This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2008-259955, filed on Oct. 6, 2008, the entire contents of which are incorporated herein by reference.
The embodiments discussed herein are related to security in a plurality of facilities used by many people, and to a security system, a security program and a security method to control authority for using areas such as facilities and to prevent service provision, etc. for a person who does not have the authority therefor.
A security system of unlocking a door, logging in to a PC (personal computer), etc. by using an ID (IDentification) card or a password for personal authentication is popularized. In such system, an authentication operation is requested every facility such as a room or every device. In case of accompanying a move such as ingress to facilities, authentication requested all ingress is complicated and very troublesome. Therefore, there is a system that a position of an authenticated person is grasped by using combination of devices such as a camera and a laser sensor, and the authenticated person can unlock a door and log in to a PC without re-authentication for enhancing convenience.
Concerning such security system, Japanese Laid-Open Patent Publication No. 2004-185484 discloses that a person is traced by a camera and when certification is performed, a person's move trace is correlated with certification information, thereby, unlocking is judged on the basis of checking an attribute of a person's move trace (being certified) without certifying a person in front of a door.
Japanese Laid-Open Patent Publication No. 09-16523 discloses that different authentication is requested according to importance of operation contents and even if authority is acquired by the authentication, the authority is returned after certain time has passed, thereby, an unauthorized person is prevented from performing an important operation.
Japanese Laid-Open Patent Publication No. 09-297735 discloses that during service provision for a user, if another user who does not use the service comes in a service usable zone, the service is interrupted to prevent another user from being provided the service.
Japanese Laid-Open Patent Publication No. 2003-223421 discloses that operating errors and illicit operations are prevented by enabling operations only when a person of access authority (high-user) is present other than a user, so that a third party observes an operation of the user.
In the system of correlating a person's move trace to certification information (Japanese Laid-Open Patent Publication No. 2004-185484), if one person crosses another person and another person is erroneously traced after certification, a certified result is correlated with a third party other than an original. This case may cause a risk of lowering security that an uncertified person is accepted and service is provided for the person. It is needed that only a certified person holds use authority and service provision for another person posing as the certified person is prevented.
In the case where different authentication is performed according to importance of operation contents (Japanese Laid-Open Patent Publication No. 09-16523), since authority is returned after certain time has passed, it is possible for another person to take the place of an authenticated person within the certain time. If the certain time is set more shortly in order to prevent this possibility, convenience is lost.
In the system that during service provision for a user, if another user who does not use the service comes in a service usable zone, the service is interrupted (Japanese Laid-Open Patent Publication No. 09-297735), there is a problem that when another user and the user approach and replace each other, illicit use becomes possible since only an operation of a device is controlled but user's access authority is not changed even if another user approaches.
In the system that operations are enabled only when a person of access authority (high-user) is present other than a user, so that a third party observes an operation of the user (Japanese Laid-Open Patent Publication No. 2003-223421), there is a problem that an access is enabled irrelevantly to a state of a high-authority user once user authentication is performed and the user obtains operation authority because a position of a person is not detected.
Concerning such requests and problems, there is no disclosure nor suggestion thereof in any of Japanese Laid-Open Patent Publications Nos. 2004-185484, 09-16523, 09-297735 and 2003-223421, and no disclosure or suggestion about the structure, etc. for solving them is presented.
According to an aspect of embodiments of the invention, there is provided a security system to give a user in a specific area use authority based on authentication, and to permit use of the specific area by the use authority. The security system includes an authentication unit to authenticate a user, a position detection unit to detect at least one of a position and move of a user, and a use authority control unit to monitor at least one of a position and move of a user to whom the use authority is given based on the authentication of the authentication unit by a detection output of the position detection unit, and, if a distance between users is equal to or below a predetermined value, to change the use authority which is given to each user.
In the above structure, since at least one of the position and move of the user who is authenticated by the authentication unit is detected by the position detection unit, the use authority control unit monitors at least one of the position and move of the user to whom use authority is given based on the authentication by the authentication unit by the detection output of the position detection unit, and if the distance between users is equal to or below the predetermined value, use authority given to each user is changed. When the user contacts with another user, that is, when the distance between users is equal to or below the predetermined value, security level is improved by changing use authority. If there is no contact with another user, the authenticated user can maintain use authority thereof to enable convenience to be enhanced and to enable high security to be maintained.
According to another aspect of the embodiments of the invention, there is provided a security method to give a user in a specific area use authority based on authentication, and to permit use of the specific area by the use authority. The security method includes authenticating a user, detecting at least one of a position and move of a user, and monitoring at least one of a position and move of a user to whom the use authority is given based on the authentication, and, if a distance between users is equal to or below a predetermined value, changing the use authority which is given to each user.
