WO2022208598A1 - 認証システム及び認証方法 - Google Patents
認証システム及び認証方法 Download PDFInfo
- Publication number
- WO2022208598A1 WO2022208598A1 PCT/JP2021/013249 JP2021013249W WO2022208598A1 WO 2022208598 A1 WO2022208598 A1 WO 2022208598A1 JP 2021013249 W JP2021013249 W JP 2021013249W WO 2022208598 A1 WO2022208598 A1 WO 2022208598A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- information
- user
- area
- authentication information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 84
- 238000012545 processing Methods 0.000 claims description 106
- 230000008569 process Effects 0.000 description 74
- 238000004891 communication Methods 0.000 description 11
- 230000000694 effects Effects 0.000 description 11
- 230000004044 response Effects 0.000 description 11
- 238000012217 deletion Methods 0.000 description 8
- 230000037430 deletion Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000004048 modification Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 230000002093 peripheral effect Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 239000002699 waste material Substances 0.000 description 4
- 230000005021 gait Effects 0.000 description 3
- 230000001404 mediated effect Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 241000699666 Mus <mouse, genus> Species 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/253—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Definitions
- the present invention relates to an authentication system and an authentication method.
- Patent Documents 1 and 2 disclose systems for managing entry to controlled areas.
- an IC (integrated circuit) card reader is installed at the entrance of the building. Then, the system performs authentication processing based on the person's ID (identifier) read by the IC card reader, and performs entrance management at that position based on the authentication result. Also, in this system, an IC card reader and a camera are installed at the entrance of an area within a building. The system first performs face authentication based on an image generated by a camera, and if the face authentication fails, performs authentication processing based on the person ID. Then, the system performs admission control at that position based on these authentication results.
- the system disclosed in Patent Document 2 switches the detection mode according to detection of unauthorized entry/exit. In the mode when unauthorized entry/exit is not detected, only authentication based on data stored in the IC chip is executed. In the mode when unauthorized entry/exit is detected, both authentication based on data stored in the IC chip and face authentication are executed. Face authentication is performed using the user's mobile terminal. Specifically, the user activates a predetermined application on his/her own mobile terminal and photographs his/her face. In response, the app performs face authentication. Next, the user brings his/her mobile terminal close to the contactless communication antenna of the system to perform short-range wireless communication. In response to this, the result of the face authentication is transmitted from the mobile terminal to the system. Thus, the system obtains the result of face authentication.
- an authentication point may be provided at the entrance of a facility, and an authentication point may be further provided at the entrance of each of a plurality of areas within the facility. In such a system that performs multistage authentication within one facility, it is desired to maintain a high security level without waste.
- An object of the present invention is to realize a technology that maintains a high security level without waste in a multi-stage authentication system.
- An authentication system that has a first area and a second area that can be entered after passing through the first area, and determines whether or not to enter the second area, Identifying means for identifying authentication information used when a user enters the first area, and identifying authentication information necessary for the user to enter the second area according to the identified authentication information.
- An authentication system is provided having:
- a first area and a second area that can be entered after passing through the first area, and an authentication system that determines whether or not to enter the second area
- An authentication method for specifying authentication information used when a user enters the first area, and specifying authentication information necessary for the user to enter the second area according to the specified authentication information. is provided.
- BRIEF DESCRIPTION OF THE DRAWINGS It is a figure for demonstrating the whole image of the authentication system of this embodiment. It is an example of the functional block diagram of the local system of this embodiment. It is an example of the functional block diagram of the server of this embodiment. BRIEF DESCRIPTION OF THE DRAWINGS It is a figure for demonstrating the whole image of the authentication system of this embodiment. It is a figure which shows an example of the hardware constitutions of the authentication system of this embodiment. It is an example of the functional block diagram of the authentication system of this embodiment. It is a figure which shows typically an example of the information which the authentication system of this embodiment processes. It is a figure which shows typically an example of the information which the authentication system of this embodiment processes.
- the authentication system of this embodiment has a server 200 and multiple local systems 100 .
- the server 200 and each of the plurality of local systems 100 are communicably connected to each other through wired and/or wireless communication.
- a plurality of authentication points are installed within a facility, and a local system 100 is installed at each of the plurality of authentication points.
- an authentication point may be provided at each entrance of a plurality of areas within a facility, but the present invention is not limited to this.
- facilities include, but are not limited to, buildings, companies, amusement facilities, airports, stations, housing complexes (condominiums, apartments, etc.), schools, and the like.
- FIG. 1 shows a first area and a second area that can be entered after passing through the first area, and an authentication point is installed at the entrance of each area. Although the first area and the second area are separated in FIG. 1, the first area may include the second area.
- the local system 100 has an authentication information acquisition device 1 and a passage control device 2.
- the authentication information acquisition device 1 is a device that acquires from the user authentication information for performing authentication processing.
- Authentication information is exemplified by user identification information, biometric information, and the like.
- User identification information is information in which numbers, letters, symbols, etc. are arranged, and is artificially created information.
- the biometric information is information unique to each user, and examples thereof include face information, iris information, fingerprint information, voiceprint information, and gait information.
- the configuration of the authentication information acquisition device 1 installed at each of the plurality of authentication points may differ from each other. For example, the number of types of obtainable authentication information may differ, and the types of obtainable authentication information may differ.
- the authentication information acquisition device 1 installed at another authentication point in FIG. 1 is configured to be able to acquire user identification information and face information, and the authentication information acquisition device 1 installed at the first authentication point
- An example configured such that user identification information can be acquired can be considered, but it is not limited to this.
- the user inputs one authentication information selected from among them into the authentication information acquisition device 1. Then, the authentication system performs an authentication process based on one piece of input authentication information.
- the authentication system performs authentication processing based on the entered authentication information.
- the passage control device 2 includes a passage control mechanism (gate, door, etc.) that controls the passage of people, and a device that controls the operation (opening/closing, etc.) of the passage control mechanism with an electrical signal.
- the passage control device 2 controls the operation of the passage control mechanism based on a control signal from the authentication device 3, which will be described later.
- the server 200 has an authentication device 3 and an authentication history management device 4.
- the authentication history management device 4 manages the authentication history of each user. Specifically, the authentication history management device 4 stores the type of authentication information used in the authentication process executed at each authentication point that each user has passed during the past period (on the day, during the past predetermined time period, etc.), Manage as authentication history.
- the authentication device 3 performs user authentication processing based on the authentication information acquired by the authentication information acquisition device 1 and the reference information stored in the server 200 in advance. Then, the authentication device 3 determines for each user whether or not to allow the user to pass through the authentication point based on the result of the authentication processing.
- At least one of the plurality of authentication points is treated as the first authentication point.
- the first authentication point is installed, for example, at the entrance of an area that can be entered after passing through another area.
- the authentication information acquisition device 1 installed at the first authentication point can acquire the first type of authentication information, but cannot acquire the second type of authentication information.
- the first type of authentication information is, for example, user identification information
- the second type of authentication information is, for example, biometric information.
- the conditions for passing through the first authentication point are "successful authentication processing using the authentication information acquired by the authentication information acquisition device 1 installed at the first authentication point” and "The second authentication process using the second type of authentication information (for example, biometric information) is successful.”
- the authentication information acquisition device 1 installed at the first authentication point cannot acquire the second type of authentication information (for example, biometric information).
- “that the second authentication process using the second type of authentication information has been successful” means, for example, that the second authentication process performed in the past at another authentication point It needs to be implemented in the authentication process. That is, before coming to the first authentication point, for example, if the second authentication process using the second type of authentication information is successful at another authentication point, the "second that the second authentication process using the type of authentication information is successful" is satisfied.
- the authentication device 3 identifies the authentication information necessary for passing through the first authentication point for each user based on the authentication history information. The authentication device 3 then uses the specified result to decide whether to let each user through.
