WO2019017440A1 - Système et procédé de gestion d'entrée/de sortie - Google Patents
Système et procédé de gestion d'entrée/de sortie Download PDFInfo
- Publication number
- WO2019017440A1 WO2019017440A1 PCT/JP2018/027145 JP2018027145W WO2019017440A1 WO 2019017440 A1 WO2019017440 A1 WO 2019017440A1 JP 2018027145 W JP2018027145 W JP 2018027145W WO 2019017440 A1 WO2019017440 A1 WO 2019017440A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- reader
- user
- biometric information
- area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
Definitions
- the present invention relates to an entrance management system and an entrance management method in an area in which user entrance is controlled.
- the entrance management method using the RFID tag it is judged based on the ID information of the RFID tag (ID card) possessed by the user whether or not the entrance is permitted. Therefore, when the user enters using the RFID tag acquired illegally, this can not be prevented.
- an entrance management method using biometric information that can identify the user more strictly than authentication using an RFID tag.
- biometric information for example, information unique to the human body such as the vein pattern described in Patent Document 2 or fingerprint is used.
- the authentication using biometric information instead of the authentication by the RFID tag increases the reliability of identity verification at the time of entrance and improves the security.
- an object of the present invention is to solve the problem and provide an entrance management system and an entrance management method capable of managing the behavior of the user after entrance.
- an entrance management system is: A first biometric information reader installed at an entrance gate of an area where entry of the user is controlled and reading the biometric information of the user; A first reader device installed at the entrance gate for reading ID information of a wireless tag carried by the user; The biometric information read by the first biometric information reading device is authenticated by comparison with the biometric information stored in advance in the entrance authority, and the biometric information and the ID information read by the first reader device An authentication unit that establishes connection, A plurality of second reader devices installed in the area such that the reading area of the ID information of the wireless tag is different, and reading the ID information of the wireless tag; A position specifying unit for specifying the position of the user in the area based on the ID information read by the second reader device; Equipped with
- an entrance management method which is another aspect of the present invention is: Reading the biometric information of the user with a first biometric information reader at an entry gate of the area in which the entry of the user is controlled; Reading ID information of a wireless tag carried by the user by the first reader device at the entrance gate; The biometric information read by the first biometric information reader is authenticated by collation with the biometric information of the entrance authority recorded in advance, and a string of the biometric information and the ID information read by the first reader device Establishing the step of Reading the ID information by a plurality of second reader devices installed in the area such that the reading area of the ID information of the wireless tag is different; Identifying the position of the user in the area based on the ID information read by the second reader device.
- the entrance management system and the entrance management method according to the present invention it is possible to manage the behavior of the user after entrance.
- FIG. 1 Schematic block diagram of the entrance management system according to the first embodiment Schematic of the entrance gate and the exit gate according to the first embodiment
- Block diagram showing a schematic configuration of the entrance management system according to the first embodiment Diagram showing a table where personal information for authentication is recorded
- Diagram showing a table where worker's action history is recorded
- Diagram showing the relationship between the specific area and the detection area of the reader
- Flow chart showing the processing procedure of the entrance management method
- Flow chart showing the flow of position identification of the worker in the work room Diagram showing location information presented to the observer
- Flow chart showing the flow of identifying the position of the worker in the work room Diagram showing location information presented to the observer
- Flow chart showing the flow of identifying the position of a specific worker in the work room
- Flow chart showing a flow of identifying personal information of a worker leaving the work room
- Block diagram showing a schematic configuration of the entrance management system according to the second embodiment Flowchart showing the flow of matching between the number of tags and the number of workers Diagram explaining the count of wireless tags
- the entrance management system is installed at an entrance gate of an area where entrance of a user is managed, and is installed at the entrance gate, a first biometric information reader for reading biological information of the user,
- the first reader device which reads the ID information of the wireless tag carried by the user, and the biometric information read by the first biometric information reader are authenticated by collation with biometric information recorded in advance and possessed by the entrance authority.
- An authentication unit for establishing association between the biometric information and the ID information read by the first reader device, and a reading area of the ID information of the wireless tag in the area different from each other; A position where the position of the user in the area is specified based on a plurality of second reader devices for reading the ID information of the wireless tag and the ID information read by the second reader device It is an entrance management system provided with a specific part.
- the biometric information of the user is verified against the biometric information recorded in advance for the admission authority, so that the user's impersonation is prevented. be able to.
