The present disclosure relates to an identification system utilizing a recognition tag, and more particularly, to an identification system that obtains, through a camera or a video image, information indicated on the identification tag, and performs multi-factor authentication.
In this case, the multi-factor authentication is an authentication to enhance a security level by combining at least two factors from among the following: a unique factor like an identification (ID) that is unique to an identification object, hard-to-replicate factors that have identification objects which are externally obtained, or retained internally.
Recently, from a standpoint of security enhancement, identification systems utilizing recognition tags of Radio Frequency Identification (RFID) have been widely adopted. However, since the RFID systems are operated with non-contact IC cards with a short communication range, the RFID systems are not suited for identifying multiple identification candidates that are located across a relatively wide area. There is a problem in the RFID systems such that, when a longer communicable range is applied, a single RFID tag is read by multiple readers/writers simultaneously, thereby making the operation difficult.
Patent Literature 1 discloses an interrogator (a reader/writer) and a responder (a tag) which do not require a user to place the tag over the reader/writer, and to touch the reader/writer with the tag while holding the tag in hand by utilizing the characteristics that the RFID tag enables a longer-distance communication than the non-contact IC card, and which enables the user to enter or exit by, for example, simply hanging the tag around the user's neck, thereby improving the user's convenience, or an entry-exit managing system that is accomplished with such an interrogator and a responder.
This system includes interrogators and responders which have respective unique identifiers, and perform wireless communication therebetween. The interrogators are stationary disposed on, for example, a floor and a wall, and the responders are stationary disposed within a communicable range with the interrogator, and the other responders are disposed on moving objects like humans. A space is formed between the interrogator and the stationary disposed responder so as to allow the moving object or a movable object on which the moving responder is disposed to stop, suspend, move, and pass therethrough, and an operation process is performed in accordance with a change in communication status, as well as communication details caused by the object on which the moving responder is disposed and which moves within the space.
However, Patent Literature 1 discloses a single-factor authentication based on a unique identifier, and thus there remains a security problem of identity theft.
In addition, as for the tracking of the movements of the identification object caused by a change in communication status, the tracking accuracy cannot be regarded as accurate. For example, there is also a problem such that a gate and the like can be easily passed if a person goes with another person carrying a responder that functions as the identification tag.
Patent Literature 1: Unexamined Japanese Patent Application Kokai Publication No. 2006-072672.
A technical problem to be solved by the present disclosure is to provide an identification system which utilizes an identification tag that stores multiple authentication factors identifies, through a camera or video image, an identification object, and accomplishes higher level identification accuracy and security in comparison with those of conventional technologies.
In accordance with a first aspect of the present disclosure, there is provided an identification system including:
with using an identification tag including display means for displaying encrypted information as a two-dimensional code or a hologram using:
a) a unique factor registered in a predetermined external list in advance; and
b) one or a plurality of factors obtained by at least one means selected from the following: locational factor obtaining means for measuring a local location upon a predetermined trigger; height factor input means for inputting a height of an identification object; and biometric factor collecting means for collecting biometric information of the identification object,
wherein the identification system:
reads the identification tag by a camera or a video; and
identifies, through a multi-factor authentication, whether the identification object is a registered object or a non-registered object.
In accordance with a second aspect of the present disclosure, there is provided an identification system including:
with using an identification tag that displays encrypted information as a two-dimensional code or a hologram using a unique factor registered in a predetermined external list in advance; and a composite text that is externally obtained, or internally retained information,
wherein the identification system:
reads the displayed information by a camera or a video; and
identifies, through a multi-factor authentication, whether the identification object carrying the identification tag is a registered object or a non-registered object.
In this case, the identification tag may include display means for displaying encrypted information as a two-dimensional code or a hologram using:
a) the unique factor registered in the predetermined external list in advance; and
b) one or a plurality of factors selected from the following: a composite text composed from a current time obtained from a built-in clock or an external clock, a composite text composed from a current local location measured upon a predetermined trigger, a composite text composed from a height of the identification object measured in advance, and a composite text composed from biometric information collected by biometric information collecting means.
The composing operation from the current time may be performed based on a hash function that generates a new hash value in accordance with a time schedule table or a time interval stored in the identification tag, and the multi-factor authentications may include authentication using the hash value that changes in accordance with the time schedule table or the time interval.
The identification system may further include, display means for performing a highlight display of the non-registered object by superimposing the non-registered object on a current location of the non-registered object in an area where an identification candidate is present, and target recording means for recording the non-registered object as a target for a predetermined action.
The display means may include an LCD, an LED, an ELD, electronic paper, or a holographic display.
Note that an LCD stands for a Liquid Crystal Display, an LED stands for a Light Emitting Diode, and an ELD stands for an Electro Luminescent Display.
Hereinafter, embodiments to carry out the present disclosure will be described with reference to the accompanying figures. An operation of a functional structure block such as an identification tag, an identification device, and the like exemplified in this specification are realized by causing a predetermined processor circuit to execute control programs like pre-programmed firmware, and to work in cooperation with various equipped devices. In addition, these programs are recorded in a non-transitory computer-readable recording medium, read from the non-transitory recording medium by the processor. Furthermore, these programs are executed upon user operation or receipt of a signal from a device included in a system as a trigger.