According to another aspect of the embodiments of the invention, there is provided a computer-readable recording medium storing a security program that includes a function to give a user in a specific area use authority based on authentication, and to permit use of the specific area by the use authority, and that causes a computer to execute the function. The program includes authenticating a user, taking in detection information representing a position and a move of a user, and monitoring a position and a move of a user to whom the use authority is given based on the authentication by the detection information, and, if a distance between users is equal to or below a predetermined value, changing the use authority which is given to each user.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
Other objects, features and advantages of the embodiments of the present invention are more clearly understood by referring to the attached drawings and each of the embodiments.
The embodiments of the present invention give use authority to a user by authentication. Authentication for a user who is given the use authority once can be omitted, and convenience is enhanced. Moreover, correspondingly to a distance between a user and another user (contact with the others, etc.), the use authority is changed, and thereby, use of the authority by the others who do not have the use authority is prevented. That is, if a user approaches another user who has lower authority than the user after authentication, a level of the use authority is lowered. For improvement of convenience by reduction of the number of authentication, the use authority is changed by a distance between users (approach) and use of a room without the use authority and logging in a PC without the use authority are prevented. Thus, prevention of lowering security and enhancement of convenience are promoted.
A first embodiment is described with reference to
This security system 2A is configured as follows: a person who enters into a monitored range set as a particular area is requested to be authenticated; use authority is given by establishment of the authentication, and a user who is given the use authority is traced to be maintained the use authority without requesting authentication repeatedly; positions of all the people within the monitored range are detected by a position detection means (unit) such as a camera and a radar, and if a person who has the use authority approaches a person who does not have the use authority, the use authority is controlled in accordance with the use authority of the approaching person, and service provision for those who do not have the use authority or those who have limited use authority is prevented even if persons (approaching persons) replaces each other and a replaced person is erroneously traced.
This security system 2A includes, as depicted in
The authentication apparatus 6 is an input means (unit) to input authentication information of biometrics information such as fingerprints, veins and irises, and information used for authentication such as user ID and authentication apparatus ID.
The person position detection device 8 is, for example, configured by imaging devices 12A and 12B as a single or a plurality of image capturing means (units). The person position detection device 8 provides an image representing a detected person and tracing thereof for the processor 4A. The imaging devices 12A and 12B are means (units) locating a person such as a laser sensor and an RFID (Radio Frequency Identification) reader. A means (unit) having such function can be replaced with the imaging device 12A and 12B. That is, the person position detection device 8 configures a user tracing means (unit) along with the processor 4A.
The door device 10 includes a door 14, an electric lock 16 and a door control device 18. The door 14 is an open and close door disposed at an entrance of a room which is a monitored range. The electric lock 16 unlocks and locks the door 14 as a means (part) to permit and prohibit a person through the door 14. The door control device 18 is controlled by the processor 4A, and is a control means (unit) to lock and unlock the electric lock 16.
The processor 4A includes an authentication information database 20A, a person information database 22A, an authentication unit 24, a person position detection and tracing unit 26, a person position-authentication information correlating unit 28, a distance between persons measurer 30, a use authority change unit 32 and a door open and close instruction unit 34 as means (unit) controlling use authority based on authentication, and detection and tracing of a person.
The authentication information database 20A is a database where information for executing a user authentication process such as user ID managing authentication information of a user, a name of a registered person, registered authentication information determining whether to be an original person compared with authentication information and authority to enter a room to represent a door through which the registered person can be enter. This authentication information database 20A stores information representing ID for authentication, a name, registered authentication information, authority to enter a room, etc.
The person information database 22A is a database where information representing a person's current status is registered for each person. The information representing a person's current status is tracing data ID managing tracing data, user ID representing whose the trace data is, authority to enter a room to represent a door which can be currently unlocked, a person's current position, move trace and so on. The person information database 22A stores person information such as tracing data ID, a person's position and authority to enter a room.
The authentication unit 24 is an authentication means (unit) executing authentication for a user based on input authentication information such as biometrics information inputted into the authentication apparatus 6 and registered authentication information in the authentication information database 20A. The authentication unit 24 checks input authentication information such as user ID, authentication information and authentication apparatus ID inputted from the authentication apparatus 6 with registered information such as user ID, authentication information and authority to enter a room in the authentication information database 20A. As a result of authentication thereof, the user ID, the authentication apparatus ID, the authority to enter a room, etc. are outputted to be provided for the person position-authentication information correlating unit 28.
The person position detection and tracing unit 26 is one example of a position detection means (unit) detecting at least one of a user's position and move. The person position detection and tracing unit 26 detects a person from an image obtained by the imaging devices 12A and 12B, detects a position of a person, and traces a move thereof to generate person information (user information) such as tracing data ID and a person's position. This person information is stored into the person information database 22A.
