WO2022201490A1 - 認証端末、認証システム、認証方法及び非一時的なコンピュータ可読媒体 - Google Patents
認証端末、認証システム、認証方法及び非一時的なコンピュータ可読媒体 Download PDFInfo
- Publication number
- WO2022201490A1 WO2022201490A1 PCT/JP2021/012869 JP2021012869W WO2022201490A1 WO 2022201490 A1 WO2022201490 A1 WO 2022201490A1 JP 2021012869 W JP2021012869 W JP 2021012869W WO 2022201490 A1 WO2022201490 A1 WO 2022201490A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- information
- subject
- image
- code
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 97
- 230000008569 process Effects 0.000 claims abstract description 63
- 230000004044 response Effects 0.000 claims abstract description 57
- 238000003384 imaging method Methods 0.000 claims description 73
- 238000012545 processing Methods 0.000 claims description 67
- 230000001815 facial effect Effects 0.000 claims description 30
- 238000006243 chemical reaction Methods 0.000 claims description 28
- 210000000056 organ Anatomy 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 42
- 238000000605 extraction Methods 0.000 description 37
- 238000001514 detection method Methods 0.000 description 21
- 230000006870 function Effects 0.000 description 21
- 238000004891 communication Methods 0.000 description 18
- 230000010365 information processing Effects 0.000 description 15
- 238000007639 printing Methods 0.000 description 14
- 239000000284 extract Substances 0.000 description 10
- 230000004048 modification Effects 0.000 description 9
- 238000012986 modification Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 6
- 238000004590 computer program Methods 0.000 description 6
- 238000001994 activation Methods 0.000 description 5
- 230000004913 activation Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000010485 coping Effects 0.000 description 2
- 210000004709 eyebrow Anatomy 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000007306 turnover Effects 0.000 description 2
- 241000122205 Chamaeleonidae Species 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 210000005069 ears Anatomy 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Definitions
- the present disclosure relates to authentication terminals, authentication systems, authentication methods, and non-transitory computer-readable media.
- An authentication system has been proposed that does not store biometric personal information in a database and performs authentication with a simple configuration.
- Patent Document 1 using an information code such as a two-dimensional information code in which facial feature points of a user are recorded, facial feature points extracted from a photographed image of a user and facial feature points read from the information code
- An authentication system is disclosed that authenticates a user by matching facial feature points.
- Patent Document 2 a personal authentication system performs personal authentication by comparing palm print feature point data recorded in a two-dimensional code with palm print feature point data detected from palm image data of an authentication subject. is disclosed.
- An object of the present disclosure is to provide an authentication terminal, an authentication system, an authentication method, and a non-transitory computer-readable medium that can improve authentication throughput in view of the above-mentioned problems.
- An authentication terminal includes: A body image generated by photographing the subject's body when the subject is located at a first distance from an imaging means, and a second distance from the imaging means where the subject is shorter than the first distance. and an image acquisition means for acquiring a code image generated by photographing a code recording medium carried by the subject when the subject is at a distant position, wherein the code recording medium is an image for registration of the subject.
- an image acquisition means having a visible code symbol in which embedded information including biometric information is recorded authentication information generation means for starting processing for generating biometric information for authentication of the subject from the body image in response to obtaining the body image of the subject; embedded information obtaining means for obtaining the embedded information from the code image in response to obtaining the code image; authentication means for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information; Gate control means for restricting the subject from passing through the gate when the biometric authentication fails.
- An authentication system includes: A body image generated by photographing the subject's body when the subject is located at a first distance from an imaging means, and a second distance from the imaging means where the subject is shorter than the first distance. and an image acquisition means for acquiring a code image generated by photographing a code recording medium carried by the subject when the subject is at a distant position, wherein the code recording medium is an image for registration of the subject.
- an image acquisition means having a visible code symbol in which embedded information including biometric information is recorded authentication information generation means for starting processing for generating biometric information for authentication of the subject from the body image in response to obtaining the body image of the subject; embedded information obtaining means for obtaining the embedded information from the code image in response to obtaining the code image; authentication means for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information; and gate control means for restricting the subject from passing through the gate when the biometric authentication fails.
- An authentication method includes: a first image acquiring step of acquiring a body image generated by photographing the body of the subject when the subject is at a position separated by a first distance from the imaging means; an authentication information generation step of starting a process of generating biometric information for authentication of the subject from the body image in response to obtaining the body image of the subject; A second image for acquiring a code image generated by photographing a code recording medium carried by the subject when the subject is at a second distance shorter than the first distance from the imaging means.
- the code recording medium has a visible code symbol in which embedded information including biometric information for registration of the subject is recorded; an embedded information obtaining step of obtaining the embedded information from the code image in response to obtaining the code image; an authentication step of performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information; and gating restricting the subject from passing through the gate if the biometric authentication fails.
- a non-transitory computer-readable medium comprising: a first image acquisition process for acquiring a body image generated by photographing the subject's body when the subject is at a position separated by a first distance from the imaging means; Authentication information generation processing for starting processing for generating biometric information for authentication of the subject from the body image in response to acquisition of the body image of the subject; A second image for acquiring a code image generated by photographing a code recording medium carried by the subject when the subject is at a second distance shorter than the first distance from the imaging means.
- the code recording medium has a visible code symbol in which embedded information including biometric information for registration of the subject is recorded; embedded information acquisition processing for acquiring the embedded information from the code image in response to acquisition of the code image; an authentication process for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information;
- a program is stored for causing a computer to execute gate control processing for restricting the subject from passing through the gate when the biometric authentication fails.
- the present disclosure can provide an authentication terminal, an authentication system, an authentication method, and a non-transitory computer-readable medium that can improve authentication throughput.
- FIG. 4 is a flow chart showing the flow of an authentication method according to the first embodiment
- 2 is a block diagram showing the overall configuration of an authentication system according to a second embodiment
- FIG. FIG. 4 is a diagram for explaining an outline of the flow of face authentication
- FIG. 4 is a diagram showing an example of the data structure of embedded information
- 8 is a block diagram showing the configuration of a management device according to the second embodiment
- FIG. 9 is a block diagram showing the configuration of a code generation terminal according to the second embodiment
- FIG. 9 is a flow chart showing the flow of a code generation method according to the second embodiment
- FIG. 9 is a block diagram showing the configuration of an authentication terminal according to the second embodiment
- FIG. 9 is a block diagram showing the configuration of an authentication terminal according to the second embodiment
- FIG. 9 is a flow chart showing the flow of an authentication method according to the second embodiment
- FIG. 11 is a diagram for explaining an authentication method according to a third embodiment
- FIG. 11 is a diagram for explaining an example of conditions for starting face information extraction processing according to the third embodiment
- 11 is a flow chart showing part of the flow of an authentication method according to the third embodiment
- FIG. 12 is a block diagram showing the configuration of an authentication terminal according to the fourth embodiment
- FIG. 13 is a diagram showing an example of the data structure of restriction condition information according to the fourth embodiment
- FIG. 14 is a flow chart showing the flow of an authentication method according to the fourth embodiment
- FIG. 12 is a block diagram showing the configuration of an authentication terminal according to the fifth embodiment
- FIG. 14 is a diagram showing an example of output from an authentication terminal according to the fifth embodiment
- FIG. 22 is a diagram showing an example of output from an authentication terminal according to a modification of the fifth embodiment
- FIG. FIG. 12 is a block diagram showing the overall configuration of an authentication system according to a sixth embodiment
- FIG. 13 is a block diagram showing the configuration of a management device according to a sixth embodiment
- FIG. FIG. 12 is a block diagram showing the configuration of a code generation terminal according to a sixth embodiment
- FIG. FIG. 12 is a flow chart showing the flow of a code generation method according to a sixth embodiment
- FIG. FIG. 12 is a block diagram showing the configuration of an authentication terminal according to a sixth embodiment
- FIG. 12 is a flow chart showing the flow of an authentication method according to the sixth embodiment
- FIG. FIG. 21 is a block diagram showing the overall configuration of an authentication system according to a seventh embodiment
- FIG. FIG. 14 is a block diagram showing the overall configuration of an authentication system according to an eighth embodiment
- FIG. 21 is a block diagram showing the configuration of an authentication terminal according to an eighth embodiment
- FIG. 1 is a block diagram showing the configuration of an authentication terminal 10 according to the first embodiment.
- the authentication terminal 10 is an information processing terminal that performs biometric authentication using a code recording medium carried by a subject.
- the code recording medium has code symbols.
- the code symbol is a visible information code, and may be a barcode, a two-dimensional code such as a QR code (registered trademark), or a color barcode such as a chameleon code (registered trademark).
- Embedded information including at least biometric information for registration of a subject is recorded in the code symbol.
- Biometric information is facial, fingerprint, iris, ear, or vein feature information.
- the identification information of the subject is information for identifying the subject and is called a subject ID.
- the authentication terminal 10 is connected to the gate driving device of the gate so as to be able to communicate wirelessly or by wire.
- the gate may be the gate through which the subject wishes to pass.
- the authentication terminal 10 includes an image acquisition unit 11 , an authentication information generation unit 12 , an embedded information acquisition unit 13 , an authentication unit 14 and a gate control unit 17 .
- the image acquisition unit 11 is also called image acquisition means.
- the image acquiring unit 11 acquires a body image generated by photographing the body of a subject and a code image generated by photographing a code recording medium.
- the subject's body to be photographed is at least a part of the subject's body, such as the subject's face, fingers, eyes, ears, or palm.
- the body image is generated by photographing the subject's body when the subject is at a position separated by the first distance from an imaging unit (not shown).
- the code image is generated by capturing an image of the code recording medium when the subject is at the second distance from the imaging unit. The second distance is shorter than the first distance. That is, when the user U is approaching the imaging unit, the body of the user U is first photographed, and then the code recording medium carried by the user U is photographed.
- the authentication information generation unit 12 is also called authentication information generation means. Upon acquiring the body image of the subject, the authentication information generation unit 12 starts processing for generating biometric information for authentication of the subject from the body image.
- the embedded information acquisition unit 13 is also called embedded information acquisition means.
- the embedded information acquisition unit 13 acquires embedded information from the code image acquired by the image acquisition unit 11 .
- the embedding information acquisition unit 13 extracts the code symbols from the code image and performs decoding processing on the code symbols to acquire the embedding information.
- the authentication unit 14 is also called authentication means.
- the authentication unit 14 compares the biometric information for registration included in the embedded information acquired from the code image by the embedded information acquiring unit 13 with the biometric information for authentication generated based on the body image, Perform biometric authentication.
- the gate control unit 17 is also called gate control means.
- the gate control unit 17 restricts the subject from passing through the gate when the biometric authentication fails.
- biometric authentication failure means that the biometric information for registration and the biometric information for authentication do not match.
- the biometric information does not match includes that the degree of matching between the two biometric information is less than a predetermined threshold.
- FIG. 2 is a flow chart showing the flow of the authentication method according to the first embodiment.
- the image acquiring unit 11 of the authentication terminal 10 acquires a body image generated by photographing the body of the subject when the subject is at a position separated by the first distance from the imaging unit (S10).
- the authentication information generation unit 12 starts processing for generating biometric information for authentication of the subject from the body image (S11).
- the image acquiring unit 11 acquires a code image generated by photographing a code recording medium carried by the subject when the subject is at a position separated by the second distance from the imaging unit (S12).
- the embedding information acquisition unit 13 acquires embedding information from the code image (S13).
- the authentication unit 14 performs biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information (S14). Next, the authentication unit 14 determines whether or not the biometric authentication has succeeded (S15). If the authentication unit 14 determines that the biometric authentication has succeeded (Yes in S15), the process ends. On the other hand, when the authentication unit 14 determines that the biometric authentication has failed (No in S15), the gate control unit 17 restricts the subject from passing through the gate (S16).
- the authentication terminal 10 takes an image of the subject's body and starts the process of acquiring biometric information for authentication from the body image, prior to taking an image of the code recording medium.
- the authentication terminal 10 can acquire biometric information for authentication while the target person is approaching the imaging unit, thereby improving throughput of authentication.
- the authentication terminal 10 includes a processor, memory, and storage device (not shown). Further, the storage device stores a computer program in which processing of the authentication method according to the present embodiment is implemented. Then, the processor loads the computer program from the storage device into the memory and executes the computer program. Thereby, the processor implements the functions of the image acquisition unit 11 , the authentication information generation unit 12 , the embedded information acquisition unit 13 , the authentication unit 14 and the gate control unit 17 .
- the image acquisition unit 11, the authentication information generation unit 12, the embedding information acquisition unit 13, the authentication unit 14, and the gate control unit 17 may each be realized by dedicated hardware.
- part or all of each component of each device may be realized by general-purpose or dedicated circuitry, processors, etc., or combinations thereof. These may be composed of a single chip, or may be composed of multiple chips connected via a bus. A part or all of each component of each device may be implemented by a combination of the above-described circuits and the like and programs.
- CPU Central Processing Unit
- GPU Graphics Processing Unit
- FPGA field-programmable gate array
- the plurality of information processing devices, circuits, etc. may be centrally arranged or distributed. may be placed.
- the information processing device, circuits, and the like may be implemented as a form in which each is connected via a communication network, such as a client-server system, a cloud computing system, or the like.
- the functions of the authentication terminal 10 may be provided in a SaaS (Software as a Service) format.
- FIG. 3 is a block diagram showing the overall configuration of an authentication system 1000 according to the second embodiment.
- the authentication system 1000 is a computer system that performs biometric authentication using a code recording medium C carried by a user U who is a subject.
- biometric authentication will be described by taking face authentication as an example, but the biometric authentication is not limited to this.
- the code recording medium C is assumed to be a printed matter in which code symbols are printed on paper, plastic, or the like.
- the user U carries the code recording medium C by inserting the code recording medium C into a card case with a neck strap and hanging the card case around the neck.
- the code recording medium C is not limited to this, and may be a smart phone, a tablet terminal, or the like, which displays code symbols and is carried by the user U.
- the authentication system 1000 includes a code generation terminal 100, a printing device 200, authentication terminals 300-1 to 300-3, gates 400-1 to 400-3, and a management device 500. At least code generation terminal 100, authentication terminals 300-1 to 300-3, and management device 500 are connected to each other via network N.
- FIG. The network N is a wired or wireless communication line.
- the code generation terminal 100 is an information processing terminal that generates code symbols.
- the code generation terminal 100 is, for example, a tablet terminal, smart phone, or personal computer (PC).
- the code generation terminal 100 captures the face of the user U and acquires face information for registration of the user U from the captured face image.
- face information may be a set of feature points extracted from a face image, and may be referred to as face feature information.
- the code generation terminal 100 generates embedded information including at least face information for registration of the user U and identification information (user ID) of the user U, and converts the embedded information into a visible code symbol.
- the code generation terminal 100 outputs the converted code symbol information to the printing device 200 . Note that the code generation terminal 100 does not have to be connected to the network N.
- the printing device 200 is a printing device that is communicably connected to the code generation terminal 100 by wire or wirelessly.
- the printer 200 may also be connected to the network N, and the code generation terminal 100 and the printer 200 are connected peer-to-peer via Bluetooth (registered trademark) or the like. may be
- the printing device 200 prints the code symbol information received from the code generation terminal 100 on the code recording medium C.
- Gates 400-1 to 400-3 are gates for permitting or restricting entry and exit from rooms 1 to 3, respectively. Gates 400-1 to 400-3 are opening and closing bodies for entering and exiting rooms 1 to 3, and may be doors, for example. Rooms 1 to 3 may be confidential areas in which entry and exit by unauthorized persons is prohibited.
