WO2008050765A1 - Individual authentication system - Google Patents
Individual authentication system Download PDFInfo
- Publication number
- WO2008050765A1 WO2008050765A1 PCT/JP2007/070650 JP2007070650W WO2008050765A1 WO 2008050765 A1 WO2008050765 A1 WO 2008050765A1 JP 2007070650 W JP2007070650 W JP 2007070650W WO 2008050765 A1 WO2008050765 A1 WO 2008050765A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- registrant
- terminal
- authentication
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- Patent Document 2 JP 2005-285056
- Patent Document 3 Patent No. 3946243
- the present invention has been made in view of the above-mentioned problems, and when performing personal authentication via a network using electronic information that can be easily altered, leaked, and stolen, Regardless of whether or not it has been tampered with, the existence of the registrant is verified by performing temporal and spatial authentication by adding the estimated information of the registrant's existence space to the biometrics information match / mismatch authentication. Authentication accuracy can be improved and fraudulent activity can be easily detected.
- An object of the present invention is to provide an authentication system that realizes improved security. Means for solving the problem
- the authentication system creates an exchange server for creating information indicating a space where the registrant is personally authenticated based on the movement information and distributing the information to the server group. It is characterized by having.
- the server group By forming a unit that is a network configuration unit, when the personal information of the registrant is input or a radio wave is received by the information input device or the reading device in the unit, the server group The registrant determines that the unit has moved from the physical space formed by the unit to the physical space in which the other unit is arranged, and after the determination, the registrant's personal information by the information input device in the unit before the movement If the information input device in the unit has a function of providing a predetermined service to the registrant upon recognizing the radio wave received by the input or reading device, the service of the information input device is provided. The provision function is stopped or restricted.
- the server group when the server group obtains information indicating the registrant's existence space, the physical space corresponding to the spatial information and the information installed in the vicinity of the physical space are provided. A process for verifying the existence of the registrant is requested from the input device or the reading device.
- the server group cannot acquire the information indicating the existence of the registrant after receiving the information for requesting the registrant's existence verification process, the information indicating the existence unconfirmed Is transmitted to the exchange server.
- the server group transmits transaction, service or operation permission information to the information input device.
- the server group when the server group obtains information indicating the existence space of the registrant, the server group executes a transaction or service or operation in the space as a process belonging to the registrant. It is characterized by that.
- the transaction or service or operation is a financial transaction, a settlement transaction, data browsing, data registration, use of an electronic medical record, unlocking or locking, and operation of the information input device. It is characterized by.
- the server group indicates the movement information of the registrant, the information indicating the existence space, and the existence space recognized by another server group received via the exchange server.
- the processing range is determined by comparing with information.
- the server group may be configured such that the registrant determines that the unit has moved from the physical space in which the unit is disposed to the physical space in which another unit is disposed.
- the personal information of the registrant is input, it is determined that an abnormal situation has occurred.
- the server group when the server group determines that the input of the personal information of the registrant is an abnormal state, the server group locks or shoots images to the information input device or the reading device. Information for instructing photography is transmitted.
- the server group includes a calculation system for calculating the personal credit of the person.
- the authentication system has a plurality of terminals and is based on position information held by a terminal that inputs registrant's personal information and radio waves transmitted / received by an information terminal held by the registrant.
- a system that authenticates registrants based on specified location information, and the storage location of the registrant's personal information in the authentication system moves according to the physical movement of the registrant. Since it is difficult for a third party to specify the storage location of the registrant's personal information, such third parties prevent the registrant's personal information from being altered, leaked, or stolen. The fraudulent behavior can be easily detected, and security in the system can be improved.
- FIG. 1 (a) is a block diagram showing a schematic configuration of the authentication system in the embodiment of the present invention.
- the authentication system includes an authentication server 10 that manages registrant history information, and , The exchange server 20 that distributes the registrant's location information or unconfirmed information, the building-side terminal 110 that integrates and manages the terminals installed in buildings such as mansions and buildings, and administrative agencies, companies, and schools
- Organizational side terminal 120 that integrates and manages terminals installed in a certain organization
- regional management side terminal 130 that integrates and manages terminals installed in a certain area such as OOmachi 1-chome, and each of these terminals 110
- Relay terminal 140 that complementarily integrates and manages terminals that are not integratedly managed by 120 and 130
- aggregation terminal 150 that integrates and manages these terminals 110, 120, 130, and 140
- the terminal 160 for authenticating the registrant Communication network 200 which is a network of the Internet, wired communication network, wireless communication network, digital terrestrial
- each terminal is subdivided according to the application, installation location, etc., but when referred to below as “each terminal”, unless otherwise specified, each of these terminals 10, 20, 110, 120, 130, 140, 15 It is assumed that 0 and 160 are all shown.
- the building-side terminal 110, the organization-side terminal 120, the regional management-side terminal 130, and the relay-side terminal 140 are collectively referred to as “sub-server group” below.
- Each terminal has a database (DB) for recording and managing the registrant's personal history information and location information, and the details of the management structure in the database will be described later.
- DB database
- each terminal has a function for reading personal information such as biometrics information, a function for determining the authenticity of evidence, infrared, temperature, humidity, illuminance, human feeling, sound, radio wave status, power status, acceleration, distortion, vibration
- personal information such as biometrics information
- a function for determining the authenticity of evidence infrared, temperature, humidity, illuminance, human feeling, sound, radio wave status, power status, acceleration, distortion, vibration
- a sensor capable of grasping magnetism or the like is attached or mounted.
- the authentication server 10 is a server device managed and operated by a management organization that manages the personal information of the registrant.
- the authentication server 10 has a function for authenticating the registrant based on personal history information and location information, and a database. (DB) 11
- the exchange server 20 is a server device managed and operated by a management organization that receives and distributes location information of registrants.
- the exchange server 20 includes a function for distributing and storing the received location information, a function for authenticating a registrant based on the location information of the registrant and information about whether or not the registrant is present, and a database (DB) 21. Yes.
- Aggregation-side terminal 150 is a sub-server device provided to connect authentication server 10 and a group of sub-servers that collectively manage terminal-side terminal 160 via communication network 200. However, in the system configuration, the authentication server 10 and the sub server group are directly connected without using the aggregation side terminal 150, or the aggregation side terminal 150 is connected between the authentication server 10 and the sub server group. There may be several installed in between.
- Aggregation side terminal 150 performs the function of authentication server 10 and stores it in history information and location information. Based on this, it has a function to authenticate the registrant and a database (DB) 151.
- DB database
- the building-side terminal 110 is a sub-server device that is provided for integrated management of the terminal-side terminal 160 installed in or around the building for each building.
- the building-side terminal 110 performs the function of the authentication server 10 or the aggregation-side terminal 150, and has a function of authenticating the registrant based on history information and location information, and a database (DB) 111.
- the integrated management unit of the terminal 160 by the building terminal 110 is a room, a school classroom, an independent division unit of the condominium, a resident individual / group unit in the building, which may be further subdivided in the building It is composed of floor units!
- the user of the building-side terminal 110 is a management organization such as a school, a factory, a hospital, an airport, a station, a store, a door, or a user organization, an owner of an aircraft, a train, a building or a structure, or a user.
- a management organization such as a school, a factory, a hospital, an airport, a station, a store, a door, or a user organization, an owner of an aircraft, a train, a building or a structure, or a user.
- organization-side terminal 120 Users of organization-side terminal 120 are: schools, entire companies or branches / departments, municipalities, organizations and agencies such as the Ministry of Foreign Affairs, financial institutions (including electronic money management companies), hospitals, hobby associations, store sales units, It may be a building management association, an entrance / exit, an electronic money terminal, a manager of a register, or a user. Further, when a single organization conducts business activities and transactions in a plurality of fields, an organization-side terminal 120 may be provided for each field, and the related terminal-side terminals 160 may be integrated and managed.
- the terminal 130 on the regional management side is used for the integrated management of the terminal unit 160 installed within the range managed by administrative units such as prefectures, municipalities, and town names, or by wireless and wired base stations. This is a sub-server device provided for the purpose.
- the regional management side terminal 130 performs the function of the authentication server 10 or the aggregation side terminal 150, and has a function of authenticating the registrant based on history information and location information, and a database (DB) 131. ing.
- the regional management terminal 130 is located on the terminal side installed in a certain area as shown below.
- the terminal 160 is integratedly managed.
- the relay-side terminal 140 is a sub-server device provided to manage and operate the end-side terminal 160 that is not directly connected to the building-side terminal 110, the organization-side terminal 120, and the regional management-side terminal 130.
- This relay side terminal 140 acts as a proxy for the function of the authentication server 10 or the aggregation side terminal 150, and has a function of authenticating the registrant based on history information and location information, and a database (DB) 141. Yes.
- the terminal 160 is an information processing device installed in a daily activity range of a registrant, etc., and a building, place, organization, or area where people gather, or an information processing device possessed by a registrant.
- Personal biometrics information of registrants information on evidence such as passport 'license' magnetic card 'authentication cards, passwords, radio waves from mobile phones, personal digital assistants and GPS systems, IC cards, electronic tags and beacons
- the terminal 160 when the registrant's personal authentication is successful, enters and exits, uses electronic money, financial transactions, uses various systems, unlocks keys, uses various electrical products, and signs documents. Printing, browsing various information, etc., providing identification information and all processing based on personal authentication.
- Each terminal stores installation position information indicating the position where the terminal is installed! /.
- This installation position information includes the 2D or 3D information of the position where the information terminal is actually installed and / or the name of the installation position.
- Two-dimensional information is represented by latitude and longitude
- three-dimensional information is the sky represented by height from the ground or underground depth in addition to latitude and longitude.
- the height or depth is displayed in addition to the metric display.
- the display may be the second floor of the object, the first floor of the basement, or the display above sea level.
- names of installation locations include fixed locations such as “00 Building 6th Floor” and “00 Hospital Reception Desk Unit 1”, as well as airplanes, trains, automobiles, etc. , Elevators, escalators, portable terminals, etc. whose installation position and altitude change every moment. For example, “Owner owned XX company ⁇ type aircraft, right side of boarding gate of airplane number 123 It is always indicated as “door”.
- a location information recognition authentication system represented by a GPS authentication system or a flight recorder
- it can be displayed in the information format specified by the system, or a mobile phone or a mobile information terminal
- the location of the terminal changes from moment to moment, it is allowed to recognize the applicable range of base stations, radio wave receivers, etc. that are performing wireless communication and infrared communication as space and use it as installation location information.
- ro information that identifies the device itself is stored in the terminal, and location information associated with ro information in another terminal in the network is acquired through the communication network 200, and the location information is acquired. Needless to say, the recognition method is also included.
- each terminal stores information indicating its own installation position in itself! /
- the information terminal is equipped with a device such as GPS that can recognize the current position! /
- the device may recognize the current location (2D / 3D information or the situation around the installation location).
- wireless antennas hereinafter referred to as antennas
- surveillance cameras video cameras
- facial information readers hereinafter referred to as cameras
- the information indicating the space or the space that can be photographed may be used as installation position information.
- Each terminal has a function of transmitting input (reading) information, movement information, and various types of information to each terminal. At this time, each terminal transmits the transmission information in association with the above-described location information of the terminal and the terminal identification ID. This makes it easy to determine the information source and spatial information in the system.
- Each terminal is assigned unique identification information (including the terminal identification ID) for identifying the terminal itself, and stores each terminal's own identification information.
- This identification information may be a character string of several digits such as a general identification ID or an identification number.
- the identification information is given a name of the installation location and a specific description.
- identification information is assigned according to installation altitude and installation purpose so that clear terminal identification is possible.
- each terminal has multiple other functions that can be applied to multiple purposes. Stores information indicating the available functions.
- a terminal 160 installed on the doorknob outside the house entrance when the registrant holds the doorknob to enter the building, authentication is performed and the door lock is unlocked. Determine whether to allow entry. At the same time, it may be set such that the operation of instructing the process of automatically turning on the room lamp is performed in accordance with the recognition that “it will be in the house”. In this way, it is possible to improve the convenience of a terminal by stacking multiple purposes on one terminal.
- the availability information DB and the search information DB may not be stored in the general DB, but may be provided in parallel with the general DB.
- the history information DB is a database that stores information related to personal history, and is a registered person. There are pre-defined columns for storing and storing all of the registered history, behavior history, medical records, various transaction histories such as finance and purchases, balance, entry / exit history, and biometrics information. It also has a part to store the history of personal information registration, browsing requests, authentication requests, legitimate requests for personal information or legitimacy responses made by each terminal.
- the verification information DB is a database that stores information on processing steps, execution details, evidence, witnesses, etc. related to verification of the existence of an individual or the authenticity of the personal information.
- the behavioral records of the person, the contents of exchanges with related organizations, evidence, and video / audio of the witness are replaced with electronic information and stored.
- Basic information DB14 includes historical information DB12, 112, 122, 132, 142, 152, 162 and verifications Jusei DB13, 113, 123, 133, 143, 153, 163
- the basic information at the terminal is extracted in the same way as the basic information DB14.
- Examples of information to be extracted include main items such as general standard information of registrants such as address, name, date of birth, and the latest electronic money balance and electronic medical record information.
- the basic information extracted is the source. The ability to easily browse or search detailed information by linking to certain history information and verification information.
- the availability information DB is a database that stores information for determining, instructing, and controlling the operation progress after authentication based on the authentication result of the registrant.
- the search information DB is a database that stores the names, personal identification IDs and Vs of all registrants to facilitate the search process, and is stored in the terminal and terminals related to the terminal. Extracted from the personal information of everyone who is stored.
- the search information can also be linked to the personal information that is the source of the extraction, and the detailed information can be easily browsed or searched.
- the history information DB, the verification information DB, and the basic information DB are individual information folders, and the availability information DB and the search information DB are preferably managed in an aggregated form. If there is no information to be stored in each DB, it is possible that the terminal does not have the DB. is there.
- the DB folder should be used so that one shared folder is used without providing a personal folder.
- Database configuration example Data configuration example of the history information database
- the following (1) to (; 13) are listed as the history information registered in the history information DB.
- all information is given time information indicating the date and time when the information occurred.
- biometric information such as fingerprints, irises, voiceprints, veins, genes, and face outlines.
- Register detailed item information indicating the start or result of actions such as application form, admission card, participation certificate, certificate of commendation, participant list, participation data, entry / exit record, entry / exit record.
- Financial derivatives such as electronic money, deposits, investment trusts, loans, stocks, bonds, foreign exchange, options and derivatives, precious metals (gold, platinum, etc.), items handled by commodity exchanges (red beans, soybeans, oil, sugar, etc.) , Credit card, point card, mileage card, etc. Available balance and transaction history.
- each terminal reads the read or input information and the authentication system.
- the identity of the registered person is verified by judging whether the existing personal information stored in the database is identical or within the threshold.
- each terminal matches the newly read / input information with the existing personal information stored in the authentication system database in two points: spatial information and temporal information. Judgment whether or not it has a sex!
- each terminal reads and inputs the timing and position of personal information (biometric information, etc.) for identifying an individual, the purpose of use of each terminal, Accumulate travel prediction time, etc., and verify it.
- personal information biometric information, etc.
- the time required to travel from Marunouchi, Chiyoda-ku, Tokyo to Kyoto Station is calculated from multiple stations in the Marunouchi area, which is the movement start terminal, to Kyoto Station, where the terminal at the end of movement is located.
- Search for the means of transportation and the shortest by available transportation The estimated travel time is calculated by adding the time required to travel the distance from each terminal to the boarding station.
- Each terminal reads / enters personal information at the terminal that made the personal authentication request (in Kyoto Station), and when it read / entered the personal information at the previous authentication request terminal (Marunouchi, Chiyoda-ku, Tokyo) If it is earlier than the estimated arrival time with the estimated movement time, it is determined as an abnormal value, and it is determined that the personal information read / input newly requested for personal authentication is invalid.
- the transit time of each terminal can be predicted, so the transit time and the reading / You may compare with input time.
- the distance between the spatial information and the time information included in the mutual information is short! To do.
- the above-mentioned movement information includes the movement-derived information listed in the following (1) to (26), and is classified into four categories (S movement information, A movement information, hereinafter) according to the degree of authentication accuracy and the content of the information. B movement information and C movement information).
- S movement information A movement information, hereinafter
- B movement information B movement information
- C movement information C movement information.
- S movement information S move information immediately before and at the time of requesting authentication is compared with each other to make the registrant's real authentication judgment.
- a move information can be added as comparison target information. Admit.
- personal authentication permission to use personal information, provision of various services using an authentication system, etc. are collectively referred to as an authentication service.
- a movement information is movement derivative information used to assist the registrant's authentication continuity.
- Information indicating that an individual is present in the captured video and the request included in the verification request information This is information combined with a number, including the case where the personal identification ID of the registrant is added.
- Information that collectively refers to mobile radio wave recognition information, GPS recognition information, tag recognition information, and biometrics recognition information.
- the information on which the creation is based is S movement information.
- the B movement information is movement derivative information used to assist each terminal in executing an authentication service using the S movement information or the A movement information.
- Movement information is movement derivative information used for the safe operation of the authentication system. (20) Permit information
- the movement stop information enables transmission of advance notice information to each terminal in the unit, and permission and provision of various authentication services in the unit.
- the real rate which is an index representing the authenticity of realism, is calculated using one of the following formulas:! To 5
- a score is determined based on the reliability, uniqueness, quantity, etc. of the registered information. Multiply this score by the number of points or evaluation rate that takes into account the elapsed time from the time of registration, the expiration date, the verification result, and the elapsed time from the time of verification, to calculate the number of points acquired, and to calculate the actual number as the total. .
- the mining rate is calculated according to the degree to which the behavior pattern of a recent certain period matches the behavior pattern of a registrant in the past certain period.
- Verification base mining rate number of corresponding pattern actions during a certain period in the past ⁇ number of days in a certain period
- Mining rate (%) Target mining rate ⁇ Verification base mining rate
- the system usage status is quantified by credit rating 1, and the overall credibility of registrants is quantified by credit score 2.
- the initial set score is a numerical value that is set uniformly for all the users when the authentication system starts to be used.
- the credit addition score is a numerical value given by evaluating the usage period without violation, achievements related to the construction and operation of authentication systems, labor related to detection and prevention of unauthorized use, etc.
- Fig. 2 (a) is a diagram showing an example of the entire contents of the credit scoring table
- Fig. 2 (b) is a diagram showing an example of detailed contents.
- Credit scoring charts show the matters that have occurred or discovered, the degree to which they are involved, the degree of achievement to the system and society, the degree to which human lives are concerned, the approximate number of people affected or the number of people expected to be affected, Estimated economic loss, effective period for systems and society, elapsed time since fraudulent activity was discovered or announced, designated fields (fields that affect human life, social infrastructure), non-violating system usage period, etc. It is possible to register the provisions of, warning information indicating the occurrence of new scoring, etc.
- a table that replaces each item with a numerical value is prepared, and the contents are always published and updated.
- Credit rating 2 is calculated by comparing the numerical value calculated with credit rating 1, actual ratio, and credit evaluation consideration points with a table that sets the score for each numerical value by relative evaluation or absolute evaluation.
- FIG. 3 shows that in the first embodiment of the present invention, the registrant leaves the home and reaches the hospital.
- 5 is a sequence chart showing a basic operation example of an authentication system using biometric information based on processing until wearing.
- step S1 personal information (for example, fingerprint information) is read by the terminal terminal 160A installed at the entrance door (step S1), and the reading time and reading location are read by the terminal terminal 160A. Send certain information to the building-side terminal 110A (step S2)
- the building-side terminal 110A compares and compares the received personal information, time information, spatial information, and registration information in its own database (Step S3).
- the information indicating that the user has moved is attached to the movement information (in the following, movement start information) and transmitted to the authentication server 10 (step S5).
- the authentication server 10 compares the movement information immediately before the registrant stored in its own machine with the movement information received in step S5 to determine the existence (step S6). Recognize that it has moved from the OA space and does not exist in the space (step S7).
- the registrant arrives at the nearest station, reads personal information (for example, face information) with the terminal 160B installed at the ticket gate (step S8), and also reads the reading time and the reading time.
- Information indicating that the location is the terminal 160B is transmitted to the organization terminal 120A (step S9).
- the organization side terminal 120A performs the same processing as steps S3 to S4 (steps S8 to S9), and appends information indicating that it has not moved to the movement information (hereinafter referred to as movement stop information) to the authentication server. (Step S12).
- the authentication server 10 compares and compares the movement information (movement start information) received from the building-side terminal 110A and the movement information (movement stop information) received from the organization-side terminal 120A. Judge the spatial continuity (step S13). As a result, if consistency is obtained, the registrant recognizes that the registrant actually exists in the station (step S14), and transmits permission information to the organization side terminal 120A (step S15).
- the organization-side terminal 120A that has received the permission information opens a ticket gate for the registrant and provides services such as boarding and electronic money on the premises (step S16).
- the terminal 160C installed at the entrance door performs the same processing as steps S8 to S9 (steps S17 to S18), and the building terminal 110B performs step S10. Processes similar to S12 are performed (Steps S19 to S21).
- the authentication server compares and matches the movement information (movement stop information) received from the organization-side terminal 120A in its own machine with the movement information (movement stop information) received from the building-side terminal 110B.
- the building-side terminal 120B that has received the permission information provides services such as a new entry and review of the registrant's electronic medical record and a settlement within the medical fee authentication system (step S25).
- a unit that exists or passes can be inferred, and movement advance notice information is transmitted to the inferred unit.
- the personal information for authentication and the ID stored in the recording medium are read to the sub-server group terminals that manage the main unit, etc. via the network. Enables inquiries and requests for personal information, etc., facilitates coordination of movement information within the authentication system, and improves the efficiency of authentication processing.
- Terminal terminal 160 when the registrant leaves home, he / she will have a mobile phone (Terminal terminal 160) automatically communicates with an antenna or the like (regional management side terminal 130) (step S1), and information specifying the terminal side terminal 160 such as a mobile phone number is recognized by the regional management side terminal 130 ( Step S2).
- the regional management side terminal 130 creates mobile radio wave recognition information based on the communicable space, mobile phone number, etc. supported by the antenna that communicated (step S3), and the organization of the mobile phone company that manages the regional management side terminal 130 Transmit to terminal 120 (step S4).
- the organization side terminal 120 converts the mobile phone number of the received mobile radio wave recognition information into a personal identification ID and transmits it to the authentication server 10 (step S5), and the authentication server 10 stores the registrant stored in its own device. Compares the previous movement information with the mobile radio wave recognition information received in step S5 to determine the existence (step S6), and the registrant presumes that the region management side terminal 130 exists in a space where communication is possible. (Step S7).
- This section describes GPS recognition information that estimates the existence of registrants using GPS-equipped devices and satellites.
- the registrant shall be personally authenticated at the time of application and receipt of a device with a GPS function, and shall then be legitimately held.
- terminal terminal 160 when the registrant leaves home, the device with GPS function (terminal terminal 160) automatically communicates with the satellite (regional management terminal 130) at the entrance door (step SI), and the G PS Information specifying the terminal-side terminal 160, which is the terminal identification ID of the function-equipped device, is recognized by the regional management-side terminal 130 (including the satellite management organization) (step S2).
- information communication devices and readers such as electronic tags (including IC chips) possessed by registrants have location information installed (embedded) in real space (access to servers and terminals with spatial information).
- Spatial information is the information obtained through communication with electronic tags (including information for communication).
- the stored information power of electronic tags, etc. (including information communication equipment and cards equipped with electronic tags, etc.) possessed by the registrant is read by reading equipment such as electronic tags installed or incorporated in real space.
- the installation position information on the reading device side is used as spatial information.
- Step S1 the electronic tag (terminal terminal 160A) possessed by the entrance door automatically communicates with the electronic tag reader (terminal terminal 160B) installed on the door.
- Step S2 the information identifying the terminal 160A on the terminal side such as the card number is recognized by the terminal 16OB on the terminal side (Step S2).
- Terminal-side terminal 160B creates tag recognition information based on the communicable space, card number, etc. supported by the electronic tag reader (step S3), and transmits it to the building-side terminal 110 at home that manages terminal-side terminal 160B (Step S4).
- the building-side terminal 110 converts the card number of the received tag recognition information into a personal identification ID and sends it to the authentication server 10 (step S5).
- the authentication server 10 immediately before the registrant stored in its own device. Is compared to the tag recognition information received in step S5 to determine the existence.
- Step S6 the registrant presumes and recognizes that the end-side terminal 160B actually exists in a communicable space (Step S7).
- Biometrics recognition information that estimates the existence of the registrant by using the metric information unique to the registrant (especially face information, veins, iris information, and how to walk) will be explained.
- the biometrics information used in this information is the face information captured by street surveillance cameras, This refers to vein information, iris information, etc. automatically read by a reading device installed at the entrance / exit, and is distinguished from information read (input) by the intentional operation of the registrant as in the first embodiment.
- the camera, etc. installed on the telephone pole in front of the home shoots the face of the registrant (step S1), and the captured video is the terminal of the device.
- the identification ID and the like are transmitted to the regional management side terminal 130 (step S2).
- the regional management-side terminal 130 identifies the registrant based on the received video (step S3), further creates the metric measurement recognition information (step S4), and transmits it to the authentication server 10 (step S5).
- the authentication server 10 compares the movement information immediately before the registrant stored in its own device with the biometrics recognition information received in step S5 to determine the existence (step S6). It is estimated and recognized that the terminal 160 is actually present in the space that can be photographed (step S7).
- FIG. 4 shows an operation of creating movement estimation information and movement recognition information by linking estimated presence information with images and communication status recorded by a camera or an antenna in the second embodiment of the present invention. It is a sequence chart which shows an example.
- the authentication server 10A Upon receiving the mobile radio wave recognition information from the organization-side terminal 120A, the authentication server 10A performs estimation recognition of the registrant's real space through the processing of steps S6 to S7 in the first embodiment, and then communicates Search for the authentication server 10 that manages the unit existing in the server (step S51), and if the corresponding authentication server exists (in this case, the authentication server 10B), create verification request information 1 based on the charged wave recognition information (Step S52) and send (Step S53).
- the movement recognition information is transmitted to the authentication server 10B (step S62), and as a result, the authentication server 10B also presumes and recognizes the registration of the information within the device and the existence of the registrant (steps S63 and S64).
- the personal identification ID and spatial information of the verification request information 1 may be converted into a unique personal identification ID and installation position information of each terminal during the processing of step S55 or S56. If face information does not exist in the process of step S56, the authentication server 10A or 10B is requested to transmit face information, and the face information is acquired.
- This authentication system verifies that both personal identities that can be separated from the registrant, such as mobile phones, and personal information that is inseparable from the registrant, such as face information, exist at the same time in the same space. Strengthen personal authentication accuracy. As a result, vulnerabilities of a single personal authentication method, such as unauthorized use when face information is copied in advance when a person other than the registrant possesses a mobile phone, are prevented. It is also possible to analyze the communication status with a plurality of antennas, etc., narrow down the space where mobile phones exist, and implement the verification limited space.
- the authentication server 10B Upon receiving the biometrics recognition information from the building-side terminal 110A, the authentication server 10B searches for the authentication server 10 that manages the units existing in the video shooting space after performing the estimated recognition of the registrant's real space. (Step S51) When the corresponding authentication server exists (here, the authentication server 10A) creates verification request information 2 based on the biometrics recognition information (Step S52) and transmits it (Step S53). In order to facilitate the search, each terminal investigates the installation status of antennas, etc. in the unit managed by its own device, registers the installation and communication space information in advance, and verifies the verification request information.
- the mobile phone number may be extracted from the personal identification ID at the time of creation of 2, and the telephone company to be used may be specified.
- verification request information 3 is used instead of verification request information 1
- verification request information 4 is used instead of verification request information 2. This is the same as in the second embodiment.
- step S60 it is determined whether there is consistency between the spatial information and the time information (step S60). If they match, the movement related information is stored as it is (step S61).
- the authentication server 10 and the sub server group simultaneously request the verification request information 1 or 3 and the verification request information 2 or 4 from each terminal concerned to obtain movement estimation information and movement recognition information. In this way, the existence of the registrant is confirmed.
- FIG. 6 is an operation example in which the comparison server information is transmitted to the terminal related to the registrant by the exchange server 20 and the mutually created comparison target information can be used for the authentication service in the third embodiment of the present invention.
- This is a sequence chart showing a mobile radio wave recognition information as an example.
- each terminal when comparison target information is created, each terminal creates a comparison target information terminal, a target terminal in the presence information notification table, and the possibility that a registrant will exist in the future via the exchange server 20.
- Presence notification information created based on information to be compared with a unit terminal, main unit (including sub-units) management terminal, terminal that wants to be notified of the registrant's presence space, etc.
- authentication services such as financial transactions, use of electronic money, access control, electronic device operation control, and identification.
- Authentication server 10A determines the consistency between the mobile radio wave recognition information, which is the latest comparison target information of the registrant, and the previous movement information.
- the latest mobile radio wave recognition information is transmitted to the exchange server 20 (Step S101).
- the exchange server 20 prepares the presence information notification table in advance in advance, and the registrant and the destination to which the presence notification information is to be distributed (in the following, The information delivery destination and delivery conditions are pre-registered by the relevant organization.
- the exchange server 20 searches the presence information notification table based on the personal identification ID of the received information, determines the presence or absence of delivery conditions by pre-registration (step S102), and if it is not registered, the presence information notification All notification destinations registered in the table are recognized as transmission destinations (step S103).
- Step S104 it is determined whether or not the current received information meets the delivery conditions by pre-registration. If not, all the notification destinations registered in the presence information notification table are listed. (Step S 105), if applicable, the designated individual transmission destination is recognized as the notification destination (step S 106).
- the exchange server 20 converts the personal identification ID of the portable radio wave recognition information into the unique identification ID of each notification destination, and then creates presence notification information together with the spatial information and time information of the portable radio wave recognition information. After being registered in the information notification table (step S107), it is transmitted to each notification destination (step S108).
- the authentication server 10A Upon receiving the presence notification information, the authentication server 10A identifies the mobile radio wave recognition information transmitted in step S101 based on the registrant's personal identification ID, and determines that the spatial information matches the time information (step S 109), if they match, it is recognized that the processing in step S101 has been completed successfully (step S110). If there is a mismatch, steps S102 to S108 may be erroneous processing, so information indicating that is sent to the exchange server 20 for verification.
- the authentication server 10B, the authentication server 10C, and the authentication server 10D store the received information in the own device, and estimate and recognize the space where the registrant exists, and then compare it with the registrant in the unit managed by the own device. Whether target information has been created! / Is searched (step S111). If it cannot be created, the presence notification information received in step S 111 is stored after a predetermined time (for example, If it is created (step SI12), it is compared with the received presence notification information, and the continuity of personal authentication is determined (step S113).
- step S 114 if continuity is established, it is recognized that the registrant exists in the unit (step S 114). If continuity is inconsistent, the presence notification information and the unit managed by the own device are recognized. Notification abnormality information indicating that the comparison target information does not match is transmitted to the exchange server 20 (step S115). Upon receiving the notification abnormality information, the exchange server 20 stores it in its own device, extracts the transmission destination in step S108 (step S116), and transmits warning information (step S117). Each terminal stores the received warning information in its own device (step S118) and controls the authentication service for the registrant.
- Figure 7 (a) is a diagram showing an example of the contents of this presence information notification table.
- the personal identification ID of the registrant, the latest presence notification information, the creation destination and creation method of comparison target information, and each system It includes information such as a unique ID, terminal identification ID or notification destination that sends presence notification information, presence / absence of presence in each system, and registrant main unit information.
- the common personal identification ID “001234” of registrants is displayed, and the ability to centrally manage distribution destinations based on this personal identification ID. Separate distribution destination information combining notification destinations and group settings between distribution destinations are performed separately.
- Fig. 7 is a diagram showing an example of registering individual distribution destinations of presence notification information, and includes information such as distribution destination, notification reason, registration date, distribution conditions, etc. (c) shows the details of delivery conditions.
- the organization side terminal 120A that controls the door key of the registrant's work entrance / exit 1202A indicates that all presence notification information is distributed. It indicates that the presence notification information is distributed to the organization-side terminal 120B on the transportation side that controls the mouth when the registrant moves to a space (unit) around or near the unit managed by the organization-side terminal 120B. Circumstance R2 is registered.
- the notification conditions to be registered include the following (1) to (4) and combinations thereof as main examples.
- the exchange server 20 may authenticate the registrant and recognize the existence space by comparing the registration information in the presence information notification table with the comparison target information and the presence notification information.
- the verification server 10 verifies whether or not the registrant has been photographed or communicated within a certain time range based on the information and transmits the movement estimation information as the response information.
- the authentication server 10 receives the verification instruction information received after the determination of the second process. If the verification request information 1 to 4 is created and transmitted to the corresponding terminal, the process according to steps S51 to S59 of the second embodiment is executed, and the movement estimation information is received as the verification result, the exchange server 20 Send to.
- the presence information notification table When the presence information notification table recognizes the presence of the person A in the space within a certain range from the registrant's existence space, the presence notice information, which is information indicating that the person A exists in the neighborhood, is automatically added to the registrant. Registration of the distribution condition of notification.
- the presence information notification table for person A a condition that “every person A presence notification information is created is sent to the registrant presence information notification table or main unit management terminal” and the registrant presence information notification is sent.
- the presence space of person A is compared with the existence space of the latest registrant, and it is recognized that the space is the same or within a certain range. In this case, it is possible to make a judgment that links the presence space information of both parties.
- the registrant agrees in advance to provide information on the space and time that exists to a third party, and sets the level from the level that the other party provides without restriction to the level limited to a specific person using the authentication service. To do.
- an example will be described in which parents and children use mobile phones.
- toilet units toilet units, hospital units, non-daily existence spaces such as restaurants and travel destinations, and spaces where registrants prohibit automatic processing.
- the exchange server 20 When the exchange server 20 receives the comparison target information indicating that the registrant exists in the work unit from the authentication server 10G (step S201), the exchange server 20 performs the same process as steps S102 to S108 in the third embodiment.
- the presence notification information is transmitted to each authentication server 10 (steps S202 and S203).
- the authentication server 10A recognizes that the registrant does not exist in the hospital (step S205) by the process of step S111 of the third embodiment (step S204), and adds it to the subserver group managed by its own device.
- each subserver group or a terminal managed by the subserver group (mainly the terminal terminal 160) is combined with information for instructing to stop the personal identification ID and authentication service (hereinafter referred to as usage control information). Transmit (steps S206 and S207). As a result, it is impossible for a hospital to impersonate a registrant and use the system illegally.
- the authentication servers 10D to 10G recognize that the available space is a work unit (step S208), and each terminal managed by the device has a personal identification ID and an authentication service billing terminal. Creates permission information if the is a terminal in the work unit, and information that instructs the use control information to be sent if it is a terminal other than the work unit (hereinafter referred to as processing instruction information) (Step S209) and transmit (Step S210).
- a terminal that has received permission information, usage control information, and processing instruction information transmits the received information to a terminal managed by the terminal so that it can recognize the same process, or based on the personal identification ID.
- the personal folder of the registrant in the basic information DB and history information DB is extracted, and the received information is registered. You may record.
- the authentication server 10G When the registrant starts moving, the authentication server 10G creates movement start information and sends it to the exchange server 20 (step S211).
- the exchange server 20 and each authentication server 10 perform the same processing as steps S202 to S210. Force S is performed (steps S214 to S222).
- the authentication server 10G recognizes that there is no registrant in its own unit from the movement start information, it creates usage control information (step S212) and adds it to the sub-server group managed by its own unit.
- the data is transmitted (step S213). As a result, it is impossible to impersonate a registrant both at work and in the hospital and use the system illegally.
- each authentication server 10 creates availability information and sends it to the sub-server group managed by itself. It may encourage the preparation of authentication service processing when a registrant arrives.
- the terminal-side terminal 160A reads the face information and the building-side terminal 110A reads the movement stop information or biometrics recognition by the processing according to steps S17 to S23 of the first embodiment.
- Information is created, and the authentication server 10A verifies the continuity of authentication between the comparison target information created by the building-side terminal 110A and the presence notification information in step S215, so that the registrant exists in the hospital unit. Is recognized (step S223).
- the authentication server 10A transmits the movement stop information to the exchange server 20 (step S224), and the same processing as steps S202 to S203 and steps S208 to S210 is performed (steps S225 to S229).
- the registrant can use the authentication service inside the hospital and cannot impersonate the registrant outside the hospital to use the system illegally.
- the authentication server 10A compares the information with the comparison target information and recognizes that the process of step S224 has been successful (step S230). Furthermore, usage notice information is created (step S231) and transmitted to the sub-server group managed by the own device (step S232).
- the sub-server group extracts the personal folder of the registrant in the basic information DB and history information DB in the machine based on the personal identification ID, and uses the received advance notice.
- the registrant can use each terminal (terminal operation, system access, unlocking, entry permission, financial transaction processing, etc.) and register. Encourage preparation when a person requests an authentication service.
- the authentication server 10A When the registrant reads the vein information by the terminal 160G at the reception desk, the authentication server 10A performs continuity of authentication with step S223 by the process according to steps S17 and S23 of the first embodiment.
- the registrant's existence space is recognized, permission information is sent to the organization side terminal 120C and building side terminal 110B that manage the existence space.
- Use notice information is transmitted to the group organization side terminal 120A 12 OB (step S 301).
- the registrant can use it as a reception machine, and the desired authentication is performed based on the terminal usage purpose information.
- Service can be processed automatically (Step S303) Since the terminal 160K on the terminal side is a medical examination acceptance machine, the first is to provide the registrant's health insurance card information to the hospital side.
- Information is automatically sent to the authentication server 1 OA (step S304) for authentication, including the personal identification ID of the user, the terminal identification ID of the terminal terminal 160K, and the billing process (here, acquisition of health insurance card information).
- Server 10A is the latest comparison of this information! 1 ⁇ 4
- step S305 Information or information that has been successfully authenticated (step S305) and transmitted to the authentication server 10F managed by the health insurance association (step S306).
- the authentication server 10F performs an authentication process based on the received information (step S307), recognizes the registrant's existence space (step S308), and requests the process (here, the health insurance card information is extracted and transmitted). To the end side through the authentication server 10A as response information Transmit to terminal 160K (step S309). As a result, the terminal 160K receives the health insurance card information (step S310), and the hospital acquires information such as the name of the registrant, the billing destination of the medical fee, the expiration date, etc., and uses it for paperwork.
- the second is to prepare for the use of electronic medical records that centrally manage the registrant's medical history and examination history.
- the authentication server 10D On the other hand, a process for prompting preparation of the electronic medical chart is automatically performed (steps S311 to S313).
- the authentication server 10D performs authentication in accordance with the processing of steps S307 to S308 (steps S314 to S315), and prepares for extraction and the like in preparation for the actual electronic medical chart usage charge (step S316).
- the automatic processing according to the purpose of use of the terminal 160 is explained as an example, but the registrant and the related parties input the contents of the request into the terminal, the input information, the personal identification ID of the registrant, and the terminal identification of the processing request terminal. Information combined with the ID may be transmitted.
- each terminal receives permission information as an authentication result, each terminal automatically provides an authentication service based on the purpose of use of the terminal of the terminal. For example, after the comparison information based on information entering the room from the entrance of the house is created, the registrant recognizes that the person exists inside the house and cannot impersonate the person outside the house to use the terminal. In addition, even within the house, if comparison target information based on information in the bedroom or bathroom is created, even the family cannot impersonate the registrant while sleeping or taking a bath and use the terminal.
- the terminal terminal 160B reads the face information by the process according to steps S17 to S23 of the first embodiment, and the building Side terminal 11 OA creates movement start information or biometrics recognition information, and authentication server 10A power Continuous authentication of the comparison target information created by the building side terminal 110A and the latest comparison target information of its own equipment Recognize that the registrant exists outside the hospital unit.
- the authentication server 10A sends the movement start information to the exchange server 20, and the same processing as in steps S202 to S203 and steps S208 to S210 is performed.
- the movement start information is used in the own unit. Since it recognizes that there is no registrant, it creates usage control information and sends it to the sub-servers managed by its own device. As a result, registrants are outside the hospital.
- Fig. 12 is a diagram showing an example of the contents of this existence recognition record table.
- the name and name of the terminal that manages the unit, the current time, the personal identification ID and name of the presence person, the presence person entered the unit, or It contains information such as the terminal and time that it has recognized that it has exited or continues to exist, the current presence / absence, and the authentication response level. It also receives comparison target information and presence notification information. If received, the received information and the terminal identification ID that became the sender are registered.
- the unit includes a terminal with a function that can restrict entry / exit, such as a door or opening / closing device
- the lock force information (including closing the door) is sent along with the warning information to force the door. Lock it.
- the forced shooting information is transmitted along with the warning information, and the status of the person in the unit is recorded. This procedure ensures the identity of the person who performed the impersonation and creates evidence.
- the registrant's electronic money account balance is 50 yen
- the savings account balance is 80 yen
- the credit available amount is 70 yen
- the automatic loan amount is 50 yen.
- Personal information, transaction details, payment methods, etc. are entered by the registrant into the terminal 160 and transmitted to the organization terminal 120E that manages financial transactions including electronic money.
- the organization side terminal 120E verifies whether there is an automatic credit line setting equivalent to the balance, and if it exists, the registrant borrows 10 yen and the 10 yen deposit process into the electronic money account. At the same time, a transfer process of depositing 60 yen into the store's designated account may be implemented.
- the registrant reads the personal information to the terminal 160 and transfers the money from electronic money to cash. Enter the information to instruct the exchange and the exchange amount of 20 yen. Since the exchange amount is within the account balance, the organization side terminal 120E carries out a transfer process of withdrawing 20 yen from the registrant's electronic money account and depositing 20 yen into the cashier's designated account. Notify terminal 160. After confirming the completion notice, the cash issuer will give the cash equivalent to the exchange amount to the registrant.
- the registrant inputs personal information to the terminal 160, information for instructing the transfer of funds from the savings account to the electronic money account, and the exchange amount.
- the organization terminal 120E has a normal exchange amount.
- the limit setting conditions mainly include the following (1) to (4) and combinations thereof.
- the terminal 160 When the registrant leaves the store with the product, the terminal 160 creates movement start information.
- an information reader such as an electronic tag installed at the exit acquires information such as an electronic tag attached to the product and calculates a purchase price. After that, the time information of the registrant's movement start information is compared with the reading time information of the electronic tag, etc., and the pieces of time information at the same time or near each other are linked together to calculate the fee as the purchase price of the registrant.
- Figure 12 (c) shows an example of specific registration processing based on the hospital shown in Figure 9 (a) for the contents of Pattern 3.
- an anonymous person identification ID “Z02” is created to indicate that the patient has left the hospital unit that is connected to the examination room, and the time information of operation 2 is the exit time, and the terminal 160D
- action 4 when a person is identified based on the comparison target information when leaving the examination room, “Taro”, the time information for leaving, Information such as the terminal 160D is registered in the existence recognition record table.
- operation 5 the hospital unit connected to the examination room indicates that it has entered, so the existence name is “Taro”, the time information of operation 4 is the entry time, and the terminal 160D is the entrance confirmation terminal. Register in the presence recognition record table.
- an anonymous person identification ID “Z03” is automatically created and registered in the presence recognition record table together with the time information of leaving and information on the terminal terminal 160B as the terminal confirming exit.
- space A and space B are continuous units, they moved from space A to space B. If the terminal in space B recognizes it by the entry process, it will be “unit movement information 1”, and if the terminal in space A recognizes it by the exit process, it will be “unit movement information 2”.
- the authentication server 10 confirms the exit from the presence recognition record table! /,!, A person with a specific person or person's name registered but no exit record, and registration data of the person concerned. Is extracted (step S451), and the management terminal information such as the main unit related to the extraction target is specified (step S452). After that, the authentication server 10 authenticates the personal identification I to the terminal in step S452. D, registration time information being registered, terminal identification ID of the device, information for requesting the presence or absence of the latest comparison target information created after the entrance time information on the management terminal such as the main unit, The request number is also transmitted (hereinafter referred to as exit investigation information) (step S453).
- the management terminal such as the main unit itself is based on the time information included in the received exit investigation information.
- the authentication server 10 verifies whether the received exit response information matches the entrance record of the presence recognition record table (step S456) . If they match, the authentication server 10 recognizes that the person has exited, and uses it as the exit response information.
- the included time information is registered as an exit time, the answering terminal is registered as an exit confirmation terminal (step S457), and usage control information is transmitted to each terminal in the management unit (step S458).
- step S459 If it is determined that there is a mismatch, it is recognized as an abnormal state (step S459), and notification abnormality information is transmitted to the response terminal and the exchange server 20 (step S460).
- the subsequent processing is the same as steps S364 to S365 of the sixth embodiment.
- Judgment is based on the admission record information for the unit requested to attend.
- Exit time information ability Calculate and provide time information minus entry time information.
- the space attended by (1) and the presence time calculated in (3) are combined to satisfy the space and time required for attendance. Judge the force.
- the person who performed the work extracts the latest residual information of the existence recognition record table and the terminal terminal information of the corresponding person. Subsequently, for the person who has the name of the survivor among the extracted survivors, when the modified existence example 1 of the seventh embodiment is executed and the latest existence is confirmed! /, The exit response information is acquired Register as an exit record. As a result, the latest residual information is updated, and the operator starts the search from the unit indicated by the final confirmation terminal, and then moves to the unit that is continuous with the unit and searches. .
- Some entry / exit management systems manage attendance status using electronic tags and mobile phones, but if a registrant rents the equipment to a third party, it can be reimbursed or registered for unauthorized attendance. Met.
- the conventional entrance / exit management system performs entrance / exit management and residual estimation based on records detected or recognized by various sensors and readers installed at the entrance / exit, so the system does not recognize the exit of a person. In this case, it was judged that the person was in the building.
- This authentication system prevents impersonation because if the registrant is recognized twice in the same unit and another space at the same time, authentication will be inconsistent and notification abnormal information will be sent.
- the residual situation is determined based on the continuity of individual existence, if the registrant is recognized in another space, the exit recognition is processed in conjunction with it, so the actual registrant exit cannot be recognized. Even in the case, it is complemented by another terminal to realize precise access control.
- FIG. 16 shows an operation example of recognizing whether a seat is seated or vacant using the comparison target information and the presence recognition record table and notifying the recognition result in the ninth embodiment of the present invention. It is a sequence chart.
- Fig. 17 (a) shows an image in which the restaurant seats are regarded as one unit, and the table and This space is composed of three chairs with terminal 160 and a monitor camera.
- Fig. 17 (b) replaces the installation situation of Fig. 17 (a) with a terminal configuration.
- Fig. 17 (c) is a presence recognition record table for the building-side terminal 110 to manage the passenger seat unit of Fig. 17 (a).
- the table shows the unit of chair and the unit of passenger seat. It is a table that manages both at the same time.
- this presence recognition record table a chair is fixed data, and a person's entry / exit record is registered for the chair.
- the administrator side publishes the personal authentication technology that can be used in the seats and the space around the seats as an available equipment table, and provides the registrants with advance information necessary for creating comparison information.
- Fig. 18 (a) is a diagram showing an example of the contents of this available equipment table, and the personal information that can be handled by the equipment, installation location, and installation equipment that can be used for authentication in the seat and the space around the seat. Type, personal information type compatible as authentication information, etc. are disclosed.
- the manager side provides a reservation form for accepting a seat reservation.