The person position-authentication information correlating unit 28 is a means (unit) correlating authentication information with a person position to give access authority to a user as use authority. In this person position-authentication information correlating unit 28, tracing data ID, user ID and authority to enter a room are correlated with tracing data ID and a person position in the person information database 22A.
The distance between persons measurer 30 is a means (unit) reading out a person's position information from the person information database 22A to measure a distance between users. That is, in the distance between persons measurer 30, a distance between persons is measured from tracing data ID, and it is detected whether the distance is equal to or under a predetermined value, that is, whether a user is in a predetermined distance from another user.
The use authority change unit 32 is a means (unit) changing access authority given to a user according to a distance measured by the distance between persons measurer 30. The use authority change unit 32 changes access authority for a user according to tracing data ID
The door open and close instruction unit 34 is a means (unit) instructing open and close of the door 14 from a user's position and access authority. An instruction signal of the open and close is outputted to the door control device 18 of the door device 10. In this case, the door open and close instruction unit 34 gives authority to enter a room according to a person position. The door control device 18 locks and unlocks the electric lock 16 of the door 14 based on instruction from the door open and close instruction unit 34.
A hardware configuration of the processor 4A is described with reference to
This processor 4A provides hardware for realizing the above described function. As depicted in
The central processor 36 provides a controller 46 and an arithmetic device 48. The central processor 36 is configured by a CPU (Central Processing Unit), executes an OS (Operating System) and an application in the main storage 38, and composes, along with a RAM (Random-Access Memory), function units such as the above described authentication unit 24, the person position detection and tracing unit 26, the person position-authentication information correlating unit 28, the distance between persons measurer 30, the use authority change unit 32 and the door open and close instruction unit 34. The controller 46 controls the main storage 38, the sub-storage 40 and the arithmetic device 48 to control writing and reading data, arithmetic calculation, etc. The arithmetic device 48 executes various types of arithmetic calculation such as verification of authentication information, arithmetic calculation of measuring distance between persons and giving authority to a user.
The main storage 38 is a means (unit) storing a program, etc. The main storage 38 is configured by a recording medium storing the above described OS and various application programs such as a security program. The sub-storage 40 is configured by a data storing means (part) and a recording medium such as a RAM, and composes various databases such as the above described authentication information database 20A and the person information database 22A.
The input device 42 is a means (unit) for inputting various data. This input device 42 includes the authentication apparatus 6 for executing authentication, one or more of the imaging devices 12A and 12B for grasping a person position in a monitored range.
The output device 44 is a means (unit), in response to an arithmetic calculation output and a control output from the processor 4A, executing an operation corresponding thereto. This output device 44 includes the above described door device 10. The door control device 18 controls locking and unlocking the electric key 16 of the door 14 by a control signal outputted from the processor 4A.
The display 45 is a means (part) displaying result information and notification information, and is configured, for example, by an LCD (Liquid Crystal Display) or a CRT (Cathode-Ray Tube). This display 45 is used for a call on re-authentication, etc.
The authentication information database 20A is described with reference to
For the authentication information database 20A (
The person information database 22A is described with reference to
For the person information database 22A (
According to this person information data table 60, for example, a person position of tracing data ID “001” and user ID “000001” moves to a coordinate position of a move trace. A current authority to enter a room is such that the rooms A and B and the meeting room can be used, but the executive room cannot be used.
Managing a user's state and management process of a user's state are described with reference to
In this security system 2A (
In processing procedure of a management process of a user's state, as depicted in
In step S101, a position of a person who is always within a monitored range is grasped by the person position detection and tracing unit 26 based on an image obtained from the imaging devices 12A and 12B (
In step S102, when a user enters a room, authentication is executed by the authentication apparatus 6. Concretely, by a method displaying a dialog for user authentication on a display to execute authentication using a user and a password and an authentication method utilizing an authentication apparatus using veins and fingerprints, the authentication unit 24 checks input authentication information inputted from the authentication apparatus 6 with registered information in the authentication information database 20A to specify an individual. If authentication is not executed because there is no registration in the authentication information database 20A in advance, etc., the procedure transmits to step S104.
In step S103, when authentication is executed (step S102), person authentication information and a person are correlated from a positional relationship between a person position stored in the person information database 22A and a place where authentication is executed. Concretely, a position of the authentication apparatus 6 and authentication apparatus ID which the authentication apparatus 6 has are correlated in advance, user ID determined by authentication is registered to a user of tracing data ID who is at the nearest position to a place of the authentication apparatus 6 where the authentication is executed. At the same time, since authority to enter a room corresponding to a user is also known, authority to enter a room in the person information database 22A is updated based on the authority to enter a room corresponding to the user.
In step S104, a positional relationship is calculated by using a position of each person. If a state where a distance between persons is equal to or below a predetermined distance is detected (step S105), the procedure transmits to step S106.
