This disclosure relates to technical fields of an information processing system, an information processing method, and a recording medium.
A known system of this type collects an action history of a user. For example, Patent Literature 1 discloses a technology/technique of observing the action and behavior of the user by using a nameplate type sensor node, and collecting acquired data by using wireless communication. Patent Literature 2 discloses a technology/technique of detecting entry/exit of the user by using a portable terminal, and storing log data associated with an entry/exit history. Patent Literature 3 discloses a technology/technique of collecting the action history of an infected patient, and preparing an action list and mapping on a map.
As another related technique/technology, Patent Literature 4 discloses a technology/technique of authenticating the user by using a wearable terminal. Patent Literature 5 discloses a technology/technique of attaching a sensor to a headphone and identifying a user from a difference in acoustic characteristics of ears and features of a body.
Patent Literature 1: International Publication No. WO2011/055628
Patent Literature 2: JP2018-181006A
Patent Literature 3: JP2011-070248A
Patent Literature 4: JP2020-505675A
Patent Literature 5: JP2004-065363A
This disclosure aims to improve the techniques/technologies disclosed in Citation List.
An information processing system according to an example aspect of this disclosure includes: an authentication unit that performs biometric authentication by using biometric information about a first user; an acquisition unit that acquires information about an action history of the first user in the case where the biometric authentication is successful; an storage unit that stores the information about the action history; a generation unit that generates risk information indicating a risk related to the first user, on the basis of the stored information about the action history; and an output unit that outputs the risk information about the first user in response to a request of a second user who is different from the first user.
An information processing method according to an example aspect of this disclosure is an information processing method executed by at least one computer, the information processing method including: performing biometric authentication by using biometric information about a first user; acquiring information about an action history of the first user in the case where the biometric authentication is successful; storing the information about the action history; generating risk information indicating a risk related to the first user, on the basis of the stored information about the action history; and outputting the risk information about the first user in response to a request of a second user who is different from the first user.
A recording medium according to an example aspect of this disclosure is a recording medium on which a computer program that allows at least one computer to execute an information processing method is recorded, the information processing method including: performing biometric authentication by using biometric information about a first user; acquiring information about an action history of the first user in the case where the biometric authentication is successful; storing the information about the action history; generating risk information indicating a risk related to the first user, on the basis of the stored information about the action history; and outputting the risk information about the first user in response to a request of a second user who is different from the first user.
Hereinafter, an information processing system, an information processing method, and a recording medium according to example embodiments will be described with reference to the drawings.
The information processing system according to the first example embodiment will be described with reference to
First, a hardware configuration of the information processing system according to the first example embodiment will be described with reference to
As illustrated in
The processor 11 reads a computer program. For example, the processor 11 is configured to read a computer program stored by at least one of the RAM 12, the ROM 13 and the storage apparatus 14. Alternatively, the processor 11 may read a computer program stored in a computer-readable recording medium by using a not-illustrated recording medium reading apparatus. The processor 11 may acquire (i.e., may read) a computer program from a not-illustrated apparatus disposed outside the information processing system 10, through a network interface. The processor 11 controls he RAM 12, the storage apparatus 14, the input apparatus 15, and the output apparatus 16 by executing the read computer program. Especially in this example embodiment, in the case where the computer program read by the processor 11 is executed, a functional block for outputting risk information is realized or implemented in the processor 11.
The processor 11 may be configured as, for example, a CPU (Central Processing Unit), a GPU (Graphics Processing Unit), a FPGA (field-programmable gate array), a DSP (Demand-Side Platform) or an ASIC (Application Specific Integrated Circuit). The processor 11 may be one of them, or may use a plurality of them in parallel.
The RAM 12 temporarily stores the computer program to be executed by the processor 11. The RAM 12 temporarily stores the data that are temporarily used by the processor 11 in the case where the processor 11 executes the computer program. The RAM 12 may be, for example, a D-RAM (Dynamic RAM).
The ROM 13 stores the computer program to be executed by the processor 11. The ROM 13 may otherwise store fixed data. The ROM 13 may be, for example, a P-ROM (Programmable ROM).
The storage apparatus 14 stores the data that are stored for a long term by the information processing system 10. The storage apparatus 14 may operate as a temporary storage apparatus of the processor 11. The storage apparatus 14 may include, for example, at least one of a hard disk apparatus, a magneto-optical disk apparatus, a SSD (Solid State Drive), and a disk array apparatus.