- Figure 18 (b) shows an example of the contents of this reservation form.
- the date and time the registrant wants to reserve a seat the seat contents (e.g. flight number, train number, building name, store name, room number, etc.) ), Scheduled usage time, scheduled usage period, registrant's personal identification ID, registrant's main unit management terminal ID, scheduled at the time of registration! /, Terminal identification ID indicating the movement start space, etc. Register.
- the sixth embodiment By registering the registrant's main unit management terminal ID in advance, the sixth embodiment can be used as a personal authentication method at the seat, and the information on the movement start space can be registered. Enables the use of travel notice information.
- the terminal terminals 160A and 160C installed in the chair read the personal information, and the building terminal 110 performs the authentication process.
- the building-side terminal 110 recognizes that the person whose personal information has been read has been seated in the chair, and registers the admission record. In FIG. "Indicates that you are seated. If the administrator wants to confirm the seated person more strictly, it sends verification request information to the terminal 160D and creates video presence information.
- the terminal 110 on the building side has two admission records in the presence recognition record table and the presence columns for chair 1 and chair 3. If the information indicating that a person exists in the unit (for example, “1”) is registered (step S 501), it is recognized that a person exists and is seated in the chair unit and the audience unit. (Step S502), information indicating that the passenger seat unit is in use (hereinafter, seating information) is transmitted to the organization side terminal 120 that manages the entire restaurant (Step S503). As a result, the organization-side terminal 120 recognizes that the passenger seat unit is in use (step S504), and may transmit that fact to the reception desk or kitchen.
- the organization side terminal 120 recognizes that the passenger seat unit is in use (step S504), and may transmit that fact to the reception desk or kitchen.
- the terminal 160D detects that Saburo is not present in the video (Step S505), and transmits information indicating the absence of Saburo to the building terminal 110 (Step S505).
- the building-side terminal 110 recognizes that Saburo has moved from the auditorium unit (step S507), and in the presence recognition record table, Saburo's exit record, and in the presence column of chair 3, there is a person in the unit.
- Information indicating that it does not exist for example, “0”) is registered (step S508), and it is recognized that there are some empty seats in the passenger seat unit (step S509).
- information indicating that the passenger seat unit is partially vacant (hereinafter, vacant seat information) is transmitted to the organization side terminal 120 (step S510).
- the organization side terminal 120 recognizes that the passenger seat unit has some empty seats (step S511).
- the building-side terminal 110 has sent the seating or vacancy information to the organization-side terminal 120, but at the discretion of the administrator, the building-side terminal 110 is directly or via the exchange server 20 for institutions and customers that provide vacancy status notification services. You may distribute.
- the absence recognition process may be performed by, for example, reading personal information to the terminal 160 at the store outlet or receiving presence notification information from another unit through the exchange server 20. It may be due.
- the definition information for the system to determine that there is a vacant seat in the unit is registered in the presence recognition record table.
- Fig. 17 (d) "all chairs 1-3 are vacant. , The unit is vacant, ”which indicates that the system has registered the definition information judged by the system. Since “1” is registered in the presence column of chair 1, recognition while seated can be continued.
- the weight or temperature sensor installed in the chair does not detect the presence of a person for a certain period of time, or if an electronic tag or the like that stores information on vacant or reserved seats is placed and recognized in the unit, etc.
- a definition using technology that recognizes vacant seats without using authentication may be set.
- the building-side terminal 110 recognizes only the presence of a seated person.
- designated seats there are reserved seats or reserved seats (hereinafter referred to as designated seats), and only designated persons (such as the person who reserved or designated the seat) can be seated. For this reason, it is necessary to register the authorized person information in the presence recognition record table in advance and recognize that the seated person is a legitimate user.
- FIG. 19 is a process for permitting only a legitimate user to be seated in a designated seat using the comparison target information and the existence recognition record table in the first modification of the ninth embodiment of the present invention. It is a sequence chart which shows the operation example which performs.
- reserved seats refer to both seats for restaurants, railways, aircraft, lectures, concerts, etc., and fixed spaces such as accommodation rooms and time rental rental spaces. Including events.
- the registrant sends the reserved seat reservation information to the reservation form in the restaurant-side terminal 120 using the terminal 160B at home (step S531).
- the possibility of making a reservation is examined (step S532), and if it is available, the reservation details such as the reservation person and the reservation date and time are registered in the presence recognition record table in the aircraft (step S533). If this is not possible, a message to that effect is transmitted to the terminal 160B (step S534).
- Figure 18 (c) is a diagram showing an example of the contents of the presence recognition record table when reservation details are registered.
- Information indicating that reservation information exists in a unit including seats and spaces inside the unit). Reservation date and time, reserved seat contents (including flight number, train number, room number, etc.), scheduled use time, scheduled use section, registrant's personal identification ID, registrant main unit management terminal ID, Register information such as the terminal ID that indicates the planned movement start space.
- the organization side terminal 120 receives the comparison target information from the exchange server 20 and the like along with the movement of the registrant, and determines the continuity of the individual real authentication (step S535).
- the registrant When the registrant arrives at the store and sits in the reserved seat, the registrant reads the personal information from the terminal 16 OA installed in the seat (step S536) and sends it to the organization terminal 120 via the building terminal 110 Then (step S537), the organization-side terminal 120 stores reservation information in the presence-recognition record table in which seat usage is limited to a specific person for the terminal 160A from the current time until a certain time (including the current space to a certain space). Verify whether is registered (step S538). If there is no reservation information, anyone can use it freely, so information indicating that is transmitted to the terminal 160A (step S539).
- the organization side terminal 120 performs personal authentication of the registrant based on the received personal information etc. and the comparison target information stored in its own device! ) If the registrant authentication is not established, the building side terminal 110 is read again for personal information, the situation check by the store clerk, or the processing to make the terminal side terminal 160A unusable. Use caution information that is instruction information is transmitted (step S541), and the building-side terminal 110
- step S542 The contents are displayed (step S542), and the instruction content is processed (step S543).
- step S544 usage attention information is transmitted to the building-side terminal 110 (step S545), and processing such as identity confirmation and reservation confirmation is performed based on the instruction information (steps S546 and S547).
- the organization side terminal 120 transmits information indicating that the end side terminal 160A unit can be used to the building side terminal 110 (step S548).
- the conventional reserved seat system has been judged to be a legitimate user by having a reserved ticket issued in advance, an electronic tag storing reserved seat information, a mobile phone, and the like. For this reason, it was necessary for the user to secure the proof at hand, troubles due to double ticketing, and reissuance processing when the designated ticket or mobile phone was lost or stolen.
- This authentication system uses the presence recognition record table, and the registrant uses the reservation details as electronic information. Since it is stored at the service provider side, it is only necessary to implement an authentication service that does not require a certificate at hand.
- the presence space of the registrant is recognized by personal authentication using the comparison target information, and various transaction processes are permitted within the space.
- the accuracy of personal authentication differs between the movement-related information that generates the ability to read personal information and the estimated presence information that is generated by the mobile device that is possessed, the transaction content and scope allowed by the registrant differ. Also allowed to set. For this reason, in the present embodiment, a process for linking the accuracy of personal authentication information with access control and various transaction permissions will be described.
- FIG. 20 shows an operation example of processing for determining an authentication level based on comparison target information used when performing personal authentication and performing access control according to the authentication level in the tenth embodiment of the present invention. It is a sequence chart.
- the authentication server 10A recognizes the registrant's existence space based on the comparison target information received from the exchange server 20 or the like (steps S601 to S602).
- the terminal 160A at the entrance reads the personal information of the registrant (step S603) and sends the read information and time information to the authentication server 1 OA (step S604). ). If the registrant wishes to be anonymous, the terminal-side terminal 160A does not perform the personal information reading process, and transmits the anonymous person's entrance, time information, and the like (step S605).
- the authentication server 10A executes authentication processing such as verification of read information and verification of continuity with the immediately previous comparison target information (step S606).
- authentication processing such as verification of read information and verification of continuity with the immediately previous comparison target information (step S606).
- the personal authentication is not established and when the anonymous person entrance information is received in step S605, the anonymous person entrance record is registered in the presence recognition record table, and “level 0” is automatically assigned (step S605).
- usage attention information which is instruction information for prohibiting personal information reading or terminal operation, may be transmitted to each terminal in the unit (step S608).
- Each terminal 160 that has received the usage attention information displays the instructed content (step S609) and performs the processing of the instructed content (step S609). S610).
- the authentication server 1 OA recognizes the presence of the registrant, registers an entry record such as the name of the resident in the presence recognition record table (step S611), and receives it in step S604. Based on the comparison target information and the latest comparison target information used for comparison verification in the process of step S606, the authentication level is determined by comparing with the authentication stage table in the device, and registered in the presence recognition record table ( Step S612).
- the authentication level is set for each space in the hospital.
- the authentication level determined this time is determined after performing the same processing as steps S604 to S611. It is verified whether the authentication level is higher than the authentication level set for the room (step SS616).
- the registrant's authentication support level is 6 or lower, it is lower than the set authentication level, so entry is not permitted! /, (Do not unlock the door! /), And there is no person in the unit below the set authentication level. Since the user has entered, usage attention information is transmitted to the terminal 160D, 160H on the terminal side (step S617). Terminal receiving the usage warning information displays the instruction content, the process (step S618, S619) 0 Further, use care information in this case, the usage control information of the terminal device 160H, the fifth embodiment It may also include the meaning of mandatory locking information for the terminal 160D on the terminal side in conformity with the above.
- the level matching information shown is transmitted (step S620). As a result, the terminal 160H can be operated, and electronic medical record information can be obtained and viewed (step S621).
- the registrant inputs the desired financial transaction content (type, amount, etc.) and sends it to the authentication server 10A (step S614).
- the authentication server 10A determines the authentication level by the same process as steps S604 to S611 (step S616), and then determines the authentication level required for the requested financial transaction content by referring to the authentication level comparison table. (Step S616).
- the current authentication level is the level of authentication required for the transaction.
- the financial transaction processing is executed (step S620). If not satisfied, information indicating that the authentication level is insufficient is returned, and a notification of a necessary authentication level, a re-authentication process, a change in transaction contents, etc. is prompted (step S617).
- FIG. 22 is a diagram showing an example of the contents of the authentication stage table. The type of comparison target information created by the latest authentication process and the type of comparison target information immediately before used in the authentication process are shown. The combined authentication level is set in 10 levels.
- the certification stage table not only provides a uniform level setting for the entire certification system, but also prepares one or more model patterns, and the service provider, unit administrator, registrant, etc. select the pattern that best suits them. May be. Further, the type, combination, and authentication level of comparison target information to be used may be freely set. For model patterns and individual settings, register the settings, registration date and time, and registration processing terminal.
- the judgment level may be determined by taking into account the ability to determine the authentication level based on the two pieces of information, the latest and the immediately preceding comparison target information, and one or more continuous comparison target information. The more information used, the more accurate the authentication level is determined.
- Fig. 23 is a diagram showing an example of the content of the authentication level transaction comparison table, showing the authentication level determined in the authentication stage table, the unit corresponding to that level, the processing content, the transaction scope, etc. Information is set.
- the unit name for each authentication level is an example of the unit, the entry / exit management conditions, the attendee information notification, the management correspondence notification, the caution information notification, the transaction range example, There is information such as the maximum amount.
- Visitor information notification refers to the function of notifying the administrator of the person's entry into the unit and the personal information of the person.
- the administrator response notice is information that instructs the administrator to perform actions such as manned response, video confirmation using a face information reader, person tracking system, etc. when the presence of a person in the unit is recognized.
- the notice information notification is information that notifies the administrator that a person below the set authentication level has entered the unit in the unit.
- the authentication level transaction comparison table as in the authentication stage table, select and register the uniform settings for the entire authentication system, model patterns, and self-declared settings.
- the registration level transaction comparison table established by the system operator will be forcibly set in advance for that registrant.
- the contents of transactions at each level are restricted from the generally prescribed contents, transaction notifications are given to the administrator side, and information for personal authentication is used. Requires that it be limited to movement-related information.
- the application and duration of this procedure is stipulated by the system operator separately from the criminal laws of each country. Also, if the maliciousness is high, notify or disclose to the other party of the transaction or the person concerned that the person is the compulsory authentication level transaction comparison table setter.
- This section describes the process of controlling admission to the unit in advance using the authentication level determined by the comparison target information, and the process of using the comparison target information as an identification card function.
- Figure 21 (b) is an image of an airport departure gate. A person who wants to leave enters the aircraft from Hall A through the departure gate. At the departure gate, terminal terminals 160A, 160B, and 160C are installed to read main biometric information.
- the registrant generates one or more pieces of information to be compared before arriving at the departure gate, and sends it to the organization terminal 120 of the immigration office from the exchange server 20 as presence notification information to recognize the existence space of the registrant.
- the registrant causes the end-side terminals 160A, 160B, and 160C to read the biometric information.
- the organization side terminal 120 determines the authentication level and registers it in the presence recognition record table.
- the organization-side terminal 120 determines whether the authentication level power S is “8” or higher because the set authentication level of Hall B, which is the space after passing through the departure gate, is “8”. In the case of “7” or less, the terminal terminal 160D, 160E that controls the opening and closing of the gate transmits information (hereinafter referred to as closing information) instructing to close the gate, and immediately receives the gate. To close. After that, as in step S617 of the ninth embodiment, usage attention information is transmitted, and re-authentication processing and the like are executed. As a result, registrants cannot enter Hall B, or if they do enter Hall C, they cannot enter Hall C and cannot leave the country.
- the organization terminal 120 recognizes the existence of the registrant based on the comparison target information, and based on the personal identification ID, the registrant's history information DB and basic information DB It is verified that there is no information that restricts departure, etc., and that it does not violate the unique requirements of the Immigration Bureau. As a result, if there is no problem, the information to be compared at the departure gate is registered as departure management information, and the terminal side terminals 160D and 160E are instructed to open the gate (hereinafter referred to as “open”). Information) and immediately open the gate. As a result, the registrant has the effect of completing the departure procedure without possessing or presenting a passport, and can proceed to the aircraft on board.
- the aircraft to be boarded is usually reserved in advance, so the presence of human beings is checked in two stages: reserved seat processing in the ninth embodiment and authentication level processing in the tenth embodiment.
- reserved seat processing in the ninth embodiment To prevent unauthorized persons from traveling abroad.
- the route to the airport can be predicted in advance, it is possible to arrive at the departure gate by creating travel advance notice information, accessing the main unit etc. using a guidance electronic recording medium, and acquiring comparison target information for authentication.
- the registrant can determine the authentication level at the time of arrival at his discretion.
- the registrant or related parties may be notified.
- the presence recognition record table is prepared in the terminal that manages the main unit, and the conditions for performing the notification process, the notification destination, etc. are registered in the table, or the conditions are set in the presence information notification table, and the exchange server 20 Always receive the presence notification information, and determine whether to execute the process.
- the conditions for executing the notification process mainly include the following (1) to (3).
- a guardian when a child is a management target, a guardian obtains a registration reference level as an index for determining an entry / exit management notification condition, spatial information such as a school, a friend's house, a school route, and a terminal identification ID. Set the authentication level and register it in the presence recognition record table.
- the authentication level of the existing unit is compared with the registration standard level in the presence recognition record table, and the guardian is not notified.
- Part or all of the personal identification ID, spatial information, and time information of the comparison target information used for personal authentication is automatically registered along with processing information, history information, result information, etc. executed by the authentication service. You can do it! /
- the information to be compared is created in the electronic medical record using the comparison information created by the terminal 160D on the terminal side when entering the examination room.
- the comparison target information created by the terminal 160D at the time of leaving the room or the comparison target information created in another space after leaving the room may be registered.
- the processing information of the authentication service that is performed in the specific space until the person who leaves the space or the recognition that exists in another space is created.
- the latest comparison information of related parties is automatically registered in the history information.
- the latest comparison target in the processing stage Information is registered in conjunction with data registration and processing of specified actions.
- measurement values such as blood pressure and body temperature
- the person is also identified by sending and registering the authentication information together.
- all the information in all the databases is stored in association with the personal identification ID unique to the registrant.
- the database used in this authentication system always stores this personal identification ID.
- Each terminal or server sends the registrant's personal history information to other terminals or servers.
- the registrant identification information is registrant's individual biometric information or registrant-specific electronic information, and is stored in an electronic recording medium or the like owned by the registrant.
- One or more registrant identification information is registered for each registrant in the authentication system.
- the registrant directly inputs the electronic information indicating characters, numbers, symbols, or the like, or a combination thereof into the terminal 160 on the terminal side, or writes the electronic information.
- Authentication may be performed by reading the recorded information recording medium.
- notification may be made using information notification technology developed for people with physical disabilities, such as artificial speech and vibrations, rather than just displaying information on the screen.
- An electronic tag or the like may be embedded in paper just attached to an electronic device, printed on paper or an article, or incorporated in a paper or article. is there.
- Each terminal or server in the above authentication system is realized mainly by a program loaded in the CPU and memory.
- this apparatus or server it is also possible to configure this apparatus or server by any other combination of hardware and software, and the degree of freedom in design is easily understood by those skilled in the art.
- the program is recorded on a recording medium such as an optical recording medium, a magnetic recording medium, a magneto-optical recording medium, or a semiconductor, and the recording medium strength described above is recorded. May be loaded, or a predetermined network It may be loaded from an external device connected via a network.
- FIG. 1 (a) is a block diagram showing a schematic configuration of an authentication system in an embodiment of the present invention, (b) is a diagram showing a configuration example of a database of an authentication server, and (c ) Is a list of database configurations of each terminal.
- FIG. 2 (a) is a diagram showing an example of the main items of the credit score table, and (b) is a diagram showing an example of detailed contents of the credit score table.
- FIG. 3 is a sequence chart showing a detailed operation example of personal authentication processing using movement information in the first embodiment of the present invention.
- FIG. 4 is a sequence chart showing an operation example of personal authentication processing in which simple authentication by a mobile phone and verification processing by a camera video are linked in the second embodiment of the present invention.
- FIG. 5 (a) is a diagram illustrating an example of a corresponding space between an antenna and the camera and the like, and (b) is a diagram illustrating a configuration example of a system such as an antenna and the camera.
- FIG. 6 is a sequence chart showing an operation example in which presence notification information is distributed to related terminals by an exchange server and used for mutual authentication service in the third embodiment of the present invention.
- FIG. 7 An example of a presence information notification table, (a) is a diagram showing an image of basic storage items, (b) is a diagram showing a registration image of a delivery destination, (C) shows specific delivery conditions.
- FIG. 8 is a sequence chart showing an operation example when providing the third party who wants to acquire the existence space information and time information of the registrant in the fourth embodiment of the present invention.
- FIG. 9 (a) is a diagram showing an image of information manipulation and installation of an information reading terminal in a hospital building, and (b) is an example of a system configuration such as a management terminal related to the terminal in (a).
- FIG. 9 (a) is a diagram showing an image of information manipulation and installation of an information reading terminal in a hospital building, and (b) is an example of a system configuration such as a management terminal related to the terminal in (a).
- FIG. 10 In the fifth embodiment of the present invention, when the registrant exists at the office, the move It is a sequence chart which shows the operation example of the authentication system by the information cooperation when it starts and arrives at a hospital.
- Presence recognition record table (a) is a diagram showing an example of the contents, (b) is a diagram showing a type image of presence recognition, (c) is (b) It is a figure which shows an example of no registration.
- FIG. 15 is a sequence chart showing a detailed operation example of grasping processing of an in-unit presence person using presence recognition of another terminal in the first modification of the eighth embodiment of the present invention.
- FIG. 15 is a sequence chart showing a detailed operation example of grasping processing of an in-unit presence person using presence recognition of another terminal in the first modification of the eighth embodiment of the present invention.
- Ser 16 In the ninth embodiment of the present invention, it is a sequence chart showing a detailed operation example of the recognition of the seat use situation using the comparison object information and the presence recognition record table.
- A) is an available equipment table
- (b) is a reserved farm
- (c) is a diagram showing an example of the contents of each person list.
- ⁇ is a diagram showing an image of the installation of the passenger seat unit
- (b) is a diagram showing a configuration example of a system such as a management terminal related to the terminal of ⁇
- (c) is a diagram It is a figure which shows an example of registration of a recognition record table.
- FIG. 19 is a sequence chart showing a detailed operation example of performing reserved seat reservation and use processing according to the comparison target information and the presence recognition record table in the first modification of the ninth embodiment of the present invention.
- FIG. 21 (a) is a diagram showing an image in which an authentication level is set for each space in a hospital building, and (b) is a diagram showing an image in which an authentication level is set for each space in an airport. It is. 22] It is a diagram showing an image of the authentication stage table.
- FIG. 23 shows an image of an authentication level transaction comparison table. Explanation of symbols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
明 細 書 Specification
個人認証システム Personal authentication system
技術分野 Technical field
[0001] 本発明は、認証システムに関し、特に、バイオメトリタス情報と、登録者が携帯する 情報端末と、社会に点在する監視カメラを中心とする撮影装置と、登録者が日常的 に利用する各種位置情報提供サービスと、各種処理とを連携させた認証システムに 関する。 TECHNICAL FIELD [0001] The present invention relates to an authentication system, and in particular, biometric information, information terminals carried by registrants, photographing devices centered on surveillance cameras scattered in society, and registrants use daily. It relates to an authentication system that links various location information providing services and various processes.
背景技術 Background art
[0002] 従来から、金融取引の際には、キャッシュカードという証明物とパスワード入力という 情報入力動作とを組み合わせることで、利用者本人である証明を行ってきた。また、 建物への入場の際には、社員証や学生証といった身分証明書を呈示することや、あ らかじめ与えられた鍵を利用してきた。 Conventionally, at the time of financial transactions, the identity of a user has been proved by combining a proof of cash card and an information input operation of password input. Also, when entering the building, they have presented ID cards such as employee ID cards and student ID cards, and previously used keys.
しかしながら、キャッシュカードや身分証明書の場合、印刷技術とスキミング技術の 進歩によってカードや書類が偽造可能となると共に、パスワードも生年月日や電話番 号等の推測可能な文字列が多いため、容易に他人が不正利用できる余地があった。 また、鍵という証明物品も短時間に複製を作成することが可能となっている。 However, in the case of cash cards and ID cards, advances in printing and skimming technologies make it possible to forge cards and documents, and passwords are also easy to guess because of many guessable character strings such as date of birth and phone number. There was room for others to illegally use. Also, it is possible to make a copy of the certification item called a key in a short time.
[0003] このような不正な認証行為を防止するため、近年、指紋情報や手のひら静脈情報と いったバイオメトリタス情報や、 ICカードや電子タグといった電子情報媒体による認証 が提案されている。このバイオメトリタス情報とは、その人に生体的に備わった固有の 情報をいい、他人には持ち得ないその人固有の情報であるため、偽造や不正入手 は困難であると言われてきた。また、 ICカードも耐タンパ性が高ぐ容易に格納情報 を第三者が入手することは困難であると言われてきた。 [0003] In order to prevent such unauthorized authentication, authentication using biometrics information such as fingerprint information and palm vein information and electronic information media such as IC cards and electronic tags has been proposed in recent years. This biometric information refers to information that is inherent to the person, and is unique to the person that cannot be possessed by others, so it has been said that it is difficult to counterfeit or obtain unauthorized information. . Also, it has been said that IC cards are highly tamper resistant and it is difficult for third parties to obtain stored information easily.
しかし、バイオメトリタス情報や電子情報媒体を用いた認証方法においても、その電 子情報の改竄や不正入手を行う技術も刻々と進化している状況であり、特に、インタ 一ネットを介した認証の場合には、相手側の姿を視認することが困難であるため、そ の認証の脆弱性は否定できなかった。 However, even in the authentication method using biometric information and electronic information media, the technology for tampering with and illegally obtaining the electronic information is constantly evolving, and in particular, authentication via the Internet. In this case, since it is difficult to see the other party's appearance, the vulnerability of the authentication cannot be denied.
[0004] このような電子情報による認証をセキュリティの面で強化したものの 1つとして、特許 文献 1が開示するところのバイオメトリタス情報と入力装置の位置情報を用いた個人 認証システムと、特許文献 2が開示するところの ICカードを用いた入場管理システム とが提案されている。 [0004] As one of the security enhancements of such electronic information authentication, A personal authentication system using biometrics information disclosed in Document 1 and position information of an input device and an admission management system using an IC card disclosed in Patent Document 2 have been proposed.
この特許文献 1では、事前に登録されたバイオメトリタス情報と、入力されたバイオメ トリタス情報と、情報入力装置の位置情報との照合により、個人を特定するものである また、特許文献 2では、事前に配布された ICカード内に格納された個人認証情報 を、入室希望時に読取端末に呈示し、個人を特定するものである。 In this patent document 1, an individual is specified by collating biometrics information registered in advance, input biometrics information, and position information of an information input device. Personal authentication information stored in a pre-distributed IC card is presented to the reading terminal when entering the room, and the individual is identified.
特許文献 1 :特開 2006— 236357 Patent Document 1: JP 2006-236357
特許文献 2:特開 2005— 285056 Patent Document 2: JP 2005-285056
[0005] 一方、個人認証処理を強化したものの 1つとして、特許文献 3が開示するところの空 間情報認識を用いたシステム制御が提案されてレ、る。 [0005] On the other hand, system control using spatial information recognition as disclosed in Patent Document 3 has been proposed as one of enhancements to personal authentication processing.
この特許文献 3では、個人情報の照合だけでなぐ照合用の個人情報の入力や読 取りが行われた空間と時間の連続性を加味して個人認証処理を行うため、人間の実 在性を精度高く提供することが可能となっている。 In this Patent Document 3, personal authentication processing is performed by taking into account the continuity of the space and time in which personal information for collation is entered and read only by collating personal information. It is possible to provide with high accuracy.
特許文献 3:特許第 3946243号 Patent Document 3: Patent No. 3946243
発明の開示 Disclosure of the invention
発明が解決しょうとする課題 Problems to be solved by the invention
[0006] しかしながら、このように、セキュリティ面を強化した電子情報による個人認証であつ ても、認証用情報の入力は登録者の主体的な動作に基づくため、動作回数が少な い場合には、比較する空間と時間の連続を不正に整合可能であり、一方、 ICカード を用いた入場管理システムでは、 ICカードの不正貸与や電子情報の改竄により、双 方共に個人のなりすましを完全に防止することは困難であった。 [0006] However, even in the case of personal authentication based on electronic information with enhanced security, the input of authentication information is based on the registrant's own actions, so if the number of actions is small, It is possible to illegally align the space and time sequence to be compared. On the other hand, in the admission management system using IC cards, both of them are completely prevented by impersonating IC cards and falsifying electronic information. It was difficult.
[0007] 本発明は、上記問題点に鑑みてなされたものであり、このような改竄、流出及び盗 難が容易とされる電子情報を用いてネットワークを介して個人認証を行うときに、仮に 改ざん等された場合であっても、バイオメトリタス情報の一致/不一致の認証に、登 録者の存在空間の推定情報を加えて、時間的 ·空間的な認証を行うことにより登録者 の実在性の認証精度を向上させ、その不正行為を容易に発見でき、システム内にお けるセキュリティ面の向上を実現させた認証システムを提供することを目的とする。 課題を解決するための手段 [0007] The present invention has been made in view of the above-mentioned problems, and when performing personal authentication via a network using electronic information that can be easily altered, leaked, and stolen, Regardless of whether or not it has been tampered with, the existence of the registrant is verified by performing temporal and spatial authentication by adding the estimated information of the registrant's existence space to the biometrics information match / mismatch authentication. Authentication accuracy can be improved and fraudulent activity can be easily detected. An object of the present invention is to provide an authentication system that realizes improved security. Means for solving the problem
[0008] かかる目的を達成するため、本発明は、登録者の個人情報を管理するデータべ一 スを備えるサーバ群と、前記登録者により操作される情報入力装置と、前記人物の所 持物の電波を受信する読取装置とが通信回線網を介して接続されてなる認証システ ムであって、前記情報入力装置は、前記登録者により入力された個人情報に基づい て個人認証を実施し、その認証結果として作成した移動情報を前記サーバ群に送信 し、前記読取装置は、前記登録者の所持物から受信した電波情報と端末識別情報 に基づ!/、て個人認証を実施し、その認証結果として作成した移動情報を前記サーバ 群に送信し、前記サーバ群は、前記情報入力装置力 前記移動情報を受信すると、 該受信した移動情報と、前記データベース内の過去の移動情報とを比較して、前記 登録者の実在性を認証することを特徴とする。 [0008] In order to achieve such an object, the present invention provides a server group including a database for managing personal information of a registrant, an information input device operated by the registrant, and the personal belongings of the person. An authentication system in which a reader that receives radio waves is connected via a communication network, and the information input device performs personal authentication based on personal information input by the registrant, and The mobile information created as an authentication result is transmitted to the server group, and the reader performs personal authentication based on the radio wave information received from the registrant's belongings and the terminal identification information, and the authentication is performed. The movement information created as a result is transmitted to the server group. When the server group receives the movement information, the server group compares the received movement information with past movement information in the database. , Characterized in that to authenticate the existence of the registrant.
[0009] また、本発明によれば、前記移動情報には、該移動情報送信元の情報入力装置の 設置位置に基づく空間情報と、前記人物により情報が入力された時期を示す時間情 報と、前記人物固有の個人識別 IDとが含まれることを特徴とする。 [0009] According to the present invention, the movement information includes spatial information based on an installation position of the information input device that is the movement information transmission source, and time information indicating a time when the information was input by the person. And a personal identification ID unique to the person.
[0010] また、本発明によれば、前記移動情報には、該移動情報送信元の読取装置が認識 した所持物の存在位置に基づく空間情報と、前記読取装置により電波が受信された 時期を示す時間情報と、前記人物固有の個人識別 IDとが含まれることを特徴とする [0010] Further, according to the present invention, the movement information includes the spatial information based on the position of the possessed item recognized by the reading device as the movement information transmission source and the time when the radio wave is received by the reading device. Including time information to be shown and a personal identification ID unique to the person.
〇 Yes
[0011] また、本発明によれば、前記認証システムは、前記移動情報に基づいて前記登録 者の個人認証された空間を示す情報を作成し、前記サーバ群に配信するための交 換サーバを有することを特徴とする。 [0011] Further, according to the present invention, the authentication system creates an exchange server for creating information indicating a space where the registrant is personally authenticated based on the movement information and distributing the information to the server group. It is characterized by having.
[0012] また、本発明によれば、前記交換サーバは、前記移動情報に含まれる個人識別 ID を、配信される前記サーバ群に即した個人 IDに変換し、前記登録者の実在情報を 配信することを特徴とする。 [0012] According to the present invention, the exchange server converts a personal identification ID included in the movement information into a personal ID corresponding to the server group to be distributed, and distributes the registrant's real information. It is characterized by doing.
[0013] また、本発明によれば、前記サーバ群は、前記情報入力装置又は読取装置を 1つ 以上管理することで、ネットワーク構成単位であるユニットを形成し、前記ユニット内の 前記情報入力装置又は読取装置によって前記登録者の個人情報が入力又は電波 が受信されると、前記サーバ群は、前記登録者が、前記ユニットが構成する物理空間 内に存在すると判断し、該判断後に、前記登録者が前記物理空間外に移動したこと を認識していないとき、他のユニット内の情報入力装置による前記登録者の個人情 報の入力又は読取装置による所持物の電波受信を認識すると、前記ユニット内の情 報入力装置に所定のサービスを前記登録者に提供する機能を備えている場合には 前記情報入力装置のサービス提供機能の停止又は制限を行うことを特徴とする。 [0013] Further, according to the present invention, the server group manages one or more information input devices or reading devices to form a unit that is a network configuration unit, and the information input device in the unit Or, the personal information of the registrant is input or radio waves by the reader. Is received, the server group determines that the registrant exists within the physical space that the unit constitutes, and recognizes that the registrant has moved out of the physical space after the determination. If the information input device in another unit inputs the personal information of the registrant or recognizes the radio wave reception of the belongings by the reading device, the registrant provides a predetermined service to the information input device in the unit. When the function to provide is provided, the service providing function of the information input device is stopped or restricted.
[0014] また、本発明によれば、前記サーバ群は、前記情報入力装置又は読取装置を 1つ 以上管 [0014] According to the present invention, the server group includes one or more information input devices or reading devices.
理することで、ネットワーク構成単位であるユニットを形成し、前記ユニット内の前記情 報入力装置又は読取装置によって前記登録者の個人情報が入力又は電波が受信 されると、前記サーバ群は、前記登録者が、前記ユニットが構成する物理空間から他 のユニットが配置された物理空間に移動したと判断し、該判断後に、前記移動前の ユニット内の情報入力装置による前記登録者の個人情報の入力又は読取装置によ る所持物の電波受信を認識すると、前記ユニット内の情報入力装置に所定のサービ スを前記登録者に提供する機能を備えている場合には前記情報入力装置のサービ ス提供機能の停止又は制限を行うことを特徴とする。 By forming a unit that is a network configuration unit, when the personal information of the registrant is input or a radio wave is received by the information input device or the reading device in the unit, the server group The registrant determines that the unit has moved from the physical space formed by the unit to the physical space in which the other unit is arranged, and after the determination, the registrant's personal information by the information input device in the unit before the movement If the information input device in the unit has a function of providing a predetermined service to the registrant upon recognizing the radio wave received by the input or reading device, the service of the information input device is provided. The provision function is stopped or restricted.
[0015] また、本発明によれば、前記サーバ群は、前記登録者の存在空間を示す情報を取 得すると、前記空間情報に該当する物理空間と前記物理空間周辺に設置された前 記情報入力装置又は読取装置に対し、前記登録者が存在することを検証する処理 を求めることを特徴とする。 [0015] According to the present invention, when the server group obtains information indicating the registrant's existence space, the physical space corresponding to the spatial information and the information installed in the vicinity of the physical space are provided. A process for verifying the existence of the registrant is requested from the input device or the reading device.
[0016] また、本発明によれば、前記サーバ群は、前記登録者の存在検証処理を求める情 報を受信した後に、前記登録者の存在を示す情報を取得できないと、存在未確認を 示す情報を前記交換サーバに対し、送信することを特徴とする。 [0016] Further, according to the present invention, if the server group cannot acquire the information indicating the existence of the registrant after receiving the information for requesting the registrant's existence verification process, the information indicating the existence unconfirmed Is transmitted to the exchange server.
[0017] また、本発明によれば、前記サーバ群は、前記情報入力装置に対して取引又はサ 一ビス又は操作の実行の許可情報を送信することを特徴とすることを特徴とする。 [0017] Further, according to the present invention, the server group transmits transaction, service or operation permission information to the information input device.
[0018] また、本発明によれば、前記サーバ群は、前記登録者の存在空間を示す情報を取 得すると、当該空間における取引又はサービス又は操作を、前記登録者に属する処 理として実行することを特徴とする。 [0019] また、本発明によれば、前記取引又はサービス又は操作は、金融取引、決済取引、 データ閲覧、データ登録、電子カルテ利用、開錠又は施錠、前記情報入力装置の操 作であることを特徴とする。 [0018] Further, according to the present invention, when the server group obtains information indicating the existence space of the registrant, the server group executes a transaction or service or operation in the space as a process belonging to the registrant. It is characterized by that. [0019] According to the present invention, the transaction or service or operation is a financial transaction, a settlement transaction, data browsing, data registration, use of an electronic medical record, unlocking or locking, and operation of the information input device. It is characterized by.
[0020] また、本発明によれば、前記サーバ群は、前記登録者の移動情報と、存在空間を 示す情報と、前記交換サーバを介して受信した他のサーバ群が認識した存在空間を 示す情報とを比較し、利用可能な処理範囲を決定することを特徴とする。 [0020] Further, according to the present invention, the server group indicates the movement information of the registrant, the information indicating the existence space, and the existence space recognized by another server group received via the exchange server. The processing range is determined by comparing with information.
[0021] また、本発明によれば、前記サーバ群は、前記登録者の存在位置を示す情報と、 当該情報と連続する前記登録者の存在位置を示す情報とを比較し、前記登録者の 認証精度段階を決定することを特徴とする。 [0021] According to the present invention, the server group compares information indicating the location of the registrant with information indicating the location of the registrant that is continuous with the information, and The authentication accuracy step is determined.
[0022] また、本発明によれば、前記サーバ群は、前記登録者が、前記ユニットが配置され た物理空間から他のユニットが配置された物理空間に移動したと判断した後で、前記 ユニット内で前記登録者の個人情報が入力されると、異常事態であると判定すること を特徴とする。 [0022] According to the present invention, the server group may be configured such that the registrant determines that the unit has moved from the physical space in which the unit is disposed to the physical space in which another unit is disposed. When the personal information of the registrant is input, it is determined that an abnormal situation has occurred.
[0023] また、本発明によれば、前記サーバ群は、前記登録者の個人情報の入力が異常事 態であると判定すると、前記情報入力装置又は読取装置に対して施錠又は映像撮 影又は写真撮影を指示する情報を送信することを特徴とする。 [0023] Further, according to the present invention, when the server group determines that the input of the personal information of the registrant is an abnormal state, the server group locks or shoots images to the information input device or the reading device. Information for instructing photography is transmitted.
[0024] また、本発明によれば、前記サーバ群は、前記登録者が、前記ユニットが配置され た物理空間内に存在すると判断した後で、交換サーバから前記登録者が他のュニッ トで個人認証されたことを示す情報を受信すると、前記登録者が前記ユニットが配置 された物理空間から退場したと認識することを特徴とする。 [0024] Further, according to the present invention, after the registrant determines that the registrant exists in the physical space in which the unit is arranged, the registrant has another unit from the exchange server. When receiving information indicating that personal authentication has been performed, the registrant recognizes that the unit has left the physical space in which the unit is placed.
[0025] また、本発明によれば、前記サーバ群は、前記人物の個人信用度を計算するため の計算システムを有することを特徴とする。 [0025] Further, according to the present invention, the server group includes a calculation system for calculating the personal credit of the person.
[0026] なお、以上の構成要素の任意の組合せや、本発明の構成要素や表現を方法、装 置、認証システム、コンピュータプログラム、コンピュータプログラムを格納した記録媒 体などの間で相互に置換したものもまた、本発明の態様として有効である。 [0026] It should be noted that any combination of the above-described constituent elements, and the constituent elements and expressions of the present invention are mutually replaced between a method, apparatus, authentication system, computer program, recording medium storing the computer program, and the like. Those are also effective as an embodiment of the present invention.
発明の効果 The invention's effect
[0027] 本発明における認証システムは、複数の端末を有し、登録者の個人情報を入力す る端末が有する位置情報や、登録者の所持する情報端末が送受信する電波により 特定される位置情報に基づいて、登録者の認証を行うシステムであって、登録者の 物理的移動に応じて、認証システム内における登録者の個人情報の格納位置が移 動し、登録者以外の第三者は、その登録者の個人情報の格納位置を特定することが 困難であるため、そのような第三者による登録者の個人情報の、改竄、流出及び盗 難を防止するとともに、その不正行為を容易に発見でき、システム内におけるセキユリ ティ面の向上を実現させることが可能となる。 [0027] The authentication system according to the present invention has a plurality of terminals and is based on position information held by a terminal that inputs registrant's personal information and radio waves transmitted / received by an information terminal held by the registrant. A system that authenticates registrants based on specified location information, and the storage location of the registrant's personal information in the authentication system moves according to the physical movement of the registrant. Since it is difficult for a third party to specify the storage location of the registrant's personal information, such third parties prevent the registrant's personal information from being altered, leaked, or stolen. The fraudulent behavior can be easily detected, and security in the system can be improved.
発明を実施するための最良の形態 BEST MODE FOR CARRYING OUT THE INVENTION
[0028] <認証システムの基本構成及び基本動作の説明〉 <Description of Basic Configuration and Basic Operation of Authentication System>
以下、各実施の形態の説明に入る前に、本実施の形態における認証システムの基 本構成及び基本動作について、以下の項目に分けて説明する。 Before describing each embodiment, the basic configuration and basic operation of the authentication system according to this embodiment will be described below by dividing it into the following items.
•認証システムの基本構成 • Basic configuration of authentication system
•認証システムを構成する各端末の共通の特徴 • Common features of each terminal that composes the authentication system
•各端末が有する基本情報 • Basic information each terminal has
•各端末が備えるデータベースの構成例 • Example of database configuration for each terminal
[0029] (認証システムの基本構成:全体構成) [0029] (Basic configuration of authentication system: overall configuration)
図 1 (a)は、本発明実施形態での認証システムの概略構成を示すブロック図である 図 1 (a)に示すように、認証システムは、登録者の履歴情報を管理する認証サーバ 10と、登録者の存在位置情報又は存在未確認情報を配信する交換サーバ 20と、マ ンシヨンやビル等のある建築物内に設置される端末を統合管理する建物側端末 110 と、行政機関や企業や学校等のある組織内に設置される端末を統合管理する組織 側端末 120と、〇〇町 1丁目といったある地域内に設置される端末を統合管理する 地域管理側端末 130と、これら各端末 110, 120, 130により統合管理されない端末 を補完的に統合管理する中継側端末 140と、これら各端末 110, 120, 130, 140を 統合管理する集約側端末 150と、登録者の行動範囲に設置されその登録者の認証 を行う末端側端末 160と、がインターネット、有線通信回線網、無線通信回線網、地 上デジタル波、赤外線通信、光ファイバ一通信、量子通信、電力線通信、ミリ波通信 、人体通信、微弱電波等のネットワークである通信回線網 200を介して接続されて構 成される。 FIG. 1 (a) is a block diagram showing a schematic configuration of the authentication system in the embodiment of the present invention. As shown in FIG. 1 (a), the authentication system includes an authentication server 10 that manages registrant history information, and , The exchange server 20 that distributes the registrant's location information or unconfirmed information, the building-side terminal 110 that integrates and manages the terminals installed in buildings such as mansions and buildings, and administrative agencies, companies, and schools Organizational side terminal 120 that integrates and manages terminals installed in a certain organization, regional management side terminal 130 that integrates and manages terminals installed in a certain area such as OOmachi 1-chome, and each of these terminals 110, Relay terminal 140 that complementarily integrates and manages terminals that are not integratedly managed by 120 and 130, aggregation terminal 150 that integrates and manages these terminals 110, 120, 130, and 140, The terminal 160 for authenticating the registrant Communication network 200, which is a network of the Internet, wired communication network, wireless communication network, digital terrestrial wave, infrared communication, optical fiber communication, quantum communication, power line communication, millimeter wave communication, human body communication, weak radio wave, etc. Connected through Made.
これらの各端末は、用途や設置位置等に応じて細分化されているが、以下「各端末 」と表すときには、特記しない限り、これら各端末 10、 20、 110、 120、 130、 140、 15 0、 160全てを示すものであるとする。 Each of these terminals is subdivided according to the application, installation location, etc., but when referred to below as “each terminal”, unless otherwise specified, each of these terminals 10, 20, 110, 120, 130, 140, 15 It is assumed that 0 and 160 are all shown.
また、建物側端末 110と、組織側端末 120と、地域管理側端末 130と、中継側端末 140と、を総称して以下では、「サブサーバ群」とする。 Further, the building-side terminal 110, the organization-side terminal 120, the regional management-side terminal 130, and the relay-side terminal 140 are collectively referred to as “sub-server group” below.
各端末は、登録者の個人の履歴情報や存在位置情報等を記録管理するためのデ ータベース(DB)を具備し、そのデータベース内の管理構造の詳細については後述 する。 Each terminal has a database (DB) for recording and managing the registrant's personal history information and location information, and the details of the management structure in the database will be described later.
また、各端末は、バイオメトリタス情報等の個人情報の読取機能、証拠物の真贋判 定機能、赤外線、温度、湿度、照度、人感、音、電波状況、電力状況、加速度、歪、 振動、磁気等を把握できるセンサーを付帯又は搭載することもある。 In addition, each terminal has a function for reading personal information such as biometrics information, a function for determining the authenticity of evidence, infrared, temperature, humidity, illuminance, human feeling, sound, radio wave status, power status, acceleration, distortion, vibration In some cases, a sensor capable of grasping magnetism or the like is attached or mounted.
[0030] (認証システムの基本構成:認証サーバ 10) [0030] (Basic configuration of authentication system: authentication server 10)
認証サーバ 10は、登録者の個人情報の管理を行う管理機関により管理運営される サーバ装置であり、個人の履歴情報や存在位置情報に基づいて、その登録者の認 証を行う機能と、データベース(DB) 11を具備している。 The authentication server 10 is a server device managed and operated by a management organization that manages the personal information of the registrant. The authentication server 10 has a function for authenticating the registrant based on personal history information and location information, and a database. (DB) 11
[0031] (認証システムの基本構成:交換サーバ 20) [0031] (Basic configuration of authentication system: exchange server 20)
交換サーバ 20は、登録者の存在位置情報の受信及び配信処理を行う管理機関に より管理運営されるサーバ装置である。この交換サーバ 20は、受信した存在位置情 報を配信及び格納する機能と、その登録者の存在位置情報と存在未確認情報により 登録者の認証を行う機能と、データベース(DB) 21を具備している。 The exchange server 20 is a server device managed and operated by a management organization that receives and distributes location information of registrants. The exchange server 20 includes a function for distributing and storing the received location information, a function for authenticating a registrant based on the location information of the registrant and information about whether or not the registrant is present, and a database (DB) 21. Yes.
[0032] (認証システムの基本構成:集約側端末 150) [0032] (Basic configuration of authentication system: Aggregation side terminal 150)
集約側端末 150は、認証サーバ 10と、末端側端末 160を統合管理するサブサー バ群とを通信回線網 200を介して接続するために設けられたサブサーバ装置である 。但し、システム構成上では、認証サーバ 10とサブサーバ群とが、集約側端末 150を 介さずに直接的に接続されていることや、集約側端末 150が認証サーバ 10とサブサ ーバ群との間に複数設置されていることもある。 Aggregation-side terminal 150 is a sub-server device provided to connect authentication server 10 and a group of sub-servers that collectively manage terminal-side terminal 160 via communication network 200. However, in the system configuration, the authentication server 10 and the sub server group are directly connected without using the aggregation side terminal 150, or the aggregation side terminal 150 is connected between the authentication server 10 and the sub server group. There may be several installed in between.
集約側端末 150は、認証サーバ 10の機能を代行し、履歴情報や存在位置情報に 基づいて、その登録者の認証を行う機能と、データベース(DB) 151を具備している Aggregation side terminal 150 performs the function of authentication server 10 and stores it in history information and location information. Based on this, it has a function to authenticate the registrant and a database (DB) 151.
[0033] (認証システムの基本構成:建物側端末 110) [0033] (Basic configuration of authentication system: building-side terminal 110)
建物側端末 110は、建物毎にその建物内部又は周辺部に設置された末端側端末 160を統合管理するために設けられたサブサーバ装置である。この建物側端末 110 は、認証サーバ 10又は集約側端末 150の機能を代行し、履歴情報や存在位置情報 に基づいて、その登録者の認証を行う機能と、データベース(DB) 111を具備してい また、建物側端末 110による末端側端末 160の統合管理単位は、建物内でより細 分化されていてもよぐ部屋、学校の教室、マンションの独立した区分単位、ビル内の 入居個人 ·団体単位、階別単位で構成されて!、てもよレ、。 The building-side terminal 110 is a sub-server device that is provided for integrated management of the terminal-side terminal 160 installed in or around the building for each building. The building-side terminal 110 performs the function of the authentication server 10 or the aggregation-side terminal 150, and has a function of authenticating the registrant based on history information and location information, and a database (DB) 111. In addition, the integrated management unit of the terminal 160 by the building terminal 110 is a room, a school classroom, an independent division unit of the condominium, a resident individual / group unit in the building, which may be further subdivided in the building It is composed of floor units!