- the position of the user who holds the wireless tag can be specified by the plurality of second reader devices arranged so that the reading area is different in the control area. Since the location of the user is identified, it is possible to manage the user's behavior in the controlled area.
- the user enters the control area by establishing the association between the ID information of the wireless tag and the biometric information of the user, the user at the position specified by the wireless tag can receive the biometric information The degree of credibility of the person who owns it increases. Therefore, it is possible to prevent the user's fraudulent acts in the controlled area.
- "linking" indicates that one information is uniquely associated with another information so as to be identified.
- a presentation unit may be provided to present location information on the identified location of the user. With such a configuration, the position information is presented, so that a person who manages the control area can easily know the position of the user.
- the camera may include a camera configured to capture the inside of the area, and a recording unit configured to record a captured image of the camera configured to capture the specified position of the user.
- a plurality of the cameras may be installed, and the camera may further include a camera selection unit that selects a camera for photographing the user based on the specified position of the user.
- a camera selection unit that selects a camera for photographing the user based on the specified position of the user.
- An image processing unit configured to detect the number of users from an image captured by the camera in the imaging region of the camera; and a count unit configured to count the number of wireless tags in the imaging region detected by the second reader device
- the information processing apparatus may further include a number comparing unit that compares the number of users detected by the image processing unit with the number of wireless tags counted by the counting unit.
- a communication tool selection unit provided with a plurality of communication tools installed in the area and communicating with outsiders outside the area, and selecting a communication tool close to the position of the user based on the specified position of the user May be provided.
- the communication tool close to the user is selected according to the position of the user, so that the user and the outsider can communicate comfortably.
- the second biological information reader installed at the exit gate of the area for reading the biometric information of the user
- the third reader installed at the exit gate for reading the ID information of the wireless tag
- the authentication unit collates, at the entrance gate, biometric information of the user read by the second biometric information reader and ID information of the wireless tag read by the third reader device, and Authentication is performed by collation with ID information, and the authentication unit authenticates the biometric information of the user read by the second biometric information reader and the ID information of the wireless tag read by the third reader device If it is successful, the exit gate may be allowed to exit.
- the ID information and the biological information of the wireless tag possessed by the user are authenticated by the collation with the ID information and the biological information collated at the entrance gate even at the time of leaving the user. Can prevent the wireless tag from being replaced and left. Therefore, it is possible to prevent cheating in the controlled area.
- the entrance management method includes the steps of: reading biometric information of the user by a first biometric information reader in an entrance gate of an area in which entrance of the user is managed; and using the entrance gate
- the step of reading the ID information of the wireless tag possessed by the person by the first reader device, and the biometric information read by the first biometric information reader are verified by collation with the biometric information of the entrance authority recorded in advance.
- the biometric information of the user is verified against the biometric information recorded in advance for the admission authority, so that the user's impersonation is prevented. be able to.
- the position of the user who holds the wireless tag can be specified by the plurality of second reader devices arranged so that the reading areas are different in the management area. Since the location of the user is identified, it is possible to manage the user's behavior in the controlled area.
- the user enters the control area by establishing the association between the ID information of the wireless tag and the biometric information of the user, the user at the position specified by the wireless tag can receive the biometric information The degree of credibility of the person who owns it increases. Therefore, it is possible to prevent the user's fraudulent acts in the controlled area.
- the wireless tag may be an RFID tag. Such a configuration makes it possible to easily read tag ID information.
- the RFID tag may be a UHF RFID tag. With such a configuration, since the reading area of the RFID tag is several meters, the burden on the user regarding the reading operation can be reduced. In addition, the reading of the user's ID information becomes easier in the control area.
- the second reader device may be disposed such that a part of each reading area of the adjacent second reader devices overlaps. Such a configuration makes it possible to detect wireless tag ID information in the area without omission.
- the plurality of second reader devices may periodically read the ID information. Such a configuration makes it possible to specify the position of the user for each cycle.
- FIG. 1 is a schematic configuration diagram of an entrance management system according to the first embodiment.
- FIG. 2 is a schematic view of an entrance gate and an exit gate.
- the entrance management system 1 manages entrance of the user to the work room 3. That is, the work room 3 is an area in which the entrance of the user is controlled. The entry situation of the user to the work room 3 can be confirmed in the monitoring room 5.
- a user who enters and leaves the work room 3 and performs work is referred to as a worker.
- the user who manages a worker in the monitoring room 5 is called a supervisor.
- Entrance to the work room 3 is restricted by the entrance gate 7. Further, the exit from the work room 3 is also restricted by the exit gate 9.