- gates 400-1, 400-2, and 400-3 may be simply referred to as gate 400 when referred to without distinction.
- the gate 400 includes a gate driver for driving opening and closing of the gate.
- Authentication terminals 300-1 to 300-3 are installed at points 1 to 3 near gates 400-1 to 400-3, respectively.
- the authentication terminals 300-1, 300-2, and 300-3 may simply be referred to as the authentication terminal 300.
- FIG. Although the numbers of authentication terminals 300 and gates 400 are both three in this figure, they may be two or less, or four or more.
- the authentication terminal 300 is an information processing terminal that performs face authentication using the code recording medium C carried by the user U.
- the authentication terminal 300 is, for example, a tablet terminal, smart phone, or PC.
- Authentication terminal 300-2 opens gate 400-2 corresponding to authentication terminal 300-2 when face authentication succeeds, and closes gate 400-2 when face authentication fails.
- opening gate 400-2 may include unlocking gate 400-2
- closing gate 400-2 may include locking gate 400-2.
- Authentication terminal 300-2 also transmits the result of face authentication to management device 500 together with the user ID.
- the authentication terminal 300-2 captures the face of the user U, and acquires face information for authentication of the user U from the captured face image. Authentication terminal 300-2 also captures the code recording medium C carried by user U, and acquires embedded information from the code image generated by the capture. Authentication terminal 300-2 then performs face authentication by comparing the face information for authentication with the face information for registration included in the embedded information. When face authentication is successful, authentication terminal 300-2 transmits an opening control signal to the gate driving device of corresponding gate 400-2 to permit user U to pass through the gate. In other words, the authentication terminal 300-2 permits the user U to enter or leave the room 2.
- authentication terminal 300-2 transmits a closing control signal to the gate driving device of corresponding gate 400-2 to restrict user U from passing through gate 400-2. In other words, the authentication terminal 300-2 prohibits the user U from entering or leaving the room 2.
- FIG. authentication terminal 300-2 transmits the result of face authentication including the fact that face authentication was successful, the user ID included in the embedded information, and the date and time of authentication (photographing date and time) to management device 500 via network N. do.
- the face authentication result may additionally include information on the location where authentication terminal 300-2 is installed or identification information on gate 400-2.
- the face authentication result functions as information for managing the attendance date and time of the user U and the date and time of entering and leaving the room.
- the processing of authentication terminal 300-2 has been described above, but the same applies to authentication terminals 300-1 and 300-3.
- the authentication terminal 300 does not necessarily have to control the opening and closing of the gate 400 .
- the user U visits the authentication terminal 300 at the start or end of work and undergoes face authentication by the authentication terminal 300 .
- the management device 500 manages the face authentication result of the user U who visited the authentication terminal 300 as a face authentication history. Then, the management device 500 manages the user U's attendance history and room entrance/exit history to the rooms 1 to 3 based on the user U's face authentication history.
- FIG. 4 is a diagram for explaining the outline of the flow of face authentication.
- the user U visits the code generation terminal 100 to generate code symbols.
- the code generation terminal 100 photographs the face of the user U with the camera 110 and generates a code symbol corresponding to the facial image generated by the photographing.
- the code generation terminal 100 transmits the generated code symbol information to the printing device 200 to print it on the code recording medium C (paper in this figure).
- the user U carries the code recording medium C on which the code symbols are printed, for example, in a card case with a neck strap.
- the user U approaches the corresponding authentication terminal 300 and holds the code recording medium C which he/she carries with him/her when starting work, entering/leaving the room, and finishing work.
- the authentication terminal 300 captures the face of the user U with the first camera 311 and the code recording medium C with the second camera 312 to perform face authentication.
- the authentication terminal 300 transmits the user ID included in the embedded information obtained by reading the code symbol of the code recording medium C to the management device 500 to open the gate 400 .
- the authentication terminal 300 closes the gate 400 when face authentication fails.
- the first camera 311 and the second camera 312 are arranged at different arbitrary positions on the main surface of the main body of the authentication terminal 300 . In this figure, the first camera 311 is arranged above the authentication terminal 300, and the second camera 312 is arranged below the authentication terminal 300.
- the first camera 311 is arranged below the authentication terminal 300, and the second camera 312 is arranged It may be arranged above the authentication terminal 300 . Also, the first camera 311 and the second camera 312 may be arranged on the left and right sides, or on the right and left sides of the authentication terminal 300 .
- FIG. 5 is a diagram showing an example of the data structure of embedded information.
- the embedded information includes biometric information for registration and management information used for information processing by authentication terminal 300 .
- This figure shows the data structure of types 1 to 4 of embedded information with different management information, although the biometric information for registration included in the embedded information is face information for registration.
- Type 1 embedded information includes a user ID as management information.
- Type 2 embedded information includes a user ID and restriction information as management information.
- the restriction information is information used when determining whether or not to restrict the user U from passing through the gate 400 .
- the restriction information is information used to determine whether or not biometric authentication is performed for passage through the gate 400 .
- the restriction information may be, for example, validity period information indicating the valid period of the code symbol, available location information indicating the location where the code symbol is available, or company attribute information indicating the user U's company attribute. The company attribute may be employment type, department, or title.
- Type 3 embedded information includes user ID and nationality-related information as management information. Nationality-related information is information related to user U's nationality, country of origin, or language used.
- Type 4 embedded information includes user ID, restriction information, and nationality-related information as management information.
- Embodiments 2 and 3 a case where the embedded information is type 1 will be described in Embodiments 2 and 3.
- the cases where the embedded information is type 2, 3, and 4 will be described in modifications of Embodiments 4, 5, and 5, respectively.
- FIG. 6 is a block diagram showing the configuration of the management device 500 according to the second embodiment.
- Management device 500 includes storage unit 510 , communication unit 520 , and control unit 530 .
- the storage unit 510 is a storage device that stores an authentication history 511.
- the authentication history 511 indicates the history of face authentication by the authentication terminal 300, and is information that associates a user ID 5111, a date and time 5112, and a gate ID 5113 with each other.
- the user ID 5111 is information identifying the user U who has successfully completed face authentication, which is included in the notification from the authentication terminal 300 .
- the date and time 5112 may be the face authentication date and time (shooting date and time) included in the notification of the face authentication result from the authentication terminal 300, or may be the date and time when the notification was received.
- the gate ID 5113 is information for identifying the gate 400 associated with the authentication terminal 300 that is the notification source.
- the gate ID 5113 may be information (positional information) indicating the location where the authentication terminal 300 that is the notification source is installed or the location where the gate 400 associated with the authentication terminal 300 is installed.
- the storage unit 510 stores a program for realizing each function of the management device 500 .
- the communication unit 520 is a communication interface with the network N.
- the control unit 530 controls hardware of the management device 500 . Upon receiving a face authentication result notification from the authentication terminal 300 , the control unit 530 records the user ID, date and time, and gate ID included in the notification in the storage unit 510 as an authentication history 511 .
- FIG. 7 is a block diagram showing the configuration of the code generation terminal 100 according to the second embodiment.
- the code generation terminal 100 includes a camera 110 , a storage section 120 , a memory 130 , a communication section 140 , an input section 150 , an output section 160 and a control section 170 .
- the camera 110 is a photographing device that takes pictures under the control of the control unit 170 .
- the storage unit 120 is a storage device that stores a program 121 for realizing each function of the code generation terminal 100 .
- the memory 130 is a volatile storage device such as a RAM (Random Access Memory), and is a storage area for temporarily holding information when the control unit 170 operates.
- the communication unit 140 is a communication interface with the network N. FIG. Also, the communication unit 140 may function as a communication interface with the printing device 200 .
- the input unit 150 is an input device that receives input.
- the output unit 160 outputs the information processing result of the control unit 170 .
- the output section 160 has a display section 161 and an audio output section 162 .
- the display unit 161 is a display device that displays information processing results of the control unit 170 .
- the display unit 161 and the input unit 150 may be configured integrally like a touch panel, for example.
- Audio output unit 162 includes a speaker, and outputs information processing results of control unit 170 as audio.
- the control unit 170 is a processor that controls each component of the code generation terminal 100, that is, a control device.
- the control unit 170 loads the program 121 from the storage unit 120 into the memory 130 and executes the program 121 . Thereby, the control unit 170 realizes the functions of the image acquisition unit 171 , the registration information acquisition unit 172 , the conversion unit 174 and the output control unit 175 .
- the image acquisition unit 171 is also called image acquisition means.
- the image acquisition unit 171 controls the camera 110 to photograph the face of the user U and generate a face image for registration including at least the face area of the user U. Then, the image acquisition unit 171 acquires a facial image for registration from the camera 110 .
- the image acquisition unit 171 supplies the face image for registration to the registration information acquisition unit 172 .
- the registration information acquisition unit 172 is also called registration information acquisition means.
- the registration information acquisition unit 172 acquires face information for registration of the user U from the face image for registration.
- the registration information acquisition unit 172 acquires user U's management information.
- the registration information acquisition unit 172 acquires a user ID, which is user U's management information, via the input unit 150 .
- the input unit 150 may receive a manual input from the user U or another operator, or may receive an input by reading an information medium such as a bar code on which management information is recorded.
- the registration information acquisition unit 172 may acquire the user ID by issuing a new user ID when acquiring the user U's face image.
- the registration information acquisition section 172 has a detection section 1721 , a feature point extraction section 1722 and a management information acquisition section 1723 .
- the detection unit 1721 is also called detection means.
- the detection unit 1721 detects a face area included in the face image for registration and supplies it to the feature point extraction unit 1722 .
- the feature point extraction unit 1722 is also called feature point extraction means.
- the feature point extraction unit 1722 extracts feature points from the face area detected by the detection unit 1721, and supplies information on the extracted feature points to the conversion unit 174 as face information for registration.
- the management information acquisition unit 1723 is also called management information acquisition means.
- the management information acquisition unit 1723 acquires management information such as the user ID received from the user U by the input unit 150 . However, the management information acquisition unit 1723 may issue a new user ID upon code symbol generation. The management information acquisition unit 1723 then supplies the management information to the conversion unit 174 .
- the conversion unit 174 is also called conversion means.
- the conversion unit 174 converts embedded information including face information for registration of the user U and management information into a visible code symbol.
- the conversion unit 174 converts embedded information into a QR code symbol (QR code).
- the conversion into code symbols may be conversion of combined information obtained by combining face information for registration and management information into code symbols.
- part of the embedded information for example, face information for registration
- part of the parent code symbol is converted to the remaining embedded information (for example, management information).
- the replacement may be to generate a code symbol.
- the conversion unit 174 may encrypt the embedded information and then convert it into a code symbol. Thereby, the security level can be improved.
- conversion unit 174 may encrypt part of the embedded information and not encrypt part.
- the conversion unit 174 may encrypt the face information for registration without encrypting the management information, or may encrypt the management information without encrypting the face information for registration.
- the output control unit 175 is also called output control means.
- the output control unit 175 outputs the code symbol information converted by the conversion unit 174 to the printing device 200 via the communication unit 140 .
- the code symbol representing the embedded information can be printed on the code recording medium C.
- FIG. 8 is a flow chart showing the flow of the code generation method according to the second embodiment.
- the image acquisition unit 171 of the code generation terminal 100 controls the camera 110 to photograph the face of the user U, and acquires the face image for registration of the user U generated by the photographing (S101).
- the registration information acquisition unit 172 executes face information extraction processing for extracting face information from the face image for registration of the user U (S102).
- the detection unit 1721 of the registration information acquisition unit 172 detects a face region included in the face image for registration of the user U, and the feature point extraction unit 1722 extracts feature points from the detected face region. , is used as face information for registration.
- the registration information acquisition unit 172 supplies face information for registration to the conversion unit 174 .
- the management information acquisition unit 1723 of the registration information acquisition unit 172 acquires the user ID, which is management information, via the input unit 150 (S103).
- the input unit 150 may receive a manual input from the user U or another operator, or may receive an input by reading an information medium on which management information is recorded.
- the management information acquisition unit 1723 may issue a new user ID.
- the management information acquisition unit 1723 supplies management information (user ID here) to the conversion unit 174 .
- the conversion unit 174 generates embedded information based on the face information for registration and the management information (S104).
- the conversion unit 174 may combine and convert the face information for registration and the management information into one piece of information.
- the generation of embedded information may be performed by specifying face information for registration as first embedded information and management information as second embedded information.
- the conversion unit 174 converts the embedded information into code symbols (S105).
- the conversion unit 174 may convert the embedded information into code symbols using existing technology.
- the conversion unit 174 may convert combined information of face information for registration and management information into code symbols.
- the conversion unit 174 also converts the first embedded information (face information for registration) and the error correction code into code symbols, and converts some blocks of the code symbols to blocks in which the second embedded information is embedded. can be replaced with
- the output control unit 175 outputs the converted code symbol information to the printing device 200 (S106).
- FIG. 9 is a block diagram showing the configuration of the authentication terminal 300 according to the second embodiment.
- Authentication terminal 300 includes imaging unit 310 , storage unit 320 , memory 330 , communication unit 340 , output unit 360 , and control unit 370 .
- the imaging unit 310 is also called imaging means.
- the imaging unit 310 performs imaging under the control of the control unit 370 .
- the imaging unit 310 has a first camera 311 and a second camera 312 .
- the first camera 311 photographs the face of the user U under the control of the control unit 370 .
- the second camera 312 photographs the code recording medium C carried by the user U under the control of the control unit 370 .
- the storage unit 320 is a storage device in which a program 321 for realizing each function of the authentication terminal 300 is stored.
- the memory 330 is a volatile storage device such as RAM, and is a storage area for temporarily holding information when the control unit 370 operates.
- a communication unit 340 is a communication interface with the network N. FIG.
- the output unit 360 outputs the information processing result of the control unit 370 .
- the output section 360 has a display section 361 and an audio output section 362 .
- the display unit 361 is a display device that displays information processing results of the control unit 370 .
- the authentication terminal 300 may include an input unit (not shown) that receives input, and the display unit 361 and the input unit may be integrally configured like a touch panel.
- the audio output unit 362 includes a speaker and outputs the information processing result of the control unit 370 as audio.
- the control unit 370 is a processor that controls each component of the authentication terminal 300, that is, a control device.
- the control unit 370 loads the program 321 from the storage unit 320 into the memory 330 and executes the program 321 .
- the control unit 370 realizes the functions of an image acquisition unit 371 , an authentication information generation unit 372 , an embedded information acquisition unit 373 , an authentication unit 374 , an output control unit 375 , a notification unit 376 and a gate control unit 377 .
- the image acquisition unit 371 is also called image acquisition means.
- the image acquisition unit 371 controls the first camera 311 of the imaging unit 310 to photograph the face of the user U and generate a facial image for authentication including at least the face area of the user U.
- the image acquisition unit 371 then acquires a facial image for authentication from the first camera 311 .
- the image acquisition unit 371 also controls the second camera 312 of the imaging unit 310 to capture an image of the code recording medium C carried by the user U and generate a code image.
- the image acquisition unit 371 then acquires the code image from the second camera 312 .
- the image acquisition unit 371 supplies the facial image for authentication to the authentication information generation unit 372 and supplies the code image to the embedded information acquisition unit 373 .
- the authentication information generation unit 372 is also called authentication information generation means.
- the authentication information generation unit 372 generates face information for authentication of the user U from the face image for authentication.
- the authentication information generator 372 has a detector 3721 and a feature point extractor 3722 .