The input apparatus 15 is an apparatus that receives an input instruction from a user of the information processing system 10. The input apparatus 15 may include, for example, at least one of a keyboard, a mouse, and a touch panel.
The output apparatus 16 is an apparatus that outputs information about the information processing system 10 to the outside. For example, the output apparatus 16 may be a display apparatus (e.g., a display) that is configured to display the information about the information processing system 10. The output apparatus 16 may be a speaker or the like that is configured to audio-output the information about the information processing system 10. The output apparatus 16 may be configured as a portable terminal such as a smartphone or a tablet.
The sensor 18 is configured to detect information about the user, information about an environment around the user, or the like. The sensor 18 may include a camera (i.e., an image sensor). The sensor 18 may be provided in a wearable terminal. A plurality of sensors 18 or a plurality of types of sensors 18 may be provided. In particular, the sensor 18 according to this example embodiment may be configured to acquire information about an action history described later. The information about the action history will be described in detail later.
Next, a functional configuration of the information processing system 10 according to the first example embodiment will be described with reference to
As illustrated in
The biometric authentication unit 110 is configured to perform biometric authentication by using biometric information about a first user. The biometric authentication unit 110 may be configured to acquire the biometric information about the first user, by using the sensor 18 or the like, for example. In the biometric authentication performed by the biometric authentication unit 110, for example, it may be determined whether or not the first user is a user registered in advance. An aspect of the biometric authentication is not particularly limited, but may be, for example, facial authentication, iris authentication, fingerprint authentication, or the like. A detailed description of a specific technique/technology of the biometric authentication will be omitted here, because the existing techniques/technologies may be adopted as appropriate. An authentication result of the biometric authentication unit 110 is outputted to the action history acquisition unit 120.
The action history acquisition unit 120 is configured to acquire information about an action history of the first user in the case where the biometric authentication of the biometric authentication unit 110 is successful. The action history acquisition unit 120 may acquire the action history by using the sensor 18 or the like, for example. Here, the “information about the action history” is information acquired on the basis of the action history of the user, and may include information about an action and a state of the user, as well as the information about the environment around the user, or the like. Furthermore, the information about the action history may include a plurality of types of information. In the following, for convenience of description, the information about the action history may be referred to as “action history information” as appropriate. A specific example of the action history information will be described in another example embodiment later. The action history information acquired by the action history acquisition unit 120 is configured to be outputted to the action history storage unit 130.
The action history storage unit 130 is configured to store the action history information about the first user acquired by the action history acquisition unit 120. The action history storage unit 130 may be configured to store all the pieces of past action history information about the first use, or may be configured to store only a part of them. The action history storage unit 130 may have a function of deleting the past action history information that is unnecessary, as appropriate. The action history storage unit 130 may be configured as a database managed by a trusted information manager/administrator (e.g., an information bank, a private enterprise designated by a country or a public organization), for example. The action history information stored in the action history storage unit 130 is configured to be read by the risk information generation unit 140.
The risk information generation unit 140 is configured to generate the risk information on the basis of the action history information about the first user stored in the action history storage unit 130. The “risk information” here is information indicating a risk related to the first user. The risk information may be, for example, information including a value indicating a degree of the risk, or may be information indicating the presence or absence of the risk. Although the type of the risk is not particularly limited, an example may be a risk of being infected with an infectious disease. The risk information generated by the risk information generation unit 140 is configured to be outputted to the risk information output unit 150.
The risk information output unit 150 is configured to output the information generated by the risk information generation unit 140. For example, the risk information output unit 150 may be configured to output the risk information by using the output apparatus 16 described above. More specifically, the risk information output unit 150 may be configured to display the risk information on a display, or to audio-output the risk information with a speaker. Furthermore, the risk information output unit 150 is especially configured to output the risk information in response to a request of a second user who is different from the first user (i.e., a user who is different from the user for which the risk information is generated). Examples of the first user and the second user may be a driver of public transportation and passengers thereof, or the like.
Next, with reference to
As illustrated in
On the other hand, in the case where the biometric authentication is successful (step S102: YES), the action history acquisition unit 120 acquires the action history information about the first user (step S103). Then, the action history storage unit 130 stores the acquired action history information about the first user (step S104).
