The present disclosure relates to an authentication control apparatus, an authentication system, an authentication control method, and a storage medium.
For example, Patent Literature 1 discloses a system in which face authentication is executed based on an image obtained by capturing, by a camera, a target person to be recognized whose presence in front of the camera has been detected, and when the face authentication has been successfully performed, personal information (name and the like) of the person to be authenticated is displayed.
[Patent Literature 1] Japanese Unexamined Patent Application Publication No. 2006-293913
However, there is a problem in the system disclosed in Patent Literature 1 that, when a third party is present near the target person to be recognized, it is impossible for the target person to be recognized to know that his/her face has been successfully authenticated without his/her personal information being known to the third party.
In view of the aforementioned problem, an object of the present disclosure is to provide an authentication control apparatus, an authentication system, an authentication control method, and a storage medium capable of enabling, when a third party is present near a target person to be recognized, the target person to be recognized to know that his/her face has been successfully authenticated without his/her personal information being known to the above third party.
An authentication control apparatus according to a first aspect of the present disclosure includes: image acquisition means for acquiring an image including a person to be authenticated captured by a camera that photographs the person to be authenticated; authentication control means for causing an authentication apparatus that executes face authentication to execute face authentication of the person to be authenticated included in the image acquired by the image acquisition means; and display control means for causing, when the face authentication has been successfully performed, a display apparatus to display privacy protection information of the person to be authenticated whose face has been successfully authenticated for the purpose of letting the person to be authenticated whose face has been successfully authenticated visually recognize that the face authentication has been successful.
An authentication system according to a second aspect of the present disclosure includes: a camera that photographs a person to be authenticated; a display apparatus; image acquisition means for acquiring an image that includes a person to be authenticated who has been captured by the camera; authentication control means for causing an authentication apparatus that executes face authentication to execute face authentication of the person to be authenticated included in the image acquired by the image acquisition means; and display control means for causing, when the face authentication has been successfully performed, the display apparatus to display privacy protection information of the person to be authenticated whose face has been successfully authenticated for the purpose of letting the person to be authenticated whose face has been successfully authenticated visually recognize that the face authentication has been successful.
An authentication control method according to a third aspect of the present disclosure includes: an image acquisition step of acquiring an image including a person to be authenticated captured by a camera that photographs the person to be authenticated; an authentication control step of causing an authentication apparatus that executes face authentication to execute face authentication of the person to be authenticated included in the image acquired in the image acquisition step; and a display control step of causing, when the face authentication has been successfully performed, a display apparatus to display privacy protection information of the person to be authenticated whose face has been successfully authenticated for the purpose of letting the person to be authenticated whose face has been successfully authenticated visually recognize that the face authentication has been successful.
A storage medium according to a fourth aspect of the present disclosure is a computer readable storage medium storing a program for causing an electronic device including at least one processor to execute: an image acquisition step of acquiring an image including a person to be authenticated captured by a camera that photographs the person to be authenticated; an authentication control step of causing an authentication apparatus that executes face authentication to execute face authentication of the person to be authenticated included in the image acquired in the image acquisition step; and a display control step of causing, when the face authentication has been successfully performed, a display apparatus to display privacy protection information of the person to be authenticated whose face has been successfully authenticated for the purpose of letting the person to be authenticated whose face has been successfully authenticated visually recognize that the face authentication has been successful.
According to the present invention, it is possible to provide an authentication control apparatus, an authentication system, an authentication control method, and a storage medium capable of enabling, when a third party is present near a target person to be recognized, the target person to be recognized to know that his/her face has been successfully authenticated without his/her personal information being known to the above third party.
Referring first to
As shown in
Next, one example of operations of the authentication control apparatus 20 having the aforementioned configuration will be described.
First, the image acquisition means 22b acquires a captured image including the person to be authenticated photographed by the camera 31 that photographs the person to be authenticated (Step S1). Next, the authentication control means 22c causes the authentication apparatus 10 that executes face authentication to execute the face authentication of the person to be authenticated included in the captured image acquired in Step S1 (Step SS2). Next, when the face authentication has been successfully performed, the display control means 22a causes the display apparatus 30 to display privacy protection information on the person to be authenticated whose face has been successfully authenticated for the purpose of enabling the person to be authenticated whose face has been successfully authenticated to visually recognize that the face authentication has been successful (Step S3).