建物側端末 110の利用者は、学校、工場、病院、空港、駅、店舗、ドア等の管理機 関又は利用機関、航空機や電車、建物や構造物の所有者又は使用者自身である。 The user of the building-side terminal 110 is a management organization such as a school, a factory, a hospital, an airport, a station, a store, a door, or a user organization, an owner of an aircraft, a train, a building or a structure, or a user.
[0034] (認証システムの基本構成:組織側端末 120) [0034] (Basic configuration of authentication system: organization side terminal 120)
組織側端末 120は、データベースを利用する学校、会社、公共機関又は任意の団 体等によって使用される末端側端末 160をそれぞれ統合管理するために設けられた サブサーバ装置である。この組織側端末 120は、認証サーバ 10又は集約側端末 15 0の機能を代行し、履歴情報や存在位置情報に基づいて、その登録者の認証を行う 機能と、データベース(DB) 121を具備している。 The organization-side terminal 120 is a sub-server device provided for integrated management of each terminal-side terminal 160 used by a school, company, public institution, or any organization that uses a database. This organization-side terminal 120 performs the function of the authentication server 10 or the aggregation-side terminal 150, and has a function of authenticating the registrant based on history information and location information, and a database (DB) 121. ing.
組織側端末 120の利用者は、学校、会社全体又は支店 ·部門、区市町村役場又は 外務省等の省庁、金融機関(電子マネー運営会社を含む)、病院、趣味の会、店舗 の売り場単位、ビル管理組合、出入口や電子マネー端末やレジスタ一等の管理者又 は利用者などが考えられる。また、一つの組織が複数分野の商行為や取引を行う場 合、各分野毎に組織側端末 120を設け、関係する末端側端末 160を統合管理する ようにしてもよい。 Users of organization-side terminal 120 are: schools, entire companies or branches / departments, municipalities, ministries and agencies such as the Ministry of Foreign Affairs, financial institutions (including electronic money management companies), hospitals, hobby associations, store sales units, It may be a building management association, an entrance / exit, an electronic money terminal, a manager of a register, or a user. Further, when a single organization conducts business activities and transactions in a plurality of fields, an organization-side terminal 120 may be provided for each field, and the related terminal-side terminals 160 may be integrated and managed.
[0035] (認証システムの基本構成:地域管理側端末 130) [0035] (Basic configuration of authentication system: regional management side terminal 130)
地域管理側端末 130は、都道府県、区市町村、町名等の行政単位、又は、無線及 び有線の基地局が管理する範囲内に設置された末端側端末 160を統合管理するた めに設けられたサブサーバ装置である。この地域管理側端末 130は、認証サーバ 10 又は集約側端末 150の機能を代行し、履歴情報や存在位置情報に基づいて、その 登録者の認証を行う機能と、データベース(DB) 131を具備している。 The terminal 130 on the regional management side is used for the integrated management of the terminal unit 160 installed within the range managed by administrative units such as prefectures, municipalities, and town names, or by wireless and wired base stations. This is a sub-server device provided for the purpose. The regional management side terminal 130 performs the function of the authentication server 10 or the aggregation side terminal 150, and has a function of authenticating the registrant based on history information and location information, and a database (DB) 131. ing.
例えば、この地域管理側端末 130は、次に示すような一定地域内に設置された末 端側 For example, the regional management terminal 130 is located on the terminal side installed in a certain area as shown below.
端末 160を統合管理する。 The terminal 160 is integratedly managed.
•2つのそれぞれ異なる経線と 2つのそれぞれ異なる緯線によって囲まれた一定地 域内 • Within a certain area surrounded by two different meridians and two different latitudes
•地球上の一点を中心点として円状 ·方形状に特定された一定地域内 • Circular shape with one point on the earth as the central point · Within a certain area specified as a square shape
•宇宙の一点を頂点とした円錐状から地球上に特定された一定地域内 • Within a certain area specified on the earth from a cone with a point in the universe
•電波塔、電波受発信機が交信可能な一定地域内 • Within a certain area where radio towers and radio transmitters / receivers can communicate
[0036] (認証システムの基本構成:中継側端末 140) [0036] (Basic configuration of authentication system: relay terminal 140)
中継側端末 140は、建物側端末 110、組織側端末 120、地域管理側端末 130とは 直接接続されていない末端側端末 160を管理運営するために設けられたサブサー バ装置である。この中継側端末 140は、認証サーバ 10又は集約側端末 150の機能 を代行し、履歴情報や存在位置情報に基づいて、その登録者の認証を行う機能と、 データベース(DB) 141を具備している。 The relay-side terminal 140 is a sub-server device provided to manage and operate the end-side terminal 160 that is not directly connected to the building-side terminal 110, the organization-side terminal 120, and the regional management-side terminal 130. This relay side terminal 140 acts as a proxy for the function of the authentication server 10 or the aggregation side terminal 150, and has a function of authenticating the registrant based on history information and location information, and a database (DB) 141. Yes.
[0037] (認証システムの基本構成:末端側端末 160) [0037] (Basic configuration of authentication system: terminal 160 on the terminal side)
末端側端末 160は、登録者等の日常行動範囲、及び人が離散集合する建物や場 所、組織及び地域に設置される情報処理装置、又は登録者が所持する情報処理装 置であって、登録者個人のバイオメトリタス情報や、パスポート '免許証 '磁気カード' 認証用カード等の証拠物の情報、パスワード、携帯電話機や携帯情報端末や GPS システム等の電波、 ICカードや電子タグやビーコン(以下では、電子タグ等とする)の 電波等を、読み取り又は入力又は交信し(以下では、入力とする)、履歴情報や存在 位置情報に基づいて、その登録者の認証を行う機能と、データベース(総合 DB161 )を具備している。 The terminal 160 is an information processing device installed in a daily activity range of a registrant, etc., and a building, place, organization, or area where people gather, or an information processing device possessed by a registrant. Personal biometrics information of registrants, information on evidence such as passport 'license' magnetic card 'authentication cards, passwords, radio waves from mobile phones, personal digital assistants and GPS systems, IC cards, electronic tags and beacons A function that reads, inputs, or communicates radio waves (hereinafter referred to as electronic tags, etc.) (hereinafter referred to as inputs), and authenticates the registrant based on history information and location information; It has a database (general DB161).
また、末端側端末 160は、登録者の個人認証が成功した場合、入退場、電子マネ 一利用、金融取引、各種システムの利用、鍵の開錠、各種電気製品の利用、書類印 刷、各種情報の閲覧等を許可し、身分証明情報の提供、個人認証に基づく全ての 処理を提供する。 In addition, the terminal 160, when the registrant's personal authentication is successful, enters and exits, uses electronic money, financial transactions, uses various systems, unlocks keys, uses various electrical products, and signs documents. Printing, browsing various information, etc., providing identification information and all processing based on personal authentication.
認証の結果、登録者がこの末端側端末 160等からこれらの各種サービスを受けるこ とを「端末で利活用する」という。 As a result of authentication, the fact that a registrant receives these various services from the terminal 160 on the terminal side is referred to as “utilization on the terminal”.
末端側端末 160は、情報入力装置としての機能、認証履歴情報や個人情報を自 端末に登録する機能、登録済みの個人情報や認証履歴情報を閲覧する機能と他の 各端末と送受信を行う機能を有する。 Terminal-side terminal 160 functions as an information input device, a function for registering authentication history information and personal information in its own terminal, a function for browsing registered personal information and authentication history information, and a function for transmitting and receiving with each other terminal Have
末端側端末 160は、携帯電話機、携帯情報端末、 ICカード、電子記録媒体、 RFI Dを含み、家庭用電化製品や各種機械等の中に設置されることもある。なお、この末 端側端末 160は、登録者自身が所有又は占有するだけでなぐ認証システムの管理 側等から登録者が貸借するものであってもよレ、。 The terminal 160 includes a mobile phone, a portable information terminal, an IC card, an electronic recording medium, and RFI D, and may be installed in household appliances and various machines. Note that the terminal 160 may be rented by the registrant from the management side of the authentication system, etc., which the registrant himself owns or occupies.
[0038] 本発明の実施の形態における認証システムは、前述した構成要素により構成される [0038] An authentication system according to an embodiment of the present invention includes the above-described components.
1S 後述する各実施の形態において、認証システムは、その構成要素により選択的 に構成されるものとする。 1S In each embodiment to be described later, the authentication system is selectively configured by its components.
[0039] (各端末共通の特徴) [0039] (Features common to all terminals)
ここで、前述の各端末に共通した特徴について説明を進める。 Here, a description will be given of features common to the above-described terminals.
1. 自機の設置位置情報の格納 1. Storage of the installation position information of own machine
2. 自機の設置位置情報等の付帯送信機能 2. Auxiliary transmission function such as installation position information of own machine
3.端末識別 IDの格納 3. Storage of terminal identification ID
4. 自機の利用目的情報の格納 4. Storage of usage information of own machine
[0040] (各端末の共通特徴: 1.設置位置情報又は設置空間情報の格納) [0040] (Common features of each terminal: 1. Storage of installation position information or installation space information)
各端末は、自端末が設置されて!/、る位置を示す設置位置情報をそれぞれ格納して いる。 Each terminal stores installation position information indicating the position where the terminal is installed! /.
この設置位置情報は、その情報端末が実際に設置されて!/、る位置の 2次元または 3次元情報または設置位置の名称を示すもの等である。 2次元情報とは緯度及び経 度により表され、 3次元情報とは緯度及び経度に加え地上からの高さ又は地下の深 度により表される空 This installation position information includes the 2D or 3D information of the position where the information terminal is actually installed and / or the name of the installation position. Two-dimensional information is represented by latitude and longitude, and three-dimensional information is the sky represented by height from the ground or underground depth in addition to latitude and longitude.
間認識情報をいう。なお、高さ又は深度は、メートル法による表示に加え、例えば、建 物の 2階、地下 1階といった表示、海抜での表示であってもよい。また、設置位置の名 称を示す例としては、「〇〇ビル 6階」、「〇〇病院受付窓口 1号機」のように設置位置 が固定されているもののほか、例えば、飛行機、電車、自動車、エレベータ、エスカレ ータ、携帯端末等のように、刻々と設置位置及び高度が変化するものでは、例えば、 「〇〇航空所有 X X社製△△型機、機体番号 123の飛行機の搭乗口右側ドア」とい つよつに示される。 Inter-recognition information. Note that the height or depth is displayed in addition to the metric display. The display may be the second floor of the object, the first floor of the basement, or the display above sea level. In addition, examples of names of installation locations include fixed locations such as “00 Building 6th Floor” and “00 Hospital Reception Desk Unit 1”, as well as airplanes, trains, automobiles, etc. , Elevators, escalators, portable terminals, etc. whose installation position and altitude change every moment. For example, “Owner owned XX company △△ type aircraft, right side of boarding gate of airplane number 123 It is always indicated as “door”.
また、 GPS認証システムやフライトレコーダーに代表される位置情報認識認証シス テムが利用可能である場合には、当該システムの規定する情報形態で表示すること や、携帯電話機や携帯情報端末のように、刻々と当該端末の位置が変化していくも のは、無線交信、赤外線交信等を行っている基地局、電波受信体等の適用圏内を 空間として認識し、設置位置情報とすることを認める。 In addition, when a location information recognition authentication system represented by a GPS authentication system or a flight recorder is available, it can be displayed in the information format specified by the system, or a mobile phone or a mobile information terminal, When the location of the terminal changes from moment to moment, it is allowed to recognize the applicable range of base stations, radio wave receivers, etc. that are performing wireless communication and infrared communication as space and use it as installation location information.
なお、位置情報の格納には、端末内には自機を識別する ro情報のみ格納し、通信 回線網 200を通じてネットワーク内の別端末にある ro情報に結び付いた位置情報を 取得し、位置情報を認識する方式も含むのは言うまでもない。 To store location information, only ro information that identifies the device itself is stored in the terminal, and location information associated with ro information in another terminal in the network is acquired through the communication network 200, and the location information is acquired. Needless to say, the recognition method is also included.
以上説明した例では、各端末は、その自身の設置位置を示す情報を自身に格納し て!/、たが、情報端末に GPS等の現在位置を認識可能な機器が備えられて!/、る場合 、その機器が現在位置(2次元 /3次元情報又は設置位置の周囲の状況)を認識し てもよい。 In the example described above, each terminal stores information indicating its own installation position in itself! /, But the information terminal is equipped with a device such as GPS that can recognize the current position! /, The device may recognize the current location (2D / 3D information or the situation around the installation location).
また、携帯電話基地局や無線アンテナ等(以下では、アンテナ等)、監視カメラゃビ デォカメラや顔情報読取装置等(以下では、カメラ等)の場合、端末の設置位置と、 端末が交信可能な空間又は撮影可能な空間を示す情報を併せて、設置位置情報と することあある。 In addition, in the case of mobile phone base stations, wireless antennas (hereinafter referred to as antennas), surveillance cameras, video cameras and facial information readers (hereinafter referred to as cameras), the location of the terminal and the terminal can communicate with each other. The information indicating the space or the space that can be photographed may be used as installation position information.
[0041] (各端末の共通特徴 : 2. 自機の設置位置情報等の付帯送信機能) [0041] (Common features of each terminal: 2. Auxiliary transmission function such as installation location information of own device)
各端末は、入力(読取)情報と、移動情報と、各種情報とを、各端末に対して送信す る機能を有している。このとき、各端末は、それらの送信情報に、前述の自端末の設 置位置情報及び端末識別 IDを対応付けて送信する。このことにより、システムにおい て情報の送信元と空間情報を容易に確定することができる。 Each terminal has a function of transmitting input (reading) information, movement information, and various types of information to each terminal. At this time, each terminal transmits the transmission information in association with the above-described location information of the terminal and the terminal identification ID. This makes it easy to determine the information source and spatial information in the system.
[0042] (各端末が有する基本情報: 3.端末識別 IDの格納) 各端末には、その端末自体を特定するための固有の識別情報 (端末識別 IDを含 む)がそれぞれ割り当てられ、各端末自身の識別情報を格納して!/、る。 [0042] (Basic information held by each terminal: 3. Storage of terminal identification ID) Each terminal is assigned unique identification information (including the terminal identification ID) for identifying the terminal itself, and stores each terminal's own identification information.
この識別情報は、一般的な識別 ID又は認識番号のように数桁の文字列であっても よい。また、識別情報には、併せて設置場所の名称や具体的説明が付与されている ことが好ましい。特に、同一の緯度と経度によって表される一点に設置された端末の 場合、設置高度や設置目的別に識別情報を付与し、明確な端末特定を可能なように しておくこととする。 This identification information may be a character string of several digits such as a general identification ID or an identification number. In addition, it is preferable that the identification information is given a name of the installation location and a specific description. In particular, in the case of terminals installed at one point represented by the same latitude and longitude, identification information is assigned according to installation altitude and installation purpose so that clear terminal identification is possible.
[0043] (各端末が有する基本情報: 4. 自機の利用目的情報の格納) [0043] (Basic information held by each terminal: 4. Storage of usage information of own device)
また、各端末は、登録者の認証を行い、その認証結果や登録者の個人情報の送受 信を行う機能に加え、複合的に他の機能を備え、複数の利用目的に適用可能であつ てもよぐその利用可能機能を示す情報を格納する。 In addition to the function to authenticate the registrant and send / receive the authentication result and the personal information of the registrant, each terminal has multiple other functions that can be applied to multiple purposes. Stores information indicating the available functions.
例えば、自宅玄関の外側のドアノブに設置されている末端側端末 160の場合、登 録者が建物内に入るためにドアノブを握ったときに、認証を行い、このドアの鍵を開 錠して入室を許可するかどうかを判断する。同時に、「家の中に存在することになる」 という認識によって、室内灯が自動的に点灯する処理を指示する動作が付随的に行 われるように設定しておいてもよい。このように、 1つの端末に複数の目的を重ねるこ とで、端末の利便性を向上させることが可能である。 For example, in the case of a terminal 160 installed on the doorknob outside the house entrance, when the registrant holds the doorknob to enter the building, authentication is performed and the door lock is unlocked. Determine whether to allow entry. At the same time, it may be set such that the operation of instructing the process of automatically turning on the room lamp is performed in accordance with the recognition that “it will be in the house”. In this way, it is possible to improve the convenience of a terminal by stacking multiple purposes on one terminal.
[0044] (データベースの構成例:全体構成例) [0044] (Database configuration example: overall configuration example)
図 1 (b)は、本発明の認証システムのデータベースの構成例を、認証サーバ 10に 備する総合 DB11を例にして示している。また、図 1 (c)は、本システム内の各端末は 総合 DB11と同様の方式でデータベース構成を行うことを示した一覧表である。 図に示すように、総合 DB11は、履歴情報 DB12と、検証情報 DB13と、基礎情報 DB14と、可否情報 DB15と、検索情報 DB16とにより構成される。以下では、各端末 が管理するデータベース内の情報をまとめて、個人情報とする。 FIG. 1 (b) shows an example of the database configuration of the authentication system of the present invention, taking the integrated DB 11 provided in the authentication server 10 as an example. Figure 1 (c) is a list showing that each terminal in this system configures the database in the same way as the general DB11. As shown in the figure, the comprehensive DB 11 is composed of a history information DB12, a verification information DB13, a basic information DB14, an availability information DB15, and a search information DB16. Below, the information in the database managed by each terminal is summarized as personal information.
なお、可否情報 DBと検索情報 DBは、総合 DB内に格納せず、総合 DBと並列的に 具備させてもよい。 The availability information DB and the search information DB may not be stored in the general DB, but may be provided in parallel with the general DB.
[0045] 履歴情報 DBは、個人の履歴に関する情報を格納するデータベースであり、登録者 が登録した経歴、行動歴、診療カルテ、金融や購入等の各種取引履歴や残高、入 退室履歴、バイオメトリタス情報などを全て保管格納するための所定欄が設けられて いる。また、各端末が行った個人情報登録、閲覧要求、認証要求、個人情報の正当 性要求又は正当性回答などの履歴を保管する部分も有する。 [0045] The history information DB is a database that stores information related to personal history, and is a registered person. There are pre-defined columns for storing and storing all of the registered history, behavior history, medical records, various transaction histories such as finance and purchases, balance, entry / exit history, and biometrics information. It also has a part to store the history of personal information registration, browsing requests, authentication requests, legitimate requests for personal information or legitimacy responses made by each terminal.
[0046] 検証情報 DBは、個人の実在性又はその個人情報の真正性の検証に関する処理 工程、実行内容、証拠、証人などの情報を格納するデータベースであり、登録者の 実在性を検証した関係者の行動記録、関係機関とのやり取り内容、証拠物、及び証 人の映像/音声などを電子的情報に置き換えて保管している。 [0046] The verification information DB is a database that stores information on processing steps, execution details, evidence, witnesses, etc. related to verification of the existence of an individual or the authenticity of the personal information. The behavioral records of the person, the contents of exchanges with related organizations, evidence, and video / audio of the witness are replaced with electronic information and stored.
[0047] 基礎情報 DBは、個人情報の基礎部分となる情報を格納するデータベースであり、 自端末及び自端末と関係がある端末に格納されている履歴情報と検証情報の中か ら、最新の情報又は登録者の個人情報の根幹を為すと判断した情報を抽出して保 管したものである。 [0047] The basic information DB is a database that stores information that is a basic part of personal information. The latest information is stored in the terminal and the history information and verification information stored in the terminal related to the terminal. Information or information that is judged to form the basis of the registrant's personal information is extracted and stored.
基礎情報 DB14では、履歴情報 DB12、 112、 122、 132、 142、 152、 162及び検 証十青幸 DB13、 113、 123、 133、 143、 153、 163力、ら由出し、本システム内の各端 末にある基礎情報は、基礎情報 DB14と同様の方式で抽出されている。 Basic information DB14 includes historical information DB12, 112, 122, 132, 142, 152, 162 and verifications Jusei DB13, 113, 123, 133, 143, 153, 163 The basic information at the terminal is extracted in the same way as the basic information DB14.
抽出する情報の例としては、住所、氏名、生年月日などの登録者の一般的な標準 情報、最新電子マネー残高や電子カルテ情報など主要項目であり、抽出した基礎情 報は、抽出元である履歴情報と検証情報にリンクし詳細情報を容易に閲覧又は検索 すること力 Sでさる。 Examples of information to be extracted include main items such as general standard information of registrants such as address, name, date of birth, and the latest electronic money balance and electronic medical record information. The basic information extracted is the source. The ability to easily browse or search detailed information by linking to certain history information and verification information.
[0048] 可否情報 DBは、登録者の認証結果に基づいて認証後の動作進行の状況を決定 、指示、制御等を行う情報を格納するデータベースである。 [0048] The availability information DB is a database that stores information for determining, instructing, and controlling the operation progress after authentication based on the authentication result of the registrant.
[0049] 検索情報 DBは、検索処理を円滑化するために全登録者の氏名や個人識別 IDと V、つた項目を格納するデータベースであり、自端末及び自端末と関係がある端末に 格納されている全員の個人情報の中から抽出して保管する。なお、検索情報も、抽 出元である個人情報にリンクし詳細情報を容易に閲覧又は検索することができる。 [0049] The search information DB is a database that stores the names, personal identification IDs and Vs of all registrants to facilitate the search process, and is stored in the terminal and terminals related to the terminal. Extracted from the personal information of everyone who is stored. The search information can also be linked to the personal information that is the source of the extraction, and the detailed information can be easily browsed or searched.
[0050] 履歴情報 DBと検証情報 DBと基礎情報 DBは、個人別の情報フォルダで、可否情 報 DBと検索情報 DBは、情報を集約した形式で、管理すること力 S望ましい。なお、各 DBに格納する情報が存在しない場合、当該 DBを当該端末に具備していないことも ある。 [0050] The history information DB, the verification information DB, and the basic information DB are individual information folders, and the availability information DB and the search information DB are preferably managed in an aggregated form. If there is no information to be stored in each DB, it is possible that the terminal does not have the DB. is there.
また、当該端末内で登録される又は利活用される情報が、各登録者間で共通又は 限定されている場合には、個人フォルダを設けず、 1つの共有フォルダを利活用する ように DBの構造自体を簡単にして!/、てもよ!/、。 In addition, if the information registered or used in the terminal is common or limited among registrants, the DB folder should be used so that one shared folder is used without providing a personal folder. Make the structure simple! /!
(データベースの構成例:履歴情報 DBのデータ構成例) (Database configuration example: Data configuration example of the history information database)
例えば、前述の履歴情報 DBに登録される履歴情報としては、以下の(1)〜(; 13)が 挙げられる。なお、原則として全ての情報には、その情報が発生した日時を示す時間 情報が付与されている。 For example, the following (1) to (; 13) are listed as the history information registered in the history information DB. In principle, all information is given time information indicating the date and time when the information occurred.
(1)パーソナルデータ (1) Personal data
氏名、住所、各種電話番号、メールアドレス、生年月日、最寄駅、家族構成、友人 関係、趣味、信用度、パスポートや住民基本台帳カード等の情報、個人識別 ID等で ある。 Name, address, phone number, e-mail address, date of birth, nearest station, family structure, friendship, hobbies, creditworthiness, information such as passport and Basic Resident Register card, and personal identification ID.
(2)経歴データ (2) Career data
学校の在学証明 ·卒業証明 ·成績証明、保有資格名や資格の合格年度や登録番 号、勤務先や仕事内容などの学歴、職歴、保有資格を全て含む。 School enrollment certificate · Graduation certificate · Grade certificate, qualification name, year of passing qualification and registration number, education, job history, job qualification, etc. are all included.
(3)バイオメトリタス情報 (3) Biometric information
指紋、虹彩、声紋、静脈、遺伝子、顔輪郭など全てのバイオメトリタス情報を含む。 Includes all biometric information such as fingerprints, irises, voiceprints, veins, genes, and face outlines.
(4)ビジュアルデータ (4) Visual data
個人の行動を記録した映像、画像、音声又はこれらを複数組み合わせた情報であ り、取材写真やニュース映像等のように、登録者の実在を間接的に証明するものを含 む。 Video, images, audio, or a combination of multiple information that records individual actions, including information that indirectly proves the existence of the registrant, such as interview photos and news videos.
(5)行動記録データ (5) Action record data
申込書、入会証、参加証、表彰状、参加者名簿、参加データ、入退室記録、入退 場記録等の行動の開始又は結果を示す詳細な項目の情報を登録する。 Register detailed item information indicating the start or result of actions such as application form, admission card, participation certificate, certificate of commendation, participant list, participation data, entry / exit record, entry / exit record.
(6)金融取引データ (6) Financial transaction data
電子マネー、預金、投資信託、ローン、株式、債券、外国為替、オプションゃデリバ ティブ等の金融派生商品、貴金属(金、白金等)、商品取引所取り扱い品目(小豆、 大豆、石油、砂糖等)、クレジットカード、ポイントカード、マイレージカード等の残高と 利用可能残高と取引履歴。 Financial derivatives such as electronic money, deposits, investment trusts, loans, stocks, bonds, foreign exchange, options and derivatives, precious metals (gold, platinum, etc.), items handled by commodity exchanges (red beans, soybeans, oil, sugar, etc.) , Credit card, point card, mileage card, etc. Available balance and transaction history.
生命保険、損害保険等の購入又は利用物の保証書、保証内容と履歴の情報。 利用限度額、振替限度額、金融取引処理を許可又は不許可とする各種設定条件 情報。 Warranty of life insurance, non-life insurance, etc. Usage limit information, transfer limit amount, various setting condition information that permits or disallows financial transaction processing.
(7)鍵データ (7) Key data
錠の開閉、スィッチの ON/OFF、入退場 (入退室)の承諾 '否認、処理進行の承 諾 ·否認、サービス開始の承諾 ·否認等の認証判断材料となる情報をレ、う。 Open / close locks, switch ON / OFF, entrance / exit (entrance / exit) consent 'Deny, accept processing progress · Deny, accept service start · Denial information etc.
(8)活動データ (8) Activity data
サブサーバ群や集約側端末 150等により認識された登録者の日常行動の情報と、 訪れた場所情報と、通話'メール状況、購入商品名や利用サービス名等の情報と、 履歴情報。 Information on the daily activities of registrants recognized by the sub-server group and the aggregation terminal 150, etc., information on the places visited, information on the call's email status, purchased product name, service name, etc., and history information.
(9)出入国データ (9) Immigration data
入出国管理窓口等による出入国情報と、訪問渡航地情報と、履歴情報。 Immigration information by visiting immigration offices, visiting travel destination information, and history information.
(10)指定席データ (10) Reserved seat data
航空機、列車、バス等の交通機関の指定席や乗車券の情報と、演奏会、映画館等 のチケットの情報と、レストランやホテルの予約といった日常生活で発生する日時と場 所を特定して予約する行動に纏わる情報と、履歴情報。 Information on reserved seats and tickets for transportation such as airplanes, trains, buses, etc., information on tickets for concerts, movie theaters, etc., and dates and places that occur in daily life such as restaurant and hotel reservations Information related to the action to be reserved and history information.
(11)医療データ (11) Medical data
カルテ情報、投薬情報、検査情報、健診情報、身体情報、リハビリ情報、 日々の身 体測定情報、医療相談の内容情報、これらの履歴情報。 Medical record information, medication information, examination information, medical examination information, physical information, rehabilitation information, daily physical measurement information, medical consultation content information, and history information.
(12)移動情報 (12) Movement information
以下の 4点の情報を含むもの Includes the following 4 points of information
1.空間情報 (端末に付された端末識別 ID、認識番号を含む) 1. Spatial information (including terminal identification ID and identification number assigned to the terminal)
2.認証対象人物の個人識別 ID 2.Personal identification ID of the person to be authenticated
3.認証を行った時期を示す時間情報、または個人情報 (バイオメトリタス情報等)が 読取/入力された時期を示す時間情報 3. Time information indicating the time when authentication was performed, or time information indicating the time when personal information (such as biometrics information) was read / input
4.実在認証の結果、「認証されている」ということを示す情報 4. Information indicating that it is "authenticated" as a result of real authentication
(13)その他データ その他、分類先が判定困難な情報。 (13) Other data Other information whose classification destination is difficult to determine.
本認証システムは、人間生活全般を支援することを主眼としているため、データの 範囲は列挙項目に限定されな!/、。 Since this authentication system is aimed mainly at supporting human life in general, the scope of data is not limited to the listed items!
[0052] (実在認証の概念) [0052] (Concept of real authentication)
登録者の実在性を検証するとき、認証システムは、具体的には次の 2つの処理を行 When verifying the existence of a registrant, the authentication system specifically performs the following two processes:
5。 Five.
まず、第 1の検証処理では、各端末は、読み取った又は入力された情報と、認証シ ステ First, in the first verification process, each terminal reads the read or input information and the authentication system.
ムのデータベースに格納されている既存の個人情報と、が同一性を有しているか、又 はしきい値以内であるかを判断して、登録者の実在性を検証する。 The identity of the registered person is verified by judging whether the existing personal information stored in the database is identical or within the threshold.
また、第 2の検証処理では、各端末は、新たに読取/入力された情報と、認証シス テムのデータベースに格納されている既存の個人情報とが、空間情報及び時間情報 の 2点で整合性を有して!/、るか否かを判断して、登録者の実在性を検証する。 In the second verification process, each terminal matches the newly read / input information with the existing personal information stored in the authentication system database in two points: spatial information and temporal information. Judgment whether or not it has a sex!
[0053] この第 2の検証処理では、各端末は、個人を特定するための個人情報 (バイオメトリ タス情報等)の読取/入力時期及び位置と、各端末の利用目的と、 2点間の移動予 測時間等を集積して、その検証を行う。 [0053] In this second verification process, each terminal reads and inputs the timing and position of personal information (biometric information, etc.) for identifying an individual, the purpose of use of each terminal, Accumulate travel prediction time, etc., and verify it.
例えば、 9時 00分に東京都千代田区丸の内で静脈情報を利用して個人認証がな された場合、 9時 10分に京都駅構内で虹彩情報による個人認証の請求が行われる ことは、移動不可能なことであり、時間情報と空間情報での不整合と判断し、認証を 行わなレ、。 For example, if personal authentication is performed using vein information in Marunouchi, Chiyoda-ku, Tokyo at 9:00, a request for personal authentication based on iris information will be made at the Kyoto station premises at 9:10. This is not possible, and it is judged that the time information and the spatial information are inconsistent, and authentication is not performed.
また、認証システム内で 8時 00分に羽田空港発の飛行機に搭乗したことが認識さ れている場合、 8時 10分に東京都千代田区内で個人認証の請求が行われることは、 航空機内に入場を示す端末目的と空間情報での不整合と判断し、認証を行わない。 第 2の検証の具体的処理では、認証システムの各端末は、その設置位置情報を格 納しているので、各端末間の移動に要する時間を計算することができる。 In addition, if it is recognized in the authentication system that you have boarded an airplane from Haneda Airport at 8:00, a request for personal authentication will be made in Chiyoda-ku, Tokyo at 8:10. It is judged that there is a mismatch between the terminal purpose indicating entrance and the spatial information, and authentication is not performed. In the specific processing of the second verification, since each terminal of the authentication system stores its installation position information, the time required for movement between each terminal can be calculated.
例えば、前述の例では、東京都千代田区丸の内から京都駅まで移動する所要時 間の計算には、移動開始端末となる丸の内地区に存在する複数の駅から、移動終了 時点端末のある京都駅までの移動手段を検索し、利用可能な交通手段による最短 の乗車時間に、各端末から乗車駅までの距離を移動するのに要する時間を加算して 移動予測時間を計算する。 For example, in the above example, the time required to travel from Marunouchi, Chiyoda-ku, Tokyo to Kyoto Station is calculated from multiple stations in the Marunouchi area, which is the movement start terminal, to Kyoto Station, where the terminal at the end of movement is located. Search for the means of transportation and the shortest by available transportation The estimated travel time is calculated by adding the time required to travel the distance from each terminal to the boarding station.
各端末は、個人認証請求を行った端末 (京都駅構内)で個人情報を読取/入力し た時期が、直前認証請求端末 (東京都千代田区丸の内)で個人情報を読取/入力 した時期に、前述の移動予測時間を加算した最速到着予定時間よりも早かった場合 、異常値と判断し、新たに個人認証請求を行った個人情報読取/入力が不正なもの であると判定する。 Each terminal reads / enters personal information at the terminal that made the personal authentication request (in Kyoto Station), and when it read / entered the personal information at the previous authentication request terminal (Marunouchi, Chiyoda-ku, Tokyo) If it is earlier than the estimated arrival time with the estimated movement time, it is determined as an abnormal value, and it is determined that the personal information read / input newly requested for personal authentication is invalid.
なお、個人情報を読取/入力して航空券や指定券の予約を行った場合には、それ ぞれの端末の通過時刻が予測できるため、その通過時刻と最新稼動地の端末での 読取/入力時刻とを比較してもよい。 In addition, when you make a reservation for an air ticket or a designated ticket by reading / entering personal information, the transit time of each terminal can be predicted, so the transit time and the reading / You may compare with input time.
[0054] 本認証システムでは、現実空間に散りばめられた様々な端末やセンサーにより、個 人情報を多岐に渡り収集し、収集した情報を一筋の流れと見なす。次に、当該情報 がその情報の前後の情報と比較して、空間、時間、登録者が存在している(置かれて V、る)状況を勘案した場合に矛盾がな!/、かを検証し、人物の実在性を判断することを 可能にする。 [0054] In this authentication system, personal information is collected over a wide range by various terminals and sensors scattered in the real space, and the collected information is regarded as a single flow. Next, if the information is compared with the information before and after the information, there is no contradiction when considering the situation where space, time, and registrant exist (placed V)! It is possible to verify and judge the existence of a person.
比較検証に利用する直前の比較対象情報、新たに作成した比較対象情報とは、相 互の情報に含まれる空間情報の距離と時間情報の間隔が短!、程、緻密な個人認証 を可能とする。 Compared to the information to be compared immediately before use for comparison verification and newly created information to be compared, the distance between the spatial information and the time information included in the mutual information is short! To do.
そのため、空間情報の緻密化のため、空間(ユニット)を移動する毎に比較対象情 報を作成することや、比較する情報の時間差を一定時間以内(例えば、 5分)とするこ とを設定してもよい。この結果、設定条件から外れた場合、そのことを示す注意情報 や、移動関連情報の作成による新たに連続認証の開始を要求する情報を通知する こともある。 Therefore, in order to refine the spatial information, it is set to create comparison target information each time the space (unit) moves, and to set the time difference of the information to be compared within a certain time (for example, 5 minutes). May be. As a result, if the setting condition is not met, notice information indicating that condition or information requesting the start of continuous authentication by creating movement related information may be notified.
[0055] (ユニットの概念) [0055] (Unit concept)
人間の物理的な存在空間を認識するために、 1つのサブサーバ群端末又は集約 側端末 150と、その端末に管理される 1以上の末端側端末 160又はサブサーバ群端 末又は集約側端末 150からなる構成率位を「ユニット」とし、一定空間を特定する。こ の際、「同一ユニットの端末」とは、同一端末の管理下にある端末同士をいい、「別ュ ニットの端末」とは、互いに異なる端末の管理下にある端末同士をいう。 会議室内に設置した末端側端末 160Aと管理端末である建物側端末 110Aにより 構成されるユニットを「建物側端末 110Aユニット」とし、会議室内空間を示す。 In order to recognize the human physical existence space, one sub-server group terminal or aggregation-side terminal 150 and one or more end-side terminals 160 or sub-server group terminals or aggregation-side terminals 150 managed by the terminal A unit space is defined as “unit”, and a certain space is specified. In this case, “terminal of the same unit” means terminals under the control of the same terminal. “Knit terminal” refers to terminals under the control of different terminals. The unit composed of the terminal terminal 160A installed in the conference room and the building terminal 110A, which is the management terminal, is referred to as “building terminal 110A unit” and indicates the conference room space.
事務所に設置された末端側端末 160Bと管理端末である建物側端末 110Bにより 構成されるユニットを「建物側端末 110Bユニット」とし、事務所内空間を示す。 The unit composed of the terminal 160B at the terminal and the building terminal 110B, which is the management terminal, is referred to as “building terminal 110B unit” and indicates the office space.
集約側端末 150は、建物側端末 110A、 110Bを管理することにより「集約側端末 1 50ユニット」を構成して、建物全体を一つの空間として示す。 The aggregation-side terminal 150 forms an “aggregation-side terminal 150 unit” by managing the building-side terminals 110A and 110B, and shows the entire building as one space.
本認証システムでは、 自宅のように個人が主に存在する空間を「メインユニット」、勤 務先ゃ学校のように日常頻繁に存在する空間を「サブユニット」とする。 In this authentication system, the space where individuals are mainly present, such as home, is defined as “main unit”, and the space where work is frequently performed, such as school, is defined as “sub unit”.
末端側端末は、様々な物品に付帯され始めており、建物、構築物等の建造物、部 屋、航空機、車両、自動車、トランク、箱、テント、カプセル、ロッカー、携帯電話の基 地局内、公園敷地内、 ATM又はレジスタ一等の各種機器の近接空間、机と座席、 寝台等といった、ある一定の空間を「ユニット」として認識可能である。 Terminal-side terminals are beginning to be attached to various articles, such as buildings, structures, etc., rooms, aircraft, vehicles, automobiles, trunks, boxes, tents, capsules, lockers, mobile phone base stations, park sites Among them, a certain space such as a proximity space of various devices such as ATMs or registers, a desk and a seat, a bed, etc. can be recognized as a “unit”.
[0056] (移動情報の概念) [0056] (Concept of movement information)
人間の行動は、「ユニット」間の移動の連続として認識し、比較することが可能となる Human behavior can be recognized and compared as a series of movements between “units”
〇 Yes
この際、「ユニット」間の移動認識を相互に交換するために、共通情報として利用す るのが「移動情報」であり、本認証システムは、この「移動情報」の連続性を検証する ことで個人認証を行うことを特徴とする。 At this time, in order to exchange movement recognition between “units”, “movement information” is used as common information, and this authentication system verifies the continuity of this “movement information”. It is characterized by performing personal authentication.
[0057] 前述の移動情報には、以下の(1)〜(26)に挙げられる移動派生情報があり、認証 精度の度合いと情報の内容により 4つの区分(S移動情報、以下 A移動情報、 B移動 情報、 C移動情報)に大別される。厳密な運用時には、直前と認証請求時の S移動情 報同士を比較して登録者の実在認証判断を行うが、認証精度の低下を認める運用 時には、 A移動情報を比較対象情報として加えることも認める。なお、個人認証、個 人情報の利活用許可、認証システムによる各種サービスの提供等を総称して認証サ 一ビスとする。 [0057] The above-mentioned movement information includes the movement-derived information listed in the following (1) to (26), and is classified into four categories (S movement information, A movement information, hereinafter) according to the degree of authentication accuracy and the content of the information. B movement information and C movement information). During strict operation, the S move information immediately before and at the time of requesting authentication is compared with each other to make the registrant's real authentication judgment. However, when operation is permitted to reduce authentication accuracy, A move information can be added as comparison target information. Admit. In addition, personal authentication, permission to use personal information, provision of various services using an authentication system, etc. are collectively referred to as an authentication service.
[0058] (S移動情報) [0058] (S movement information)
S移動情報は、登録者の認証を精密に実行するために利用される移動派生情報で ある。 S Movement information is movement derivative information used to perform registrant authentication precisely. is there.
(1)移動開始情報 (1) Movement start information
移動情報に、認証サービスを求めるユニットが現在のユニットから移動することを示 す情報を、加えた情報。 Information that includes information indicating that the unit seeking authentication service moves from the current unit to the movement information.
(2)移動停止情報 (2) Movement stop information
移動情報に、認証サービスを求めるユニットが移動しなくなつたことを示す情報又は 登録者の存在情報を示す情報、を加えた情報。 Information obtained by adding information indicating that the unit requiring the authentication service has stopped moving or information indicating presence information of the registrant to the movement information.
(3)移動予告情報 (3) Movement advance notice information
移動情報に、特定のユニットに認証サービスを求めるユニットが移動する可能性( 予定)があることを通知する情報、を加えた情報。 Information in which movement information is added to information notifying that there is a possibility (planned) that a unit seeking authentication service may move to a specific unit.
登録者の今後の移動予定を示す情報であり、この情報の受信端末が属するュニッ ト内の各端末は、今後の認証処理等に対して事前準備を可能とする。 This information indicates the registrant's future travel schedule, and each terminal in the unit to which the terminal receiving this information belongs can make advance preparations for future authentication processing.
(4)移動関連情報 (4) Movement related information
移動開始情報、移動停止情報、移動予告情報の何れかを示す情報。 Information indicating any of movement start information, movement stop information, and movement advance notice information.
(5)移動通知情報 (5) Movement notification information
移動予告情報に基づく行動が開始されたことを通知する情報。 Information notifying that the action based on the movement notice information has started.
(6)他ユニット移動完了情報 (6) Other unit move completion information
移動情報に、他ユニットに個人認証サービスを求めるユニットが移動完了した旨を 示す情報、を加えた情報。 Information obtained by adding movement information to the information indicating that the unit requiring personal authentication service from another unit has been moved.
(A移動情報) (A movement information)
A移動情報は、登録者の認証連続性を補助するために利用される移動派生情報 である。 A movement information is movement derivative information used to assist the registrant's authentication continuity.
(7)映像存在情報 (7) Video presence information
格納する撮影映像内に、登録者の存在があるか検証する処理を求める検証依頼 情報を受信した端末が、処理を実施した結果情報。 Information on the result of processing performed by the terminal that received the verification request information for verifying whether or not the registrant exists in the stored video.
登録者を撮影した時間情報と、撮影端末又は管理するサブサーバ群を示す端末 識別 ID Time information when the registrant was photographed, and terminal ID indicating the photographing terminal or sub server group to be managed
と、撮影映像中に個人が存在することを示す情報と、検証依頼情報に含まれる依頼 番号とを併せた情報であり、これに登録者の個人識別 IDを加えた場合も含む。 Information indicating that an individual is present in the captured video and the request included in the verification request information This is information combined with a number, including the case where the personal identification ID of the registrant is added.
(8)交信存在情報 (8) Communication presence information
格納する交信記録内に、登録者の存在があるか検証する処理を求める検証依頼 情報を受信した端末が、処理を実施した結果情報。 Information obtained as a result of processing performed by the terminal that received the verification request information for verifying whether or not the registrant exists in the stored communication record.
携帯電話番号 (携帯電話機を特定する IMUI番号、認証キー、メールアドレス等を 含む)または携帯通信機器や携帯情報端末を特定する識別 ID (以下では、携帯電 話機とする)と、携帯電話機と通信基地局が交信した時間情報と、交信した通信基地 局側端末を示す端末識別 IDと、携帯電話機と通信基地局との交信記録が存在して いたことを示す情報と、検証依頼情報に含まれる依頼番号とを併せた情報であり、こ れに登録者の個人識別 IDを加えた場合も含む。 A mobile phone number (including an IMUI number that identifies a mobile phone, an authentication key, an e-mail address, etc.) or an identification ID that identifies a mobile communication device or mobile information terminal (hereinafter referred to as a mobile phone) and a mobile phone Included in the verification request information is the time information that the base station communicated with, the terminal identification ID that indicates the communication base station side terminal that communicated, the information that the communication record between the mobile phone and the communication base station existed This information is combined with the request number and includes the case where the personal identification ID of the registrant is added.
(9)移動推定情報 (9) Movement estimation information
映像存在情報、交信存在情報を総称した情報。 Information that collectively refers to video presence information and communication presence information.
(10)移動認識情報 (10) Movement recognition information
検証処理により、映像存在情報と交信存在情報、映像存在情報と携帯電波認識情 報又は GPS認識情報又はタグ認識情報、バイオメトリタス認識情報と交信存在情報 とが同時に成立することを示す情報。 Information indicating that video presence information and communication presence information, video presence information and mobile radio wave recognition information or GPS recognition information or tag recognition information, biometrics recognition information and communication presence information are established simultaneously by the verification process.
(11)携帯電波認識情報 (11) Mobile radio wave recognition information
電波を受信 (交信)した時間情報と、電波を受信 (交信)した端末識別 ID (例えば、 携帯電話基地局)と、登録者を示す個人情報 (携帯電話番号、個人識別 ID、電波の 送信端末識別 ID等とする)を併せた情報。 Time information when receiving (communication) radio waves, terminal identification ID (for example, mobile phone base station) that received (communication) radio waves, and personal information indicating the registrant (mobile phone number, personal identification ID, radio wave transmission terminal Information including identification ID, etc.).
(12) GPS認識情報 (12) GPS recognition information
人工衛星から位置情報を受信した時間情報と、登録者が所持する GPS機能搭載 機器の端末識別 IDと、測定又は算出した位置情報とを併せた情報であり、これに登 録者の個人識別 IDを加えた場合も含む。 This is a combination of the time information received from the artificial satellite, the terminal identification ID of the GPS function-equipped device owned by the registrant, and the measured or calculated position information, and this is the personal identification ID of the registrant. Including the case where is added.
(13)タグ認識情報 (13) Tag recognition information
電子タグ等の交信または読取時間情報と、登録者が所持するの端末識別 ID (主に 、 GPS測定機器 ID)と、認識された空間情報とを併せた情報であり、これに登録者の 個人識別 IDを加えた場合も含む。 (14)バイオメトリタス認識情報 This is information that combines communication or reading time information such as electronic tags, terminal identification IDs (mainly GPS measurement device IDs) possessed by the registrant, and recognized spatial information. This includes cases where an identification ID is added. (14) Biometrics recognition information
ノ ィオメトリタス情報の読取または入力時間情報と、読取または入力を行った端末 識別 IDと、読取または入力された個人情報 (例えば、顔情報とする)とを併せた情報 であり、これに登録者の個人識別 IDを加えた場合も含む。 This is information that combines the reading or input time information of the nanometric information, the terminal identification ID that has been read or input, and the personal information (for example, face information) that has been read or input, and this is the information of the registrant. This includes cases where a personal identification ID is added.
(15)推定存在情報 (15) Estimated presence information
携帯電波認識情報、 GPS認識情報、タグ認識情報、バイオメトリタス認識情報を総 称した情報。 Information that collectively refers to mobile radio wave recognition information, GPS recognition information, tag recognition information, and biometrics recognition information.
(16)存在通知情報 (16) Presence notification information
(1)〜(; 15)の情報に含まれる空間情報と、時間情報と、個人識別 IDを受信先の ID に変換したものとを併せた情報。 (1) to (; 15) Information that combines spatial information, time information, and personal identification ID converted to the ID of the recipient.
存在通知情報 1は、作成基になった情報が S移動情報である。 In the presence notification information 1, the information on which the creation is based is S movement information.
存在通知情報 2は、作成基になった情報が A移動情報である。 In the presence notification information 2, the information on which the creation is based is A movement information.
(17)比較対象情報 (17) Information to be compared
S移動情報と A移動情報の総称 Collective name for S movement information and A movement information
[0060] (B移動情報) [0060] (B movement information)
B移動情報は、各端末が、 S移動情報や A移動情報により認証サービスを実行する ことを補助するために利用される移動派生情報である。 The B movement information is movement derivative information used to assist each terminal in executing an authentication service using the S movement information or the A movement information.