- the detection unit 3721 and the feature point extraction unit 3722 may perform the same processing as the detection unit 1721 and the feature point extraction unit 1722 of the code generation terminal 100, respectively. That is, the detection unit 3721 detects a face area included in the face image for authentication and supplies it to the feature point extraction unit 3722 .
- the feature point extraction unit 3722 extracts feature points from the face area detected by the detection unit 3721, and supplies information on the extracted feature points to the authentication unit 374 as face information for authentication.
- the embedded information acquisition unit 373 is also called embedded information acquisition means.
- the embedding information acquiring unit 373 extracts code symbols from the code image acquired by the image acquiring unit 371 and decodes the code symbols to acquire embedding information.
- Embedded information acquisition section 373 supplies the embedded information to authentication section 374 .
- the authentication unit 374 is also called authentication means. Authentication unit 374 performs face authentication by comparing the facial information for registration included in the embedded information acquired by embedded information acquiring unit 373 with the facial information for authentication generated by authentication information generating unit 372 . Run. The authentication unit 374 notifies the output control unit 375, the notification unit 376, and the gate control unit 377 of whether or not the face information matches. Whether face information matches or not corresponds to success or failure of authentication. Note that matching face information (matching) means that the degree of matching is equal to or greater than a predetermined value.
- the output control unit 375 is also called output control means.
- the output control unit 375 controls the output unit 360, causes the output unit 360 to output the information processing result, and notifies the user U of the information processing result.
- the output control unit 375 causes the output unit 360 to output the face authentication result, and notifies the user U of the face authentication result.
- the notification unit 376 is also called notification means.
- the notification unit 376 extracts the user ID from the embedded information, and manages the face authentication result and the user ID via the network N. Notify device 500 . Note that the user ID may be included in the face authentication result.
- the gate control unit 377 is also called gate control means.
- the gate control unit 377 permits or prohibits the user U from passing through the gate 400 according to the face authentication result.
- the gate control unit 377 transmits a control signal according to the face authentication result to the gate driving device of the gate 400 at the shooting point of the user U.
- the gate control unit 377 transmits a control signal (opening control signal) to the gate driving device to open the gate 400 to the user U. to allow passage through the gate 400.
- the gate control unit 377 transmits a control signal to the gate driving device to close the gate 400 and instructs the user U to pass through the gate 400 .
- the control signal transmitted by the gate control unit 377 indicates success or failure of face authentication, or permission or prohibition of passage through the gate 400, instead of the control signal for opening or closing the gate. It may be a control signal for outputting to the gate driving device.
- the gate control unit 377 can manage entry and exit of the user U, but the gate control unit 377 is not essential. That is, there may be an authentication terminal 300 that does not include the gate control unit 377 .
- FIG. 10 is a flow chart showing the flow of the authentication method according to the second embodiment.
- the authentication terminal 300 executes the process shown in step S200.
- step S200 is a process in which the authentication terminal 300 generates facial information for authentication and acquires embedding information, and comprises steps S201 to S204.
- the image acquiring unit 371 of the authentication terminal 300 controls the first camera 311 of the imaging unit 310 to capture the face of the user U, thereby acquiring a face image for authentication (step S201).
- the authentication information generation unit 372 executes face information extraction processing for extracting face information from the authentication face image of the user U (step S202).
- the detection unit 3721 of the authentication information generation unit 372 detects a face area included in the face image for authentication of the user U, and the feature point extraction unit 3722 extracts feature points from the detected face area. , is used as face information for authentication.
- the authentication information generating section 372 supplies face information for authentication to the authentication section 374 .
- the image acquiring unit 371 controls the second camera 312 of the imaging unit 310 to capture the code recording medium C carried by the user U, thereby acquiring a code image (step S203).
- the embedded information acquisition unit 373 extracts the code symbol from the code image and decodes the code symbol to acquire embedded information (S204).
- Embedded information acquisition section 373 supplies the embedded information to authentication section 374 .
- steps S203-204 may be executed before steps S201-202 or may be executed in parallel with steps S201-202.
- the authentication unit 374 collates the face information for registration included in the embedded information with the face information for authentication extracted from the face image (S205). If the face information matches, that is, if the degree of matching of the face information is equal to or greater than a predetermined value (Yes in S206), the authentication unit 374 notifies the gate control unit 377 that the face information matches and is included in the embedded information.
- the received user ID is supplied to notification unit 376, and the process proceeds to step S207.
- the gate control unit 377 transmits an opening control signal to the gate driving device of the gate 400 corresponding to the authentication terminal 300 (S207). Thereby, the gate 400 is opened and the user U can pass through the gate 400 .
- the output control unit 375 may notify the user U of the success of the face authentication by displaying or outputting the success of the face authentication on the output unit 360 .
- the notification unit 376 transmits to the management device 500 via the network N a notification that includes at least the user ID and indicates that the face authentication has been successful.
- the notification unit 376 may include the face authentication date/time (shooting date/time) and the gate ID in the notification.
- the authentication unit 374 notifies the gate control unit 377 and the gate control unit 377 that the face information does not match. It is supplied to the notification unit 376 and the process proceeds to step S209.
- the gate control unit 377 transmits a closing control signal to the gate driving device of the gate 400 corresponding to the authentication terminal 300 (S209).
- the output control unit 375 may notify the user U of the face authentication failure by causing the output unit 360 to display or audibly output the fact that the face authentication has failed.
- the notification unit 376 transmits to the management device 500 via the network N as an error notification that the face authentication has failed. Note that the notification unit 376 may include the user ID included in the embedded information in the error notification, but is not limited to this.
- the authentication terminal 300 confirms whether the owner of the code recording medium C and the person to be photographed are the same without recording the biometric information in the DB, and confirms the person to be photographed. can be identified. As a result, spoofing can be prevented while suppressing system management costs. This is especially effective in industries with high turnover of workers. Moreover, since the authentication system 1000 does not need to manage biometric information, security risks such as information leakage can be reduced. Further, the printing of the code symbols on the code recording medium C such as paper can be easily carried out without requiring a special device, so that the operation cost can be suppressed. Moreover, even if the user U loses the code recording medium C, the authentication system 1000 can easily reissue the code recording medium C by generating and printing a code signal, which is highly convenient.
- the authentication terminal 300 Since the authentication terminal 300 notifies the management device 500 of the user ID of the user U whose biometric authentication has succeeded, management of the biometric authentication history can be facilitated. can be easily managed. This makes it possible to easily avoid fraudulent attendance registration and fraudulent entrance/exit by workers.
- the authentication terminal 300 acquires a face image and generates face information for authentication (steps S201 and 202 in FIG. 10), acquires a code image, and acquires embedded information. (Steps S203 and S204 in FIG. 10) may be performed in any order.
- the process of generating facial information for authentication including the process of extracting facial information, is a process with a high load. Therefore, if a face image is acquired and face information is extracted after the user U arrives at the authentication terminal 300, a waiting time may occur until the authentication process is completed.
- the authentication terminal 300 acquires the code image and starts the process of acquiring the face image and extracting the face information prior to the process of acquiring the embedded information.
- the authentication system 1000 according to the third embodiment has components similar to those of the authentication system 1000 according to the second embodiment, so description thereof will be omitted.
- the body part to be biometrically authenticated is described as being the face, but the present invention is not limited to this.
- FIG. 11 is a diagram for explaining the authentication method according to the third embodiment.
- the left-right direction of the user U is the X direction
- the height direction of the user U is the Z-axis direction
- the front-rear direction of the user U is the Y-axis direction.
- the optical axis directions of the first camera 311 and the second camera 312 of the imaging unit 310 may substantially match, and may substantially match the Y-axis direction. That is, the optical axis direction of the imaging section 310 may substantially match the Y-axis direction.
- a capture volume CV1 shown in the figure is an area in which the first camera 311 of the imaging unit 310 of the authentication terminal 300 can capture an image of the face area of the user U for face authentication.
- the farthest distance from the imaging surface of the first camera 311 in the Y-axis direction within the capture volume CV1 is called a first maximum distance D1.
- the angle of view of the first camera 311 is set to the first angle of view ⁇ 1.
- the capture volume CV2 is an area where the second camera 312 of the imaging unit 310 of the authentication terminal 300 can capture an image of the code recording medium C for face authentication.
- the farthest distance from the imaging surface of the second camera 312 in the Y-axis direction within the capture volume CV2 is called a second maximum distance D2.
- the second maximum distance D2 is set shorter than the first maximum distance D1.
- the imaging surface of the second camera 312 may substantially coincide with the imaging surface of the first camera 311 in the Y-axis direction.
- the angle of view of the second camera 312 is set to the second angle of view ⁇ 2.
- the first camera 311 In response to detecting the user U within the capture volume CV1, the first camera 311 is controlled by the image acquisition section 371 of the control section 370 to capture a "face image for authentication". "The first camera 311 captures a 'facial image for authentication' in response to detection of the user U within the capture volume CV1" may mean any of the following cases A1 to A3.
- the captured image is supplied to the image acquisition unit 371 only when the first camera 311 detects the user U within the capture volume CV1.
- the image acquisition unit 371 may specify all the captured images supplied from the first camera 311 as “authentication face images”.
- the authentication information generation unit 372 starts extraction processing of face information.
- the first camera 311 continuously captures images at predetermined time intervals and supplies them to the image acquisition unit 371. Only when the user U is detected within the capture volume CV1, the image acquisition unit 371 captures the captured image as a face image for authentication. image" to the authentication information generation unit 372.
- the image acquisition unit 371 acquires a plurality of captured images generated by the first camera 311 capturing a plurality of times, and selects a part of the plurality of captured images as the “authentication face image”. It is supplied to the authentication information generation unit 372 . As a result, the authentication information generator 372 starts extracting the face information of the “face image for authentication”.
- the first camera 311 continuously captures images at predetermined time intervals, and continuously supplies captured images generated by the capturing to the authentication information generation unit 372 via the image acquisition unit 371 .
- the authentication information generation unit 372 identifies the supplied photographed image as the “authentication face image” in response to detecting the user U within the capture volume CV1, and identifies the “authentication face image”. Start face information extraction processing. That is, in case A3, the image acquisition unit 371 acquires a plurality of captured images generated by the first camera 311 capturing a plurality of times, and the authentication information generation unit 372 selects some of the captured images as “authentication Biometric information for authentication is generated as a face image for authentication.
- case A3 is defined as "the first camera 311 captures a 'face image for authentication' in response to detection of the user U within the capture volume CV1", but is not limited to this.
- the position of the user U when the “authentication face image” is captured by the first camera 311 is called a position P1.
- the distance is called the first distance d1.
- the first distance d1 may be the same as or shorter than the first maximum distance D1.
- the second camera 312 In response to detection of the code recording medium C carried by the user U within the capture volume CV2, the second camera 312 receives the control of the image acquisition unit 371 of the control unit 370 and captures the "authentication code image". to shoot. Note that “the second camera 312 captures the “authentication code image” in response to the detection of the code recording medium C carried by the user U within the capture volume CV2” means cases B1 to B3 below. It can mean either.
- the captured image is supplied to the image acquisition unit 371 only when the second camera 312 detects the code recording medium C within the capture volume CV2.
- the image acquisition unit 371 may specify all the captured images supplied from the second camera 312 as “authentication code images”.
- embedded information acquiring section 373 starts the process of acquiring embedded information.
- the second camera 312 continuously captures images at predetermined time intervals and supplies the images to the image acquisition unit 371. Only when the code recording medium C is detected within the capture volume CV2, the image acquisition unit 371 captures the captured image for authentication. and supplied to the embedding information acquisition unit 373 as a "code image of".
- embedded information acquiring section 373 starts the process of acquiring embedded information.
- the second camera 312 continuously captures images at predetermined time intervals, and the captured images are continuously supplied to the image acquisition unit 371 and embedded information acquisition unit 373 .
- the embedding information acquisition unit 373 identifies the captured image from the second camera 312 as the “authentication code image” and embeds it. Start the information acquisition process.
- case B3 defines that "the second camera 312 captures a 'code image for authentication' in response to detection of the code recording medium C carried by the user U within the capture volume CV2".
- the second camera 312 captures a 'code image for authentication' in response to detection of the code recording medium C carried by the user U within the capture volume CV2.
- it is not limited to this.
- the position of the user U when the “authentication code image” is captured by the second camera 312 is called a position P2, and the distance from the imaging surface of the second camera 312 to the position P2 in the optical axis direction of the second camera 312 is The distance is called a second distance d2.
- the second distance d2 may be the same as or shorter than the second maximum distance D2.
- the second distance d2 at position P2 is shorter than the first distance d1 at position P1. Therefore, first, the image acquisition unit 371 of the authentication terminal 300 captures the face region of the user U with the first camera 311 when the user U is at the position P1 away from the imaging unit 310 by the first distance d1, and generates a user image. A face image of U is acquired and supplied to the authentication information generation unit 372 . After acquiring the face image, the authentication information generation unit 372 starts processing for generating face information for authentication from the face image. As a result, the authentication information generation unit 372 can perform processing for generating face information for authentication while the user U is approaching.
- the image acquisition unit 371 obtains a code image generated by capturing the code recording medium C carried by the user U with the second camera 312 when the user U is at the position P2 which is the second distance d2 away from the imaging unit 310. acquired and supplied to the embedding information acquisition unit 373 .
- embedding information acquisition section 373 starts processing to acquire embedding information from the code image. By performing such a processing procedure, it is possible to avoid the occurrence of waiting time for the authentication processing and improve the throughput.
- the second angle of view ⁇ 2 of the second camera 312, that is, the second angle of view ⁇ 2 when photographing the code recording medium C is the first angle of view ⁇ 1 of the first camera 311, that is, the face (body) of the user U. It may be set wider than the first angle of view ⁇ 1 for photographing. In addition, the second angle of view ⁇ 2 may be the same as the first angle of view ⁇ 1, or may be set narrower.
- condition for determining that the user U has been detected within the capture volume CV1 can also be called the condition for starting face information extraction processing of the "authentication face image”.
- FIG. 12 is a diagram for explaining an example of conditions for starting face information extraction processing (conditions for detecting user U within capture volume CV1) according to the third embodiment.
- This figure shows a photographed image I photographed by the first camera 311 .
- the captured image I includes the user U's face area.
- the condition for starting the face information extraction process may be that the size, width, or length of the face region of the user U included in the captured image I captured by the first camera 311 is equal to or greater than a predetermined number of pixels.
- the authentication information generation unit 372 receives the captured image I from the image acquisition unit 371 and detects the face area.
- the authentication information generating section 372 determines whether or not the width x1 or the length z1 of the face area is equal to or greater than a predetermined number of pixels. If the width x1 or the length z1 is equal to or greater than the predetermined number of pixels, the authentication information generation unit 372 starts face information extraction processing of the "face image for authentication". Note that the total number of pixels (length za ⁇ width xa) of the captured image from the first camera 311 is predetermined. Therefore, determining whether the width x1 or the length z1 is equal to or greater than the predetermined number of pixels means determining whether the width x1 with respect to the width xa of the captured image is equal to or greater than a predetermined value.
- the condition for starting the facial information extraction process is that the length connecting characteristic points of predetermined facial features included in the facial region of the user U, included in the captured image captured by the first camera 311, is It may be a predetermined number of pixels or more.
- the feature points of the facial features may be at least two of a right eye, a left eye, a nose endpoint, a mouth endpoint, a right eyebrow endpoint, and a left eyebrow endpoint.
- feature points of facial features are the right eye and the left eye.
- the authentication information generator 372 detects the face area and detects the positions of the right eye and the left eye within the face area.