As described above, according to the first example embodiment, the privacy protection information on the person to be authenticated whose face has been successfully authenticated is displayed, whereby, even in a case in which a third party is present near the target person to be recognized, it is possible for the target person to be recognized to know that his/her face has been successfully authenticated without his/her personal information being known to the above third party.
Hereinafter, an authentication system 1 will be described in detail as a second example embodiment of the present invention. An image acquisition unit is used as the image acquisition means 22b. This will be referred also to as an image acquisition unit 22b. Further, an authentication control unit is used as the authentication control means 22c. This will be referred also to as an authentication control unit 22c. Further, a display control unit is used as the display control means 22a. This will be referred also to as a display control unit 22a. Further, a display terminal is used as the display apparatus 30. This will be referred also to as a display terminal 30.
The authentication system 1 includes an authentication apparatus 10, an authentication control apparatus 20, a display terminal 30, a registration terminal 40, and a security gate 50 capable of communicating with one another via a network NW (e.g., the Internet).
First, a configuration example of the authentication apparatus 10 will be described.
As shown in
The storage unit 11 is, for example, a non-volatile storage unit such as a hard disk device or a ROM. The storage unit 11 stores a program 11a and a face information DB 11b.
The program 11a is a program executed by the control unit 12 (a processor). User ID(s) and face feature information on the user (target person to be recognized) are stored (registered) in the face information DB 11b in such a way that the user ID(s) and the face feature information are associated with each other. Further, the authentication apparatus 10 compares, in accordance with a face authentication request externally received (received from, for example, the authentication control apparatus 20), the face image or face feature information included in the request, with face feature information of each target person to be recognized, and sends the result of the comparison back to the request source.
The control unit 12 includes a processor, although it is not shown. The processor is, for example, a Central Processing Unit (CPU). The processor may be one or more than one. The processor executes the program 11a loaded from the storage unit 11 into the memory 13 (e.g., RAM), thereby functioning as an image acquisition unit 12a, a face detection unit 12b, a feature point extraction unit 12c, a registration unit 12d, or an authentication unit 12e. Some or all of them may be implemented by hardware.
The image acquisition unit 12a acquires an image including the face of the person to be authenticated. The image acquisition unit 12a acquires, for example, the image received by the communication unit 14. The image received by the communication unit 14 includes an image for registration or an image for authentication (comparison) transmitted from the authentication control apparatus 20.
The face detection unit 12b detects a face region from the image acquired by the image acquisition unit 12a and outputs the detected face region to the feature point extraction unit 12c.
The feature point extraction unit 12c extracts feature points (e.g., feature points of the face such as eyes, nose, or corners of the mouth) from the face region detected by the face detection unit 12b.
When the image acquired by the image acquisition unit 12a is an image for registration, the feature point extraction unit 12c outputs the face feature information to the registration unit 12d. The face feature information here is a set of feature points that have been extracted. On the other hand, when the image acquired by the image acquisition unit 12a is an image for authentication, the feature point extraction unit 12c outputs the face feature information to the authentication unit 12e.
The registration unit 12d newly issues a user ID when the face feature information is registered therein. The registration unit 12d registers the issued user ID in association with the face feature information extracted from the image for registration in the face information DB 11b.
The authentication unit 12e compares the face feature information extracted from the face region detected from the image for authentication with the face feature information in the face information DB 11b. The authentication unit 12e sends information regarding whether face feature information items match each other back to the authentication control apparatus 20. The information indicating whether or not the face feature information items match each other corresponds to information indicating whether or not authentication has been successful.
The communication unit 14 is a communication apparatus that communicates with the authentication control apparatus 20 via the network NW.
Next, one example of an operation of the authentication apparatus 10 (face information registration processing) will be described.
