The present invention relates to an entry/exit management system and an entry/exit management method in an area where entry/exit of a user is managed.
An entry/exit management system conventionally manages entry/exit of a user to/from a controlled area through ID authentication at an entry gate and an exit gate. This improves the security of the controlled area. A user attempting to enter the entry gate holds an ID tag having ID information of the user recorded therein over (closer to) a reader for collation.
For example, in the system described in Patent Document 1 (identified below), a person ID of a visitor is read by a card reader disposed at an entry of a facility. The read person ID is compared with information stored in a database to determine whether entry to the facility is allowed. If it is determined that the entry is allowed, a gate device is opened to permit the entry.
Patent Document 1: Japanese Laid-Open Patent Publication No. 2004-318576.
If such personal authentication is successively performed for multiple users, the time required for the personal authentication of each user causes a delay in an authentication process, so that congestion may occur at the entry gate. Particularly, in the case of precise personal authentication, an information amount of personal information is large and therefore tends to cause congestion, increasing temporal and mental burdens of users. If the number of entry gates is increased to prevent the occurrence of congestion, costs are increased.
It is therefore an object of the exemplary embodiments of the present invention to solve the problem described above of the conventional system and thus provide an entry/exit management system and an entry/exit management method relieving congestion at the time of entry.
To achieve the object, an exemplary aspect of the present invention provides an entry/exit management system managing entry/exit of a plurality of users into/from a management area through personal authentication. In this aspect, the system includes an entry gate restricting entry of a user into the management area; a reader disposed at the entry gate and reading personal information of the user; a storage recording the personal information read by the reader; a database in which personal information for authentication is recorded in advance; an authentication part for authenticating the personal information recorded in the storage by collation with the personal information for authentication recorded in the database; and an exit gate restricting exit of the user from the inside of the management area. Moreover, a controller is configured to operate the entry/exit management system in a first operation mode in which the reader reads the personal information of the user to allow the entry gate to permit the entry of the user having the read personal information, and wherein in the first operation mode, after allowing the entry gate to permit the entry of the user, the authentication part authenticates the personal information recorded in the storage and does not allow the exit gate to permit the exit of the user until the personal information recorded in the storage is successfully authenticated.
In another exemplary aspect of the present invention, an entry/exit management method is provided for managing entry/exit of a plurality of users into/from a management area through personal authentication. In this aspect, the method includes reading personal information of a user at an entry gate restricting entry into the management area; recording the read personal information; and authenticating the recorded personal information by collation with personal information for authentication recorded in advance in a database. In this aspect, the entry/exit management method has a first operation mode in which the personal information is read to permit the user having the read personal information to enter through the entry gate, wherein in the first operation mode, after permitting the user to enter through the entry gate, a step of authenticating the personal information is performed, and wherein the user is not permitted to exit through an exit gate until the personal information is successfully authenticated.
According to the entry/exit management system and the entry/exit management method of the present invention, congestion at the time of entry to an area managed by the system can be relieved as compared with conventional systems.
An entry/exit management system according to an exemplary aspect of the present invention is an entry/exit management system for managing entry/exit of a plurality of users into/from a management area through personal authentication. In this aspect, the system includes an entry gate restricting entry of a user into the management area; a reader disposed at the entry gate and reading personal information of the user; a storage recording the personal information read by the reader; a database in which personal information for authentication is recorded in advance; an authentication part authenticating the personal information recorded in the storage by collation with the personal information for authentication recorded in the database; and an exit gate restricting exit of the user from the inside of the management area. Moreover, the system includes a controller for configuring the entry/exit management system to operate in a first operation mode in which the reader reads the personal information of the user to allow the entry gate to permit the entry of the user having the read personal information, and wherein in the first operation mode, after allowing the entry gate to permit the entry of the user, the authentication part authenticates the personal information recorded in the storage and does not allow the exit gate to permit the exit of the user until the personal information recorded in the storage is successfully authenticated.
According to this aspect, congestion at the time of entry can be relieved as compared with conventional systems.
Moreover, the entry/exit management system can further have a second operation mode in which the entry gate is allowed to permit the entry of the user having the read personal information when the read personal information is successfully authenticated, and the entry/exit management system may be configured to switch between the first operation mode and the second operation mode.