- the authentication information generating section 372 determines whether or not the length x2 between the right eye and the left eye in the face area is equal to or greater than a predetermined number of pixels.
- the authentication information generation unit 372 starts face information extraction processing of the "face image for authentication".
- determining whether the length x2 is equal to or greater than the predetermined number of pixels is the same as determining whether the length x2 with respect to the width xa of the captured image is greater than or equal to the predetermined value.
- face information for authentication is generated by the face information extraction process only when the size of the face area is sufficient. Therefore, processing efficiency is improved, and throughput can be improved.
- the condition for starting the face information extraction process may be that the likelihood index of the body calculated from the captured image captured by the first camera 311 is equal to or greater than a predetermined threshold.
- the body certainty index may be, for example, a face-likeness index.
- the condition for starting the face information extraction process is that the index of likelihood of the body calculated from each of a plurality of captured images captured by the first camera 311 within a predetermined time is the largest value among the plurality of captured images. It may be to have.
- the authentication control unit 342 calculates a probability index of the body for each of a plurality of captured images captured by the first camera 311 and supplied from the image acquisition unit 371, and calculates a plurality of images based on the index. A part of the captured images is selected as the “authentication face image”. Also by this, face information for authentication is generated by the face information extraction process only when the probability is relatively high. Therefore, processing efficiency is improved, and throughput can be improved.
- the condition for starting the face information extraction process is that the sensor detects the presence of the person within the capture volume CV1. It may be the detection of the presence of
- condition for starting the face information extraction process condition for detecting the user U within the capture volume CV1
- the conditions for starting the embedded information acquisition process may also be determined arbitrarily.
- the condition for starting the embedding information acquisition process may be that the size, width, or length of the image area of the code symbol included in the code image is equal to or greater than a predetermined pixel value.
- the condition for starting the embedded information acquisition process may be that the sensor detects the presence of a person in the capture volume CV2. good.
- the second camera 312 is normally not activated, and may be activated when a predetermined activation condition is satisfied.
- the predetermined activation condition may be detection of the face area of the user U from the captured image captured by the first camera 311 .
- the predetermined activation condition may be that the first camera 311 has captured a “face image for authentication”.
- the predetermined activation condition may be that the authentication information generation unit 372 has started or completed face information extraction processing of the “authentication face image”.
- the activation process of the second camera 312 may be performed by the image acquisition unit 371 .
- the image acquisition unit 371 acquires the “authentication face image” from the first camera 311, or the authentication information generation unit 372 acquires authentication face information for the “authentication face image”.
- the second camera 312 may be activated in response to starting or completing the process of generating the . By not activating the second camera 312 until the predetermined processing related to the first camera 311 is executed in this way, power consumption can be suppressed, and erroneous photographing and erroneous recognition can be avoided. . Then, second camera 312 may capture a code image in response to being activated, and embedded information acquiring section 373 may start the process of acquiring embedded information.
- the authentication information generation unit 372 detects that the user U has It may be determined whether or not it is approaching . Specifically, the authentication information generation unit 372 extracts the face information of the face image for authentication, and extracts the human area of the user U included in the captured image captured by the first camera 311 thereafter. do tracking. A person region to be tracked may be, for example, a face region or an eye region. The authentication information generating unit 372 determines whether the user U It is determined whether or not the object is approaching the imaging unit 310 . When the authentication information generation unit 372 determines that the user U is approaching the imaging unit 310, the authentication information generation unit 372 causes the embedded information acquisition unit 373 to start acquiring the embedded information from the authentication code image.
- the authentication information generation unit 372 may cause the authentication unit 374 to perform face authentication (collation).
- face authentication erroneous recognition of the combination of the code image and face image can be prevented. That is, it is possible to prevent the face image from being collated with the code image of the code recording medium C carried by a user different from the user U indicated by the face image.
- FIG. 13 is a flowchart showing part of the flow of the authentication method according to the third embodiment.
- This figure shows the process of step S200a corresponding to step S200 shown in FIG. Step S200a differs from step S200 in that steps S221-227 are included instead of steps S201-203.
- the photographing of the "authentication image" by the first camera 311 and the photographing of the "authentication code image” by the second camera 312 are defined as cases A3 and B3, respectively.
- all the captured images captured by the first camera 311 at predetermined time intervals are supplied to the authentication information generating section 372 via the image acquiring section 371 .
- all the captured images captured by the second camera 312 at predetermined time intervals are supplied to the embedded information acquisition section 373 via the image acquisition section 371 .
- the authentication information generation unit 372 of the authentication terminal 300 determines whether or not the user U is positioned within the capture volume CV1 of the first camera 311 (S221). That is, the authentication information generation unit 372 determines whether or not the conditions for starting the face information extraction process are satisfied. When the authentication information generation unit 372 determines that the user U is not positioned within the capture volume CV1 of the first camera 311 (No in S221), the processing is repeated. On the other hand, when the authentication information generating unit 372 determines that the user U is positioned within the capture volume CV1 of the first camera 311 (Yes in S221), the captured image captured by the first camera 311 is used as the "authentication face image” (S222).
- the authentication information generation unit 372 starts face information extraction processing on the "face image for authentication” (S223). This step is the same as step S202 in FIG.
- the authentication information generation unit 372 starts tracking the user U using the captured image captured by the first camera 311 after the timing of capturing the specified “authentication face image” (S224).
- the authentication information generation unit 372 determines whether or not the user U is approaching the imaging unit 310 (S225). When determining that the user U is not approaching the imaging unit 310 (No in S225), the authentication information generation unit 372 returns the process to step S221. On the other hand, when the authentication information generation unit 372 determines that the user U is approaching the imaging unit 310 (Yes in S225), the process proceeds to step S226.
- the embedding information acquisition unit 373 determines whether or not the code recording medium C carried by the user U is positioned within the capture volume CV2 (S226). If the embedding information acquisition unit 373 determines that the code recording medium C is not located within the capture volume CV2 (No in S226), the process returns to step S225. On the other hand, when the embedding information acquisition unit 373 determines that the code recording medium C is positioned within the capture volume CV2 (Yes in S226), the captured image captured by the second camera 312 is regarded as the "authentication code image. ” (S227). Embedded information obtaining unit 373 then obtains embedded information from the "authentication code image" (S204), and the process proceeds to step S205 shown in FIG.
- the process of extracting the face information of the "authentication face image” is started in response to detection of the user U within the capture volume CV1.
- face information extraction processing may be performed on all captured images that are captured by the first camera 311 and supplied, and face information for authentication may be generated. That is, the image acquisition unit 371 acquires a plurality of “authentication face images” generated by the first camera 311 capturing the face of the user U multiple times, and the authentication information generation unit 372 acquires the plurality of “face images for authentication”. Authentication face information of the user U may be generated for each of the “authentication face images”. Then, the authentication information generating section 372 may supply the face information for authentication generated by successful extraction processing of the face information for face authentication to the authentication section 374 as a matching target.
- the authentication terminal 300 of the third embodiment prior to photographing the code recording medium C, the body of the user U is photographed, and the process of acquiring biometric information for authentication from the body image is started. As a result, the authentication terminal 300 can acquire biometric information for authentication while the user U is approaching the imaging unit 310, thereby improving throughput of authentication.
- the fourth embodiment is a modification of the second embodiment, and the embedded information indicated by the code symbol of the code recording medium C is type 2 embedded information. That is, the embedded information includes biometric information for registration, and user ID and restriction information as management information.
- FIG. 14 is a block diagram showing the configuration of the authentication terminal 300a according to the fourth embodiment.
- An authentication terminal 300a according to the fourth embodiment has basically the same configuration and functions as the authentication terminal 300 according to the first embodiment. However, the authentication terminal 300a differs from the authentication terminal 300 in that it includes a storage unit 320a instead of the storage unit 320 and a control unit 370a instead of the control unit 370.
- FIG. The storage unit 320a stores a program 321a and restriction condition information 322.
- the program 321a is a computer program in which processing of the authentication method according to the fourth embodiment is implemented.
- the restriction condition information 322 records conditions (restriction conditions) for restricting passage through the gate 400 regardless of the face authentication result.
- the restriction condition may function as a condition for stopping face authentication when passing through the gate 400 . This is because if the passage through the gate 400 is restricted regardless of the result of face recognition, there is little practical benefit to performing face recognition to determine whether or not to pass through the gate 400, and rather the throughput is improved if face recognition is not performed. is.
- the control unit 370a has an authentication unit 374a instead of the authentication unit 374.
- the authentication unit 374a performs face authentication when the restriction information does not satisfy the restriction condition indicated by the restriction condition information 322 of the storage unit 320a. On the other hand, if the restriction information satisfies the restriction condition recorded in the restriction condition information 322, the authentication unit 374a stops performing face authentication. In this case, the authentication unit 374a supplies the output control unit 375, the notification unit 376, and the gate control unit 377 with a restriction notification indicating that the face authentication has been stopped.
- the output control unit 375 may output to the output unit 360 that the execution of face authentication has been canceled and that passage through the gate 400 is not permitted.
- the notification unit 376 may notify the management device 500 that the execution of face authentication has been canceled and that passage through the gate 400 is not permitted upon receiving the restriction notification.
- the gate control unit 377 may receive the restriction notification and transmit a control signal for restricting the user U from passing through the gate to the gate driving device of the gate 400 .
- FIG. 15 is a diagram showing an example of the data structure of the restriction condition information 322 according to the fourth embodiment.
- Restriction information 322 may include one or more restrictions.
- the limiting condition information 322 may be information in which the type of limiting information and the limiting condition are associated with each condition ID.
- the restriction condition with the condition ID "1" is that when the embedded information includes usage-enabled location information as restriction information, the gate ID indicating the installation location of the gate 400 corresponding to the authentication terminal 300 is the usage location. It is not included in the available locations indicated by the information. Therefore, if the gate ID of gate 400 corresponding to authentication terminal 300 is not included in the available locations acquired from the embedded information, authentication unit 374a stops performing face authentication.
- the gate control unit 377 controls the gate 400 so as to restrict the user U from passing through the gate 400 .
- the available location may be determined based on the user U's place of work or an in-house attribute.
- the restrictive condition for condition ID "2" is that if the embedded information includes valid period information as restrictive information, the current date and time is not included in the valid period indicated by the valid period information. Therefore, the authentication unit 374a stops performing face authentication when the current date and time are not included in the validity period, such as when the validity period has expired.
- the gate control unit 377 controls the gate 400 so as to restrict the user U from passing through the gate 400 .
- the valid period may be determined based on the user U's labor contract period, working hours, or working days.
- the restriction condition with the condition ID "3" is that when the embedded information includes in-house attribute information as restriction information, the in-house attributes such as work type, department, or position indicated by the in-house attribute information are not predetermined in-house attributes. is.
- the employment form indicated by the in-house attribute information is an employment form other than a regular employee. Therefore, if the company attribute information indicates company attributes other than the predetermined company attributes, the authentication unit 374a stops performing face authentication.
- the gate control unit 377 controls the gate 400 so as to restrict the user U from passing through the gate 400 .
- FIG. 16 is a flow chart showing the flow of the authentication method according to the fourth embodiment.
- the steps shown in this figure are basically the same as the steps in FIG. 10, but differ in that step S301 is included between steps S204 and S205.
- the authentication unit 374a determines whether the restriction information included in the embedded information satisfies the restriction condition indicated by the restriction condition information 322. (S301).
- the authentication information generation unit 372a determines that the restriction condition is not satisfied (No in S301)
- the authentication information generation unit 372a proceeds to the collation processing shown in step S205. Note that the processing after step S205 is the same as in FIG.
- the gate control unit 377 transmits a closing control signal to the gate 400 (S209), and the notification unit 376 sends an error notification to the management device. 500 (S210).
- the error notification in this case does not include the user ID.
- the authentication terminal 300a restricts passage through the gate 400 using the restrictive condition, so it is possible to easily restrict entry and exit of non-related persons.
- work to monitor and supervise workers is usually required in order to prevent workers from entering and exiting rooms illegally. Since the terminal 300a automatically restricts passage, such work is not necessary.
- the authentication terminal 300a stops performing face authentication when the limiting conditions are satisfied, it is possible to avoid unnecessary calculations and improve throughput.
- step S301 may be executed after performing face authentication. Specifically, step S301 may be executed between step S207 and Yes in step S206 after it is determined that face authentication has succeeded, instead of between steps S204 and S205. In this case, although the effect of improving the throughput is reduced, the user ID can be included in the error notification to the management device 500, so that the user U who tried to commit fraud can be identified.
- the code generation method according to the fourth embodiment may be the same as the steps shown in FIG. to get the restriction information.
- the registration information acquisition unit 172 and the input unit 150 may receive manual input from the user U or other operators, or may receive an information medium such as a bar code on which restriction information is recorded in addition to the user ID. Input may be accepted by reading.
- the registration information acquisition unit 172 acquires the user ID by newly issuing it when acquiring the face image of the user U, and the restriction information by accepting manual input by the input unit 150 or by receiving the information medium. may be obtained through reading the
- the fifth embodiment is a modification of the second embodiment, and the embedded information indicated by the code symbol of the code recording medium C is type 3 embedded information. That is, the embedded information includes biometric information for registration, and user ID and nationality-related information as management information. The nationality-related information relates to user U's nationality, country of origin, or language used.
- FIG. 17 is a block diagram showing the configuration of an authentication terminal 300b according to the fifth embodiment.
- the authentication terminal 300b according to the fifth embodiment has basically the same configuration and functions as the authentication terminal 300 according to the first embodiment. However, the authentication terminal 300b differs from the authentication terminal 300 in that it includes a storage unit 320b instead of the storage unit 320 and a control unit 370b instead of the control unit 370.
- FIG. Storage unit 320b stores program 321b and language table 323 .
- the program 321b is a computer program in which processing of the authentication method according to the fifth embodiment is implemented.
- the language table 323 stores display information and audio output information for each language.
- the control unit 370b has an output control unit 375b instead of the output control unit 375.
- the output control unit 375b causes the output unit 360 to output the result of face authentication in a language corresponding to the nationality or country of origin indicated by the nationality-related information, or in the language used by the nationality-related information. Note that the output control unit 375b may output the reason for face authentication failure in the language when the face authentication fails.
- FIG. 18 is a diagram showing an example of output from the authentication terminal 300b according to the fifth embodiment.
- the output control unit 375b of the authentication terminal 300b refers to the display information in English from the language table 323, and displays the information.
- the face authentication result is displayed in English on the unit 361 .
- This figure shows an example of the display when the face authentication information is successful, and the display unit 361 displays information indicating that the face authentication is successful and information prompting passage through the gate 400 in English. ing.
- the embedded information includes the country of origin "United States" as the nationality-related information
- the language corresponding to the United States is identified as English
- the display information in English is referred to from the language table 323, and the display unit 361
- the face recognition result may be displayed in English.
- the authentication terminal 300b since the authentication terminal 300b outputs the face authentication result in the language used by the user U or a language that is likely to be used, the user U can easily grasp the face authentication result. can. Especially in industries with many foreign workers, there is a remarkable effect.
- the code generation method according to the fifth embodiment may be the same as the steps shown in FIG. nationality-related information.
- the registration information acquisition unit 172 and the input unit 150 may accept manual input from the user U or other operators, or may receive an information medium such as a barcode in which nationality-related information is recorded in addition to the user ID. Input may be accepted by reading Alternatively, the registration information acquisition unit 172 acquires the user ID by newly issuing it when acquiring the face image of the user U, and the nationality-related information by accepting manual input by the input unit 150 or by receiving information. May be obtained via media reading.