(18)利用予告情報 (18) Usage notice information
ある端末が、自ユニット空間に登録者が存在することを認識した場合、ユニット内の 他の端末に対し、登録者が個人認証サービスを求める可能性がある旨を示す情報。 利用予告情報を受信したユニットの各端末は、自機内の検索 DBを参照し、事前に 登録者の検索を行!/、、以降の認証処理等に対して準備する。 Information indicating that when a terminal recognizes that a registrant exists in its unit space, the registrant may request a personal authentication service from other terminals in the unit. Each terminal of the unit that has received the usage notice information refers to its own search DB and searches for the registrant in advance! /, And prepares for subsequent authentication processing.
(19)利用可能性情報 (19) Availability information
自ユニット空間に登録者が存在してレ、ると認識されて!/、な!/、が、今後ユニット内で 登録者が認証サービスを求める可能性があるため、認証処理等の準備を促す旨を 示す情報。 Because it is recognized that there is a registrant in the unit space! /, Na! /, There is a possibility that the registrant will request authentication service in the unit. Information indicating the effect.
[0061] (C移動情報) [0061] (C movement information)
C移動情報は、認証システムの安全な運営のために利用される移動派生情報であ (20)許可情報 C Movement information is movement derivative information used for the safe operation of the authentication system. (20) Permit information
各端末に、登録者に対する認証サービス提供を認める情報。 Information that allows each terminal to provide authentication services to registered users.
(21)サブ移動開始情報 (21) Sub movement start information
各端末が、自ユニット空間に登録者が存在しな!/、 (移動した)ことを推定した情報。 この情報が作成された後で、当該ユニットで登録者の認証サービス要求があった場 合、各端末に対し、アラーム情報を発信する。 Information that each terminal estimates that no registrant exists in its unit space! /, (Moved). After this information is created, if there is a registrant authentication service request in the unit, alarm information is sent to each terminal.
(22)サブ移動停止情報 (22) Sub movement stop information
各端末が、自ユニット空間に登録者が存在することを推定した情報。 Information that each terminal estimates that a registrant exists in its own unit space.
この情報が作成された後で、当該ユニット外で登録者の認証サービス要求があった 場合、各端末に対し、アラーム情報を発信する。 After this information is created, if there is a request for authentication service of a registrant outside the unit, alarm information is sent to each terminal.
(23)警告情報 (23) Warning information
認証サービスを求められた場合、その請求が異常事態であることを示す情報。 Information indicating that the request for an authentication service is abnormal.
(24)システム利用停止情報 (24) System usage suspension information
認証サービスを求められた場合、その請求が異常事態であることを認識し、システ ムの利活用を停止する処理を実行する情報。 Information that executes processing to stop using the system, recognizing that the request is an abnormal situation when an authentication service is requested.
(25)検証依頼情報 (25) Verification request information
映像存在情報や交信存在情報の作成のため、各端末に送信する検証処理の指示 情報。 Verification process instruction information sent to each terminal to create video presence information and communication presence information.
検証依頼情報 1は、登録者の個人識別 IDや顔情報と、推定存在情報の時間情報 と、登録者が各サブサーバ群端末の管理ユニット内で撮影された映像に存在するか 検証処理を求める情報と、依頼番号とを併せた情報。 The verification request information 1 is a request for verification processing whether the registrant's personal identification ID and face information, time information of the estimated presence information, and whether the registrant exists in the video shot in the management unit of each sub server group terminal Information combining information and request number.
検証依頼情報 2は、登録者の個人識別 IDや携帯電話番号と、映像確認情報の時 間情報と、登録者が各サブサーバ群端末の管理ユニット内で携帯電話機の電波交 信や GPS測定等が行ったかの検証を求める情報と、依頼番号とを併せた情報。 検証依頼情報 3は、登録者の個人識別 IDと、移動関連情報の時間情報と、登録者 が各サブサーバ群端末の管理ユニット内で撮影された映像に存在するか検証処理 を求める情報と、依頼番号とを併せた情報。 検証依頼情報 4は、登録者の個人識別 IDと、移動関連情報の時間情報と、登録者 が各サブサーバ群端末の管理ユニット内で携帯電話機の電波交信や GPS測定等が 行われたか検証処理を求める情報と、依頼番号とを併せた情報。 The verification request information 2 includes the registrant's personal identification ID and mobile phone number, time information of the video confirmation information, and the registrant in the management unit of each sub-server group terminal, such as radio communication of the mobile phone, GPS measurement, etc. Information that requests verification of whether or not the request has been made and the request number. The verification request information 3 includes the registrant's personal identification ID, time information of the movement-related information, information for requesting verification processing whether the registrant exists in the video shot in the management unit of each sub-server group terminal, Information combined with the request number. The verification request information 4 includes a registrant's personal identification ID, time information of movement-related information, and verification processing that the registrant has performed radio wave communication, GPS measurement, etc. of a mobile phone in the management unit of each sub-server group terminal. Information that combines the request number and the request number.
(26)映像確認情報 (26) Video confirmation information
登録者の個人識別 IDと、登録者を撮影した時間情報と、撮影端末識別 IDと、登録 者が撮影されてレ、た (存在してレ、た)ことを示す情報 Personal identification ID of the registrant, time information when the registrant was photographed, photographing terminal identification ID, and information indicating that the registrant was photographed (existing)
[0062] (移動情報の効果、移動情報と連動した認証システム利用制御) [0062] (Effect of movement information, authentication system usage control linked to movement information)
移動開始情報は、登録者が存在したユニットから移動した (ユニット外に存在する) ことを認識したために作成される情報であり、この情報の作成後は、移動開始前に存 在したユニット内で、登録者の認証サービスを求める処理は「異常」と判定し、警告情 報またはシステム利用停止情報を、認証サービスを求めた端末や各端末に対して送 信する。 The movement start information is information that is created when the registrant recognizes that the unit has moved from the unit that existed (exists outside the unit), and after this information is created, it is created in the unit that existed before the movement started. The process for requesting the registrant's authentication service is determined to be “abnormal”, and warning information or system use stop information is sent to the terminal that requested the authentication service and each terminal.
移動停止情報は、登録者がユニット内に存在 (ユニット外には存在しな!/、)ことを認 識したために作成される情報であり、この情報の作成後は、移動完了後に存在する ユニット外のユニットから、登録者の認証サービスを求める処理は「異常」と判定し、警 告情報またはシステム利用停止情報を、認証サービスを求めた端末や各端末に対し て送信する。 Movement stop information is information that is created because the registrant recognizes that it exists in the unit (it does not exist outside the unit! /,). After this information is created, the unit that exists after the movement is completed The processing for requesting the registrant's authentication service from the outside unit is judged as “abnormal”, and the warning information or the system use stop information is transmitted to the terminal that requested the authentication service and each terminal.
また、移動停止情報は、ユニット内の各端末に利用予告情報の送信と、当該ュニッ トでの各種認証サービスの許可や提供を実行可能とする。 In addition, the movement stop information enables transmission of advance notice information to each terminal in the unit, and permission and provision of various authentication services in the unit.
なお、 A移動情報により、登録者の実在や移動を認識、または推定 (以下では、推 定認識とする)した場合にも、同様なシステム制御効果を行うこともある。 Note that the same system control effect may be achieved even when the existence or movement of the registrant is recognized or estimated (hereinafter referred to as estimation recognition) using the A movement information.
[0063] (個人信用度) [0063] (Individual credit rating)
登録者の履歴情報や実在性やシステム利用状況を数値化し、登録者の信用度を 認識可能にする。この結果、信用度数値により認証サービスの提供範囲や、認証時 にシステムが要求する認証方法を決定することが可能となる。 The registrant's history information, reality, and system usage status will be digitized to make the registrant's creditworthiness recognizable. As a result, it is possible to determine the range of authentication services provided and the authentication method required by the system at the time of authentication based on the reliability value.
[0064] 実在性の真正度を表す指標である実在率は、以下の式;!〜 5のいずれかで計算す [0064] The real rate, which is an index representing the authenticity of realism, is calculated using one of the following formulas:! To 5
(式 1)実在率(%) = 1 リスク確率 (式 2)実在率(%) =リスク率勘案点数 ÷ 実在点数 X 100 (Formula 1) Reality rate (%) = 1 Risk probability (Formula 2) Reality rate (%) = Risk rate consideration points ÷ Reality points X 100
(式 3)実在率(%) =信用評価勘案点数 ÷ 実在点数 X 100 (Formula 3) Reality rate (%) = Credit evaluation factor ÷ Real points X 100
(式 4)実在率(%) =マイニング率の合計 ÷ 加算に使用されたマイニング率の個 数 (Formula 4) Reality rate (%) = total mining rate ÷ number of mining rates used for addition
(式 5)式 1〜3によって算出した各実在率に、式 4によって算出した実在率を掛け合 わせ、各実在率を算出とする。 (Equation 5) Multiply the actual rate calculated by Equations 1 to 3 by the actual rate calculated by Equation 4 to calculate each actual rate.
実在率(%) = (式 1から式 3で計算した実在率) X (式 4で計算した実在率) Real ratio (%) = (Real ratio calculated by Formula 1 to Formula 3) X (Real ratio calculated by Formula 4)
[0065] 個人認証システムに登録される個人情報毎に、登録情報の信頼性、固有性、数量 等に基づき、配点を決定する。この配点に、登録時点からの時間経過、有効期限、 検証結果、検証時点からの経過時間を考慮した点数または評価率を掛け合わせ、獲 得点数を計算し、その総合計として実在点数を算出する。 [0065] For each piece of personal information registered in the personal authentication system, a score is determined based on the reliability, uniqueness, quantity, etc. of the registered information. Multiply this score by the number of points or evaluation rate that takes into account the elapsed time from the time of registration, the expiration date, the verification result, and the elapsed time from the time of verification, to calculate the number of points acquired, and to calculate the actual number as the total. .
さらに、獲得点数に不正存在リスクの要素を反映させた指標(1 リスク率)を掛け合 わせて基礎点数を算出し、その総合計としてリスク率勘案点数を算出する。 In addition, the basic score is calculated by multiplying the score obtained by the index (1 risk rate) reflecting the risk factor of fraud, and the risk rate consideration score is calculated as the total.
信用評価勘案点数は、前述の基礎点数に、登録者の実在性を証明した人物また は団体、身分証明書等の発行機関の信用評価度数 (最高値を 1、最低値を 0)を掛け 合わせて算出した点数を、総合計して信用評価勘案点数を算出する。 Credit assessment consideration points are multiplied by the credit score (highest value is 1, lowest value is 0) of the issuing agency such as the person or group who proved the registrant's existence, identification card, etc. The total number of points calculated in this step is summed up to calculate the credit evaluation consideration score.
マイニング率は、登録者の過去の一定期間の行動パターンに対して、最近の一定 期間の行動パターンが、どの程度一致するかにより算出する。 The mining rate is calculated according to the degree to which the behavior pattern of a recent certain period matches the behavior pattern of a registrant in the past certain period.
検証基マイニング率 =過去の一定期間中の該当パターン行動回数 ÷一定期間 日数 Verification base mining rate = number of corresponding pattern actions during a certain period in the past ÷ number of days in a certain period
対象先マイニング率 =直近の一定期間中の該当パターン行動回数 ÷直近一定 期間日数 Target mining rate = Number of corresponding pattern actions during the most recent period ÷ Number of days in the most recent period
マイニング率(%) =対象先マイニング率 ÷検証基マイニング率 Mining rate (%) = Target mining rate ÷ Verification base mining rate
[0066] 信用度は、以下の 2つの式で計算した、信用度 1と信用度 2がある。 [0066] The creditworthiness is creditworthiness 1 and creditworthiness 2 calculated by the following two formulas.
信用度 1により、システムの利用状況を数値化し、信用度 2により、登録者の総合的 な信用度を数値化する。 The system usage status is quantified by credit rating 1, and the overall credibility of registrants is quantified by credit score 2.
[0067] (式)信用度 1 =当初設定点数 +信用加算点数一信用喪失点数 [0067] (Formula) Credit rating 1 = Initial setting score + Credit addition score 1 Credit loss score
信用加算点数 =信用加算点の総合計 +無違反期間点数 信用加算点 =発生事項 X関与度 X功績度 X効力期間 Credit score = total credit score + non-violating period score Credit addition points = occurrence X degree of involvement X achievement X validity period
信用喪失点数 =信用喪失点の総合計 Credit loss points = total credit loss points
信用喪失点 = (信用喪失点 1 +信用喪失点 2) X指定分野 Credit loss point = (credit loss point 1 + credit loss point 2) X designated field
信用喪失点 1 =発覚事項 X関与度 X人命影響度 X人物影響係数 X経過期 間 Credit Loss Point 1 = Items to be Discovered X Degree of Engagement X Human Life Influence X Person Influence Factor X Elapsed Period
信用喪失点 2=発覚事項 X関与度 X経済損失係数 X経過期間 Loss of credit 2 = Discovered matters
当初設定点数は、認証システム利用開始時点に全員一律に設定する数値である。 信用加算点数は、無違反での利用期間、認証システム構築や運営等に関わる功 績、不正利用摘発や防止に関わる労力等を評価して与える数値である。 The initial set score is a numerical value that is set uniformly for all the users when the authentication system starts to be used. The credit addition score is a numerical value given by evaluating the usage period without violation, achievements related to the construction and operation of authentication systems, labor related to detection and prevention of unauthorized use, etc.
信用喪失点数は、認証システムが規定する不正行為に該当した場合に差し引く数 値であり、各国が定める刑事法に規定される刑罰と無関係である。 The credit loss score is a value that is deducted in the case of a fraudulent act stipulated by the authentication system, and is not related to the criminal penalties stipulated in the criminal law established by each country.
図 2 (a)は、信用配点表の全体内容の一例を示す図であり、図 2 (b)は、詳細な内 容の一例を示す図である。信用配点表は、発生または発覚した事項、その事項に関 与した度合い、システムや社会への功績度合い、人命に関わる度合い、影響を受け た概算人数又は影響を受けた可能性のある予測人数、経済損失見積り、システムや 社会への効力期間、不正行為が発覚又は公表されてからの経過期間、指定分野( 人間の生命に影響がある分野、社会インフラ関係)、無違反でのシステム利用期間 等の規定事項、新たな配点の発生を示す警告情報等を登録できるようになつている 。また、各項目を数値に置き換えるテーブルが準備され、常時内容は公開 '更新され Fig. 2 (a) is a diagram showing an example of the entire contents of the credit scoring table, and Fig. 2 (b) is a diagram showing an example of detailed contents. Credit scoring charts show the matters that have occurred or discovered, the degree to which they are involved, the degree of achievement to the system and society, the degree to which human lives are concerned, the approximate number of people affected or the number of people expected to be affected, Estimated economic loss, effective period for systems and society, elapsed time since fraudulent activity was discovered or announced, designated fields (fields that affect human life, social infrastructure), non-violating system usage period, etc. It is possible to register the provisions of, warning information indicating the occurrence of new scoring, etc. In addition, a table that replaces each item with a numerical value is prepared, and the contents are always published and updated.
[0068] (式)信用度 2 =信用度 1評価度 +実在率評価度 +信用評価勘案点数評価度 [Formula] Credit Rating 2 = Credit Rating 1 Rating + Reality Rating + Credit Rating Consideration Rating
信用度 2は、信用度 1、実在率、信用評価勘案点数で算出した数値を、相対評価ま たは絶対評価により数値毎の配点を定めたテーブルと比較して算出する。この結果、 認証システムを、正当に利用し、利用する頻度も高ぐ登録個人情報が多い人物ほど 高信頼度を得る仕組みを実現する。 Credit rating 2 is calculated by comparing the numerical value calculated with credit rating 1, actual ratio, and credit evaluation consideration points with a table that sets the score for each numerical value by relative evaluation or absolute evaluation. As a result, the authentication system is used legitimately and the frequency of use is high, and a person with a lot of registered personal information realizes a mechanism that obtains higher reliability.
[0069] <第 1の実施の形態〉 [0069] <First embodiment>
(移動情報基本原理 バイオメトリタス情報による認証) (Basic principle of mobile information authentication using biometric information)
図 3は、本発明の第 1の実施の形態において、登録者が自宅を出発して病院に到 着するまでの処理を基に、バイオメトリタス情報を利用した認証システムの基本的な 動作例を示すシーケンスチャートである。 FIG. 3 shows that in the first embodiment of the present invention, the registrant leaves the home and reaches the hospital. 5 is a sequence chart showing a basic operation example of an authentication system using biometric information based on processing until wearing.
登録者が自宅を出発する際に玄関ドアに設置された末端側端末 160Aにより個人 情報 (例えば、指紋情報)を読取る (ステップ S1)と共に、その読取時間と、その読取 場所が末端側端末 160Aである情報とを建物側端末 110Aに送信する (ステップ S2) When the registrant leaves the home, personal information (for example, fingerprint information) is read by the terminal terminal 160A installed at the entrance door (step S1), and the reading time and reading location are read by the terminal terminal 160A. Send certain information to the building-side terminal 110A (step S2)
〇 Yes
建物側端末 110Aは、受信した個人情報と時間情報と空間情報と、自機内データ ベースにある登録情報を比較照合し (ステップ S3)、本人実在認証が出来た場合、 移動情報を作成し (ステップ S4)、その移動情報に移動したことを示す情報を付帯さ せて(以下では、移動開始情報)認証サーバ 10に送信する(ステップ S5)。 The building-side terminal 110A compares and compares the received personal information, time information, spatial information, and registration information in its own database (Step S3). In S4), the information indicating that the user has moved is attached to the movement information (in the following, movement start information) and transmitted to the authentication server 10 (step S5).
認証サーバ 10は、自機内に格納している登録者の直前の移動情報とステップ S5 で受信した移動情報とを比較し、実在性を判定し (ステップ S6)、登録者は建物側端 末 11 OAの空間から移動したことと当該空間に実在しないことを認識する(ステップ S 7)。 The authentication server 10 compares the movement information immediately before the registrant stored in its own machine with the movement information received in step S5 to determine the existence (step S6). Recognize that it has moved from the OA space and does not exist in the space (step S7).
続いて、登録者が最寄駅に到着し、改札口に設置された末端側端末 160Bによつ て個人情報 (例えば、顔情報)を読取る (ステップ S8)と共に、その読取時間、その読 取場所が末端側端末 160Bである情報とを組織側端末 120Aに送信する(ステップ S 9)。 Subsequently, the registrant arrives at the nearest station, reads personal information (for example, face information) with the terminal 160B installed at the ticket gate (step S8), and also reads the reading time and the reading time. Information indicating that the location is the terminal 160B is transmitted to the organization terminal 120A (step S9).
組織側端末 120Aは、ステップ S3〜S4と同様の処理をし(ステップ S8〜S9)、その 移動情報に移動しなくなつたことを示す情報を付帯させて (以下では、移動停止情報 )認証サーバ 10に送信する(ステップ S 12)。 The organization side terminal 120A performs the same processing as steps S3 to S4 (steps S8 to S9), and appends information indicating that it has not moved to the movement information (hereinafter referred to as movement stop information) to the authentication server. (Step S12).
ここで、認証サーバ 10は、自機内にある建物側端末 110Aより受信した移動情報( 移動開始情報)と、組織側端末 120Aより受信した移動情報 (移動停止情報)とを比 較照合し、時間的 ·空間的な連続性を判定する (ステップ S13)。この結果、整合性が 得られた場合には、登録者は駅構内に実在することを認識し (ステップ S14)、組織 側端末 120Aに対して許可情報を送信する(ステップ S 15)。 Here, the authentication server 10 compares and compares the movement information (movement start information) received from the building-side terminal 110A and the movement information (movement stop information) received from the organization-side terminal 120A. Judge the spatial continuity (step S13). As a result, if consistency is obtained, the registrant recognizes that the registrant actually exists in the station (step S14), and transmits permission information to the organization side terminal 120A (step S15).
許可情報を受信した組織側端末 120Aは、登録者に対して改札口を開き、乗車や 構内での電子マネーといったサービスを提供する(ステップ S 16 )。 同様に、登録者が病院に到着した際に入口ドアに設置された末端側端末 160Cが ステップ S8〜S9と同様の処理をし (ステップ S17〜S18)、建物側端末 110Bがステ ップ S 10〜S12と同様の処理をする(ステップ S 19〜S21)。 The organization-side terminal 120A that has received the permission information opens a ticket gate for the registrant and provides services such as boarding and electronic money on the premises (step S16). Similarly, when the registrant arrives at the hospital, the terminal 160C installed at the entrance door performs the same processing as steps S8 to S9 (steps S17 to S18), and the building terminal 110B performs step S10. Processes similar to S12 are performed (Steps S19 to S21).
認証サーバは、 自機内にある組織側端末 120Aより受信した移動情報 (移動停止 情報)と、建物側端末 110Bより受信した移動情報 (移動停止情報)とを比較照合し、 時間 The authentication server compares and matches the movement information (movement stop information) received from the organization-side terminal 120A in its own machine with the movement information (movement stop information) received from the building-side terminal 110B.
的-空間的な連続性を判定する (ステップ S22)。この結果、整合性が得られた場合 には、登録者は病院建物内に実在すると認識し (ステップ S23)、建物側端末 110B に対して許可情報を送信する (ステップ S 24)。 Determine spatial-spatial continuity (step S22). As a result, if consistency is obtained, the registrant recognizes that the registrant actually exists in the hospital building (step S23), and transmits permission information to the building-side terminal 110B (step S24).
許可情報を受信した建物側端末 120Bは、登録者の電子カルテの新たな入力ゃ閲 覧、診療費の認証システム内の清算といったサービスを提供する (ステップ S25)。 The building-side terminal 120B that has received the permission information provides services such as a new entry and review of the registrant's electronic medical record and a settlement within the medical fee authentication system (step S25).
[0071] (変形例 1 移動予告情報の利用) [0071] (Variation 1 Use of advance notice information)
例えば、データマイニング技術により行動パターンが存在する場合や、行動スケジ ユールが決定している場合には、存在又は経由するユニットが推測できるので、推測 したユニットに移動予告情報を送信する。 For example, when an action pattern exists by data mining technology or when an action schedule is determined, a unit that exists or passes can be inferred, and movement advance notice information is transmitted to the inferred unit.
第 1の実施形態では、建物側端末 110Aは、ステップ S4での移動情報の作成に併 せて、移動予告情報も作成し (ステップ S4)、ステップ S5の送信に併せて組織側端 末 120Aに送信する(ステップ S5)。組織側端末 120Aは、ステップ S 10〜S15の認 証処理の代わりに、移動予告情報とステップ S9で受信した情報の、時間情報と空間 情報を比較し、認証処理を行う。この結果、組織側端末 120Aが認証サーバ 10の機 能を代行することを可能とする。 In the first embodiment, the building-side terminal 110A creates movement advance notice information in addition to the movement information created in step S4 (step S4), and sends it to the organization-side terminal 120A along with the transmission in step S5. Send (step S5). Instead of the authentication process in steps S10 to S15, the organization side terminal 120A compares the time advancement information and the information received in step S9 with the time information and the spatial information, and performs the authentication process. As a result, the organization side terminal 120A can perform the function of the authentication server 10.
[0072] (変形例 2 誘導電子記録媒体の利用) [Modification 2 Use of Induction Electronic Recording Medium]
組織側端末 120Aや認証サーバ 10には、莫大な人数の個人情報が格納されるた め、登録者の個人情報や移動情報を検索し、認証処理を行うには時間を要する。 この脆弱面を補完するために、登録者は「誘導電子記録媒体」とレ、う介在物を利用 し、登録者の個人情報や移動情報を主に格納するサブサーバ群端末と認証サービ スを求めた端末とをネットワーク上で接続させ、実在認証に必要な情報の取得を補助 する。 「誘導電子記録媒体」は、 ICチップや電子タグ等の電子記録媒体を示し、例えば、 I Cカードや PDAやュビキタス'コミュニケーターや携帯電話機等の携帯情報機器に 組み込まれている力、、体内チップとして人体に埋め込まれている。その電子記録媒 体の中には、登録者の個人識別 IDと、登録者のメインユニットまたはサブユニットを 管理するサブサーバ群端末や関係する認証サーバの端末識別 IDが書き込まれ、双 方の IDを併せて記録媒体格納 IDと!/、う。 Since the organization-side terminal 120A and the authentication server 10 store a large amount of personal information, it takes time to retrieve the personal information and movement information of the registrant and perform the authentication process. To compensate for this vulnerability, registrants use “guided electronic recording media” and record inclusions to establish sub-server group terminals and authentication services that mainly store registrants' personal information and mobile information. Connect the requested terminal on the network to assist in obtaining information necessary for real authentication. “Induction electronic recording medium” refers to an electronic recording medium such as an IC chip or an electronic tag. For example, the power incorporated in a portable information device such as an IC card, a PDA, a ubiquitous communicator or a mobile phone, Embedded in the human body. In the electronic recording medium, the personal identification ID of the registrant and the terminal identification ID of the sub server group terminal that manages the main unit or subunit of the registrant and the related authentication server are written. In addition to the storage medium storage ID!
認証サービスを求める際に、認証用の個人情報と記録媒体格納 IDを読取らせること でネットワークを介して、メインユニット等を管理するサブサーバ群端末等に最新の移 動情報やその履歴、各種個人情報等の照会や請求等を実施可能とし、認証システ ム内で移動情報の連携を円滑にし、認証処理の効率化を行う。 When requesting the authentication service, the personal information for authentication and the ID stored in the recording medium are read to the sub-server group terminals that manage the main unit, etc. via the network. Enables inquiries and requests for personal information, etc., facilitates coordination of movement information within the authentication system, and improves the efficiency of authentication processing.
[0073] (変形例 3 推定存在情報による認証) [0073] (Modification 3 Authentication using estimated presence information)
第 1の実施の形態の基本原理では、移動関連情報により登録者の認証を行ってい た。しかし、移動関連情報は、主に登録者が認証サービスを求めた場合に作成され る情報であるため、認証サービスを求める回数が少ないと、比較する移動関連情報 に含まれる空間情報と時間情報の間隔が大きくなり、情報の整合性を容易に確保で きるため、実在性の認証精度を低下させる懸念がある。 In the basic principle of the first embodiment, the registrant is authenticated by the movement related information. However, since the movement-related information is mainly created when a registrant requests an authentication service, if the number of requests for the authentication service is small, the spatial information and time information included in the movement-related information to be compared There is a concern that the accuracy of authenticity may be reduced because the interval becomes large and the integrity of information can be easily secured.
この脆弱面を補完するために、登録者の意図的な動作と無関係に、自動的に推定 存在情報を作成し、移動関連情報間の隙間を補う情報連携の緻密化と、推定存在 情報同士の比較による簡易な認証サービスの提供を可能とし、認証システムの精度 維持を行う。 To compensate for this vulnerability, we automatically create estimated presence information regardless of the intentional behavior of the registrant, refine information linkage that compensates for gaps between movement-related information, and It is possible to provide a simple authentication service by comparison and maintain the accuracy of the authentication system.
[0074] (携帯電波認識情報) [0074] (Cellular wave recognition information)
携帯電話機や携帯情報機器等 (以下では、携帯電話機とする)とアンテナ等を利用 して登録者の実在を推定した携帯電波認識情報について説明する。なお、アンテナ 等の電波アンテナは、複数のアンテナ機器 (末端側端末 160)が連動して一つの装 置として稼動していることもあり、総括して地域管理側端末 130とする。また、登録者 は、携帯電話機の申込み及び受領時点に個人認証がされ、その後、正当に所持し ているものとする。 Mobile radio wave recognition information that estimates the existence of a registrant using a mobile phone, a mobile information device, etc. (hereinafter referred to as a mobile phone) and an antenna will be described. In addition, radio antennas such as antennas may be operated as a single device in conjunction with a plurality of antenna devices (terminal-side terminal 160). In addition, the registrant shall be personally authenticated at the time of application and receipt of the mobile phone, and then possess it properly.
この場合、登録者が自宅を出発する際に玄関ドアにて、所持する携帯電話機 (末 端側端末 160)がアンテナ等(地域管理側端末 130)と自動的に交信し (ステップ S1) 、携帯電話番号等の末端側端末 160を特定する情報が地域管理側端末 130に認識 される(ステップ S2)。 In this case, when the registrant leaves home, he / she will have a mobile phone (Terminal terminal 160) automatically communicates with an antenna or the like (regional management side terminal 130) (step S1), and information specifying the terminal side terminal 160 such as a mobile phone number is recognized by the regional management side terminal 130 ( Step S2).
地域管理側端末 130は、交信したアンテナが対応する交信可能空間や携帯電話 番号等を基に、携帯電波認識情報を作成し (ステップ S3)、地域管理側端末 130を 管理する携帯電話会社の組織側端末 120に送信する (ステップ S4)。 The regional management side terminal 130 creates mobile radio wave recognition information based on the communicable space, mobile phone number, etc. supported by the antenna that communicated (step S3), and the organization of the mobile phone company that manages the regional management side terminal 130 Transmit to terminal 120 (step S4).
組織側端末 120は、受信した携帯電波認識情報の携帯電話番号を個人識別 IDに 変換し、認証サーバ 10に送信し (ステップ S5)、認証サーバ 10は、自機内に格納し ている登録者の直前の移動情報とステップ S5で受信した携帯電波認識情報とを比 較し、実在性を判定し (ステップ S6)、登録者は地域管理側端末 130が交信可能な 空間に実在することを推定認識する(ステップ S7)。 The organization side terminal 120 converts the mobile phone number of the received mobile radio wave recognition information into a personal identification ID and transmits it to the authentication server 10 (step S5), and the authentication server 10 stores the registrant stored in its own device. Compares the previous movement information with the mobile radio wave recognition information received in step S5 to determine the existence (step S6), and the registrant presumes that the region management side terminal 130 exists in a space where communication is possible. (Step S7).
[0075] (GPS認識情報) [0075] (GPS recognition information)
GPS機能搭載機器と人工衛星を利用して登録者の実在を推定した GPS認識情報 について説明する。登録者は、 GPS機能搭載機器の申込み及び受領時点に個人認 証がされ、その後、正当に所持しているものとする。 This section describes GPS recognition information that estimates the existence of registrants using GPS-equipped devices and satellites. The registrant shall be personally authenticated at the time of application and receipt of a device with a GPS function, and shall then be legitimately held.
この場合、登録者が自宅を出発する際に玄関ドアにて、 GPS機能搭載機器 (末端 側端末 160)が人工衛星(地域管理側端末 130)と自動的に交信し (ステップ SI)、 G PS機能搭載機器の端末識別 IDという末端側端末 160を特定する情報が地域管理 側端末 130 (人工衛星の管理機関を含む)に認識される(ステップ S2)。 In this case, when the registrant leaves home, the device with GPS function (terminal terminal 160) automatically communicates with the satellite (regional management terminal 130) at the entrance door (step SI), and the G PS Information specifying the terminal-side terminal 160, which is the terminal identification ID of the function-equipped device, is recognized by the regional management-side terminal 130 (including the satellite management organization) (step S2).
地域管理側端末 130は、測定又は算出した位置情報や端末識別 IDを基に、 GPS 認識情報を作成し (ステップ S3)、地域管理側端末 130を管理する管理機関や GPS サービスの提供機関の組織側端末 120に送信する(ステップ S4)。 The regional management side terminal 130 creates GPS recognition information based on the measured or calculated location information and terminal identification ID (step S3), and the organization of the management organization that manages the regional management side terminal 130 or the organization that provides the GPS service. It transmits to the side terminal 120 (step S4).
組織側端末 120は、受信した GPS認識情報の GPS機能搭載機器の端末識別 ID を個人識別 IDに変換し、認証サーバ 10に送信し (ステップ S5)、認証サーバ 10は、 自機内に格納している登録者の直前の移動情報とステップ S 5で受信した GPS認識 情報とを比較し、実在性を判定し (ステップ S6)、登録者は地域管理側端末 130が測 定又は算出した位置に実在することを推定認識する (ステップ S7)。 The organization-side terminal 120 converts the terminal identification ID of the GPS function-equipped device in the received GPS recognition information into a personal identification ID and transmits it to the authentication server 10 (step S5), and the authentication server 10 stores it in its own device. Compare the movement information immediately before the registered user with the GPS recognition information received in step S5 to determine the existence (step S6), and the registered user is present at the position measured or calculated by the regional management terminal 130. It is estimated to recognize (step S7).
[0076] (タグ認識情報) 情報通信機器と電子タグ等や ICチップ (体内チップを含む)を利用して登録者の実 在を推定した GPS認識情報について説明するが、空間情報は、主に以下の 2つの 方式により認識される。 [0076] (Tag recognition information) We will explain GPS recognition information that estimates the existence of a registrant using information communication equipment, electronic tags, etc. and IC chips (including internal chips). Spatial information is mainly recognized by the following two methods. The
第 1方式では、登録者が所持する情報通信機器や電子タグ等読取機 (ICチップを 含む)が、実空間に設置 (組込み)された位置情報を持つ(空間情報を持つサーバや 端末にアクセスするための情報を含む)電子タグ等と交信して得られる情報を空間情 報とする。 In the first method, information communication devices and readers such as electronic tags (including IC chips) possessed by registrants have location information installed (embedded) in real space (access to servers and terminals with spatial information). Spatial information is the information obtained through communication with electronic tags (including information for communication).
第 2方式では、登録者が所持する電子タグ等(電子タグ等を実装した情報通信機 器、カード類を含む)の格納情報力 実空間に設置又は組込みされた電子タグ等読 取機器により読み取られ際に、読取機器側が有する設置位置情報を空間情報とする In the second method, the stored information power of electronic tags, etc. (including information communication equipment and cards equipped with electronic tags, etc.) possessed by the registrant is read by reading equipment such as electronic tags installed or incorporated in real space. In this case, the installation position information on the reading device side is used as spatial information.
〇 Yes
この場合、登録者が自宅を出発する際に玄関ドアにて、所持する電子タグ (末端側 端末 160A)が、ドアに設置された電子タグ等読取機器 (末端側端末 160B)と自動的 に交信し (ステップ S1)、カード番号等の末端側端末 160Aを特定する情報が末端側 端末 16 OBに認識される(ステップ S 2)。 In this case, when the registrant leaves the home, the electronic tag (terminal terminal 160A) possessed by the entrance door automatically communicates with the electronic tag reader (terminal terminal 160B) installed on the door. (Step S1), the information identifying the terminal 160A on the terminal side such as the card number is recognized by the terminal 16OB on the terminal side (Step S2).
末端側端末 160Bは、電子タグ読取機器が対応する交信可能空間やカード番号等 を基に、タグ認識情報を作成し (ステップ S3)、末端側端末 160Bを管理する自宅の 建物側端末 110に送信する(ステップ S4)。 Terminal-side terminal 160B creates tag recognition information based on the communicable space, card number, etc. supported by the electronic tag reader (step S3), and transmits it to the building-side terminal 110 at home that manages terminal-side terminal 160B (Step S4).
建物側端末 110は、受信したタグ認識情報のカード番号を個人識別 IDに変換し、 認証サーバ 10に送信し (ステップ S5)、認証サーバ 10は、自機内に格納している登 録者の直前の移動情報とステップ S5で受信したタグ認識情報とを比較し、実在性を 判定し The building-side terminal 110 converts the card number of the received tag recognition information into a personal identification ID and sends it to the authentication server 10 (step S5). The authentication server 10 immediately before the registrant stored in its own device. Is compared to the tag recognition information received in step S5 to determine the existence.
(ステップ S6)、登録者は末端側端末 160Bが交信可能な空間に実在することを推定 認識する(ステップ S 7)。 (Step S6), the registrant presumes and recognizes that the end-side terminal 160B actually exists in a communicable space (Step S7).
(バイオメトリタス認識情報) (Biometrics recognition information)
登録者個人に固有のノ ィオメトリタス情報 (特に、顔情報、静脈、虹彩情報、歩き方 )をして登録者の実在を推定したバイオメトリタス認識情報につ!/、て説明する。 Biometrics recognition information that estimates the existence of the registrant by using the metric information unique to the registrant (especially face information, veins, iris information, and how to walk) will be explained.
この情報で利用するバイオメトリタス情報は、街頭の監視カメラで写された顔情報、 出入口に設置した読取機器により自動的に読み取られた静脈情報や虹彩情報等を 指し、第 1の実施の形態のように登録者の意図的な動作により読取 (入力)する情報 とは区別する。 The biometrics information used in this information is the face information captured by street surveillance cameras, This refers to vein information, iris information, etc. automatically read by a reading device installed at the entrance / exit, and is distinguished from information read (input) by the intentional operation of the registrant as in the first embodiment.
この場合、登録者が自宅を出発すると、自宅前の電柱に設置されたカメラ等(末端 側端末 160)が、登録者の顔を撮影し (ステップ S 1)、撮影した映像ゃ自機の端末識 別 ID等を地域管理側端末 130に送信する(ステップ S2)。地域管理側端末 130は、 受信した映像に基づいて登録者を特定し (ステップ S3)、さらに、ノ ィオメトリタス認識 情報を作成して (ステップ S4)、認証サーバ 10に送信する(ステップ S 5)。 In this case, when the registrant leaves home, the camera, etc. (terminal terminal 160) installed on the telephone pole in front of the home shoots the face of the registrant (step S1), and the captured video is the terminal of the device. The identification ID and the like are transmitted to the regional management side terminal 130 (step S2). The regional management-side terminal 130 identifies the registrant based on the received video (step S3), further creates the metric measurement recognition information (step S4), and transmits it to the authentication server 10 (step S5).
認証サーバ 10は、自機内に格納している登録者の直前の移動情報とステップ S5 で受信したバイオメトリタス認識情報とを比較し、実在性を判定し (ステップ S6)、登録 者は末端側端末 160が撮影可能な空間に実在することを推定認識する(ステップ S7 )。 The authentication server 10 compares the movement information immediately before the registrant stored in its own device with the biometrics recognition information received in step S5 to determine the existence (step S6). It is estimated and recognized that the terminal 160 is actually present in the space that can be photographed (step S7).
[0078] <第 2の実施の形態〉 <Second Embodiment>
(移動推定情報、移動認識情報の作成) (Create movement estimation information and movement recognition information)
図 4は、本発明の第 2の実施の形態において、推定存在情報と、カメラ等やアンテ ナ等が記録した映像や交信状況を連携させて、移動推定情報や移動認識情報を作 成する動作例を示すシーケンスチャートである。 FIG. 4 shows an operation of creating movement estimation information and movement recognition information by linking estimated presence information with images and communication status recorded by a camera or an antenna in the second embodiment of the present invention. It is a sequence chart which shows an example.
図 5 (a)に示すように、携帯電話機 (末端側端末 160A)とアンテナ等(地域管理側 端末 130A)が交信可能空間には、複数のカメラ等による映像撮影空間が重複して 存在する。また、図 5 (b)は、社会に設置されたアンテナ等とカメラ等の端末構成例を 示した図であり、点線で囲まれた携帯電話機の交信可能空間に、カメラ等が存在す As shown in Fig. 5 (a), the space for communication between the mobile phone (terminal terminal 160A) and the antenna (regional management terminal 130A) has overlapping video shooting spaces for multiple cameras. Fig. 5 (b) is a diagram showing an example of the configuration of terminals such as antennas and cameras installed in society. Cameras etc. exist in the communication space of mobile phones surrounded by dotted lines.
[0079] (携帯電波認識情報から移動認識情報の作成) [0079] (Creation of movement recognition information from mobile radio wave recognition information)
認証サーバ 10Aは、組織側端末 120Aから携帯電波認識情報を受信すると、第 1 の実施の形態のステップ S6〜S7の処理により登録者の実在空間の推定認識を行つ た上で、交信可能空間に存在するユニットを管理する認証サーバ 10を検索し (ステツ プ S51)、該当する認証サーバが存在する場合 (ここでは、認証サーバ 10B)は、携 帯電波認識情報に基づき検証依頼情報 1を作成し (ステップ S52)、送信する (ステツ プ S53)。 Upon receiving the mobile radio wave recognition information from the organization-side terminal 120A, the authentication server 10A performs estimation recognition of the registrant's real space through the processing of steps S6 to S7 in the first embodiment, and then communicates Search for the authentication server 10 that manages the unit existing in the server (step S51), and if the corresponding authentication server exists (in this case, the authentication server 10B), create verification request information 1 based on the charged wave recognition information (Step S52) and send (Step S53).
なお、検索を容易にするために、各端末は、自機が管理するユニット内にカメラ等 の設置状況を調査し、あらかじめ設置や撮影空間情報を登録してもよい。 In order to facilitate the search, each terminal may investigate the installation status of the camera or the like in the unit managed by itself and register the installation and shooting space information in advance.
認証サーバ 10Bは、受信した検証依頼情報 1により、交信可能空間に存在するュ ニットを管理するサブサーバ群を検索し (ステップ S 54)、該当するサブサーバ群が存 在する場合 (ここでは、建物側端末 110A)は、検証依頼情報 1を送信する (ステップ S55)。建物側端末 110Aは、末端側端末 160Aが撮影した映像を、常時受信し保 管しており、検証依頼情報 1を受信すると、その中の個人識別 IDにより登録者の顔情 報を個人フォルダより抽出し (ステップ S56)、保存映像中に存在するか検証処理を 行う(ステップ S57)。この際、検証する映像は、検証依頼情報 1の時間情報を基にし た一定時間帯に撮影された範囲とする。 The authentication server 10B searches the sub server group that manages the unit existing in the communicable space based on the received verification request information 1 (step S54), and if the corresponding sub server group exists (here, The building-side terminal 110A) transmits verification request information 1 (step S55). The terminal 110A on the building side always receives and stores the video taken by the terminal 160A on the terminal side. When the verification request information 1 is received, the face information of the registrant is received from the personal folder by the personal identification ID in the video. Extract (step S56), and verify whether it exists in the stored video (step S57). At this time, the video to be verified is a range shot in a certain time zone based on the time information of the verification request information 1.
この結果、映像中に登録者が存在した場合、映像撮影情報を作成し (ステップ S58 )、認証サーバ 10Bを介して依頼元である認証サーバ 10Aに送信する(ステップ S59 )。認証サーバ 10Aは、自機内に格納している携帯電波認識情報と映像撮影情報を 比較し、空間情報と時間情報の整合性が有するか判断して (ステップ S60)、整合す る場合には移動認識情報を作成し、格納する (ステップ S61)。その後、認証サーバ 1 OAは As a result, if there is a registrant in the video, video shooting information is created (step S58), and transmitted to the authentication server 10A that is the request source via the authentication server 10B (step S59). The authentication server 10A compares the mobile radio wave recognition information stored in its own device with the video shooting information to determine whether the spatial information and time information are consistent (step S60). Recognition information is created and stored (step S61). After that, the authentication server 1 OA
、移動認識情報を認証サーバ 10Bに送信し (ステップ S62)、この結果、認証サーバ 10Bも情報の自機内登録と登録者の実在を推定認識する (ステップ S63、 S64)。 なお、ステップ S55又は S56の処理時に、検証依頼情報 1の個人識別 ID、空間情 報を、各端末の固有の個人識別 IDや設置位置情報に変換してもよい。また、ステツ プ S56の処理で顔情報が存在しない場合には、顔情報の送信を認証サーバ 10A、 10Bに求め、顔情報を取得する。 Then, the movement recognition information is transmitted to the authentication server 10B (step S62), and as a result, the authentication server 10B also presumes and recognizes the registration of the information within the device and the existence of the registrant (steps S63 and S64). Note that the personal identification ID and spatial information of the verification request information 1 may be converted into a unique personal identification ID and installation position information of each terminal during the processing of step S55 or S56. If face information does not exist in the process of step S56, the authentication server 10A or 10B is requested to transmit face information, and the face information is acquired.
本認証システムでは、携帯電話機のように登録者と分離可能な個人証明物と、顔 情報のように登録者と不可分の個人情報の双方を、同空間で同時期に存在すること を検証し、個人認証精度を強化する。この結果、単独の個人認証方法が持つ脆弱性 、例えば、登録者以外が携帯電話機を所持した場合、顔情報が事前に複製された場 合の不正利用を防止する。 なお、複数のアンテナ等との交信状況を解析し、携帯電話機の存在空間を絞り込 み、検証対象空間を限定した実施を行うことも可能である。 This authentication system verifies that both personal identities that can be separated from the registrant, such as mobile phones, and personal information that is inseparable from the registrant, such as face information, exist at the same time in the same space. Strengthen personal authentication accuracy. As a result, vulnerabilities of a single personal authentication method, such as unauthorized use when face information is copied in advance when a person other than the registrant possesses a mobile phone, are prevented. It is also possible to analyze the communication status with a plurality of antennas, etc., narrow down the space where mobile phones exist, and implement the verification limited space.
[0081] (変型例 1 ノ ィオメトリタス認識情報力 移動認識情報の作成) [0081] (Variation 1 Generation of neurometric recognition information and creation of movement recognition information)
認証サーバ 10Bは、建物側端末 110Aからバイオメトリタス認識情報を受信すると、 登録者の実在空間の推定認識を行った上で、映像撮影空間に存在するユニットを管 理する認証サーバ 10を検索し (ステップ S51)、該当する認証サーバが存在する場 合 (ここでは、認証サーバ 10A)は、バイオメトリタス認識情報に基づき検証依頼情報 2を作成し (ステップ S52)、送信する (ステップ S53)。なお、検索を容易にするため に、各端末は、 自機が管理するユニット内にアンテナ等の設置状況を調査し、あらか じめ設置や交信可能空間情報を登録することや、検証依頼情報 2の作成時に個人 識別 IDから携帯電話番号を抽出し、利用する電話会社を特定してもよい。 Upon receiving the biometrics recognition information from the building-side terminal 110A, the authentication server 10B searches for the authentication server 10 that manages the units existing in the video shooting space after performing the estimated recognition of the registrant's real space. (Step S51) When the corresponding authentication server exists (here, the authentication server 10A) creates verification request information 2 based on the biometrics recognition information (Step S52) and transmits it (Step S53). In order to facilitate the search, each terminal investigates the installation status of antennas, etc. in the unit managed by its own device, registers the installation and communication space information in advance, and verifies the verification request information. The mobile phone number may be extracted from the personal identification ID at the time of creation of 2, and the telephone company to be used may be specified.
認証サーバ 10Aは、受信した検証依頼情報 2により、映像撮影空間に存在するュ ニットを管理するサブサーバ群を検索し (ステップ S 54)、該当するサブサーバ群が存 在する場合 (ここでは、組織側端末 120A)は、検証依頼情報 2を送信する (ステップ S55)。組織側端末 120Aは、末端側端末 160Bの交信履歴を、常時受信し保管して おり、検証依頼情報 2を受信すると、その中の個人識別 IDにより登録者の携帯電話 番号を個人フォルダより抽出し (ステップ S56)、更新履歴中に存在するか検証処理 を行う(ステップ S57)。この際、検証する交信履歴は、検証依頼情報 2の時間情報を 基にした一定時間帯に撮影された範囲とする。 The authentication server 10A searches the sub server group that manages the unit existing in the video shooting space based on the received verification request information 2 (step S54), and if the corresponding sub server group exists (here, The organization side terminal 120A) transmits the verification request information 2 (step S55). The organization side terminal 120A always receives and stores the communication history of the end side terminal 160B. Upon receipt of the verification request information 2, the organization side terminal 120A extracts the mobile phone number of the registrant from the personal folder by using the personal identification ID therein. (Step S56), a verification process is performed to check whether it exists in the update history (Step S57). At this time, the communication history to be verified is a range shot in a certain time zone based on the time information of the verification request information 2.