Two operation modes exist for personal authentication, and the overall authentication efficiency for entry and exit can be improved by switching the operation modes.
In an exemplary aspect, the entry/exit management system can further comprise a plurality of reader reading personal information of the user in the management area, and a position identification system identifying a position of the user in the management area based on the personal information read by the reader in the management area. As a result, even if the authentication of the personal information acquired at the time of entry is unsuccessful, the position of the unsuccessfully authenticated user can be identified within the management area, so that the unsuccessfully authenticated user can be caught.
In an exemplary aspect, the personal information can be biological information, and the reader may be a biological information reader. As a result, identity theft of the user can be prevented, and the security can further be increased.
In an exemplary aspect, the personal information can be ID information, and the reader may be an ID reader. As a result, the personal authentication can easily be performed.
In an exemplary aspect, the personal information can be biological information and RFID information, and the reader may include a biological information reader and an RFID reader. As a result, identity theft of the user can be prevented, and the security can further be increased.
In an exemplary aspect, the recorded personal information may be collated for a plurality of persons at a time with the personal information for authentication in the database. As a result, the recorded personal information and the personal information for authentication in the database can collectively be collated, and a collation time can be shortened.
In addition, an entry/exit management method according to an exemplary aspect of the present disclosure is provided for managing entry/exit of a plurality of users into/from a management area through personal authentication. In this aspect, the method includes reading personal information of a user at an entry gate restricting entry into the management area; recording the read personal information; and authenticating the recorded personal information by collation with personal information for authentication recorded in advance in a database. Moreover, according to the exemplary aspect, the entry/exit management method has a first operation mode in which the personal information is read so that the entry gate permits the entry of the user having the read personal information, wherein in the first operation mode, after the entry gate permits the entry of the user, a step of authenticating the personal information is performed, and wherein the user is not permitted to exit from an exit gate until the personal information is successfully authenticated.
According to this aspect, congestion at the time of entry can be relieved.
In an exemplary aspect, the entry/exit management method can include a second operation mode in which the user having the read personal information is permitted to enter through the entry gate when the read personal information is successfully authenticated, and the first operation mode and the second operation mode may be switched.
Furthermore, two operation modes exist for personal authentication, and the overall authentication efficiency for entry and exit can be improved by switching the operation modes.
In an exemplary aspect, the entry/exit management method can include reading personal information of the user by a plurality of readers reading personal information of the user disposed in the management area, and a position of the user in the management area may be identified based on the personal information read by the readers disposed in the management area. As a result, even if the authentication of the personal information acquired at the time of entry is unsuccessful, the position of the unsuccessfully authenticated user can be identified within the management area, so that the unsuccessfully authenticated user can be caught.
In an exemplary aspect, the personal information can be biological information, and for the reading of the personal information, the biological information can be read. As a result, identity theft of the user can be prevented, and the security can further be increased.
In an exemplary aspect, the personal information can be ID information, and at the step of reading the personal information, the ID information may be read. As a result, the personal authentication can easily be performed.
In an exemplary aspect, the personal information can be biological information and RFID information, and at the step of reading the personal information, the biological information and the RFID information may be read. As a result, identity theft of the user can be prevented, and the security can further be increased.
In an exemplary aspect, the recorded personal information can be collated for a plurality of persons at a time with the personal information for authentication in the database. As a result, the recorded personal information and the personal information for authentication in the database can collectively be collated, and a collation time can be shortened.
Exemplary embodiments of the present invention will now be described with reference to the drawings.
An entry/exit management system and an entry/exit management method according to a first exemplary embodiment of the present disclosure will hereinafter be described.
Description will be now made with reference to
For the RFID tag 35, a passive RFID tag in the UHF band is used. It should be appreciated that another wireless tag may be used instead of the RFID tag. Instead of a passive wireless tag, an active wireless tag may be used. Wireless communication standards such as the HF band, Wi-Fi (registered trademark), Bluetooth (registered trademark), BLE (Bluetooth Low Energy), and the like, can be used according to variations of the exemplary aspect.