- processing apparatuses 11, 13, 15, 17, 19, 21, 23, 23, 25, 27, 31, 31, 33 which perform respective processes of the work-in-progress are disposed.
- the entrance gate 7 is provided with a reader 37 for reading tag ID information of the RFID tag 35 possessed by the worker, a biometric information reader 38 for reading the biometric information of the user, and an entrance door 40.
- a reader device 37 as a first reader device reads tag ID information of an entrance person passing through the entrance gate 7, and a biometric data reader 38 as a first biometric data reader reads biometric data of the user.
- Tag ID information includes a tag ID number.
- the RFID tag 35 uses a UHF (Ultra High Frequency) band RFID tag. Note that another wireless tag may be used instead of the RFID tag. In addition to the passive wireless tag, an active wireless tag may be used. As a wireless communication standard, HF band, Wi-Fi (registered trademark), Bluetooth (registered trademark), BLE (Bluetooth Low Energy), or the like may be used.
- the RFID tag 35 includes an IC chip in which tag ID information is stored.
- the exit gate 9 is also provided with a reader device 41 for reading tag ID information of the RFID tag 35 possessed by the user, a biometric information reader 43 for authenticating biometric information of the user, and an exit door 44.
- the reader device 41 as the third reader device reads tag ID information of the leaving person
- the biological information reading device 43 as the second biological information reading device reads the biological information of the leaving person.
- the exit gate 9 is provided separately from the entrance gate 7 in the first embodiment, an entrance / exit gate may be provided in which the entrance gate 7 and the exit gate 9 are integrated.
- reader devices 45, 47, 49, 51, 53, 55 for reading the RFID tag 35 of the entering worker are provided on the ceiling of the passage. Further, in the work room 3, cameras 57, 59, 61, 63, 64 for photographing the workers are provided. Furthermore, communication tools 65, 67, 69, 71, 73, 75 are provided in the work room 3 for communication between the worker in the work room 3 and the monitor in the monitoring room 5.
- the communication tools 65, 67, 69, 71, 73, 75 include a microphone and a speaker, but may further include a display and a camera.
- Each reader device 37, 41, 45, 47, 49, 51, 53, 55 transmits a request signal to transmit tag ID information toward its surrounding space.
- the RFID tag 35 receives the request signal, it transmits its tag ID information.
- the transmitted tag ID information is received by the reader device, and the presence of the RFID tag 35 can be detected.
- the reader devices 37, 41, 45, 47, 49, 51, 53, 55 may not only read the ID information of the RFID tag 35 but also have a data writing function.
- a monitor 77 on which images captured by the cameras 57, 59, 61, 63, 64 are constantly displayed, a monitor 79 on which an image of a worker designated by the supervisor is displayed, and a work room 3
- a host computer 81 for collating entry / exit to / from and a communication tool 83 for communicating with the workers in the work room 3 are arranged.
- the communication tool 83 includes a microphone and a speaker, but may further include a display and a camera.
- the entrance management system 1 includes an RFID tag 35 as a wireless tag, reader devices 37, 41, 45, 47, 49, 51, 53, 55, a reader device 41 as a third reader device, reading of biological information Devices 38, 43, entrance door 40, exit door 44, cameras 57, 59, 61, 63, 64, communication tools 65, 67, 69, 71, 73, 75, 83, monitors 77, 79, host computer 81 . These devices constituting the entrance management system 1 are connected to the host computer 81 in a wired or wireless manner to enable data transmission / reception.
- the reader devices 45, 47, 49, 51, 53, 55 as the second reader devices in the work room 3 are arranged such that the reading areas of the tag ID information of the RFID tag 35 are different. Also, the reader devices 45, 47, 49, 51, 53, 55 in the working chamber 3 are disposed in the working chamber 3 so that the reading regions of the RFID tags 35 of the adjacent reader devices partially overlap. There is. For example, the reading area 45r of the reader 45 partially overlaps with the reading areas 47r and 51r of the readers 47 and 51 disposed adjacent to the reader 45, respectively. The reading area 55r of the reader device 55 partially overlaps the reading areas 49r and 53r of the reader devices 49 and 53 disposed adjacent to the reader device 55.
- the RFID tag 35 can be detected without leakage wherever the worker is in the work room 3.
- Each reader device in the work room 3 reads the RFID tag 35 at a predetermined time cycle.
- the reader device does not read ID tag information within one cycle. In this case, each reader device sends nothing to the host computer 81 as read data.
