WO2023228744A1 - Système de déverrouillage de porte, dispositif terminal, système de commande d'équipement et procédé de déverrouillage de porte - Google Patents

Système de déverrouillage de porte, dispositif terminal, système de commande d'équipement et procédé de déverrouillage de porte Download PDF

Info

Publication number
WO2023228744A1
WO2023228744A1 PCT/JP2023/017580 JP2023017580W WO2023228744A1 WO 2023228744 A1 WO2023228744 A1 WO 2023228744A1 JP 2023017580 W JP2023017580 W JP 2023017580W WO 2023228744 A1 WO2023228744 A1 WO 2023228744A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
door
information
authentication
verification process
Prior art date
Application number
PCT/JP2023/017580
Other languages
English (en)
Japanese (ja)
Inventor
和彦 岩井
Original Assignee
パナソニックIpマネジメント株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by パナソニックIpマネジメント株式会社 filed Critical パナソニックIpマネジメント株式会社
Publication of WO2023228744A1 publication Critical patent/WO2023228744A1/fr

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom

Definitions

  • the present disclosure provides a door unlocking system and door unlocking method that controls unlocking of a door according to the results of biometric authentication of a user, a terminal device on which operations related to biometric authentication of a user are performed, and a biometric authentication of a user.
  • the present invention relates to a device control system that controls target devices according to the results of the process.
  • the user's facial image obtained by photographing the user standing in front of the door with a camera is compared with the facial image of the registrant. , generate an authentication code including the ID of the door corresponding to the camera that photographed the user and the ID of the identified user, and send the authentication code to a mobile terminal owned by the user;
  • a technique is known in which a user unlocks a door by having a code reader installed near the door read an authentication code displayed on the screen of a mobile terminal (see Patent Document 1).
  • the security of authentication can be improved by using a mobile terminal owned by the user.
  • conventional technology requires a code reader to read the authentication code in addition to a camera to photograph the user, and the problem is that the system becomes larger as the number of points where the user is authenticated increases. was there. Therefore, a simple configuration is desired that does not require a dedicated authentication device at the point where the user receives authentication.
  • the present disclosure makes it possible to achieve highly secure authentication with a simple configuration by using a terminal device owned by the user, without requiring a dedicated authentication device at the point where the user receives authentication.
  • the main objective is to provide a door unlocking system, a terminal device, a device control system, and a door unlocking method.
  • the door unlocking system of the present disclosure is a door unlocking system that controls unlocking of a door according to the result of a person verification process based on biometric information of a user, and remotely controls a locking device provided on the door.
  • a terminal device that is carried by a user, is connected to the server device via a network, and has a sensor that acquires biometric information of the user and a positioning unit that acquires position information of the device itself.
  • the server device acquires the user's biometric information acquired by the sensor and the position information of the terminal device acquired by the positioning unit from the terminal device, and collects the user's biometric information and the registrant.
  • a position verification process is executed to verify the position information of the terminal device and the position information of the door, and the result of the person verification process and the position verification process is executed. Based on this, it is configured to determine whether or not the door can be unlocked.
  • the terminal device of the present disclosure is carried by a user, is connected via a network to a server device that remotely controls a locking device provided on a door, and has a sensor that acquires biometric information of the user, and a sensor that acquires biometric information of the user.
  • an authentication guidance screen that includes a positioning unit that acquires position information; a display input unit that displays a screen and receives operation input from a user; The device is configured to display a result confirmation screen regarding the determination result of whether or not the door can be unlocked based on the biometric information of the user and the location information of the own device.
  • the device control system of the present disclosure is a device control system that controls a target device according to the result of a person verification process based on biometric information of a user, and includes a server device that remotely controls the target device, and a user.
  • a terminal device carried by the server device, connected to the server device via a network, and having a sensor that acquires biometric information of a user and a positioning unit that acquires position information of the device itself;
  • the user's biometric information obtained by the sensor and the location information of the terminal device obtained by the positioning unit are obtained from the terminal device, and the user's biometric information and the registrant's biometric information are compared.
  • a position matching process is executed to match the location information of the terminal device with the location information of the target device, and based on the results of the person matching process and the position matching process, the target device
  • the structure is configured to determine whether or not the control is possible.
  • the door unlocking method of the present disclosure is a door unlocking method in which a processor executes a process of controlling the unlocking of the door according to the result of a person verification process based on the user's biometric information
  • a terminal device that is carried by a terminal device and has a sensor that acquires biometric information of the user, and a positioning unit that acquires position information of the device itself, the biometric information of the user acquired by the sensor, and the biometric information of the user acquired by the positioning unit. acquire the location information of the terminal device, execute a person verification process to match the user's biometric information with the registrant's biometric information, and also match the terminal device's location information with the door location information. Based on the results of the person verification process and the position verification process, it is determined whether or not the door can be unlocked, and depending on the determination result, the locking device installed on the door can be remotely operated.
  • the configuration is to control.
  • the present disclosure it is possible to confirm that the user is a registrant who is authorized to unlock the door through the person verification process. Furthermore, the position verification process allows confirmation that the user is staying near the door. Thereby, by using the terminal device that the user owns, it is possible to realize highly secure authentication with a simple configuration without requiring a dedicated authentication device at the point where the user receives authentication.
  • a first invention made to solve the above problem is a door unlocking system that controls unlocking of a door according to the result of a person verification process based on biometric information of a user. It has a server device that remotely controls the locking device, a sensor that is carried by the user and is connected to the server device via a network, that acquires biometric information of the user, and a positioning unit that acquires the position information of the device itself.
  • the server device acquires biometric information of the user acquired by the sensor and position information of the terminal device acquired by the positioning unit from the terminal device, and A person matching process is executed to match the biometric information of the registrant with the biometric information of the registrant, and a position matching process is executed to match the position information of the terminal device and the position information of the door. Based on the result of the position verification process, it is determined whether or not the door can be unlocked.
  • the person verification process it is possible to confirm that the user is a registrant who can be authorized to unlock the door. Furthermore, the position verification process allows confirmation that the user is staying near the door. Thereby, by using the terminal device that the user owns, it is possible to realize highly secure authentication with a simple configuration without requiring a dedicated authentication device at the point where the user receives authentication.
  • the server device acquires a face image as biometric information of the user taken by the camera as the sensor from the terminal device, and in the person matching process,
  • the configuration is such that the image is compared with the face image of the registrant.
  • the server device is configured to acquire from the terminal device the position information acquired by the terminal device using a satellite positioning system.
  • the server device further collates the unique object information acquired based on at least one of the terminal device and the user with the unique object information registered in association with the door.
  • the unique object verification process is executed to determine whether or not the door can be unlocked based on the results of the person verification process, the position verification process, and the unique object verification process.
  • the user can be confirmed whether or not the user is staying near the door. Therefore, if the location information provided from the terminal device to the server device is tampered with, the user's current location can be falsified. It is possible to prevent people from disguising themselves as if they are staying near the door.
  • the server device registers code information obtained by photographing a code image provided near the door in the terminal device in association with the door, as the unique object matching process.
  • the configuration is such that the information is checked against the code information provided.
  • the server device uses identification information of a telephone installed near the door and operated by the user, and a telephone registered in association with the door.
  • the configuration is such that it is checked against identification information.
  • the server device associates identification information of an access point of a wireless network provided near the door and used by the terminal device with the door.
  • the configuration is such that the identification information of the registered access point is verified.
  • the access point provided near the door by the terminal device it is possible to appropriately confirm that the user is staying near the door.
  • the eighth invention also provides a sensor that is carried by a user and is connected via a network to a server device that remotely controls a locking device provided on a door, and that acquires biometric information of the user, and a sensor that acquires biometric information of the user; an authentication guidance screen that provides guidance regarding the acquisition of the user's biometric information;
  • the apparatus is configured to display a result confirmation screen regarding the determination result of whether or not the door can be unlocked based on the biometric information of the person and the position information of the own device.
  • the user can recognize the situation in which biometric information is to be acquired through the authentication guidance screen. Further, the user can easily check the result of the determination as to whether or not the door can be unlocked using the result confirmation screen.