The exit gate 9 is also provided with a reader 41 reading the tag ID information of the RFID tags 35 possessed by the users, an exit door 44, and a speaker 42. The reader 41 is configured to read the tag ID information of a person exiting the management area 3. Although the exit gate 9 is disposed separately from the entry gate 7 in the first embodiment, an entry/exit gate may be disposed by integrating the entry gate 7 and the exit gate 9.
Description will be now made with reference to
Each of the readers is configured to transmit toward a surrounding space thereof a request signal for transmission of tag ID information. When receiving the request signal, the RFID tag 35 transmits the tag ID information. The transmitted tag ID information is received by the reader, and the presence of the RFID tag 35 can be detected.
The monitoring room 5 is provided with a monitor 77 configured to constantly display images captured by the cameras 57, 59, 61, 63, 64, a monitor 79 displaying the image of the camera specified by a surveillant, a host computer 81 performing collation for entry/exit of a user, and a microphone 83 connected to the speaker 56 in the management area 3.
The entry/exit management system. 1 according to the first embodiment includes the RFID tag 35, the readers 37, 41, the entry door 40, the exit door 44, and the host computer 81. In this aspect, these devices form the entry/exit management system 1 and are wired or wirelessly connected to the host computer 81 and are configured to transmit and receive data.
The reader part 67 of the reader 37 is configured to read the tag ID information and then records the read tag ID information in the ID information storage 69. When the reader part 67 reads the tag ID information, the reader part 67 sends an entry permission signal to the entry door 40. When receiving the entry permission signal, the entry door 40 opens the door. In the example described in this embodiment, the reader part 67 transmits the entry permission signal to the entry door 40. However, it is noted that the present invention is not limited thereto and in an alternative aspect the host computer 81 can be configured to transmit the entry permission signal.
When the tag ID information is recorded for a predetermined number of persons, the ID information storage 69 collectively transmits these pieces of information to the host computer 81 in a batch transmission, for example. In the first embodiment, for example, the tag ID information is transmitted for every N persons to the host computer 81, where N is a natural number of 2 or more and can be set by a system administrator, for example. The tag ID information may be transmitted collectively for N persons in this way or may be transmitted for each person.
The authentication part 91 collates the tag ID information transmitted to the host computer 81 with the authentication database 93. In the authentication database 93 serving as a database, the tag ID information for permitting the entry through the entry gate 7 is recorded in advance. The authentication part 91 outputs a result of “matching” when the read tag ID information matches the tag ID information of the database, or outputs a result of “mismatching” in the case of mismatching, together with the collated tag ID information to the authentication recorder 95. The authentication by the authentication part 91 can be performed for each person or can be performed as a batch collation process for N persons according to exemplary aspects.
When the tag ID information of the N persons is collectively authenticated with the authentication database 93, the authentication part 91 can perform the authentication from a predetermined time. For example, the authentication can be performed 30 minutes after the end of a lunch break. If the reader 37 does not detect the RFID tag 35 for a certain period of time, the reader 37 may transmit an authentication instruction to the authentication part 91, and the authentication part 91 may start collation in accordance with this authentication instruction.
The authentication recorder 95 records a result of collation between the tag ID information transmitted to the host computer 81 and the tag ID information registered in the authentication database 93 in correlation with the transmitted tag ID information.
The reader 41 of the exit gate 9 reads the tag ID information of the exiting person approaching the exit gate 9 and then transmits the read tag ID information to the host computer 81.
The data collation part 97 inquires (i.e., queries) the authentication recorder 95 about the tag ID information of the exiting person transmitted to the host computer 81. If the tag ID information of the exiting person is recorded as the result of “matching” in the authentication recorder 95, an exit permission signal is output to the exit door 44. If the tag ID information of the exiting person is recorded as the result of “mismatching”, the data collation part 97 transmits a warning signal to the speaker 42 of the exit gate 9. When receiving the warning signal, the speaker 42 emits a warning sound. In the case of “mismatching”, the data collation part 97 displays a warning on the monitor 79 of the monitoring room 5 and notifies the surveillant (i.e., the person or administrator in the monitoring room 5) of the presence of a suspicious person.