- Reading of tag ID information by the reader devices 45, 47, 49, 51, 53, 55 in the work room 3 can be performed periodically to specify the position of the worker for each cycle.
- the reading cycle is preferably performed at intervals of several seconds.
- the reading of the tag ID information may be performed based on the tag ID information reading instruction to the host computer 81 by the observer of the monitoring room 5 instead of reading periodically.
- the transfer of the read data to the host computer 81 may be transmitted for each reader apparatus, or may be transmitted collectively for each work room.
- FIG. 3 is a block diagram showing a schematic configuration of the entrance management system according to the first embodiment.
- the host computer 81 includes a tag ID authentication unit 91, an authentication database 93, a biometric information authentication unit 95, an action history recording unit 97, a personal information inquiry unit 98, an input unit 100, a position identification unit 101, a presentation information generation unit 107, and a camera selection. And a video recording unit 105 and a communication tool selection unit 109.
- the reader device 37 of the entrance gate 7 together with tag ID information read from the RFID tag 35 possessed by the operator trying to enter, time information when reading the tag ID information, and reader ID information of the reader device 37, It transmits to the host computer 81. Further, the biometric information reading device 38 of the entrance gate 7 reads the biometric information of the worker who is about to enter and transmits it to the host computer 81. The tag ID information and the reader ID information sent to the host computer 81 are sent to the tag ID authentication unit 91.
- the tag ID authentication unit 91 authenticates the sent tag ID information by comparison with the personal information for authentication stored in the authentication database 93, and the read tag ID information has the read reader ID information. It is determined whether or not there is the entrance authority of the entrance gate 7. Further, the tag ID authentication unit 91 can recognize that it is information collation at the time of entrance based on the reader ID information received together with the tag ID information. As a result of the authentication of the tag ID authentication unit 91, when the read tag ID information has the entrance authority, the tag ID information is transmitted to the biometric information authentication unit 95. In addition, when the read tag ID information does not have the entrance authority, the tag ID authentication unit 91 transmits a warning signal to the speaker 39 of the entrance gate 7 and monitors the entrance to the entrance by the unauthorized RFID 35. It is displayed on the monitor 79 of FIG.
- the authentication database 93 at least tag ID information, biometric information, and a reader ID number having admission authority are stored in association with each other as personal information for authentication. That is, tag ID information and biometric information are linked and stored.
- a table 94 in which personal information for authentication is recorded is shown in FIG.
- “linking” refers to being linked so that other information can be uniquely identified from certain information.
- the employee number of each user, tag ID information, name, biometric information, and a reader ID number having admission authority are stored in association with one another.
- Information other than the exemplified items may be further associated and stored in the table 94.
- Biometric information is information unique to a living body, and is information that can identify a person.
- the veins of the index finger are used as the biological information, but veins of the fingers of the other hand or palm, retina, voice print, or the like may be used.
- the biometric information authentication unit 95 as an authentication unit authenticates the sent biometric information by matching the biometric information stored in the authentication database 93 with the tag ID information. As a result of the collation, when the two pieces of biometric information match, the biometric information authentication unit 95 transmits a permission signal to the entrance door 40 of the entrance gate 7. At this point in time, the linking of the biometric information having the entrance authority and the tag information is established. Further, as a result of the collation, when the two pieces of biometric information do not match, the biometric information authentication unit 95 transmits a warning signal to the speaker 39 of the entrance gate 7 and displays the result of the mismatch on the monitor 79 of the monitoring room.
- the tag ID information, time information, and reader ID information sent to the host computer 81 are recorded in the action history recording unit 97.
- the tag ID information of the worker who is about to enter and the entry time are recorded. Further, tag ID information of each worker who has entered the working room 3 is also read and recorded by each reader device arranged in the working room 3.
- the ID information of the RFID tag 35 read by each of the reader devices 45, 47, 49, 51, 53, 55 disposed in the work room 3 is sent to the action history recording unit 97 and the personal information inquiry unit 98.
- the read ID information of the reader device and the time when the RFID tag 35 is read are sent, and the information is recorded in the action history recording unit 97.
- FIG. 5 is a diagram showing a table in which a worker's action history is recorded.
- the table 99 is an example of a table in which a worker's action history is recorded, and information other than the exemplified items may also be recorded.
- the entry area, the reader ID number of the reader device 37 installed at the entry gate 7, the entry time, and the time interval predetermined in the working room 3 The reader ID number and detection time at which tag ID information is detected, and the reader ID number of reader device 41 installed at exit gate 9 and exit time are recorded.