In step S106, authority to enter a room of each user who is within a predetermined distance of a distance between persons is read out from the person information database 22A. With using the readout authority to enter a room, the authority to enter a room of each user is changed. Concretely, a logical AND (conjunction) of the authority to enter a room that each user currently has is calculated to be rendered the authority to enter a room of each user.
Through step S105 or step S106, the procedure returns to step S101, and the above described processes are repeated.
In the processing procedure of controlling opening and closing a door, as depicted in
In this case, in step S111, the person information database 22A is accessed, and a person position, user ID, authority to enter a room, etc. are read out. In step S112, whether there is a person on the periphery of each door is confirmed by using the person position. If there is a person on the periphery of each door, the procedure transmits to step S113. In step S113, if the person on the periphery of the door has authority to enter a room of this door, the door is unlocked. After the door is unlocked, the above described processes are repeated.
A concrete example of the security system 2A according to the first embodiment is described with reference to
This example is a case where the above described security system 2A is used for an environment such as a plurality of rooms that a plurality of users use. The example depicts a changing example of authority to enter a room that changes according to a distance between users.
The rooms A, B, C and D are disposed as monitored areas in a building 90 as an environment where the security system 2A is disposed as depicted in
Users 1, 2, 3 and 4 are assumed to have authority to use each room A, B, C and D (
Supposing that these users 1, 2, 3 and 4 move as depicted in
The move and use authority of the user 1 are changed as depicted in
At a time point when the user 1 is authenticated and determined to be the user 1, in the person information database 22A, user ID is set to “user 1”, authority to enter the rooms A, B and D which the user 1 has is rendered presence, that is, authority is rendered “o”, to give this person authority to enter the rooms A, B and D (f12 of
It is possible that the user 2 is recognized as the user 1 if the user 1 approaches the user 2 on the way to moving to the room B through the corridor 92 from the room A after the user 1 works in the room A. Then, the user 1 loses authority to enter the room A that an approached person (user 2) does not have, that is, use authority is changed, and the user 2 loses authority to enter the room C that an approaching person (user 1) does not have. I. e., use authority is also changed concerning the user 2. In short, the authority of both is changed to authority to enter only the rooms B and D that is calculated from a logical AND (conjunction) of the authority of both (f13 of
If an authority level-room entrance conversion table 108 (
In this case, an authentication information data table 114 (
An example of changing authority to enter a room when such authority level is used under the above described environment (
A move and use authority of the user 1 changes as depicted in
As depicted in
It is possible that the user 2 is recognized as the user 1 if the user 1 approaches the user 2 on the way to moving to the room B after the user 1 works in the room A. Then, levels of the users 1 and 2 are set to a lower level out of the levels thereof (f23). Since the level of the user 2 is lower, in the person information database 22A, authority level of the user 1 to enter a room is rewritten to “3”. However, since the level of the user 1 to enter a room is “3” and the user 1 has authority to enter the room B, the user 1 can enter the room B without authentication. Afterward, when the user 1 approaches the user 3, authority to enter a room that each user currently has is compared similarly, and levels of the users 1 and 3 are set to a lower level out of the levels thereof. In this case, in the person information database 22A, authority level of the user 1 to enter a room is set to “1” as well as the previous case (f24). If authority to enter a room is lost, authority which is originally given to the user 1 is given again at a time point when authentication is executed again, and it is confirmed who a person is. Thus, an authority level to enter a room “4” can be obtained again in this case (f25). When the user 1 approaches the user 4 in a room, authority levels of users are set to a lower level out of the levels thereof, similarly (f26).
According to the first embodiment, when a user approaches another user who has lower authority than the user and it does not determined which user has authority after the user is authenticated, the authority are lowered. Thus, the security system 2A does not erroneously permit another user who does not have use authority to enter a room, to prevent lowering of security. Other features and advantages of the first embodiment are listed as follows.
(1) Erroneous service provision for a person who does not have access authority can be prevented, and access authority can be controlled.
(2) A system can be structured such that the use authority is added to a user and service can be provided for the user without authentication every time, and illicit use that service is provided for a person who does not have the use authority can be prevented by changing the use authority of a user according to distance between users.
(3) By correlating a person's position with use authority based on tracing of a user, a system that once authentication is executed, service can be provided without authentication every time can be structured, and illicit use that service is provided for a person who does not have use authority can be prevented.
(4) With including a system detecting and tracing a person's position and a system authenticating a person, a system that the authority for receiving service (use authority) is given by authentication procedure can be configured, and if a distance between persons becomes a predetermined value or under this value, use authority of each person can be changed according to use authority states of both users.
(5) A function that use authority of a person is set in incremental levels, and if a distance between persons becomes a predetermined value or under this value, each level of use authority is set to a lower level out of levels of the persons can maintain a security level without requesting authentication repeatedly.