交信履歴中に登録者が存在した場合、交信存在情報を作成し (ステップ S58)、認 証サーバ 1 OAを介して依頼元である認証サーバ 10Bに送信する(ステップ S 59)。認 証サーバ 10Bは、自機内に格納しているバイオメトリタス認識情報と交信存在情報を 比較し、空間情報と時間情報の整合性が有するか判断して (ステップ S60)、整合す る場合には移動認識情報を作成し、格納する (ステップ S61)。その後、認証サーバ 1 OBは、移動認識情報を認証サーバ 10Aに送信し (ステップ S62)、この結果、認証サ ーバ 10Aも情報の自機内登録と登録者の実在を推定認識する(ステップ S63、 S64) If there is a registrant in the communication history, communication presence information is created (step S58), and sent to the requesting authentication server 10B via the authentication server 1 OA (step S59). The authentication server 10B compares the biometrics recognition information stored in its own device with the communication presence information to determine whether the spatial information and time information are consistent (step S60). Creates and stores movement recognition information (step S61). Thereafter, the authentication server 1OB sends the movement recognition information to the authentication server 10A (step S62), and as a result, the authentication server 10A also presumes and recognizes the registration of the information in its own device and the existence of the registrant (step S63, S64)
〇 Yes
[0082] (変型例 2 移動関連情報の検証) ノ^オメトリタス情報により移動関連情報を作成した場合でも、不正操作により登録 者へのなりすましを行う脆弱面は完全に防止できない。そのため、この脆弱性を補完 するために、認証サーバ 10は、移動関連情報を受信した際に、検証依頼情報 3及び 4を利用して第 2の実施形態の認証方法と同様な処理を行って、登録者の実在を推 定認識し、移動関連情報との整合性を検証することもできる。 [0082] (Variation 2 Verification of movement-related information) Even when movement-related information is created with no metric information, the vulnerability of impersonating a registrant by unauthorized operation cannot be completely prevented. Therefore, in order to compensate for this vulnerability, the authentication server 10 performs the same processing as the authentication method of the second embodiment by using the verification request information 3 and 4 when receiving the movement-related information. It is also possible to estimate and recognize the existence of registrants and verify their consistency with movement-related information.
主要動作については、ステップ S51で移動関連情報を受信すること、検証依頼情 報 1の代わりに検証依頼情報 3を、検証依頼情報 2の代わりに検証依頼情報 4を利用 することを除いては、第 2の実施形態と同様である。 For the main operations, except that movement related information is received in step S51, verification request information 3 is used instead of verification request information 1, and verification request information 4 is used instead of verification request information 2. This is the same as in the second embodiment.
この結果、映像存在情報や交信存在情報を受信すると、 自機内に格納している移 動関連 As a result, when video presence information or communication presence information is received, the movement related information stored in the
情報と比較し、空間情報と時間情報の整合性が有するか判断して (ステップ S60)、 整合する場合には移動関連情報をそのまま保管する (ステップ S61)。 Compared with the information, it is determined whether there is consistency between the spatial information and the time information (step S60). If they match, the movement related information is stored as it is (step S61).
[0083] (変型例 3 映像存在情報と交信存在情報の同時請求) [0083] (Variation 3 Video billing information and communication presence information simultaneous billing)
例えば、登録者があるユニットに存在することを認識 (推定認識)されてから一定時 間が経過しても認証サービスの利用がない場合、登録者が当該ユニットに現在も実 在するか不確定となる。そのため、この場合、認証サーバ 10やサブサーバ群は、関 係する各端末に対し、検証依頼情報 1又は 3と、検証依頼情報 2又は 4を同時に請求 し、移動推定情報や移動認識情報を得るようにして、登録者の存在を確認する。 For example, if the authentication service is not used after a certain period of time has passed since the registrant is recognized (estimated), it is uncertain whether the registrant still exists in the unit. It becomes. Therefore, in this case, the authentication server 10 and the sub server group simultaneously request the verification request information 1 or 3 and the verification request information 2 or 4 from each terminal concerned to obtain movement estimation information and movement recognition information. In this way, the existence of the registrant is confirmed.
[0084] <第 3の実施の形態〉 <Third Embodiment>
(比較対象情報の連携) (Cooperation of comparison target information)
図 6は、本発明の第 3の実施の形態において、交換サーバ 20により比較対象情報 を登録者に関係する端末に送信し、相互に作成した比較対象情報を認証サービス に利用可能とする動作例を示すシーケンスチャートであり、携帯電波認識情報を例 に説明する。 FIG. 6 is an operation example in which the comparison server information is transmitted to the terminal related to the registrant by the exchange server 20 and the mutually created comparison target information can be used for the authentication service in the third embodiment of the present invention. This is a sequence chart showing a mobile radio wave recognition information as an example.
本実施の形態では、各端末は比較対象情報が作成された際に、交換サーバ 20を 介して、比較対象情報の作成端末、存在情報通知表の対象端末、今後登録者が実 在する可能性のあるユニット端末、メインユニット(サブユニットを含む)管理端末、登 録者の存在空間の通知希望端末等に比較対象情報を基に作成した存在通知情報 を送信することで、金融取引、電子マネー利用、出入管理、電子機器操作制御、身 分証明等の認証サービスを円滑に利用可能とするものである。 In this embodiment, when comparison target information is created, each terminal creates a comparison target information terminal, a target terminal in the presence information notification table, and the possibility that a registrant will exist in the future via the exchange server 20. Presence notification information created based on information to be compared with a unit terminal, main unit (including sub-units) management terminal, terminal that wants to be notified of the registrant's presence space, etc. By transmitting, it is possible to smoothly use authentication services such as financial transactions, use of electronic money, access control, electronic device operation control, and identification.
認証サーバ 10Aは、登録者の最新の比較対象情報である携帯電波認識情報と直 前の移動情報との整合性を判定し、情報間の整合性があると判断した場合、自機が 受信した最新の携帯電波認識情報を交換サーバ 20へ送信する (ステップ S101) 交換サーバ 20は、あらかじめ存在情報通知表を自機内に準備し、登録者や存在 通知情報の配信を希望する先(以下では、関係機関とする)から情報の配信先と配 信条件の事前登録がされている。交換サーバ 20は、受信情報の個人識別 IDに基づ き、存在情報通知表を検索し、事前登録による配信条件の有無を判定し (ステップ S 102)、未登録の場合には、存在情報通知表に登録のある全ての通知先を送信先と して認識する(ステップ S103)。一方、登録がある場合には、今回の受信情報が事前 登録による配信条件に該当するかを判定し (ステップ S104)、該当しない場合には、 存在情報通知表に登録のある全ての通知先を (ステップ S 105)、該当した場合には 、指定された個別の送信先を通知先として認識する(ステップ S 106)。 Authentication server 10A determines the consistency between the mobile radio wave recognition information, which is the latest comparison target information of the registrant, and the previous movement information. The latest mobile radio wave recognition information is transmitted to the exchange server 20 (Step S101). The exchange server 20 prepares the presence information notification table in advance in advance, and the registrant and the destination to which the presence notification information is to be distributed (in the following, The information delivery destination and delivery conditions are pre-registered by the relevant organization. The exchange server 20 searches the presence information notification table based on the personal identification ID of the received information, determines the presence or absence of delivery conditions by pre-registration (step S102), and if it is not registered, the presence information notification All notification destinations registered in the table are recognized as transmission destinations (step S103). On the other hand, if there is a registration, it is determined whether or not the current received information meets the delivery conditions by pre-registration (step S104). If not, all the notification destinations registered in the presence information notification table are listed. (Step S 105), if applicable, the designated individual transmission destination is recognized as the notification destination (step S 106).
その後、交換サーバ 20は、携帯電波認識情報の個人識別 IDを各通知先の固有識 別 IDに変換した上で、携帯電波認識情報の空間情報と時間情報と併せて存在通知 情報を作成し存在情報通知表に登録した上で (ステップ S107)、各通知先に送信す る(ステップ S108)。 After that, the exchange server 20 converts the personal identification ID of the portable radio wave recognition information into the unique identification ID of each notification destination, and then creates presence notification information together with the spatial information and time information of the portable radio wave recognition information. After being registered in the information notification table (step S107), it is transmitted to each notification destination (step S108).
認証サーバ 10Aは、存在通知情報を受信すると、登録者の個人識別 IDに基づき、 ステップ S 101で送信した携帯電波認識情報を特定し、空間情報と時間情報が一致 することを判定し (ステップ S 109)、一致する場合には、前述のステップ S 101の処理 が無事に完了したことを認識する(ステップ S110)。なお、不一致の場合には、ステツ プ S102〜S 108が誤処理である可能性があるため、その旨を示す情報を交換サー バ 20に送信し、検証を求める。 Upon receiving the presence notification information, the authentication server 10A identifies the mobile radio wave recognition information transmitted in step S101 based on the registrant's personal identification ID, and determines that the spatial information matches the time information (step S 109), if they match, it is recognized that the processing in step S101 has been completed successfully (step S110). If there is a mismatch, steps S102 to S108 may be erroneous processing, so information indicating that is sent to the exchange server 20 for verification.
一方、認証サーバ 10Bと認証サーバ 10Cと認証サーバ 10Dは、受信情報を自機 内に格納し、登録者が存在する空間を推定認識した上で、自機が管理するユニット 内で登録者に比較対象情報が作成されて!/、るか検索する (ステップ S 111)。作成が なレ、場合には、ステップ S 111で受信した存在通知情報を一定時間経過後(例えば、 1時間)に自動的に消去する(ステップ SI 12)が、作成している場合には、受信した 存在通知情報と比較検証し、個人認証の連続性を判定する (ステップ S 113)。 On the other hand, the authentication server 10B, the authentication server 10C, and the authentication server 10D store the received information in the own device, and estimate and recognize the space where the registrant exists, and then compare it with the registrant in the unit managed by the own device. Whether target information has been created! / Is searched (step S111). If it cannot be created, the presence notification information received in step S 111 is stored after a predetermined time (for example, If it is created (step SI12), it is compared with the received presence notification information, and the continuity of personal authentication is determined (step S113).
この結果、連続性が成立する場合は、登録者がユニット内に存在することを認識し( ステップ S 114)、連続性が不整合の場合は、存在通知情報と自機が管理するュニッ ト内の比較対象情報とが不一致であることを示す通知異常情報を、交換サーバ 20に 対し送信する(ステップ S 115)。交換サーバ 20は、通知異常情報を受信すると自機 内に格納した上で、ステップ S 108の送信先を抽出し (ステップ S116)、警告情報を 送信する(ステップ S 117)。各端末は、受信した警告情報を自機内に格納し (ステツ プ S118)、登録者に対する認証サービスの制御を行う。 As a result, if continuity is established, it is recognized that the registrant exists in the unit (step S 114). If continuity is inconsistent, the presence notification information and the unit managed by the own device are recognized. Notification abnormality information indicating that the comparison target information does not match is transmitted to the exchange server 20 (step S115). Upon receiving the notification abnormality information, the exchange server 20 stores it in its own device, extracts the transmission destination in step S108 (step S116), and transmits warning information (step S117). Each terminal stores the received warning information in its own device (step S118) and controls the authentication service for the registrant.
図 7 (a)は、この存在情報通知表の内容の一例を示す図であり、登録者の個人識 別 ID、最新の存在通知情報、比較対象情報の作成先及び作成方法、各システムで の固有 ID、存在通知情報を送信する端末識別 ID又は通知先、各システム内での存 在認識有無、登録者のメインユニット情報等の情報を含んでいる。ここでは、登録者 の共通の個人識別 ID「001234」を表示し、この個人識別 IDを基に配信先を一元的 に管理する力 S、個人識別 IDを匿名コードで表示した場合、固有 IDと通知先等を組み 合わせた個別の配信先情報と、配信先間のグループ設定を別途行う。 Figure 7 (a) is a diagram showing an example of the contents of this presence information notification table. The personal identification ID of the registrant, the latest presence notification information, the creation destination and creation method of comparison target information, and each system It includes information such as a unique ID, terminal identification ID or notification destination that sends presence notification information, presence / absence of presence in each system, and registrant main unit information. Here, the common personal identification ID “001234” of registrants is displayed, and the ability to centrally manage distribution destinations based on this personal identification ID. Separate distribution destination information combining notification destinations and group settings between distribution destinations are performed separately.
また、図 7 (b)は、存在通知情報の個別の配信先を登録する場合の一例を示す図 であり、配信先、通知理由、登録日、配信条件等の情報を含んでおり、図 7 (c)は、配 信条件の詳細を示している。 Fig. 7 (b) is a diagram showing an example of registering individual distribution destinations of presence notification information, and includes information such as distribution destination, notification reason, registration date, distribution conditions, etc. (c) shows the details of delivery conditions.
例えば、図に示すように、登録者の勤務先出入口のドア鍵を制御する組織側端末 1 20Aには、全ての存在通知情報を配信することを示す事情 R1が、勤務先最寄駅の 改札口を制御する交通機関側の組織側端末 120Bには、組織側端末 120Bが管理 するユニットの周辺又は近接した空間(ユニット)に登録者が移動した場合に存在通 知情報を配信することを示す事情 R2が登録されている。 For example, as shown in the diagram, the organization side terminal 120A that controls the door key of the registrant's work entrance / exit 1202A indicates that all presence notification information is distributed. It indicates that the presence notification information is distributed to the organization-side terminal 120B on the transportation side that controls the mouth when the registrant moves to a space (unit) around or near the unit managed by the organization-side terminal 120B. Circumstance R2 is registered.
登録する通知条件は、主な例には以下の(1)〜(4)とその組合せがある。 The notification conditions to be registered include the following (1) to (4) and combinations thereof as main examples.
( 1 )登録空間及びその周辺空間内又は外に存在することとなった場合 (1) In the case of existing in or outside the registered space and its surrounding space
(2)—定空間に近づいた場合、又は一定空間から遠ざかった場合 (2) —When approaching a certain space or away from a certain space
(3)登録した通知時間になった場合 (4)登録の時間間隔に応じた通知時間となった場合 (3) When the registered notification time comes (4) When the notification time corresponds to the registration time interval
なお、交換サーバ 20は、存在情報通知表の登録情報と比較対象情報や存在通知 情報を比較して登録者の認証や存在空間の認識を行うこともある。 The exchange server 20 may authenticate the registrant and recognize the existence space by comparing the registration information in the presence information notification table with the comparison target information and the presence notification information.
[0087] (変型例 1 メインユニット、サブユニットへの通知) [0087] (Variation 1 Notification to main unit and sub unit)
認証システム内で比較対象情報の取得を容易にするため、全ての存在通知情報を 、登録者のメインユニット(サブユニットを含む)に必ず送信する設定を行ってもよい。 メインユニットを管理する認証サーバ 10Eは、直前に受信した存在通知情報ゃ自機 内にある比較対象情報と、ステップ S108の受信情報を比較検証し、個人認証の連 続性を判定する(ステップ S 113)。その後の処理は、ステップ S114、 S115と同様で ある力 受信した存在通知情報は一定期間(例えば、 1週間)保管する。 In order to facilitate the acquisition of comparison target information within the authentication system, all presence notification information may be set to be transmitted to the registrant's main unit (including subunits). The authentication server 10E that manages the main unit compares and verifies the presence notification information received immediately before, the comparison target information in its own device, and the received information in step S108, and determines the continuity of personal authentication (step S 113). The subsequent processing is the same as in steps S114 and S115. The received presence notification information is stored for a certain period (for example, one week).
[0088] (変型例 2 非対象情報の送信) [0088] (Variation 2 Transmission of non-target information)
ステップ S111の処理時に比較対象情報の作成がない場合は、未作成であることを 示す情報と、受信した存在通知情報とを併せた非対象情報を作成して、交換サーバ 20に送信してもよく、この情報を受信すると、含まれる存在通知情報を基に登録者を 特定し、存在情報通知表に非対象情報の受信を登録する。この結果、非対象情報 登録のあるシステム内で登録者が認識されていないことを明確にする。 If comparison target information is not created during the processing of step S111, non-target information combining information indicating that it has not been created and the received presence notification information may be created and sent to the exchange server 20. When this information is received, the registrant is identified based on the presence notification information included, and the reception of the non-target information is registered in the presence information notification table. As a result, it is clarified that the registrant is not recognized in the system with non-target information registration.
[0089] (変型例 3 通知異常情報の効果) [0089] (Variation 3 Effect of notification abnormality information)
通知異常情報は、実在の連続性が不成立の場合に作成する情報のため、交換サ ーバ 20は、その後の端末の利活用には移動関連情報による認証を要求する情報、 又は移動関連情報による認証がなければ端末の利活用を不許可とする制限情報を 自動作成し、存在情報通 Since the notification abnormality information is information that is created when the actual continuity is not established, the exchange server 20 uses the information that requires authentication based on the movement-related information or the movement-related information for subsequent use of the terminal. If there is no authentication, restriction information that prohibits the use of the terminal is automatically created and presence information is passed.
知表に登録された先に送信してもよい。この結果、登録者の個人情報や携帯電話機 等を不正利用することや、なりすましを防止可能とする。 It may be transmitted to the destination registered in the knowledge table. As a result, it is possible to prevent unauthorized use and impersonation of registrants' personal information and mobile phones.
[0090] (変型例 4 交換サーバ 20を介した移動推定情報、移動認識情報の作成) [0090] (Variation 4 Creation of movement estimation information and movement recognition information via exchange server 20)
交換サーバ 20は、ステップ S107の処理に併せて、検証指示情報を作成し (ステツ プ S 107)、認証サーバ 10A〜 10Eに対して送信する(ステップ S 108)。 The exchange server 20 creates verification instruction information in conjunction with the process of step S107 (step S107) and transmits it to the authentication servers 10A to 10E (step S108).
この検証指示情報は、 3段階の処理と依頼番号を併せたものであり、第 1処理として 認証サーバ 10の管理下に、存在通知情報の空間情報に対応する端末 (ユニット)が 存在するかを判定させる。第 2処理として、該当する端末が存在する場合、該当端末 が管理するユニット内に顔情報読取装置や電波の交信記録を管理する端末が存在 するかを判定させる。第 3処理として、顔情報読取装置や電波の交信記録を管理す る端末が存在する場合、撮影した映像又は画像中(以下では、映像とする)又は交信 記録等に、存在通知情報の時間情報を基準にした一定時間範囲に登録者が撮影又 は交信されているか検証し判定させ、その回答情報として移動推定情報を送信させ 認証サーバ 10は、第 2処理の判定後、受信した検証指示情報に基づき検証依頼 情報 1〜4を作成して該当端末に送信し、第 2の実施形態のステップ S51〜S59に準 じた処理を実行させ、検証結果として移動推定情報を受信すると、交換サーバ 20に 送信する。 This verification instruction information is a combination of the three-stage process and the request number. As the first process, a terminal (unit) corresponding to the spatial information of the presence notification information is managed under the authentication server 10. Determine if it exists. As the second process, if the corresponding terminal exists, it is determined whether there is a face information reading device or a terminal that manages radio communication records in the unit managed by the corresponding terminal. As the third process, when there is a face information reader or a terminal that manages radio communication records, the time information of the presence notification information is recorded in the captured video or image (hereinafter referred to as video) or in the communication record. The verification server 10 verifies whether or not the registrant has been photographed or communicated within a certain time range based on the information and transmits the movement estimation information as the response information.The authentication server 10 receives the verification instruction information received after the determination of the second process. If the verification request information 1 to 4 is created and transmitted to the corresponding terminal, the process according to steps S51 to S59 of the second embodiment is executed, and the movement estimation information is received as the verification result, the exchange server 20 Send to.
交換サーバ 20は、第 2の実施形態のステップ S59〜S60に準じた処理により、移動 推定情報と当初の比較対象情報とを比較し、整合性がある場合は、ステップ S108の 送信先に、ステップ S107の存在通知情報と、その検証が成立したことを示す情報と を併せた検証成功情報を送信する。 The exchange server 20 compares the movement estimation information with the original comparison target information by the processing according to steps S59 to S60 of the second embodiment. Successful verification information is transmitted by combining the presence notification information in S107 and information indicating that the verification has been established.
(変型例 5 自動通知 1 特定人物の接近通知) (Variation 5 Automatic notification 1 Specific person approach notification)
存在情報通知表に、登録者の存在空間から一定範囲内の空間に人物 Aの存在を 認識すると、登録者に対し、人物 Aが近隣に存在することを示す情報である存在注 意情報を自動的に通知するという配信条件の登録が行う。この場合、人物 Aの存在 情報通知表に「人物 Aの存在通知情報が作成される都度、登録者の存在情報通知 表又はメインユニット管理端末に送信する」という条件と、登録者の存在情報通知表 又はメインユニット管理端末に「人物 Aの存在通知情報を受信すると、受信した人物 Aの存在空間と、最新の登録者の存在空間とを比較し、同一又は一定範囲内の空間 と認識した場合には、登録者に通知する」という条件登録を行い、双方の存在空間情 報を連動させた判定が可能となる。 When the presence information notification table recognizes the presence of the person A in the space within a certain range from the registrant's existence space, the presence notice information, which is information indicating that the person A exists in the neighborhood, is automatically added to the registrant. Registration of the distribution condition of notification. In this case, in the presence information notification table for person A, a condition that “every person A presence notification information is created is sent to the registrant presence information notification table or main unit management terminal” and the registrant presence information notification is sent. In the table or main unit management terminal, “When the presence notification information of person A is received, the presence space of person A is compared with the existence space of the latest registrant, and it is recognized that the space is the same or within a certain range. In this case, it is possible to make a judgment that links the presence space information of both parties.
利用者は、刑事又は民事事件の被害者や証人と加害者、ストーカー被害者とスト 一力一、いじめや家庭内暴力や離婚 (離婚成立前の紛争状態を含む)等の当事者 等があり、通知希望側の理由が社会通念に照らして正当と認められる場合である。 [0092] (変型例 6 自動通知 2 特定区域内又は外の通知) Users include victims of criminal or civil cases, witnesses and perpetrators, stalker victims and strikers, bullying, domestic violence, divorce (including disputes before divorce), etc. This is a case where the reason for the notification request is justified in light of social conventions. [0092] (Variation 6 Automatic notification 2 Notification inside or outside specific area)
登録者の存在情報通知表又はメインユニットの管理端末に、「存在を義務付けた一 定区域を示す空間情報」又は「立入禁止した一定区域を示す空間情報」と、「登録条 件に反した場合、登録者と関係者に自動的に通知する」ことを条件登録し、登録者の 最新の比較対象情報が作成される都度、現在の存在空間が登録条件に該当するか 検証する。 If the registrant's presence information notification table or the main unit's management terminal is not in compliance with the registration conditions, `` spatial information indicating a certain area that is required to exist '' or `` spatial information indicating a certain area where entry is prohibited '' Automatically notify the registrant and related parties ”, and verify that the current existence space meets the registration condition each time the latest information for comparison of the registrant is created.
利用例は、受刑者であり、特定区域内として刑務所内で存在することや、刑務所外 の一定区域で労働や奉仕活動等をすることを認識可能とし、区域外に出た場合には 、本人及び最寄りの警察官又は刑務官等に通知する。この結果、逃亡は困難となり、 刑務所の壁や収容施設は簡易で済み、受刑者は社会での具体的な労働訓練により 社会復帰を行う準備もできる。また。被疑者又は服役者の移動には、警察官やパトカ 一から一定空間に存在することと規定すれば、手錠といった物理的手段が不要とな また、再犯率の高い犯罪や重大な犯罪では、服役後に再犯に結び付く可能性の高 い空間に存在している場合、登録者と関係者に自動的に通知し、再犯抑止効果を生 し ·ο。 An example of use is a prisoner who can recognize that he / she exists in a prison as a specific area, or that he / she performs labor or service activities in a certain area outside the prison. And notify the nearest police officer or prison officer. As a result, escape is difficult, prison walls and detention facilities are simple, and prisoners are prepared to reintegrate through specific labor training in society. Also. If it is defined that the suspect or prisoner is in a certain space from the police officer or police car, physical means such as handcuffs are not necessary.In addition, in crimes with a high recidivism rate or serious crimes, If it exists in a space that is likely to lead to re-offending later, it automatically notifies registrants and related parties, and has the effect of deterring re-offending.
[0093] 携帯電話機や GPS機能や電子タグ等を利用して登録者の位置情報を提供するサ 一ビス [0093] Services that provide location information of registrants using mobile phones, GPS functions, electronic tags, etc.
は存在するが、個々に独立したサービスであるため、電波の届かない空間や読取装 置の設置数から断片的な位置情報の取得となり、位置情報の非連続性と、登録者へ のなりすましを可能とする脆弱性と、常に各サービスが利用準備を行う非効率性があ つた。 However, since it is an independent service, it is possible to obtain fragmentary location information based on the space where radio waves do not reach and the number of readers installed, and discontinuity of location information and impersonation of registrants. There were vulnerabilities to enable, and inefficiencies in which each service always prepared for use.
本実施の形態は、交換サーバ 20を活用して関係機関が比較対象情報を共有し、 個々のサービスが融合した一つの認証システムとなる効果が生じるので、登録者の 存在空間を連続的に把握すること、登録者の行動に合わせて各サービスの利用準 備ゃ利用終了や中断を可能として効率性を図れること、認証の精度を向上させること になる。 In this embodiment, the exchange server 20 is used to share information to be compared and a single authentication system in which individual services are merged. As a result, the existence space of the registrant is continuously grasped. In addition, the use of each service can be terminated or interrupted according to the registrant's behavior, so that efficiency can be improved and the accuracy of authentication can be improved.
また、登録者が自己判断に基づき配信先を指定登録することで、登録者の行動を 認識させる先を自己管理すること、比較対象情報を配信先に合せた存在通知情報 に変形するので、各サービスからの遡及的な追跡ができず、登録者のプライバシー を守ること力 Sでさる。 In addition, the registrant can specify the delivery destination based on self-judgment, which Self-management of the destination to be recognized, and the information to be compared are transformed into presence notification information that matches the delivery destination, so that it is not possible to trace back from each service, and the privacy S of the registrant can be protected.
[0094] <第 4の実施の形態〉 [0094] <Fourth embodiment>
(存在空間情報の提供) (Providing existence space information)
図 8は、本発明の第 4の実施の形態において、登録者の存在する又は存在した空 間情報や時間情報を、閲覧や通知等を求める第三者に提供する際の認証システム の動作例を示すシーケンスチャートである。 Fig. 8 shows an example of the operation of the authentication system when providing the third party who requests browsing or notification of the spatial information and time information that the registrant exists or has existed in the fourth embodiment of the present invention. It is a sequence chart which shows.
登録者は、事前に、第三者へ存在する空間と時間の情報を提供することを承諾し、 相手方も無制限に提供するレベルから、認証サービスを利用した特定人物に限定す るレベルまでを設定する。ここでは、保護者と子供が携帯電話機を利用する例で説 明する。 The registrant agrees in advance to provide information on the space and time that exists to a third party, and sets the level from the level that the other party provides without restriction to the level limited to a specific person using the authentication service. To do. Here, an example will be described in which parents and children use mobile phones.
[0095] 交換サーバ 20は、認証サーバ 10Aから子供の比較対象情報を受信すると、自機 内の存在情報通知表に格納し、自動的に第三者に空間情報や時間情報を配信する 条件の登録有無を検証し (ステップ S151)、登録がある場合、比較対象情報から個 人識別 IDと空間情報と時間情報を抽出して位置提供情報を作成し (ステップ S152) 、配信対象端末に送信する(ステップ S 153)。この際、交換サーバ 20は、個人識別 I Dを、登録者氏名や配信先の固有 IDに変換してもよい。 [0095] Upon receiving the child comparison information from the authentication server 10A, the exchange server 20 stores it in its own presence information notification table, and automatically distributes spatial information and time information to a third party. Verify registration (step S151), and if there is registration, extract personal identification ID, spatial information, and time information from the comparison target information to create location provision information (step S152) and send it to the distribution target terminal (Step S153). At this time, the exchange server 20 may convert the personal identification ID into a registrant name or a unique ID of the distribution destination.
自動配信の登録がない場合には、保護者は、第 1又は第 2の実施形態に準じて個 人認証を受けて、交換サーバ 20に情報提供を請求することになる。保護者は所持す る携帯電話機により、携帯電波認識情報を自動的に作成して!/、る (ステップ S 154)。 その後、携帯電話機により対象人物 (子供)の個人識別 ID (子供が所持する携帯電 話機の識別 ID又は電話番号等を含む)と、対象人物の位置情報を求める情報と、請 求者 (保護者)の比較対象情報とを併せた位置確認情報を作成し (ステップ S 155)、 組織側端末 120Bを介して認証サーバ 10Bに送信する(ステップ S 156)。 If there is no registration for automatic distribution, the guardian will receive personal authentication in accordance with the first or second embodiment, and will request the exchange server 20 to provide information. The parent / guardian automatically creates mobile radio wave recognition information using the mobile phone he / she owns (step S154). Then, the personal identification ID of the target person (child) (including the identification ID or telephone number of the mobile phone held by the child), information for requesting the location information of the target person, and the requester (guardian) ) And the comparison target information are created (step S155) and transmitted to the authentication server 10B via the organization side terminal 120B (step S156).
認証サーバ 10Bは、受信した情報に基づいて個人認証処理を実行し、保護者本 人の認証が成立すると、その認証結果情報と位置確認情報とを併せた位置確認請 求情報を作成し (ステップ S 157)、交換サーバ 20に送信する(ステップ S 158)。 交換サーバ 20は、受信した情報と、存在情報通知表の登録条件と比較し、請求者 に情報提供可能であるか判定し (ステップ S159)、登録条件に合致しない場合、位 置確認請求情報に情報提供を拒絶することを示す情報を併せた位置提供拒否情報 を作成し (ステップ S160)、認証サーバ 10Bや末端側端末 160に送信する (ステップ S 161)。 The authentication server 10B executes personal authentication processing based on the received information, and when authentication of the guardian is established, it creates location confirmation request information that combines the authentication result information and location confirmation information (step S157), and transmits it to the exchange server 20 (step S158). The exchange server 20 compares the received information with the registration conditions in the presence information notification table to determine whether information can be provided to the claimant (step S159). Location provision refusal information combined with information indicating that information provision is rejected is created (step S160), and transmitted to the authentication server 10B and the terminal terminal 160 (step S161).
交換サーバ 20は、登録条件に合致する場合、対象人物の最新の比較対象情報や 存在通知情報に含まれる空間情報と時間情報を抽出した上で (ステップ S162)、対 象人物の個人識別 IDと併せた位置提供情報を作成し (ステップ S 163)、認証サーバ 10Bや末端側端末 160に送信する(ステップ S 164)。 If the registration server satisfies the registration conditions, the exchange server 20 extracts the spatial information and time information included in the latest comparison target information and presence notification information of the target person (step S162), and then determines the personal identification ID of the target person. The combined location providing information is created (step S163) and transmitted to the authentication server 10B and the terminal terminal 160 (step S164).
なお、第 4の実施の形態では、交換サーバ 20を配信先として説明した力 S、認証サ ーバ 10やサブサーバ群が同様に存在情報通知表を有し配信処理を行うことや、特 定端末同士が自動的に配信処理を行うこともある。 In the fourth embodiment, the power S described with the exchange server 20 as the distribution destination, the authentication server 10 and the sub server group similarly have the presence information notification table and perform the distribution process. The terminals may automatically perform distribution processing.
(空間 ·時間情報の自動配信先) (Automatic distribution destination of space and time information)
以下の(1)〜(8)に該当する場合、社会的見地から請求者の個人認証処理を省い て自動的に情報提供を行うことを認め、存在情報通知表に配信先端末や人物等の 該当条件を登録する。なお、自動配信では、第三者が配信先端末を利用中の場合、 提供情報は正当な請求者以外が取得する可能性があること、配信人物には、請求者 の代理人を含むことの承諾を得て!/、るものとする。 In cases where the following (1) to (8) are applicable, it is permitted to provide information automatically from the social viewpoint without the personal authentication process of the claimant, and the delivery destination terminal, person, etc. are indicated in the presence information notification table. Register the applicable conditions. Note that with automatic delivery, if a third party is using the delivery destination terminal, the provided information may be obtained by a person other than the authorized claimant, and the delivery person may include the billing agent's agent. With consent! /.
( 1 )子供 (未成年者)の位置情報の取得を希望する保護者 (1) Parents who want to obtain location information of children (minors)
(2)高齢者、徘徊老人の位置情報の取得を希望する介護者 (2) Caregivers wishing to acquire location information of elderly and elderly people
(3)疾病又は加療中の人物の位置情報の取得を希望する医療関係者又は保護者 (3) Medical personnel or guardians who wish to obtain the location information of persons who are ill or being treated
(4)特定の目的 (就学、就労等)で入国した、又は滞在許可期間を経過した、外国 人の位置情報の取得を希望する入国管理局関係者 (4) Immigration Bureau officials who wish to obtain information on the location of foreigners who have entered Japan for a specific purpose (such as attending school or working) or whose residence permit period has elapsed.
(5)保護観察処分中の人物の位置情報取得を希望する保護観察官又は保護司 (5) A probation officer or probation officer who wishes to obtain the position information of a person under probation
(6)特定人物への近寄り、又は特定空間への出入りを法的に禁じられた人物の位 置情報取得を希望する関係者 (6) Stakeholders who want to get information on the location of persons who are close to a specific person or who are legally prohibited from entering or leaving a specific space
(7)再犯性又は凶悪性の高い刑事処分を受けた人物の位置情報取得が必要とさ れる場合の司法関係者と警察関係者 (8)その他、社会通念に照らし、位置情報の内容を関係する第三者に通知すること が公益又は第三者利益になる場合の第三者。 (7) Judicial officials and police officials when it is necessary to obtain location information of persons who have been subjected to criminal actions with high recidivism or brutality (8) In addition, a third party in the case where notifying the contents of location information to a related third party in light of social conventions becomes a public interest or a third party benefit.
[0097] (空間'時間情報の自動処理条件) [0097] (Automatic processing condition of space 'time information)
以下の(1)〜(7)に該当する場合、登録者からの個人認証の請求有無に関わらず 、認証システムが登録者の存在を認識する検索処理と、その結果による比較対象情 報や存在通知情報の作成と自動配信を行う処理とを設定を可能とする。この設定に より、関係機関やメインユニット管理端末は、登録者の最新の存在空間を認識し、不 正な認証処理を防止することができる。 When the following (1) to (7) are applicable, the authentication system recognizes the existence of the registrant regardless of whether or not the registrant requests for personal authentication, and the comparison target information and presence Allows creation of notification information and automatic distribution processing. With this setting, related organizations and main unit management terminals can recognize the latest existence space of registrants and prevent unauthorized authentication processing.
(1)特定空間に到着、通過した時、特定空間から出発した時。 (1) When arriving and passing through a specific space, or when leaving from a specific space.
例えば、自宅ユニット、最寄駅ユニット、訪問先ユニット、交通手段ユニット、存在が 予測可能な空間、 日常存在空間、登録者が自動処理を設定した空間等。 For example, home unit, nearest station unit, visited unit, transportation unit, space where presence can be predicted, daily existence space, space where registrant has set automatic processing.
(2)特定の時間になった時。 (2) When it is a specific time.
(3) (1)又は(2)の認識から一定時間が経過した時。 (3) When a certain period of time has elapsed since the recognition of (1) or (2).
(4)予想経路から外れたことを認識した時。 (4) When recognizing that the route is not expected.
(5)予想到着時間までに予想到着空間に到着又は通過して!/、な!/、時。 (5) Arrived or passed through the expected arrival space by the expected arrival time!
(6)一定の機器操作が行われた時。 (6) When certain device operations are performed.
例えば、携帯電話機の電源を入れた時、留守番電話サービスの利用時、特定の連 絡先に通話やメール等を行った時等。 For example, when a mobile phone is turned on, when an answering machine service is used, or when a call or e-mail is made to a specific contact.
(7) (1)〜(6)を組み合わせた条件設定がされた時。 (7) When conditions are set that combine (1) to (6).
[0098] (変型例 1 空間 ·時間情報の自動処理停止条件) [0098] (Variation example 1 Automatic processing stop condition for space and time information)
一方、以下の(8)〜(; 14)に該当する場合、登録者の存在空間はプライバシー保護 に該当するので、認証システムが登録者の存在を認識する検索処理を停止する設 定ゃ、存在を認識した情報を自動消去する設定を可能とする。 On the other hand, if the following (8) to (; 14) are met, the existence space of the registrant corresponds to privacy protection, so if the authentication system stops the search process to recognize the existence of the registrant, it exists. It is possible to set to automatically delete information that has been recognized.
(8)特定の空間に到着、通過した時、特定空間から出発した時。 (8) When arriving and passing through a specific space, or when departing from a specific space.
例えば、トイレユニット、病院ユニット、外食先や旅行先等の非日常存在空間、登録 者本人が自動処理を禁止設定した空間等。 For example, toilet units, hospital units, non-daily existence spaces such as restaurants and travel destinations, and spaces where registrants prohibit automatic processing.
(9)特定の時間になった時。 (9) When it is a specific time.
(10) (8)又は(9)の認識から一定時間が経過した時。 (11)予想経路から外れたことを認識した時。 (10) When a certain period of time has elapsed since the recognition of (8) or (9). (11) When recognizing that the route is not expected.
(12)予想到着時間までに予想到着空間に到着又は通過して!/、な!/、時。 (12) Arrived or passed into the expected arrival space by the expected arrival time! / ,!
(13)一定の機器操作が行われた時。 (13) When certain device operations are performed.
例えば、携帯電話機の電源を切った時、特定の連絡先に通話やメール等を行った 時等。 For example, when a mobile phone is turned off or when a call or email is made to a specific contact.
(14) (8)〜(; 13)を組み合わせた条件設定がされた時。 (14) When the condition setting combining (8) to (; 13) is made.
<第 5の実施の形態〉 <Fifth embodiment>
(比較対象情報を利用した各種取引制御) (Various transaction control using information to be compared)
(情報通知された関係機関の処理) (Processing of related organizations notified of information)
図 10、図 11は、本発明の第 5の実施の形態において、比較対象情報を配信された 関係機関が行う情報受入処理や、認証サービスの提供処理の動作例を示すシーケ ンステヤートである。 FIG. 10 and FIG. 11 are sequence diagrams showing operation examples of information acceptance processing and authentication service provision processing performed by the related organizations to which the comparison target information is distributed in the fifth embodiment of the present invention.
ここでは、登録者が、診察を受けるために勤務先から病院に出向くことを例にして、 関係する各種取引に必要な個人認証や端末の動作にっレ、て説明する。 In this section, we will explain the personal authentication and terminal operations necessary for various related transactions, taking the example of a registrant going to the hospital from the workplace to receive a medical examination.
図 9 (a)に示すように、病院の玄関には、入退場者の顔情報を読み取る末端側端末 160Aと 160B、病院内には、待合室にいる人物の顔情報を読み取る末端側端末 16 0Cと、診察室の入退場者の虹彩情報を読み取る末端側端末 160Dと、検査室の入 退場者の虹彩情報を読み取る末端側端末 160Eと、会計窓口にある電子マネー端 末に付帯した末端側端末 160Fと、受付窓口にある事務端末に付帯した末端側端末 160Gとが設置されている。また、病院内には、電子カルテを閲覧又は入力等するた めに末端側端末 160Hと 1601、レジスターや診療報酬計算機能等を備えた電子マ ネー端末である末端側端末 160Jと、患者の健康保険情報を取得又は診察受付処理 や事務処理機能等を備えた事務端末である末端側端末 160Kとが設置されている。 また、図 9 (b)は、図 9 (a)の端末構成例を示した図であり、病院内の端末を管理す る認証サーバ 10Aは、交換サーバ 20を介して、電子カルテ機関の端末を管理する 認証サーバ 10Dと、電子マネー運営会社の端末を管理する認証サーバ 10Eと、健 康保険組合の端末を管理する認証サーバ 10Fと、登録者の勤務先の端末を管理す る認証サーバ 10Gと接続されている。なお、各認証サーバ 10は、処理の連携が明確 な場合、交換サーバ 20を介さず、直接情報交換を行うこともある。 As shown in Fig. 9 (a), the end terminals 160A and 160B that read the face information of the entrance / exit at the entrance of the hospital, and the end terminals 160 0C that read the face information of the person in the waiting room in the hospital. Terminal terminal 160D that reads the iris information of the entrance / exit of the examination room, terminal terminal 160E that reads the iris information of the entrance / exit of the examination room, and the terminal terminal attached to the electronic money terminal at the accounting window 160F and a terminal 160G attached to the office terminal at the reception desk are installed. In addition, in the hospital, terminal terminals 160H and 1601 for viewing or inputting electronic medical records, terminal terminal 160J, which is an electronic money terminal equipped with registers, medical fee calculation functions, etc., and patient health A terminal terminal 160K, which is an office terminal that has insurance information acquisition or consultation reception processing and office processing functions, is installed. FIG. 9 (b) is a diagram showing an example of the terminal configuration of FIG. 9 (a). The authentication server 10A that manages the terminal in the hospital is connected to the terminal of the electronic medical record organization via the exchange server 20. Authentication server 10D that manages terminals of electronic money management companies, authentication server 10F that manages terminals of health insurance associations, and authentication server 10G that manages terminals of registrants Connected with. In addition, each authentication server 10 has clear linkage of processing. In this case, information may be directly exchanged without going through the exchange server 20.
各サブサーバ群は、 自機が管理する末端側端末 160の読取個人情報に基づき認 証処理を行うことや、受信した比較対象情報や存在通知情報に基づき末端側端末 の認証サービス (各種取引)の提供の制御 (許可、処理開始、停止)を行う。建物側端 末 110Aは玄関の電子錠の開閉制御を、建物側端末 110Bは病院内での人物の存 在ユニット認識や出入管理を、組織側端末 120Aは電子カルテの閲覧又は入力等の 制御を、組織側端末 120Bは電子マネーの利用制御を、組織側端末 120Cは事務 機器端末の利用制御を行う。 Each sub-server group performs authentication processing based on the read personal information of the terminal 160 managed by itself, and terminal terminal authentication services (various transactions) based on the received comparison target information and presence notification information. Control (allow, start, stop) the provision of The terminal 110A on the building side controls the opening and closing of the electronic lock at the entrance, the terminal 110B on the building side recognizes the presence unit of the person in the hospital and controls access, and the terminal 120A on the organization side controls the viewing and input of the electronic medical record. The organization side terminal 120B controls the use of electronic money, and the organization side terminal 120C controls the use of office equipment terminals.
(基本 1 登録者が勤務先にいる場合) (Basic 1 When registrant is at work)
交換サーバ 20は、登録者が認証サーバ 10Gより勤務先ユニット内に存在すること を示す比較対象情報を受信すると (ステップ S201)、第 3の実施の形態のステップ S 102〜S108と同様の処理により、各認証サーバ 10に存在通知情報を送信する(ス テツプ S202、 S203)。 When the exchange server 20 receives the comparison target information indicating that the registrant exists in the work unit from the authentication server 10G (step S201), the exchange server 20 performs the same process as steps S102 to S108 in the third embodiment. The presence notification information is transmitted to each authentication server 10 (steps S202 and S203).
認証サーバ 10Aは、第 3の実施の形態のステップ S 111の処理により(ステップ S20 4)、登録者が病院内に存在しないことを認識し (ステップ S205)、自機が管理するサ ブサーバ群に対し、各サブサーバ群又はサブサーバ群が管理する端末(主に末端 側端末 160)に、個人識別 IDと認証サービスの停止を指示する情報を併せた(以下 では、利用制御情報とする)を送信する (ステップ S206、 S207)。この結果、病院内 では登録者になりすましてシステムを不正に利用することが不可能となる。 The authentication server 10A recognizes that the registrant does not exist in the hospital (step S205) by the process of step S111 of the third embodiment (step S204), and adds it to the subserver group managed by its own device. On the other hand, each subserver group or a terminal managed by the subserver group (mainly the terminal terminal 160) is combined with information for instructing to stop the personal identification ID and authentication service (hereinafter referred to as usage control information). Transmit (steps S206 and S207). As a result, it is impossible for a hospital to impersonate a registrant and use the system illegally.
同様に、認証サーバ 10D〜; 10Gでは、利用可能な空間は勤務先ユニットであるこ とを認識し (ステップ S208)、自機が管理する各端末に、個人識別 IDと、認証サービ スの請求端末が勤務先ユニット内の端末である場合は許可情報を、勤務先ユニット 以外の端末である場合は利用制御情報を送信することを指示する情報を併せた(以 下では、処理指示情報)を作成して (ステップ S209)、送信する(ステップ S210)。 なお、許可情報、利用制御情報、処理指示情報を受信した端末は、自機が管理す る端末に対し受信情報を送信し同様な処理認識をさせることや、個人識別 IDに基づ いて自機内の基本情報 DBや履歴情報 DBにある該当登録者の個人フォルダを抽出 し、受信情報を登 録してもよい。 Similarly, the authentication servers 10D to 10G recognize that the available space is a work unit (step S208), and each terminal managed by the device has a personal identification ID and an authentication service billing terminal. Creates permission information if the is a terminal in the work unit, and information that instructs the use control information to be sent if it is a terminal other than the work unit (hereinafter referred to as processing instruction information) (Step S209) and transmit (Step S210). A terminal that has received permission information, usage control information, and processing instruction information transmits the received information to a terminal managed by the terminal so that it can recognize the same process, or based on the personal identification ID. The personal folder of the registrant in the basic information DB and history information DB is extracted, and the received information is registered. You may record.
[0101] (基本 2 登録者が勤務先を出発した場合) [0101] (Basic 2 When the registrant leaves the office)
登録者が移動を開始すると、認証サーバ 10Gは移動開始情報を作成して交換サ ーバ 20に送信し(ステップ S211)、交換サーバ 20や各認証サーバ 10ではステップ S 202〜S210と同様な処理力 S実施される(ステップ S214〜S222)。また、認証サー バ 10Gは、移動開始情報により、自機ユニット内に登録者が存在しないことを認識す るので、利用制御情報を作成し (ステップ S212)、自機が管理するサブサーバ群に 対し送信する(ステップ S213)。この結果、勤務先、病院内の双方で登録者になりす ましてシステムを不正に利用することが不可能となる。 When the registrant starts moving, the authentication server 10G creates movement start information and sends it to the exchange server 20 (step S211). The exchange server 20 and each authentication server 10 perform the same processing as steps S202 to S210. Force S is performed (steps S214 to S222). Further, since the authentication server 10G recognizes that there is no registrant in its own unit from the movement start information, it creates usage control information (step S212) and adds it to the sub-server group managed by its own unit. The data is transmitted (step S213). As a result, it is impossible to impersonate a registrant both at work and in the hospital and use the system illegally.
なお、認証サーバ 10G力 S、ステップ S211の処理時に移動予告情報を作成して送 信した場合、各認証サーバ 10は、利用可能性情報を作成して自機が管理するサブ サーバ群に対し送信し、登録者が到着した場合の認証サービス処理の準備を促して あよい。 In addition, if the authentication server 10G power S and movement advance notice information are created and sent during the processing of step S211, each authentication server 10 creates availability information and sends it to the sub-server group managed by itself. It may encourage the preparation of authentication service processing when a registrant arrives.