- the authentication device 3 For a user for whom the success of the second authentication process using the second type of authentication information is not registered in the authentication history information, the authentication device 3 is required to pass through the first authentication point. "Authentication information that can be acquired by the authentication information acquisition device 1 installed at the first authentication point" and “Second type of authentication information" are specified as such authentication information. The authentication device 3 permits the user to pass through the first authentication point when it is confirmed that the authentication processing using the two types of authentication information has succeeded.
- the authentication device 3 passes through the first authentication point.
- "authentication information that can be acquired by the authentication information acquisition device 1 installed at the first authentication point” is specified as the authentication information required for the above.
- the authentication device 3 permits the user to pass through the first authentication point.
- the authentication information acquisition device 1 installed at the first authentication point cannot acquire the second type of authentication information (for example, biometric information).
- the authentication system of this embodiment has a function of acquiring the second type of authentication information via the user terminal owned by the user.
- a user whose authentication history information does not record that the second authentication process using the second type of authentication information has been successful can access the server 200 and the user via the communication network 400, as shown in FIG.
- the terminal 300 can be connected and the second type of authentication information can be sent to the server 200 .
- the server 200 then performs authentication processing based on the second type of authentication information received from the user terminal 300 . With this function, the user can avoid the troublesome task of going to another authentication point and performing the authentication process in order to pass the first authentication point.
- Each functional part of the authentication system includes a CPU (Central Processing Unit) of any computer, a memory, a program loaded into the memory, a storage unit such as a hard disk that stores the program (stored in advance from the stage of shipping the device). In addition to programs, it can also store programs downloaded from storage media such as CDs (Compact Discs) and servers on the Internet), and can be realized by any combination of hardware and software centered on the interface for network connection. . It should be understood by those skilled in the art that there are various modifications to the implementation method and apparatus.
- FIG. 5 is a block diagram illustrating the hardware configuration of the authentication system.
- the authentication system has a processor 1A, a memory 2A, an input/output interface 3A, a peripheral circuit 4A and a bus 5A.
- the peripheral circuit 4A includes various modules.
- the authentication system may not have the peripheral circuit 4A.
- the authentication system may be composed of a plurality of physically and/or logically separated devices. In this case, each of the plurality of devices can have the above hardware configuration.
- the bus 5A is a data transmission path for mutually transmitting and receiving data between the processor 1A, the memory 2A, the peripheral circuit 4A and the input/output interface 3A.
- the processor 1A is, for example, an arithmetic processing device such as a CPU or a GPU (Graphics Processing Unit).
- the memory 2A is, for example, RAM (Random Access Memory) or ROM (Read Only Memory).
- the input/output interface 3A includes an interface for acquiring information from an input device, an external device, an external server, an external sensor, a camera, etc., an interface for outputting information to an output device, an external device, an external server, etc. .
- Input devices are, for example, keyboards, mice, microphones, physical buttons, touch panels, and the like.
- the output device is, for example, a display, speaker, printer, mailer, or the like.
- the processor 1A can issue commands to each module and perform calculations based on the calculation results thereof.
- FIG. 6 illustrates an example of a functional block diagram of the authentication system 10.
- the authentication system 10 includes an authentication information acquisition unit (a first authentication information acquisition unit 11 and a second authentication information acquisition unit 18), an authentication unit (a first authentication unit 12 and a second authentication unit 19), an authentication history acquisition unit 13, an identification unit 14, a passage processing unit 15, a storage unit 16, and an authentication unit 17 via the Internet.
- a local system 100 installed at a first authentication point includes a first authentication information acquisition unit 11 and a passage processing unit 15 .
- a local system 100 installed at another authentication point includes at least one of the first authentication information acquisition unit 11 and the second authentication information acquisition unit 18 and the passage processing unit 15 .
- the storage unit 16 stores authentication information (reference data) used for authentication processing at the authentication point. During the authentication process, the authentication information acquired from the user and the authentication information (reference data) stored in the storage unit 16 are collated. As described above, the authentication system 10 is configured to be able to perform authentication processing using multiple types of authentication information. Therefore, the storage unit 16 stores multiple types of authentication information (reference data).
- FIG. 7 schematically shows an example of authentication information (reference data) stored in the storage unit 16.
- user identification information card identification information, and face information are associated with each other.
- User identification information is information in which numbers, letters, symbols, etc. are arranged, and is artificially created information.
- the user identification information includes employee ID (identifier), member ID, student number, and other information that identifies users who use the facility.
- the card identification information is identification information unique to the storage medium storing the user identification information.
- the name is "card" identification information
- storage media that store user identification information are not limited to IC cards, but can be used as substitutes for IC cards, such as IC tags, smartphones, smart watches, mobile phones, etc. It may be any other device capable of doing so.
- Face information is information (image, feature amount) that indicates the features of the appearance of the face.
- biometric information such as iris information, fingerprint information, voiceprint information, and gait information may be used as authentication information (reference data).
- the second authentication information acquisition unit 18 acquires the second type of authentication information.
- the second type of authentication information is biometric information such as face information, iris information, fingerprint information, voiceprint information, and gait information.
- the second authentication information acquisition unit 18 is configured to be able to acquire these biometric information.
- the second authentication information acquisition unit 18 includes a camera, a fingerprint sensor, a microphone, and the like.
- the authentication information acquisition device 1 installed at an arbitrary authentication point among a plurality of authentication points has a second authentication information acquisition unit 18 .
- the authentication information acquisition device 1 installed at the first authentication point does not include the second authentication information acquisition unit 18 .
- the second authentication information acquisition unit 18 inputs the acquired second type of authentication information to the second authentication unit 19 .
- the information to be input to the second authentication unit 19 may include information indicating at which of the plurality of authentication points the information was acquired.
- the second authentication unit 19 executes the second authentication process based on the second type of authentication information acquired by the second authentication information acquisition unit 18. Specifically, the second authentication unit 19 combines the second type of authentication information acquired by the second authentication information acquisition unit 18 with the second type of authentication information (reference data) stored in the storage unit 16 . ). Then, the second authentication unit 19 determines that the authentication is successful when there is reference data that matches the second type of authentication information acquired by the second authentication information acquisition unit 18 (the degree of similarity is equal to or greater than the threshold value). . On the other hand, if there is no reference data that matches the second type of authentication information acquired by the second authentication information acquisition unit 18, the second authentication unit 19 determines that authentication has failed. The authentication result is input to the transit processing unit 15 .
- the second authentication unit 19 registers that effect in the authentication history information.
- the authentication history information indicates details of authentication processing performed at authentication points passed by the user in the past period.
- authentication history information shall show the kind (face information, user identification information, etc.) of the authentication information used for the authentication process implemented in each authentication point.
- the authentication history information may indicate other contents such as the type of authentication processing performed at each authentication point (face authentication processing, authentication processing using user identification information, etc.). Examples of the past period include, but are not limited to, "this day” and "for a predetermined time in the past".
- the storage unit 16 stores authentication history information.
- FIG. 8 schematically shows an example of authentication history information.
- the types of authentication information used in the authentication process executed at each successful point of authentication are registered in association with the user identification information.
- “Authentication information used in authentication processing” can also be rephrased as “authentication information referred to in authentication processing”.
- the authentication history information indicates which type of authentication information was used for authentication processing at each location.
- the illustrated authentication point B is the first authentication point.
- the user identified by the user identification information P778721 has been successfully authenticated at the authentication point A and the authentication point C.
- the authentication process using the first type of authentication information was executed at the authentication point A, and that the authentication process was executed using the second type of authentication information at the authentication point C.
- the first authentication information acquisition unit 11 acquires the first type of authentication information.
- the first type of authentication information is, for example, user identification information.
- the user identification information is information in which numbers, letters, symbols, etc. are arranged, and is artificially created information.
- the first authentication information acquisition unit 11 is configured to be able to acquire such user identification information.
- the first authentication information acquisition unit 11 performs short-range wireless communication with a storage medium (IC card, IC tag, smart phone, smart watch, mobile phone, etc.) storing user identification information to acquire the user identification information.
- a storage medium IC card, IC tag, smart phone, smart watch, mobile phone, etc.
- Communication device reader, etc. to be acquired, device that accepts manual input (touch panel, physical button, keyboard, mouse, etc.), microphone that accepts voice input, camera that accepts image input (recognizes user identification information in the image by character analysis) etc.
- NFC, Bluetooth (registered trademark), Wi-Fi, next-generation ultra-wideband (UWB), etc. can be used as short-range wireless communication for acquiring user identification information.
- An authentication information acquisition device 1 installed at an arbitrary authentication point among a plurality of authentication points includes a first authentication information acquisition unit 11 .
- the authentication information acquisition device 1 installed at the first authentication point includes a first authentication information acquisition unit 11 .
- the first authentication information acquisition unit 11 inputs the acquired first type of authentication information to the first authentication unit 12 .
- the information to be input to the first authentication unit 12 may include information indicating at which of the plurality of authentication points the information was acquired.
- the first authentication unit 12 executes the first authentication process based on the first type of authentication information acquired by the first authentication information acquisition unit 11 . Specifically, the first authentication unit 12 combines the first type of authentication information acquired by the first authentication information acquisition unit 11 with the first type of authentication information (reference data) stored in the storage unit 16 . ). If there is reference data that matches the first type of authentication information acquired by the first authentication information acquisition unit 11, the first authentication unit 12 determines that the authentication has succeeded. On the other hand, if there is no reference data that matches the first type of authentication information acquired by the first authentication information acquisition unit 11, the first authentication unit 12 determines that authentication has failed. The authentication result is input to the transit processing unit 15 .
- the first authentication unit 12 registers that fact in the authentication history information.
- the storage unit 16 stores authentication history information.
- the Internet-based authentication unit 17 acquires the second type of authentication information from the user terminal via the communication network 400 such as the Internet.
- the user inputs the second type of authentication information to the user terminal 300 via the second type of authentication information acquiring means (camera, fingerprint sensor, microphone, etc.) provided in the user terminal 300 .
- the user performs a predetermined operation on the user terminal 300 and transmits the second type of authentication information input to the user terminal 300 to the authentication system 10 .
- a means for transmitting the second type of authentication information from the user terminal 300 to the authentication system 10 is not particularly limited.
- data may be uploaded from the user terminal 300 to the authentication system 10 via a predetermined application, sent by e-mail, or other means may be employed.
- the Internet-based authentication unit 17 executes the second authentication process based on the acquired second type of authentication information. Specifically, the Internet-based authentication unit 17 collates the acquired second type authentication information with the second type authentication information (reference data) stored in the storage unit 16 . Then, if there is reference data that matches the obtained second type of authentication information (the degree of similarity is equal to or greater than the threshold value), the Internet-mediated authentication unit 17 determines that the authentication is successful. On the other hand, if there is no reference data that matches the acquired second type of authentication information, the Internet-mediated authentication unit 17 determines that the authentication has failed.
- the second type authentication information reference data
- FIG. 8 schematically shows an example of authentication history information.
- the field of "Second authentication process via the Internet” shown in the figure is entered by the authentication unit 17 via the Internet.
- a user who has successfully completed the second authentication process by the Internet-based authentication unit 17 is associated with a value of "completed”
- a user who has not successfully completed the second authentication process by the Internet-based authentication unit 17 is associated with a value of "not completed”. value is associated.
- the authentication history acquisition unit 13 selects from among the authentication history information (see FIG. 8) stored in the storage unit 16, the authentication history information associated with the user who succeeded in the authentication processing by the first authentication unit 12 or the second authentication unit 19. Get the authentication history information
- the specifying unit 14 specifies authentication information required to pass through the first authentication point.
- a condition for passing through the first authentication point is determined in advance and stored in the storage unit 16 .
- the specifying unit 14 specifies the type of authentication information required to pass through the first authentication point based on the conditions.
- the ⁇ processing for specifying the type of authentication information (face information, user identification information, etc.) required to pass through the first authentication point'' is equivalent to the ⁇ authentication process required to pass through the first authentication point. (face authentication processing, authentication processing using user identification information, etc.)”. That is, the processing of the identification unit 14 can be rephrased as “identifying the type of authentication processing required to pass the first authentication point based on the authentication history information acquired by the authentication history acquisition unit 13”.
- the condition for passing through the first authentication point is that "authentication processing using the authentication information acquired by the authentication information acquisition device 1 installed at the first authentication point is successful" and " The second authentication process using the second type of authentication information has been successful.”
- authentication processing using authentication information can be rephrased as “authentication processing based on authentication information”, “authentication processing referring to authentication information”, and the like.
- the identification unit 14 For users whose authentication history information does not indicate that the second authentication process has been successful, the identification unit 14 provides authentication information necessary for passing through the first authentication point as "the first authentication point "authentication information” and "second authentication information" that can be acquired by the authentication information acquiring apparatus 1 installed in the .
- the specifying unit 14 sends "the first "authentication information that can be acquired by the authentication information acquisition device 1 installed at the authentication point" is specified.
- the passage processing unit 15 executes processing for allowing a user who has successfully completed authentication processing using the type of authentication information specified by the specifying unit 14 to pass.
- the passage processing unit 15 allows a user who has passed all of the multiple types of authentication information to pass.
- a predetermined control signal is input to the passage control mechanism (gate, door, etc.) that controls the passage of people, the passage control mechanism is operated, and the state where people can pass (gate is open, door is open) open state, door unlocked state, etc.).
- the user selects one of the authentication information from the authentication information acquisition device 1. to enter.
- the authentication information acquisition device 1 configured to be able to acquire only one type of authentication information is installed, the user inputs the authentication information to the authentication information acquisition device 1 .
- the authentication information acquisition device 1 acquires the authentication information (S30 in FIG. 21)
- it transmits the acquired authentication information to the server 200.
- the server 200 includes a first authentication unit 12 and a second authentication unit 19.
- the server 200 executes authentication processing using the authentication information acquired from the local system 100 (S31 in FIG. 21).
- the first authentication section 12 executes the first authentication process.
- the second authentication section 19 executes the second authentication process.
- the server 200 and local system 100 execute error processing (S33 of FIG. 21). For example, the server 200 notifies the local system 100 that authentication has failed. Then, the local system 100 notifies the user that the authentication has failed by lighting a warning lamp, outputting a buzzer sound, or displaying information on the display.
- the passage processing unit 15 executes processing to allow the user who has successfully authenticated to pass through (S34 of FIG. 21).
- the type of authentication information used in the authentication process is registered in the authentication history information as shown in FIG. 8 at arbitrary timing.
- an authentication information acquisition device 1 (first authentication information acquisition unit 11) configured to be able to acquire only the first type of authentication information is installed.
- the user inputs the first type of authentication information to the authentication information acquisition device 1 .
- the authentication information acquisition device 1 (first authentication information acquisition unit 11) acquires the first type of authentication information (S10 in FIG. 9), it transmits the acquired first type of authentication information to the server 200. .
- the server 200 executes the first authentication process using the first type of authentication information acquired from the local system 100 (S11 in FIG. 9). Specifically, the first authentication unit 12 executes the first authentication process.
- the server 200 and local system 100 execute error processing (S13 of FIG. 9). For example, the server 200 notifies the local system 100 that authentication has failed. Then, the local system 100 notifies the user that the authentication has failed by lighting a warning lamp, outputting a buzzer sound, or displaying information on the display.
- the authentication history acquisition unit 13 retrieves the authentication history information associated with the user from the storage unit 16 (S14 of FIG. 9).
- the specifying unit 14 specifies the authentication information required to pass through the first authentication point based on the retrieved authentication history information (S15 in FIG. 9).
- the condition for passing through the illustrated first authentication point is, for example, "the authentication process using the authentication information acquired by the authentication information acquisition device 1 installed at the first authentication point is successful”. and "the second authentication process using the second type of authentication information has been successful”.
- the identification unit 14 For users whose authentication history information does not indicate that the second authentication process has been successful, the identification unit 14 provides authentication information necessary for passing through the first authentication point as "the first authentication point "authentication information” and "second type of authentication information" that can be acquired by the authentication information acquiring apparatus 1 installed in the .
- the specifying unit 14 sends "the first "authentication information that can be acquired by the authentication information acquisition device 1 installed at the authentication point" is specified.
- the passage processing unit 15 executes processing for allowing a user who has successfully completed all authentication processing using the specified authentication information to pass (Yes in S16 of FIG. 9, S17).
- the passage processing unit 15 executes the above-described error processing for the user who has not succeeded in the authentication processing using at least one piece of the specified authentication information (S13 in FIG. 9).
- the passage processing unit 15 may notify the user of the reason why passage is not possible. For example, "Authentication processing using the first type of authentication information entered was successful, but authentication processing using the second type of authentication information was not successful, so it cannot pass", "The entered A message such as "You cannot pass because the authentication process using the first type of authentication information has failed" may be output via a predetermined output device.
- the type of authentication information used in the authentication process is registered in the authentication history information as shown in FIG. 8 at arbitrary timing.
- a user who is permitted to pass through the first authentication point passes through the first authentication point shown in FIG. 4 and enters the second area.
- a user who has failed authentication processing using the first type of authentication information re-enters the first type of authentication information into the authentication information acquisition device 1 and performs operations such as performing authentication processing again.
- a user who cannot pass because the authentication process using the second type of authentication information has not succeeded operates the user terminal 300 and uses the second type of authentication information acquisition means (camera, fingerprint, etc.) provided in the user terminal 300.
- a second type of authentication information is input to the user terminal 300 via a sensor, microphone, etc.). Then, the user performs a predetermined operation on the user terminal 300 and transmits the second type of authentication information input to the user terminal 300 to the authentication system 10 .
- the Internet via authentication unit 17 acquires the second type of authentication information transmitted from the user terminal 300 via the Internet (S20 in FIG. 10), it performs authentication processing based on the second type of authentication information ( S21 in FIG. 10). If the authentication succeeds (Yes in S22 of FIG. 10), the Internet-via authentication unit 17 registers the successful authentication in the authentication history information as shown in FIG. 8 (S23 of FIG. 10). Next, the Internet via authentication unit 17 transmits the authentication result to the user terminal 300 (S24 in FIG. 10).
- the user again enters the first type of authentication information into the authentication information acquisition device 1 at the first authentication point shown in FIG. 4, and performs authentication processing.
- the second authentication process since it is registered that the second authentication process was successful, one of the conditions for passing through the first authentication point, "the second authentication process using the second type of authentication information Being successful is fulfilling. For this reason, if the current authentication process satisfies the condition that ⁇ the authentication process using the authentication information acquired by the authentication information acquisition device 1 installed at the first authentication point has succeeded'', the user can 1 authentication point can be passed.
- the illustrated authentication point A corresponds to another authentication point installed at the entrance of the first area in FIG.
- the illustrated authentication point B corresponds to the first authentication point installed at the entrance of the second area in FIG.
- the condition for passing through authentication point A is that "the authentication process using the authentication information acquired by the authentication information acquisition device 1 installed at authentication point A has been successful".
- the conditions for passing through the authentication point B are that "authentication processing using the authentication information acquired by the authentication information acquisition device 1 installed at the authentication point B has been successful" and "face authentication has been successful. That is.
- Mr. A passed through authentication point A with face recognition. Thereafter, Mr. A performed authentication processing using his own user identification information stored in an IC card or the like at authentication point B without performing face authentication via the Internet, and succeeded.
- the identification unit 14 allows the authentication information acquisition device 1 installed at the authentication point B to acquire the authentication information necessary for passing through the authentication point B and entering the second area. Identify valid credentials. Mr. A, who has successfully completed the authentication process using the specified authentication information, is allowed to pass through the authentication point B and enter the second area.
- Mr. B passed through authentication point A through authentication processing using his own user identification information stored in an IC card or the like. After that, Mr. B performed face authentication via the Internet, and then performed authentication processing using his own user identification information stored in an IC card or the like at authentication point B, and succeeded.
- the identification unit 14 enables the authentication information acquisition device 1 installed at the authentication point B to acquire the authentication information necessary for passing through the authentication point B and entering the second area. Identify valid credentials. Mr. B, who has successfully completed the authentication process using the identified authentication information, is allowed to pass through the authentication point B and enter the second area.
- Mr. C passed through authentication point A through authentication processing using his own user identification information stored in an IC card or the like. Thereafter, Mr. C performed authentication processing using his own user identification information stored in an IC card or the like at authentication point B without performing face authentication via the Internet, and succeeded.
- the identification unit 14 allows the authentication information acquisition device 1 installed at the authentication point B to acquire the authentication information necessary for passing through the authentication point B and entering the second area. authentication information and face information. Mr. C, who has not succeeded in the authentication process using the face information, is not permitted to pass through the authentication point B and enter the second area. After that, for example, if face authentication via the Internet succeeds, and then authentication succeeds again at authentication point B, Mr. C can pass through authentication point B and enter the second area. forgiven.
- Mr. D passed through authentication point A through authentication processing using Mr. A's user identification information stored in an IC card or the like. Thereafter, Mr. D performed authentication processing using Mr. A's user identification information stored in an IC card or the like at authentication point B without performing face authentication via the Internet, and succeeded.
- Mr. D who entered the first area using Mr. A's user identification information, is registered as having entered the first area, more specifically, entered the first area using his face information. It has not been.
- the identification unit 14 allows the authentication information acquisition device 1 installed at the authentication point B to acquire the authentication information necessary for passing through the authentication point B and entering the second area. authentication information and face information.
- Mr. C who has not succeeded in the authentication process using the face information, is not permitted to pass through the authentication point B and enter the second area.
- Mr. E passed authentication point A with face authentication. However, due to a computer error, the face was successfully recognized as Mr. A. Therefore, in the authentication history information, the fact that Mr. A passed through the authentication point A through face authentication is registered, but the fact that Mr. E passed through the authentication point A through face authentication is not registered. Thereafter, Mr. E performed authentication processing using his own user identification information stored in an IC card or the like at authentication point B without performing face authentication via the Internet, and succeeded. Mr. E, who entered the first area while being erroneously recognized as Mr. A, is registered as having entered the first area, more specifically, entered the first area using facial information. not For such Mr.
- the identification unit 14 allows the authentication information acquisition device 1 installed at the authentication point B to acquire the authentication information necessary for passing through the authentication point B and entering the second area. authentication information and face information. Mr. E, who has not been successfully authenticated using face information, is not allowed to pass through the authentication point B and enter the second area. After that, for example, if face authentication via the Internet succeeds, and then authentication succeeds again at authentication point B, Mr. E can pass through authentication point B and enter the second area. forgiven.
- the identification unit 14 provides the user whose face information is identified as the authentication information used when entering the first area to enter the second area as the authentication information necessary for entering the second area. (authentication information that can be acquired by the authentication information acquisition device 1 installed at the entrance of the second area) read by the user identification information can be specified.
- the identification unit 14 instructs the user, whose user identification information read by the reader as the authentication information used when entering the first area, is identified to be required to enter the second area.
- the authentication information user identification information read by the reader (authentication information that can be acquired by the authentication information acquisition device 1 installed at the entrance of the second area) and face information can be specified.
- the specifying unit 14 provides authentication information necessary for entering the second area for a user who has not been specified that the authentication information used when entering the first area is face information: User identification information read by the reader (authentication information that can be acquired by the authentication information acquisition device 1 installed at the entrance of the second area) and face information can be specified.
- the identification unit 14 provides user identification information read by the reader (second (authentication information that can be acquired by the authentication information acquisition device 1 installed at the entrance of the area) and face information can be specified.
- the authentication system 10 of the present embodiment is a system that performs multi-stage authentication in a facility. It is possible to specify for each user the type of authentication information required to By configuring in this way, it is possible to avoid the inconvenience of redundantly executing authentication processing using a certain type of authentication information at multiple authentication points. On the other hand, it is possible to make it a condition for passing through an arbitrary authentication point that an authentication process using a certain type of authentication information has been successful at any authentication point or via the Internet. As a result, a technique for maintaining a high security level without waste in a multistage authentication system is realized.