(6) A user tracing means (unit) that traces an authenticated user is included. A use authority control means (unit) is configured to maintain user's use authority or changed use authority based on tracing of the user tracing means (unit). Thus, convenience can be enhanced without requesting authentication repeatedly.
(7) Since a function that use authority of a person is set by service, and if a distance between persons becomes a predetermined value or under this value, use authority of each person is changed to use authority calculated from a logical AND by service is included, a security level can be set by service to enhance convenience.
(8) If a function that each person is deprived of one's use authority when a distance between persons becomes a predetermined value or under this value is included, a high security level can be maintained.
(9) When use authority is changed, executing authentication again in an authentication system can restore the changed use authority to the use authority that a person originally had. Thus, while a security level is maintained, convenience can be enhanced.
(10) If use authority which a user currently has is displayed on the display 45, a user can confirm one's own use authority, and an administrator can know a relationship between use authority and a user through display information easily.
(11) In systems detecting a person's position, authenticating a person and giving use authority by authentication procedure, if a state where a distance between an authenticated person and a person on the periphery of the authenticated person is within a predetermined value when authentication is executed is detected, the structure that use authority is not given to the authenticated person can be made. Such structure can enhance a security level more.
(12) If use authority is not given if a state where a distance between an authenticated person and a person on the periphery of the authenticated person is within a predetermined value when authentication is executed is detected, lowering a security level by acceptance of another person can be caught.
A second embodiment is described with reference to
This security system 2B (
This security system 2B includes, as depicted in
The processor 4B includes an authentication information database 20B, a person information database 22B, the authentication unit 24, the person position detection and tracing unit 26, the person position-authentication information correlating unit 28, the distance between persons measurer 30, the use authority change unit 32, the door open and close instruction unit 34 and a PC display control unit 142 as a control means (unit) controlling use authority based on authentication, and detection and tracing of a person, controlling display of the PC 140, etc.
The authentication information database 20B is a database where information for executing a user authentication process such as user ID managing authentication information of a user, a name of a registered person, registered authentication information determining whether to be an original person compared with authentication information and authority to enter a room to represent a door through which the registered person can be enter as well as the first embodiment. This authentication information database 20B stores information representing ID for authentication, a name, registered authentication information, authority to enter a room, etc.
The person information database 22B is a database where information such as tracing data ID managing tracing data, user ID representing whose the tracing data is, authority to enter a room to represent a door which can be currently unlocked, authority to use a PC, etc. is registered for each person.
The authentication unit 24 is an authentication means (unit) executing authentication for a user based on input authentication information such as biometrics information inputted into the authentication apparatus 6 and registered authentication information in the authentication information database 20B. The authentication unit 24 checks input authentication information such as user ID, authentication information and authentication apparatus ID inputted from the authentication apparatus 6, with registered information such as user ID, authentication information and authority to enter a room in the authentication information database 20B. As a result of authentication thereof, the user ID, the authentication information, the authority to enter a room, the authority to use a PC, etc. are outputted to be provided for the person position-authentication information correlating unit 28.
The person position detection and tracing unit 26 is one example of a position detection means (unit) detecting at least one of a user's position and move as well as the first embodiment. The person position detection and tracing unit 26 detects a person from an image obtained by the imaging devices 12A and 12B, detects a position of a person, and traces a move thereof to generate person information (user information) such as tracing data ID and a person position. This person information is stored into the person information database 22B.
The person position-authentication information correlating unit 28 is a means (unit) correlating authentication information with a person position to give access authority to a user as use authority as well as the first embodiment. In this person position-authentication information correlating unit 28, tracing data ID, person ID, authority to enter a room and authority to use a PC are correlated with tracing data ID and a person position in the person information database 22B.
The distance between persons measurer 30, the use authority change unit 32, and the door open and close instruction unit 34 are the same as the first embodiment.
The PC display control unit 142 is given information about authority to use a PC, set for a user, from the person information database 22B correspondingly to a person position, and outputs a control signal based thereon. This control signal is a control signal of permitting or prohibiting logging in to the PC 140.
A hardware configuration of the processor 4B is the same as the hardware configuration depicted in
In this embodiment, control of authority to enter a room and control of logging in to the PC 140 are executed by the person position detection and tracing unit 26 detecting and tracing a person from an image obtained by the imaging devices 12A and 12B, the authentication unit 24 executing authentication based on the authentication information database 20B, the person position-authentication information correlation unit 28 correlating authentication information and a personal position to give access authority, the distance between persons measurer 30 reading out a position of a person from the person information database 22B to measure a distance between each person, the use authority change unit 32 changing use authority of each person according to a distance therebetween, the door open and close instruction unit 34 instructing opening and closing a door from a person's position and access authority thereof, and the PC display control unit 142 executing booting a PC screen from a person's position and the access authority thereof.
