing device, information processing method, and program
JP2018156396A (en) * 2017-03-17 2018-10-04 ヤフー株式会社 Authentication apparatus, authentication method, and authentication program
CN110263757A (en) * 2019-06-29 2019-09-20 Oppo广东移动通信有限公司 Fingerprint identification method and Related product
US10534901B2 (en) 2017-07-03 2020-01-14 Samsung Electronics Co., Ltd. User authentication method and apparatus using infrared ray (IR) image

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6262177B2 (en) * 2015-09-03 2018-01-17 株式会社東芝 Wearable terminal, method and system
JP6279643B2 (en) * 2016-03-28 2018-02-14 株式会社 みずほ銀行 Login management system, login management method, and login management program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002236665A (en) * 2001-02-09 2002-08-23 Matsushita Electric Ind Co Ltd Personal authentication device
JP2003192247A (en) * 2001-11-26 2003-07-09 Inventio Ag System for human security control and/or transportation for elevator equipment, method for using the system and method for improving elevator equipment by the system
JP2003296770A (en) * 2002-04-03 2003-10-17 Hitachi Ltd Entering and leaving management system
JP2004126738A (en) * 2002-09-30 2004-04-22 Matsushita Electric Ind Co Ltd Personal authentication device and authentication method using three-dimensional measurement
JP2004167227A (en) * 2002-11-07 2004-06-17 Matsushita Electric Ind Co Ltd Personal identification method, iris registration device, iris identification device, and personal identification program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002236665A (en) * 2001-02-09 2002-08-23 Matsushita Electric Ind Co Ltd Personal authentication device
JP2003192247A (en) * 2001-11-26 2003-07-09 Inventio Ag System for human security control and/or transportation for elevator equipment, method for using the system and method for improving elevator equipment by the system
JP2003296770A (en) * 2002-04-03 2003-10-17 Hitachi Ltd Entering and leaving management system
JP2004126738A (en) * 2002-09-30 2004-04-22 Matsushita Electric Ind Co Ltd Personal authentication device and authentication method using three-dimensional measurement
JP2004167227A (en) * 2002-11-07 2004-06-17 Matsushita Electric Ind Co Ltd Personal identification method, iris registration device, iris identification device, and personal identification program

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8264326B2 (en) 2006-08-31 2012-09-11 Kyushu University Biometrics sensor
JP5187581B2 (en) * 2006-08-31 2013-04-24 国立大学法人九州大学 Biometric sensor
JP2008181253A (en) * 2007-01-23 2008-08-07 Nippon Telegr & Teleph Corp <Ntt> Authentication device, authentication method, and authentication program
JP2010117971A (en) * 2008-11-14 2010-05-27 Fujitsu Ltd Biometric authentication device, method and program
JP2017130017A (en) * 2016-01-20 2017-07-27 ヤフー株式会社 Information processing apparatus, information processing method, and program
JP2018036946A (en) * 2016-09-01 2018-03-08 日本電信電話株式会社 User authentication system, user authentication method, and program
JP2018156396A (en) * 2017-03-17 2018-10-04 ヤフー株式会社 Authentication apparatus, authentication method, and authentication program
US10534901B2 (en) 2017-07-03 2020-01-14 Samsung Electronics Co., Ltd. User authentication method and apparatus using infrared ray (IR) image
JP2018045698A (en) * 2017-10-20 2018-03-22 ヤフー株式会社 Information processing device, information processing method, and program
CN110263757A (en) * 2019-06-29 2019-09-20 Oppo广东移动通信有限公司 Fingerprint identification method and Related product
CN110263757B (en) * 2019-06-29 2021-05-04 Oppo广东移动通信有限公司 Fingerprint identification method and related product

Also Published As

Publication number Publication date
JPWO2006006533A1 (en) 2008-04-24

Similar Documents

Publication Publication Date Title
WO2006006533A1 (en) Personal identification system, personal identification method, personal identification program, and recording medium
JP4544363B1 (en) Face authentication device, person image search system, face authentication device control program, computer-readable recording medium, and face authentication device control method
US20200372743A1 (en) Face based door entry
US10317206B2 (en) Location determination processing device and storage medium
EP3504859B1 (en) Remote usage of locally stored biometric authentication data
US20190199717A1 (en) Systems and methods for performing user recognition based on biometric information captured with wearable electronic devices
CN106415570B (en) Dynamic keyboard and touch screen biological identification
WO2012042634A1 (en) Biometric authentication device, biometric authentication program and method
CN107220582A (en) Recognize the driver of vehicle
JP5286297B2 (en) Biometric authentication system
US9336374B2 (en) Method, module, and computer program product for identifying user of mobile device
US20210241397A1 (en) Location-based verification of user requests and generation of notifications on mobile devices
JP2010049357A (en) Authentication device, authentication system, and authentication method
JP2009104526A (en) Authentication device, authentication method, and program
CN113096272B (en) Door lock control method, intelligent door lock and computer readable storage medium
JP7358574B2 (en) Authentication system, transmitter, receiver, authentication method, and program
JP2018173923A (en) Terminal device, gate control method, gate control program and gate control system
AU2022100065A4 (en) Data integrity management in a computer network
JP6036258B2 (en) Information processing apparatus and information processing program
WO2019077013A1 (en) Methods and systems for processing audio signals containing speech data
WO2022208598A1 (en) Authentication system and authentication method
JP2010170212A (en) Action estimation device and method
KR101815468B1 (en) Smart door handle cover
JP2012205261A (en) Network system, registration method, and controller
WO2020246368A1 (en) Facial recognition device, facial recognition method, and computer-readable storage medium

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2006529007

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase