Exemplary embodiments of the present invention are described below with reference to the accompanying drawings.
The overview and the salient features of a location identification/management system 1 according to a first embodiment of the present invention are described below.
The location identification/management system 1 identifies a location of a moving object based on data that is collected by a plurality of FRID readers 31a to 31c and that is stored in a management server 40. Each of the RFID readers 31a to 31c is located at a different location The location identification/management system 1 is effective in cutting down person-hours, decreasing the risk of missed delivery or entry, enhances ease of use, and decreases the risk of theft of loss.
To explain the salient features more specifically, the management server 40 of the location identification/management system 1 stores card ID uniquely identifying a user and personal data (“employee ID” in the example shown in
A portable IC card reader 10 of the location identification/management system 1 accepts the IC card 20 (which is a contact-type IC card) with the card ID readably stored therein (see (1) of
The portable IC card reader 10 transmits the card ID to the RFID readers 31a to 31c of an RFID tag detection network 30 (see (3) of
The RFID readers 31a to 31c of the RFID tag detection network 30 detect and receive the card ID from the portable IC card reader 10 (see (4) of
The management server 40 identifies the location of the user based on the card ID and the RFID-reader ID received from the RFID readers 31a to 31c (see (6) of
The location identification/management system 1 is built by using the existing IC card 20 and the existing management server 40, without issuing new RFID tags and without installing a new management server, thus cutting down the person-hours, and reducing the risk of missed RFID tag issuing or missed entry of tag ID. The location identification/management system 1 does not need a new IC card, which improves user convenience and reduces the risk to be stolen or lost.
The configuration of the portable IC card reader 10 shown in
The IC card reading unit 11 includes an internal memory for storing various types of data, and executes various processes. In close relevance to the embodiment, the IC card reading unit 11 includes an IC reading unit 11a, a control unit 11b, a radio relaying unit 11c, a memory 11d, and a battery 11e.
The memory 11d stores therein the card ID read by the IC reading unit 11a. The battery 11e supplies power to the IC card reading unit 11 and drives the IC reading unit 11a, the control unit 11b, the radio relaying unit 11c, and the memory 11d.
When the IC card 20 with the card ID readably stored therein is inserted, the IC reading unit 11a reads the card ID from the IC card 20. Specifically, the IC reading unit 11a comes in contact with the IC chip 21 of the IC card 20, and reads the card ID stored in the IC chip 21.
The configuration of the IC card 20 is explained below.
The IC reading unit 11a is arranged in the portable IC card reader 10 at such a spot that the IC reading unit 11a comes in contact with the metal contact 22 when the IC card 20 is inserted into the portable IC card reader 10 completely. When the IC card 20 is inserted into the portable IC card reader 10, the IC reading unit 11a supplies power through the metal contact 22, and reads the card ID stored in the IC chip 21 via the metal contact 22.
Returning to
The radio relaying unit 11c relays the card ID to the RFID readers 31a to 31c of the RFID tag detection network 30. Specifically, the radio relaying unit 11c reads the card ID from the memory 11d, and periodically relays the card ID as RFID to the RFID readers 31a to 31c.
Contents of relayed data that is relayed by the radio relaying unit 11c are described below.
The configuration of the RFID tag detection network 30 according is described below with reference to
As shown in
The RFID readers 31a to 31e detect and receive the card ID relayed by the portable IC card reader 10. Specifically, each of the RFID readers 31a to 31e detects and receives the card ID radio-transmitted in their respective detection range.
The RFID readers 31a to 31c send the card ID along with the unique RFID-reader ID to the management server 40. For example, the RFID readers 31a to 31c sends notification data in the frame format shown in
The configuration of the management server 40 is described below with reference to
The RFID managing unit 41 includes an RFID-reader communication unit 41a, a frame analyzing unit 41b, a personal identification system communication unit 41c, a location identifying unit 41d, and a higher-level application 41e.
The RFID-reader communication unit 41a enables data exchange between the personal management server 40 and the RFID tag detection network 30. Specifically, the RFID-reader communication unit 41a receives notification data from the RFID tag detection network 30 and sends the notification data to the frame analyzing unit 41b.
The frame analyzing unit 41b analyzes the notification data. Specifically, the frame analyzing unit 41b receives notification data from the RFID-reader communication unit 41a and analyzes the notification data. As a result of the analysis, the frame analyzing unit 41b retrieves the card ID and the RFID-reader ID from the notification data, as well as a reception time of receiving the notification data, and sends the retrieved data to the personal identification system communication unit 41c.
The personal identification system communication unit 41c accesses the personal identification managing unit. 42 either to refer to or to store data in a database 42c. Specifically, the personal identification system communication unit 41c sends the card ID received from the frame analyzing unit 41b to a personal identification system controller 42a of the personal identification managing unit 42, retrieves the employee ID corresponding to the card ID from the database 42c (described later with reference to
The location identifying unit 41d identifies the location of the user based on the card ID and the RFID-reader ID notified by the RFID readers 31a to 31c. Specifically, the location identifying unit 41d reads the employee ID corresponding to the card ID received from the personal identification system communication unit 41c, and identifies the location (a location of an RFID reader, for example, Spot 1) of the user identified by the employee ID, and sends the user's location and the reception time to the higher-level application 41e.
The higher-level application 41e is a software application that performs various processes based on the user location and the reception time. Specifically, the higher-level application 41e calculates a route of the user based on the user location and the reception time received from the location identifying unit 41d, and sends the data pertaining to the calculated route of the user (for example, route “1→2→3→4”) to the personal identification system communication unit 41c.
As shown in
The database 42c contains the card ID that uniquely identifies the user and the personal data of the user in an associated form. The database 42c also stores the personal data and the route of the user corresponding to the personal data in an associated form. Specifically, as shown in
The personal identification system controller 42a accesses the database 42c to refer to the data stored in the database 42c or to store data in the database 42c. Specifically, upon receiving the card ID from the personal identification system communication unit 41c, the personal identification system controller 42a accesses the database 42c, retrieves the employee ID corresponding to the card ID, and sends the employee ID to the personal identification system communication unit 41c. Further, upon receiving the data pertaining to the route of the user from the personal identification system communication unit 41c, the personal identification system controller 42a accesses the database 42c and stores the data in the database 42c. The personal identification system controller 42a receives the IC card 20 from another device (such as an entry-access control device that controls entry into or exit from a room), retrieves the employee ID corresponding to the card ID, and sends the employee ID to the higher-level application 42b.
The higher-level application 42b is a software application that performs various processes based on the employee ID. For example, the higher-level application 42b performs individual authentication or entry access control based on the employee ID.
Thus, the card reader carried by the user reads the IC card 20 when the IC card containing the card ID that uniquely identifies the user is inserted into the card reader and relays the card ID to the RFID tag detection network 30. The RFID tag detection network 30 detects and receives the card ID and notifies to the management server 40 the card ID as well as the RFID-reader ID that uniquely identifies each RFID reader 31. The management server 40 identifies the location of the user based on the card ID and the RFID-reader ID. Consequently, without issuing new RFID tags or installing a new management server, the location identification/management system that identifies a location of the user can be established by using the existing personal identification medium and the management server. As a result, the person-hours for building the location identification/management system can be reduced and the risk of missed issuing or missed entry of tag ID can be reduced. Further, the location identification/management system does not need a new IC card, which improves user convenience and reduces the risk to be stolen or lost.
Route calculation is explained according to the first embodiment. In addition, the system can control entry access to a predetermined place based on the calculated route of the user.
In a second embodiment of the present invention, a location identification/management system 2 controls entry access to a predetermined place using the route of the user.
As shown in
The location identification/management system 2 controls entry access to a predetermined place depending on not only the card ID but also the route along which the identified user travels. To give an example, as shown in
To explain in further detail with reference to
In the second embodiment, the management server 40 controls entry access to a predetermined place based on the IC card 20 and based on the route of the identified user, thus enhancing security. It means that if a moving object tries to enter the place via a suspicious route, the location identification/management system can deny an entry access of the moving object.