  • a ninth invention is a device control system that controls a target device according to the result of a person verification process based on biometric information of a user, which includes a server device that remotely controls the target device, and a device that the user possesses. , a terminal device that is connected to the server device via a network and has a sensor that acquires biometric information of a user, and a positioning unit that acquires position information of the own device, and the server device Person verification that acquires the acquired user's biometric information and the position information of the terminal device acquired by the positioning unit from the terminal device, and compares the user's biometric information with the registrant's biometric information.
  • a position matching process is executed to match the location information of the terminal device with the location information of the target device, and the target device is controlled based on the results of the person matching process and the position matching process.
  • the configuration is such that it determines whether or not it is possible.
  • the target devices include doors equipped with electronic locks, entrance/exit gates equipped with opening/closing mechanisms, control panels, vending machines, and cash handling terminals (ATMs, CDs, etc.).
  • the server device transmits to the terminal device a device operation screen on which a user performs an operation for controlling the target device, and responds to the user's operation on the device operation screen.
  • the configuration is configured to control the target device.
  • the user can appropriately perform operations for controlling the target device using the terminal device.
  • an eleventh invention is a door unlocking method in which a processor executes a process of controlling unlocking of the door according to the result of a person verification process based on biometric information of the user, the method being carried by the user, From a terminal device having a sensor that acquires biometric information of a user and a positioning unit that acquires position information of the own device, biometric information of the user acquired by the sensor and the terminal device acquired by the positioning unit. and executes a person verification process that compares the user's biometric information with the registrant's biometric information, and also compares the terminal device's location information with the door's location information.
  • FIG. 1 is an overall configuration diagram of a door unlocking system according to a first embodiment.
  • This system controls the unlocking of doors installed at the entrances and exits of facilities.
  • This system includes an authentication server 1 (server device), a device management server 2, a mobile terminal 3 (terminal device), a registration terminal 4, and an electronic lock 5 (locking device).
  • the mobile terminal 3 is connected to the authentication server 1 via a network such as a wireless network and the Internet.
  • the registration terminal 4 is connected to the authentication server 1 and the device management server 2 via a network such as a wireless network and the Internet.
  • Authentication server 1 and device management server 2 are connected via a network.
  • the authentication server 1 acquires biometric information of the user from the mobile terminal 3 and performs biometric authentication of the user based on the biometric information.
  • the electronic lock 5 is instructed to perform an unlocking operation.
  • the device management server 2 manages the location information of the installation point for each target device (door) and information regarding the control authority for the target device (door unlocking authority) for each registrant.
  • the mobile terminal 3 (checker) is owned by the user.
  • the mobile terminal 3 is a smartphone, a tablet terminal, or the like.
  • An authentication application (checker application) is installed on the mobile terminal 3.
  • the authentication application performs processing related to biometric authentication of the user.
  • the registration terminal 4 (register) is operated by the administrator. Note that the user may operate this to input his/her own information.
  • the registration terminal 4 is a tablet terminal, a PC, or the like.
  • a registration application (register application) is installed on the registration terminal 4. Information managed by the authentication server 1 and device management server 2 is registered by the registration application.
  • the electronic lock 5 locks and unlocks the door.
  • Electronic lock 5 is connected to authentication server 1 via a network.
  • the electronic lock 5 is remotely controlled by the authentication server 1 and performs an unlocking operation in response to an unlocking instruction from the authentication server 1.
  • the authentication server 1 and the device management server 2 can be configured to be operated on-premises, that is, installed and operated within the premises of a facility where the target device (door) is installed, but they may also be operated in the cloud. .
  • biometric authentication facial authentication that mainly uses a user's face image
  • biometric authentication is not limited to facial authentication.
  • biometric authentication using iris, fingerprint, palm, gesture (finger movement), gait (walking style), etc. may be used.
  • FIG. 2 is an explanatory diagram showing an overview of the door unlocking system.
  • the user stays near the authentication point, that is, the door that is the target device, and uses the mobile terminal 3 to perform operations related to biometric authentication.
  • An electronic lock 5 is provided on the door, and the electronic lock 5 is remotely controlled by the authentication server 1.
  • the authentication server 1 performs biometric authentication of the user, and if the biometric authentication is successful, the door is unlocked.
  • the device management server 2 manages a target device database and a control authority database.
  • the target equipment database location information of the installation point for each target equipment (door) is registered.
  • control authority door unlocking authority
  • the device management server 2 provides the authentication server 1 with registration information of the target device database and the control authority database.
  • the mobile terminal 3 acquires the user's biometric information (for example, a facial image). Furthermore, the mobile terminal 3 acquires its own location information indicating the current location of the user. The mobile terminal 3 transmits authentication information to the authentication server 1 to request authentication from the authentication server 1 .
  • the authentication information includes the user's biometric information, the location information of the device itself, and time information (time stamp) regarding the acquisition time of the biometric information and location information.
  • the authentication server 1 manages a biometric information database. Biometric information for each registrant is registered in the biometric information database. The authentication server 1 acquires the registration information of the target device database and the control authority database from the device management server 2.
  • the authentication server 1 identifies the user to be authenticated by comparing the user's biometric information with the biometric information of each registrant registered in the biometric information database (person matching process). In addition, the authentication server 1 compares the location information of the mobile terminal 3 with the location information of each target device (door) registered in the target device database, and identifies the target device (door) corresponding to the user's current location. and confirm that the user is staying near the target device (door) (location verification process). In addition, the authentication server 1 uses registered information in the control authority database to identify the target user based on the user identified in the person verification process and the target device (door) identified in the location verification process. Determine whether or not you have the authority to control the device (authority to unlock the door) (authority determination process).
  • the user is identified through the person verification process, the target device (door) corresponding to the user's current location is identified through the location verification process, and the user has control authority for the target device (door). control of the target device (unlocking the door) is permitted.
  • a contact signal is sent from the authentication server 1 as an unlock command to a contact converter (not shown) installed near the electronic lock 5 of the door, and the unlock signal output from the contact converter is received.
  • the electronic lock 5 performs a remote unlocking operation.
  • the position verification process allows confirmation that the user is staying near the door. If the user is a person who has been given the authority to unlock the door in advance, the user is permitted to unlock the door.
  • highly secure authentication can be achieved with a simple configuration, and, for example, it is possible to prevent fraud in which the door is unlocked even though the user is not staying near the door.
  • FIG. 3 is a block diagram showing a schematic configuration of the authentication server 1, device management server 2, mobile terminal 3, and registration terminal 4.
  • the mobile terminal 3 includes a sensor 31 , a positioning section 32 , a display input section 33 , a communication section 34 , a storage section 35 , and a processor 36 .
  • the sensor 31 (biometric information acquisition unit) acquires the user's biological information.
  • the sensor 31 is, for example, a camera, and extracts and obtains a facial image as biometric information of the user by photographing the upper body of the user.
  • the positioning unit 32 uses a satellite positioning system (outdoor positioning system) such as GPS, that is, a system that performs positioning based on positioning signals transmitted from positioning satellites, to determine the location of the mobile terminal 3. Get location information about your current location.
  • the positioning unit 32 also acquires position information regarding the current position of the mobile terminal 3 using an indoor positioning system, that is, a system that performs positioning based on positioning signals (beacon signals) transmitted from a beacon transmitter. do.
  • the location information of the mobile terminal 3 may also include information such as the floor and number of floors.
  • the display input section 33 is composed of a touch panel display or the like.
  • the display input unit 33 displays a screen and receives operation input from the user.
  • the communication unit 34 communicates with the authentication server 1.
  • the storage unit 35 stores programs and the like executed by the processor 36.
  • the processor 36 performs various processes by executing programs (authentication application, device operation application) stored in the storage unit 35.
  • the processor 36 performs authentication information generation processing, display input control processing, and the like.
  • the processor 36 In the authentication information generation process, the processor 36 generates authentication information that requests authentication from the authentication server 1.
  • the authentication information includes biometric information (face image) acquired by the sensor 31 and position information acquired by the positioning section 32. The authentication information is sent to the authentication server 1.
  • the processor 36 displays an authentication guidance screen (see FIGS. 8(A) and 8(B)) on the display input unit 33. Further, in the display input control process, the processor 36 displays a result confirmation screen (see FIGS. 8(C) to 8(F)) on the display input unit 33.
  • the screen displayed on the display input unit 33 of the mobile terminal 3 may be displayed by being generated by the authentication server 1 and transmitted to the mobile terminal 3;
  • the information may be generated and displayed by the own device based on the information obtained.
  • the authentication server 1 includes a communication section 11, a storage section 12, and a processor 13.
  • the communication unit 11 communicates with the mobile terminal 3, the device management server 2, the registration terminal 4, and the electronic lock 5.
  • the storage unit 12 stores programs and the like executed by the processor 13.
  • the storage unit 12 also stores registration information of the biometric information database (see FIG. 6(B)).
  • the processor 13 performs various processes by executing programs stored in the storage unit 12. In this embodiment, the processor 13 performs registration processing, registration information acquisition processing, person verification processing, position verification processing, authority determination processing, target device control processing, result notification processing, and the like.
  • the processor 13 adds a biometric ID (person ID) to the registrant's biometric information provided from the registration terminal 4, and stores the registrant's biometric information and biometric ID in the biometric information database (FIG. 6(B)). (see).
  • a biometric ID person ID
  • the processor 13 acquires the registration information of the target device database and the control authority database (see FIG. 7) from the device management server 2.
  • the processor 13 compares the biometric information of the user included in the authentication information obtained from the mobile terminal 3 with the biometric information of each registrant registered in the biometric information database, and the user becomes the authentication target. Identify users.
  • the biometric information is, for example, a facial image, and the user's facial image (facial feature amount) acquired from the mobile terminal 3 is compared with the facial image (facial feature amount) of each registrant registered in the biometric information database. (face matching).
  • the processor 13 matches the location information of the mobile terminal 3 included in the authentication information acquired from the mobile terminal 3 with the location information for each target device (door) registered in the target device database. Identify the target device corresponding to the user's current location. Moreover, the processor 13 can confirm that the user stays near the door by successfully performing the position matching process.
  • the processor 13 uses registered information in the control authority database to identify the user based on the user's biometric ID identified in the person verification process and the target device identified in the location verification process. It is determined whether the user has control authority for the target device (authority to unlock the door).
  • the processor 13 determines whether the target device can be controlled (door unlocked) based on the results of the person verification process, the position verification process, and the authority determination process.
  • the user is identified through the person verification process
  • the target device (door) corresponding to the user's current location is identified through the location verification process
  • the user has control authority for the target device (door).
  • control of the target device (unlocking the door) is permitted.
  • a contact signal is transmitted to the electronic lock 5 as an unlocking command.
  • the processor 13 notifies the mobile terminal 3 of the results of the person verification process, position verification process, and authority determination process. Specifically, display information on the result confirmation screen (see FIGS. 8C to 8F) is transmitted to the mobile terminal 3.
  • the device management server 2 includes a communication section 21, a storage section 22, and a processor 23.
  • the communication unit 21 communicates with the authentication server 1 and the registration terminal 4.
  • the storage unit 22 stores programs and the like that are executed by the processor 23.
  • the storage unit 22 also stores registration information of the target device database and the control authority database (see FIG. 6(B)).
  • the processor 23 performs various processes by executing programs stored in the storage unit 22. In this embodiment, the processor 23 performs registration processing and the like.
  • the processor 23 collects information about the target device, specifically, location information of the installation point for each target device (door), in response to the administrator's input operation regarding the target device performed on the registration terminal 4. , device name (door name), and device ID (door ID) are registered in the target device database (see FIG. 7(A)).
  • the processor 23 collects information regarding the control authority, specifically, biometric ID, name, door address, etc. Each piece of information regarding the presence or absence of authority regarding unlocking (unlocking authority) is registered in the control authority database (see FIG. 7(B)). Note that the biometric ID is acquired from the authentication server 1.
  • the registration terminal 4 includes a sensor 41, a display input section 42, a communication section 43, a storage section 44, and a processor 45.
  • the sensor 41 (biometric information acquisition unit) acquires the registrant's biological information.
  • the sensor 41 is, for example, a camera, and extracts and obtains a facial image as biometric information of the registrant by photographing the upper body of the registrant.
  • the display input section 42 is composed of a touch panel display or the like.
  • the display input unit 42 displays a screen and receives operation input from the user.
  • the communication unit 43 communicates with the authentication server 1 and the device management server 2.
  • the storage unit 44 stores programs and the like executed by the processor 45.
  • the processor 45 performs various processes by executing programs (registered applications) stored in the storage unit 44. In this embodiment, the processor 45 performs display input control processing and the like.
  • the processor 45 displays a biometric information registration screen (see FIG. 4) on the display input section 42.
  • the processor 45 displays a target device registration screen (see FIGS. 5(A) and 5(B)) and a control authority registration screen (see FIGS. 5(C) and (D)) on the display input section. 42, and obtains the administrator's input operation information regarding the target device and control authority.
  • the administrator's input operation information is transmitted to the device management server 2.
  • 4 and 5 are explanatory diagrams showing screens displayed on the registration terminal 4.
  • the registration application is started, and the initial screen shown in FIG. 4(A) is first displayed as the biometric information registration screen, and when the start button 62 is operated, the face photographing shown in FIG. 4(B) is performed. The screen will be displayed. On the face photographing screen, a live image of the registrant photographed by the sensor 41 (camera) of the registration terminal 4 according to the guidance "Please photograph the front face" is displayed on the display unit 61.
  • the user operates the photographing button 63 and, after confirming that a still image including the registrant's face image is properly photographed, operates the registration button 64.
  • the registration button 64 As a result, the registrant's facial image is extracted and transmitted to the authentication server 1, and the authentication server 1 executes the registration process of biometric information (facial feature amount).
  • a list screen shown in FIG. 5(A) is first displayed as a target device registration screen.
  • a list 71 is provided on the list screen.
  • the list 71 displays information regarding the target device, specifically, for each target device (door), information such as location information of the installation point, device name (door name), and device ID (door ID) is displayed.
  • Ru When the administrator selects a row in the list 71 and presses the start button 72 on the list screen, the screen changes to the edit screen shown in FIG. 5(B).
  • An edit field 73 is provided on the edit screen. In the editing field 73, the administrator can edit (input, change, delete) information regarding the location information of the installation point, the device name (door name), and the device ID (door ID).
  • the registration button 74 the editing screen returns to the list screen shown in FIG. 5(A), and the information regarding the edited target device is registered in the target device database (see FIG. 7(A)).
  • a list screen shown in FIG. 5(C) is first displayed as a control authority registration screen.
  • a list 75 is provided on the list screen.
  • the list 75 displays information regarding control authority, specifically, for each registrant, information on biometric ID, name, and presence or absence of authority regarding door unlocking (unlocking authority).
  • the administrator selects a row in the list 75 and presses the start button 76 on the list screen, the screen changes to the edit screen shown in FIG. 5(D).
  • An edit field 77 is provided on the edit screen. In the editing field 77, the administrator can edit (input, change, delete) information such as the biometric ID, name, and the presence or absence of authority to unlock the door (unlock authority).
  • the registration button 78 on the editing screen the screen returns to the list screen shown in FIG. 5(C), and the information regarding the edited control authority is registered in the control authority database (see FIG. 7(B)). Ru.
  • FIG. 6 is an explanatory diagram showing authentication information and registration information of the biometric information database.
  • the mobile terminal 3 transmits authentication information to the authentication server 1 to request authentication from the authentication server 1.
  • the authentication information includes the user's biometric information and the location information of the mobile terminal 3 indicating the user's current location.
  • time information regarding the time when each piece of information was acquired may be added to the user's biometric information and the location information of the mobile terminal 3. Thereby, it is determined that the user's biometric information and the location information of the mobile terminal 3 were acquired at the same timing, and unauthorized unlocking of the door can be prevented.
  • the acquisition of authentication information may be limited to only mobile terminals 3 to which specific identification information (such as a MAC address) is assigned.
  • the authentication server 1 manages a biometric information database. As shown in FIG. 6(B), biometric information and biometric ID (registrant identification information) for each registrant are registered in the biometric information database. Note that the authentication server 1 extracts facial features from the facial image as the registrant's biometric information obtained from the mobile terminal 3, and also adds a biometric ID (person ID) to the registrant's biometric information to complete the registration process. The person's face image and biometric ID are registered in the biometric information database.
  • the registered information in the biometric information database is used in the person verification process performed by the authentication server 1.
  • the user's biometric information acquired from the mobile terminal 3 is verified against the biometric information of each registrant registered in the biometric information database to identify the user to be authenticated.
  • biometric information is a facial image
  • the facial feature extracted from the facial image becomes the matching target
  • the facial feature of the facial image is registered in the biometric information database.
  • biometric information is not limited to facial images, but may also be iris, fingerprints, palms, gestures (finger movements), and gaits (how to walk).
  • biometric information is iris, fingerprints, and palms
  • the biometric features are registered, and in the case of gestures (finger movements) and gaits (how to walk), pattern images are registered.
  • FIG. 7 is an explanatory diagram showing registration information of the target device database and the control authority database.
  • the device management server 2 manages a target device database. As shown in FIG. 7A, the location information of the installation point, the device name (door name), and the device ID (door ID) are registered for each target device (door) in the target device database.
  • the registration information in the target device database is used in the location verification process performed by the authentication server 1.
  • a target device (door) corresponding to the user's current location is specified based on the location information of the mobile terminal 3 that represents the user's current location obtained from the mobile terminal 3.
  • the device management server 2 manages a control authority database.
  • the control authority database records, for each registrant, information such as a biometric ID, a name, and whether or not the person has authority to unlock the door (unlock authority). Unlocking authority as control authority is registered for each door. In this example, the registration status of the unlocking authority regarding the target device whose device ID is "000C" is shown.
  • the registration information in the control authority database is used in the authority determination process performed by the authentication server 1.
  • the user is granted control authority for the target device (door unlocking authority) based on the user's biometric ID identified in the person verification process and the target device (door) identified in the location verification process. ) is determined.
  • FIG. 8 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started, and the initial screen shown in FIG. 8(A) is first displayed as an authentication guidance screen, and then the face photographing screen shown in FIG. 8(B) is displayed.
  • the mobile terminal 3 detects the user's face from the live image taken by the sensor 31 (camera), it generates a facial image as biometric information and sends authentication information including the facial image to the authentication server 1.
  • the authentication server 1 Upon receiving the authentication information from the mobile terminal 3, the authentication server 1 performs a person verification process, a position verification process, and an authority determination process.
  • the result confirmation screen shown in FIG. 8(C) is a case where the person verification (face verification) is successful and control of the target device is permitted.
  • the first display section 81 displays text indicating that unlocking of door #1 is to be controlled.
  • the second display unit 82 displays text indicating that the person verification (face verification) was successful as the person verification result, and text indicating that the door has been unlocked as the device control result.
  • the result confirmation screen shown in FIG. 8(D) is a case where person verification (face verification) fails and control of the target device is not permitted.
  • the second display section 82 displays, as the person verification result, text indicating that the person verification (face authentication) has failed and text prompting the user to redo the person verification (face verification). Further, in this case, the screen returns to the face photographing screen shown in FIG. 8(B), and the user can retake the photograph of his or her own face.
  • the result confirmation screen shown in FIG. 8(E) is a case where the person verification (face verification) was successful, but control of the target device was not permitted because the user was not given control authority.
  • the second display unit 82 displays, as the person verification result, text indicating that the person verification (face verification) was successful and text indicating that the target device cannot be controlled (door unlocked).
  • the result confirmation screen shown in FIG. 8(F) is a case where the person verification (face verification) was successful, but the operation for controlling the target device was not permitted because the location information was incorrect.
  • the location information is invalid if the location information of the mobile terminal 3 acquired from the mobile terminal 3 and the location information of the target device (door) registered in the target device database do not match, that is, the location information is invalid.
  • the second display section 82 displays, as a result of person matching, text indicating that the person matching (face matching) was successful and text prompting the user to move to an appropriate location, that is, near the target device (door). Is displayed.
  • FIG. 9 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started on the mobile terminal 3 and the user's face is photographed, a facial image as the user's biometric information and location information of the mobile terminal 3 representing the user's current location are generated.
  • Authentication information including the above is sent to the authentication server 1.
  • the location information of the mobile terminal 3 is transmitted to the authentication server 1 at the stage when the authentication application is started.
  • the target device (door) is specified based on the location information of the mobile terminal 3. Thereby, the target device (door) can be presented to the user before biometric authentication (face authentication) is performed.
  • the initial screen shown in FIG. 9(A) is first displayed as an authentication guidance screen, and then the face photographing screen shown in FIG. 9(B) is displayed.
  • the first display section 81 displays text indicating that door #1 is the object to be controlled.
  • the user's face is photographed multiple times from different directions, and person verification is performed using the multiple acquired facial images. Specifically, the user's front face, left-facing face, and right-facing face are photographed, and person matching is performed using the acquired front face image, left-facing face image, and right-facing face image. .
  • person verification is performed using only one of the plurality of facial images. Further, person verification may be performed using a combination of two of the plurality of face images. Further, person verification may be performed using all of the plurality of face images. Furthermore, when person verification is performed using a portion of a plurality of face images, the face images used for person verification may be randomly extracted.
  • the condition is that the plurality of facial images used for person verification are taken within a predetermined period of time. Furthermore, in this embodiment, the position information at the time of photographing is added to each of the plurality of face images, and the position information at the time of photographing of each of the plurality of face images coincides with each other and also with the position information of the mobile terminal 3. is the condition. As a result, the time for photographing the user's face is limited to a short time, and it is difficult to photograph multiple facial images of other people with the sensor 31 (camera) of the mobile terminal 3 within the time limit. It will no longer be possible to impersonate someone.
  • a biometric information registration screen is displayed by the registration application on the registration terminal 4, and a face photograph similar to the example shown in FIG. 4(B) is displayed. On the screen, an operation is performed to photograph the registrant's face.
  • the face photographing screen similar to the example shown in FIG. The registrant's face is repeatedly photographed by changing the photographing direction. As a result, a plurality of face images taken in different photographing directions are acquired.
  • FIG. 10 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started, and the initial screen shown in FIG. 10(A) is first displayed as the authentication guidance screen, and then the face photographing shown in FIGS. 10(B), (C), and (D) is displayed.
  • the screens are displayed in sequence. These face photographing screens photograph the user's face from multiple directions. Specifically, a front face is photographed using the face photographing screen shown in FIG. 10(B), and a front face image is obtained. Furthermore, a face facing left is photographed using the face photographing screen shown in FIG. 10(C), and a face image facing left is obtained. Furthermore, a right-facing face is photographed using the face photographing screen shown in FIG. 10(D), and a right-facing face image is obtained.
  • a front face, a face facing left, and a face facing right are photographed, but the direction in which the face is photographed is not limited to these three directions.
  • the front face only one of a face facing left and a face facing right may be photographed.
  • FIG. 11 is an explanatory diagram showing an overview of the door unlocking system.
  • the unique object at the point where the user receives authentication is photographed by the sensor 31 (camera) of the mobile terminal 3.
  • a two-dimensional code image 6 provided at the authentication point is photographed as a unique object of the authentication point.
  • a panel with a two-dimensional code image 6 is pasted on the wall near the door.
  • the mobile terminal 3 transmits to the authentication server 1 location falsification prevention information including information (unique object information) obtained by photographing a unique object with a sensor 31 (camera).
  • the unique object information is code information obtained by reading the photographed two-dimensional code image 6. Further, the unique object information may be a photographed image of the unique object (two-dimensional code image 6).
  • the location falsification prevention information includes location information of the acquisition point (photography point), that is, the location information of the mobile terminal 3 when the unique object was photographed, and time information (time stamp) regarding the acquisition time (photography time). be done.
  • the mobile terminal 3 transmits authentication information to the authentication server 1 to request authentication.
  • the authentication information includes the user's biometric information (facial image) and the location information of the mobile terminal 3.
  • the authentication server 1 compares the unique object information (code information) acquired from the mobile terminal 3 with the unique object information (code information) registered in the target device database (unique object verification process). If verification of unique object information fails, it is determined that the location has been falsified, and control of the target device (unlocking the door) is not permitted.
  • the authentication server 1 compares the location information included in the location falsification prevention information acquired from the mobile terminal 3 with the location information of the unique object registered in the target device database. Furthermore, the authentication server 1 compares the location information included in the authentication information with the location information included in the location falsification prevention information. Even if verification of this location information fails, it is determined that the location is spoofed, and control of the target device (unlocking the door) is not permitted.
  • the authentication server 1 requires that the unique object information included in the location falsification prevention information and the biometric information included in the authentication information be acquired within a predetermined time.
  • the condition is that the information on the two-dimensional code image 6 included in the position falsification prevention information and the face image included in the authentication information are photographed within a predetermined period of time.
  • the unique object (two-dimensional code image 6) that can only be photographed at the authentication point is photographed by the sensor 31 (camera), and the authentication server 1
  • the object information (code information) is compared with unique object information (code information) registered in the target device database. Through this verification, it can be confirmed that the user is currently staying at the authentication point, so it is possible to prevent falsification of the user's current location.
  • FIG. 12 is an explanatory diagram showing registration information of the target device database.
  • the location information of the installation point, the device name (door name), and the device ID (door ID) are registered for each target device (door) in the target device database.
  • code information corresponding to the two-dimensional code image 6 provided near the door, which is the target device is further registered as unique property information.
  • FIG. 13 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started, and the initial screen shown in FIG. 13(A) is first displayed as an authentication guidance screen, and then the unique object photographing screen shown in FIG. 13(B) is displayed.
  • the unique object photographing screen text is displayed prompting the user to take a photograph of the unique object (the two-dimensional code image 6 near the door).
  • the user photographs the unique object (the two-dimensional code image 6 near the door) with the sensor 31 (camera) of the mobile terminal 3.
  • a face photographing screen shown in FIG. 13(C) is displayed.
  • one of the result confirmation screens shown in FIG. 13(D) is displayed depending on the person verification result and the authority determination result.
  • This result confirmation screen is similar to that of the first embodiment (see FIGS. 8(C) to 8(F)).
  • the screen transitions to a result confirmation screen shown in FIG. 13(E).
  • text is displayed prompting the user to take another photograph of the unique object (the two-dimensional code image 6 near the door).
  • FIG. 14 is an explanatory diagram showing an overview of the door unlocking system.
  • a landmark 7 (index object) existing around the authentication point is photographed by the sensor 31 (camera) of the mobile terminal 3 as a unique object of the authentication point.
  • the landmark 7 is a building or a structure such as a door or wall inside the building.
  • the unique object information registered in the target device database is a photographed image of a landmark or a feature quantity extracted from a photographed image of a landmark.
  • the authentication server 1 uses unique object information (features of landmarks 7) acquired from the mobile terminal 3 and unique object information (landmark features) corresponding to the authentication point (user's current location) registered in the target device database. (characteristic information) (unique object matching process). If verification of unique object information fails, it is determined that the location has been falsified, and control of the target device (unlocking the door) is not permitted.
  • FIG. 15 is an explanatory diagram showing an overview of the door unlocking system.
  • the unique object of the authentication point is a stationary device that can only be operated by the user at the authentication point, specifically, the fixed telephone 8 installed at the authentication point.
  • the authentication server 1 detects that the user operates the fixed telephone 8 installed at the authentication point, and confirms that the user is staying at the authentication point.
  • a call is made from a fixed-line telephone 8 installed at the authentication point, and the user picks up the handset of the fixed-line telephone 8, thereby confirming that the user is staying at the authentication point. is confirmed.
  • the condition may be that off-hook is detected within a predetermined time after the call.
  • the mobile terminal 3 provides guidance prompting the user to pick up the handset of the landline telephone 8 installed at the authentication point. It is confirmed that the person is staying at the authentication point.
  • the condition may be that off-hook is detected within a predetermined time after guidance.
  • condition may be that the user operates a button instructed by voice guidance on the fixed telephone 8.
  • condition may be that the user inputs the authentication code instructed by the voice guidance of the fixed telephone 8 on the mobile terminal 3.
  • the unique property information registered in the target device database is the identification information of the fixed telephone 8.
  • the authentication server 1 stores the identification information (unique information) of the fixed telephone 8 operated by the user and the identification information (unique information) of the fixed telephone 8 corresponding to the authentication point (current location of the user) registered in the target device database. property information) (unique property matching process). If verification of unique object information fails, it is determined that the location has been falsified, and control of the target device (unlocking the door) is not permitted.
  • FIG. 16 is an explanatory diagram showing an overview of the door unlocking system.
  • the unique object of the authentication point is the access point 9 installed near the authentication point. Since communication between the mobile terminal 3 and the authentication server 1 is performed via the access point 9 installed near the mobile terminal 3, the access point 9 installed near the mobile terminal 3 performs authentication. The user's mobile terminal 3 becomes a unique property that can only be used at a certain point.
  • the access point 9 is a device that serves as a base station of a wireless network, specifically, a wireless LAN such as Wi-Fi (registered trademark).
  • the unique information registered in the target device database is the identification information of the access point 9.
  • the authentication server 1 uses the identification information (unique information) of the access point 9 acquired through communication with the mobile terminal 3 and the access point corresponding to the authentication point (current location of the user) registered in the target device database. 9 (unique item information) (unique item matching process). If verification of unique object information fails, it is determined that the location has been falsified, and control of the target device (unlocking the door) is not permitted.
  • the access point 9 adds the identification information of the own device to the authentication information, so that the authentication server 1 can: The identification information of the access point 9 can be acquired.
  • FIG. 17 is an explanatory diagram showing an overview of the device control system according to the fourth embodiment.
  • the target device is the control panel 101.
  • the control panel 101 controls the voltage of a power source provided in the equipment to be controlled, the opening degree of a valve, and the like.
  • a device operation application is also installed on the mobile terminal 3.
  • the authentication application displays an authentication guidance screen for acquiring biometric information (face image) of the user used for biometric authentication (face authentication).
  • face authentication biometric authentication
  • the device operation application is started and the screen changes to the device operation screen. A user can operate the control panel 101 on the device operation screen.
  • the door of the control panel 101 is unlocked. Therefore, the user (worker) can open the door of the control panel 101 and visually check the instruments and the like inside the control panel 101.
  • the user operates the control panel 101 using the mobile terminal 3 in front of the control panel 101 without directly touching the operating levers inside the control panel 101. can do.
  • the door of the control panel 101 is unlocked in order to visually check the instruments on the control panel 101, but the door may be unlocked in order to enter the control room.
  • FIG. 18 is an explanatory diagram showing registration information of the target device database and the control authority database.
  • the device management server 2 manages a target device database. As shown in FIG. 18(A), the location information of the installation point, the device name (control panel name), and the device ID (control panel ID) are registered for each target device (control panel 101) in the target device database. be done.
  • the device management server 2 manages a control authority database.
  • the control authority database includes, for each registrant, biometric ID, name, presence or absence of authority to unlock the door of the target device (control panel 101), and the target Information regarding the presence or absence of authority (operation authority) regarding the operation of the device (control panel 101) is registered.
  • the registration status of unlocking authority and operation authority regarding the target device whose device ID is "000C" is shown.
  • FIG. 19 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started, and the initial screen shown in FIG. 19(A) is first displayed as an authentication guidance screen, and then the face photographing screen shown in FIG. 19(B) is displayed.
  • the screen transitions to a result confirmation screen shown in FIG. 19(C). Note that other cases, such as when person verification (face authentication) fails and control of the target device is not permitted, are the same as in the first embodiment (see FIGS. 8(D) to 8(F)).
  • the device operation application is started, and the screen changes to the device operation screen shown in FIGS. 19(D) to (F).
  • the device operation screen is provided with a button 83 for adjusting setting values and a "setting" button 84.
  • the user can set the power supply voltage by operating the button 83, and by operating the "setting" button 84, the The power supply is controlled to the specified voltage.
  • the user can set the opening degree of the valve by operating the button 83, and the "setting" button 84 When operated, the valve is controlled to the set opening degree.
  • FIG. 20 is an explanatory diagram showing an overview of the device control system according to the fifth embodiment.
  • the target device is the vending machine 102
  • the control authority granted to the user is permission to perform operations related to maintenance of the vending machine 102. Specifically, an operation for checking maintenance information, such as the remaining number of products stored in the vending machine 102, is permitted.
  • a user can perform maintenance-related operations on the vending machine 102 using the mobile terminal 3 in front of the vending machine 102 without touching the vending machine 102 directly.
  • the user can use the mobile terminal 3 to perform operations related to maintenance of the vending machine 102, but the user can perform operations related to maintenance of other equipment, such as checking the remaining amount of the tank at a gas station. The user may perform an operation to do so.
  • FIG. 21 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started, and the initial screen shown in FIG. 21(A) is first displayed as an authentication guidance screen, and then the face photographing screen shown in FIG. 21(B) is displayed.
  • the screen transitions to a result confirmation screen shown in FIG. 21(C). Note that other cases, such as when person verification (face authentication) fails and control of the target device is not permitted, are the same as in the first embodiment (see FIGS. 8(D) to 8(F)).
  • the vending machine 102 On the result confirmation screen shown in FIG. 21(C), text indicating that the vending machine 102 is to be controlled is displayed on the first display section 81.
  • the second display unit 82 displays characters indicating that the person verification (face verification) was successful as the person verification result, and characters indicating that maintenance is possible as the device control details.
  • the device operation application is started, and the device confirmation screen shown in FIGS. 21(D) to (F) is displayed.
  • maintenance information specifically, the remaining number of each product stored in the vending machine 102 is displayed on the device confirmation screen.
  • the user worker performs work to replenish the product.
  • the target device is the vending machine 102, but here, the control authority given to the user is to select the products in the vending machine 102. Purchase operations are permitted. A user (customer) can perform an operation in front of the vending machine 102 to select and purchase a product from the vending machine 102 using the mobile terminal 3 without touching the vending machine 102 directly. In addition, payment for the product (settlement) is performed using the biometric authentication results.
  • FIG. 22 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started, and the initial screen shown in FIG. 22(A) is first displayed as an authentication guidance screen, and then the face photographing screen shown in FIG. 22(B) is displayed.
  • the screen transitions to a result confirmation screen shown in FIG. 22(C). Note that other cases, such as when person verification (face authentication) fails and control of the target device is not permitted, are the same as in the first embodiment (see FIGS. 8(D) to 8(F)).
  • the vending machine 102 On the result confirmation screen shown in FIG. 22(C), text indicating that the vending machine 102 is to be controlled is displayed on the first display section 81.
  • the second display section 82 displays text indicating that the person verification (face verification) was successful as the person verification result, and text indicating that the product can be purchased as the device control content.
  • the device operation application is started, and the screen changes to the device operation screen shown in FIGS. 22(D) to (F).
  • a separate device operation screen is displayed for each product. Characters representing the name of the product are displayed on the device operation screen.
  • FIG. 23 is an explanatory diagram showing an overview of the device control system.
  • the target device is a cash handling terminal 103 such as an ATM (Automated Teller Machine) or a CD (Automated Teller Machine).
  • a cash handling terminal 103 such as an ATM (Automated Teller Machine) or a CD (Automated Teller Machine).
  • this example deals with a case where a withdrawal (refund) is performed at the cash handling terminal 103
  • a case where a deposit (deposit, transfer, transfer, etc.) is performed at the cash handling terminal 103 may also be possible.
  • the user can deposit money by performing a deposit operation on the device operation screen displayed on the mobile terminal 3 and inserting cash into the cash slot.
  • control authority is given to the user for each cash handling terminal 103 as the target device, so that the user can only use a specific cash handling terminal 103. 103 can be restricted.
  • FIG. 24 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • the authentication application is started, and the initial screen shown in FIG. 24(A) is first displayed as an authentication guidance screen, and then the face photographing screen shown in FIG. 24(B) is displayed.
  • the screen transitions to a result confirmation screen shown in FIG. 24(C). Note that other cases, such as when person verification (face authentication) fails and control of the target device is not permitted, are the same as in the first embodiment (see FIGS. 8(D) to 8(F)).
  • the device operation application is started, and the screen changes to the device operation screen shown in FIGS. 24(D) to (F).
  • a separate device operation screen is displayed for each refund amount. Characters representing the refund amount are displayed on the device operation screen.
  • FIG. 25 is an explanatory diagram showing an overview of the payment system according to the eighth embodiment.
  • the position information of the mobile terminal 3 is used to detect when a user gets on and off a transportation facility (train, taxi, bus, etc.), and the usage section (boarding station, getting off station) is specified. Additionally, biometric authentication (facial recognition) is performed when boarding the vehicle, and if the biometric authentication is successful, boarding is permitted. Additionally, fare payments (settlements) are made for users identified through biometric authentication.
  • a transportation facility train, taxi, bus, etc.
  • biometric authentication facial recognition
  • fare payments settlements
  • the location information of the mobile terminal 3 is periodically transmitted by the authentication application that is always running on the mobile terminal 3, it is possible to detect when the user gets on and off the vehicle, thereby preventing unauthorized boarding.
  • FIG. 26 is an explanatory diagram showing a screen displayed on the mobile terminal 3.
  • a user boards a train at A station and gets off at B station.
  • the user activates the authentication application on the mobile terminal 3 in front of the ticket gate at A station.
  • an initial screen shown in FIG. 26(A) is first displayed as an authentication guidance screen, and then a face photographing screen shown in FIG. 26(B) is displayed.
  • text is displayed on the first display section 81 to the effect that authentication will be performed for boarding at Station A.
  • the mobile terminal 3 if the person verification (face authentication) is successful, the boarding permission screen shown in FIG. 26(C) is displayed. On the boarding permission screen, characters indicating that boarding is permitted are displayed on the first display section 81. In addition, the second display section 82 displays, as the result of person verification, text indicating that the person verification (face authentication) was successful and text prompting the user to board the train at the boarding station (A station). At this time, the mobile terminal 3 detects that the user is staying at station A based on the location information of the mobile terminal 3.
  • the mobile terminal 3 After the user gets on the train at station A, which is the starting point, when the train the user boarded arrives at station B, which is the destination, the user gets off at station B. At this time, the mobile terminal 3 detects that the user is staying at station B based on its own location information. Furthermore, the mobile terminal 3 detects that the user has gotten off the train at B station, since the user has been staying at B station for a predetermined period of time. As a result, the mobile terminal 3 displays an alighting confirmation screen shown in FIG. 26(D). On the alighting confirmation screen, characters indicating that alighting is permitted are displayed on the first display section 81. Further, on the second display section 82, text indicating that the user has confirmed that the user has disembarked the vehicle, text indicating that the fare settlement (payment) has been completed, and text indicating the amount of the fare are displayed.
  • facial recognition is performed when getting on the train and the fare is paid when getting off the vehicle, but facial recognition may be performed and the fare is paid when getting off the vehicle.
  • the user presents the boarding permission screen (see FIG. 26(C)) displayed on the mobile terminal 3 to a crew member such as the driver or conductor when boarding the train, during the ride, or when getting off the train.
  • a crew member such as the driver or conductor
  • the driver cannot carefully check the contents of the boarding permission screen displayed on the mobile terminal 3. Therefore, the background color of the ride permission screen may be changed depending on the day of the week, time of day, or the like. This allows the driver to immediately check the contents of the boarding permission screen based on the background color of the boarding permission screen, and prevents the user from reusing a previously displayed boarding permission screen.
  • the background color of the ride permission screen is changed depending on the day of the week, for example, the background color is set to light blue on Monday, Wednesday, and Friday, the background color is set to orange on Tuesday and Thursday, and the background color is set to orange on Saturday.
  • the color is set to blue
  • the background color is set to yellow on Sundays.
  • the background color of the boarding permission screen is changed depending on the time of day, for example, the background color is set to light blue in the morning time, and the background color is set to yellow in the evening time. This allows the crew member to immediately detect unauthorized boarding using the previous boarding permission screen.
  • the background color may be set to be different from that of the boarding permission screen, for example, red.
  • the system may be a system that controls opening of the gate when authentication is successful and entry/exit of the facility is permitted.
  • the system may control a gate provided at a station ticket gate, or a gate provided at an entrance to an exhibition, a museum, an amusement park, or the like.
  • the system may be a system that controls a gate provided at an entrance/exit of a bicycle parking lot or a parking lot.
  • the gate may not be controlled.
  • the system may be such that when authentication is successful and entry and exit is permitted, guidance regarding entry and exit of the facility is provided, and usage fees are paid. For example, in the case of a bicycle parking lot or a parking lot, if the authentication is successful and entry/exit is permitted, parking permission may be provided, guidance to the parking lot, etc., and parking fee payment may be made. .
  • operations related to controlling the target equipment are performed using the mobile terminal 3 owned by the user, but a robot capable of self-propelled within the facility is equipped with the function of the mobile terminal 3 (checker). Good too.
  • a robot waits at the reception desk of the facility, performs the necessary actions for biometric authentication of the visitor (for example, taking a picture of the visitor's face), and once the biometric authentication is completed, guides the visitor to the conference room. Unlock the conference room door.
  • the control panel 101, the vending machine 102, and the cash handling terminal 103 as target devices are remotely controlled by the authentication server 1, but the alcohol detector in the user's hand is controlled by the authentication server 1. It may be remotely controlled by. This makes it possible to conduct alcohol checks using breathalyzers during remote roll calls of transportation companies and the like. In this case, use of the breathalyzer is permitted through biometric authentication using the mobile terminal 3, and when the breathalyzer detects alcohol, the detection result is notified to the administrator terminal via the authentication server 1 etc. Ru.
  • the door unlocking system, terminal device, device control system, and door unlocking method according to the present disclosure use a terminal device owned by the user, and do not require a dedicated authentication device at the point where the user receives authentication.
  • a door unlocking system and a door unlocking method that have the effect of realizing high security authentication with a simple configuration without using the system, and that control unlocking of the door according to the results of biometric authentication of the user;
  • the present invention is useful as a terminal device on which operations related to user biometric authentication are performed, and as a device control system that controls target devices according to the user's biometric authentication results.
  • Authentication server (server device) 2 Device management server 3 Mobile terminal (terminal device) 4 Registration terminal 5 Electronic lock (locking device) 11 Communication unit 12 Storage unit 13 Processor 31 Sensor 32 Positioning unit 33 Display input unit 34 Communication unit 35 Storage unit 36 Processor

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Collating Specific Patterns (AREA)
  • Selective Calling Equipment (AREA)
  • Lock And Its Accessories (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

Le problème décrit par la présente invention est de permettre de mettre en œuvre une authentification à haute sécurité ayant une configuration simple à l'aide d'un dispositif terminal détenu par un utilisateur, sans nécessiter un dispositif dédié à l'authentification à un endroit où l'utilisateur est authentifié. La solution selon la présente invention comprend : un serveur d'authentification (1) qui commande à distance un verrou électronique (5) disposé sur une porte ; et un terminal mobile (3) qui est porté par un utilisateur, est connecté au serveur d'authentification sur un réseau, et comprend un capteur qui acquiert des informations biologiques de l'utilisateur et une unité de positionnement qui acquiert des informations de position du dispositif. Le serveur d'authentification acquiert, à partir du terminal mobile, les informations biologiques de l'utilisateur acquises par le capteur et les informations de position du terminal mobile acquises par l'unité de positionnement, exécute un processus de mise en correspondance de personne consistant à mettre en correspondance les informations biologiques de l'utilisateur avec les informations biologiques d'une personne enregistrée, exécute un processus de mise en correspondance de position consistant à mettre en correspondance les informations de position du terminal mobile avec les informations de position de la porte, et détermine s'il faut permettre à la porte d'être déverrouillée sur la base des résultats du processus de mise en correspondance de personne et du processus de mise en correspondance de position.
PCT/JP2023/017580 2022-05-25 2023-05-10 Système de déverrouillage de porte, dispositif terminal, système de commande d'équipement et procédé de déverrouillage de porte WO2023228744A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2022-085405 2022-05-25
JP2022085405A JP2023173267A (ja) 2022-05-25 2022-05-25 ドア解錠システム、端末装置、機器制御システム、およびドア解錠方法