Next, a flow of an operation in the case where the risk information is outputted (hereinafter referred to as an “output operation”) by the information processing system 10 according to the first example embodiment will be described with reference to
As illustrated in
On the other hand, in the case where there is an output request from the second user (step S151: YES), the risk information generation unit 140 reads the action history information about the first user stored in the action history storage unit 130, and generates the risk information about the first user (step S152). Then, the risk information output unit 150 outputs the risk information about the first user (step S153).
The risk information output unit 150 typically outputs the risk information to the second user, but the risk information may also be outputted to the first user. Alternatively, the first user may be notified that the risk information is outputted to the second user.
In the above example, the risk information is generated after the output request is made by the second user, but the risk information may be generated before the output request is made by the second user (e.g., in the case where the action history information about the first user is sufficiently stored). In this case, the action history storage unit 130 may be configured to store the generated risk information in addition to the action history information.
Next, a technical effect acquired by the information processing system 10 according to the first example embodiment will be described.
As described in
The information processing system 10 according to a second example embodiment will be described with reference to
First, a functional configuration of the information processing system 10 according to the second example embodiment will be described with reference to
As illustrated in
The verification unit 151 is configured to perform a collation/verification process by using the biometric information. Specifically, the verification unit 151 is configured to perform the collation/verification (in other words, a process of identifying the first user), by using the biometric information about the first user inputted from the second user. The verification unit 151 may be configured to acquire the biometric information about the first user, from a terminal or the like operated by the second user. For example, the verification unit 151 may acquire an image of the first user captured by a built-in camera from a smart phone owned by the second user, and may acquire the biometric information from the image of the first user. The risk information output unit 150 is configured to output the risk information about the first user in accordance with a collation/verification result of the verification unit 151. That is, the risk information output unit 150 is configured to output the risk information about the first user identified by the collation/verification process.
Next, a flow of the output operation by the information processing system 10 according to the second example embodiment will be described with reference to
As illustrated in
On the other hand, in the case where the collation/verification process is successful (i.e., the first user can be identified) (step S252: YES), the risk information generation unit 140 reads the action history information about the first user stored in the action history storage unit 130, and generates the risk information about the first user (step S152). Then, the risk information output unit 150 outputs the risk information about the first user (step S153).
Next, a technical effect acquired by the information processing system 10 according to the second example embodiment will be described.
As described in
The information processing system 10 according to a third example embodiment will be described with reference to
First, with reference to
As illustrated in
The movement history is information indicating a history of the movement of the first user. The movement history may include, for example, past position information about the user that may be acquired from a GPS (Global Positioning System) or the like, as well as time information about a time when the user visits the location.
The environmental information is information associated with the movement history described above, and is information indicating an environment of the location where the user visits. The environmental information may include, for example, information about air temperature, air pressure, ventilation conditions, and the like.
The human body information is information about the first user. The human body information may include, for example, information such as body temperature and pulse of the first user.
The conversation history is information indicating a history of conversation of the first user. The conversation history may include information about a conversation duration, a conversation target, the presence/absence of a mask when the conversation occurs, and the like.
The various types of information described above are examples, and the action history information may include another type of information that is not mentioned here.
Next, a technical effect acquired by the information processing system 10 according to the third example embodiment will be described.
As described in
The information processing system 10 according to a fourth example embodiment will be described with reference to
First, a functional configuration of the information processing system 10 according to the fourth example embodiment will be described with reference to
As illustrated in
The action pattern storage unit 210 is configured to store an action pattern of the first user. Here, the “action pattern” is information indicating a daily action pattern and an action tendency of the first user, and may include information about the movement history of the first user, or the like, for example. In addition, the action pattern may at least partially overlap with the action history information. In this case, the action pattern storage unit 210 and the action history storage unit 130 may be configured as a common storage unit.
The action pattern comparison unit 220 is configured to compare an action pattern in a predetermined period of the first user (e.g., an action pattern of the latest day) with a past action pattern (e.g., action patterns of several ten days stored in the past). Then, the action pattern comparison unit 220 is configured to output whether or not the action pattern in the predetermined period matches the past action pattern. The action pattern comparison unit 220 may calculate a degree of similarity of each of the action patterns, thereby to determine whether or not they match, for example.