[0102] (基本 3 登録者が病院に到着した場合) [0102] (Basic 3 When the registrant arrives at the hospital)
登録者が病院に到着すると、第 1の実施の形態のステップ S17〜S23に準じた処 理により、末端側端末 160Aが顔情報を読み取り、建物側端末 110Aが移動停止情 報又はバイオメトリタス認識情報を作成し、認証サーバ 10Aが、建物側端末 110Aが 作成した比較対象情報とステップ S215の存在通知情報との認証の連続性を検証す ることで、登録者が病院ユニット内に存在することを認識する (ステップ S223)。その 後、認証サーバ 10Aは、移動停止情報を交換サーバ 20へ送信し (ステップ S224)、 ステップ S202〜S203、ステップ S208〜S210と同様な処理が実施される(ステップ S225〜S229)。この結果、登録者は病院内では認証サービスが利用可能となり、 病院外では登録者になりすましてシステムを不正に利用することが不可能となる。 認証サーバ 10Aは、交換サーバ 20より存在通知情報を受信すると、比較対象情報 と比較し、ステップ S224の処理が成功したことを認識する(ステップ S230)。さらに、 利用予告情報を作成し (ステップ S231)、自機が管理するサブサーバ群に対し送信 する(ステップ S232)。サブサーバ群は、個人識別 IDに基づいて自機内の基本情報 DBや履歴情報 DBにある該当登録者の個人フォルダを抽出し、受信した利用予告 情報を登録すると、従来登録されていた利用制御情報が解除され、登録者が各端末 の利活用(端末操作、システムアクセス、開錠、入室許可、金融取引等の処理)可能 な状態となり、登録者が認証サービスを請求した場合の準備を促す。 When the registrant arrives at the hospital, the terminal-side terminal 160A reads the face information and the building-side terminal 110A reads the movement stop information or biometrics recognition by the processing according to steps S17 to S23 of the first embodiment. Information is created, and the authentication server 10A verifies the continuity of authentication between the comparison target information created by the building-side terminal 110A and the presence notification information in step S215, so that the registrant exists in the hospital unit. Is recognized (step S223). Thereafter, the authentication server 10A transmits the movement stop information to the exchange server 20 (step S224), and the same processing as steps S202 to S203 and steps S208 to S210 is performed (steps S225 to S229). As a result, the registrant can use the authentication service inside the hospital and cannot impersonate the registrant outside the hospital to use the system illegally. Upon receiving the presence notification information from the exchange server 20, the authentication server 10A compares the information with the comparison target information and recognizes that the process of step S224 has been successful (step S230). Furthermore, usage notice information is created (step S231) and transmitted to the sub-server group managed by the own device (step S232). The sub-server group extracts the personal folder of the registrant in the basic information DB and history information DB in the machine based on the personal identification ID, and uses the received advance notice. When the information is registered, the previously registered usage control information is released, and the registrant can use each terminal (terminal operation, system access, unlocking, entry permission, financial transaction processing, etc.) and register. Encourage preparation when a person requests an authentication service.
なお、認証サーバ 10Aは、自機内に設けた存在認識記録表に、登録者の個人識 別 ID、存在を認識 (推定認識を含む)した時間情報と端末情報等の存在認識記録を 登録する。 The authentication server 10A registers the personal identification ID of the registrant, the time information when the existence is recognized (including estimated recognition), and the presence recognition records such as terminal information in the presence recognition record table provided in the device itself.
(基本 4 病院内での認証サービス) (Basic 4 Authentication service in hospital)
登録者が、受付窓口にある末端側端末 160Gにより静脈情報を読み取りすると、第 1の実施の形態のステップ S17 S23に準じた処理により、認証サーバ 10Aは、ステ ップ S223との認証の連続性を検証し、登録者が受付空間に存在することを認識する 登録者の存在空間を認識すると、存在空間を管理する組織側端末 120Cと建物側 端末 110Bに対し許可情報を、病院内のサブサーバ群である組織側端末 120A 12 OBに対し利用予告情報を送信する(ステップ S 301 ) When the registrant reads the vein information by the terminal 160G at the reception desk, the authentication server 10A performs continuity of authentication with step S223 by the process according to steps S17 and S23 of the first embodiment. When the registrant's existence space is recognized, permission information is sent to the organization side terminal 120C and building side terminal 110B that manage the existence space. Use notice information is transmitted to the group organization side terminal 120A 12 OB (step S 301).
登録者は、組織側端末 120Cが、受信した許可情報を末端側端末 160Kに対し送 信することで (ステップ S302)、受付機として利用可能となり、端末の利用目的情報を 基に、希望する認証サービスを自動的に処理することが可能となる(ステップ S303) 末端側端末 160Kは診察受付機であるので、第一に、登録者の健康保険証情報を 病院側に提供することであり、登録者の個人識別 ID、末端側端末 160Kの端末識別 ID、請求する処理 (ここでは、健康保険証情報の取得)を併せた情報を認証サーバ 1 OAに自動的に送信し (ステップ S304)、認証サーバ 10Aは、この情報に最新の比較 メ寸象'! ¼ When the organization side terminal 120C sends the received permission information to the terminal side terminal 160K (step S302), the registrant can use it as a reception machine, and the desired authentication is performed based on the terminal usage purpose information. Service can be processed automatically (Step S303) Since the terminal 160K on the terminal side is a medical examination acceptance machine, the first is to provide the registrant's health insurance card information to the hospital side. Information is automatically sent to the authentication server 1 OA (step S304) for authentication, including the personal identification ID of the user, the terminal identification ID of the terminal terminal 160K, and the billing process (here, acquisition of health insurance card information). Server 10A is the latest comparison of this information! ¼
報又は個人認証に成功した情報を併せて (ステップ S305)、健康保険組合の管理す る認証サーバ 10Fに送信する(ステップ S306)。 Information or information that has been successfully authenticated (step S305) and transmitted to the authentication server 10F managed by the health insurance association (step S306).
認証サーバ 10Fは、受信した情報により認証処理を行い(ステップ S307)、登録者 の存在空間を認識し (ステップ S308)、要求された処理 (ここでは、健康保険証情報 を抽出し送信すること)を実行し、回答情報として認証サーバ 10Aを介して、末端側 端末 160Kに送信する(ステップ S309)。この結果、末端側端末 160Kは、健康保険 証情報を受信し (ステップ S310)、登録者の氏名や診療報酬の請求先や有効期限 等の情報を病院側が取得し、事務処理に利用する。 The authentication server 10F performs an authentication process based on the received information (step S307), recognizes the registrant's existence space (step S308), and requests the process (here, the health insurance card information is extracted and transmitted). To the end side through the authentication server 10A as response information Transmit to terminal 160K (step S309). As a result, the terminal 160K receives the health insurance card information (step S310), and the hospital acquires information such as the name of the registrant, the billing destination of the medical fee, the expiration date, etc., and uses it for paperwork.
また、第二に、登録者の病歴や検査歴を一元的に管理する電子カルテの利用を準 備することであり、ステップ S304〜S306の処理に準じて、電子カルテ機関の認証サ ーバ 10Dに対し、電子カルテの事前準備を促す処理を自動的に行う(ステップ S311 〜S313)。認証サーバ 10Dは、ステップ S307〜S308の処理に準じて認証を行い( ステップ S314〜S315)、実際の電子カルテ利用請求に備え、抽出等の準備を行う( ステップ S316)。 The second is to prepare for the use of electronic medical records that centrally manage the registrant's medical history and examination history. In accordance with the processing of steps S304 to S306, the authentication server 10D On the other hand, a process for prompting preparation of the electronic medical chart is automatically performed (steps S311 to S313). The authentication server 10D performs authentication in accordance with the processing of steps S307 to S308 (steps S314 to S315), and prepares for extraction and the like in preparation for the actual electronic medical chart usage charge (step S316).
なお、認証サーバ 10Aは、利用目的の相手方になる認証サーバ 10に請求情報を 送信することで説明したが、請求を交換サーバ 20に送信し、第 3の実施形態に準じ て、比較対象情報を存在通知情報に、個人識別 IDを固有 IDに変換処理を行った上 で、送信する処理を行うこともある。 The authentication server 10A has been described by transmitting the billing information to the authentication server 10 that is the other party of the purpose of use. However, the request is transmitted to the exchange server 20, and the comparison target information is transmitted according to the third embodiment. The presence notification information may be sent after being converted from a personal identification ID to a unique ID.
末端側端末 160の利用目的による自動処理を例に説明したが、登録者や関係者 が請求内容を端末に入力し、その入力情報と、登録者の個人識別 ID、処理請求端 末の端末識別 IDとを併せた情報を送信してもよい。 The automatic processing according to the purpose of use of the terminal 160 is explained as an example, but the registrant and the related parties input the contents of the request into the terminal, the input information, the personal identification ID of the registrant, and the terminal identification of the processing request terminal. Information combined with the ID may be transmitted.
(応用 1 病院内での認証サービス) (Application 1 Authentication service in hospitals)
診察室のドアにある末端側端末 160Dを利用した場合、診察室に入室し存在する ことを認識し、末端側端末 160Hの利用の許可情報を取得する。末端側端末 160H は、電子カルテを閲覧又は入力等するための端末であるので、端末の利用目的情報 として、電子カルテの閲覧又は入力、検査実施や調剤内容の指示情報の送信、診療 行為として入力された項目を自動的に計算してレセプト作成や登録者請求金額を決 定する等の複数の処理を行う目的を有しており、該当項目が発生した都度、関係端 末と情報を交換する。 When the terminal 160D on the door of the examination room is used, it is recognized that the terminal is in the examination room and the use permission information of the terminal 160H is obtained. Since the terminal 160H is a terminal for browsing or inputting electronic medical records, it can be used as terminal usage purpose information such as browsing or inputting electronic medical records, performing inspections, sending information on the contents of dispensing, and performing medical treatment. It has the purpose of performing multiple processes such as automatically calculating received items and determining receipts and registrant charges, and exchanging information with related terminals whenever such items occur. .
例えば、請求金額が確定した場合、会計窓口にある電子マネー端末である末端側 端末 160Jに請求金額を送信し、支払い処理が発生することを通知し、準備行為を促 す。また、登録者の存在場所が診察室内空間であることから、病院内の他の空間に は存在しないことが明確になり、患者の取り違えを防止する。 各端末は、認証結果として許可情報を受信すると、当該端末が有する端末の利用 目的情報に基づいた認証サービスを自動的に提供する。例えば、自宅玄関から室 内に入る情報に基づく比較対象情報が作成された後は、登録者は自宅内部に存在 すると認識し、自宅以外では本人になりすまして端末の利活用はできない。更に、自 宅内部においても、寝室や浴室に入る情報に基づく比較対象情報を作成すれば、 家族さえも就寝中や入浴中に登録者になりすまして端末を利活用することはできな い。 For example, when the billing amount is confirmed, the billing amount is transmitted to the terminal terminal 160J, which is an electronic money terminal at the accounting window, notifying that payment processing will occur, and encouraging preparatory actions. In addition, since the registrant's location is in the examination room, it will be clear that the registrant is not in any other space in the hospital, thus preventing patient confusion. When each terminal receives permission information as an authentication result, each terminal automatically provides an authentication service based on the purpose of use of the terminal of the terminal. For example, after the comparison information based on information entering the room from the entrance of the house is created, the registrant recognizes that the person exists inside the house and cannot impersonate the person outside the house to use the terminal. In addition, even within the house, if comparison target information based on information in the bedroom or bathroom is created, even the family cannot impersonate the registrant while sleeping or taking a bath and use the terminal.
[0105] (基本 5 登録者が病院外に出た場合) [0105] (Basic 5 When registrant goes out of hospital)
基本例 2と 3に準じた処理となる力 S、登録者が移動を開始すると、第 1の実施の形態 のステップ S17〜S23に準じた処理により、末端側端末 160Bが顔情報を読み取り、 建物側端末 11 OAが移動開始情報又はバイオメトリタス認識情報を作成し、認証サ ーバ 10A力 建物側端末 110Aが作成した比較対象情報と自機が有する最新の比 較対象情報との認証の連続性を検証することで、登録者が病院ユニット外に存在す ることを認識する。その後、認証サーバ 10Aは、移動開始情報を交換サーバ 20へ送 信し、ステップ S202〜S203、ステップ S208〜S210と同様な処理カ実施され、一 方で、移動開始情報により、 自機ユニット内に登録者が存在しないことを認識するの で、利用制御情報を作成し、自機が管理するサブサーバ群に対し送信する。この結 果、登録者は病院外で When the registrant starts to move in accordance with the process S according to the basic examples 2 and 3, the terminal terminal 160B reads the face information by the process according to steps S17 to S23 of the first embodiment, and the building Side terminal 11 OA creates movement start information or biometrics recognition information, and authentication server 10A power Continuous authentication of the comparison target information created by the building side terminal 110A and the latest comparison target information of its own equipment Recognize that the registrant exists outside the hospital unit. After that, the authentication server 10A sends the movement start information to the exchange server 20, and the same processing as in steps S202 to S203 and steps S208 to S210 is performed. On the other hand, the movement start information is used in the own unit. Since it recognizes that there is no registrant, it creates usage control information and sends it to the sub-servers managed by its own device. As a result, registrants are outside the hospital.
は認証サービスが利用可能となり、病院内では登録者になりすましてシステムを不正 に利用することが不可能となる。 Authentication service becomes available, and it is impossible to impersonate a registrant in a hospital and use the system illegally.
なお、認証サーバ 10Aは、自機内に設けた存在認識記録表に、登録者の個人識 別 ID、退場を認識 (推定認識を含む)した時間情報と端末情報等の存在認識記録を 登録する。 The authentication server 10A registers the presence recognition record such as the personal identification ID of the registrant, the time information that recognizes the departure (including the estimated recognition) and the terminal information in the presence recognition record table provided in the device itself.
[0106] (存在認識記録表) [0106] (Existence recognition record table)
図 12は、この存在認識記録表の内容の一例を示す図であり、ユニットを管理する端 末名と名称、現在時間、存在者の個人識別 IDと氏名、存在者がユニットに入ったこと 又は出たこと又は継続して存在していることを認識した端末と時間、現在の存在有無 、認証対応レベル等の情報を含んでいる。また、比較対象情報や存在通知情報を受 信した場合、当該受信情報と送信元になつた端末識別 IDを登録する。 存在認識記録表は、入場認識時間と退場認識時間を比較し滞在時間を計算する 機能、未退場者を特定する機能、未退場者数を集計する機能、各ユニットの存在認 識記録表の登録情報を相互に比較する機能、未登録者情報を登録する機能も有す る。この結果、登録者の最終確認時間や最終確認端末が認識可能となる。 Fig. 12 is a diagram showing an example of the contents of this existence recognition record table. The name and name of the terminal that manages the unit, the current time, the personal identification ID and name of the presence person, the presence person entered the unit, or It contains information such as the terminal and time that it has recognized that it has exited or continues to exist, the current presence / absence, and the authentication response level. It also receives comparison target information and presence notification information. If received, the received information and the terminal identification ID that became the sender are registered. The presence recognition record table compares the entrance recognition time and the exit recognition time, calculates the stay time, identifies the number of unexited people, counts the number of unexited people, and registers the presence recognition record table for each unit There is also a function to compare information with each other and a function to register unregistered person information. As a result, the registrant's final confirmation time and the final confirmation terminal can be recognized.
[0107] (ユニット退場後の異常への対応) [0107] (Responding to abnormalities after leaving the unit)
各端末は、登録者がユニットから存在しなくなったこと(退場)が認識され、利用制御 情報が送信された後では、登録者の個人情報の読取処理や、認証サービスの請求 処理や、比較対象情報の作成処理が行われた場合、当該処理を異常処理として、 警告情報を作成して関係する端末に送信する。 After each terminal recognizes that the registrant no longer exists from the unit (exit) and the usage control information is sent, the personal information of the registrant is read, the authentication service is billed, When the information creation process is performed, the process is regarded as an abnormal process, and warning information is created and transmitted to the related terminals.
同時に、ユニットにドアや開閉装置といった入退場を制限可能な機能を有した端末 が含まれる場合には、警告情報に併せて施錠強制情報(ドアを閉めることを含む)を 送信し、ドアを強制的に施錠する。また、当該ユニットに顔情報読取装置が設置され ている場合には、警告情報に併せて撮影強制情報を送信し、当該ユニットにいる人 物の状況を記録する。この処置により、なりすまし行為を実行した人物の身柄確保や 証拠物の作成を行う。 At the same time, if the unit includes a terminal with a function that can restrict entry / exit, such as a door or opening / closing device, the lock force information (including closing the door) is sent along with the warning information to force the door. Lock it. In addition, when a face information reader is installed in the unit, the forced shooting information is transmitted along with the warning information, and the status of the person in the unit is recorded. This procedure ensures the identity of the person who performed the impersonation and creates evidence.
[0108] (応用 2 金融取引における動作) [0108] (Application 2 Operation in financial transactions)
登録者が、会計窓口にある末端側端末 160Fで個人情報を入力すると、第 5の実 施の形態の基本 4及び応用 1と同様な認証処理や端末目的の認識が実行され、末 端側端末 160Jにおいて電子マネーの利用が可能となる。 When the registrant enters personal information at the terminal 160F at the accounting window, authentication processing and terminal purpose recognition similar to those in Basic 4 and Application 1 of the fifth embodiment are executed, and the terminal Electronic money can be used at 160J.
末端側端末 160Jは、レジスター機能と診療報酬計算機能とを備えた電子マネー端 末であるので、電子カルテに連動した末端側端末 160Hから診療内容を受信すると 診療報酬額を計算しレジスターに表示すると共に、登録者の電子マネー情報を管理 する認証サーバ 10Eに自動的にアクセスし、登録者の個人識別 IDと、登録者の最新 比較対象情報と、登録者の電子マネー口座から病院の電子マネー口座や預金口座 に診療報酬額に相当する額の振替処理を請求する。 The terminal-side terminal 160J is an electronic money terminal with a register function and a medical fee calculation function, so when receiving medical treatment contents from the terminal-side terminal 160H linked to the electronic medical record, the medical fee is calculated and displayed in the register. At the same time, the authentication server 10E that manages the registrant's electronic money information is automatically accessed, and the personal identification ID of the registrant, the registrant's latest comparison target information, and the electronic money account of the hospital And charge the deposit account to the amount equivalent to the medical fee.
認証サーバ 10Eは、認証の連続性を検証した上で、請求された金融取引内容と、 抽出した登録者の口座残高、金融処理に対する設定条件等の金融取引状況を比較 検証し、請求内容の処理が可能である場合、振替処理を実行し、その結果情報とし て、処理が成功したことを示す情報、振替後の登録者の電子マネー残高等を送信し 、末端側端末 160Jは、その情報を登録者に対し表示する。 The authentication server 10E verifies the continuity of authentication and compares the contents of the requested financial transaction with the status of the financial transaction such as the extracted registrant's account balance and setting conditions for financial processing. If verification and billing content can be processed, transfer processing is executed, and as a result, information indicating that the processing has been successful, the electronic money balance of the registrant after transfer, etc. are transmitted, and the terminal side Terminal 160J displays the information to the registrant.
[0109] 金融取引について、代表的な事例は応用 2に準じた認証サービスを利用する。 [0109] For financial transactions, a typical example uses an authentication service according to Application 2.
商品や乗車券や航空券を購入する場合、飲食代金又はホテルの宿泊料又は美術 館の入場料等のサービス料金を支払う場合等では、レジスターや料金計算用の電子 計算機等に末端側端末 160が機能の一部として組込み又は付帯されている。そのた め、登録者は表示金額を確認し、末端側端末 160にて認証用の個人情報の読取処 理を実施すると、認証システムは表示金額分を端末管理者側に支払う意思確認が完 了したと認識し、その後、認証サービスに成功すると組織側端末 120Eにて決済、支 払、振替処理等を行う。 When purchasing goods, tickets or air tickets, and when paying service charges such as food and beverage charges, hotel accommodation fees, or art museum admission fees, the terminal 160 is connected to a register or a computer for fee calculation. Built in or attached as part of the function. Therefore, when the registrant checks the displayed amount and reads the personal information for authentication at the terminal 160 on the terminal side, the authentication system completes confirmation of the intention to pay the displayed amount to the terminal administrator. After that, if the authentication service is successful, the organization side terminal 120E performs settlement, payment, transfer processing, and the like.
同様に、口座間の資金移動、国内 ·国外送金、外国為替又は株式又は社債等の代 金決済等の金融取引、ショッピング又はオークションの代金決済等のインターネットを 利用した決済、支払、振替処理等の場合には、認証用の個人情報の読取処理を実 施すると、操作中の電子機器画面上に表示されている取引内容と金額に関する処理 を承諾したものとみなし、認証サービスに成功すると組織側端末 120Eが処理を行う Similarly, transfer of funds between accounts, domestic and foreign remittances, financial transactions such as payment for foreign exchange or stocks or bonds, etc., payment using the Internet such as payment for shopping or auction, payment, transfer processing, etc. In this case, when processing for reading personal information for authentication is performed, it is considered that the processing regarding the transaction details and the amount of money displayed on the electronic device screen being operated is accepted, and if the authentication service is successful, the organization side terminal 120E processes
[0110] (認証サービス結果、又は許可情報の有効期限) [0110] (Authentication service result or expiration date of permission information)
なお、認証サービスが成立した情報、許可情報、最新の比較対象情報を受領後、 所定時間(例えば、 5分)が経過した場合には、取引の安全性確保のため、許可情報 等を自動的に消去するように設定することもある。 In addition, when a predetermined time (for example, 5 minutes) has elapsed since receipt of information that the authentication service was established, permission information, and the latest comparison target information, permission information, etc. is automatically used to ensure the safety of the transaction. It may be set to be deleted.
[0111] (経済価値の交換例) [0111] (Exchange example of economic value)
ここで、経済価値の交換について金融取引処理を主要な例として説明する。なお、 説明上、登録者の電子マネー口座の残高は 50円、普通預金口座の残高は 80円、ク レジット利用可能額は 70円、自動融資額(自動借入額)は 50円とする。なお、個人情 報、取引内容、支払方法等は登録者が末端側端末 160に入力し、電子マネーを含 む金融取引を管理する組織側端末 120Eに送信されるものとする。 Here, financial transaction processing will be described as a main example for the exchange of economic values. For the sake of explanation, the registrant's electronic money account balance is 50 yen, the savings account balance is 80 yen, the credit available amount is 70 yen, and the automatic loan amount (automatic borrowing amount) is 50 yen. Personal information, transaction details, payment methods, etc. are entered by the registrant into the terminal 160 and transmitted to the organization terminal 120E that manages financial transactions including electronic money.
(例 1 商品購入代金 30円を電子マネー又は預金口座で支払う) 組織側端末 120Eは、支払額が口座残高内のため、登録者の電子マネー口座から 30円を引き出し、又は、登録者の普通預金口座から 30円を引落し、店舗側の指定 口座に 30円を入金する振替処理を実施する。 (Example 1 Product purchase price 30 yen is paid with electronic money or deposit account) The organization side terminal 120E withdraws 30 yen from the registrant's electronic money account, or withdraws 30 yen from the registrant's savings account and pays 30 yen to the store's designated account because the payment amount is within the account balance Execute transfer process to deposit.
(例 2 診察料 20円をクレジットで支払う) (Example 2 Pay 20 yen for examination fee with credit)
組織側端末 120Eでは、支払額がクレジット供与枠内のため、登録者と病院側にク レジット利用承諾の回答情報を行い、その後、登録者に 20円のクレジット供与した情 報登録と、クレジット会社の預金口座から 20円を引き出し、病院側の指定口座に 20 円を入金するという振替処理を実施する。 At organization side terminal 120E, the payment amount is within the credit allowance, so the registrant and the hospital side provide information on the credit use consent, and then the information registration that provided 20 yen credit to the registrant and the credit company The transfer process will be implemented in which 20 yen is withdrawn from the bank account and 20 yen is deposited into the designated account on the hospital side.
(例 3 飲食代金 60円を電子マネーで支払う、自動融資) (Example 3: Eating and drinking 60 yen with electronic money, automatic loan)
組織側端末 120Eは、電子マネーでは 10円の資金不足となるので、末端側端末 1 60に、処理不能の回答情報と、電子マネー口座残高や、他の利用可能な決済手段 (例えば、預金口座引落し)や、電子マネーと他の決済手段の組合せ処理の提案等 を通知する。 Since the organization side terminal 120E has a shortage of 10 yen in electronic money, the end side terminal 160 will receive an unprocessable answer information, an electronic money account balance, and other available payment means (for example, a deposit account). Withdrawals) and proposals for combination processing of electronic money and other payment methods.
なお、組織側端末 120Eは、残額に相当する自動融資枠の設定があるか検証し、 存在する場合、登録者が 10円を借り入れた処理と、電子マネー口座への 10円の入 金処理とを併せて、店舗側の指定口座に 60円を入金するという振替処理を実施して あよい。 The organization side terminal 120E verifies whether there is an automatic credit line setting equivalent to the balance, and if it exists, the registrant borrows 10 yen and the 10 yen deposit process into the electronic money account. At the same time, a transfer process of depositing 60 yen into the store's designated account may be implemented.
(例 4 A社株式 1株 20円の購入費用を預金口座から引落す) (Example 4 Withdraw the purchase cost of 20 yen per share of Company A shares from the deposit account)
組織側端末 120Eでは、支払額が口座残高範囲内であるので、登録者の普通口座 から 20円を引き出し、売り手又は代行機関である証券会社の指定口座に 20円を入 金すると!/、う振替処理を実施する。 With the organization side terminal 120E, the payment amount is within the account balance range, so if you withdraw 20 yen from the registrant's ordinary account and deposit 20 yen into the specified account of the securities company that is the seller or agency! Perform the transfer process.
(例 5 硬貨や紙幣と電子マネーの交換) (Example 5 Exchange of coins and banknotes with electronic money)
登録者は、電子マネーに交換を希望する現金 30円を金融機関や店舗等の受入側 に渡し確認させ、末端側端末 160に金額 30円が表示させる。登録者は、末端側端 末 160に個人情報の読取処理と、電子マネーへの入金を指示する情報を入力し、組 織側端末 120Eは、受入側の指定口座から登録者の電子マネー口座へ 30円の振替 処理を実施する。 The registrant asks the receiving side, such as a financial institution or a store, for cash to be exchanged for electronic money, and confirms it on the terminal 160. The registrant inputs the personal information reading process and information instructing payment to the electronic money to the terminal 160 on the terminal side, and the organization terminal 120E transfers from the designated account on the receiving side to the registrant's electronic money account. Perform a 30 yen transfer process.
一方、登録者は、末端側端末 160に個人情報の読取と、電子マネーから現金への 交換を指示する情報と、交換金額 20円を入力する。組織側端末 120Eは、交換金額 が口座残高内のため、登録者の電子マネー口座から 20円を引き出し、現金出し手 側の指定口座に 20円入金するという振替処理を実施し、処理完了を末端側端末 16 0に通知する。現金出し手側は、完了通知を確認すると交換金額分の現金を登録者 に渡す。 On the other hand, the registrant reads the personal information to the terminal 160 and transfers the money from electronic money to cash. Enter the information to instruct the exchange and the exchange amount of 20 yen. Since the exchange amount is within the account balance, the organization side terminal 120E carries out a transfer process of withdrawing 20 yen from the registrant's electronic money account and depositing 20 yen into the cashier's designated account. Notify terminal 160. After confirming the completion notice, the cash issuer will give the cash equivalent to the exchange amount to the registrant.
(例 6 登録者本人の口座間資金移動) (Example 6: Transfer funds between accounts of registrants)
登録者は、末端側端末 160に個人情報の読取と、普通預金口座から電子マネー 口座への資金移動を指示する情報と、交換金額を入力し、組織側端末 120Eは、交 換金額が普 The registrant inputs personal information to the terminal 160, information for instructing the transfer of funds from the savings account to the electronic money account, and the exchange amount. The organization terminal 120E has a normal exchange amount.
通預金口座の残高範囲内であるか検証し、範囲内である場合、普通預金口座から交 換金額を引落し、同額を電子マネー口座に入金するという振替処理を実施する。 If it is within the balance range of the deposit account, the transfer amount is deducted from the savings account and the transfer amount is transferred to the electronic money account.
(例 7 登録者以外への口座間資金移動、振込) (Example 7 Transfer funds between accounts to non-registrants, transfer)
登録者は、末端側端末 160に個人情報の読取と、電子マネー口座又は普通預金 口座から第三者の口座への資金移動を指示する情報と、振込金額を入力する。組織 側端末 120Eは、振込額が口座残高範囲内である場合、登録者の口座から交換金 額を引落し、第三者の口座に入金するという振替処理を実施する。 The registrant inputs the personal information read into the terminal 160, information for instructing the transfer of funds from the electronic money account or the savings account to the third party account, and the transfer amount. When the transfer amount is within the account balance range, the organization side terminal 120E carries out a transfer process of withdrawing the exchange amount from the registrant's account and depositing it into the third party account.
(例 8 国外通貨との換算 米国 1ドルとの交換) (Example 8 Conversion to foreign currency Exchange with US dollar 1)
登録者は、末端側端末 160に個人情報の読取と、電子マネー口座から支払いを指 示する情報と、 日本円から米国 1ドルに交換を希望する旨の情報を入力する。組織 側端末 120Eは、申込み外貨両替に必要な金額 (例えば、為替レート 12円と手数料 1円を合計した 13円)を算定し、末端側端末 160に送信し、表示させる。 The registrant inputs information on reading the personal information, instructing payment from the electronic money account, and information indicating that he / she wants to exchange from Japanese yen to US $ 1. The organization-side terminal 120E calculates the amount necessary for applying for foreign currency exchange (for example, 13 yen, which is a total of 12 yen for the exchange rate and 1 yen for the commission), and transmits it to the terminal 160 for display.
登録者は、表示金額の 13円を確認の上、改めて末端側端末 160に個人情報の読 取を行うか、又は、金額承認情報を入力し送信する。 The registrant confirms the displayed amount of 13 yen and reads the personal information to the terminal 160 again or inputs the amount approval information and transmits it.
組織側端末 120Eは、外貨両替必要額 13円が口座残高内のため、登録者の普通 預金口座から 13円を引き出し、自社の手数料として 1円を自社口座に、両替の相手 方口座に 12円を入金すると!/、う振替処理を実施する。 The organization terminal 120E has a foreign currency exchange requirement of 13 yen in the account balance, so 13 yen is withdrawn from the registrant's savings account, 1 yen as the company's commission, and 12 yen in the exchange partner account. If you deposit! /, Carry out the transfer process.
(変型例 1 支払限度額、振替限度額の設定) (Variation 1 Setting of payment limit and transfer limit)
金融取引の場合、ステップ S309で検証する事項として取引設定条件があり、登録 者又は法定代理人やサービス提供側は、金融取引処理時の支払 ·資金移動 ·振込 限度額、クレジット枠利用限度額、借入限度額、両替限度額、取引限度額等 (以下で は、総称して限度額)を登録することもある。 In the case of financial transactions, there are transaction setting conditions as items to be verified in step S309. The person or legal agent or service provider is responsible for payment, transfer of funds, transfer limit, credit line usage limit, borrowing limit, exchange limit, transaction limit, etc. when processing financial transactions. May be registered.
限度額の設定条件には、主に以下の(1)〜(4)とその組合せがある。 The limit setting conditions mainly include the following (1) to (4) and combinations thereof.
(1)一定時間による制限 (1) Limitation by a certain time
一回、一日、一週間等の一定時間又は期間毎の限度額を設定する。 Set a limit for a certain time or period such as once, one day, one week, etc.
(2)取引空間による制限 (2) Restrictions due to trading space
自宅、勤務先、指定した又は未指定の店舗等の取引空間毎の限度額を設定する。 Set a limit for each transaction space such as home, office, designated or undesignated store.
(3)取引時間による制限 (3) Limits due to trading hours
取引可能時間の限度額、取引不可時間を設定する。 Set the limit of the transaction time and the non-transaction time.
(4)取引内容による制限 (4) Restrictions on transaction details
商品購入、ネットバンキング利用、電子マネー利用、現金引出し等の取引内容毎の 限度額を設定する。 Set limits for each transaction, such as product purchases, net banking use, electronic money use, and cash withdrawals.
(変型例 2 口座間の残高振替処理) (Modification 2 Balance transfer between accounts)
金融取引の場合、ステップ S309で検証する事項として取引金額と口座残高の比 較があるが、一定額又は不足額又は一定割合を本人又は別人(法人を含む)の口座 から振替処理し、取引を完了可能にする設定条件を登録することもある。 In the case of financial transactions, there is a comparison between the transaction amount and the account balance as a matter to be verified in step S309. However, a certain amount or shortage amount or a certain percentage is transferred from the account of the principal or another person (including a corporation), A setting condition for enabling completion may be registered.
残高自動振替の対象口座間の設定条件には、主に以下の(1)〜(4)がある。 There are mainly the following (1) to (4) as the setting conditions between the target accounts for automatic balance transfer.
(1)登録者本人の口座間 (1) Between registrant accounts
(2)登録者本人の口座と家族の口座間 (2) Between registrant's account and family account
(3)登録者本人の口座と所属組織及び組織に属する人物の口座間 (3) Between the registrant's own account and the account of the organization and person belonging to the organization
(4)登録者本人の口座と振替元の口座所有者が承諾する口座間 (4) Between the registrant's own account and the account approved by the account holder of the transfer source
また、自動振替額の設定条件には、主に以下の(5)〜(9)とその組合せがある。 The automatic transfer amount setting conditions mainly include the following (5) to (9) and combinations thereof.
(5)—定時間による設定 (5) —Setting by fixed time
一回、一日、一週間等の一定時間又は期間毎の振替承認額を設定する。 Set transfer approval amount for a certain time or period such as once, one day, one week.
(6)取引空間による設定 (6) Setting by trading space
自宅、勤務先、指定した又は未指定の店舗等の取引空間毎の振替承認額を設定 する。 (7)振替相手による設定 Set transfer approval amount for each transaction space such as home, office, designated or undesignated store. (7) Setting by transfer partner
親子間、企業と従業員間等の当事者毎の振替承認額を設定する。 Set transfer approval amount for each party such as between parent and child, between company and employee.
(8)振替金額による設定 (8) Setting by transfer amount
指定金額、取引成立に必要な金額、振替先の口座残高が指定金額に到達する金 額、振替元の口座残高が指定金額に到達する金額、振替元の口座残高の一定割合 等を振替する処理を設定する。 Processing to transfer the specified amount, the amount required to complete the transaction, the amount that the transfer destination account balance reaches the specified amount, the amount that the transfer source account balance reaches the specified amount, a certain percentage of the transfer source account balance, etc. Set.
(9)取引内容による設定 (9) Setting by transaction details
商品購入、電子マネー利用、現金引出し等の取引内容毎の振替承認額を設定す Set transfer approval amount for each transaction such as product purchase, use of electronic money, cash withdrawal
[0114] 既往システムは、登録者の裏切り行為(例えば、入室用カードの不正貸与)や個人 情報 (バイオメトリタス情報)の流失が発生した場合、第三者が登録者になりすまして システムを利用できる脆弱点があった。 [0114] In the past system, if a registrant's betrayal act (for example, unauthorized lending of an entry card) or personal information (biometrics information) is lost, a third party impersonates the registrant and uses the system. There was a vulnerability that could be done.
本認証システムでは、登録者の存在場所を認識する度に利用制御情報を送信して 、全ての電子機器端末の操作や情報システムへのアクセス制御を行うことも可能であ り、登録者の物理的な存在と切り離して第三者がなりすましを実行することはできず、 個人情報や個人資産の安全性が確保される。 In this authentication system, it is also possible to send usage control information every time it recognizes the registrant's location and control all electronic device terminals and access to the information system. It is impossible for a third party to perform impersonation separately from the existing existence, and the security of personal information and personal assets is ensured.
[0115] <第 6の実施の形態〉 [0115] <Sixth embodiment>
(メインユニットを利用した連続性の判定) (Continuity determination using the main unit)
各端末は、登録者の認証を行うために最新の比較対象情報を有しなレ、こともある。 そのため、各端末は、事前に登録者のメインユニットを管理する端末情報と、その端 末で利用する登録者の個人識別 IDとを履歴情報 DBや基本情報 DBに登録し、認証 サービス処理が請求された場合、比較対象情報をメインユニットに送信し、連続性の 判断を求める。 Each terminal may not have the latest information for comparison in order to authenticate the registrant. Therefore, each terminal registers in advance the terminal information that manages the registrant's main unit and the personal identification ID of the registrant used at that terminal in the history information DB and basic information DB, and is charged for authentication service processing. If so, send the information to be compared to the main unit and ask for continuity.
図 13は、本発明の第 6の実施の形態において、交換サーバ 20よりサブサーバ群が 存在通知情報を受信すると、受信情報をメインユニットに送信して認証処理を行い、 処理結果情報を取得して存在認識する動作例を示すシーケンスチャートである。 FIG. 13 shows that in the sixth embodiment of the present invention, when the sub server group receives the presence notification information from the exchange server 20, the received information is transmitted to the main unit to perform the authentication process, and the processing result information is acquired. FIG.
[0116] 登録者のメインユニットを管理する建物側端末 110は、交換サーバ 20より存在通知 情報を常時通知され、認証の連続性を判定し、最新の存在空間を認識している。 交換サーバ 20は、新たに受信した比較対象情報に基づき存在通知情報を作成し 、電子マネー管理の組織側端末 120と建物側端末 110に送信する(ステップ S351)[0116] The building-side terminal 110 that manages the registrant's main unit is always notified of the presence notification information from the exchange server 20, determines the continuity of authentication, and recognizes the latest existence space. The exchange server 20 creates presence notification information based on the newly received comparison target information, and transmits it to the organization side terminal 120 and the building side terminal 110 for electronic money management (step S351).
〇 Yes
建物側端末 110は、受信した存在通知情報と自機に格納した直前の比較対象情 報とを比較検証し (ステップ S352)、最新の存在空間を認識する(ステップ S353)。 組織側端末 120は、認証の連続性判定のために受信した存在通知情報と比べるこ とが可能な比較対象情報を格納している力、、判定する (ステップ S354)。判定の結果 、格納している場合、認証処理を実行し (ステップ S355)、存在空間を認識し、電子 マネーの利用の許可情報を作成する (ステップ S356)。一方、格納していない場合、 登録者のメインユニットを管理する端末情報 (ここでは、建物側端末 110)を抽出し( ステップ S357)、ステップ S351で受信した存在通知情報の個人識別 IDを、メインュ ニットの個人識別 IDに変換処理した情報と、自機の端末識別 IDと、認証可否の回答 を求める情報と、依頼番号を併せて(以下では、メイン認証請求情報とする)建物側 端末 110へ送信する(ステップ S358)。 The building-side terminal 110 compares and verifies the received presence notification information with the immediately previous comparison target information stored in its own device (step S352), and recognizes the latest existence space (step S353). The organization-side terminal 120 determines the power of storing comparison target information that can be compared with the presence notification information received for the authentication continuity determination (step S354). If it is stored as a result of the determination, authentication processing is executed (step S355), the existence space is recognized, and permission information for using electronic money is created (step S356). On the other hand, if not stored, terminal information (in this case, the building-side terminal 110) that manages the registrant's main unit is extracted (step S357), and the personal identification ID of the presence notification information received in step S351 is stored in the main menu. To the building-side terminal 110, the information converted into the personal identification ID of the knit, the terminal identification ID of the machine, the information for requesting an authentication response, and the request number (hereinafter referred to as main authentication request information) Transmit (step S358).
建物側端末 110は、受信したメイン認証請求情報と同一の存在通知情報による認 証が処理されているか判定し (ステップ S359)、認証がある場合、認証したことを示す 情報と、メイン認証請求情報の依頼番号と、自機の端末識別 IDを併せて (以下では、 メイン認証回答情報)組織側端末 120へ送信する(ステップ S360)。組織側端末 120 は、回答情報を受信すると、存在空間を認識し、許可情報を作成する (ステップ S36 1)。 The building-side terminal 110 determines whether authentication by the same presence notification information as the received main authentication request information has been processed (step S359), and if there is authentication, information indicating that authentication has been performed, and main authentication request information The request number and the terminal identification ID of the device itself (hereinafter, main authentication response information) are transmitted to the organization side terminal 120 (step S360). Upon receiving the answer information, the organization side terminal 120 recognizes the existence space and creates permission information (step S361).
一方、認証ない場合、メイン認証請求情報やステップ S351の存在通知情報が偽 物である可能性が生じるので、異常事態であることを認識し (ステップ S362)、直ちに 通知異常情報を作成し、組織側端末 120や交換サーバ 20に送信する(ステップ S36 3)。この結果、組織側端末 120は、認証サービスを停止し (ステップ S364)、交換 サーバ 20は、ステップ S351の送信先に警告情報を送信する(ステップ S365)。 On the other hand, if there is no authentication, the main authentication request information and the presence notification information in step S351 may be fake, so it is recognized that there is an abnormal situation (step S362), and the notification abnormal information is immediately created and the organization The data is transmitted to the terminal 120 and the exchange server 20 (step S363). As a result, the organization-side terminal 120 stops the authentication service (step S364), and the exchange server 20 transmits warning information to the transmission destination of step S351 (step S365).
(変型例 1 他端末と交換サーバの認識処理を利用した連続性の判定) (Modification 1 Judgment of continuity using recognition processing of other terminals and exchange server)
存在通知情報を常時受信しているメインユニットの管理端末は、新たな存在通知情 報やメイン認証請求情報の受信時に、情報の整合性に異常があると判定すると、通 知異常情報を送信し、その情報を受信した交換サーバ 20は、警告情報を各端末に 送信する。 If the management terminal of the main unit that constantly receives the presence notification information determines that there is an abnormality in information consistency when receiving new presence notification information or main authentication request information, the communication terminal The exchange server 20 that has transmitted the intellectual anomaly information and has received the information transmits warning information to each terminal.
このため、交換サーバ 20から存在通知情報を受信した端末は、受信後一定時間内 に警告情報を受信しない場合、認証が成立したと判断することもある。 For this reason, the terminal that has received the presence notification information from the exchange server 20 may determine that the authentication has been established if it does not receive the warning information within a certain time after the reception.
[0118] <第 7の実施の形態〉 [0118] <Seventh embodiment>
(比較対象情報を利用した異空間端末の連携取引) (Collaborative transactions of different space terminals using information to be compared)
図 14は、本発明の第 7の実施の形態において、比較対象情報により、異空間に存 在する複数端末を連携して取引提供を認識する場合の認証サービスの動作例を示 すシーケンスチャートである。ここでは、鉄道利用と金融取引により説明する。 FIG. 14 is a sequence chart showing an operation example of an authentication service when a transaction provision is recognized by linking a plurality of terminals existing in different spaces according to comparison target information in the seventh embodiment of the present invention. is there. Here, the explanation is based on railway use and financial transactions.
[0119] 登録者のメインユニットを管理する認証サーバ 10Bは、交換サーバ 20より存在通知 情報を常時受信し、登録者の最新存在空間を認識して!/、る。 [0119] The authentication server 10B that manages the main unit of the registrant always receives the presence notification information from the exchange server 20, and recognizes the latest existence space of the registrant.
登録者は、電車に乗るために、 A駅改札口の末端側端末 160Aにて静脈情報を読 み取りし、鉄道会社の全端末を管理する認証サーバ 1 OAに送信する。認証サーバ 1 OAは、受信情報により認証判定を行い、認証成立の場合、移動開始情報を作成し 自機内に格納すると共に(ステップ S375)、交換サーバ 20に送信する(ステップ S37 6)。さらに、認証サーバ 10Aは、末端側端末 160Aの利用目的は、「A駅構内に入 場するために改札を通過する」ことと、「A駅を始発駅とみなす」ことを認識する (ステツ プ S377)。 In order to get on the train, the registrant reads the vein information at the terminal 160A at the end of the A station ticket gate and sends it to the authentication server 1OA that manages all terminals of the railway company. The authentication server 1 OA performs authentication determination based on the received information. If authentication is established, the movement start information is created and stored in the own machine (step S375) and transmitted to the exchange server 20 (step S376). Further, the authentication server 10A recognizes that the purpose of use of the terminal 160A on the terminal side is “pass the ticket gate to enter the station A premises” and “consider A station as the first station” (step S377).
交換サーバ 20は、移動開始情報を存在通知情報に変換し (ステップ S378)、認証 サーバ 10A、 10Bに送信すると(ステップ S379)、認証サーバ 10Bは、受信情報と直 前に認識している比較対象情報との比較により、新たな存在空間を認識し自機内に 登録する(ステップ S380)。 When the exchange server 20 converts the movement start information into presence notification information (step S378) and sends it to the authentication servers 10A and 10B (step S379), the authentication server 10B compares the received information with the comparison target that has been recognized immediately before. By comparing with the information, a new existence space is recognized and registered in the own aircraft (step S380).
登録者は、電車を降りた後に、 B駅改札口の末端側端末 160Bにてステップ S375 〜S380の処理と同様な処理を行う(ステップ S38;!〜 S386)。この際、認証サーバ 1 OAは、末端側端末 160Bの利用目的は、「B駅構外に入場するために改札を通過す る」ことと、「B駅を到着駅とみなす」ことを認識する。 After getting off the train, the registrant performs the same processing as steps S375 to S380 at the terminal 160B at the terminal B of the B station ticket gate (steps S38;! To S386). At this time, the authentication server 1 OA recognizes that the purpose of use of the terminal 160B on the end side is “pass the ticket gate to enter outside the B station” and “deem B station as the arrival station”.
認証サーバ 1 OAは、登録者に関する「始発駅」と「降車駅」とみなす 2つの認識が自 機内に発生すると、自動的に A駅から B駅を乗車区間とした料金を計算する処理を 実行し (ステップ S387)、事前に登録者が設定した料金支払口座を管理する銀行の 認証サーバ 10Cに対し、請求金額、算定根拠となった比較対象情報、鉄道会社側 の入金先口座情報が含まれる料金請求情報を送信する (ステップ S388)。 Authentication server 1 When OA recognizes the registrant as “starting station” and “getting off station” in the aircraft, it automatically calculates the fare from A station to B station. Execute (Step S387) and include the billing amount, comparison target information that is the basis for calculation, and the account information of the bank account at the banking company for the bank authentication server 10C that manages the fee payment account set in advance by the registrant. Billing information to be sent (step S388).
[0120] 認証サーバ 10Cは、自機内に登録者の認証を行うための直近の比較対象情報を 有していないため、料金請求情報を受信した場合、正当性を検証するためにメインュ ニットを管理する認証サーバ 10Bに、算定根拠となった比較対象情報と、当該情報と 認証サーバ 10Bが有する比較対象情報の同一性認証を求める情報とを併せた行動 履歴認証請求情報を送信する(ステップ S389)。 [0120] The authentication server 10C does not have the latest comparison target information for authenticating the registrant in its own device. Therefore, when the billing information is received, the authentication server 10C manages the main unit to verify the validity. To the authentication server 10B, the action history authentication request information that combines the comparison target information that is the basis for the calculation and the information that requests the identity authentication of the comparison target information that the authentication server 10B has (step S389). .