First, the authentication apparatus 10 (the image acquisition unit 12a) acquires an image (image for registration) including the face of the person to be authenticated included in a face information registration request (Step S10). For example, the authentication apparatus 10 (the communication unit 14) receives the face information registration request from the authentication control apparatus 20 via the network NW.
Next, the authentication apparatus 10 (the face detection unit 12b) detects the face region from the image for registration acquired in Step S10 (Step S11). Next, the authentication apparatus 10 (the feature point extraction unit 12c) extracts the feature points of the face from the face region detected in Step S11 (Step S12) and outputs the face feature information to the registration unit 12d. Lastly, the authentication apparatus 10 (the registration unit 12d) issues a user ID and registers the user ID in association with the face feature information in the face information DB 11b (Step S13). Note that the authentication apparatus 10 may receive the face feature information from the authentication control apparatus 20 and register the received face feature information in association with the user ID in the face information DB 11b. Next, the authentication apparatus 10 (the communication unit 14) transmits the result of the registration (the user ID issued in Step S13) to the authentication control apparatus 20 that has transmitted the face information registration request.
Next, one example of an operation of the authentication apparatus 10 (face authentication processing) will be described.
First, the authentication apparatus 10 (the image acquisition unit 12a) acquires an image (image for authentication) including the face of the person to be authenticated included in the face authentication request (Step S20). For example, the authentication apparatus 10 (the communication unit 14) receives the face authentication request from the authentication control apparatus 20 via the network NW. Next, the authentication apparatus 10 (the face detection unit 12b) detects the face region from the image for authentication acquired in Step S20 (Step S21). Next, the feature point extraction unit 12c extracts feature points of the face from the face region detected in Step S21 (Step S22). Alternatively, the authentication apparatus 10 may receive the face feature information from the authentication control apparatus 20. Next, the authentication apparatus 10 (the authentication unit 12e) compares the acquired face feature information with the face information DB 11b (Step S23). When the face feature information items match each other (Step S24: Yes), the authentication unit 12e specifies the user ID of the user whose face feature information items has matched each other (Step S25), and sends information indicating that the face authentication has been successful and the specified user ID back to the authentication control apparatus 20 (Step S26). When there are no face feature information items that match each other (Step S24: No), the authentication unit 12e sends information indicating that the face authentication has failed back to the authentication control apparatus 20 (Step S27).
Next, a configuration example of the authentication control apparatus 20 will be described.
The authentication control apparatus 20, which is an information processing apparatus that performs authentication control processing, is, for example, a server apparatus implemented by a computer.
As shown in
The storage unit 21 is a non-volatile storage unit such as a hard disk device or a ROM. The storage unit 21 stores a program 21a and a privacy protection information DB 21b.
The program 21a is a program executed by the control unit 22 (processor). The privacy protection information DB 21b stores (registers) the user ID(s) and privacy protection information of this user (target person to be recognized) in association with each other. The privacy protection information is information notifying the person to be authenticated whose face has been successfully authenticated that his/her face has been successfully authenticated, the information not including his/her personal information (e.g., the name of the person to be authenticated, the name of the company for which he/she works). The privacy protection information includes information registered by the person to be authenticated (user) in order to notify that his/her face has been successfully authenticated. The privacy protection information is, for example, an image such as an avatar image. The avatar image is specified, for example, (or selected) by the person to be authenticated in the registration terminal 40. The avatar image is an image including a character, which is an alter ego of the person to be authenticated. The character shown by a symbol G1 in
The control unit 22 includes a processor, although it is not shown in the drawings. The processor is, for example, a Central Processing Unit (CPU). The processor may be one or more than one. The processor executes the program 21a loaded into the memory 23 (e.g., RAM) from the storage unit 21, thereby functioning as a display control unit 22a, an image acquisition unit 22b, an authentication control unit 22c, a face authentication result acquisition unit 22d, a privacy protection information acquisition unit 22e, a registration unit 22f, or a specifying unit 22g. Some or all of them may be implemented by hardware.