According to an exemplary aspect, the authentication part 91 and the data collation part 97 can be comprised of one or more of a plurality of CPUs, microprocessors, or FPGAs (Field Programmable Gate Arrays) or may be integrated into one CPU, microprocessor, or FPGA, each of which are configured to execute the algorithms disclosed herein. The ID information storage 69, the authentication database 93, and the authentication recorder 95 may each be made up of a plurality of hard disks, memories, or SSDs (Solid State Drives). The ID information storage 69, the authentication database 93, and the authentication recorder 95 may be integrated into one hard disk, memory, or SSD.
The entry/exit management method according to an exemplary aspect will now be described with reference to
When the user approaches the entry gate 7 from outside the management area 3, the reader part 67 of the reader 37 reads the tag ID information of the RFID tag 35 possessed by the user (step S1). The read tag ID information is recorded in the ID information storage 69 in correlation with the reading time and the ID information of the reader 37 that has read the information (step S2). When the tag ID information is normally read, the reader part 67 transmits an entry permission signal to the entry door 40. Upon receiving the entry permission signal, the entry door 40 opens the door (step S3). A requirement for occurrence of step S3 is step S1 only, and the timings of occurrence of step S2 and step S3 may be inverted. When the number of persons having the tag ID information recorded in the ID information storage 69 reaches the predetermined number N, the tag ID information of N persons as well as the respective reading times and the ID information of the reader 37 correlated thereto are transmitted from the ID information storage 69 to the authentication part 91 of the host computer 81. As used herein, the phrase “the tag ID information is normally read” means that, for example, the reader part 67 acquires a reading count number equal to or greater than a certain number within a predetermined time. This count number may be recorded as contents to be recorded in the ID information storage 69.
In the host computer 81, the authentication part 91 receives tag ID information of N persons. The authentication part 91 authenticates the tag ID information of N persons by collation with the personal information recorded in the authentication database 93 (step S4) and records authentication results as to whether matching is achieved in the collation of each pieces of the information, in correlation with the tag ID information, into the authentication recorder 95 (step S5). This leads to the end of the authentication process at the time of entry.
A process of performing authentication at the time of exit will be described with reference to
According to this exemplary aspect, when a user approaches the exit gate 9 in the management area 3, the reader 41 reads the tag ID information of the RFID tag 35 possessed by the user (step S11). The read tag ID information is transmitted to the data collation part 97 of the host computer 81 in correlation with the reading time and the ID information of the reader 41 that has read the information.
In the host computer 81, the data collation part 97 receives the tag ID information sent from the exit gate 9. The data collation part 97 authenticates the received tag ID information by collation with the authentication result of the tag ID information read at the time of entry recorded in the authentication recorder 95 (step S12). If the authentication is successful with respect to the tag ID information received by the data collation part 97 due to matching in the collation with the tag ID information read at the time of entry (Yes at step S13), an exit permission signal is transmitted to the exit door 44 of the exit gate 9 (step S14). In the exit gate 9, when the exit door 44 receives the exit permission signal, the exit door 44 is opened (step S15), and the exiting person can exit to the outside of the management area 3.
At step S13, if the authentication is not successful with respect to the tag ID information received by the data collation part 97 in the case of mismatching in the collation at the time of entry or since the collation at the time of entry is not yet completed so that the collation result is not recorded in the authentication recorder 95 (No at step S13), a warning signal is transmitted to the speaker 39 of the entry gate 7 (step S16). Upon receiving the warning signal, the speaker 42 of the exit gate 9 notifies the user with the warning sound (step S17) according to an exemplary aspect. In this case, since the exit door 44 does not receive the exit permission signal, the exit door 44 is not opened and the user for that RFID tag 35 is not permitted to exit the management area 3, for example.
According to the first embodiment, the entry/exit management system 1 includes the entry gate 7, the reader 37, the ID information storage 69, the authentication database 93, the authentication part 91, and the exit gate 9. The entry/exit management system 1 has a first operation mode in which the reader 37 reads the personal information of the user to allow the entry gate 7 to permit the entry of the user having the read personal information. After allowing the entry gate 7 to permit the entry of the user in the first operation mode, the authentication part 91 authenticates the personal information recorded in the ID information storage 69 and does not allow the exit gate 9 to permit the exit of the user until the personal information recorded in the ID information storage 69 is successfully authenticated. As a result, the user can enter the inside of the management area 3 when the reading and recording of the tag ID information is completed at the time of entry, so that the time of personal authentication at the time of entry can be shortened by a collation time in the authentication time of the tag ID information. As shown in
In the first embodiment, the tag ID information using the RFID tag 35 is employed as the personal information for authentication. However, it is noted that the present invention is not limited thereto. For example, biological information may be used as the personal information for authentication. In the case of using biological information, a data amount is large, and it takes time to collate biological information of each user, so that the effect in the first embodiment becomes more prominent.