認証サーバ 10Bは、受信情報中の登録者の個人識別 IDや空間情報等を基に、自 機内に格納する比較対象情報と同一性を検証し (ステップ S390)、同一性がある場 合、認証サーバ 10Cに承認情報を送信し (ステップ S391)、この結果、認証サーバ 1 0Cは、料金請求情報に基づく振替 ·引落処理を実施する (ステップ S392)。 The authentication server 10B verifies the identity with the comparison target information stored in the device based on the personal identification ID and spatial information of the registrant in the received information (step S390). The approval information is transmitted to the server 10C (step S391). As a result, the authentication server 10C performs the transfer / withdrawal process based on the billing information (step S392).
一方、認証サーバ 10Bは、格納情報と不一致となる場合、認証サーバ 10Cに非承 認情報を送信する(ステップ S393)。認証サーバ 10Cは、受信情報を自機内に格納 し (ステップ S394)、料金請求情報に基づく振替 ·引落処理を実施せずに、認証サー ノ On the other hand, if the authentication server 10B does not match the stored information, the authentication server 10B transmits non-approval information to the authentication server 10C (step S393). The authentication server 10C stores the received information in its own machine (step S394), and performs the authentication server without performing the transfer / withdrawal process based on the billing information.
10Aに対し、料金請求情報に非承認情報を併せた支払拒絶情報を送信し (ステップ S395)、料金の再計算や、算定根拠の再検証処理等を実施させる (ステップ S396) Payment rejection information that includes non-approval information in addition to billing information is sent to 10A (step S395), and recalculation of charges, re-verification processing of calculation basis, etc. are performed (step S396)
〇 Yes
なお、登録者が事前承諾した場合、ステップ S389〜S391の処理を省き、請求が 在り次第、支払又は振替処理を行ってもよい。 If the registrant approves in advance, the processing of steps S389 to S391 may be omitted, and payment or transfer processing may be performed as soon as a request is made.
[0121] (自動料金計算 1) [0121] (Automatic charge calculation 1)
(1)固定空間情報を持つ末端側端末を利用する場合 (1) When using a terminal on the terminal side with fixed space information
末端側端末 160を、航空機の搭乗口、バスの停留所、駅の改札口、乗船口等に設 置することで、離陸空港と着陸空港、乗車場所と降車場所等を認識し、料金計算を 行う。 Terminal terminal 160 is installed at the boarding gate of an aircraft, bus stop, station ticket gate, boarding gate, etc. to recognize take-off airport and landing airport, boarding location and getting-off location, etc., and calculate fare .
同様に、美術館、観光施設、娯楽施設等のように、管理する又はサービスを提供す る建物や敷地等に入るために入館料や入場料等を徴収している場合、入口に末端 側端末 160を設置することで、入館や入場等を認識し、料金計算を行う。 Similarly, if an entrance fee or entrance fee is collected to enter a building or site that is managed or provided, such as an art museum, a tourist facility, or an amusement facility, the terminal is terminated at the entrance. By installing the side terminal 160, it recognizes admission and admission, and calculates the fee.
(2)位置測定機能を持つ末端側端末を利用する場合 (2) When using a terminal on the terminal side with a position measurement function
末端側端末 160を、タクシーのドア、電車のドア等に設置し、当該末端側端末 160 が GPS機能や管制塔との無線交信状況等から空間情報を取得し、乗車場所と降車 場所等を認識し、料金計算を行う。 Terminal side terminal 160 is installed on a taxi door, train door, etc., and the terminal side terminal 160 acquires spatial information from the GPS function and wireless communication status with the control tower, etc., and recognizes the boarding place and the getting off place etc. And charge calculation.
(3)サービス提供時間に、一定空間に存在すると料金が必要となる場合 (3) When a fee is required if the service is provided in a certain space during service provision time
映画館、劇場、カラオケボックスや漫画喫茶等の遊戯施設、ホテルや貸会場等のよ うに、管理する又はサービスを提供する建物や敷地等に、サービス提供時間(上映 時間、上演時間、営業時間等)に存在していた場合に、料金支払いが必要となるもの 力 sある。 Service provision time (screening time, performance time, business hours, etc.) in buildings or grounds that manage or provide services, such as movie theaters, theaters, karaoke boxes, cartoon cafes, and other play facilities, hotels, rental halls, etc. If that existed), and some force s fee payment is required.
この場合、出入口に末端側端末 160を設置し、登録者が該当空間に存在したことと 存在した時間を認識し、サービス提供空間と時間が該当する場合、料金計算を行う。 In this case, the terminal 160 is installed at the entrance, recognizes that the registrant was in the corresponding space and the time it was present, and if the service provision space and time correspond, charge calculation is performed.
(自動料金計算 2) (Automatic charge calculation 2)
出入口に末端側端末 160を設置し、登録者が該当空間に存在したことを認識する Terminal terminal 160 is installed at the entrance, and the registrant recognizes that it exists in the space.
(4)〜(8)では、商品代金や飲食代金や各種サービス料金の情報は、あらかじめ 電子タグ等や ICチップや QRコードに格納されていることとする。 In (4) to (8), information on product prices, food and beverage charges, and various service charges are pre-stored in electronic tags, IC chips, and QR codes.
(4)出口での一括計算 (4) Batch calculation at exit
登録者が商品を所持しながら店舗から出ると、末端側端末 160は移動開始情報を 作成する。また、出口に設置された電子タグ等の情報読取装置は商品に貼付された 電子タグ等の情報を取得し、購入代金を計算する。その後、登録者の移動開始情報 の時間情報と電子タグ等の読取時間情報とを比較し、同時又は近接の時間情報のも の同士を結び付け、登録者の購入代金として料金計算を行う。 When the registrant leaves the store with the product, the terminal 160 creates movement start information. In addition, an information reader such as an electronic tag installed at the exit acquires information such as an electronic tag attached to the product and calculates a purchase price. After that, the time information of the registrant's movement start information is compared with the reading time information of the electronic tag, etc., and the pieces of time information at the same time or near each other are linked together to calculate the fee as the purchase price of the registrant.
(5)空間移動毎の計算 (5) Calculation for each space movement
店舗内を一つ以上の空間に分割し、空間毎に登録者を認識可能にすると共に、空 間毎に電子タグ等の情報を常時把握可能にする。空間毎に当該空間から商品が存 在しなくなつたことを認識した場合、当該空間に存在しなくなった(当該空間から移動 した)登録者を特定する。その後、登録者の移動開始時間と電子タグ等の読取時間 とを比較し、同時又は近接の時間情報のもの同士を結び付け、登録者の購入代金と して料金計算を行う。 The store is divided into one or more spaces so that registrants can be recognized in each space, and information such as electronic tags can be constantly grasped in each space. When recognizing that the product no longer exists in the space for each space, the registrant who no longer exists in the space (moved from the space) is identified. After that, registrant movement start time and reading time of electronic tag etc. Are compared with each other and linked together at the same time or near time information, and the fee is calculated as the purchase price of the registrant.
(6)読取機による連動 (6) Interlock by reader
(4)及び(5)の場合、同時に複数名が出入りした場合、料金情報が錯綜する可能 性があり、一人ずつ出口を通過する処置や店舗内への入場制限を行う処置等が必 要になる。 In the case of (4) and (5), if multiple people enter and exit at the same time, there is a possibility that the charge information may be complicated, and it is necessary to take measures such as going through the exit one by one or restricting entrance to the store. Become.
そのため、店舗内に末端側端末 160と電子タグ等の読取装置を設置し、登録者の 個人情報を読み取りさせて個人を特定すると共に、登録者が購入希望する商品に貼 付して!/、る電子タグ等の情報を一つ以上読取させて、事前に連動させる。 Therefore, a terminal 160 and a reading device such as an electronic tag are installed in the store, the registrant's personal information is read to identify the individual, and affixed to the product that the registrant wishes to purchase! /, One or more pieces of information such as electronic tags are read and linked in advance.
その後、出口に設置された末端側端末 160が登録者の移動開始情報を認識した 場合、出口に設置された電子タグ等の情報読取装置が取得した商品の電子タグ等 の情報の中に、事前に登録者と連動させた商品の電子タグ等の情報が一つ以上含 まれているか比較する。この結果、事前の電子タグ等の情報が含まれている場合、出 口に設置された電子タグ等の情報読取装置が読み取った商品代金を、登録者の購 入代金として料金計算を行う。 After that, when the terminal 160 installed at the exit recognizes the movement start information of the registrant, the information such as the electronic tag of the product acquired by the information reader such as the electronic tag installed at the exit is included in advance. Compare whether or not it contains one or more information such as electronic tag of the product linked with the registrant. As a result, if information such as electronic tags in advance is included, the price of goods read by the information reader such as the electronic tag installed at the outlet is calculated as the purchase price of the registrant.
(7)提供期間の自動計算 (7) Automatic calculation of provision period
物品のレンタルの場合、登録者が商品を所持しながら該当空間から移動を開始す ると、出口に設置された末端側端末 160は登録者の移動開始情報を認識し、同時に 、出口に設置された電子タグ等の情報読取装置は商品に貼付された電子タグ等の 情報を取得し、当該商品に関して登録者に貸出しを開始した時間情報を取得する。 その後、登録者が商品を所持しながら該当空間内に移動すると、入口に設置され た末端側端末 160は登録者の移動停止情報を認識し、同時に、入口に設置された 電子タグ等の情報読取装置は商品に貼付された電子タグ等の情報を取得し、当該 商品に関して登録者に貸出しを終了した時間情報を取得し、登録者のレンタル料金 計算を行う。 In the case of rental of goods, when the registrant starts moving from the corresponding space while holding the product, the terminal 160 installed at the exit recognizes the movement start information of the registrant and at the same time installed at the exit. The information reading device such as the electronic tag acquires the information such as the electronic tag attached to the product, and acquires the time information about the start of lending to the registrant regarding the product. After that, when the registrant moves to the corresponding space while holding the product, the terminal 160 installed at the entrance recognizes the registrant's movement stop information and simultaneously reads information such as the electronic tag installed at the entrance. The device obtains information such as the electronic tag attached to the product, obtains information on the time when the renter has finished renting the product, and calculates the rental fee for the registrant.
(8)存在空間による料金自動計算 (8) Automatic charge calculation based on existence space
店舗内を一つ以上の空間に分割し、空間毎に登録者を認識可能にする。サービス 提供側は、登録者側がサービス (飲食の注文、診察要求、調髪等)を発注する度に、 発注者 (ここでは、登録者)と発注を行った人物のレ、る空間と発注内容を併せて入力 する。その後、登録者が当該空間から移動を開始すると発注内容を基にサービス提 供代金を計算し、振替 ·引落処理を行う。 The store is divided into one or more spaces, and registrants can be recognized for each space. Every time the registrant places an order for a service (food order, medical request, hairdressing, etc.), Enter the space of the person who placed the order with the orderer (here, the registrant) and the order contents. After that, when the registrant starts moving from the space, the service provision fee is calculated based on the order contents, and the transfer / withdrawal process is performed.
[0123] <第 8の実施の形態〉 <Eighth embodiment>
(比較対象情報利用によるユニット内存在者の把握) (Understanding the presence of units in the unit by using the information to be compared)
本発明の第 8の実施の形態において、比較対象情報と存在認識記録表とを利用し て、ユニット内の最新の存在者と存在空間の認識処理を行う。。 In the eighth embodiment of the present invention, recognition processing of the latest presence person and existence space in the unit is performed using the comparison target information and the existence recognition record table. .
[0124] (存在者管理) [0124] (Existence management)
認証サーバ 10Aは、第 1から第 6の実施の形態の処理により、病院に出入した人物 の情報を図 12 (a)の存在認識記録表に登録し、図 12 (b)は、人間が病院玄関を出 入りする際の、個人認証の有無と存在認識記録表に登録する内容を類型化したもの である。 The authentication server 10A registers the information of the person who entered and exited the hospital in the presence recognition record table of FIG. 12 (a) by the processing of the first to sixth embodiments, and FIG. This is a categorization of the presence / absence of personal authentication and the contents registered in the presence recognition record table when entering and exiting the entrance.
(1)パターン 1 (1) Pattern 1
入場と退場の双方に、比較対象情報に基づき人物特定した場合であり、存在認識 記録表には、存在者氏名と、入場と退場の記録として時間情報や確認端末情報等が 登録される。 This is a case where a person is specified based on the information to be compared for both entry and exit. In the presence recognition record table, the name of the presence person and time information, confirmation terminal information, etc. are registered as records of entry and exit.
管理者側は、退場記録が未登録の人物を集計すると、ユニット内の存在者を容易 に認識することが可能となる。 The administrator can easily recognize the presence of persons in the unit by counting the number of unregistered persons.
(2)パターン 2 (2) Pattern 2
入場と退場の双方に、人物特定が不可能である場合、存在認識記録表には、匿名 人物を示す「Z」と「システムが任意に割当てた番号」を併せた匿名人物識別 IDが自 動的に登録され、入場と退場とを別記録として時間情報や確認端末情報等を登録す る。なお、顔情報読取装置が人物追跡機能を有し、入場した匿名人物が退場するま で確実に一貫して確認できる場合、同一の匿名人物識別 IDに登録する。 If it is impossible to specify a person for both entry and exit, the presence recognition record table will automatically include an anonymous person identification ID that combines “Z” indicating an anonymous person and “the number arbitrarily assigned by the system”. Time information, confirmation terminal information, etc. are registered with separate entry and exit records. If the face information reader has a person tracking function and it can be confirmed consistently until the anonymous person who has entered leaves, it will be registered with the same anonymous person identification ID.
管理者側は、ユニット内の存在者を特定することは不可能だが、匿名人物の入場 者数力 退場者数を差し引くことで存在人数だけは認識する。 It is impossible for the administrator to identify the presence in the unit, but only the number of people who exist by subtracting the number of people who have left the anonymous person.
(3)パターン 3— 1、パターン 3— 2 (3) Pattern 3-1, Pattern 3-2
入場又は退場の一方だけ比較対象情報に基づき登録者を特定するが、他方の際 には人物の特定ができない場合であり、存在認識記録表には、パターン 1、パターン 2に準じた登録を行う。 Only one of the entrance and exit will specify the registrant based on the information to be compared. In the case where no person can be specified, registration according to Pattern 1 and Pattern 2 is performed in the presence recognition record table.
管理者側は、ユニット内の存在者を特定することは困難となるが、存在者氏名のあ る入場者人数と匿名人物識別 IDの入場者人数の合計から、存在者氏名のある退場 者人数と匿名人物識別 IDの退場者人数の合計を差し引くことで存在人数だけは認 識する。 Although it is difficult for the administrator to identify the presence person in the unit, the total number of visitors with the name of the person and the number of visitors with the name of the person from the sum of the number of visitors with the anonymous ID ID By subtracting the total number of people leaving the anonymous ID ID, only the number of people present is recognized.
図 12 (c)は、パターン 3の内容を図 9 (a)で示した病院を基に具体的な登録処理の 事例としたものである。 Figure 12 (c) shows an example of specific registration processing based on the hospital shown in Figure 9 (a) for the contents of Pattern 3.
動作 1では、建物入口で比較対象情報に基づき人物を特定し、存在者氏名に「太 郎」、入場した時間情報、入場確認端末を末端側端末 160Aとする情報等を登録す 動作 2では、「太郎」が診察室に匿名のまま入場すると、匿名人物識別 ID「Z01」を 自動作成し、入場した時間情報、入場確認端末を末端側端末 160Dとする情報等と 共に存在認識記録表に登録する。この際、動作 3として、診察室と連続した病院ュニ ットから退場したことを表すため、匿名人物識別 ID「Z02」を作成し、動作 2の時間情 報を退場時間、末端側端末 160Dを退場確認端末として存在認識記録表に登録す 動作 4では、診察室から退場する際に比較対象情報に基づき人物を特定すると、 存在者氏名に「太郎」、退場した時間情報、退場確認端末を末端側端末 160Dとす る情報等を存在認識記録表に登録する。この際、動作 5として、診察室と連続する病 院ユニットは入場したことを表すため、存在者氏名に「太郎」、動作 4の時間情報を入 場時間、末端側端末 160Dを入場確認端末として存在認識記録表に登録する。 動作 6として、匿名のまま病院から退場すると、匿名人物識別 ID「Z03」を自動作成 し、退場した時間情報や退場確認端末を末端側端末 160Bとする情報等と共に存在 認識記録表に登録する。 In action 1, the person is identified based on the comparison target information at the entrance of the building, and the information such as “Taro” as the name of the presence person, the time information of the entrance, and the terminal terminal 160A as the entrance confirmation terminal are registered. When `` Taro '' enters the examination room anonymously, an anonymous person identification ID `` Z01 '' is automatically created and registered in the presence recognition record table together with information such as the time information of the entry and the terminal confirmation terminal 160D as the entry confirmation terminal To do. At this time, as operation 3, an anonymous person identification ID “Z02” is created to indicate that the patient has left the hospital unit that is connected to the examination room, and the time information of operation 2 is the exit time, and the terminal 160D In action 4, when a person is identified based on the comparison target information when leaving the examination room, “Taro”, the time information for leaving, Information such as the terminal 160D is registered in the existence recognition record table. At this time, as operation 5, the hospital unit connected to the examination room indicates that it has entered, so the existence name is “Taro”, the time information of operation 4 is the entry time, and the terminal 160D is the entrance confirmation terminal. Register in the presence recognition record table. As operation 6, when leaving the hospital with anonymity, an anonymous person identification ID “Z03” is automatically created and registered in the presence recognition record table together with the time information of leaving and information on the terminal terminal 160B as the terminal confirming exit.
ユニット内で移動する場合にも、その出入記録を存在認識記録表に登録することで 、各ユニット、及び、ユニット全体において存在人数を適確に把握できる。 Even when moving within a unit, the number of people in each unit and the whole unit can be accurately grasped by registering the entry / exit record in the presence recognition record table.
なお、 A空間と B空間が連続するユニットである時に、 A空間から B空間に移動した ことを、 B空間の端末が入場処理により認識した場合は、「ユニット移動情報 1」とし、 A空間の端末が退場処理により認識した場合は、「ユニット移動情報 2」とする。 When space A and space B are continuous units, they moved from space A to space B. If the terminal in space B recognizes it by the entry process, it will be “unit movement information 1”, and if the terminal in space A recognizes it by the exit process, it will be “unit movement information 2”.
[0126] (存在通知情報による退場認識) [0126] (Exit recognition based on presence notification information)
交換サーバ 20は、比較対象情報により存在通知情報を作成して認証サーバ 10A に送信する。認証サーバ 10Aは、受信情報が管理するユニット内から送信された比 較対象情報に基づくか検証し、自機が管理するユニット以外から送信された情報に 基づくと判断した場合、登録者が存在認識記録表に登録されているか検証する。 この際、第 1処理は、存在認識記録表に登録者の登録有無を判定し、登録がある 場合、その登録データを抽出する。第 2処理は、該当データに退場記録の有無を判 定し、退場記録のないデータ部分を特定する。なお、同一の存在者氏名欄に入場と 退場情報が登録されている場合には、既に退場したことを認識しているので、特定対 象から外す。第 3処理は、特定したデータの入場時間情報と自機の空間情報が、受 信した存在通知情報と整合するか検証し、整合する場合、存在通知情報中の時間 情報を退場時間情報、交換サーバ 20を退場確認端末として登録する。この登録によ り、認証サーバ 10Aは、自機が管理するユニット内から登録者が退場したことを認識 し、ユニット内に利用制御情報を送信する。 The exchange server 20 creates presence notification information based on the comparison target information and transmits it to the authentication server 10A. The authentication server 10A verifies whether the received information is based on the comparison target information transmitted from within the unit managed by the received information, and if the authentication server 10A determines that it is based on information transmitted from other than the unit managed by its own device, Verify whether it is registered in the record table. At this time, the first process determines whether or not the registrant is registered in the presence recognition record table, and if there is a registration, extracts the registration data. The second process determines whether or not there is an exit record for the corresponding data, and identifies the data portion that does not have an exit record. If entry and exit information is registered in the same name column, it is recognized that the user has already exited, so it is removed from the specified subject. The third process verifies whether the entry time information of the specified data and the own space information match the received presence notification information, and if they match, the time information in the presence notification information is replaced with the departure time information. Register server 20 as an exit confirmation terminal. By this registration, the authentication server 10A recognizes that the registrant has left the unit managed by its own device, and transmits usage control information within the unit.
[0127] (変型例 1 メインユニットとの連携により退場認識) [0127] (Variation 1 Recognition of exit by cooperation with main unit)
常時、存在通知情報を受信しない端末の場合、交換サーバ 20や登録者のメインュ ニットを管理するサブサーバ群等に対して、最新の比較対象情報の請求処理を行い In the case of a terminal that does not always receive presence notification information, the latest comparison target information is billed to the exchange server 20 and the sub-server group that manages the registrant's main unit.
、登録者の移動の有無や存在の継続を検証する。 Verify whether registrants are moving or continue
[0128] 図 15は、本発明の第 8の実施形態の変型例 1において、存在認識記録表を管理す る端末が、最新の比較対象情報を他端末に請求し、その回答情報により自機管理ュ ニット内での該当者の存在有無の認識処理を行う動作例を示すシーケンスチャート である。 [0128] FIG. 15 shows a modification example 1 of the eighth embodiment of the present invention in which a terminal that manages the presence recognition record table requests the latest comparison target information from another terminal and uses its response information to determine its own device. It is a sequence chart showing an operation example of performing recognition processing of the presence / absence of a corresponding person in a management unit.
[0129] 認証サーバ 10は、存在認識記録表から退場確認を行!/、た!/、特定個人や存在者氏 名の登録があるが退場記録のない人物と、その該当者の登録データとを抽出し (ステ ップ S451)、抽出対象者に関係するメインユニット等の管理端末情報を特定する (ス テツプ S452)。その後、認証サーバ 10は、ステップ S452の端末に対し、個人識別 I Dと、登録中の入場時間情報と、自機の端末識別 IDと、メインユニット等の管理端末 に入場時間情報以降に作成された最新の比較対象情報の存在有無の回答を求め る情報と、依頼番号を併せて (以下では、退場調査情報とする)送信する (ステップ S 453)。 [0129] The authentication server 10 confirms the exit from the presence recognition record table! /,!, A person with a specific person or person's name registered but no exit record, and registration data of the person concerned. Is extracted (step S451), and the management terminal information such as the main unit related to the extraction target is specified (step S452). After that, the authentication server 10 authenticates the personal identification I to the terminal in step S452. D, registration time information being registered, terminal identification ID of the device, information for requesting the presence or absence of the latest comparison target information created after the entrance time information on the management terminal such as the main unit, The request number is also transmitted (hereinafter referred to as exit investigation information) (step S453).
メインユニット等の管理端末は、受信した退場調査情報に含まれる時間情報を基に 、 自 The management terminal such as the main unit itself is based on the time information included in the received exit investigation information.
機内に該当する情報が存在するか検証し (ステップ S454)、存在した場合、該当情 報に含まれる時間情報と空間情報と依頼番号を併せた回答情報 (以下では、退場回 答情報とする)を認証サーバ 10に送信する(ステップ S455)。 It is verified whether the relevant information exists in the aircraft (step S454), and if it exists, response information including the time information, spatial information, and request number included in the relevant information (hereinafter referred to as exit response information). Is transmitted to the authentication server 10 (step S455).
認証サーバ 10は、受信した退場回答情報と、存在認識記録表の入場記録が整合 するか検証し (ステップ S456)、整合する場合、該当者は退場したことを認識した上 で、退場回答情報に含まれる時間情報を退場時間、回答端末を退場確認端末として 登録し (ステップ S457)、管理ユニット内の各端末に利用制御情報を送信する (ステ ップ S458)。 The authentication server 10 verifies whether the received exit response information matches the entrance record of the presence recognition record table (step S456) .If they match, the authentication server 10 recognizes that the person has exited, and uses it as the exit response information. The included time information is registered as an exit time, the answering terminal is registered as an exit confirmation terminal (step S457), and usage control information is transmitted to each terminal in the management unit (step S458).
なお、不整合であると判定した場合、異常状態であると認識し (ステップ S459)、回 答端末や交換サーバ 20に対して通知異常情報を送信する(ステップ S460)。その後 の処理は、第 6の実施の形態のステップ S364〜S365と同様である。 If it is determined that there is a mismatch, it is recognized as an abnormal state (step S459), and notification abnormality information is transmitted to the response terminal and the exchange server 20 (step S460). The subsequent processing is the same as steps S364 to S365 of the sixth embodiment.
(変型例 2 存在管理処理と実質存在時間の計算) (Variation 2 Existence management processing and calculation of real existence time)
存在認識記録表には、入場と退場の記録が情報として登録されるので、以下の(1) 〜 (4)の管理情報を作成可能となる。 Since the entry and exit records are registered as information in the presence recognition record table, the following management information (1) to (4) can be created.
(1)出席、欠席の有無 (1) Attendance and absence
出席を要求されたユニットへの入場記録情報により判定する。 Judgment is based on the admission record information for the unit requested to attend.
(2)入場又は到着、退場又は出発の認識の有無 (2) Presence of entry or arrival, departure or departure
(3)ユニット内での実質存在時間 (3) Real existence time in the unit
退場時間情報力 入場時間情報を差し引いた時間情報の計算と提供。 Exit time information ability Calculate and provide time information minus entry time information.
(4) (1)から(3)を組み合わせた場合 (4) When combining (1) to (3)
例えば、勤怠管理、授業や研修の出席管理の場合、(1)により出席した空間と、 (3 )で計算した存在時間とを組み合わせ、出席要件となる空間と時間を充足して存在し た力、を判定する。さらに、就業空間以外 (休憩室、喫煙室等)に存在した時間を算出 し、勤務先建物内に存在した時間から差し引くことで、実質の労働時間の充足も検証 可能となる。 For example, in attendance management and attendance management for classes and training, the space attended by (1) and the presence time calculated in (3) are combined to satisfy the space and time required for attendance. Judge the force. In addition, by calculating the time that exists outside the working space (rest room, smoking room, etc.) and subtracting it from the time that was present in the office building, it is possible to verify the satisfaction of real working hours.
[0131] (変型例 3 ユニット残留者の捜索支援) [0131] (Variation 3 Search support for unit residuals)
作業実施者は、存在認識記録表の最新の残留者情報と、該当者の最終確認端末 情報とを抽出する。続いて、抽出した残留者の中で存在者氏名のある人物には、第 7 の実施の形態の変型例 1を実行し最新の存在確認を行!/、、退場回答情報を取得し た場合には、退場記録として登録する。この結果、最新の残留者情報が更新され、 作業実施者は最終確認端末が示すユニットから捜索を開始し、その後は、該当ュニ ットと連続するユニットに順じ移動して捜索作業を行う。 The person who performed the work extracts the latest residual information of the existence recognition record table and the terminal terminal information of the corresponding person. Subsequently, for the person who has the name of the survivor among the extracted survivors, when the modified existence example 1 of the seventh embodiment is executed and the latest existence is confirmed! /, The exit response information is acquired Register as an exit record. As a result, the latest residual information is updated, and the operator starts the search from the unit indicated by the final confirmation terminal, and then moves to the unit that is continuous with the unit and searches. .
[0132] 出入管理システムの中に、電子タグ等や携帯電話機により出席状況を管理するも のがあるが、登録者が第三者に該当機器を貸与した場合、代返や不正出席登録が 可能であった。 [0132] Some entry / exit management systems manage attendance status using electronic tags and mobile phones, but if a registrant rents the equipment to a third party, it can be reimbursed or registered for unauthorized attendance. Met.
また、従来の出入管理システムは、出入口に設置した各種センサーや読取機機等 が感知又は認識した記録に基づき、出入管理と残留者の推定を行っていたため、シ ステムが人物の退場を認識しない場合、該当人物が建物内等に存在すると判断して いた。 In addition, the conventional entrance / exit management system performs entrance / exit management and residual estimation based on records detected or recognized by various sensors and readers installed at the entrance / exit, so the system does not recognize the exit of a person. In this case, it was judged that the person was in the building.
本認証システムは、登録者が同一時間に該当ユニットと別空間とで二重に認識され た場合、認証に不整合が生じ、通知異常情報を送信するので、なりすましを防止する 。また、個人実在の連続性に基づき残留状況を判定するので、登録者が別空間で認 識された場合、退場認識が連動して処理されるので、実際の登録者の退場を認識で きない場合でも、別端末により補完され、精密な出入管理を実現する。 This authentication system prevents impersonation because if the registrant is recognized twice in the same unit and another space at the same time, authentication will be inconsistent and notification abnormal information will be sent. In addition, since the residual situation is determined based on the continuity of individual existence, if the registrant is recognized in another space, the exit recognition is processed in conjunction with it, so the actual registrant exit cannot be recognized. Even in the case, it is complemented by another terminal to realize precise access control.
[0133] <第 9の実施の形態〉 <Ninth Embodiment>
(着席'空席の認識) (Recognition of seated 'vacant seats')
図 16は、本発明の第 9の実施の形態において、比較対象情報と存在認識記録表と を利用して、座席が着席又は空席かを認識し、その認識結果を通知する動作例を示 すシーケンスチャートである。 FIG. 16 shows an operation example of recognizing whether a seat is seated or vacant using the comparison target information and the presence recognition record table and notifying the recognition result in the ninth embodiment of the present invention. It is a sequence chart.
[0134] 図 17 (a)は、飲食店の客席を一つのユニットとみなしたイメージを示し、テーブルと 末端側端末 160を備えた椅子 3席とモニターカメラにより構成される空間であり、図 1 7 (b)は、図 17 (a)の設置状況を端末構成に置き換えたものである。 [0134] Fig. 17 (a) shows an image in which the restaurant seats are regarded as one unit, and the table and This space is composed of three chairs with terminal 160 and a monitor camera. Fig. 17 (b) replaces the installation situation of Fig. 17 (a) with a terminal configuration.
また、図 17 (c)は、建物側端末 110が図 17 (a)の客席ユニットを管理するための存 在認識記録表であり、椅子を単位とするユニットと、客席を単位とするユニットの双方 を同時に管理する表である。この存在認識記録表では、椅子は固定データとし、その 椅子に対し人物の入退場記録を登録する。 Fig. 17 (c) is a presence recognition record table for the building-side terminal 110 to manage the passenger seat unit of Fig. 17 (a). The table shows the unit of chair and the unit of passenger seat. It is a table that manages both at the same time. In this presence recognition record table, a chair is fixed data, and a person's entry / exit record is registered for the chair.
また、管理者側は、座席や座席の周辺空間で利用可能な個人認証技術を利用可 能設備表として公開し、登録者が比較対象情報を作成するために必要な事前情報 を提供する。 In addition, the administrator side publishes the personal authentication technology that can be used in the seats and the space around the seats as an available equipment table, and provides the registrants with advance information necessary for creating comparison information.
図 18 (a)は、この利用可能設備表の内容の一例を示す図であり、座席及び座席周 辺の空間にある認証に利用可能な機器、設置場所、設置機器により対応可能な個 人情報の種類、認証情報として互換可能な個人情報の種類等の情報を開示する。 また、管理者側は、座席の予約を受け付ける予約フォームを提供する。 Fig. 18 (a) is a diagram showing an example of the contents of this available equipment table, and the personal information that can be handled by the equipment, installation location, and installation equipment that can be used for authentication in the seat and the space around the seat. Type, personal information type compatible as authentication information, etc. are disclosed. In addition, the manager side provides a reservation form for accepting a seat reservation.
図 18 (b)は、この予約フォームの内容の一例を示す図であり、登録者が席の予約 を希望する日時、座席の内容 (便名、列車番号、建物名、店舗名、部屋番号等を含 む)、利用予定時間、利用予定区間、登録者の個人識別 ID、登録者のメインユニット 管理端末 ID、登録時点で予定して!/、る移動開始空間を示す端末識別 ID等の情報 を登録する。 Figure 18 (b) shows an example of the contents of this reservation form. The date and time the registrant wants to reserve a seat, the seat contents (e.g. flight number, train number, building name, store name, room number, etc.) ), Scheduled usage time, scheduled usage period, registrant's personal identification ID, registrant's main unit management terminal ID, scheduled at the time of registration! /, Terminal identification ID indicating the movement start space, etc. Register.
登録者のメインユニット管理端末 IDを事前に登録することで、座席での個人認証手 段として第 6の実施の形態を、移動開始空間の情報を登録することで、第 1の実施の 形態の移動予告情報の利用を可能にする。 By registering the registrant's main unit management terminal ID in advance, the sixth embodiment can be used as a personal authentication method at the seat, and the information on the movement start space can be registered. Enables the use of travel notice information.
太郎と三郎の 2名が着席する際、椅子に設置された末端側端末 160A、 160Cが個 人情報を読み取り、建物側端末 110が認証処理を行う。 When two people, Taro and Saburo, are seated, the terminal terminals 160A and 160C installed in the chair read the personal information, and the building terminal 110 performs the authentication process.
この際、原則として、建物側端末 110は、個人情報が読み取られた人物がその椅 子に着席したと認識して入場記録を登録し、図 17 (c)では、「椅子 1」に「太郎」が着 席したことを示す。なお、管理者側がより厳密に着席人物を確認したい場合は、末端 側端末 160Dに対し、検証依頼情報を送信し、映像存在情報を作成する。 At this time, in principle, the building-side terminal 110 recognizes that the person whose personal information has been read has been seated in the chair, and registers the admission record. In FIG. "Indicates that you are seated. If the administrator wants to confirm the seated person more strictly, it sends verification request information to the terminal 160D and creates video presence information.
建物側端末 110は、存在認識記録表に 2名の入場記録と、椅子 1、椅子 3の存在欄 に、ユニット内に人物が存在することを示す情報 (例えば、「1」)とを登録すると(ステ ップ S 501)、椅子ユニットと客席ユニット内に人物が存在し着席していることを認識し (ステップ S502)、飲食店全体を管理する組織側端末 120に対して、客席ユニットは 利用中であることを示す情報(以下では、着席情報)を送信する(ステップ S503)。こ の結果、組織側端末 120は、客席ユニットは利用中であると認識し (ステップ S504)、 受付や厨房にその旨を送信することもある。 The terminal 110 on the building side has two admission records in the presence recognition record table and the presence columns for chair 1 and chair 3. If the information indicating that a person exists in the unit (for example, “1”) is registered (step S 501), it is recognized that a person exists and is seated in the chair unit and the audience unit. (Step S502), information indicating that the passenger seat unit is in use (hereinafter, seating information) is transmitted to the organization side terminal 120 that manages the entire restaurant (Step S503). As a result, the organization-side terminal 120 recognizes that the passenger seat unit is in use (step S504), and may transmit that fact to the reception desk or kitchen.
その後、三郎が帰ると、末端側端末 160Dは映像中に三郎が存在していないことを 感知し (ステップ S505)、建物側端末 110に、三郎の不在認識を示す情報を送信す ると (ステップ S506)、建物側端末 110は、三郎が客席ユニットから移動したことを認 識し (ステップ S507)、存在認識記録表に、三郎の退場記録と、椅子 3の存在欄にュ ニット内に人物が存在しないことを示す情報 (例えば、「0」)とを登録し (ステップ S50 8)、客席ユニットに空席が一部あることを認識する (ステップ S509)。その後、組織側 端末 120に対して、客席ユニットは一部空席中であることを示す情報(以下では、空 席情報)を送信する(ステップ S510)。この結果、組織側端末 120は、客席ユニットは 一部に空席があると認識する(ステップ S511)。 After that, when Saburo returns, the terminal 160D detects that Saburo is not present in the video (Step S505), and transmits information indicating the absence of Saburo to the building terminal 110 (Step S505). S506), the building-side terminal 110 recognizes that Saburo has moved from the auditorium unit (step S507), and in the presence recognition record table, Saburo's exit record, and in the presence column of chair 3, there is a person in the unit. Information indicating that it does not exist (for example, “0”) is registered (step S508), and it is recognized that there are some empty seats in the passenger seat unit (step S509). Thereafter, information indicating that the passenger seat unit is partially vacant (hereinafter, vacant seat information) is transmitted to the organization side terminal 120 (step S510). As a result, the organization side terminal 120 recognizes that the passenger seat unit has some empty seats (step S511).
なお、建物側端末 110は、着席又は空席情報を組織側端末 120に送信していたが 、管理者側の判断により、空席状況通知サービスを行う機関や顧客向けに直接又は 交換サーバ 20を介して配信してもよい。また、不在認識の処理は、例えば、店舗出 口に設置された末端側端末 160に個人情報が読取されることや、交換サーバ 20を 通じて他のユニットからの存在通知情報を受信すること等によることもある。 The building-side terminal 110 has sent the seating or vacancy information to the organization-side terminal 120, but at the discretion of the administrator, the building-side terminal 110 is directly or via the exchange server 20 for institutions and customers that provide vacancy status notification services. You may distribute. In addition, the absence recognition process may be performed by, for example, reading personal information to the terminal 160 at the store outlet or receiving presence notification information from another unit through the exchange server 20. It may be due.
(存在認識記録表への空席定義の登録) (Registering the vacancy definition to the presence recognition record table)
電車の座席のように、一つの空席でも有効な情報となる場合と、レストランのテープ ル席のように、テーブルと複数の椅子が一つの集合体として密接な関係がある場合 には、一部に空席が存在しても空席情報とはならない。このため、ユニット毎に、ュニ ットに空席があるとシステムが判定するための定義情報を存在認識記録表に登録す 図 17 (d)では、「椅子 1〜3の全てが空席である場合に、ユニットは空席」とシステム が判断する定義情報を登録していることを示すので、ステップ S502の処理以降は、 椅子 1の存在欄に「1」が登録されているので、着席中の認識が継続可能となる。 なお、椅子に設置された重量又は温感センサーが人間の存在を一定時間検出し ない場合、空席又は予約席である情報を格納した電子タグ等がユニット内に置かれ 認識された場合等、個人認証を利用せずに空席状況を認識する技術を用いた定義 を設定してもよい。 If there is information that is valid even with a single vacant seat, such as a train seat, or if there is a close relationship between a table and multiple chairs as a set, such as a table in a restaurant Even if there are vacant seats, it will not be vacant seat information. Therefore, for each unit, the definition information for the system to determine that there is a vacant seat in the unit is registered in the presence recognition record table. In Fig. 17 (d), "all chairs 1-3 are vacant. , The unit is vacant, ”which indicates that the system has registered the definition information judged by the system. Since “1” is registered in the presence column of chair 1, recognition while seated can be continued. In addition, if the weight or temperature sensor installed in the chair does not detect the presence of a person for a certain period of time, or if an electronic tag or the like that stores information on vacant or reserved seats is placed and recognized in the unit, etc. A definition using technology that recognizes vacant seats without using authentication may be set.
[0137] (変型例 1 指定席) [0137] (Variation 1 reserved seat)
第 9の実施の形態では、建物側端末 110は、着席した人物の存在だけを認識して いた。しかし、座席には指定席又は予約席(以下では、指定席とする)が存在し、指 定席は特定人物(席を予約した又は指定された人物等)だけに着席が認められる。こ のため、事前に着席許可者情報を存在認識記録表に登録し、着席した人物が正当 な利用者であることを認識することが必要となる。 In the ninth embodiment, the building-side terminal 110 recognizes only the presence of a seated person. However, there are reserved seats or reserved seats (hereinafter referred to as designated seats), and only designated persons (such as the person who reserved or designated the seat) can be seated. For this reason, it is necessary to register the authorized person information in the presence recognition record table in advance and recognize that the seated person is a legitimate user.
図 19は、本発明の第 9の実施の形態の変型例 1において、比較対象情報と存在認 識記録表とを利用して、指定席に正当な利用者だけが着席することを許可する処理 を行う動作例を示すシーケンスチャートである。 FIG. 19 is a process for permitting only a legitimate user to be seated in a designated seat using the comparison target information and the existence recognition record table in the first modification of the ninth embodiment of the present invention. It is a sequence chart which shows the operation example which performs.
指定席とは、例えば、飲食店、鉄道、航空機、講演会、コンサート等の座席と、宿泊 の部屋、時間貸しレンタルスペース等の一定空間の双方を指し、指定又は予約とい つた呼称が使われる全ての事象を含む。 For example, reserved seats refer to both seats for restaurants, railways, aircraft, lectures, concerts, etc., and fixed spaces such as accommodation rooms and time rental rental spaces. Including events.
[0138] 登録者は、自宅にある末端側端末 160Bにより、飲食店側の組織側端末 120内に ある予約フォームに、指定席予約情報を送信し (ステップ S531)、組織側端末 120は 、予約情報を受信すると予約可能の可否を検討し (ステップ S532)、対応可能な場 合、 自機内にある存在認識記録表に予約者や予約日時等の予約内容を登録し (ス テツプ S533)、対応不可能な場合、その旨を末端側端末 160Bに送信する(ステップ S534)。 [0138] The registrant sends the reserved seat reservation information to the reservation form in the restaurant-side terminal 120 using the terminal 160B at home (step S531). When the information is received, the possibility of making a reservation is examined (step S532), and if it is available, the reservation details such as the reservation person and the reservation date and time are registered in the presence recognition record table in the aircraft (step S533). If this is not possible, a message to that effect is transmitted to the terminal 160B (step S534).
図 18 (c)は、予約内容を登録した場合の存在認識記録表の内容の一例を示す図 であり、ユニット (ユニット内部の座席や空間を含む)に予約情報が存在することを示 す情報や、予約日時や、予約席の内容(便名、列車番号、部屋番号等を含む)、予 定利用時間、予定利用区間、登録者の個人識別 ID、登録者のメインユニット管理端 末 ID、予定している移動開始空間を示す端末識別 ID等の情報を登録する。 予約日になると、組織側端末 120は、登録者の移動と共に交換サーバ 20等から比 較対象情報を受信し、個人の実在認証の連続性を判定する (ステップ S535)。 Figure 18 (c) is a diagram showing an example of the contents of the presence recognition record table when reservation details are registered. Information indicating that reservation information exists in a unit (including seats and spaces inside the unit). Reservation date and time, reserved seat contents (including flight number, train number, room number, etc.), scheduled use time, scheduled use section, registrant's personal identification ID, registrant main unit management terminal ID, Register information such as the terminal ID that indicates the planned movement start space. When the reservation date is reached, the organization side terminal 120 receives the comparison target information from the exchange server 20 and the like along with the movement of the registrant, and determines the continuity of the individual real authentication (step S535).
登録者は、店舗に到着し予約した席に座る際に、座席に設置された末端側端末 16 OAにより個人情報を読取り(ステップ S536)、建物側端末 110を介して組織側端末 1 20に送信すると(ステップ S537)、組織側端末 120は、存在認識記録表に、現時点 から一定時間まで (現空間から一定空間までを含む)、末端側端末 160Aに座席利 用を特定人物に限定した予約情報が登録されているか検証する (ステップ S538)。 予約情報がない場合、誰でも自由に利用可能であるので、その旨を示す情報を末端 側端末 160Aに送信する(ステップ S539)。 When the registrant arrives at the store and sits in the reserved seat, the registrant reads the personal information from the terminal 16 OA installed in the seat (step S536) and sends it to the organization terminal 120 via the building terminal 110 Then (step S537), the organization-side terminal 120 stores reservation information in the presence-recognition record table in which seat usage is limited to a specific person for the terminal 160A from the current time until a certain time (including the current space to a certain space). Verify whether is registered (step S538). If there is no reservation information, anyone can use it freely, so information indicating that is transmitted to the terminal 160A (step S539).
一方、予約情報がある場合、組織側端末 120は、受信した個人情報等と、自機内 に格納して!/、る比較対象情報に基づき、登録者の個人認証を行レ、 (ステップ S 540) 、登録者の認証が不成立の場合、建物側端末 110に再度の個人情報の読取処理や 、店員による状況確認作業や、末端側端末 160Aの利用を不可能にする処理等を行 うための指示情報である利用注意情報を送信し (ステップ S541)、建物側端末 110 は、指示された内 On the other hand, if there is reservation information, the organization side terminal 120 performs personal authentication of the registrant based on the received personal information etc. and the comparison target information stored in its own device! ) If the registrant authentication is not established, the building side terminal 110 is read again for personal information, the situation check by the store clerk, or the processing to make the terminal side terminal 160A unusable. Use caution information that is instruction information is transmitted (step S541), and the building-side terminal 110
容を表示し (ステップ S542)、指示内容を処理する(ステップ S543)。 The contents are displayed (step S542), and the instruction content is processed (step S543).
一方、登録者の認証が成立した場合、自機内にある存在認識記録表を参照し、認 証された人物が、予約情報と整合するかを検証し (ステップ S544)、予約情報と不整 合の場合、ステップ S541同様に利用注意情報を建物側端末 110に送信し (ステップ S545)、指示情報により本人確認や予約確認等の処理を行う(ステップ S546、 S54 7)。 On the other hand, if the registrant authentication is established, the presence recognition record table in the aircraft is referred to verify whether the authenticated person is consistent with the reservation information (step S544), and the registration information is inconsistent. In this case, as in step S541, usage attention information is transmitted to the building-side terminal 110 (step S545), and processing such as identity confirmation and reservation confirmation is performed based on the instruction information (steps S546 and S547).
予約情報と整合した場合、組織側端末 120は、末端側端末 160Aユニットを利用可 能とすることを示す情報を建物側端末 110へ送信する (ステップ S548)。 When it matches with the reservation information, the organization side terminal 120 transmits information indicating that the end side terminal 160A unit can be used to the building side terminal 110 (step S548).
従来の指定席システムは、事前に発行された指定券や、指定席情報を格納した電 子タグ等や携帯電話機等を所持していることにより、正当な利用者であると判断して いた。そのため、利用者が手元に証明物を確保する必要と、二重発券によるトラブル と、指定券や携帯電話機等の紛失や盗難時には再発行処理が必要であった。 The conventional reserved seat system has been judged to be a legitimate user by having a reserved ticket issued in advance, an electronic tag storing reserved seat information, a mobile phone, and the like. For this reason, it was necessary for the user to secure the proof at hand, troubles due to double ticketing, and reissuance processing when the designated ticket or mobile phone was lost or stolen.
本認証システムは、存在認識記録表を利用し、登録者は予約内容を電子情報とし てサービス提供者側に保管するので、手元に証明物を確保する必要がなぐ認証サ 一ビスを実施するだけとなる。 This authentication system uses the presence recognition record table, and the registrant uses the reservation details as electronic information. Since it is stored at the service provider side, it is only necessary to implement an authentication service that does not require a certificate at hand.
[0140] <第 10の実施の形態〉 [0140] <Tenth embodiment>
(認証レベルの決定) (Determining authentication level)
第 1から第 9の実施の形態では、比較対象情報を利用した個人認証により、登録者 の存在空間を認識し、その空間内で各種取引の処理を認めていた。しかし、個人情 報の読取動作力 生じる移動関連情報と、所持品である携帯機器力 生じる推定存 在情報では、個人認証精度が異なるため、登録者が許容する取引内容や範囲を異 なるものに設定することも認める。このため、本実施の形態では、個人認証情報の精 度と、出入管理や各種取引許可とを連動させる処理について説明する。 In the first to ninth embodiments, the presence space of the registrant is recognized by personal authentication using the comparison target information, and various transaction processes are permitted within the space. However, because the accuracy of personal authentication differs between the movement-related information that generates the ability to read personal information and the estimated presence information that is generated by the mobile device that is possessed, the transaction content and scope allowed by the registrant differ. Also allowed to set. For this reason, in the present embodiment, a process for linking the accuracy of personal authentication information with access control and various transaction permissions will be described.