The authentication information database 20B is described with reference to
The authentication information database 20B (
For this authentication information data table 144, as depicted in
The person information database 22B (
For this person information data table 156, as depicted in
According to this person information data table 156, for example, a person position of tracing data ID “001” and user ID “000001” moves to a coordinate position of a move trace (x, y). Current authority to use a PC is set to the PC α. Current authority to enter a room is such that the rooms A and B and the meeting room can be used, but the executive room cannot be used.
A management process of a user's state and a control process opening and closing a door, and logging in to a PC are described with reference to
In this security system 2B (
In processing procedure of a management process of a user's state, as depicted in
In the processing procedure of this state management process, in step S201, a position of a person who is always within a monitored range is grasped by the person position detection and tracing unit 26 based on an image obtained by the imaging devices 12A and 12B. In this embodiment, the imaging devices 12A and 12B are disposed at every place of the monitored areas such as a room and a corridor. Thus, a person is traced continuously wherever the person is. Concerning a method for tracing a person, for example, there is a method using a back projection method and a Kalman filter as a method for recognizing a person's position by using a plurality of cameras (for example, Document 1: HAYASAKA Mitsuharu, TOMINAGA Hideyoshi and KOMIYA Kazumi, “Multiple Object Tracking Using Back Projection Method and Kalman Filter”, PRMU 2001-132, pp. 133-138, November, 2001.). As a method using a laser beam, there is a method that person's feet is measured by using a multiple single-row laser range scanners (for example, Document 2: NAKAMURA Katsuyuki, “Tracking Pedestrian using Multiple Single-row Laser Range Scanners and Its Reliability Evaluation”, Denshi Jyoho Tushin Gakkai Ronbunshi D-II, vol. J88-D-II, no. 7, pp. 1143-1152, July., 2005).
A person position is stored into the person information database 22B by obtained tracing data ID at any time. Since it is not known who a person detected for the first time is, initialization is executed so as not to have all of user ID and authority to enter a room.
In step S202, when a user enters a room or logs in to the PC 140, authentication is executed. Concretely, by a method displaying a dialog for user authentication on a display 143 of the PC 140 to execute authentication using a user and a password and an authentication method utilizing an authentication apparatus using veins and fingerprints, check with the authentication information database 20B is performed to specify an individual. If authentication is not executed because there is no registration in the authentication information database 20B in advance, etc., the procedure transmits to step S204.
In step S203, when authentication of step S202 is executed, person authentication information and a person are correlated from a positional relationship between a person position stored in the person information database 22B and a place where authentication is executed. Concretely, a position of an authentication apparatus and authentication apparatus ID are correlated in advance, user ID determined by authentication is registered to a user of tracing data ID who is at the nearest position to a place of the authentication apparatus where the authentication is executed. At the same time, since authority to enter a room and authority to use the PC 140 corresponding to the user are known, use authority in the person information database 22B is also updated.
In step S204, a positional relationship is calculated by using a position of each person. If a state where a distance between persons is equal to or below a predetermined distance is detected (YES of step S205), the procedure transmits to step S206.
In step S206, authority to enter a room and authority to use the PC 140 of each user who is within a predetermined distance of a distance between persons are read out from the person information database 22B. With using the read out authority to enter a room and to use the PC 140, use authority of each user is changed. Concretely, a logical AND of the authority which each user currently has is calculated to be rendered the use authority of each user.
Through step S205 or step S206, the procedure returns to step S201, and the above described processes are repeated.
In the processing procedure of control processes of opening and closing a door and logging in to a PC, as depicted in
In step S215, whether there is a person on the periphery of a PC is confirmed by using a person position. If there is a person on the periphery of the PC (YES of step S215), whether the person on the periphery of a door has authority to use the PC is determined (step S216). If the person on the periphery of the door has authority to use the PC, (YES of step S216), a PC screen is changed to a logging in state (step S217), and logging in is automatically carried out. If the person on the periphery of the door does not have authority to use the PC, (NO of step S216), the PC screen is changed to an authentication stand-by state (step S218).
After a process of step S217 or step S218, the procedure returns to step S201 to repeat the above described processes.
A concrete example of the security system 2B according to the second embodiment is described with reference to
This example is a case where the above described security system 2B is used for an environment such as a plurality of rooms that a plurality of users use. The example depicts a changing example of authority to enter a room and to use a PC that changes according to a distance between users.