Although the location identification/management system constantly identifies a location of a user according to the first and the second embodiments, the location identification/management system identifies a location of a user after accepting an entry access into a predetermined place.
In a third embodiment of the present invention, a location identification/management system 3 identifies a location of a user after accepting an entry access to a predetermined place.
As shown in
After accepting the entry access of the user to the predetermined place, the management server 40 of the location identification/management system 3 starts identifying a location of a moving object corresponding to the user. Specifically, the management server 40 determines whether the entry access is acceptable based on the employee ID corresponding to the received card ID. When determining that the entry access is acceptable, the management server 40 starts calculating a route of the user.
To explain in further detail with reference to
In the third embodiment, the management server 40 controls entry access to a predetermined place based on the IC card 20, and identifies a route of the user after the user is allowed entry access to the place. For example, the location identification/management system can identify only users who enter an important place. By limiting users to be identified the location identification/management system enables cutting down in processing load.
The embodiments described above allow various modifications. The modifications to the described embodiments are collectively described below as a fourth embodiment of the present invention.
A magnetic stripe card 20a or a contactless IC card 20b can also be used instead of the contact-type IC card 20 that is used for identifying a location of a user. The magnetic stripe card 20a and the contactless IC card 20b are explained below in detail. As shown in
The process of how a portable magnetic stripe card reader 10a reads data from the magnetic stripe card 20a is explained below. As shown in
In the above embodiments, the portable IC card reader 10 relays the card ID when the IC card 20 is inserted and does not relay any data when the IC card 20 is not inserted. However, the portable IC card reader 10 can be configured to relay data even if the IC card 20 is not inserted. Alternatively, the portable IC card reader 10 may be configured to relays data related to the portable card reader itself along with the card ID.
Specifically, as shown in
Although the single management server 40 includes the RFID managing unit 41 that identifies the location of the user and the personal identification managing unit 42 that manages the personal identification medium, two management servers can be provided separately for the two functions. Specifically, as shown in
In the above embodiments, the portable IC card reader 10 performs radio relay of the card ID with the IC card 20 inserted therein. However, the portable IC card reader 10 can be configured to perform radio relay of the card ID when the IC card 20 is inserted once and removed thereafter. In other words, the card ID is stored in the memory lid, and the portable IC card reader 10 can read the card ID even after the IC card has been removed.
In the second embodiment, the management server 40 controls the entry access based on the user route. However, the management server 40 can be configured to control entry access based on a traveling period or a traveling distance. For example, the management server 40 can be configured to deny entry access from a user who takes a long time to achieve a specific spot.
The constituent elements of the device illustrated are merely conceptual and may not necessarily physically resemble the structures shown in the drawings. For instance, the device need not necessarily have the structure that is illustrated. The device as a whole or in parts can be broken down or integrated either functionally or physically in accordance with the load or how the device is to be used. For example, the IC reading unit 11a and the control unit 11b can be integrated. Further, the process functions performed by the device can be entirely or partially realized by a central processing unit (CPU) or a computer program executed by the CPU or by a hardware using wired logic.
According to an embodiment of the present invention, the location identification/management system can be built by using an existing personal identification medium and an existing management server, without distributing a new RFID tag or installing a new management server, thus cutting down the person-hours and reducing the risk of missed RFID tag issuing or missed entry of tag ID. Further, the location identification/management system does not need a new IC card, which improves user convenience and reduces the risk to be stolen or lost.
Moreover, if a moving object tries to enter a predetermined place via a suspicious route, the location identification/management system can deny an entry access of the moving object. This configuration makes it possible to enhance security.
Furthermore, the location identification/management system can identify, for example, only users who enter an important place. By limiting users to be identified the location identification/management system enables cutting down in processing load.
Although the invention has been described with respect to specific embodiments for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art that fairly fall within the basic teaching herein set forth.
Number | Date | Country | Kind |
---|---|---|---|
2006-287923 | Oct 2006 | JP | national |