When, for example, the face authentication has been successfully performed, the display control unit 22a causes the display terminal 30 to display the privacy protection information on the person to be authenticated whose face has been successfully authenticated (i.e., privacy protection information specified by the specifying unit 22g that will be described later) for the purpose of enabling the person to be authenticated whose face has been successfully authenticated to visually recognize that the face authentication has been successful. Specifically, the display control unit 22a transmits a privacy protection information display instruction for displaying the privacy protection information on the person to be authenticated whose face has been successfully authenticated to the display terminal 30 via the communication unit 24.
The image acquisition unit 22b acquires an image including the person to be authenticated who is in front of the security gate 50, the image being captured by the camera 31 (hereinafter this will be referred also to as a captured image). Specifically, the communication unit 24 receives the captured image transmitted from the display terminal 30 and the image acquisition unit 22b acquires the captured image received by the communication unit 24.
The authentication control unit 22c causes the authentication apparatus 10 that executes the face authentication to execute the face authentication of the person to be authenticated included in the captured image acquired by the image acquisition unit 22b. Specifically, the authentication control unit 22c transmits the captured image acquired by the image acquisition unit 22b to the authentication apparatus 10 via the communication unit 24. In place of the captured image, the face region detected from the captured image (or feature points extracted from the face region) may be transmitted to the authentication apparatus 10.
The face authentication result acquisition unit 22d acquires the result of the face authentication executed by the authentication apparatus 10. Specifically, the communication unit 24 receives the result of the face authentication transmitted from the authentication apparatus 10 and the face authentication result acquisition unit 22d acquires the result of the face authentication that the communication unit 24 has received.
The privacy protection information acquisition unit 22e acquires the privacy protection information. Specifically, the communication unit 24 receives the privacy protection information to be registered transmitted from the registration terminal 40 and the privacy protection information acquisition unit 22e acquires the privacy protection information to be registered that has been received by this communication unit 24.
The registration unit 22f registers the user ID of the user (person to be authenticated) registered in the authentication apparatus 10 in association with the privacy protection information acquired by the privacy protection information acquisition unit 22e in the privacy protection information DB 21b.
The specifying unit 22g specifies the privacy protection information associated with the person to be authenticated (user ID) whose face has been successfully authenticated in the storage unit 21 (the privacy protection information DB 21b).
Next, one example of an operation of the authentication control apparatus 20 (privacy protection information registration processing) will be described.
First, the authentication control apparatus 20 (the privacy protection information acquisition unit 22e) acquires an image (image for registration) including the face of the person to be authenticated (privacy protection information registration request person) and the privacy protection information (Step S30). For example, the communication unit 24 receives the privacy protection information registration request transmitted from the registration terminal 40 and the face authentication result acquisition unit 22d acquires the privacy protection information registration request that has been received by the communication unit 24. This privacy protection information registration request includes an image including the face of the person to be authenticated (image for registration) and the privacy protection information to be registered. This privacy protection information to be registered is, for example, the one that has been specified (or selected) by the person to be authenticated in the registration terminal 40.
Next, the authentication control apparatus 20 (the communication unit 24) transmits a face information registration request to the authentication apparatus 10 (Step S31). This face information registration request includes an image (image for registration) including the face of the person to be authenticated (the privacy protection information registration request person) acquired in Step S30. Next, the authentication control apparatus 20 (the communication unit 24) receives the result of the registration (user ID) transmitted from the authentication apparatus 10 (Step S32).
Next, the authentication control apparatus 20 (the registration unit 22f) registers the privacy protection information acquired in Step S30 in association with the user ID received in Step S32 in the storage unit 21 (the privacy protection information DB 21b) (Step S33).
Next, one example of an operation of the authentication control apparatus 20 (privacy protection information specifying processing) will be described.
First, the authentication control apparatus 20 (the image acquisition unit 22b) acquires a captured image including the person to be authenticated who has been captured by the camera 31 and is in front of the security gate 50 (Step S40). For example, the communication unit 24 receives the captured image transmitted from the display terminal 30 and the image acquisition unit 22b acquires the captured image received by the communication unit 24. Next, the authentication control apparatus 20 (the communication unit 24) transmits a face authentication request for requesting face authentication of the person to be authenticated included in the captured image acquired in Step S40 to the authentication apparatus 10 via the communication unit 24 (Step S41). This face authentication request includes the captured image (image for authentication) acquired in Step S40.