Publications (1)

Publication Number Publication Date
WO2023228744A1 true WO2023228744A1 (fr) 2023-11-30

Family

ID=88919124

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2023/017580 WO2023228744A1 (fr) 2022-05-25 2023-05-10 Système de déverrouillage de porte, dispositif terminal, système de commande d'équipement et procédé de déverrouillage de porte

Country Status (2)

Country Link
JP (1) JP2023173267A (fr)
WO (1) WO2023228744A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230138613A1 (en) * 2021-10-28 2023-05-04 Kenneth McClendon Automated Rental Systems and Methods

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006172286A (ja) * 2004-12-17 2006-06-29 Nippon Telegr & Teleph Corp <Ntt> 入退室管理システム
JP2015064722A (ja) * 2013-09-25 2015-04-09 大日本印刷株式会社 入退室管理装置、入退室管理方法及びプログラム
CN109671202A (zh) * 2019-01-23 2019-04-23 谢开元 一种使用手机端进行人脸识别的智能储物柜
JP2021135975A (ja) * 2020-02-28 2021-09-13 パナソニック ネットソリューションズ株式会社 複合システム、生体認証システム、複合システムの制御方法、及びプログラム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006172286A (ja) * 2004-12-17 2006-06-29 Nippon Telegr & Teleph Corp <Ntt> 入退室管理システム
JP2015064722A (ja) * 2013-09-25 2015-04-09 大日本印刷株式会社 入退室管理装置、入退室管理方法及びプログラム
CN109671202A (zh) * 2019-01-23 2019-04-23 谢开元 一种使用手机端进行人脸识别的智能储物柜
JP2021135975A (ja) * 2020-02-28 2021-09-13 パナソニック ネットソリューションズ株式会社 複合システム、生体認証システム、複合システムの制御方法、及びプログラム

Also Published As

Publication number Publication date
JP2023173267A (ja) 2023-12-07

Similar Documents

Publication Publication Date Title
KR101258689B1 (ko) 차량방문 편의제공 시스템
US11205312B2 (en) Applying image analytics and machine learning to lock systems in hotels
JP5055905B2 (ja) 入退室管理システム、入退室管理ロボット装置、および入退室管理プログラム
JP5214396B2 (ja) 自動改札機
JP6081859B2 (ja) 入退域管理システム及び入退域管理方法
US20030149343A1 (en) Biometric based facility security
US20070248242A1 (en) Mehtod and system for achieving access to an object or a service
EP3811339A1 (fr) Système de commande d&#39;accès amélioré et son procédé de commande d&#39;accès de personnes dans des zones règlementées
CN108357991A (zh) 一种电梯控制方法及系统
JP2018124622A (ja) 入場受付端末、入場受付方法、入場受付プログラム、および入場受付システム
JP7223296B2 (ja) 情報処理装置、情報処理方法及びプログラム
WO2023228744A1 (fr) Système de déverrouillage de porte, dispositif terminal, système de commande d&#39;équipement et procédé de déverrouillage de porte
JP2008021263A (ja) 入退場管理システム
CN110002290B (zh) 电梯门禁控制方法、装置、存储介质及电子设备
EP3142079B1 (fr) Vérification d&#39;identité
JP5051419B2 (ja) 認証システム、認証方法、及びプログラム
JP7505557B2 (ja) 情報処理装置、顔認証促進システム、情報処理方法、プログラム
CN113870473A (zh) 一种智能楼宇通行系统及通行控制策略
JP4401791B2 (ja) エレベータセキュリティ運転システム
WO2021176593A1 (fr) Dispositif de gestion de séjour, procédé de gestion de séjour, support lisible par ordinateur non transitoire dans lequel un programme est stocké, et système de gestion de séjour
JP2011090395A (ja) セキュリティシステム
CN115100771A (zh) 来访者管理系统和来访者管理方法
JP7028145B2 (ja) 駅務システム、入場駅特定装置、出場駅特定装置、自動改札機、利用駅特定方法、及びプログラム
JP2021060775A (ja) 受付ユニット、自動機、対応付け方法、および対応付けプログラム
JP7127703B2 (ja) 情報処理装置、情報処理方法及びプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23811619

Country of ref document: EP

Kind code of ref document: A1