The threshold determination unit 230 is configured to determine a threshold (specifically, an authentication threshold for determining whether the biometric authentication is successful or failed) of the biometric authentication unit 110, on the basis of a comparison result of the action pattern comparison unit 220. The threshold determination unit 230 determines such a threshold of the biometric authentication unit 110 that causes the biometric authentication to be hardly successful, in the case where the action pattern in the predetermined period does not match the past action pattern. The threshold change unit 200 reflects the threshold determined by the threshold determination unit 230 in the biometric authentication unit 110 (i.e., changes the threshold).
Next, with reference to
As illustrated in
Subsequently, in the case where the action pattern in the predetermined period matches the past action pattern (step S402: YES), the threshold determination unit 230 determines that the first user is likely to be a legitimate person (i.e., a person who shows the past action pattern), and determines such a threshold that causes the biometric authentication to be easily successful (step S403). On the other hand, in the case where the action pattern in the predetermined period does not match the past action pattern (step S402: NO), the threshold determining unit 230 determines that the first user is unlikely to be the legitimate person, and determines such a threshold that causes the biometric authentication to be hardly successful (step S404).
Subsequently, the threshold change unit 200 changes the threshold used in the biometric authentication unit 110 to the threshold determined by the threshold determination unit 230 (step S405).
Next, a technical effect acquired by the information processing system 10 according to the fourth example embodiment will be described.
As described in
The information processing system 10 according to a fifth example embodiment will be described with reference to
First, a functional configuration of the information processing system 10 according to the fifth example embodiment will be described with reference to
As illustrated in
The operation information acquisition unit 111 is configured to detect a gesture performed around a shielding object (e.g., a mask, sunglasses, a hat, etc.) that partially covers a face of the first user and to acquire operation information corresponding to the gesture, in the case where the biometric authentication of the first user is performed. The operation information acquisition unit 111 may include, for example, a camera, and may detect an action of bringing a finger to a position that overlaps the mask, as the gesture. The operation information acquisition unit 111 may detect the gesture on the basis of a difference between frames of a plurality of images (e.g., a change in a skin color area, etc.), for example.
The operation information acquired by the operation information acquisition unit 111 is used for a biometric authentication process by the biometric authentication unit 110. How to use the operation information in the biometric authentication is not particularly limited. For example, the operation information may be directly used for the authentication process as in the biometric information, or may be used as supplemental information for properly performing the authentication process.
Next, with reference to
As illustrated in
On the other hand, in the case where the biometric authentication is failed (step S502: NO), the operation information acquisition unit 111 detects the gesture performed around the shielding object and acquires the operation information (step S503). Then, the biometric authentication unit 110 collates/verifies the acquired operation information with the operation information registered in advance (step S504). Here, the operation information to be collated/verified is assumed to be registered in accordance with the operation performed by each user in user registration.
Subsequently, the biometric authentication unit 110 prepares a candidate list on the basis of a collation/verification result of the operation information (step S505). Specifically, the biometric authentication unit 110 prepares a list of the users for whom the operation information matches the operation information registered in advance (i.e., the users who have registered the same gesture as the one detected this time). Then, the biometric authentication unit 110 narrows down an authentication target to the users included in the candidates list, and performs the biometric authentication again (step S506). The biometric authentication here may be performed by using another type of biometric information that is different from the biometric information acquired in the step S501 (e.g., by acquiring the biometric information from a newly captured image).
In the above example, after the biometric authentication is failed, the operation information is supplementally used; however, the authentication process may be performed by using the operation information from the beginning. For example, at a first stage, two-element authentication may be performed by using both the biometric information and the operation information. In addition, liveness determination may be performed from the gesture or the movement associated with the gesture.
Next, a technical effect acquired by the information processing system 10 according to the fifth example embodiment will be described.
As described in
The information processing system 10 according to a sixth example embodiment will be described with reference to
First, a functional configuration of the information processing system 10 according to the sixth example embodiment will be described with reference to
As illustrated in
The shielding object information acquisition unit 112 is configured to detect a change in at least one of a surface area and a position of the shielding object that partially covers the face of the first user, in the case where the biometric authentication of the first user is performed, and to acquire shielding object information corresponding to the change of the shielding object. The shielding object information acquisition unit 112 includes, for example, a camera, and may detect a change in at least one of a surface area and a position of a mask, in the case where the mask is moved down. The shielding object information acquisition unit 112 may detect the change in at least one of the surface area and the position of the shielding object, on the basis of a difference between frames of a plurality of images, for example.