- the configuration of the authentication information acquisition device 1 installed at each authentication point is free. degree increases. That is, as described in the above embodiment, it is possible to set a condition that, for example, "face authentication" is required to pass through the first authentication point. It is not necessary to install the authentication information acquisition device 1 that acquires face information. This is because, for example, if face authentication is successful at another authentication point, the conditions for passing through the first authentication point are met.
- the cost burden of installing the authentication information acquisition device 1 can be reduced. For example, when considering a change from an existing system, if new authentication information acquisition devices 1 are installed at all authentication points, the cost burden increases.
- the authentication information acquisition device 1 that acquires a new type of authentication information is installed again at only some of the plurality of authentication points, and the existing authentication information acquisition device 1 is used at the other authentication points. You can keep doing it.
- the passage condition is that the authentication processing using the new type of authentication information is successful even at the authentication point where the authentication information acquisition device 1 for acquiring the new type of authentication information is not installed. be able to.
- the authentication processes executed up to that point are The type can be different for each user. Therefore, in the present embodiment, authentication history information is used to manage the type of authentication processing performed in the past period for each user. Therefore, it is possible to accurately grasp the type of authentication processing that has been executed so far when a certain authentication point is reached.
- the authentication system 10 of this embodiment differs from that of the first embodiment in that it has a function of preventing spoofing in the authentication processing by the Internet-based authentication unit 17 .
- the Internet-based authentication unit 17 acquires the location information of the user terminal 300 from the user terminal 300 in addition to the second type of authentication information.
- the location information is information indicating the current location of the user terminal 300, and can be GPS (global positioning system) information, for example.
- the Internet authentication unit 17 determines whether the location information of the user terminal 300 exists within a predetermined area.
- the predetermined area is, for example, the whole or part of the facility area where the authentication system 10 is installed.
- the Internet via authentication unit 17 performs the second authentication using the second type of authentication information acquired from the user terminal 300 and that the position indicated by the position information of the user terminal 300 is within a predetermined area. If the processing succeeds, the success of the second authentication processing is registered in the authentication history information.
- the authentication system 10 of this embodiment differs from the first and second embodiments in that it further includes a registration manager 20 .
- the user possesses a digital membership card and an admission card as shown in FIG.
- the user installs a dedicated application on the user terminal 300, and performs registration work (registration of face information, registration of user identification information, etc.) according to the instructions of the application, thereby obtaining a digital membership card as shown. can be done.
- the user can register and use an IC card, such as a transportation IC card, that he/she owns as an entrance pass.
- the user operates a predetermined terminal device to select a predetermined menu (service menu for NN Corporation).
- the predetermined terminal device may be a general-purpose device installed in a convenience store, station, airport, or the like, or may be another device.
- a predetermined terminal device is communicably connected to the authentication system 10 .
- the user selects a service (card registration) for registering an IC card as an admission pass from the service menu for NN Corporation.
- the user holds an IC card to be registered as an admission pass (or a smart phone, smart watch, mobile phone, etc. that stores IC card information) to a reader of a predetermined terminal device, Information on the IC card (information indicating the type of IC card, card identification information, etc.) is read by a predetermined terminal device.
- a predetermined terminal device transmits the input IC card information to the authentication system 10 . Then, the authentication system 10 determines whether or not the input IC card information is appropriate as an IC card to be registered.
- the authentication system 10 determines that the IC card is inappropriate. If it is determined to be inappropriate, the authentication system 10 notifies a predetermined terminal device to that effect. In response to this, as indicated by 10 in FIG. 13, the predetermined terminal device notifies the user of the error.
- a predetermined type e.g, transportation IC card
- the authentication system 10 notifies a predetermined terminal device to that effect.
- the predetermined terminal device starts face information registration processing, as indicated by 4 in FIG.
- the face image is transmitted to the authentication system 10 .
- the authentication system 10 determines whether the received face image is suitable as an image to be registered (whether the face size is appropriate, whether a predetermined feature amount can be extracted, etc.). If appropriate, the authentication system 10 associates the received face image with the information on the IC card and stores them in the storage device. Then, the authentication system 10 notifies a predetermined terminal device of the determination result.
- the predetermined terminal device If the received face image is suitable as an image to be registered, the predetermined terminal device notifies that registration of the face image has been completed, as shown in 5 of FIG. As shown, guidance for outputting a receipt, guidance for ending the service, and the like are output. Also, the predetermined terminal device transmits the information printed on the receipt to the authentication system 10 .
- the authentication system 10 associates the received information with the face image and information of the IC card, and stores them in the storage device.
- the information to be printed on the receipt includes, but is not limited to, information (store information, station information, etc.) indicating the position where a predetermined terminal device is installed, registration date and time, processing number, and the like.
- the predetermined terminal device notifies the user to that effect, and as shown in 9 of FIG. 14, takes the face image again.
- the user After executing the processes shown in FIGS. 13 and 14, the user operates the user terminal 300 and logs into the authentication system 10 via a dedicated application, as shown in 1 and 2 of FIG. After that, as shown in 3 of FIG. 15, the user selects a screen for registering the IC card from the menu screen of the application.
- the authentication system 10 reads the user's information from the "information linking the IC card information and face information" registered in the authentication system 10 in the processing shown in FIGS. .
- There are various means for reading user information For example, it may be realized by matching face information registered as a digital membership card with face information registered in association with IC card information.
- the information read from the "information linking the IC card information and face information" registered in the authentication system 10 by the processing shown in FIGS. is transmitted from the authentication system 10 to the user terminal 300 and displayed on the screen of the user terminal 300 .
- the user checks against the receipt information output in 7 of FIG. 14, and when confirming that there is no mistake, inputs that fact to the user terminal 300 (touching Yes in the drawing).
- the user terminal 300 then transmits the input content to the authentication system 10 .
- the authentication system 10 links the read "information linking the IC card information and face information" to the user's member information and registers it. Thereafter, the user can use the registered IC card as an admission pass.
- the face information used as reference data for matching processing in face authentication in the authentication area described in the first and second embodiments may be face information registered when the digital membership card was created, The face information registered at the time of registration of the IC card may be used.
- the user operates a predetermined terminal device to select a predetermined menu (service menu for NN Corporation).
- the predetermined terminal device may be a general-purpose device installed in a convenience store, station, airport, or the like, or may be another device.
- a predetermined terminal device is communicably connected to the authentication system 10 .
- the user selects a service for deleting the registered IC card (card deletion) from the service menu for NN Corporation. Then, face authentication is started as indicated by 3 in FIG.
- the predetermined terminal device captures the user and generates a face image, and then transmits the face image to the authentication system 10.
- the authentication system 10 identifies the user by face authentication using the received face image.
- the authentication system 10 notifies the specified terminal device to that effect.
- the predetermined terminal device notifies the user that the face authentication has failed and guides the user to perform face authentication again, as indicated by 8 in FIG. 17 .
- the authentication system 10 notifies the specified terminal device of the fact.
- the predetermined terminal device accepts the input of the password, as indicated by 5 in FIG. Then, the predetermined terminal device transmits the entered password to the authentication system 10 . If the entered password is correct, the authentication system 10 deletes the information on the IC card registered in association with the user, and notifies a predetermined terminal device of the completion of the deletion. The predetermined terminal device notifies that the deletion of the IC card has been completed, as shown at 6 in FIG. 17, and then outputs guidance to end the service, etc., as shown at 7 in FIG. Thereafter, the user cannot use the deleted IC card as an admission pass.
- the above password may be set in advance for each user.
- the password may be set when the digital membership card is registered, or when the IC card is registered as shown in FIG. 13 and FIG. It may be performed at the time of the work of linking the information of
- the user operates the user terminal 300 and logs into the authentication system 10 via a dedicated application, as shown in 1 and 2 of FIG. Thereafter, as shown in 3 of FIG. 18, the user selects a screen for deleting the IC card from the menu screen of the application.