If biological information is used as the personal information for authentication, a reader reading biological information is employed as the reader 37. The authentication database 93 has the biological information of users authorized to enter recorded in advance. The biological information is information unique to a living body and is information that can identify a person. A vein pattern of a finger or a palm of a hand, a retina, a voice print, or the like, can be used as the biological information.
An entry/exit management system and an entry/exit management method according to a second exemplary embodiment of the present disclosure will be described with reference to
The biological information reader 38 serving as a reader includes a reader part 70 configured to read biological information of a user and a biological information storage 71 recording the read biological information. In the second embodiment, the reader part 70 reads, for example, a user's finger vein pattern as the biological information. The read biological information is collectively transmitted for N persons to the authentication part 92.
The authentication part 92 is configured to collate the tag ID information and the biological information transmitted to the host computer 82 with the authentication database 94. In the authentication database 94, tag ID information and the biological information of a user allowed to enter through the entry gate 8 are recorded in a correlated manner in advance. The authentication part 92 outputs a result of “matching” when the read tag ID information and the biological information match the tag ID information and the biological information of the authentication database 94, or outputs a result of “mismatching” in the case of mismatching, together with the tag ID information to the authentication recorder 96 and the entry determination part 66.
The authentication recorder 96 records a result of collation in the authentication part 92 in correlation with the tag ID information.
The reader 41 of the exit gate 10 reads the tag ID information of the user at the exit gate 10 and then transmits the read tag ID information to the host computer 82.
The data collation part 98 inquires the authentication recorder 96 about the tag ID information of the exiting person transmitted to the host computer 82. If the tag ID information of the exiting person has the result of “matching” in the authentication recorder 96, an exit permission signal is output to the exit door 44. If the tag ID information of the exiting person has the result of “mismatching”, the data collation part 98 transmits a warning signal to the speaker 42 of the exit gate 10. When receiving the warning signal, the speaker 42 emits a warning sound. In the case of “mismatching”, the data collation part 98 displays a warning on the monitor 79 of the monitoring room 5 and notifies the surveillant of the presence of a suspicious person.
The mode switching part 65 (i.e., the “mode” or “function” switcher) is configured to switch the operation mode of personal authentication at the time of entry to either the first operation mode or the second operation mode. The first operation mode is an operation mode in which the entry gate 8 allows entry when the personal information is merely read at the time of entry. The second operation mode is an operation mode in which the entry gate 8 allows entry when the personal information is read at the time of entry and matching is achieved as a result of personal authentication in the host computer 8.
The timing of switching of the operation mode between the first operation mode and the second operation mode may be a predetermined time and/or may be set by an administrator of the system. In an exemplary aspect, a crowded time zone for entering users is preferable for an operation time in the first operation mode. Examples thereof include a time zone from 30 minutes before a start time of a school or a company to the start time and a time zone from 30 minutes after a lunch break to the end of the lunch break. Instead of switching the operation mode at a specified time, the operation mode may be switched depending on the number of users standing in line for the entry gate 7. Alternatively, the operation mode may be switched by the surveillant giving an instruction for switching to the host computer 81, for example.
In another example, in
The mode switching part 65 is then configured to switch the operation mode depending on the number of pieces of the tag ID information periodically sent from the reader 73. Specifically, if the number of pieces of the tag ID information is equal to or greater than a predetermined number D, the personal authentication at the entry gate 8 is performed in the first operation mode, and if the number of pieces of the tag ID information is less than D, the personal authentication at the entry gate 8 is performed in the second operation mode. D may be set to an arbitrary number that is a natural number of 2 or more and may further be set by a system administrator, for example.