- the embedded information indicated by the code symbol of the code recording medium C is type 4 embedded information. That is, the embedded information includes biometric information for registration, and user ID, restriction information, and nationality-related information as management information.
- the output control unit 375b causes the output unit 360 to output the restriction reason and coping method to the user U in a language corresponding to the nationality-related information. good.
- FIG. 19 is a diagram showing an example of output from the authentication terminal 300b according to the modification of the fifth embodiment.
- This figure shows an example of the display on the display unit 361 when the restriction information satisfies the restriction condition (expired) and the nationality-related information included in the embedded information is in the language used "English.”
- the display unit 361 displays information indicating expiration and information prompting re-registration in English.
- Information prompting re-registration is information prompting regeneration of code symbols.
- the authentication terminal 300b outputs the reason for the restriction and the coping method in the language that the user U uses or is likely to use, so that the user U is restricted from passing the gate. can be dealt with smoothly. Especially in industries with many foreign workers, there is a remarkable effect.
- Embodiment 6 of the present disclosure is a modification of the second embodiment.
- Embodiment 6 is characterized in that the authentication system selectively uses biometric authentication using the code recording medium C and biometric authentication using the face information database (DB) according to the attributes of the user.
- biometric authentication will be described using face authentication as an example, but the biometric authentication is not limited to this.
- FIG. 20 is a block diagram showing the overall configuration of an authentication system 1000c according to the sixth embodiment.
- the authentication system 1000c is a computer system that performs first face authentication using the code recording medium C and second face authentication using the face information DB.
- users U are divided into first users and second users according to user attributes. For example, a part-time employee is the first user, and a full-time employee is the second user.
- a first user carries a code recording medium C on which embedded information including management information (user ID) and face information is recorded, and uses the code recording medium C to perform first face authentication.
- the first user's user ID may be the user's employee ID.
- the second user carries an IC card in which the user ID is recorded as management information, and performs second face authentication using the IC card and the face information DB.
- the user ID of the second user may be the user's employee ID, or may be an IC card ID for identifying the IC card associated with the user's employee ID.
- the management information of the second user recorded in the IC card may have the same data structure as the management information shown in FIG. That is, in addition to the user ID, at least one of the restriction information and the nationality-related information may be recorded in the IC card as management information.
- the recording medium for recording the management information of the second user is not limited to the IC card.
- the authentication system 1000c includes a code generation terminal 100c, an authentication terminal 300c, a management device 500c, and a face information DB 600 instead of the code generation terminal 100, authentication terminal 300, and management device 500 of the authentication system 1000 according to the second embodiment.
- the code generation terminal 100c has the same functions as the code generation terminal 100 for the first user, but has the function of registering face information for registration in the face information DB 600 for the second user. have.
- the authentication terminal 300c has the same functions as the authentication terminal 300 of the second embodiment for the first user. However, for the second user, the authentication terminal 300c reads the user ID from the IC card, and uses the face information for authentication generated from the face image and the registration corresponding to the user ID stored in the face information DB 600. Face recognition is performed by matching the face information for For the second user, the authentication terminal 300c also performs output control, notification to the management device 500c when face authentication is successful, and gate control in the same manner as for the first user.
- the management device 500c manages the face authentication history of the first user and the face authentication history of the second user. In other words, the management device 500c manages the first user's attendance record and entry/exit history to rooms 1 to 3, and the second user's attendance record and entry/exit history to rooms 1 to 3.
- the face information DB 600 is a storage device that associates and stores the user ID of the second user and the face information for registration of the second user.
- FIG. 21 is a block diagram showing the configuration of the management device 500c according to the sixth embodiment.
- the management device 500 c includes a storage unit 510 c instead of the storage unit 510 of the management device 500 .
- the storage unit 510c stores a first authentication history 511c and a second authentication history 512c.
- the first authentication history 511c is a face authentication history of the first user, and is information in which a user ID 5111, a date and time 5112, and a gate ID 5113 are associated with each other like the authentication history 511.
- the second authentication history 512c is the face authentication history of the second user.
- the second authentication history 512c is information in which a user ID 5121, a date and time 5122, and a gate ID 5123 are associated with each other.
- control unit 530 When the control unit 530 receives a face authentication result notification for the first user from the authentication terminal 300c, it records the user ID, date and time, and gate ID included in the notification as the first authentication history 511c. On the other hand, when the control unit 530 receives notification of the result of face authentication for the second user from the authentication terminal 300c, it records the user ID, the date and time, and the gate ID included in the notification as the second authentication history 512c.
- FIG. 22 is a block diagram showing the configuration of the code generation terminal 100c according to the sixth embodiment.
- the code generation terminal 100 c includes a storage unit 120 c and a control unit 170 c instead of the storage unit 120 and the control unit 170 of the code generation terminal 100 .
- the storage unit 120c stores a program 121c in which the processing of the code generation method according to the sixth embodiment is implemented.
- the control unit 170c has a DB registration unit 176 in addition to the configuration of the control unit 170.
- the DB registration unit 176 registers the face information for registration in the face information DB 600 in association with the user ID.
- FIG. 23 is a flow chart showing the flow of the code generation method according to the sixth embodiment. The steps shown in this figure have steps S401-402 in addition to the steps shown in FIG.
- step S103 in response to the fact that the management information acquisition unit 1723 of the registration information acquisition unit 172 has acquired the user ID which is the management information via the input unit 150, the control unit 170 determines whether the user U is the first user. , is the second user (S401). For example, the control unit 170 may determine whether the user is the first user or the second user based on the type of user ID. If user U is the first user (A in step S401), the process proceeds to step S104. As in the second embodiment, the control unit 170 generates embedded information (S104), converts the embedded information into code symbols (S105), outputs the code symbols to the printing device 200 (S106), and ends the process. .
- S104 embedded information
- S105 converts the embedded information into code symbols
- S106 outputs the code symbols to the printing device 200
- the DB registration unit 176 associates the face information for registration with the user ID included in the management information and registers them in the face information DB 600. (S402). The DB registration unit 176 then terminates the process.
- FIG. 24 is a block diagram showing the configuration of an authentication terminal 300c according to the sixth embodiment.
- the authentication terminal 300 c includes a storage unit 320 c , a control unit 370 c and a card reader 380 instead of the storage unit 320 and the control unit 370 of the authentication terminal 300 .
- the storage unit 320c stores a program 321c in which the processing of the authentication method according to the sixth embodiment is implemented.
- the card reader 380 is a card reader that reads management information from the IC card presented by the second user.
- the control unit 370c has an embedded information acquisition unit 373c and an authentication unit 374c instead of the embedded information acquisition unit 373 and the authentication unit 374.
- the embedded information acquisition unit 373c has the same function as the embedded information acquisition unit 373 for the first user. That is, when the user U presents the code recording medium C and the image acquisition section 371 acquires the code image, the embedded information acquisition section 373c acquires the embedded information from the code image in the same manner as the embedded information acquisition section 373. do. However, for the second user, the embedded information acquisition unit 373c controls the card reader 380 to acquire management information from the IC card. That is, when the user U presents an IC card and the image acquisition section 371 does not acquire the code image, the embedded information acquisition section 373c controls the card reader 380 to acquire the management information from the IC card.
- the authentication unit 374c performs the same processing as the authentication unit 374 when the embedded information acquisition unit 373 acquires the embedded information from the code image.
- the authentication unit 374c stores the face for registration corresponding to the user ID included in the management information stored in the face information DB 600. Get information. Then, the authentication unit 374c collates the face information for registration with the face information for authentication generated based on the face image, and performs face authentication.
- FIG. 25 is a flow chart showing the flow of the authentication method according to the sixth embodiment. The steps shown in this figure have steps S501 to S503 in addition to the steps shown in FIG.
- step S202 after the authentication information generation unit 372 executes the process of extracting face information from the face image for authentication, the embedded information acquisition unit 373c detects whether the user U has presented the code recording medium C or the IC card. (S501). This determination may be made based on whether or not the image acquisition section 371 has acquired the code image. If the user U presents the code recording medium C (C in S501), the embedded information acquisition unit 373c advances the process to step S203. Steps after step S203 are the same as those in FIG. On the other hand, when the user U presents the IC card (I in S501), the embedded information acquisition unit 373c acquires the management information read by the card reader 380 (S502).
- the authentication unit 374c uses the user ID included in the management information to acquire the face information for registration corresponding to the user ID from the face information DB 600, and the face information for registration and the face image extracted from the face image in step S202.
- the face information for authentication is collated (S503).
- the authentication unit 374c then advances the process to step S206. Steps after step S206 are the same as in FIG.
- the authentication system 1000c performs the first face authentication using the code recording medium C for the first user, and the face information DB for the second user. perform the second face authentication using As a result, it is possible to use different face authentication methods according to target user attributes and manage face authentication histories separately.
- FIG. 26 is a block diagram showing the overall configuration of an authentication system 1000d according to the seventh embodiment.
- the authentication system 1000d includes a first server 700, a second server 710, and a relay device 800 in addition to the configuration of the authentication system 1000c.
- the first server 700 is a server computer that performs labor management for the first user based on the first user's face authentication history.
- the first server 700 is a part-time job management system that performs attendance management and payroll management for part-time jobs based on face authentication histories of part-time jobs.
- the second server 710 is a server computer that performs labor management of the second user based on the second user's face authentication history.
- the second server 710 is an employee management system that performs attendance management and payroll management for regular employees based on the face authentication history of regular employees.
- the first server 700 and the second server 710 are communicably connected to the relay device 800 .
- the relay device 800 is a server computer that relays data when transmitting and receiving data between the first server 700 and the management device 500c, or when transmitting and receiving data between the second server 710 and the management device 500c. .
- a relay device 800 is connected to a network N.
- the relay device 800 may relay communication, or may temporarily store data received from a transmission source so that a destination device can retrieve the stored data.
- the relay device 800 is installed to enhance the security level of the first server 700 and the second server 710, the relay device 800 is not essential in the authentication system 1000d.
- the first server 700 and the second server 710 may be connected to the network N if the relay device 800 is not included in the authentication system 1000d.
- the management device 500c transmits the first authentication history 511c stored in the storage unit 510c to the first server 700 via the relay device 800 when the transmission conditions for the first authentication history 511c are satisfied.
- the management device 500c transmits the first authentication history 511c stored in the storage unit 510c to the relay device 800 and causes the relay device 800 to temporarily store it.
- the management device 500c transmits the second authentication history 512c stored in the storage unit 510c to the second server 710 via the relay device 800 .
- the management device 500c transmits the second authentication history 512c stored in the storage unit 510c to the relay device 800 and causes the relay device 800 to temporarily store it.
- the transmission condition for each authentication history may be that a predetermined time has elapsed, or that the amount of data in the accumulated authentication history has reached or exceeded a predetermined amount.
- the management device 500c may have a table that associates user IDs with company attributes for each of the first user and the second user for face authentication history management.
- the first server 700 or the second server 710 associates the new in-house attribute information with the user ID.
- You may transmit to the management apparatus 500c via the relay apparatus 800.
- the management device 500c may periodically or irregularly inquire of the first server 700 or the second server 710 via the relay device 800 about the company attribute information corresponding to the user ID.
- the authentication system 1000d can suitably manage labor records based on the face authentication history for each attribute of the target user.
- Embodiment 8 Next, an eighth embodiment of the present disclosure will be described.
- one authentication terminal 300c performs face authentication by selectively using the first face authentication and the second face authentication.
- the authentication terminal that performs the first face authentication and the authentication terminal that performs the second face authentication are separated.
- FIG. 27 is a block diagram showing the overall configuration of an authentication system 1000e according to the eighth embodiment.
- the authentication terminal that executes the first face authentication is the authentication terminal according to any one of the second to seventh embodiments, and is the authentication terminal 300 according to the second embodiment in this figure.
- the authentication terminal that executes the second face authentication is the authentication terminal 900 different from the authentication terminal 300 .
- the user U If the user U is the first user, the user U holds the code recording medium C over the authentication terminal 300 and requests the first face authentication. On the other hand, if the user U is the second user, the user U holds the IC card over the authentication terminal 900 to request the second face authentication.
- FIG. 28 is a block diagram showing the configuration of the authentication terminal 900 according to the eighth embodiment.
- the authentication terminal 900 has basically the same configuration as the authentication terminal 300c, but includes an imaging unit 910, a storage unit 920, and a control unit 970 instead of the imaging unit 310, the storage unit 320c, and the control unit 370c.
- the imaging unit 910 has a first camera 311 that captures the face area of the user U.
- the second camera 312 for imaging the code recording medium C may be omitted.
- the storage unit 920 stores a program 921 in which processing related to the second face authentication method is implemented.
- the control unit 970 has an embedded information acquisition unit 973 and an authentication unit 974 instead of the embedded information acquisition unit 373c and the authentication unit 374c of the control unit 370c.
- the embedded information acquisition unit 973 has the function related to the second face authentication of the embedded information acquisition unit 373c, and the function related to the first face authentication may be omitted.
- the authentication unit 974 has the function related to the second face authentication of the authentication unit 374c, and the function related to the first face authentication may be omitted.
- the present disclosure is not limited to the above embodiments, and can be modified as appropriate without departing from the scope.
- the second to eighth embodiments described above may be combined arbitrarily.
- the third embodiment may be combined with any one of the fourth to eighth embodiments.
- Embodiment 4 and at least one of Embodiments 6 to 8 may be combined.
- Embodiment 5 and at least one of Embodiments 6 to 8 may be combined.
- the imaging units 310 of the authentication terminals 300, 300a, 300b, and 300c have the first camera 311 and the second camera 312.
- the imaging unit 310 may be a single camera that integrates the functions of the first camera 311 and the second camera 312 .
- the hardware configuration has been described, but the configuration is not limited to this.
- the present disclosure can also implement arbitrary processing by causing a processor to execute a computer program.
- Non-transitory computer readable media include various types of tangible storage media.
- Examples of non-transitory computer-readable media include magnetic recording media (e.g., flexible discs, magnetic tapes, hard disk drives), magneto-optical recording media (e.g., magneto-optical discs), CD-ROMs (Read Only Memory), CD-Rs, Includes CD-R/W, DVD (Digital Versatile Disc), semiconductor memory (eg, mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM, RAM (Random Access Memory)).
- magnetic recording media e.g., flexible discs, magnetic tapes, hard disk drives
- magneto-optical recording media e.g., magneto-optical discs
- CD-ROMs Read Only Memory
- CD-Rs Includes CD-R/W
- DVD Digital Versatile Disc
- semiconductor memory eg, mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM,
- the program may also be delivered to the computer on various types of transitory computer readable medium.
- Examples of transitory computer-readable media include electrical signals, optical signals, and electromagnetic waves.
- Transitory computer-readable media can deliver the program to the computer via wired channels, such as wires and optical fibers, or wireless channels.
- an image acquisition means having a visible code symbol in which embedded information including the biometric information of and identification information of the subject is recorded; embedded information acquiring means for acquiring the embedded information from the code image; authentication means for executing biometric authentication by comparing the biometric information for registration included in the embedded information with the biometric information for authentication generated based on the body image; and notification means for notifying a management device of the identification information of the subject when the biometric authentication is successful.
- the authentication terminal according to appendix A1 further comprising gate control means for restricting the subject from passing through a gate when the biometric authentication fails.
- the embedded information further includes validity period information indicating a validity period, The authentication terminal according to appendix A2, wherein the gate control means restricts the subject from passing through the gate when the current date and time is not included in the validity period indicated by the validity period information.