- the authentication system 10 reads the information of the IC card registered in association with the user and transmits it to the user terminal 300.
- the user terminal 300 displays the received IC card information and prompts the user for confirmation, as shown in 4 of FIG.
- the user terminal 300 notifies the authentication system 10 to that effect.
- the authentication system 10 deletes the information on the IC card registered in association with the user, and then notifies the user terminal 300 of the completion of the deletion.
- the user terminal 300 notifies the user that the deletion of the IC card has been completed, as indicated by 5 in FIG. Thereafter, the user cannot use the deleted IC card as an admission pass.
- the registration management unit 20 compares the second face image and the first face image included in the digital membership card data, and Based on the result, the acquired card identification information and the digital membership card data can be linked and stored in the storage unit 16 .
- the registration management unit 20 associates the acquired card identification information with the digital membership card data and stores it in the storage unit 16
- the registration management unit 20 stores the acquired card identification information in association with the digital membership card data associated with the terminal associated with the digital membership card data. may send information notifying that the linking is completed. For example, these processes may be implemented via the dedicated application described above.
- the registration management unit 20 displays a button for canceling the association with the card identification information on the screen after logging in using the digital membership card data. can do.
- the same effects as those of the first and second embodiments are realized. Further, according to the authentication system 10 of the present embodiment, the user can employ various methods to register or delete the IC card. As a result, user convenience is improved.
- the local system 100 may include the authentication information acquisition device 1, the transit control device 2, and the authentication device 3, and the server 200 may include the authentication history management device 4.
- the authentication system 10 may be composed only of a plurality of local systems 100 without having the server 200 .
- the local system 100 includes an authentication information acquisition device 1, a transit control device 2, an authentication device 3, and an authentication history management device 4.
- FIG. Each local system 100 manages authentication history information and registers the history of authentication processing executed by each local system 100 . Then, a synchronizing process is performed to match the contents of the authentication history information managed by the plurality of local systems 100 by arbitrary means.
- the authentication information acquisition device 1 for acquiring the second type of authentication information is not installed at the first authentication point.
- the authentication information acquisition device 1 that acquires the second type of authentication information may be installed at the first authentication point as well.
- the authentication information acquisition device 1 for acquiring the second type of authentication information may be installed at some of the plurality of first authentication points.
- the authentication information acquisition device 1 that acquires the second type of authentication information may be installed at all of the plurality of first authentication points.
- the degree of freedom in configuring the authentication information acquisition device 1 installed at each authentication point is increased. Therefore, the configuration described as the modified example can also be adopted.
- the authentication system 10 does not have to have the Internet-based authentication unit 17 .
- the second authentication process using the user terminal 300 may be performed by the following method.
- the user activates a predetermined application on his/her own user terminal 300 and inputs the second authentication information.
- the user takes a picture of his/her face, takes a picture of his/her eyes, inputs a fingerprint, or inputs his or her voice.
- the application executes a second authentication process using the input second authentication information.
- the user brings his/her own user terminal 300 close to the contactless communication antenna of the local system 100 to perform short-range wireless communication.
- the result of the second authentication process is transmitted from the user terminal 300 to the local system 100 .
- the local system 100 transmits the inputted result of the second authentication process to the server 200 .
- the server 200 updates the authentication history information based on the received result of the second authentication process.
- acquisition means "acquisition of data stored in another device or storage medium by one's own device based on user input or program instructions (active acquisition)", for example, receiving by requesting or querying other devices, accessing and reading other devices or storage media, etc., and based on user input or program instructions, " Inputting data output from other devices to one's own device (passive acquisition), for example, receiving data distributed (or transmitted, push notification, etc.), and received data or information Selecting and acquiring from among, and “editing data (text conversion, rearranging data, extracting some data, changing file format, etc.) to generate new data, and/or "obtaining data”.
- editing data text conversion, rearranging data, extracting some data, changing file format, etc.
- An authentication system that has a first area and a second area that can be entered after passing through the first area, and determines whether or not to enter the second area, identifying authentication information used by a user to enter the first area;
- An authentication system comprising specifying means for specifying authentication information necessary for the user to enter the second area according to the specified authentication information. 2.
- the specifying means allows the user to enter the second area when the authentication information used when the user enters the first area is specified as the first type of authentication information.
- the authentication information required for authentication is a second type of authentication information different from the first type of authentication information.
- the identifying means performs authentication necessary for the user to enter the second area when the authentication information used when the user enters the first area is identified as face information.
- the authentication system according to 1 or 2 wherein the information is user identification information read by the reader.
- the specifying means allows the user to enter the second area when authentication information used when the user enters the first area is specified as user identification information read by a reader. 4.
- the specifying means may provide information required for the user to enter the second area. 5.
- the authentication system according to any one of 1 to 4, wherein user identification information read by a reader and face information are specified as authentication information.
- the identifying means uses user identification information read by a reader as authentication information necessary for the user to enter the second area when the entry of the user into the first area is not registered. and face information.
- the Internet-based authentication means for acquiring face information from a user terminal via the Internet, executing authentication processing using the face information, and registering success in authentication processing using the face information in authentication history information. further having When the user has successfully authenticated via the Internet in the authentication history information, the identification means reads the authentication information as authentication information required to enter the second area by the reader. 7.
- An authentication system according to any one of claims 1 to 6, which identifies the user identification information obtained. 8.
- the Internet-based authentication means includes: When the position information of the user terminal is acquired, and the position indicated by the position information exists within a predetermined area, and authentication processing using the face information is successful, authentication processing using the face information is performed.
- 9. having storage means for storing the digital membership card data and the card identification information in association with each other; After acquiring the card identification information and the first face image, matching the second face image and the first face image included in the digital membership card data, and identifying the acquired card based on the matching result.
- the authentication system according to any one of 1 to 8, comprising registration management means for linking information with the digital membership card data and storing the data in the storage means. 10.
- the registration management means When the registration management means stores the acquired card identification information and the digital membership card data in association with the digital membership card data, the registration management means associates the acquired card identification information with the digital membership card data associated with the card identification information. 10.
- the authentication system according to 9 or 10 wherein the registration management means displays a button for canceling association with the card identification information on a screen after logging in using the digital membership card data. 12.
- first area and a second area that can be entered after passing through the first area, and an authentication system that determines whether or not to enter the second area, Identifying authentication information used when the user enters the first area, and identifying authentication information necessary for the user to enter the second area according to the identified authentication information.