The rooms A and B are disposed as monitored areas in the building 90 as an environment where the security system 2B is disposed as depicted in
In this case, users 1 and 2 (
In this case, the user 1 moves, as depicted in
If an authority level-usable information conversion table 218 (
Information such as user ID managing authentication information of a user, a name of a registered person, registered authentication information for determining whether to be an original person compared with authentication information, authority level which a person has is registered. In the person information database 22B, as depicted in
In this authority level (
At a time point when the user 1 is authenticated and determined to be the user 1, in the person information database 22B, user ID is set to “user 1”, an authority level that the user 1 has is “4”, and the user 1 can enter the rooms A and B and use the PCs α and β according to this authority level (f42).
Since authority to use a PC is also obtained once authentication is executed, a PC can be used without re-authentication. However, it is possible that the user 2 is erroneously recognized as the user 1 if the user 1 approaches the user 2 after the user 1 enters the room A. Then, authority levels of the user 1 and the user 2 are compared, and both authority levels are set to a lower level out of both levels. In short, since the authority levels are set to a lower level of both levels in this case, an authority level “2” of the user 2 is given to the user 1, and in the person information database 22B, the authority level of the user 1 is rewritten into “2” (f43)
The authority level of the user 1 in the person information database 22B is rewritten into the original level “4” by authentication by an authentication apparatus of a PC and a door again to allow to log in to the PC β and to enter the room B (f44).
As described above, in the second embodiment, when a person approaches another person,who has lower authority than the person and it is unknown which has authority after the person is authenticated, use authority is lowered. Thus, there is not a case where a person who does not have use authority is erroneously permitted to enter a room or to log in to a PC, and lowering security can be prevented.
A third embodiment is described with reference to
A security system according to the third embodiment has the same configuration as the security system 2A of the first embodiment. Thus, description about a configuration of a device refers to
In this security system according to the third embodiment, processing procedure of a managing process of a user's state (
In processing procedure of a managing process of a user's state, as depicted in
In this processing procedure, in step S301, a position of a person who is always within a monitored range is grasped by the person position detection and tracing unit 26 based on an image obtained from the imaging devices 12A and 12B. In this embodiment, as depicted in
In step S302, when a user enters a room, authentication is executed by an authentication apparatus. In this case, by a method displaying a dialog for user authentication on a display of the display 45 (
Instep S303, when authentication is executed instep S302, a positional relationship among persons on the periphery of the authentication apparatus 6 where authentication is executed is checked by a person position stored in the person information database 22A (step S304). At that time, if a state where a distance between a person who is considered to be authenticated and a person on the periphery of the authentication apparatus 6 is equal to or below a predetermined distance is detected (YES of step S304), an authentication result is not correlated with a person, it is informed to a user that authority to enter a room is not given, and re-authentication is called (step S305). This call may be executed via the display 45.
If the state is not detected (NO of step S304), authentication information and a person's position are correlated from a positional relationship between an authenticated person and a place where authentication is performed (step S306). Concretely, a position of the authentication apparatus 6 and authentication apparatus ID are correlated in advance, and user ID determined by authentication is registered to a user of tracing data ID who is the nearest position to a place of the authentication apparatus 6 where authentication is executed. At the same time, since authority to enter a room and to use a PC corresponding to a user (second embodiment) also becomes clear, use authority in the person information database 22A (
Through step S305 or step S306, the procedure returns to step S301, and the above described processes are repeated.
In the processing procedure of controlling opening and closing a door, as depicted in
If there is a person on the periphery of each door (YES of step S312), it is determined whether the person on the periphery of the door has authority to enter a room through the door (step S313), and if the person on the periphery of the door has authority to enter a room through the door (YES of step S313), the door is unlocked (step S314).
After passing through step S313 or step S314, the procedure returns to step S311, and the above described processes are repeated.
Concerning operating under such environment, in an authentication operation when authentication is executed to only one person (
For such one person authentication, if, when an authenticated operation is carried out to the user P1, there are users P2 and P3 on the periphery of the user P1 as another person or a plurality of the others as depicted in
Such operation can prevent logging in by others who do not have use authority concerning logging in to a PC.
As described above, since authority is not given when it is unclear to whom authority is given at a time point when authentication is executed, there is not a case where a system erroneously permits a person who does not have authority to enter a room or to log in to a PC, and lowering security can be prevented.
Technical ideas are then enumerated that are extracted from the embodiments of the present invention described above. The technical ideas according to the present invention, from superordinate concepts to subordinate concepts, can be grasped at various levels and in various variations and the present invention is not limited to the following description.
In the above security system, preferably, the use authority control unit may set use authority of the same or a different level to users based on the authentication, and, if a distance between the users is equal to or below a predetermined value, the use authority which is set for each user may be changed to use authority of the lowest level.
The above security system may preferably include a user trace unit to trace an authenticated user, wherein the use authority control unit maintains the use authority or the changed use authority of the user based on tracing of the user tracing unit.