図 20は、本発明の第 10の実施の形態において、個人認証を行う際に利用する比 較対象情報に基づき認証レベルを決定し、その認証レベルにより出入管理を行う処 理の動作例を示すシーケンスチャートである。 FIG. 20 shows an operation example of processing for determining an authentication level based on comparison target information used when performing personal authentication and performing access control according to the authentication level in the tenth embodiment of the present invention. It is a sequence chart.
[0141] 認証サーバ 10Aは、交換サーバ 20等から受信した比較対象情報により登録者の 存在空間を認識している(ステップ S601〜S602)。 [0141] The authentication server 10A recognizes the registrant's existence space based on the comparison target information received from the exchange server 20 or the like (steps S601 to S602).
登録者が病院に到着すると、玄関の末端側端末 160Aは、登録者の個人情報を読 み取り(ステップ S 603)、読取情報や時間情報等を認証サーバ 1 OAへ送信する(ス テツプ S 604)。なお、登録者が匿名を希望する場合、個人情報の読取処理を実施せ ず、末端側端末 160Aは、匿名人物の入場と、時間情報等を送信する(ステップ S60 5)。 When the registrant arrives at the hospital, the terminal 160A at the entrance reads the personal information of the registrant (step S603) and sends the read information and time information to the authentication server 1 OA (step S604). ). If the registrant wishes to be anonymous, the terminal-side terminal 160A does not perform the personal information reading process, and transmits the anonymous person's entrance, time information, and the like (step S605).
認証サーバ 10Aは、ステップ S604により個人情報等を受信した場合、読取情報の 照合や、直前の比較対象情報との連続性の検証等の認証処理を実行する(ステップ S606)。この結果、個人認証が不成立の場合と、ステップ S605で匿名人物の入場 情報を受信した場合、存在認識記録表に匿名人物の入場記録を登録すると共に、 自動的に「レベル 0」を割当てる(ステップ S607)。その上で、ユニット内の各端末に 対し、再度の個人情報読取や、端末操作を禁止するための指示情報である利用注 意情報を送信することもある (ステップ S608)。利用注意情報を受信した各端末 160 は、指示された内容を表示し (ステップ S609)、指示内容の処理を実施する (ステツ プ S610)。 When the authentication server 10A receives personal information or the like in step S604, the authentication server 10A executes authentication processing such as verification of read information and verification of continuity with the immediately previous comparison target information (step S606). As a result, when the personal authentication is not established and when the anonymous person entrance information is received in step S605, the anonymous person entrance record is registered in the presence recognition record table, and “level 0” is automatically assigned (step S605). S607). In addition, usage attention information, which is instruction information for prohibiting personal information reading or terminal operation, may be transmitted to each terminal in the unit (step S608). Each terminal 160 that has received the usage attention information displays the instructed content (step S609) and performs the processing of the instructed content (step S609). S610).
一方、認証サーバ 1 OAは、個人認証が成立した場合、登録者の存在を認識し、存 在認識記録表に存在者氏名等の入場記録を登録し (ステップ S611)、ステップ S60 4で受信した比較対象情報と、ステップ S606の処理で比較検証用に利用した直近 の比較対象情報を基に、自機内にある認証段階表と比較し認証レベルを決定し、存 在認識記録表に登録する (ステップ S612)。 On the other hand, if personal authentication is established, the authentication server 1 OA recognizes the presence of the registrant, registers an entry record such as the name of the resident in the presence recognition record table (step S611), and receives it in step S604. Based on the comparison target information and the latest comparison target information used for comparison verification in the process of step S606, the authentication level is determined by comparing with the authentication stage table in the device, and registered in the presence recognition record table ( Step S612).
[0142] (認証レベルによる出入管理) [0142] (Entry / Exit Management by Authentication Level)
図 21 (a)のように、病院内は空間毎に認証レベルが設定されている。登録者が、診 察室に入室する場合、末端側端末 160Dが個人情報等を読み取ると (ステップ S613 )、ステップ S604〜S611と同様な処理を行った上で、今回決定した認証レベルが、 診察室に設定された認証レベル以上であるか検証する(ステップ SS616)。 As shown in Fig. 21 (a), the authentication level is set for each space in the hospital. When the registrant enters the examination room, when the terminal 160D reads personal information, etc. (step S613), the authentication level determined this time is determined after performing the same processing as steps S604 to S611. It is verified whether the authentication level is higher than the authentication level set for the room (step SS616).
登録者の認証対応レベルが 6以下の場合、設定認証レベル以下なので、入室を許 可しな!/、(ドアを開錠しな!/、)情報や、ユニットに設定認証レベル未満の人物が入場 したことから利用注意情報を、末端側端末 160D、 160Hに送信する(ステップ S617 )。利用注意情報を受信した端末は、指示内容を表示し、処理する(ステップ S618、 S619) 0また、この場合の利用注意情報は、末端側端末 160Hの利用制御情報と、 第 5の実施の形態に準じた末端側端末 160Dの施錠強制情報の意味を含むこともあ 登録者の認証レベルが 7以上の場合、設定条件を充足するため、末端側端末 160 D、 160Hに対し、問題ないことを示すレベル合致情報を送信する(ステップ S620)。 この結果、末端側端末 160Hは、操作可能となり、電子カルテ情報の取得や閲覧等 が可能となる(ステップ S621) If the registrant's authentication support level is 6 or lower, it is lower than the set authentication level, so entry is not permitted! /, (Do not unlock the door! /), And there is no person in the unit below the set authentication level. Since the user has entered, usage attention information is transmitted to the terminal 160D, 160H on the terminal side (step S617). Terminal receiving the usage warning information displays the instruction content, the process (step S618, S619) 0 Further, use care information in this case, the usage control information of the terminal device 160H, the fifth embodiment It may also include the meaning of mandatory locking information for the terminal 160D on the terminal side in conformity with the above. The level matching information shown is transmitted (step S620). As a result, the terminal 160H can be operated, and electronic medical record information can be obtained and viewed (step S621).
[0143] (認証レベルによる取引例 金融取引) [0143] (Example of transaction based on authentication level Financial transaction)
登録者は、ステップ S613の処理時に、希望する金融取引内容(種類、金額等)を 併せて入力し、認証サーバ 10Aに送信する(ステップ S614)。認証サーバ 10Aは、 ステップ S 604〜S611と同様な処理で認証レベルを決定し(ステップ S 616)、その 後、認証レベル対照表を参照して要求された金融取引内容に必要な認証レベルを 判定する(ステップ S616)。さらに、今回の認証レベルが取引に要求された認証レべ ルを充足するか検証し、充足する場合、金融取引処理を実施する (ステップ S620)。 充足しない場合、認証レベル不足を示す情報を回答し、必要な認証レベルの通知や 、再度の認証処理や、取引内容の変更等を促す (ステップ S617)。 At the time of processing in step S613, the registrant inputs the desired financial transaction content (type, amount, etc.) and sends it to the authentication server 10A (step S614). The authentication server 10A determines the authentication level by the same process as steps S604 to S611 (step S616), and then determines the authentication level required for the requested financial transaction content by referring to the authentication level comparison table. (Step S616). In addition, the current authentication level is the level of authentication required for the transaction. The financial transaction processing is executed (step S620). If not satisfied, information indicating that the authentication level is insufficient is returned, and a notification of a necessary authentication level, a re-authentication process, a change in transaction contents, etc. is prompted (step S617).
[0144] 図 22は、認証段階表の内容の一例を示す図であり、最新の認証処理により作成さ れた比較対象情報の種類と、認証処理に利用した直前の比較対象情報の種類とを 組み合わせた認証レベルが 10段階で設定されている。 [0144] FIG. 22 is a diagram showing an example of the contents of the authentication stage table. The type of comparison target information created by the latest authentication process and the type of comparison target information immediately before used in the authentication process are shown. The combined authentication level is set in 10 levels.
認証段階表は、認証システム全体において統一的なレベル設定を行うだけではな く、 1つ以上のモデルパターンを準備し、サービス提供者やユニット管理者や登録者 等が自己に最適なパターンを選択してもよい。また、利用する比較対象情報の種類と 、組み合わせと、認証レベルを自由に設定してもよい。モデルパターンや個別設定の 場合、その設定内容と、登録日時、登録処理端末等を登録する。 The certification stage table not only provides a uniform level setting for the entire certification system, but also prepares one or more model patterns, and the service provider, unit administrator, registrant, etc. select the pattern that best suits them. May be. Further, the type, combination, and authentication level of comparison target information to be used may be freely set. For model patterns and individual settings, register the settings, registration date and time, and registration processing terminal.
なお、図 22では、最新と、その直前の比較対象情報という 2つの情報により認証レ ベルを判定した力 更に連続する過去の比較対象情報を 1つ以上加味した判定を行 つてもよく、判定に利用する情報数が増えるほど、より精密な認証レベルの判定となる In FIG. 22, the judgment level may be determined by taking into account the ability to determine the authentication level based on the two pieces of information, the latest and the immediately preceding comparison target information, and one or more continuous comparison target information. The more information used, the more accurate the authentication level is determined.
[0145] 図 23は、認証レベル取引対照表の内容の一例を示す図であり、認証段階表で判 定された認証レベルと、そのレベルに対応したユニット、処理内容、取引範囲等を示 す情報とが設定されている。 [0145] Fig. 23 is a diagram showing an example of the content of the authentication level transaction comparison table, showing the authentication level determined in the authentication stage table, the unit corresponding to that level, the processing content, the transaction scope, etc. Information is set.
ここでは、ユニットの例として認証レベル毎のユニット名、処理内容の例として、出入 管理条件、入場者情報通知、管理側対応通知、注意情報通知、取引範囲の例とし て金融取引の種類、取引金額の上限等の情報がある。 Here, the unit name for each authentication level is an example of the unit, the entry / exit management conditions, the attendee information notification, the management correspondence notification, the caution information notification, the transaction range example, There is information such as the maximum amount.
入場者情報通知は、人物のユニットへの入場と、入場人物の個人情報とを管理者 側に通知する機能をいう。管理者側対応通知は、ユニット内に人物の存在を認識し た場合、管理者側に、有人対応や顔情報読取装置による映像確認や人物追跡シス テム等の処置を行うことを指示する情報を通知する機能をいう。注意情報通知は、ュ ニット内にユニットに設定認証レベル未満の人物が入場したことを管理者側に通知す る情報である。 Visitor information notification refers to the function of notifying the administrator of the person's entry into the unit and the personal information of the person. The administrator response notice is information that instructs the administrator to perform actions such as manned response, video confirmation using a face information reader, person tracking system, etc. when the presence of a person in the unit is recognized. A function to notify. The notice information notification is information that notifies the administrator that a person below the set authentication level has entered the unit in the unit.
認証レベル取引対照表では、 日常的に利用する少額な電子マネーの場合、登録 者の自発的な動作を要求しない推定移動情報により利用可能とし、利便性を確保す る。一方で、多 In the authentication level transaction comparison table, registration is required for small amounts of electronic money used on a daily basis. It can be used based on estimated movement information that does not require the user's voluntary movements, ensuring convenience. On the other hand, many
額の個人資産に関わる取引の場合、移動関連情報での認証を求め、安全性を確保 する。 In the case of a transaction involving a large amount of personal assets, we require authentication based on movement-related information to ensure safety.
認証レベル取引対照表にお!/、ても、認証段階表と同様に、認証システム全体での 統一的な設定、モデルパターンや自己申告による設定を選択し、登録する。 In the authentication level transaction comparison table, as in the authentication stage table, select and register the uniform settings for the entire authentication system, model patterns, and self-declared settings.
[0146] (変型例 1 不正利用者の認証レベル設定と開示) [0146] (Variation 1 Setting and disclosure of authentication level for unauthorized users)
登録者が不正な認証システムの利活用に関係した場合、その登録者に対して、あ らかじめシステム運用側が制定する認証レベル取引対照表を強制的に設定する。 この場合、システムの安全性を確保するために、一般に規定された内容よりも、各レ ベルにおける取引内容を制限することや、管理者側に取引通知を行うことや、個人認 証用の情報は移動関連情報に限定すること等を義務付ける。この処置の適用内容と 期間は、各国の刑事法とは別に、システム運用側が規定する。また、悪質性が高い 場合は、強制的な認証レベル取引対照表の設定者であることを、取引の相手側や関 係者に通知又は開示する。 If a registrant is involved in the use of an unauthorized authentication system, the registration level transaction comparison table established by the system operator will be forcibly set in advance for that registrant. In this case, in order to ensure the safety of the system, the contents of transactions at each level are restricted from the generally prescribed contents, transaction notifications are given to the administrator side, and information for personal authentication is used. Requires that it be limited to movement-related information. The application and duration of this procedure is stipulated by the system operator separately from the criminal laws of each country. Also, if the maliciousness is high, notify or disclose to the other party of the transaction or the person concerned that the person is the compulsory authentication level transaction comparison table setter.
このことで、登録者に不正利用実行に対する心理的な抑止効果を発生させ、同時 に、取引の相手側にも、相応の注意を喚起させる。 This causes the registrant to have a psychological deterrent effect on the unauthorized use, and at the same time alerts the other party to the transaction.
[0147] (変型例 2 認証レベルによる入場制御と、身分証明証機能) [0147] (Variation 2 Admission control based on authentication level and identification card function)
比較対象情報により判定される認証レベルを利用して事前にユニットへの入場制 御を行う処理と、比較対象情報を身分証明書機能として利用する処理につ!/、て説明 する。 This section describes the process of controlling admission to the unit in advance using the authentication level determined by the comparison target information, and the process of using the comparison target information as an identification card function.
図 21 (b)は、空港の出国ゲートをイメージした図であり、出国希望者は、ホール Aか ら出国ゲートを通り、航空機内に入場する。なお、出国ゲートには、主要なバイオメト リクス情報を読み取る末端側端末 160A、 160B、 160Cが設置されている。 Figure 21 (b) is an image of an airport departure gate. A person who wants to leave enters the aircraft from Hall A through the departure gate. At the departure gate, terminal terminals 160A, 160B, and 160C are installed to read main biometric information.
登録者は、出国ゲートに到着するまでに、比較対象情報を 1つ以上発生させ、交換 サーバ 20から存在通知情報として出入国管理局の組織側端末 120へ送信させ、登 録者の存在空間を認識させる。 The registrant generates one or more pieces of information to be compared before arriving at the departure gate, and sends it to the organization terminal 120 of the immigration office from the exchange server 20 as presence notification information to recognize the existence space of the registrant. Let
登録者は、末端側端末 160A、 160B、 160Cにバイオメトリタス情報を読み取りさせ 、第 9の実施の形態のステップ S603〜S612に準じ、組織側端末 120が、認証レべ ルを決定し、存在認識記録表に登録する。 The registrant causes the end-side terminals 160A, 160B, and 160C to read the biometric information. According to steps S603 to S612 of the ninth embodiment, the organization side terminal 120 determines the authentication level and registers it in the presence recognition record table.
組織側端末 120は、出国ゲート通過後の空間であるホール Bの設定認証レベルが 「8」であることから、決定した認証レベル力 S「8」以上であるか判定し、認証対応レベル が「7」以下の場合、ゲートの開閉を制御する末端側端末 160D、 160Eに対して、ゲ ートを閉鎖することを指示する情報 (以下では、閉鎖情報とする)を送信し、直ちにゲ ートを閉じさせる。その上で、第 9の実施の形態のステップ S617と同様に、利用注意 情報を送信し、再認証処理等を実行させる。このことで、登録者はホール Bに入場で きないか、入場していた場合でもホール Cへは入場不可能となり、出国はできない。 一方、認証対応レベルが「8」以上の場合は、組織側端末 120は、比較対象情報に より、登録者の実在を認識し、個人識別 IDに基づき登録者の履歴情報 DBや基本情 報 DB等に出国を制限する情報の有無や、出入国管理局側の独自の要件に抵触し ないことを検証する。この結果、問題がない場合には、出国ゲートでの比較対象情報 を出国管理情報として登録し、末端側端末 160D、 160Eに対して、ゲートを開放す ることを指示する情報 (以下では、開放情報とする)を送信し、直ちにゲートを開けさ せる。このことで、登録者はパスポートの所持や呈示をせずに、出国手続きを完了し た効果が生じ、搭乗予定の航空機に進むことが可能となる。 The organization-side terminal 120 determines whether the authentication level power S is “8” or higher because the set authentication level of Hall B, which is the space after passing through the departure gate, is “8”. In the case of “7” or less, the terminal terminal 160D, 160E that controls the opening and closing of the gate transmits information (hereinafter referred to as closing information) instructing to close the gate, and immediately receives the gate. To close. After that, as in step S617 of the ninth embodiment, usage attention information is transmitted, and re-authentication processing and the like are executed. As a result, registrants cannot enter Hall B, or if they do enter Hall C, they cannot enter Hall C and cannot leave the country. On the other hand, when the authentication support level is “8” or higher, the organization terminal 120 recognizes the existence of the registrant based on the comparison target information, and based on the personal identification ID, the registrant's history information DB and basic information DB It is verified that there is no information that restricts departure, etc., and that it does not violate the unique requirements of the Immigration Bureau. As a result, if there is no problem, the information to be compared at the departure gate is registered as departure management information, and the terminal side terminals 160D and 160E are instructed to open the gate (hereinafter referred to as “open”). Information) and immediately open the gate. As a result, the registrant has the effect of completing the departure procedure without possessing or presenting a passport, and can proceed to the aircraft on board.
海外渡航の場合、通常は搭乗する航空機を事前予約するので、第 9の実施の形態 における指定席処理と、第 10の実施の形態における認証レベル処理の二段階で人 物の存在確認を実行し、不正者の海外渡航を防止する。また、空港までの経路は事 前予測できるため、移動予告情報を作成することや、誘導電子記録媒体によりメイン ユニット等へアクセスして認証用の比較対象情報を取得すること等、出国ゲートに到 着時点での認証レベルを登録者が自己裁量で決定できる。 In the case of overseas travel, the aircraft to be boarded is usually reserved in advance, so the presence of human beings is checked in two stages: reserved seat processing in the ninth embodiment and authentication level processing in the tenth embodiment. , To prevent unauthorized persons from traveling abroad. In addition, since the route to the airport can be predicted in advance, it is possible to arrive at the departure gate by creating travel advance notice information, accessing the main unit etc. using a guidance electronic recording medium, and acquiring comparison target information for authentication. The registrant can determine the authentication level at the time of arrival at his discretion.
学校や企業等の組織の場合、存在認識記録表に当該組織の管理ユニット内に入 場許可す In the case of an organization such as a school or company, permission to enter the management unit of the organization in the existence recognition record table
る人物の識別情報を登録し、認証レベルと人物識別情報の登録有無の判定を組み 合わせ、関係者限定のユニット入場を管理することができる。この結果、学生証や社 員証等の身分証明書や鍵やカード等を所持せずに、本人確認と出入管理を実施す ること力 S可倉 となる。 It is possible to manage unit entry only for related parties by registering the identification information of the person to be registered and combining the authentication level and the determination of whether or not to register the person identification information. As a result, identity verification and entry / exit management are carried out without possession of identification cards such as student ID cards or employee ID cards, keys or cards. It becomes the power S Kurakura.
[0149] (変型例 3 認証レベル認識による入場ユニットの通知) [0149] (Variation 3 Notification of admission unit by recognition of authentication level)
各端末やユニットに認証レベルを設定することで、出入管理通知条件として登録し た認証レベルユニットへ入場又は退場した場合、登録者や関係者にその旨を通知し てもよい。 By setting an authentication level for each terminal or unit, when entering or leaving an authentication level unit registered as an entry / exit management notification condition, the registrant or related parties may be notified.
この場合、メインユニットを管理する端末内に存在認識記録表を準備し、その中に 通知処理を実行する条件や通知先等を登録するか、存在情報通知表に条件設定し 、交換サーバ 20から常に存在通知情報を受信し、処理実行を判定させる。 In this case, the presence recognition record table is prepared in the terminal that manages the main unit, and the conditions for performing the notification process, the notification destination, etc. are registered in the table, or the conditions are set in the presence information notification table, and the exchange server 20 Always receive the presence notification information, and determine whether to execute the process.
通知処理を実行する条件は、主に以下の(1 )〜(3)がある。 The conditions for executing the notification process mainly include the following (1) to (3).
(1)登録基準レベル未満のユニットに入場した場合 (1) When entering a unit below the registration standard level
(2)登録基準レベル以上のユニットから退場した場合 (2) When leaving a unit that is higher than the registration standard level
(3)認証レベルの不明なユニットへ入場した場合 (3) When entering a unit whose authentication level is unknown
[0150] 例えば、子供を管理対象者とした場合、保護者は、出入管理通知条件を判定する 指標となる登録基準レベルと学校や友人宅や通学路等の空間情報や端末識別 IDを 取得し、認証レベルを設定し、存在認識記録表に登録する。 [0150] For example, when a child is a management target, a guardian obtains a registration reference level as an index for determining an entry / exit management notification condition, spatial information such as a school, a friend's house, a school route, and a terminal identification ID. Set the authentication level and register it in the presence recognition record table.
子供に問題ない空間(学校、塾、通学路、友人宅等)にいる場合、存在認識記録表 内で存在ユニットの認証レベルと登録基準レベルを比較し、保護者には通知がなレヽ If you are in a space where there is no problem for children (school, school, school road, friend's house, etc.), the authentication level of the existing unit is compared with the registration standard level in the presence recognition record table, and the guardian is not notified.
。一方、寄り道や迷子や誘拐等により、子供に問題ない空間から退場した場合、(2) の規定により直ちに保護者に、「退場したこと」が通知される。 . On the other hand, if the child leaves the space where there is no problem for the child due to a detour, lost child, kidnapping, etc., the guardian will be notified immediately of “leaving” according to the provisions of (2).
[0151] <第 11の実施の形態〉 [0151] <Eleventh embodiment>
(認証情報の付帯登録) (Registration of authentication information)
個人認証に利用した比較対象情報の有する、個人識別 IDと空間情報と時間情報 の一部又は全部を、認証サービスにより実行した処理情報、履歴情報、結果情報等 に付帯して自動的に登録するようにしてもよ!/、。 Part or all of the personal identification ID, spatial information, and time information of the comparison target information used for personal authentication is automatically registered along with processing information, history information, result information, etc. executed by the authentication service. You can do it! /
この結果、アリバイ証明、実行人物の特定、無関係人物の虚偽申告の防止、不正 な認証サービスの実行防止を行うことができる。 As a result, it is possible to perform alibi certification, identification of the executing person, prevention of false declarations of unrelated persons, and prevention of unauthorized authentication services.
[0152] (登録の一例 電子カルテ) [0152] (Example of registration electronic medical record)
(1)診察や検査等の実施記録 診察を受けたことを証明するために、診察室に入室する際に末端側端末 160Dで 作成された比較対象情報を利用して診察内容と共に電子カルテに登録する。また、 診察時間を明確にするために、退室する際に末端側端末 160Dで作成された比較 対象情報や、退室後に最初に作成された別空間での比較対象情報を登録することも ある。 (1) Examination and inspection records In order to prove that the patient has undergone a medical examination, the information to be compared is created in the electronic medical record using the comparison information created by the terminal 160D on the terminal side when entering the examination room. In addition, in order to clarify the examination time, the comparison target information created by the terminal 160D at the time of leaving the room or the comparison target information created in another space after leaving the room may be registered.
(2)関係者の記録 (2) Records of related parties
診察や手術に関係した人物(医師、看護師等)を証明するために、関係者が診察 室や手術室に存在することを認識した最新の比較対象情報を、登録者の電子カルテ に登録する。この場合、末端側端末 160Hの操作許可を得るために作成した比較対 象情報や、電子カルテにデータ登録する場合に関係者が認証請求を行って新たに 取得した比較対象情報を利用してもよい。 In order to prove a person (doctor, nurse, etc.) related to a medical examination or operation, register the latest information to be compared to the registrant's electronic medical record, recognizing that the relevant person exists in the examination room or operating room. . In this case, even if the comparison target information created to obtain the operation permission of the terminal 160H on the terminal side or the comparison target information newly obtained by making a request for authentication when registering data in the electronic medical record is used. Good.
また、関係者が特定空間に存在する認識がされている場合、当該空間から退場し た又は他の空間での存在する認識が作成されるまで、特定空間で行われる認証サ 一ビスの処理情報や履歴情報に自動的に関係者の最新の比較対象情報が登録さ れるようにしてあよレヽ。 In addition, if the person concerned is recognized to exist in the specific space, the processing information of the authentication service that is performed in the specific space until the person who leaves the space or the recognition that exists in another space is created. The latest comparison information of related parties is automatically registered in the history information.
(3)所定動作による自動登録 (3) Automatic registration by the prescribed operation
登録者が血圧や体温等を測定して電子カルテに登録する、医師が患者の電子力 ルテを閲覧するように、あらかじめ所定動作として登録された内容を処理した場合、 処理段階の最新の比較対象情報を所定動作のデータ登録や処理に併せて登録す 血圧や体温等の測定値の場合、読み取った測定値を自動的に電子カルテに送信 するサービスがある力 S、このサービス利用時に比較対象情報による個人特定も実行 し、その認証情報を併せて送信し、登録する。 When a registered person measures blood pressure, body temperature, etc. and registers it in an electronic medical record, or when a doctor processes the contents registered in advance as a predetermined operation so that the patient's electronic power record is viewed, the latest comparison target in the processing stage Information is registered in conjunction with data registration and processing of specified actions. For measurement values such as blood pressure and body temperature, there is a service that automatically sends the read measurement values to the electronic medical record S, information to be compared when using this service The person is also identified by sending and registering the authentication information together.
<実施の形態のまとめ〉 <Summary of embodiment>
前述の実施の形態において、全てのデータベース内の各種情報は、登録者固有 の個人識別 IDに対応付けられて格納されている。具体的には、この認証システム内 で利活用されるデータベースは、必ずこの個人識別 IDを格納している。 In the above-described embodiment, all the information in all the databases is stored in association with the personal identification ID unique to the registrant. Specifically, the database used in this authentication system always stores this personal identification ID.
各端末またはサーバは、登録者個人の履歴情報を他の端末やサーバに送信する 際に、その情報に自動的に個人識別 IDを付与して送信することが望まし!/、。 Each terminal or server sends the registrant's personal history information to other terminals or servers. When you want to send the information automatically with a personal identification ID!
[0154] また、登録者個人を識別するための情報として、前述の個人識別 IDの他に、登録 者識別情報がある。例えば、この登録者識別情報は、登録者個人のバイオメトリタス 情報や、登録者固有の電子情報であり、登録者が保有する電子記録媒体等に保存 される。この登録者識別情報は、認証システムにおいて、登録者個人に対し 1つ以上 登録されている。 [0154] In addition to the above-described personal identification ID, there is registrant identification information as information for identifying the individual registrant. For example, the registrant identification information is registrant's individual biometric information or registrant-specific electronic information, and is stored in an electronic recording medium or the like owned by the registrant. One or more registrant identification information is registered for each registrant in the authentication system.
[0155] また、前述の実施の形態において、登録者は、文字、番号又は記号等、あるいはそ の組み合わせを示す電子情報を末端側端末 160等に直接キー入力したり、それらの 電子情報が書き込まれた情報記録媒体を読み込ませたりすることで認証を行うように してもよい。 [0155] In the above-described embodiment, the registrant directly inputs the electronic information indicating characters, numbers, symbols, or the like, or a combination thereof into the terminal 160 on the terminal side, or writes the electronic information. Authentication may be performed by reading the recorded information recording medium.
[0156] また、異口座(本人の各種口座間、他人との口座間)間の振替処理を円滑に実施 するために、登録者の取引金融機関名、口座種類、口座番号、残高等の詳細な個 人情報と処理の条件設定を、一元的に個人情報を管理する機関や認証システムサ ーバ 10に登録し、取引関係機関には結果情報の一部を通知するだけにしてもよい。 この場合、取引関係機関は金融取引で発生する処理を情報の一元的管理機関ゃ認 証システムサーバ 10に依頼し、実行させるものとする。 [0156] In addition, in order to facilitate the transfer process between different accounts (between the various accounts of the principal and between the accounts with other persons), details such as the name of the registered financial institution of the registrant, account type, account number, balance, etc. Individual personal information and processing condition settings may be registered in an organization that manages personal information centrally or in the authentication system server 10, and only a part of the result information is notified to the business related organization. In this case, the transaction-related institution shall request the authentication system server 10 to execute the processing generated in the financial transaction from the centralized information management institution.
[0157] 各端末が情報を表示する場合、情報を画面上に表示するだけではなぐ人工音声 や振動等の身体障害者向けに開発された情報通知技術を利用して通知することもい [0157] When information is displayed on each terminal, notification may be made using information notification technology developed for people with physical disabilities, such as artificial speech and vibrations, rather than just displaying information on the screen.
5。 Five.
[0158] 電子タグ等は、電子機器に付帯されるだけでなぐ紙の中に漉き込まれていること や、紙や物品に印刷されていることや、紙や物品に組み込まれていることもある。 [0158] An electronic tag or the like may be embedded in paper just attached to an electronic device, printed on paper or an article, or incorporated in a paper or article. is there.
[0159] 上記の認証システムにおける各端末やサーバは、主に CPUとメモリにロードされた プログラムによって実現される。ただし、それ以外の任意のハードウェアおよびソフト ウェアの組合せによってこの装置またはサーバを構成することも可能であり、その設 計自由度の高さは当業者には容易に理解されるところである。 [0159] Each terminal or server in the above authentication system is realized mainly by a program loaded in the CPU and memory. However, it is also possible to configure this apparatus or server by any other combination of hardware and software, and the degree of freedom in design is easily understood by those skilled in the art.
また、上記の各端末やサーバをソフトウェアモジュール群として構成する場合、この プログラムは、光記録媒体、磁気記録媒体、光磁気記録媒体、または半導体等の記 録媒体に記録され、上記の記録媒体力、らロードされるようにしてもよいし、所定のネッ トワークを介して接続されている外部機器からロードされるようにしてもよい。 When each terminal or server is configured as a software module group, the program is recorded on a recording medium such as an optical recording medium, a magnetic recording medium, a magneto-optical recording medium, or a semiconductor, and the recording medium strength described above is recorded. May be loaded, or a predetermined network It may be loaded from an external device connected via a network.
[0160] なお、上記の実施例は本発明の好適な実施の一例であり、本発明の実施例は、こ れに限定されるものではなぐ本発明の要旨を逸脱しない範囲において種々変形し て実施することが可能となる。 [0160] The above-described embodiment is an example of a preferred embodiment of the present invention, and the embodiment of the present invention is not limited to this, and various modifications can be made without departing from the scope of the present invention. It becomes possible to carry out.
図面の簡単な説明 Brief Description of Drawings
[0161] [図 1] (a)は、本発明の実施形態における認証システムの概略構成を示すブロック図 であり、(b)は、認証サーバのデータベースの構成例を示す図であり、(c)は、各端末 のデータベース構成の一覧表である。 [0161] [Fig. 1] (a) is a block diagram showing a schematic configuration of an authentication system in an embodiment of the present invention, (b) is a diagram showing a configuration example of a database of an authentication server, and (c ) Is a list of database configurations of each terminal.
[図 2] (a)は、信用配点表の主要項目の一例を示す図であり、 (b)は、信用配点表の 詳細内容の一例を示す図である。 [Fig. 2] (a) is a diagram showing an example of the main items of the credit score table, and (b) is a diagram showing an example of detailed contents of the credit score table.
[図 3]本発明の第 1の実施の形態において、移動情報を用いた個人認証処理の詳細 な動作例を示すシーケンスチャートである。 FIG. 3 is a sequence chart showing a detailed operation example of personal authentication processing using movement information in the first embodiment of the present invention.
[図 4]本発明の第 2の実施の形態において、携帯電話機による簡易認証とカメラ映像 による検証処理を連携した個人認証処理の動作例を示すシーケンスチャートである。 FIG. 4 is a sequence chart showing an operation example of personal authentication processing in which simple authentication by a mobile phone and verification processing by a camera video are linked in the second embodiment of the present invention.
[図 5] (a)は、アンテナ等とカメラ等の対応空間の一例を示す図であり、(b)は、アンテ ナ等とカメラ等のシステムの構成例を示す図である。 [FIG. 5] (a) is a diagram illustrating an example of a corresponding space between an antenna and the camera and the like, and (b) is a diagram illustrating a configuration example of a system such as an antenna and the camera.
[図 6]本発明の第 3の実施の形態において、交換サーバにより存在通知情報を関係 端末に配信し、相互の認証サービスに利用する動作例を示すシーケンスチャートで ある。 FIG. 6 is a sequence chart showing an operation example in which presence notification information is distributed to related terminals by an exchange server and used for mutual authentication service in the third embodiment of the present invention.
[図 7]存在情報通知表の一例を示す図であり、(a)は、基本的な格納事項のイメージ を示す図であり、(b)は、配信先の登録イメージを示す図であり、(c)は、具体的な配 信条件を示している。 [Fig. 7] An example of a presence information notification table, (a) is a diagram showing an image of basic storage items, (b) is a diagram showing a registration image of a delivery destination, (C) shows specific delivery conditions.
[図 8]本発明の第 4の実施の形態において、登録者の存在空間情報や時間情報等を 、その取得を希望する第三者に提供する際の動作例を示すシーケンスチャートであ FIG. 8 is a sequence chart showing an operation example when providing the third party who wants to acquire the existence space information and time information of the registrant in the fourth embodiment of the present invention.
[図 9] (a)は、病院建物内の情報操作や情報読取端末の設置のイメージを示す図で あり、(b)は、(a)の端末と関係する管理端末等のシステムの構成例を示す図である。 [Fig. 9] (a) is a diagram showing an image of information manipulation and installation of an information reading terminal in a hospital building, and (b) is an example of a system configuration such as a management terminal related to the terminal in (a). FIG.
[図 10]本発明の第 5の実施の形態において、登録者が勤務先に存在する場合、移動 開始した場合、病院に到着した場合の情報連携による認証システムの動作例を示す シーケンスチャートである。 [FIG. 10] In the fifth embodiment of the present invention, when the registrant exists at the office, the move It is a sequence chart which shows the operation example of the authentication system by the information cooperation when it starts and arrives at a hospital.
園 11]本発明の第 5の実施の形態において、登録者が病院に存在する場合の情報 連携による各種取引処理の動作例を示すシーケンスチャートである。 11] In the fifth embodiment of the present invention, it is a sequence chart showing an operation example of various transaction processing by information cooperation when a registrant exists in a hospital.
[図 12]存在認識記録表であり、(a)は、内容の一例を示す図であり、(b)は、存在認 識の類型イメージを示す図であり、(c)は、(b)の登録の一例を示す図である。 [Fig. 12] Presence recognition record table, (a) is a diagram showing an example of the contents, (b) is a diagram showing a type image of presence recognition, (c) is (b) It is a figure which shows an example of no registration.
園 13]本発明の第 6の実施の形態において、存在通知情報とメインユニット端末を利 用した認証処理の詳細な動作例を示すシーケンスチャートである。。 13] A sequence chart showing a detailed operation example of authentication processing using presence notification information and a main unit terminal in the sixth embodiment of the present invention. .
園 14]本発明の第 7の実施の形態において、存在通知情報と異空間端末に基づく取 引を連携した処理の詳細な動作例を示すシーケンスチャートである。 14] A sequence chart showing a detailed operation example of processing in which presence notification information and transactions based on different space terminals are linked in the seventh embodiment of the present invention.
園 15]本発明の第 8の実施の形態の変型例 1において、他端末の存在認識を利用し たユニット内存在者の把握処理の詳細な動作例を示すシーケンスチャートである。 園 16]本発明の第 9の実施の形態において、比較対象情報と存在認識記録表とを利 用して、座席利用状況の認識の詳細な動作例を示すシーケンスチャートである。 園 17] (a)は、利用可能設備表、(b)は、予約ファーム、 (c)は、存在者一覧表のそれ ぞれの内容の一例を示す図である。 15] FIG. 15 is a sequence chart showing a detailed operation example of grasping processing of an in-unit presence person using presence recognition of another terminal in the first modification of the eighth embodiment of the present invention. [Sen 16] In the ninth embodiment of the present invention, it is a sequence chart showing a detailed operation example of the recognition of the seat use situation using the comparison object information and the presence recognition record table. (A) is an available equipment table, (b) is a reserved farm, and (c) is a diagram showing an example of the contents of each person list.
園 is] ωは、客席ユニットの設置のイメージを示す図であり、(b)は、 ωの端末と関 係する管理端末等のシステムの構成例を示す図であり、(c)は、存在認識記録表の 登録の一例を示す図である。 Isis] ω is a diagram showing an image of the installation of the passenger seat unit, (b) is a diagram showing a configuration example of a system such as a management terminal related to the terminal of ω, (c) is a diagram It is a figure which shows an example of registration of a recognition record table.
園 19]本発明の第 9の実施の形態の変型例 1において、比較対象情報と存在認識記 録表により、指定席の予約と利用処理を行う詳細な動作例を示すシーケンスチャート である。 FIG. 19] is a sequence chart showing a detailed operation example of performing reserved seat reservation and use processing according to the comparison target information and the presence recognition record table in the first modification of the ninth embodiment of the present invention.
[図 20]本発明の第 10の実施の形態において、個人認証に併せて認証レベルを判定 し、認証サービスの制御を行う詳細な動作例を示すシーケンスチャートである。。 FIG. 20 is a sequence chart showing a detailed operation example of determining an authentication level in conjunction with personal authentication and controlling an authentication service in the tenth embodiment of the present invention. .
[図 21] (a)は、病院建物内の空間毎に認証レベルが設定されたイメージを示す図で あり、(b)は、空港内の空間毎に認証レベルが設定されたイメージを示す図である。 園 22]認証段階表のイメージを表す図である。 [Fig. 21] (a) is a diagram showing an image in which an authentication level is set for each space in a hospital building, and (b) is a diagram showing an image in which an authentication level is set for each space in an airport. It is. 22] It is a diagram showing an image of the authentication stage table.
[図 23]認証レベル取引対照表のイメージを表す図である。 符号の説明 FIG. 23 shows an image of an authentication level transaction comparison table. Explanation of symbols
10、 10A〜: 10G 認証サ 10, 10A ~: 10G authentication support
11、 21、 111、 121、 131、 141、 151、 161 11, 21, 111, 121, 131, 141, 151, 161
12 履歴情報 DB 12 History information DB
13 検証情報 DB 13 Verification information DB
14 基礎情報 DB 14 Basic information DB
15 可否情報 DB 15 Availability information DB
16 検索情報 DB 16 Search information DB
20 交換サーバ 20 Exchange server
110、 110A〜; 110B 建物側端末 110, 110A ~; 110B Building side terminal
120、 120A〜; 120G 組織側端末 120, 120A ~; 120G Organization side terminal
130、 130A〜; L 30D 地域管理側端末 130, 130A ~; L 30D Regional management terminal
140 中継側端末 140 Relay terminal
150 集約側端末 150 Aggregation terminal
160、 160A〜; L 60K 末端側端末 160, 160A ~; L 60K Terminal
200 通信回線網 200 Communication network
Claims
Applications Claiming Priority (8)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2006288627 | 2006-10-24 | ||
| JP2006-288627 | 2006-10-24 | ||
| JP2006318099 | 2006-11-27 | ||
| JP2006-318099 | 2006-11-27 | ||
| JP2007-033561 | 2007-02-14 | ||
| JP2007033561 | 2007-02-14 | ||
| JP2007-078853 | 2007-03-26 | ||
| JP2007078853 | 2007-03-26 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008050765A1 true WO2008050765A1 (en) | 2008-05-02 |
Family
ID=39324562
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2007/070650 Ceased WO2008050765A1 (en) | 2006-10-24 | 2007-10-23 | Individual authentication system |
Country Status (2)
| Country | Link |
|---|---|
| JP (1) | JP5007886B2 (en) |
| WO (1) | WO2008050765A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPWO2013073120A1 (en) * | 2011-11-15 | 2015-04-02 | パナソニックIpマネジメント株式会社 | Portable terminal device, authentication system, authentication method, program, and integrated circuit |
| JP2016077359A (en) * | 2014-10-10 | 2016-05-16 | 日本電信電話株式会社 | Measurement information recording system and measurement information recording method |
| CN112101598A (en) * | 2019-06-17 | 2020-12-18 | 富士施乐株式会社 | Information processing system, information processing method, and non-transitory computer readable medium |
| WO2024252559A1 (en) * | 2023-06-07 | 2024-12-12 | 日本電気株式会社 | Management device, generation device, terminal device, information processing device, management method, generation method, information processing method, and program |
Families Citing this family (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2010122871A (en) * | 2008-11-19 | 2010-06-03 | Nec Corp | Portable terminal, information processing system, program, and communication method |
| CA2675664A1 (en) * | 2009-08-28 | 2009-11-05 | Ibm Canada Limited - Ibm Canada Limitee | Escalation of user identity and validation requirements to counter a threat |
| KR101215024B1 (en) * | 2009-12-03 | 2012-12-24 | 연규항 | silver medical system and method |
| JP2012256200A (en) * | 2011-06-09 | 2012-12-27 | Jtb Corp | Payment collection device, computer program for payment collection and payment collection method |
| JP5942465B2 (en) * | 2012-02-21 | 2016-06-29 | ソニー株式会社 | Information processing apparatus, information processing method, program, and information processing system |
| JP6369776B2 (en) * | 2014-03-13 | 2018-08-08 | パナソニックIpマネジメント株式会社 | Ticket inspection system |
| US11429700B2 (en) | 2014-06-19 | 2022-08-30 | Nec Corporation | Authentication device, authentication system, and authentication method |
| KR101813534B1 (en) * | 2015-12-18 | 2018-01-30 | 한국정보통신주식회사 | An automated teller machine and a method for operating it |
| CN109863523A (en) * | 2016-10-27 | 2019-06-07 | 索尼公司 | Information processing apparatus, information processing system, information processing method, and program |
| JP6750473B2 (en) * | 2016-11-22 | 2020-09-02 | 沖電気工業株式会社 | Automatic transaction device and automatic transaction system |
| JP6785646B2 (en) * | 2016-12-22 | 2020-11-18 | ソニーフィナンシャルホールディングス株式会社 | Withdrawal processing device |
| JP6829606B2 (en) * | 2017-01-10 | 2021-02-10 | 株式会社第一興商 | Karaoke system, server device |
| JP7033778B2 (en) * | 2017-11-07 | 2022-03-11 | 株式会社Elements | Biometric system, biometric program and biometric method |
| JP6977575B2 (en) * | 2018-01-17 | 2021-12-08 | オムロン株式会社 | User management device, biometric authentication system, user management method and user management program |
| JP2019169070A (en) * | 2018-03-26 | 2019-10-03 | グローリー株式会社 | User management system and user management method |
| JP2020087064A (en) * | 2018-11-28 | 2020-06-04 | 富士通フロンテック株式会社 | Management device, management method and voting system |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2002101091A (en) * | 2000-09-22 | 2002-04-05 | Hitachi Information Systems Ltd | User authentication method and user authentication program |
| JP2002259345A (en) * | 2001-02-27 | 2002-09-13 | Nec Corp | Method/device for authentication for preventing unauthorized use of physical feature data, and program |
| JP2004258845A (en) * | 2003-02-25 | 2004-09-16 | Ntt Data Systems Corp | Personal identification device, behavior record method and transportation expense adjustment method |
| JP2005142848A (en) * | 2003-11-06 | 2005-06-02 | Toshiba Corp | Wireless LAN system, communication control method thereof, and access point |
| JP2006099217A (en) * | 2004-09-28 | 2006-04-13 | Matsushita Electric Ind Co Ltd | Communications system |
| WO2006101169A1 (en) * | 2005-03-23 | 2006-09-28 | Ihc Corp. | Authentication system |
| WO2007111170A1 (en) * | 2006-03-27 | 2007-10-04 | Pioneer Corporation | Speaking persian recognition system and computer program |
-
2007
- 2007-10-23 JP JP2007275251A patent/JP5007886B2/en active Active
- 2007-10-23 WO PCT/JP2007/070650 patent/WO2008050765A1/en not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2002101091A (en) * | 2000-09-22 | 2002-04-05 | Hitachi Information Systems Ltd | User authentication method and user authentication program |
| JP2002259345A (en) * | 2001-02-27 | 2002-09-13 | Nec Corp | Method/device for authentication for preventing unauthorized use of physical feature data, and program |
| JP2004258845A (en) * | 2003-02-25 | 2004-09-16 | Ntt Data Systems Corp | Personal identification device, behavior record method and transportation expense adjustment method |
| JP2005142848A (en) * | 2003-11-06 | 2005-06-02 | Toshiba Corp | Wireless LAN system, communication control method thereof, and access point |
| JP2006099217A (en) * | 2004-09-28 | 2006-04-13 | Matsushita Electric Ind Co Ltd | Communications system |
| WO2006101169A1 (en) * | 2005-03-23 | 2006-09-28 | Ihc Corp. | Authentication system |
| WO2007111170A1 (en) * | 2006-03-27 | 2007-10-04 | Pioneer Corporation | Speaking persian recognition system and computer program |
Non-Patent Citations (1)
| Title |
|---|
| BARDRAM J.E., KJAER R.E., PEDERSEN M.O.: "Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing", UNIVERSITY OF AARHUS, 22 July 2003 (2003-07-22), Retrieved from the Internet <URL:http://www.daimi.au.dk/bardram/docs/bardram.ubicomp2003.pdf> * |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPWO2013073120A1 (en) * | 2011-11-15 | 2015-04-02 | パナソニックIpマネジメント株式会社 | Portable terminal device, authentication system, authentication method, program, and integrated circuit |
| JP2016077359A (en) * | 2014-10-10 | 2016-05-16 | 日本電信電話株式会社 | Measurement information recording system and measurement information recording method |
| CN112101598A (en) * | 2019-06-17 | 2020-12-18 | 富士施乐株式会社 | Information processing system, information processing method, and non-transitory computer readable medium |
| WO2024252559A1 (en) * | 2023-06-07 | 2024-12-12 | 日本電気株式会社 | Management device, generation device, terminal device, information processing device, management method, generation method, information processing method, and program |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2008269556A (en) | 2008-11-06 |
| JP5007886B2 (en) | 2012-08-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5007886B2 (en) | Personal authentication system | |
| US11620369B2 (en) | Biometric ticketing | |
| JP3828901B2 (en) | Personal authentication system | |
| US20190147373A1 (en) | Automated internet based interactive travel planning and management system | |
| US8866586B2 (en) | Authentication system | |
| KR101977131B1 (en) | Customized financial management system using of a sub-certification | |
| US10142836B2 (en) | Secure mobile device | |
| US20130063246A1 (en) | System and method for electronically providing an access authorization | |
| JP2019057004A (en) | Authentication system, authentication method and information processor | |
| JP6792762B2 (en) | Terminal device, same person discrimination system and method | |
| JP2008527517A (en) | Method and system for accessing an object or service | |
| KR102671045B1 (en) | Method for operating devices in building complex using smart ID and application therefor | |
| JP5127971B1 (en) | Welfare vehicle identification parking lot system for the physically handicapped | |
| JP2006236357A (en) | Personal authentication system | |
| TWI815484B (en) | Authentication systems, authentication methods and program products | |
| TW202316297A (en) | Authentication system, authentication method, and program | |
| TW202324156A (en) | Authentication system, authentication method and program product | |
| Ashbourn | Applications for biometrics | |
| JP2002207839A (en) | Certificate picture management system and its use method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07830384 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 07830384 Country of ref document: EP Kind code of ref document: A1 |