- the embedded information further includes available location information indicating available locations, According to appendix A2 or A3, the gate control means restricts the target person from passing through the gate when the installation location of the gate is not included in the available locations indicated by the available location information. authentication terminal.
- the embedded information further includes in-house attribute information indicating the subject's employment status, department or position,
- the gate control means restricts the target person from passing through the gate when the employment type, department, or position indicated by the in-house attribute information is not a predetermined employment type, department, or position. or the authentication terminal described in paragraph 1.
- An output control means for outputting the result of the biometric authentication, the embedded information further includes nationality-related information related to the subject's nationality, country of origin, or language used;
- the output control means outputs the result of the biometric authentication in a language corresponding to the nationality or country of origin indicated by the nationality-related information, or in the language used indicated by the nationality-related information.
- Authentication terminal as described.
- the authentication means compares biometric information for registration stored in a database with biometric information for authentication generated based on the body image when the image acquisition means does not acquire the code image.
- the authentication terminal according to any one of Appendices A1 to A6, which performs biometric authentication by (Appendix A8) a first camera that captures the subject's body;
- the image obtaining means detects the second camera in response to obtaining the body image from the first camera or in response to the start or completion of the process of generating the biometric information for authentication.
- a code generation terminal comprising: conversion means for converting embedded information including the biometric information for registration of the subject and the identification information of the subject into a visible code symbol.
- the authentication terminal is An image acquiring means for acquiring a body image generated by photographing the body of a subject and a code image generated by photographing a code recording medium, wherein the code recording medium is used for registration of the subject.
- An image acquisition means having a visible code symbol in which embedded information including the biometric information of and identification information of the subject is recorded; embedded information acquiring means for acquiring the embedded information from the code image; authentication means for performing biometric authentication by comparing the biometric information for registration included in the embedded information with the biometric information for authentication generated based on the body image; and notification means for notifying a management device of the identification information of the subject when the biometric authentication is successful.
- a non-temporary computer-readable medium storing a program for causing a computer to execute a notification process of notifying the management device of the identification information of the subject when the biometric authentication is successful.
- Appendix B1 A body image generated by photographing the subject's body when the subject is located at a first distance from an imaging means, and a second distance from the imaging means where the subject is shorter than the first distance. and an image acquisition means for acquiring a code image generated by photographing a code recording medium carried by the subject when the subject is at a distant position, wherein the code recording medium is an image for registration of the subject.
- an image acquisition means having a visible code symbol in which embedded information including biometric information is recorded; authentication information generation means for starting processing for generating biometric information for authentication of the subject from the body image in response to obtaining the body image of the subject; embedded information obtaining means for obtaining the embedded information from the code image in response to obtaining the code image; authentication means for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information; and gate control means for restricting the subject from passing through the gate when the biometric authentication fails.
- the imaging means has a first camera and a second camera, The first camera photographs the subject's body, The authentication terminal according to Appendix B1, wherein the second camera photographs the code recording medium carried by the subject.
- Appendix B3 The image acquiring means, in response to acquiring the body image from the first camera, or in response to the authentication information generating means starting or completing the process of generating the biometric information for authentication, The authentication terminal according to appendix B2, which activates the second camera.
- Appendix B4 The authentication terminal according to any one of Appendices B1 to B3, wherein a second angle of view for photographing the code recording medium is wider than a first angle of view for photographing the subject's body.
- Appendix B5 the body is a face, When the size or length of the facial region of the subject included in the body image is equal to or greater than a predetermined number of pixels, the authentication information generating means connects predetermined facial organs included in the facial region of the subject.
- the authentication terminal according to any one of appendices B1 to B4, wherein the biometric information for authentication of the subject is generated from the body image when the length is equal to or greater than a predetermined number of pixels.
- the authentication information generation means determines whether or not the subject is approaching the imaging means in response to starting the process of generating biometric information for authentication of the subject.
- Appendixes B1 to B5 An authentication terminal according to any one of paragraphs.
- Appendix B7 The authentication terminal according to Appendix B6, wherein the authentication means executes the biometric authentication when it is determined that the subject is approaching the imaging means.
- the image acquisition means acquires a plurality of body images generated by photographing the body of the subject a plurality of times, The authentication terminal according to any one of Appendices B1 to B7, wherein the authentication information generating means generates biometric information for authentication of the subject from a part of the plurality of body images.
- the authentication information generating means is calculating a likelihood index of the body for each of the plurality of body images; The authentication terminal according to appendix B8, wherein the partial body image is selected from the plurality of body images based on the index.
- the image acquisition means acquires a plurality of body images generated by photographing the body of the subject a plurality of times, The authentication terminal according to any one of appendices B1 to B7, wherein the authentication information generating means generates biometric information for authentication of the subject for each of the plurality of body images.
- the authentication information generating means is calculating an index of certainty of the body for the body image; The authentication terminal according to any one of appendices B1 to B10, wherein the biometric information for authentication of the subject is generated when the index is equal to or greater than a predetermined threshold.
- Appendix B12 The authentication terminal according to any one of Appendices B1 to B11, further comprising notification means for notifying the management apparatus of the identification information of the subject when the biometric authentication is successful.
- Appendix B13 A body image generated by photographing the subject's body when the subject is located at a first distance from an imaging means, and a second distance from the imaging means where the subject is shorter than the first distance. and an image acquisition means for acquiring a code image generated by photographing a code recording medium carried by the subject when the subject is at a distant position, wherein the code recording medium is an image for registration of the subject.
- An authentication system comprising: an authentication terminal having gate control means for restricting the subject from passing through a gate when the biometric authentication fails.
- the code recording medium has a visible code symbol in which embedded information including biometric information for registration of the subject is recorded; an embedded information obtaining step of obtaining the embedded information from the code image in response to obtaining the code image; an authentication step of performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information; a gate control stage that restricts the subject from passing through a gate if the biometric authentication fails.
- (Appendix B17) a first image acquisition process for acquiring a body image generated by photographing the subject's body when the subject is at a position separated by a first distance from the imaging means; Authentication information generation processing for starting processing for generating biometric information for authentication of the subject from the body image in response to acquisition of the body image of the subject; A second image for acquiring a code image generated by photographing a code recording medium carried by the subject when the subject is at a second distance shorter than the first distance from the imaging means.
- the code recording medium has a visible code symbol in which embedded information including biometric information for registration of the subject is recorded; embedded information acquisition processing for acquiring the embedded information from the code image in response to acquisition of the code image; an authentication process for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information;
- a non-temporary computer-readable medium storing a program for causing a computer to execute gate control processing for restricting the subject from passing through the gate when the biometric authentication fails.
- (Appendix C1) a first camera that captures the body of a subject; A second camera for photographing the code recording medium carried by the subject, wherein the code recording medium is a visible code symbol in which embedded information including biometric information for registration of the subject is recorded.
- a second camera having image acquisition means for acquiring a body image generated by photographing the body of the subject with the first camera and a code image generated by photographing the code recording medium with the second camera; authentication information generation means for starting processing for generating biometric information for authentication of the subject from the body image in response to obtaining the body image of the subject; embedded information obtaining means for obtaining the embedded information from the code image in response to obtaining the code image; authentication means for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information; and gate control means for restricting the subject from passing through the gate when the biometric authentication fails.
- Appendix C2 The authentication terminal according to appendix C1, wherein the first camera and the second camera are arranged at different positions on the main surface of the authentication terminal.
- the image acquiring means in response to acquiring the body image from the first camera, or in response to the authentication information generating means starting or completing the process of generating the biometric information for authentication,
- the authentication terminal according to Appendix C1 or C2 that activates the second camera (Appendix C4)
- the body is a face
- the authentication information generating means connects predetermined facial organs included in the facial region of the subject.
- the authentication terminal according to any one of appendices C1 to C4, wherein the biometric information for authentication of the subject is generated from the body image when the length is equal to or greater than a predetermined number of pixels.
- the authentication information generating means determines whether or not the subject is approaching the first camera in response to starting the process of generating biometric information for authentication of the subject. Notes C1 to C5 The authentication terminal according to any one of .
- the image acquisition means acquires a plurality of body images generated by photographing the body of the subject a plurality of times, The authentication terminal according to any one of Appendices C1 to C7, wherein the authentication information generating means generates biometric information for authentication of the subject from a part of the body images among the plurality of body images.
- the authentication information generating means is calculating a likelihood index of the body for each of the plurality of body images; The authentication terminal according to appendix C8, wherein the partial body image is selected from the plurality of body images based on the index.
- the image acquisition means acquires a plurality of body images generated by photographing the body of the subject a plurality of times, The authentication terminal according to any one of appendices C1 to C7, wherein the authentication information generating means generates biometric information for authentication of the subject for each of the plurality of body images.
- the authentication information generating means is calculating an index of certainty of the body for the body image; The authentication terminal according to any one of appendices C1 to C10, wherein the biometric information for authentication of the subject is generated when the index is equal to or greater than a predetermined threshold.
- Appendix C12 The authentication terminal according to any one of Appendices C1 to C11, further comprising notification means for notifying the management apparatus of the identification information of the subject when the biometric authentication is successful.
- Appendix C13 a first camera that captures the body of a subject; A second camera for photographing the code recording medium carried by the subject, wherein the code recording medium is a visible code symbol in which embedded information including biometric information for registration of the subject is recorded.
- a second camera having image acquisition means for acquiring a body image generated by photographing the body of the subject with the first camera and a code image generated by photographing the code recording medium with the second camera; authentication information generation means for starting processing for generating biometric information for authentication of the subject from the body image in response to obtaining the body image of the subject; embedded information obtaining means for obtaining the embedded information from the code image in response to obtaining the code image; authentication means for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information;
- An authentication system comprising: an authentication terminal having gate control means for restricting the subject from passing through a gate when the biometric authentication fails.
- (Appendix C16) a first image acquisition step of acquiring a body image generated by photographing the subject's body with a first camera; an authentication information generation step of starting a process of generating biometric information for authentication of the subject from the body image in response to obtaining the body image of the subject; A second image acquiring step of acquiring a code image generated by photographing a code recording medium carried by the subject with a second camera, wherein the code recording medium is biometric information for registration of the subject.
- a second image acquisition stage having a visible code symbol recorded with embedded information comprising an embedded information obtaining step of obtaining the embedded information from the code image in response to obtaining the code image; an authentication step of performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information; a gate control stage that restricts the subject from passing through a gate if the biometric authentication fails.
- (Appendix C17) a first image acquisition process of acquiring a body image generated by photographing the body of a subject with a first camera; Authentication information generation processing for starting processing for generating biometric information for authentication of the subject from the body image in response to acquisition of the body image of the subject; A second image acquisition process for acquiring a code image generated by photographing a code recording medium carried by the subject with a second camera, wherein the code recording medium is biometric information for registration of the subject.
- a second image acquisition process having a visible code symbol recorded with embedded information comprising embedded information acquisition processing for acquiring the embedded information from the code image in response to acquisition of the code image; an authentication process for performing biometric authentication by comparing the biometric information for authentication with the biometric information for registration included in the embedded information;
- a non-temporary computer-readable medium storing a program for causing a computer to execute gate control processing for restricting the subject from passing through the gate when the biometric authentication fails.