Next, the authentication control apparatus 20 (the communication unit 24) receives the result of the face authentication and the user ID transmitted from the authentication apparatus 10 and the face authentication result acquisition unit 22d acquires the result of the face authentication and the user ID that the communication unit 24 has received (Step S42).
When the face authentication has been successfully performed (Step S43: YES), that is, when the result of the face authentication acquired in Step S42 indicates that authentication has been successfully performed, the authentication control apparatus 20 (specifying unit 22g) specifies the privacy protection information on the person to be authenticated whose face has been successfully authenticated, i.e., the privacy protection information associated with the user ID acquired in Step S42 in the storage unit 21 (the privacy protection information DB 21b) (Step S44).
Next, the authentication control apparatus 20 (the display control unit 22a) causes the display terminal 30 to display the privacy protection information specified in Step S44 for the purpose of enabling the person to be authenticated whose face has been successfully authenticated to visually recognize that the face authentication has been successful. Specifically, the display control unit 22a transmits a privacy protection information display instruction for causing the privacy protection information specified in Step S44 to be displayed to the display terminal 30 via the communication unit 24. This privacy protection information display instruction includes the privacy protection information specified in Step S44.
On the other hand, when the face authentication has failed (Step S43: NO), that is, when the result of the face authentication acquired in Step S42 indicates that the authentication has failed, the authentication control apparatus 20 (the communication unit 24) causes the display terminal 30 to display that the face authentication of the person to be authenticated has failed so that this person to be authenticated can visually recognize that the face authentication has been failed (Step S46). Specifically, the display control unit 22a transmits a display instruction for causing the display terminal 30 to display the information indicating that the face authentication has failed to the display terminal 30 via the communication unit 24.
Next, a configuration example of the display terminal 30 will be described.
As shown in
The camera 31 captures an image including the person to be authenticated who is in front of the security gate 50. As shown in
The display unit 32 is, for example, a display such as a liquid crystal display. For example, a screen G including privacy protection information G1 (hereinafter this will be referred also to as an avatar image G1) is displayed on the display surface of the display unit 32 (see
The storage unit 34 is a non-volatile storage unit such as a hard disk device or a ROM. The storage unit 34 stores a program 34a.
The program 34a is a program executed by a control unit 35 (a processor).
The control unit 35 includes a processor that is not shown. The processor is, for example, a Central Processing Unit (CPU). The processor may be one or more than one. The processor executes the program 34a loaded into the memory 36 (e.g., RAM) from the storage unit 34, thereby functioning as a display control unit 35a or an image acquisition unit 35b. Some or all of them may be implemented by hardware.
When, for example, the communication unit 37 has received the privacy protection information display instruction for displaying the privacy protection information transmitted from the authentication control apparatus 20, the display control unit 35a displays the screen G (see
The image acquisition unit 35b acquires, from the camera 31, the captured image including the person to be authenticated who is in front of the security gate 50 and has been captured by the camera 31.
The communication unit 37 is a communication apparatus that communicates with the authentication control apparatus 20 via the network NW.
Next, one example of an operation of the authentication system 1 having the aforementioned configuration will be described.
As shown in
Next, the display terminal 30 (the communication unit 37) transmits the captured image acquired in Step S50 to the authentication control apparatus 20 (Step S51).
Next, the authentication control apparatus 20 (the communication unit 24) receives the captured image transmitted in Step S51 and the image acquisition unit 22b acquires the captured image received by the communication unit 24 (Step S52).
Next, the authentication control apparatus 20 (the authentication control unit 22c) transmits a face authentication request for requesting face authentication of the person to be authenticated U included in the captured image acquired in Step S52 to the authentication apparatus 10 via the communication unit 24 (Step S53). This face authentication request includes the captured image acquired in Step S52.