- Authentication method
- Second Authentication Unit 20 Registration Management Unit 100 Local System 200 Server 300 User Terminal 400 Communication Network 1A Processor 2A Memory 3A Input/Output I/F 4A peripheral circuit 5A bus
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
第1エリアと、前記第1エリアを通ったのちに入場可能な第2エリアとがあり、前記第2エリアへの入場の可否を判断する認証システムであって、
ユーザが前記第1エリアに入場するときに用いられた認証情報を特定し、特定した前記認証情報に応じて、前記ユーザが前記第2エリアに入場するために必要な認証情報を特定する特定手段を有する認証システムが提供される。
第1エリアと、前記第1エリアを通ったのちに入場可能な第2エリアとがあり、前記第2エリアへの入場の可否を判断する認証システムが、
ユーザが前記第1エリアに入場するときに用いられた認証情報を特定し、特定した前記認証情報に応じて、前記ユーザが前記第2エリアに入場するために必要な認証情報を特定する認証方法が提供される。
「概要」
図1を用いて、本実施形態の認証システムの概要を説明する。なお、概要の説明の目的は、本実施形態の認証システムの全体像を把握することである。本実施形態の認証システムの詳細な説明は後述する。
次に、本実施形態の認証システムの構成を詳細に説明する。まず、認証システムのハードウエア構成の一例を説明する。認証システムの各機能部は、任意のコンピュータのCPU(Central Processing Unit)、メモリ、メモリにロードされるプログラム、そのプログラムを格納するハードディスク等の記憶ユニット(あらかじめ装置を出荷する段階から格納されているプログラムのほか、CD(Compact Disc)等の記憶媒体やインターネット上のサーバ等からダウンロードされたプログラムをも格納できる)、ネットワーク接続用インターフェイスを中心にハードウエアとソフトウエアの任意の組合せによって実現される。そして、その実現方法、装置にはいろいろな変形例があることは、当業者には理解されるところである。
次に、認証システム10の機能構成を説明する。図6に、認証システム10の機能ブロック図の一例を説明する。図示するように、認証システム10は、認証情報取得部(第1の認証情報取得部11及び第2の認証情報取得部18)と、認証部(第1の認証部12及び第2の認証部19)と、認証履歴取得部13と、特定部14と、通過処理部15と、記憶部16と、インターネット経由認証部17とを有する。
次に、図4、図9、図10及び図21を用いて、認証システム10の処理の流れを説明する。
図11を用いて、具体的なケースを説明する。図示する認証地点Aは、図4の第1のエリアの入口に設置された他の認証地点に対応する。図示する認証地点Bは、図4の第2のエリアの入口に設置された第1の認証地点に対応する。
以上説明したように、本実施形態の認証システム10は、施設内で多段の認証を行うシステムにおいて、他の認証地点等でそれまでに実施された認証処理の種類に基づき、ある認証地点を通過するために必要な認証情報の種類をユーザ毎に特定することができる。このように構成することで、ある種類の認証情報を用いた認証処理を、複数の認証地点で不要に重複して実行する不都合を回避できる。一方で、ある種類の認証情報を用いた認証処理にいずれかの認証地点又はインターネット経由で成功していることを、任意の認証地点を通過する条件とすることができる。結果、多段の認証を行うシステムにおいて、無駄なく、高いセキュリティレベルを維持する技術が実現される。
本実施形態の認証システム10は、インターネット経由認証部17による認証処理において、なりすましを防止する機能を備える点で、第1の実施形態と異なる。
本実施形態では、認証情報(参照データ)を認証システム10に登録する処理の一例を説明する。図22に示すように、本実施形態の認証システム10は、登録管理部20をさらに有する点で、第1及び第2の実施形態と異なる。
ここで、図13乃至図15を用いて、自身が所持しているICカードを入場証として登録する処理、及び、自身の生体情報を認証情報(参照データ)として登録する処理の一例を説明する。以下で説明する認証システム10が実行する処理は、登録管理部20により実現される。ここでは、NN株式会社の従業員がNN株式会社の施設内に入場するための入場証を登録する処理を例にして説明する。
次に、図16及び図17を用いて、入場証として登録したICカードを削除(登録解除)する処理の一例を説明する。ここでも、NN株式会社の従業員がNN株式会社の施設内に入場するための入場証を削除する処理を例にして説明する。
次に、図18を用いて、入場証として登録したICカードを削除(登録解除)する処理の他の一例を説明する。ここでも、NN株式会社の従業員がNN株式会社の施設内に入場するための入場証を削除する処理を例にして説明する。
以下、第1乃至第3の実施形態に適用可能な変形例を説明する。当該変形例においても、第1乃至第3の実施形態と同様の作用効果が実現される。
図19及び図20に示すように、ローカルシステム100が認証情報取得装置1、通過制御装置2及び認証装置3を備え、サーバ200が認証履歴管理装置4を備えてもよい。すなわち、ローカルシステム100が認証装置3を備えてもよい。
認証システム10は、サーバ200を有さず、複数のローカルシステム100のみで構成されてもよい。この場合、ローカルシステム100が、認証情報取得装置1、通過制御装置2、認証装置3及び認証履歴管理装置4を備える。各ローカルシステム100が、認証履歴情報を管理し、各ローカルシステム100が実行した認証処理の履歴を登録する。そして、任意の手段で複数のローカルシステム100が管理する認証履歴情報の内容を一致させる同期処理が行われる。
上記実施形態では、第1の認証地点では第2の種類の認証情報を取得する認証情報取得装置1が設置されていないこととした。変形例として、第1の認証地点においても第2の種類の認証情報を取得する認証情報取得装置1が設置されてもよい。また、施設内に複数の第1の認証地点を設置する場合、複数の第1の認証地点の一部において、第2の種類の認証情報を取得する認証情報取得装置1が設置されてもよいし、複数の第1の認証地点の全部において、第2の種類の認証情報を取得する認証情報取得装置1が設置されてもよい。
認証システム10は、インターネット経由認証部17を有さなくてもよい。この場合、例えば以下のような手法で、ユーザ端末300を利用した第2の認証処理が行われてもよい。
1. 第1のエリアと、前記第1のエリアを通ったのちに入場可能な第2のエリアとがあり、前記第2のエリアへの入場の可否を判断する認証システムであって、
ユーザが前記第1のエリアに入場するときに用いられた認証情報を特定し、
特定した前記認証情報に応じて、前記ユーザが前記第2のエリアに入場するために必要な認証情報を特定する特定手段を有する認証システム。
2. 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、第1の種類の認証情報であると特定された場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報が、前記第1の種類の認証情報とは異なる第2の種類の認証情報であることを特定する1に記載の認証システム。
3. 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、顔情報であると特定された場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報を特定する1又は2に記載の認証システム。
4. 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、リーダによって読み取られたユーザ識別情報であると特定された場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報と、顔情報とを特定する1から3のいずれかに記載の認証システム。
5. 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、顔情報であると特定されていない場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報と、顔情報とを特定する1から4のいずれかに記載の認証システム。
6. 前記特定手段は、ユーザが前記第1のエリアに入場したことが登録されていない場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報と、顔情報とを特定する1から5のいずれかに記載の認証システム。
7、 インターネットを介してユーザ端末から顔情報を取得し、前記顔情報を用いた認証処理を実行し、前記顔情報を用いた認証処理に成功したことを認証履歴情報に登録するインターネット経由認証手段をさらに有し、
前記特定手段は、前記ユーザが前記インターネットを介した認証処理に成功したことが前記認証履歴情報に登録されている場合、前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報を特定する1から6のいずれかに記載の認証システム。
8. 前記インターネット経由認証手段は、
前記ユーザ端末の位置情報を取得し、前記位置情報で示される位置が所定のエリア内に存在し、かつ、前記顔情報を用いた認証処理に成功した場合、前記顔情報を用いた認証処理に成功したことを前記認証履歴情報に登録する7に記載の認証システム。
9. デジタル会員証データとカード識別情報とを紐付けて記憶する記憶手段を有し、
前記カード識別情報と第1の顔画像とを取得した後、前記デジタル会員証データに含まれる第2の顔画像と前記第1の顔画像を照合し、照合結果に基づき、取得した前記カード識別情報と前記デジタル会員証データとを紐付けて前記記憶手段に記憶させる登録管理手段を有する1から8のいずれかに記載の認証システム。
10. 前記登録管理手段は、取得した前記カード識別情報と前記デジタル会員証データとを紐付けて前記記憶手段に記憶させた場合、取得した前記カード識別情報を紐付けた前記デジタル会員証データに紐付いている端末に、紐付けが完了したことを通知する情報を送信する9に記載の認証システム。
11. 前記登録管理手段は、前記デジタル会員証データを用いてログインした後の画面において、前記カード識別情報との紐付けを解消するためのボタンを表示する9又10に記載の認証システム。
12. 第1のエリアと、前記第1のエリアを通ったのちに入場可能な第2のエリアとがあり、前記第2のエリアへの入場の可否を判断する認証システムが、
ユーザが前記第1のエリアに入場するときに用いられた認証情報を特定し、特定した前記認証情報に応じて、前記ユーザが前記第2のエリアに入場するために必要な認証情報を特定する認証方法。
2 通過制御装置
3 認証装置
4 認証履歴管理装置
10 認証システム
11 第1の認証情報取得部
12 第1の認証部
13 認証履歴取得部
14 特定部
15 通過処理部
16 記憶部
17 インターネット経由認証部
18 第2の認証情報取得部
19 第2の認証部
20 登録管理部
100 ローカルシステム
200 サーバ
300 ユーザ端末
400 通信ネットワーク
1A プロセッサ
2A メモリ
3A 入出力I/F
4A 周辺回路
5A バス
Claims (12)
- 第1のエリアと、前記第1のエリアを通ったのちに入場可能な第2のエリアとがあり、前記第2のエリアへの入場の可否を判断する認証システムであって、
ユーザが前記第1のエリアに入場するときに用いられた認証情報を特定し、
特定した前記認証情報に応じて、前記ユーザが前記第2のエリアに入場するために必要な認証情報を特定する特定手段を有する認証システム。 - 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、第1の種類の認証情報であると特定された場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報が、前記第1の種類の認証情報とは異なる第2の種類の認証情報であることを特定する請求項1に記載の認証システム。
- 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、顔情報であると特定された場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報を特定する請求項1又は2に記載の認証システム。