Although a new hash value is composed on the time interval basis, the composing timing by the present disclosure is not limited to such time intervals, and other schemes may be adopted, such as to compose the new hash value in accordance with a time schedule table with irregular time intervals.
The structure of the authentication information applicable to the present disclosure is not limited to the structure which contains the time factor and the own ID serving as the unique factor utilized in the first embodiment. Hereinafter, modified examples of applicable authentication information will be described.
(First Modified Example: Authentication Information Containing Locational Factor)
(Second Modified Example: Authentication Information Containing Height Factor)
(Third Modified Example: Authentication Information Containing Biometric Factor)
The authentication information according to the present disclosure is not limited to the above modified examples that display two-factor information, and multi-factor information for displaying equal to or greater than three factors of the first embodiment as well as the modified examples is also applicable. For example, a combination may be set in which the timing at which the local location is measured in the first modified example is controlled so as to follow predetermined time intervals or a time schedule table, and the location of the candidate is synchronized at the side where the authentication is performed, and three factors including such a combination with the own ID may be obtained.
(Functional Structure of Identification Device) Returning back to the first embodiment, the explanation will be given further.
A clock 7001 is a built-in clock that is synchronized with the built-in clock of the identification tag.
A synchronous composer 7002 has a composer function that carries out the same operation as that of the composer 3004 of the identification tag, refers to the clock 7001 for a current time, and composes a new hash value in synchronization with the operation of the identification tag.
A memory 7003 stores the aforementioned hash value, and the own ID registered in advance as the unique factor.
An identification candidate extractor 7004 applies a known human shape extraction algorithm in the art to extract the identification candidates from the camera images obtained by the first camera and the second camera, and creates a list of the candidates.
A display extractor 7005 searches, in the image of the identification candidate, a field that shows the two-dimensional barcode.
A reader 7006 decodes the code of the extracted two-dimensional barcode, and reads the two-factor information that becomes the authentication information.
An authenticator 7007 executes two-factor authentication for the two-factor information that is the read result. In this case, the authentication is performed by checking the own ID and the hash value read from the decoded two-factor information with the own ID and the hash value stored in the memory 7002. When the authentication is successful, the object is determined as a registered object or otherwise determined as a non-registered object.
An identification block 7008 distinguishes the determined object between the registered object and the non-registered object, and identifies the object together with the location.
When a preset unit time elapses, or an event occurs, an eraser 7009 performs an erasing operation for the own ID of the identified registered object. When the registered object is detected multiple times during the erasing operation, the eraser transmits an alert signal to an alerter 7012.
A display 7010 displays, for a browser connected with the identification device, sections that indicate the hall, and displays the registered object and the non-registered object in a manner superimposed on the locations corresponding to the respective current locations. In this case, the non-registered object is highlighted.
When detecting through the camera image that the registered object has approached the entrance gate within a predetermined range, a gate controller 7011 transmits a gate unlocking signal to the entrance gate, thereby unlocking the entrance gate.
When detecting through the camera image that both the registered object and the non-registered object have approached the entrance gate within the predetermined range or when receiving the alert signal, the alerter 7012 performs a predetermined alerting operation to a preset contact like an operator. In this case, the alerting operation is to send an e-mail alert to an e-mail address of the preset operator.
A display screen 8001 displays a hall 8002 like a plan view.
Reference numeral 8003 denotes an entrance gate.
Reference numerals 8004, 8005, and 8006 denote respective registered objects.
Reference numeral 8007 denotes a highlighted non-registered object. In the figure, since both the registered object 8006 and the non-registered object 8007 are approaching the entrance gate, when detecting through the camera image that the objects are within the preset range, the alerter 7008 performs the alerting operation.
In a second embodiment, the identification system is applied to a mock-war field-game playing field.
The explanation will be given only of the structures that are different from those of the first embodiment. In this embodiment, the identification tag is not a chest badge as described in the first embodiment, but is put in a helmet. The identification tag put in the helmet includes a sweat analyzer device. A part of DNA information is extracted as the biometric information through a polymerase chain reaction (PCR) method to compose a composite text based on the biometric information. The composite text is utilized as a factor for the multi-factor authentication.
Four balloon indications with a reference numeral 9001 each show the own ID and the height which are the read information.
Three normal indications with a reference numeral 9002 each show, “OK”, meaning successful authentication.
A label indication with a reference numeral 9003 shows a failure in the authentication of the read information.
A highlighted indication with a reference numeral 9004 shows, “FOE”, meaning non-registered object.
The foregoing describes some example embodiments for explanatory purposes. Although the foregoing discussion has presented specific embodiments, persons skilled in the art will recognize that changes may be made in form and detail without departing from the broader spirit and scope of the invention. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. This detailed description, therefore, is not to be taken in a limiting sense, and the scope of the invention is defined only by the included claims, along with the full range of equivalents to which such claims are entitled.
The present application claims the benefit of priority based on Japanese Patent Application No. 2014-085064 and Japanese Patent Application No. 2014-256743, the entire contents of which are hereby incorporated by reference in this specification.
The present disclosure is applicable to various facilities where entry-exit management is needed, and to a field-game playing field, a conflict area, and the like where identification friend or foe is needed.
Number | Date | Country | Kind |
---|---|---|---|
2014-085064 | Apr 2014 | JP | national |
2014-256743 | Dec 2014 | JP | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2015/061304 | 4/13/2015 | WO | 00 |