Next, the authentication apparatus 10 executes, when the communication unit 14 has received the face authentication request transmitted in Step S53, face authentication processing (see
Next, the authentication apparatus 10 (the authentication unit 12e) transmits the results of the authentication to the authentication control apparatus 20 that has transmitted the face authentication request via the communication unit 14 (Step S55). It is assumed here that information indicating that the authentication has been successfully performed and the user ID of the person to be authenticated U whose face has been successfully authenticated to the authentication control apparatus 20 as the results of the authentication.
Next, the authentication control apparatus 20 (the communication unit 24) receives the result of the face authentication transmitted in Step S55 and the user ID, and the face authentication result acquisition unit 22d acquires the result of the face authentication and the user ID that the communication unit 24 has received (Step S56).
Next, when the face authentication has been successfully performed (when the result of the face authentication acquired in Step S56 indicates that the authentication has been successfully performed), the authentication control apparatus 20 executes privacy protection information specifying processing (see
Next, when the privacy protection information has been successfully specified in Step S57, the authentication control apparatus 20 (the display control unit 22a) transmits a privacy protection information display instruction for displaying the specified privacy protection information to the display terminal 30 via the communication unit 24 (Step S58). This privacy protection information display instruction includes the privacy protection information specified in the above Step S57.
Next, when the communication unit 37 has received the privacy protection information display instruction transmitted in Step S58, the display terminal 30 (the display control unit 35a) displays the screen G including the privacy protection information included in the received privacy protection information display instruction on the display surface of the display unit 32 (Step S59). The display terminal 30 displays the screen G as shown in, for example,
When the face authentication has failed (when the result of the face authentication acquired in Step S56 indicates that the authentication has failed), the processing of Steps S57-S59 is not executed. In this case, information indicating that the authentication has failed is displayed, for example, on the display unit 32.
As described above, according to the second example embodiment, when face authentication has been successfully performed, the privacy protection information on the person to be authenticated whose face has been successfully authenticated is displayed, whereby, even in a case in which a third party is present near the target person to be recognized, it is possible for the target person to be recognized to know that his/her face has been successfully authenticated without his/her personal information being known to the above third party.
Next, a modified example will be described.
While the example in which the security gate 50 is used has been described in the second example embodiment, this is merely one example. For example, the security gate 50 may be omitted. In this case, the camera 31 captures, for example, an image including the person to be authenticated who is walking. In this case, the authentication apparatus 10 acquires the captured image including the person to be authenticated who is walking, and executes face authentication processing (see
When the walkthrough face authentication is executed, the privacy protection information may be displayed on a desired part where the person to be authenticated is going to pass through. The privacy protection information may be displayed, for example, on the display terminal 30 (the display surface of the display unit 32) provided in a desired part where the person to be authenticated is going to pass through. In this case, the privacy protection information may be displayed at a timing when the person to be authenticated passes through an area near the display area (e.g., the display surface of the display unit 32) in which the privacy protection information is displayed. Note that the privacy protection information may be displayed by projecting the privacy protection information onto the floor surface which is in front of the person to be authenticated.
Further, while the example in which the avatar image is used as the privacy protection information has been described in the above second example embodiment, this is merely one example. The privacy protection information may be, for example, a clothing area of the person to be authenticated extracted from the captured image acquired in Step S20.
Further, the privacy protection information may be the color of the clothing of the person to be authenticated detected from the captured image acquired in Step S20. Note that this color may be used as the background color of the avatar image according to the second example embodiment.
Further, the privacy protection information may be property information of the person to be authenticated or the color in accordance with the property information. For example, the privacy protection information may be displayed in blue if the amount of money is equal to or larger than a predetermined amount and may be displayed in red if the amount of money is smaller than the predetermined amount. Note that the property information may be specified by providing, for example, a property information storage unit (not shown) that stores the person to be authenticated (user ID) and the property information in association with each other in the authentication control apparatus 20 and referring to this property information storage unit. The property information may be acquired, for example, by a method (see
Further, the privacy protection information may be schedule information of the person to be authenticated or the color in accordance with the schedule information. Note that the schedule information can be specified by, for example, providing a schedule information storage unit (not shown) that stores the person to be authenticated (user ID) and the schedule information in association with each other in the authentication control apparatus 20 and referring to this schedule information storage unit. The schedule information can be acquired, for example, by a method (see
Further, while the examples of the face authentication have been described in the above second example embodiment, the present invention is not limited to being applied to face authentication and may also be applied to other types of biometrics authentication such as iris authentication or fingerprint authentication.