If the personal authentication is performed in the first operation mode, the mode switching part 65 instructs the reader 37 to transmit the entry permission signal to the entry door 40 after reading the tag ID information. The mode switching part 65 also instructs the biological information reader 38 to transmit the entry permission signal to the entry door 40 after reading the biological information. Upon receiving the entry permission signals from both the reader 37 and the biological information reader 38, the entry door 40 opens and permits the respective user to enter the management area 3. In the example described in the second embodiment, the entry permission signal is transmitted to the entry door 40 by the reader 37 and the biological information reader 38; however, the present invention is not limited thereto. The host computer 82 can be configured to transmit the entry permission signal according to an alternative aspect.
If the personal authentication is performed in the second operation mode, the mode switching part 65 instructs the reader 37 and the biological information reader 38 to terminate the transmission of the entry permission signal to the entry door 40. Moreover, the mode switching part 65 also instructs the entry determination part 66 to operate in the second operation mode.
In the second operation mode, the entry determination part 66 transmits the entry permission signal to the entry door 40 when the collation result of the authentication part 92 is a “matching” result. Alternatively, when the collation result of the authentication part 92 is a “mismatching” (or no match) result, the entry determination part 66 transmits the warning signal to the speaker 39 of the entry gate 8 and the respective user is not permitted to enter the management area 3. The entry determination part 66 does not operate in the first operation mode.
Regardless of whether the first operation mode or the second operation mode, the collation of the RFID tag 35 and the biometric authentication may further be performed as the personal authentication at the time of exit.
As noted above, the authentication part 92, the data collation part 98, the mode switching part 65, and the entry determination part 66 can be comprises of a plurality of CPUs, microprocessors, or FPGAs, or may be integrated into one CPU, microprocessor, or FPGA. The ID information storage 69, the biological information storage 71, the authentication database 94, and the authentication recorder 96 may be made up of hard disks, memories, or SSDs. The ID information storage 69 and the biological information storage 71 may be integrated into one hard disk, memory, or SSD. The authentication database 94 and the authentication recorder 96 may be integrated into one hard disk, memory, or SSD.
The entry/exit management method will be described with reference to
The switching of the operation mode will be described with an example of switching depending on the number of users standing in line for the entry gate 8 although the switching depending on a time zone has been also given as an example. The reader 73 disposed on the entry gate 8 reads the tag ID information of the RFID tags of the users standing in line for the entry gate 8. For example, in the example shown in
In this aspect, the reader 73 counts the number of pieces of the read tag ID information. Since the pieces of the tag ID information of the RFID tags 35a, 35b, 35c are read at step S21, the counted number of pieces of tag ID information is three.
The counted number is transmitted from the reader 73 to the mode switching part 65 of the host computer 82.
The mode switching part 65 of the host computer 82 receives the number “3”, which indicates the counted number of pieces of the tag ID information. The mode switching part 65 determines whether the number of pieces of the tag ID information is equal to or greater than the predetermined number D (step S22). In the second embodiment, for example, D is set to “3”.
If the number of pieces of tag ID information is equal to or greater than the predetermined number D (YES at step S22), the mode switching part 65 is configured to select the first operation mode (step S23). Moreover, the mode switching part 65 is configured to instruct the reader 37, the biological information reader 38, and the entry determination part 66 to operate in the first operation mode. In the example of
If the number of pieces of tag ID information is not equal to or greater than the predetermined number D (NO at step S22), the mode switching part 65 is configured to select the second operation mode (step S24). The mode switching part 65 instructs the reader 37, the biological information reader 38, and the entry determination part 66 to operate in the second operation mode. This leads to the end of the flow of switching the operation modes.
A process related to the personal authentication at the time of entry in the first operation mode will be described with reference to
When a user approaches the entry gate 8 from outside the management area 3, the reader part 67 of the reader 37 reads the tag ID information of the RFID tag 35 possessed by the user. When the user holds the index finger over (e.g., closer to) the reader part 70 of the biological information reader 38, the reader part 70 reads the vein pattern of the user's finger (step S31). The read tag ID information is recorded in the ID information storage 69 in correlation with the reading time and the ID information of the reader 37 that has read the information. The read biological information is recorded in the biological information storage 71 in correlation with the reading time and the ID information of the biological information reader 38 that has read the information (step S32).