The shielding object information acquired by the shielding object information acquisition unit 112 is used for the biometric authentication process by the biometric authentication unit 110. How to use the shielding object information in the biometric authentication is not particularly limited. For example, the shielding object information may be directly used for the authentication process as in the biometric information, or may be used as supplemental information for properly performing the authentication process.
Next, with reference to
As illustrated in
On the other hand, in the case where the biometric authentication is failed (step S502: NO), the shielding object information acquisition unit 112 detects the change in the surface area or the position of the shielding object, and acquires the shielding object information (step S601).
Then, the biometric authentication unit 110 collates/verifies the acquired shielding object information with the shielding object information registered in advance (step S602). Here, the shielded object information to be collated/verified is assumed to be registered in accordance with the operation performed by each user in the user registration.
Subsequently, the biometric authentication unit 110 prepares a candidate list on the basis of a collation/verification result of the shielding object information (step S505). Specifically, the biometric authentication unit 110 prepares a list of the users for whom the shielding object information matches the shielding object information registered in advance (i.e., the users who have registered the operation that allows the same change as that of the shielding object detected this time). Then, the biometric authentication unit 110 narrows down an authentication target to the users included in the candidates list, and performs the biometric authentication again (step S506). The biometric authentication here may be performed by using another type of biometric information that is different from the biometric information acquired in the step S501 (e.g., by acquiring the biometric information from a newly captured image).
In the above example, after the biometric authentication is failed, the shielding object information is supplementally used; however, the authentication process may be performed by using the shielding object information from the beginning. For example, at a first stage, two-element authentication may be performed by using both the biometric information and the shielding object information. In addition, the liveness determination may be performed from an operation in the case where the shielding object is changed, or an operation associated with the aforementioned operation.
Next, a technical effect acquired by the information processing system 10 according to the sixth example embodiment will be described.
As described in
The information processing system 10 according to a seventh example embodiment will be described with reference to
First, a functional configuration of the information processing system 10 according to the seventh example embodiment will be described with reference to
As illustrated in
The authentication history storage unit 310 is configured to be store a past authentication history in the biometric authentication unit 110. The authentication history storage unit 310 is configured to store not only information indicating the success or failure of the authentication, but also a value used in the authentication (e.g., a degree of matching between feature quantities, etc.), as the history.
The determination processing unit 320 is configured to determine whether or not a factor of occurrence of false rejection in the biometric authentication is caused by an input condition of the biometric information (e.g., an apparatus or an environment for reading the biometric information), or by a change with time in the biometric information (e.g., a change in the face due to aging, etc.), by using the past authentication history stored in the authentication history storage unit 310.
The determination result output unit 330 is configured to output a determination result by the determination processing unit 320 (i.e., the factor of the occurrence of the false rejection in the biometric authentication). The determination result output unit 330 may output such a result that the factor of the occurrence of the false rejection is specified to one of the two, or may output information indicating the possibility that the factor of the occurrence of the false rejection is the input condition of the biometric information, and the possibility that the factor of the occurrence of the false rejection is the change with time in the biometric information (e.g., ratio information). The determination result output unit 330 may be configured to output instruction information for performing a particular process corresponding to the determination result. For example, the determination result output unit 330 may be configured to output information for performing a process to improve the factor of the occurrence of the false rejection.
Next, with reference to
As illustrated in
Subsequently, the determination processing unit 320 determines the factor of the occurrence of the false rejection, from the acquired past authentication history (step S702). The determination processing unit 320 may determine the factor of the occurrence of the false rejection in accordance with a change tendency of the authentication history, for example. A more detailed determination method will be described later with a specific example.
Subsequently, the determination result output unit 330 outputs the determination result of the determination processing unit 320 (step S703). The determination result output unit 330 may perform the output by using the output apparatus 16 described above, for example.