- authentication terminal 11 image acquisition unit 12 authentication information generation unit 13 embedded information acquisition unit 14 authentication unit 17 gate control unit 100, 100c code generation terminal 110 camera 120, 120c storage unit 121, 121c program 130 memory 140 communication unit 150 input unit 160 output unit 161 display unit 162 audio output unit 170, 170c control unit 171 image acquisition unit 172 registration information acquisition unit 1721 detection unit 1722 feature point extraction unit 1723 management information acquisition unit 174 conversion unit 175 output control unit 176 DB registration unit 200 printing Apparatus 300, 300a, 300b, 300c Authentication terminal 310 Imaging unit 311 First camera 312 Second camera 320, 320a, 320b, 320c Storage unit 321, 321a, 321b, 321c Program 322 Restriction condition information 323 Language table 330 Memory 340 Communication unit 360 output unit 361 display unit 362 audio output unit 370, 370a, 370b, 370c control unit 371 image acquisition unit 372 authentication information generation unit 3721 detection unit 3722 feature point extraction unit 373 embedded information acquisition unit 374, 3
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像と、前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像と、を取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段と
を備える。
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像と、前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像と、を取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対して前記ゲートの通過を制限するゲート制御手段と
を有する認証端末を備える。
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像を取得する第1画像取得段階と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成段階と、
前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像、を取得する第2画像取得段階であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得段階と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得段階と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証段階と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御段階と
を備える。
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像を取得する第1画像取得処理と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成処理と、
前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像、を取得する第2画像取得処理であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得処理と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得処理と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証処理と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御処理と
をコンピュータに実行させるためのプログラムが格納されている。
まず、本開示の実施形態1について説明する。図1は、実施形態1にかかる認証端末10の構成を示すブロック図である。認証端末10は、対象者が携帯するコード記録媒体を用いた生体認証を実行する情報処理端末である。コード記録媒体は、コードシンボルを有する。コードシンボルは、視認可能な情報コードであり、バーコード、QRコード(登録商標)等の二次元コード、又はカメレオンコード(登録商標)等のカラーバーコードであってよい。コードシンボルには、少なくとも対象者の登録用の生体情報を含む埋込情報が記録されている。生体情報は、顔、指紋、虹彩、耳、又は静脈の特徴情報である。対象者の識別情報は、対象者を識別する情報であり、対象者IDと呼ばれる。
次に、本開示の実施形態2について説明する。図3は、実施形態2にかかる認証システム1000の全体構成を示すブロック図である。認証システム1000は、対象者であるユーザUが携帯するコード記録媒体Cを用いた生体認証を実施するコンピュータシステムである。以下では、生体認証として、顔認証を例に挙げて説明するが、これに限らない。また、以下では、コード記録媒体Cは、紙やプラスチック等にコードシンボルを印字した印刷物であるとして説明する。例えばユーザUは、例えばネックストラップ付のカードケースにコード記録媒体Cを挿入して、首からカードケースを下げることで、コード記録媒体Cを携帯する。しかしこれに限らず、コード記録媒体Cは、ユーザUが携帯する、コードシンボルを表示したスマートフォン又はタブレット端末等であってもよい。
タイプ2の埋込情報は、管理情報としてユーザID及び制限情報を含む。制限情報は、ユーザUによるゲート400の通過を制限するか否かを判定する場合に用いられる情報である。あるいは制限情報は、ゲート400の通過に対して生体認証を実行するか否かを判定するために用いられる情報である。制限情報は、例えばコードシンボルの有効期間を示す有効期間情報、コードシンボルの利用可能な場所を示す利用可能場所情報又はユーザUの社内属性を示す社内属性情報であってよい。社内属性は、就業形態、部署又は役職であってよい。
タイプ3の埋込情報は、管理情報としてユーザID及び国籍関連情報を含む。国籍関連情報は、ユーザUの国籍、出身国又は使用言語に関連する情報である。
タイプ4の埋込情報は、管理情報としてユーザID、制限情報及び国籍関連情報を含む。
特徴点抽出部1722は、特徴点抽出手段とも呼ばれる。特徴点抽出部1722は、検出部1721が検出した顔領域から特徴点を抽出し、抽出した特徴点の情報を登録用の顔情報として、変換部174に供給する。
管理情報取得部1723は、管理情報取得手段とも呼ばれる。管理情報取得部1723は、入力部150でユーザUから受け付けたユーザID等の管理情報を取得する。しかしユーザIDについては、管理情報取得部1723は、コードシンボル生成に際して新規に発行してもよい。そして管理情報取得部1723は、管理情報を変換部174に供給する。
次に、本開示の実施形態3について説明する。上述の実施形態2では、認証端末300が顔画像を取得し、認証用の顔情報を生成する処理(図10のステップS201~202)と、コード画像を取得し、埋込情報を取得する処理(図10のステップS203~204)とは、任意の順序で行われてよいとした。しかし、認証用の顔情報を生成する処理は、顔情報を抽出する処理を含み、負荷が高い処理である。したがって、ユーザUが認証端末300に到着してから顔画像を取得して顔情報を抽出するのでは、認証処理が完了するまでに待ち時間が発生する可能性がある。これに対して実施形態3では、認証端末300は、コード画像を取得し、埋込情報を取得する処理に先立って、顔画像を取得して顔情報を抽出する処理を開始する。尚、実施形態3にかかる認証システム1000は、実施形態2にかかる認証システム1000と同様の構成要素を有するため、説明を省略する。尚、本実施形態3でも、生体認証の対象となる身体の部位は、顔であるとして説明するが、これに限らない。
またキャプチャボリュームCV2は、認証端末300の撮像部310の第2カメラ312が、顔認証のためにコード記録媒体Cを撮影することができる領域である。ここで、キャプチャボリュームCV2内で、Y軸方向において第2カメラ312の撮像面から最も離れた距離を第2最大距離D2と呼ぶ。第2最大距離D2は、第1最大距離D1よりも短く設定されている。尚、Y軸方向において第2カメラ312の撮像面は、第1カメラ311の撮像面と略一致していてよい。また、第2カメラ312の画角は、第2画角θ2に設定されている。
ケースA2では、第1カメラ311が所定時間間隔で絶えず撮影して画像取得部371に供給し、キャプチャボリュームCV1内でユーザUを検知した場合のみ画像取得部371が撮影画像を「認証用の顔画像」として認証情報生成部372に供給する。つまりケースA2では、画像取得部371は、第1カメラ311が複数回撮影して生成された複数の撮影画像を取得し、複数の撮影画像のうちの一部を「認証用の顔画像」として認証情報生成部372に供給する。これにより、認証情報生成部372は、「認証用の顔画像」の顔情報の抽出処理を開始する。
ケースA3では、第1カメラ311が所定時間間隔で絶えず撮影して、撮影により生成された撮影画像を、画像取得部371を介して認証情報生成部372に絶えず供給している。この場合、認証情報生成部372は、キャプチャボリュームCV1内でユーザUを検知したことに応じて、供給された撮影画像を「認証用の顔画像」として特定し、「認証用の顔画像」の顔情報の抽出処理を開始する。つまりケースA3では、画像取得部371は、第1カメラ311が複数回撮影して生成された複数の撮影画像を取得し、認証情報生成部372は、複数の撮影画像のうち一部を「認証用の顔画像」として、認証用の生体情報を生成する。
ケースB2では、第2カメラ312が所定時間間隔で絶えず撮影して画像取得部371に供給し、キャプチャボリュームCV2内でコード記録媒体Cを検知した場合のみ画像取得部371が撮影画像を「認証用のコード画像」として埋込情報取得部373に供給する。これにより、埋込情報取得部373は、埋込情報の取得処理を開始する。
ケースB3では、第2カメラ312が所定時間間隔で絶えず撮影して、撮影画像は画像取得部371及び埋込情報取得部373に絶えず供給されている。この場合、埋込情報取得部373は、キャプチャボリュームCV2内でコード記録媒体Cを検知したことに応じて、第2カメラ312からの撮影画像を「認証用のコード画像」として特定し、埋込情報の取得処理を開始する。
これにより、顔領域の大きさが十分である場合にのみ顔情報抽出処理により認証用の顔情報が生成される。したがって、処理効率が向上し、スループットの向上を図ることができる。
これにより、顔領域の大きさが十分である場合にのみ顔情報抽出処理により認証用の顔情報が生成される。したがって、処理効率が向上し、スループットの向上を図ることができる。
次に、本開示の実施形態4について説明する。実施形態4は、実施形態2の変形例であり、コード記録媒体Cのコードシンボルが示す埋込情報は、タイプ2の埋込情報である。つまり、埋込情報は、登録用の生体情報と、管理情報としてユーザID及び制限情報とを含む。
次に、本開示の実施形態5について説明する。実施形態5は、実施形態2の変形例であり、コード記録媒体Cのコードシンボルが示す埋込情報は、タイプ3の埋込情報である。つまり、埋込情報は、登録用の生体情報と、管理情報としてユーザID及び国籍関連情報とを含む。国籍関連情報は、ユーザUの国籍、出身国又は使用言語に関連する。
尚、実施形態4と実施形態5とを組み合わせることも可能である。実施形態5の変形例では、コード記録媒体Cのコードシンボルが示す埋込情報は、タイプ4の埋込情報である。つまり、埋込情報は、登録用の生体情報と、管理情報としてユーザID、制限情報及び国籍関連情報とを含む。埋込情報に含まれる制限情報が制限条件を満たした場合、出力制御部375bは、ユーザUに対して、国籍関連情報に応じた言語で、出力部360に制限理由及び対処方法を出力させてよい。
次に、本開示の実施形態6について説明する。実施形態6は、実施形態2の変形例である。実施形態6は、認証システムが、ユーザの属性に応じて、コード記録媒体Cを用いた生体認証と顔情報データベース(DB)を用いた生体認証とを使い分けることに特徴を有する。以下でも、生体認証として、顔認証を例に挙げて説明するが、これに限らない。
次に、本開示の実施形態7について説明する。実施形態7は、実施形態6の変形例である。図26は、実施形態7にかかる認証システム1000dの全体構成を示すブロック図である。認証システム1000dは、認証システム1000cの構成に加えて、第1サーバ700、第2サーバ710及び中継装置800を備える。
次に、本開示の実施形態8について説明する。上述の実施形態7では、1つの認証端末300cが、第1顔認証と第2顔認証とを使い分けて、顔認証を実行していた。しかし実施形態8では、第1顔認証を実行する認証端末と、第2顔認証を実行する認証端末とが分かれている。
(付記A1)
対象者の身体を撮影して生成された身体画像と、コード記録媒体を撮影して生成されたコード画像とを取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報と前記対象者の識別情報とを含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記コード画像から、前記埋込情報を取得する埋込情報取得手段と、
前記埋込情報に含まれる前記登録用の生体情報と、身体画像に基づいて生成された認証用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が成功した場合、前記対象者の識別情報を管理装置に通知する通知手段と
を備える認証端末。
(付記A2)
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段を備える
付記A1に記載の認証端末。
(付記A3)
前記埋込情報は、有効期間を示す有効期間情報をさらに含み、
前記ゲート制御手段は、現在日時が、前記有効期間情報が示す前記有効期間に含まれない場合、前記対象者に対して前記ゲートの通過を制限する
付記A2に記載の認証端末。
(付記A4)
前記埋込情報は、利用可能な場所を示す利用可能場所情報をさらに含み、
前記ゲート制御手段は、前記ゲートの設置場所が、前記利用可能場所情報が示す前記利用可能な場所に含まれない場合、前記対象者に対して前記ゲートの通過を制限する
付記A2又はA3に記載の認証端末。
(付記A5)
前記埋込情報は、前記対象者の就業形態、部署又は役職を示す社内属性情報をさらに含み、
前記ゲート制御手段は、前記社内属性情報が示す前記就業形態、部署又は役職が、所定の就業形態、部署又は役職でない場合、前記対象者に対してゲートの通過を制限する
付記A2からA4のいずれか一項に記載の認証端末。
(付記A6)
前記生体認証の結果を出力する出力制御手段を備え、
前記埋込情報は、前記対象者の国籍、出身国又は使用言語に関連する国籍関連情報をさらに含み、
前記出力制御手段は、前記国籍関連情報が示す国籍若しくは出身国に応じた言語、又は前記国籍関連情報が示す使用言語で、前記生体認証の結果を出力する
付記A1からA5のいずれか一項に記載の認証端末。
(付記A7)
前記認証手段は、前記画像取得手段が前記コード画像を取得しなかった場合、データベースに記憶されている登録用の生体情報と、前記身体画像に基づいて生成された認証用の生体情報とを照合することにより、生体認証を実行する
付記A1からA6のいずれか一項に記載の認証端末。
(付記A8)
前記対象者の身体を撮影する第1カメラと、
前記対象者が携帯する前記コード記録媒体を撮影する第2カメラと
を備える
付記A1からA7のいずれか一項に記載の認証端末。
(付記A9)
前記画像取得手段は、前記第1カメラから前記身体画像を取得したことに応じて、又は前記認証用の生体情報を生成する処理が開始されたこと若しくは完了したことに応じて、前記第2カメラを起動させる
付記A8に記載の認証端末。
(付記A10)
対象者の身体を撮影して生成された登録用の身体画像から、前記対象者の登録用の生体情報を取得する登録情報取得手段と、
前記対象者の登録用の生体情報及び前記対象者の識別情報を含む埋込情報を、視認可能なコードシンボルに変換する変換手段と
を備えるコード生成端末。
(付記A11)
前記コードシンボルの情報を印刷装置に出力する出力制御手段を備える
付記A10に記載のコード生成端末。
(付記A12)
生体認証を実行する認証端末と、
前記生体認証の履歴を管理する管理装置と
を備え、
前記認証端末は、
対象者の身体を撮影して生成された身体画像と、コード記録媒体を撮影して生成されたコード画像とを取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報と前記対象者の識別情報とを含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記コード画像から、前記埋込情報を取得する埋込情報取得手段と、
前記埋込情報に含まれる前記登録用の生体情報と、前記身体画像に基づいて生成された認証用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が成功した場合、前記対象者の識別情報を管理装置に通知する通知手段と
を備える
認証システム。
(付記A13)
対象者の身体を撮影して生成された登録用の身体画像から、前記対象者の登録用の生体情報を取得する登録情報取得手段と、
前記対象者の登録用の生体情報及び前記対象者の識別情報を含む埋込情報を、視認可能なコードシンボルに変換する変換手段と
を有するコード生成端末をさらに備える
付記A12に記載の認証システム。
(付記A14)
対象者の身体を撮影して生成された身体画像と、コード記録媒体を撮影して生成されたコード画像とを取得する画像取得段階であって、前記コード記録媒体は、前記対象者の登録用の生体情報と前記対象者の識別情報とを含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得段階と、
前記コード画像から、前記埋込情報を取得する埋込情報取得段階と、
前記埋込情報に含まれる前記登録用の生体情報と、身体画像に基づいて生成された認証用の生体情報とを照合することにより、生体認証を実行する認証段階と、
前記生体認証が成功した場合、前記対象者の識別情報を管理装置に通知する通知段階と
を備える
認証方法。
(付記A15)
対象者の身体を撮影して生成された身体画像と、コード記録媒体を撮影して生成されたコード画像とを取得する画像取得処理であって、前記コード記録媒体は、前記対象者の登録用の生体情報と前記対象者の識別情報とを含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得処理と、
前記コード画像から、前記埋込情報を取得する埋込情報取得処理と、
前記埋込情報に含まれる前記登録用の生体情報と、身体画像に基づいて生成された認証用の生体情報とを照合することにより、生体認証を実行する認証処理と、
前記生体認証が成功した場合、前記対象者の識別情報を管理装置に通知する通知処理と
をコンピュータに実行させるためのプログラムが格納された非一時的なコンピュータ可読媒体。
(付記B1)
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像と、前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像と、を取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段と
を備える認証端末。
(付記B2)
前記撮像手段は、第1カメラと第2カメラとを有し、
前記第1カメラは、前記対象者の身体を撮影し、
前記第2カメラは、前記対象者が携帯する前記コード記録媒体を撮影する
付記B1に記載の認証端末。
(付記B3)
前記画像取得手段は、前記第1カメラから前記身体画像を取得したことに応じて、又は前記認証情報生成手段が前記認証用の生体情報を生成する処理を開始若しくは完了したことに応じて、前記第2カメラを起動させる
付記B2に記載の認証端末。
(付記B4)
前記コード記録媒体を撮影する場合の第2画角は、前記対象者の身体を撮影する場合の第1画角よりも広い
付記B1からB3のいずれか一項に記載の認証端末。
(付記B5)
前記身体は、顔であり、
前記認証情報生成手段は、前記身体画像に含まれる前記対象者の顔領域の大きさ又は長さが所定画素数以上である場合、又は前記対象者の顔領域に含まれる所定の顔器官を結ぶ長さが所定画素数以上である場合、前記身体画像から前記対象者の認証用の生体情報を生成する
付記B1からB4のいずれか一項に記載の認証端末。
(付記B6)
前記認証情報生成手段は、前記対象者の認証用の生体情報を生成する処理を開始したことに応じて、前記対象者が前記撮像手段に接近しているか否かを判定する
付記B1からB5のいずれか一項に記載の認証端末。
(付記B7)
前記認証手段は、前記対象者が前記撮像手段に接近していると判定された場合、前記生体認証を実行する
付記B6に記載の認証端末。
(付記B8)
前記画像取得手段は、前記対象者の身体を複数回撮影して生成された複数の身体画像を取得し、
前記認証情報生成手段は、前記複数の身体画像のうち一部の身体画像から前記対象者の認証用の生体情報を生成する
付記B1からB7のいずれか一項に記載の認証端末。
(付記B9)
前記認証情報生成手段は、
前記複数の身体画像の各々について、身体の確からしさの指標を算出し、
前記指標に基づいて、前記複数の身体画像から前記一部の身体画像を選択する
付記B8に記載の認証端末。
(付記B10)
前記画像取得手段は、前記対象者の身体を複数回撮影して生成された複数の身体画像を取得し、
前記認証情報生成手段は、前記複数の身体画像の各々について、前記対象者の認証用の生体情報を生成する
付記B1からB7のいずれか一項に記載の認証端末。
(付記B11)
前記認証情報生成手段は、
前記身体画像について、身体の確からしさの指標を算出し、
前記指標が予め定められた閾値以上である場合、前記対象者の認証用の生体情報を生成する
付記B1からB10のいずれか一項に記載の認証端末。
(付記B12)
前記生体認証が成功した場合、前記対象者の識別情報を管理装置に通知する通知手段をさらに備える
付記B1からB11のいずれか一項に記載の認証端末。
(付記B13)
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像と、前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像と、を取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段と
を有する認証端末を備える
認証システム。
(付記B14)
対象者の身体を撮影して生成された登録用の身体画像から、前記対象者の登録用の生体情報を取得する登録情報取得手段と、
前記対象者の登録用の生体情報を含む埋込情報を、視認可能なコードシンボルに変換する変換手段と
を有するコード生成端末をさらに備える
付記B13に記載の認証システム。
(付記B15)
前記生体認証の履歴を管理する管理装置をさらに備え、
前記埋込情報は、前記対象者の識別情報をさらに含み、
前記認証端末は、前記生体認証が成功した場合、前記埋込情報に含まれる前記対象者の識別情報を管理装置に通知する通知手段をさらに有する
付記B13又はB14に記載の認証システム。
(付記B16)
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像を取得する第1画像取得段階と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成段階と、