Upon reading the tag ID information, the reader part 67 is configured to transmit the entry permission signal to the entry door 40. Upon reading the biological information, the reader part 70 transmits the entry permission signal to the entry door 40. Upon receiving both entry permission signals, the entry door 40 opens (step S33). A requirement for occurrence of step S33 is step S31 only, and the timings of occurrence of step S32 and step S33 may be inverted. When the number of persons having the tag ID information and the biological information recorded in the ID information storage 69 and the biological information storage 71 reaches the predetermined number N, the tag ID information and the biological information of N persons as well as the respective reading times and the respective pieces of the ID information of the reader 37 and the biological information reader 38 correlated thereto are transmitted from the ID information storage 69 and the biological information storage 71 to the authentication part 91 of the host computer 81.
In the host computer 81, the authentication part 92 receives the tag ID information and the biological information of N persons. The authentication part 92 authenticates the tag ID information and the biological information of N persons by collation with the personal information recorded in the authentication database 94 (step S34) and records authentication results as to whether matching is achieved in the collation, in correlation with the tag ID information, into the authentication recorder 96 (step S35). This leads to the end of the authentication process at the time of entry.
A process related to the authentication at the time of entry of a user in the second operation mode will be described with reference to
The reading of the tag ID information of the RFID tag 35 possessed by the user and the reading of the biological information (step S41) are the same as step S31 of the first operation mode. The read tag ID information is transmitted to the host computer 82 in correlation with the reading time and the ID information of the reader 37 that has read the information. The read biological information is transmitted to the host computer 82 in correlation with the reading time and the ID information of the biological information reader 38 that has read the information. In the host computer 82, the authentication part 92 receives the transmitted tag ID information and biological information. The authentication part 92 authenticates the received tag ID information and the biological information by collation with tag ID information and biological information authorized for entry stored in the authentication database 94 (step S42).
If the authentication of step S42 is successful due to matching in the collation (YES at step S43), the authentication part 92 transmits a successful result of the authentication to the entry determination part 66. Upon receiving the successful result of the authentication, the entry determination part 66 transmits the entry permission signal to the entry door 40 of the entry gate 8 (step S44). In the entry gate 8, when the entry door 40 receives the entry permission signal from the entry determination part 66, the entry door 40 is opened (step S45), and the user can enter the inside of the management area 3.
If the authentication is not successful due to mismatching in the collation of step S42 (NO at step S43), the authentication part 92 transmits an unsuccessful result of the authentication to the entry determination part 66. Upon receiving the unsuccessful result of the authentication, the entry determination part 66 transmits the warning signal to the speaker 39 of the entry gate 8 (step S46). When the speaker 39 receives the warning signal, the speaker 39 notifies the user with the warning sound (step S47). In this case, since the enter door 40 does not receive the enter permission signal, the enter door 40 is not opened and the user is not permitted to pass through the door 40.
In both the first operation mode and the second operation mode, the personal authentication process at the time of exit is the same as the first embodiment. Personal authentication using biological authentication may be performed in addition to the personal authentication of the first embodiment.
As described above, according to the second embodiment, even when two types of personal authentication are performed with the tag ID information and the biological information, the personal authentication in the first operation mode is performed so that the user can enter the inside of the management area 3 at the completion of the reading of the tag ID information and the biological information at the time of entry. As a result, the time of the personal authentication at the time of entry can be shortened by the collation time of the tag ID information and the biological information.
In the case of mismatching in the collation of the personal information at the time of entry in the first operation mode, the user cannot exit due to the collation of the personal information at the time of exit, so that the position of the user unauthorized to enter can be identified at the time of exit. In this way, the time of personal authentication at the time of entry can be reduced, and the user having entered the inside of the management area 3 without authority can be caught at the exit gate 10.
Additionally, the operation mode of the personal authentication at the entry gate 8 is switched between two types, i.e., the first operation mode and the second operation mode. In the case of the first operation mode, if the authentication with the authentication database 94 is not completed, the user cannot exit from the exit gate 9. However, in the second operation mode, the authentication with the authentication database 94 is completed at the time of entry, so that the user can exit the management area 3 any time. Therefore, by performing the personal authentication in the second operation mode during a non-crowded time, the overall efficiency of entry/exit including the personal authentication at the time of exit is improved by switching between the two authentication operation modes.