- 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、リーダによって読み取られたユーザ識別情報であると特定された場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報と、顔情報とを特定する請求項1から3のいずれか1項に記載の認証システム。
- 前記特定手段は、ユーザが前記第1のエリアに入場するときに用いられた認証情報が、顔情報であると特定されていない場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報と、顔情報とを特定する請求項1から4のいずれか1項に記載の認証システム。
- 前記特定手段は、ユーザが前記第1のエリアに入場したことが登録されていない場合、前記ユーザが前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報と、顔情報とを特定する請求項1から5のいずれか1項に記載の認証システム。
- インターネットを介してユーザ端末から顔情報を取得し、前記顔情報を用いた認証処理を実行し、前記顔情報を用いた認証処理に成功したことを認証履歴情報に登録するインターネット経由認証手段をさらに有し、
前記特定手段は、前記ユーザが前記インターネットを介した認証処理に成功したことが前記認証履歴情報に登録されている場合、前記第2のエリアに入場するために必要な認証情報として、リーダによって読み取られたユーザ識別情報を特定する請求項1から6のいずれか1項に記載の認証システム。 - 前記インターネット経由認証手段は、
前記ユーザ端末の位置情報を取得し、前記位置情報で示される位置が所定のエリア内に存在し、かつ、前記顔情報を用いた認証処理に成功した場合、前記顔情報を用いた認証処理に成功したことを前記認証履歴情報に登録する請求項7に記載の認証システム。 - デジタル会員証データとカード識別情報とを紐付けて記憶する記憶手段を有し、
前記カード識別情報と第1の顔画像とを取得した後、前記デジタル会員証データに含まれる第2の顔画像と前記第1の顔画像を照合し、照合結果に基づき、取得した前記カード識別情報と前記デジタル会員証データとを紐付けて前記記憶手段に記憶させる登録管理手段を有する請求項1から8のいずれか1項に記載の認証システム。 - 前記登録管理手段は、取得した前記カード識別情報と前記デジタル会員証データとを紐付けて前記記憶手段に記憶させた場合、取得した前記カード識別情報を紐付けた前記デジタル会員証データに紐付いている端末に、紐付けが完了したことを通知する情報を送信する請求項9に記載の認証システム。
- 前記登録管理手段は、前記デジタル会員証データを用いてログインした後の画面において、前記カード識別情報との紐付けを解消するためのボタンを表示する請求項9又は10に記載の認証システム。
- 第1のエリアと、前記第1のエリアを通ったのちに入場可能な第2のエリアとがあり、前記第2のエリアへの入場の可否を判断する認証システムが、
ユーザが前記第1のエリアに入場するときに用いられた認証情報を特定し、特定した前記認証情報に応じて、前記ユーザが前記第2のエリアに入場するために必要な認証情報を特定する認証方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023509912A JPWO2022208598A1 (ja) | 2021-03-29 | 2021-03-29 | |
US18/283,687 US20240177553A1 (en) | 2021-03-29 | 2021-03-29 | Authentication system and authentication method |
PCT/JP2021/013249 WO2022208598A1 (ja) | 2021-03-29 | 2021-03-29 | 認証システム及び認証方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2021/013249 WO2022208598A1 (ja) | 2021-03-29 | 2021-03-29 | 認証システム及び認証方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022208598A1 true WO2022208598A1 (ja) | 2022-10-06 |
Family
ID=83458475
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2021/013249 WO2022208598A1 (ja) | 2021-03-29 | 2021-03-29 | 認証システム及び認証方法 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20240177553A1 (ja) |
JP (1) | JPWO2022208598A1 (ja) |
WO (1) | WO2022208598A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220309138A1 (en) * | 2019-12-27 | 2022-09-29 | Rakuten Group, Inc. | Authentication system, authentication device, authentication method and program |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008027432A (ja) * | 2006-06-21 | 2008-02-07 | Dainippon Printing Co Ltd | 認証用icカード及び入場認証処理システム |
JP2019125001A (ja) * | 2018-01-12 | 2019-07-25 | 日本電気株式会社 | 顔認証装置 |
-
2021
- 2021-03-29 JP JP2023509912A patent/JPWO2022208598A1/ja active Pending
- 2021-03-29 US US18/283,687 patent/US20240177553A1/en active Pending
- 2021-03-29 WO PCT/JP2021/013249 patent/WO2022208598A1/ja active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008027432A (ja) * | 2006-06-21 | 2008-02-07 | Dainippon Printing Co Ltd | 認証用icカード及び入場認証処理システム |
JP2019125001A (ja) * | 2018-01-12 | 2019-07-25 | 日本電気株式会社 | 顔認証装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220309138A1 (en) * | 2019-12-27 | 2022-09-29 | Rakuten Group, Inc. | Authentication system, authentication device, authentication method and program |
US11928199B2 (en) * | 2019-12-27 | 2024-03-12 | Rakuten Group, Inc. | Authentication system, authentication device, authentication method and program |
Also Published As
Publication number | Publication date |
---|---|
JPWO2022208598A1 (ja) | 2022-10-06 |
US20240177553A1 (en) | 2024-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10755507B2 (en) | Systems and methods for multifactor physical authentication | |
US10440019B2 (en) | Method, computer program, and system for identifying multiple users based on their behavior | |
US11900746B2 (en) | System and method for providing credential activation layered security | |
US9531710B2 (en) | Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication | |
US9378599B2 (en) | Access management system and method | |
US20190236249A1 (en) | Systems and methods for authenticating device users through behavioral analysis | |
CN109074693B (zh) | 用于访问控制系统的虚拟面板 | |
JP5127429B2 (ja) | 入場制限システム及び中継装置 | |
JP6840568B2 (ja) | 認証システムおよび認証方法 | |
KR20120031866A (ko) | 입퇴장 관리 시스템 및 방법 | |
US20150106150A1 (en) | System and method for managing event participant authorizations | |
JP2018124622A (ja) | 入場受付端末、入場受付方法、入場受付プログラム、および入場受付システム | |
US20240203178A1 (en) | Access control system and access control method using the same | |
US12014740B2 (en) | Systems and methods for contactless authentication using voice recognition | |
US20170324735A1 (en) | Method for providing an access code on a portable device and portable device | |
KR20150133055A (ko) | 인터넷 공유기를 이용한 출결 관리 방법 | |
KR102063569B1 (ko) | 휴대형 단말기를 이용한 출입문 개폐관리장치 및 방법 | |
WO2022208598A1 (ja) | 認証システム及び認証方法 | |
JP6919280B2 (ja) | 機能管理システム及び機能管理方法 | |
KR20190079746A (ko) | 패턴 코드를 이용한 토큰 기반의 근태 관리 방법, 이를 수행하는 서버 장치 및 모바일 디바이스 | |
JP2007172039A (ja) | ユーザの位置情報を利用したログイン管理システム及び方法 | |
JP2007004698A (ja) | 取扱者認証機能付き電子機器 | |
US11546774B2 (en) | Methods, systems, apparatuses, and devices for controlling access to an access control location | |
US10057258B2 (en) | Biometric identification device | |
JP2018205815A (ja) | デジタルチケットシステム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21934774 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023509912 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18283687 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21934774 Country of ref document: EP Kind code of ref document: A1 |