The determination result output unit 330 may output information encouraging the user to change the input condition of the biometric information, in the case where the factor of the occurrence of the false rejection is the input condition of the biometric information. For example, the determination result output unit 330 may output information encouraging the user to change a direction of a camera or a lighting device, or information encouraging the user to renew the apparatus itself. In addition, the determination result output unit 330 may output information encouraging the user to update the biometric information, in the case where the factor of the occurrence of the false rejection is the change with time in the biometric information. For example, the determination result output unit 330 may output information encouraging the user to capture a new photograph to be used for the biometric authentication.
Next, a determination method in the factor determination operation will be described with reference to
In the example illustrated in
Here, in the example illustrated in
The determination method described above is merely an example, and other criteria may be used to determine the factor of the occurrence of the false rejection. Specifically, it is sufficient to register in advance information for associating the change tendency of the authentication history with the factor of the occurrence of the false rejection.
Next, a technical effect acquired by the information processing system 10 according to the seventh example embodiment will be described.
As described in
The information processing system 10 according to an eighth example embodiment will be described with reference to
First, a functional configuration of the information processing system 10 according to the eighth example embodiment will be described with reference to
As illustrated in
The body temperature display unit 410 is configured to display the body temperature of the first user acquired as the action history information. In addition to the body temperature of the first user, the body temperature display unit 410 may be configured to display the image of the first user and another type of user information (e.g., information such as name, age, and attribute). The body temperature display unit 410 is installed or mounted such that the body temperature of the first user can be visually recognized by a user other than the first user (e.g., a subsequent user) or a system manager/administrator or the like, for example.
The display aspect change unit 420 is configured to change a display aspect of the body temperature display unit 410 in accordance with a measurement result of the body temperature. The display aspect change unit 420 may be configured to change the display aspect of the body temperature display unit 410 in accordance with whether or not the measured body temperature is greater than or equal to a predetermined value, for example. The predetermined value here may be a threshold for determining heat generation, for example. The display aspect change unit 420 may be configured to select a display aspect corresponding to the measurement result of the body temperature, from a plurality of display aspects registered in advance. The details of the display aspect will be described later with a specific example.
Next, a flow of an operation in the case where the body temperature is measured and displayed (hereinafter referred to as a “body temperature measurement operation” as appropriate) by the information processing system 10 according to the eighth example embodiment will be described with reference to
As illustrated in
In the case where the body temperature of the first user is not greater than or equal to the predetermined value (step S802: NO), the display aspect change unit 420 changes the display aspect of the body temperature display unit 410 to perform display in a normal UI. On the other hand, in the case where the body temperature of the first user is greater than or equal to the predetermined value (step S802: YES), the display aspect change unit 420 changes the display aspect of the body temperature display unit 410 to perform display in a privacy-friendly UI (step S804). The privacy-friendly UI may be, for example, a display aspect of displaying less information than that in the normal UI. Specifically, the privacy-friendly UI may not directly display the body temperature of the first user.
In the case of the privacy-friendly UI, the body temperature display unit 10 gives notice of the body temperature measured by another path (step S805). The body temperature display unit 410 does not directly display information about the measured body temperature, but transmits the information to another terminal of a notification destination (specifically, a terminal that can be viewed only by a target to be notified), thereby give notice of the measurement result, for example.
Next, with reference to
The privacy-friendly UI is designed not to display all pieces of the information displayed in the normal UI; however, it may employ such a display aspect that a part of the information is displayed as it is and only the information that is closely related to the privacy is not displayed, for example. Furthermore, the above example describes such a configuration that the two display aspects (i.e., the normal UI and the privacy-friendly UI) are selectively used in accordance with the body temperature, but three or more display aspects may be selectively used, for example. For example, such a display aspect that information to be display gradually decreases little by little with increasing body temperature, may be employed.
Next, a technical effect acquired by the information processing system 10 according to the eighth example embodiment will be described.
As described in
A processing method in which a program for allowing the configuration in each of the example embodiments to operate so as to realize the functions in each example embodiment is recorded on a recording medium, and in which the program recorded on the recording medium is read as a code and is executed on a computer, is also included in the scope of each of the example embodiments. That is, a computer-readable recording medium is also included in the range of each of the example embodiments. Not only the recording medium on which the above-described program is recorded, but also the program itself is also included in each example embodiment.