前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像、を取得する第2画像取得段階であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得段階と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得段階と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証段階と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御段階と
を備える認証方法。
(付記B17)
対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像を取得する第1画像取得処理と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成処理と、
前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像、を取得する第2画像取得処理であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得処理と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得処理と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証処理と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御処理と
をコンピュータに実行させるためのプログラムが格納された非一時的なコンピュータ可読媒体。
(付記C1)
対象者の身体を撮影する第1カメラと、
前記対象者が携帯する前記コード記録媒体を撮影する第2カメラであって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2カメラと、
前記対象者の身体を前記第1カメラにより撮影して生成された身体画像と、前記コード記録媒体を前記第2カメラにより撮影して生成されたコード画像と、を取得する画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段と
を備える認証端末。
(付記C2)
前記第1カメラ及び前記第2カメラは、前記認証端末の主面上の異なる位置に配置されている
付記C1に記載の認証端末。
(付記C3)
前記画像取得手段は、前記第1カメラから前記身体画像を取得したことに応じて、又は前記認証情報生成手段が前記認証用の生体情報を生成する処理を開始若しくは完了したことに応じて、前記第2カメラを起動させる
付記C1又はC2に記載の認証端末
(付記C4)
前記第2カメラの第2画角は、前記第1カメラの第1画角よりも広い
付記C1からC3のいずれか一項に記載の認証端末。
(付記C5)
前記身体は、顔であり、
前記認証情報生成手段は、前記身体画像に含まれる前記対象者の顔領域の大きさ又は長さが所定画素数以上である場合、又は前記対象者の顔領域に含まれる所定の顔器官を結ぶ長さが所定画素数以上である場合、前記身体画像から前記対象者の認証用の生体情報を生成する
付記C1からC4のいずれか一項に記載の認証端末。
(付記C6)
前記認証情報生成手段は、前記対象者の認証用の生体情報を生成する処理を開始したことに応じて、前記対象者が前記第1カメラに接近しているか否かを判定する
付記C1からC5のいずれか一項に記載の認証端末。
(付記C7)
前記認証手段は、前記対象者が前記第1カメラに接近していると判定された場合、前記生体認証を実行する
付記C6に記載の認証端末。
(付記C8)
前記画像取得手段は、前記対象者の身体を複数回撮影して生成された複数の身体画像を取得し、
前記認証情報生成手段は、前記複数の身体画像のうち一部の身体画像から前記対象者の認証用の生体情報を生成する
付記C1からC7のいずれか一項に記載の認証端末。
(付記C9)
前記認証情報生成手段は、
前記複数の身体画像の各々について、身体の確からしさの指標を算出し、
前記指標に基づいて、前記複数の身体画像から前記一部の身体画像を選択する
付記C8に記載の認証端末。
(付記C10)
前記画像取得手段は、前記対象者の身体を複数回撮影して生成された複数の身体画像を取得し、
前記認証情報生成手段は、前記複数の身体画像の各々について、前記対象者の認証用の生体情報を生成する
付記C1からC7のいずれか一項に記載の認証端末。
(付記C11)
前記認証情報生成手段は、
前記身体画像について、身体の確からしさの指標を算出し、
前記指標が予め定められた閾値以上である場合、前記対象者の認証用の生体情報を生成する
付記C1からC10のいずれか一項に記載の認証端末。
(付記C12)
前記生体認証が成功した場合、前記対象者の識別情報を管理装置に通知する通知手段をさらに備える
付記C1からC11のいずれか一項に記載の認証端末。
(付記C13)
対象者の身体を撮影する第1カメラと、
前記対象者が携帯する前記コード記録媒体を撮影する第2カメラであって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2カメラと、
前記対象者の身体を前記第1カメラにより撮影して生成された身体画像と、前記コード記録媒体を前記第2カメラにより撮影して生成されたコード画像と、を取得する画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段と
を有する認証端末を備える
認証システム。
(付記C14)
対象者の身体を撮影して生成された登録用の身体画像から、前記対象者の登録用の生体情報を取得する登録情報取得手段と、
前記対象者の登録用の生体情報を含む埋込情報を、視認可能なコードシンボルに変換する変換手段と
を有するコード生成端末をさらに備える
付記C13に記載の認証システム。
(付記C15)
前記生体認証の履歴を管理する管理装置をさらに備え、
前記埋込情報は、前記対象者の識別情報をさらに含み、
前記認証端末は、前記生体認証が成功した場合、前記埋込情報に含まれる前記対象者の識別情報を管理装置に通知する通知手段をさらに有する
付記C13又はC14に記載の認証システム。
(付記C16)
対象者の身体を第1カメラにより撮影して生成された身体画像を取得する第1画像取得段階と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成段階と、
前記対象者が携帯するコード記録媒体を第2カメラにより撮影して生成されたコード画像、を取得する第2画像取得段階であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得段階と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得段階と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証段階と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御段階と
を備える認証方法。
(付記C17)
対象者の身体を第1カメラにより撮影して生成された身体画像を取得する第1画像取得処理と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成処理と、
前記対象者が携帯するコード記録媒体を第2カメラにより撮影して生成されたコード画像、を取得する第2画像取得処理であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得処理と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得処理と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証処理と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御処理と
をコンピュータに実行させるためのプログラムが格納された非一時的なコンピュータ可読媒体。
11 画像取得部
12 認証情報生成部
13 埋込情報取得部
14 認証部
17 ゲート制御部
100,100c コード生成端末
110 カメラ
120,120c 記憶部
121,121c プログラム
130 メモリ
140 通信部
150 入力部
160 出力部
161 表示部
162 音声出力部
170,170c 制御部
171 画像取得部
172 登録情報取得部
1721 検出部
1722 特徴点抽出部
1723 管理情報取得部
174 変換部
175 出力制御部
176 DB登録部
200 印刷装置
300,300a,300b,300c 認証端末
310 撮像部
311 第1カメラ
312 第2カメラ
320,320a,320b,320c 記憶部
321,321a,321b,321c プログラム
322 制限条件情報
323 言語テーブル
330 メモリ
340 通信部
360 出力部
361 表示部
362 音声出力部
370,370a,370b,370c 制御部
371 画像取得部
372 認証情報生成部
3721 検出部
3722 特徴点抽出部
373 埋込情報取得部
374,374a,374c 認証部
375,375b 出力制御部
376 通知部
377 ゲート制御部
380 カードリーダ
400 ゲート
500,500c 管理装置
510 記憶部
511 認証履歴
511c 第1認証履歴
5111,5121 ユーザID
5112,5122 日時
5113,5123 ゲートID
512c 第2認証履歴
520 通信部
530 制御部
600 顔情報データベース
700 第1サーバ
710 第2サーバ
800 中継装置
900 認証端末
910 撮像部
920 記憶部
921 プログラム
970 制御部
973 埋込情報取得部
974 認証部
1000,1000c,1000d,1000e 認証システム
N ネットワーク
U ユーザ
CV キャプチャボリューム
θ 画角
P 位置
I 画像
Claims (11)
- 対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像と、前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像と、を取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段と
を備える認証端末。 - 前記撮像手段は、第1カメラと第2カメラとを有し、
前記第1カメラは、前記対象者の身体を撮影し、
前記第2カメラは、前記対象者が携帯する前記コード記録媒体を撮影する
請求項1に記載の認証端末。 - 前記画像取得手段は、前記第1カメラから前記身体画像を取得したことに応じて、又は前記認証情報生成手段が前記認証用の生体情報を生成する処理を開始若しくは完了したことに応じて、前記第2カメラを起動させる
請求項2に記載の認証端末。 - 前記コード記録媒体を撮影する場合の第2画角は、前記対象者の身体を撮影する場合の第1画角よりも広い
請求項1から3のいずれか一項に記載の認証端末。 - 前記身体は、顔であり、
前記認証情報生成手段は、前記身体画像に含まれる前記対象者の顔領域の大きさ又は長さが所定画素数以上である場合、又は前記対象者の顔領域に含まれる所定の顔器官の特徴点を結ぶ長さが所定画素数以上である場合、前記身体画像から前記対象者の認証用の生体情報を生成する
請求項1から4のいずれか一項に記載の認証端末。 - 前記認証情報生成手段は、前記対象者の認証用の生体情報を生成する処理を開始したことに応じて、前記対象者が前記撮像手段に接近しているか否かを判定する
請求項1から5のいずれか一項に記載の認証端末。 - 前記認証手段は、前記対象者が前記撮像手段に接近していると判定された場合、前記生体認証を実行する
請求項6に記載の認証端末。 - 対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像と、前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像と、を取得する画像取得手段であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、画像取得手段と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成手段と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得手段と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証手段と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御手段と
を有する認証端末を備える
認証システム。 - 対象者の身体を撮影して生成された登録用の身体画像から、前記対象者の登録用の生体情報を取得する登録情報取得手段と、
前記対象者の登録用の生体情報を含む埋込情報を、視認可能なコードシンボルに変換する変換手段と
を有するコード生成端末をさらに備える
請求項8に記載の認証システム。 - 対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像、を取得する第1画像取得段階と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成段階と、
前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像、を取得する第2画像取得段階であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得段階と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得段階と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証段階と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御段階と
を備える認証方法。 - 対象者が撮像手段から第1距離離れた位置にいる場合に前記対象者の身体を撮影して生成された身体画像、を取得する第1画像取得処理と、
前記対象者の身体画像を取得したことに応じて、前記身体画像から前記対象者の認証用の生体情報を生成する処理を開始する認証情報生成処理と、
前記対象者が前記撮像手段から前記第1距離よりも短い第2距離離れた位置にいる場合に前記対象者が携帯するコード記録媒体を撮影して生成されたコード画像、を取得する第2画像取得処理であって、前記コード記録媒体は、前記対象者の登録用の生体情報を含む埋込情報が記録されている視認可能なコードシンボルを有する、第2画像取得処理と、
前記コード画像を取得したことに応じて、前記コード画像から前記埋込情報を取得する埋込情報取得処理と、
前記認証用の生体情報と、前記埋込情報に含まれる前記登録用の生体情報とを照合することにより、生体認証を実行する認証処理と、
前記生体認証が失敗した場合、前記対象者に対してゲートの通過を制限するゲート制御処理と
をコンピュータに実行させるためのプログラムが格納された非一時的なコンピュータ可読媒体。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/284,096 US20240152592A1 (en) | 2021-03-26 | 2021-03-26 | Authentication terminal, authentication system, authentication method, and non-transitory computer readable medium |
JP2023508370A JPWO2022201490A5 (ja) | 2021-03-26 | 認証端末、認証システム及びプログラム | |
PCT/JP2021/012869 WO2022201490A1 (ja) | 2021-03-26 | 2021-03-26 | 認証端末、認証システム、認証方法及び非一時的なコンピュータ可読媒体 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2021/012869 WO2022201490A1 (ja) | 2021-03-26 | 2021-03-26 | 認証端末、認証システム、認証方法及び非一時的なコンピュータ可読媒体 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022201490A1 true WO2022201490A1 (ja) | 2022-09-29 |
Family
ID=83396697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2021/012869 WO2022201490A1 (ja) | 2021-03-26 | 2021-03-26 | 認証端末、認証システム、認証方法及び非一時的なコンピュータ可読媒体 |
Country Status (2)
Country | Link |
---|---|
US (1) | US20240152592A1 (ja) |
WO (1) | WO2022201490A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220309138A1 (en) * | 2019-12-27 | 2022-09-29 | Rakuten Group, Inc. | Authentication system, authentication device, authentication method and program |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004234340A (ja) * | 2003-01-30 | 2004-08-19 | Konica Minolta Holdings Inc | 記憶媒体、認証カード、認証方法、認証装置および認証システム |
JP2006099687A (ja) * | 2004-09-30 | 2006-04-13 | Mitsubishi Electric Corp | 利用者認証装置 |
JP2008097647A (ja) * | 2007-12-21 | 2008-04-24 | Nec Corp | 端末利用者監視システム |
JP2012027668A (ja) * | 2010-07-22 | 2012-02-09 | Nec Embedded Products Ltd | 入退出管理システム |
JP2020064341A (ja) * | 2018-10-15 | 2020-04-23 | 三菱重工業株式会社 | 車両用画像処理装置、車両用画像処理方法、プログラムおよび記憶媒体 |
-
2021
- 2021-03-26 US US18/284,096 patent/US20240152592A1/en active Pending
- 2021-03-26 WO PCT/JP2021/012869 patent/WO2022201490A1/ja active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004234340A (ja) * | 2003-01-30 | 2004-08-19 | Konica Minolta Holdings Inc | 記憶媒体、認証カード、認証方法、認証装置および認証システム |
JP2006099687A (ja) * | 2004-09-30 | 2006-04-13 | Mitsubishi Electric Corp | 利用者認証装置 |
JP2008097647A (ja) * | 2007-12-21 | 2008-04-24 | Nec Corp | 端末利用者監視システム |
JP2012027668A (ja) * | 2010-07-22 | 2012-02-09 | Nec Embedded Products Ltd | 入退出管理システム |
JP2020064341A (ja) * | 2018-10-15 | 2020-04-23 | 三菱重工業株式会社 | 車両用画像処理装置、車両用画像処理方法、プログラムおよび記憶媒体 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220309138A1 (en) * | 2019-12-27 | 2022-09-29 | Rakuten Group, Inc. | Authentication system, authentication device, authentication method and program |
US11928199B2 (en) * | 2019-12-27 | 2024-03-12 | Rakuten Group, Inc. | Authentication system, authentication device, authentication method and program |
Also Published As
Publication number | Publication date |
---|---|
US20240152592A1 (en) | 2024-05-09 |
JPWO2022201490A1 (ja) | 2022-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220101333A1 (en) | Biometric pre-identification | |
US7158657B2 (en) | Face image recording system | |
US8558663B2 (en) | Integration of facial recognition into cross channel authentication | |
US6341169B1 (en) | System and method for evaluating a document and creating a record of the evaluation process and an associated transaction | |
US20090254464A1 (en) | Time and attendance system and method | |
JP6897953B2 (ja) | 入場受付端末、入場受付方法、入場受付プログラム、および入場受付システム | |
JP6927099B2 (ja) | 自動改札機、改札処理方法、及びプログラム | |
US20210006558A1 (en) | Method, apparatus and system for performing authentication using face recognition | |
JP2007272320A (ja) | 入場管理システム | |
JP2017182326A (ja) | モバイル端末を用いた資格認証システム、資格認証用ツール、及び、資格認証方法 | |
JPWO2017146161A1 (ja) | 顔照合システム、顔照合装置、顔照合方法、及び記録媒体 | |
KR20110095687A (ko) | 근로자 근태관리 시스템 | |
CN113490936A (zh) | 面部认证机以及面部认证方法 | |
JP2007094989A (ja) | サービス提供方法 | |
WO2022201490A1 (ja) | 認証端末、認証システム、認証方法及び非一時的なコンピュータ可読媒体 | |
JP2022059626A (ja) | チケット発券システム、検札装置、およびプログラム | |
JP2006092491A (ja) | 本人認証装置、本人認証システム、本人認証方法および本人認証プログラム | |
US7076664B2 (en) | User confirmation system and method | |
JP4571426B2 (ja) | 認証システム | |
JP2007199860A (ja) | 個人認証システム | |
WO2022201491A1 (ja) | 認証端末、コード生成端末、認証システム、認証方法及び非一時的なコンピュータ可読媒体 | |
JP4085198B2 (ja) | 個人認証装置および個人認証システム | |
JP2005301861A (ja) | 出入管理システム | |
JP2006134081A (ja) | 入場管理システム、入場制御端末、及び入場管理方法 | |
KR102503014B1 (ko) | 인공지능기반의 비접촉 입장관리시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21933095 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023508370 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18284096 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21933095 Country of ref document: EP Kind code of ref document: A1 |