According to such structure, use authority of an authenticated user is maintained based on tracing information in a user tracing unit. Use authority thereof is original use authority or use authority lowered by the above described contact with another person. Thus, use authority can be maintained without repeated authentication, and convenience can be enhanced without lowering security level.
In above the security system, preferably, the use authority control unit may set the use authority for every service, and, if a distance between users is equal to or below a predetermined value, the use authority which is set for each user may be changed into use authority which is calculated from a logical conjunction with service.
In the above security system, preferably, the use authority control unit may lower or cancel the use authority of each user if a distance between users is equal to or below a predetermined value.
In the above security system, preferably, the use authority control unit may receive new use authority by a user whose use authority is changed being authenticated again.
In the above security system, preferably, the use authority control unit may not give the use authority to the authenticated user if it is detected that a distance between the authenticated user and another user is equal to or below a predetermined value.
In the above security system, preferably, the use authority control unit may include a notification unit to notify that the use authority is not given when authenticated if it is detected that a distance between the authenticated user and another user is equal to or below a predetermined value.
The above security method may preferably include setting use authority of the same or a different level to users based on the authentication, and, if a distance between the users is equal to or below a predetermined value, changing the use authority which is set for each user to use authority of the lowest level.
The above security method may preferably include maintaining the use authority or changed use authority of the user based on tracing information of the authenticated user.
The above security method may preferably include setting the use authority for every service, and, if a distance between users is equal to or below a predetermined value, changing the use authority which is set for each user into use authority which is calculated from a logical conjunction with service.
The above security method may preferably include lowering or canceling the use authority of each user if a distance between users is equal to or below a predetermined value.
The above security method may preferably include receiving new use authority by a user whose use authority is changed being authenticated again.
The above security method may preferably include not giving the use authority to the authenticated user if it is detected that a distance between the authenticated user and another user is equal to or below a predetermined value.
The above security method may preferably include notifying that the use authority is not given when authenticated if it is detected that a distance between the authenticated user and another user is equal to or below a predetermined value.
In the above recording medium, the program may preferably include setting use authority of the same or a different level to users based on the authentication, and, if a distance between the users is equal to or below a predetermined value, changing the use authority which is set for each user to use authority of the lowest level.
In the above recording medium, the program may preferably include maintaining the use authority or changed use authority of the user based on tracing information of the authenticated user.
In the above recording medium, the program may preferably include setting the use authority for every service, and, if a distance between users is equal to or below a predetermined value, changing the use authority which is set for each user into use authority which is calculated from a logical conjunction with service.
In the above recording medium, the program may preferably include lowering or canceling the use authority of each user if a distance between users is equal to or below a predetermined value.
In the above recording medium, the program may preferably include receiving new use authority by a user whose use authority is changed being authenticated again.
In the above recording medium, the program may preferably include not giving the use authority to the authenticated user if it is detected that a distance between the authenticated user and another user is equal to or below a predetermined value.
The above recording medium may preferably include notifying that the use authority is not given when authenticated if it is detected that if a distance between the authenticated user and another user is equal to or below a predetermined value.
According to the embodiments of the present invention, following effects can be obtained.
(1) A user can use provided service, etc. in a specific area based on use authority given by being authenticated. Convenience such that once authenticated, use authority is maintained without requesting authentication-repeatedly can be enhanced, and use by another person who does not have use authority can be prevented.
(2) A position and a move of an authenticated user are monitored in a specific area. If a distance from another user becomes a predetermined value or below the predetermined value, use authority of a user is changed, for example, into equal or lower one than that each user has in common. Thus, use by another person who does not have use authority can be prevented, and lowering security can be prevented.
(3) Use by another person who does not have use authority can be prevented, a position and move of a user can be traced, and an authentication result is correlated with a move trace. Thus, after once authentication, repeated authentication is avoided to prevent lowering security, and to allow enhancing convenience.
While the embodiments of the present invention are described hereinabove, the present invention is not limited to the above embodiments, and it is a matter of course that various variations and modifications can be made by those skilled in the art within the scope of the claims without departing from the spirit of the invention disclosed in the description of the embodiments, and needless to say, such variations and modifications are also encompassed in the scope of the present invention.
The present invention is related to security in using facilities, etc., reduces the number of an authentication request to enhance convenience, and prevents use of use authority given from the authentication by another person. Based on use authority given by a user being authenticated, the user can use provided service, etc. in a specific area, and once authenticated, use authority is maintained without requesting authentication repeatedly, thus convenience can be enhanced. Since use by another person who does not have use authority can be prevented, a position and move of the user are traced, and an authenticated result is correlated with a move trace, repeated authentication after once authentication is avoided to prevent lowering security, and convenience can be enhanced. Thus, the present invention can be used in an area such as research facilities where high security is needed, and is useful.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiment(s) of the present inventions have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2008-259955 | Oct 2008 | JP | national |