An entry/exit management system and an entry/exit management method according to a third embodiment of the present invention will be described. In the entry/exit management system 21 according to the second embodiment, in the case of mismatching of the tag ID information in the collation in the personal authentication in the first operation mode, the location of the user possessing the RFID tag 35 mismatched in the collation can only be identified at the exit gate 10. In the third embodiment, the entry/exit management system 21 of the second embodiment further includes a position identification system identifying a position of a user possessing the RFID tag 35 in the management area 3. In an entry/exit management system 23 according to the third embodiment, the configurations other than the matters described below are the same as the entry/exit management system 21 of the second embodiment.
Description will be made with reference to
Description will then be made with reference to
In the management area 3, the readers 45, 47, 49, 51, 53, 55 disposed at various places read the tag ID information of the RFID tag 35 at a predefined time period. If a user is present within the reading range of the reader, the reader reads the tag ID information and transmits the tag ID information together with reader ID information of the reader that has read the information and the reading time to the host computer 82.
In the monitoring room 5, the host computer 82 receives the tag ID information, the reader ID information, and the reading time sent thereto and records these pieces of information in an action history recorder 99. The authentication part 92 transmits the tag ID information mismatched as a result of collation to the position identification part 101.
The position identification part 101 identifies the position of the user in the management area 3 from the reader ID information. Specifically, from the tag ID information and the reader ID information recorded in the action history recorder 99 and the tag ID information mismatched as a result of collation, the position identification part 101 identifies which of the RFID tag detection regions in the management area 3 the user having the mismatched tag ID information is present in. The identified position information is sent to the presentation information generator 107. A presentation information generator 107 generates presentation information showing the identified position information on a sketch map of the management area 3. The generated presentation information is sent to the monitor 79 and displayed. The surveillant can announce the presence of a suspicious person from the speaker 56 in the management area 3 by using the microphone 83 of the monitoring room 5. The surveillant can also inform a security guard of the position in the management area 3 where the user unauthorized to enter is present.
It is noted that the position identification system may be a system using only the RFID tag 35 and the readers described above or may be implemented by employing other systems tracking through image recognition using a plurality of the cameras 59, 61, 63, 64. In the case of tracking through image recognition, the faces of the users passing through the entry gate 7 may be captured one by one by the camera 57 and recorded in an image recorder 105, and the tracking may be performed from a plurality of camera images through image processing based on the captured images. When a corresponding user is found through the image processing, a camera selector 103 may select the camera for capturing and output a captured image to the monitor 79.
The position identification part 101, the camera selector 103, and the presentation information generator 107 may be made up of a plurality of CPUs, microprocessors, or FPGAs or may be integrated with other constituent elements of the host computer 82 into one CPU, microprocessor, or FPGA. The action history recorder 99 and the image recorder 105 may be made up of hard disks, memories, or SSDs. Alternatively, the action history recorder 99 and the image recorder 105 may be integrated with the authentication database 94 and the authentication recorder 96 into one hard disk, memory, or SSD.
As described above, since the user tracking system is included, even in the case of entry after only reading the personal information in the first operation mode, the position of the user with unsuccessful authentication can be identified as soon as the authentication of the personal information is completed. Since the position of the user unauthorized to enter can be identified before exit, the user unauthorized to enter can more quickly be caught.
It should be appreciated that the present invention is not limited to the exemplary embodiments and can be implemented in modifications as follows.
In the second embodiment, a user is allowed to enter after the tag ID information and the biological information are merely read in the first operation mode; however, the present invention is not limited thereto. In the first operation mode, a user may be allowed to enter after the tag ID information is authenticated while the biological information is merely read. In this case, the biological information is authenticated after entry of the user.
The entry/exit management system and the entry/exit management method according to the present invention are useful for management of entry/exit to/from facilities such as factories, banks, hospitals, companies, and data centers.
Number | Date | Country | Kind |
---|---|---|---|
2017-142055 | Jul 2017 | JP | national |
The present application is a continuation of PCT/JP2018/027144 filed Jul. 19, 2018, which claims priority to Japanese Patent Application No. 2017-142055, filed Jul. 21, 2017, the entire contents of each of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2018/027144 | Jul 2018 | US |
Child | 16297922 | US |