The recording medium to use may be, for example, a floppy disk (registered trademark), a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a magnetic tape, a nonvolatile memory card, or a ROM. Furthermore, not only the program that is recorded on the recording medium and executes processing alone, but also the program that operates on an OS and executes processing in cooperation with the functions of expansion boards and another software, is also included in the scope of each of the example embodiments.
The example embodiments described above may be further described as, but not limited to, the following Supplementary Notes below.
An information processing system according to Supplementary Note 1 is an information processing system including: an authentication unit that performs biometric authentication by using biometric information about a first user; an acquisition unit that acquires information about an action history of the first user in the case where the biometric authentication is successful; an storage unit that stores the information about the action history; a generation unit that generates risk information indicating a risk related to the first user, on the basis of the stored information about the action history; and an output unit that outputs the risk information about the first user in response to a request of a second user who is different from the first user.
An information processing system according to Supplementary Note 2 is the information processing system according to Supplementary Note 1, wherein the output unit outputs the risk information about the first user in accordance with a result of a collation/verification process using biometric information.
An information processing system according to Supplementary Note 3 is the information processing system according to Supplementary Note 1 or 2, wherein the information about the action history includes at least one of a movement history of the first user, environmental information corresponding to the movement history, human body information, and a conversation history.
An information processing system according to Supplementary Note 4 is the information processing system according to any one of Supplementary Notes 1 to 3, further including a threshold change unit that changes a threshold of the biometric authentication such that the biometric authentication is hardly successful, in the case where an action pattern of the first user in a predetermined period does not match a past action pattern of the first user.
An information processing system according to Supplementary Note 5 is the information processing system according to any one of Supplementary Notes 1 to 4, wherein the authentication unit performs the biometric authentication, by using operation information acquired by detecting a gesture around a shielding object that partially covers a face of the first user, in addition to the biometric information about the first user.
An information processing system according to Supplementary Note 6 is the information processing system according to any one of Supplementary Notes 1 to 5, wherein the authentication unit performs the biometric authentication, by using shielding object change information acquired by detecting a change in a surface area or a position of a shielding object that partially covers a face of the first user, in addition to the biometric information about the first user.
An information processing system according to Supplementary Note 7 is the information processing system according to any one of Supplementary Notes 1 to 6, further including a factor determination unit that determines whether a factor of occurrence of false rejection in the biometric authentication is caused by an input condition of the biometric information, or by a change with time in the biometric information, on the basis of an authentication history of the biometric authentication.
An information processing system according to Supplementary Note 8 is the information processing system according to any one of Supplementary Notes 1 to 7, further including: a display unit that displays body temperature of the first user acquired as the information about the action history; and a display aspect change unit that changes a display aspect of the display unit, on the basis of the measured body temperature.
An information processing method according to Supplementary Note 9 is an information processing method executed by at least one computer, the information processing method including: performing biometric authentication by using biometric information about a first user; acquiring information about an action history of the first user in the case where the biometric authentication is successful; storing the information about the action history; generating risk information indicating a risk related to the first user, on the basis of the stored information about the action history; and outputting the risk information about the first user in response to a request of a second user who is different from the first user.
A recording medium according to Supplementary Note 10 is a recording medium on which a computer program that allows at least one computer to execute an information processing method is recorded, the information processing method including: performing biometric authentication by using biometric information about a first user; acquiring information about an action history of the first user in the case where the biometric authentication is successful; storing the information about the action history; generating risk information indicating a risk related to the first user, on the basis of the stored information about the action history; and outputting the risk information about the first user in response to a request of a second user who is different from the first user.
A computer program according to Supplementary Note 11 is a computer program that allows at least one computer to execute an information processing method, the information processing method including: performing biometric authentication by using biometric information about a first user; acquiring information about an action history of the first user in the case where the biometric authentication is successful; storing the information about the action history; generating risk information indicating a risk related to the first user, on the basis of the stored information about the action history; and outputting the risk information about the first user in response to a request of a second user who is different from the first user.
This disclosure is not limited to the examples described above and is allowed to be changed, if desired, without departing from the essence or spirit of this disclosure which can be read from the claims and the entire specification. An information processing system, an information processing method, and a recording medium with such changes are also intended to be within the technical scope of this disclosure.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2021/022509 | 6/14/2021 | WO |