In the first and second example embodiments, the program(s) can be stored and provided to a computer using any type of non-transitory computer readable media. Non-transitory computer readable media include any type of tangible storage media. Examples of non-transitory computer readable media include magnetic storage media (e.g., flexible disks, magnetic tapes, hard disk drives), optical magnetic storage media (e.g., magneto-optical disks), CD-Read Only Memory (ROM), CD-R, CD-R/W, semiconductor memories (e.g., a mask ROM, a Programmable ROM (PROM), an Erasable PROM (EPROM), a flash ROM, or a Random Access Memory (RAM)). Further, the program(s) may be provided to a computer using any type of transitory computer readable media. Examples of transitory computer readable media include electric signals, optical signals, and electromagnetic waves. Transitory computer readable media can provide the program to a computer via a wired communication line (e.g., electric wires, and optical fibers) or a wireless communication line.
All the numerical values shown in the above example embodiments are merely examples and it is needless to say that numerical values other than those described above may be used as appropriate.
The above example embodiments are merely examples in every aspect. The present invention should not be interpreted in a limited way by the descriptions in the above example embodiments. The present invention may be executed in various other forms without departing from its spirit and main features.
The whole or part of the example embodiment disclosed above can be described as, but not limited to, the following supplementary notes.
An authentication control apparatus comprising:
The authentication control apparatus according to Supplementary Note 1, further comprising:
The authentication control apparatus according to Supplementary Note 2, further comprising:
The authentication control apparatus according to any one of Supplementary Notes 1 to 3, wherein the privacy protection information is information notifying the person to be authenticated whose face has been successfully authenticated of information indicating that his/her face has been successfully authenticated, the information not including his/her personal information.
The authentication control apparatus according to any one of Supplementary Notes 1 to 4, further comprising clothing extraction means for extracting a clothing area of the person to be authenticated from the image acquired by the image acquisition means,
wherein the authentication control means causes the clothing area that has been extracted by the clothing extraction means to be displayed as the privacy protection information.
The authentication control apparatus according to any one of Supplementary Notes 1 to 5, further comprising clothing color detection means for detecting the color of the clothing of the person to be authenticated from the image acquired by the image acquisition means,
wherein the authentication control means causes the color of the clothing detected by the clothing color detection means to be displayed as the privacy protection information.
The authentication control apparatus according to any one of Supplementary Notes 1 to 5, further comprising:
The authentication control apparatus according to any one of Supplementary Notes 1 to 5, further comprising:
The authentication control apparatus according to any one of Supplementary Notes 1 to 8, wherein the image acquisition means acquires an image including the person to be authenticated who has been captured by the camera and is in front of a security gate.
The authentication control apparatus according to any one of Supplementary Notes 1 to 9, wherein the display apparatus is provided in or near the security gate.
The authentication control apparatus according to any one of Supplementary Notes 1 to 8, wherein the image acquisition means acquires an image including a person to be authenticated who is walking captured by the camera.
The authentication control apparatus according to Supplementary Note 11, wherein the authentication control means causes the display apparatus to display the privacy protection information at a timing when the person to be authenticated passes through an area near a display area where the privacy protection information is displayed.
An authentication system comprising:
The authentication system according to Supplementary Note 13, comprising an information processing apparatus, an authentication control apparatus, and an authentication apparatus capable of communicating with one another via a network, wherein
An authentication control method comprising:
A computer readable storage medium storing a program for causing an electronic device including at least one processor to execute:
1
10
11
11
a
12
12
a
12
b
12
c
12
d
12
e
13
14
20
21
21
a
22
22
a
22
b
22
c
22
d
22
e
22
f
22
g
23
24
30
31
32
34
34
a
35
35
a
35
b
36
37
40
50
11
b
21
b
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2020/014608 | 3/30/2020 | WO |