- the reader devices 37, 41, 45, 47, 49, 51, 53, 55 in the work room 3 are arranged such that a part of the reading area of each adjacent reader device overlaps. Therefore, depending on the position of the worker, the RFID tag 35 may be detected from the two reader devices. In this case, by recording the two detected reader ID numbers, it can be understood that the worker is in the overlapping area of the reading areas of the two reader devices.
- the cameras 57, 59, 61, 63, 64 disposed in the work room 3 always take pictures of the work room 3. Images captured by each camera are sent to the host computer 81. Further, the photographed image of each camera is always displayed as a divided image on the monitor 77 in the monitoring room 5.
- the personal information inquiring unit 98 inquires the sent tag ID information with the personal information recorded in the authentication database 93, and searches for an employee number and a name corresponding to the tag ID information. The retrieved employee number and name and the reader ID information corresponding to these information are sent to the position specifying unit 101. Further, the employee number of the worker sent from the input unit 100 is inquired to the authentication database 93, and the corresponding tag ID information is detected.
- the input unit 100 is used by the supervisor to input an instruction to the host computer 81, and is configured by a mouse or a keyboard.
- a touch panel display may be used as the input unit 100.
- the monitor inputs the employee number of the worker who wants to know the location to the host computer 81 via the input unit 100.
- the position specifying unit 101 specifies the position of the worker in the work room 3 from the sent tag ID information.
- FIG. 6 is a diagram showing the relationship between the specific area and the detection area of the reader. When it is detected only by the reader device 45, it is found that it is in the region 45a which does not overlap with the detection regions 47r and 51r of the reader devices 47 and 51 arranged next to each other. In addition, when it is detected from both of the reader devices 45 and 47, it is found that the detection region 45r of the reader device 45 and the detection region 47r of the reader device 47 are in the overlapping region 45b.
- the worker is detected by the reader device 49 in the area 47a, and the worker is detected by the reader device 51 only in the area 49a. If the area 51a is detected only by the reader device 53, the worker is determined to be in the area 53a. If it is detected only by the reader device 55, it is determined that the worker is in the area 55a. Further, when detected from both the reader devices 47 and 49, it is found that the detection region 47r of the reader device 47 and the detection region 49r of the reader device 49 are in the overlapping region 47b. When detected from both the reader devices 51 and 53, it is found that the detection region 51r of the reader device 51 and the detection region 53r of the reader device 53 are in the overlapping region 53b.
- the position specifying unit 101 can specify at which position in the work room 3 the worker is at the position from the reader ID number of the reader device that has detected the RFID tag 35 of the worker.
- the position specifying unit 101 specifies the position of the worker corresponding to the input employee number.
- the position specifying unit 101 inquires of the table 99 of the action history recording unit 97 the latest detected reader ID number at which the tag ID information whose position is desired to be detected is detected. An area corresponding to the detected reader ID number is specified by this inquiry.
- the camera selection unit 103 selects a camera for capturing the specified area, and displays an image of the selected camera on the monitor 79.
- Each area in the work room 3 and the imaging area of each camera are associated in advance.
- areas 45a, 45b and 47a are imaging areas of the camera 59
- areas 47b, 49a and 49b are imaging areas of the camera 63
- areas 55a and 55b are imaging areas of the camera 64
- areas 51a, 53a, 53a, Reference numerals 53 b and 53 c denote imaging areas of the camera 61
- an area 51 b is an imaging area of the camera 57.
- the video recording unit 105 as a recording unit records images taken by the cameras 57, 59, 61, 63, 64. In addition, the photographed image of the camera selected by the camera selection unit 103 is also recorded. In any case, it is possible to record a captured image of a camera that captures the position of the specified worker.
- the presentation information generation unit 107 sends the position information related to the position of the worker specified by the position specifying unit 101 and the character information including the employee number and name of the worker at the position to the monitor 79 as a presentation unit. send.
- the presentation information generation unit 107 sends the position information related to the position of the worker specified by the position specifying unit 101 and the character information including the employee number and name of the worker at the position to the monitor 79 as a presentation unit. send.
- voice information may be generated and notified to a supervisor from a speaker.
- the communication tool selection unit 109 selects the communication tool arranged at the position closest to the specified position of the worker, and connects the communication tool 83 with the communication tool 83 of the monitoring room 5. As a result, the monitor can talk with the worker who wants to make contact in the work room 3 through the microphone and the speaker.
- the tag ID authentication unit 91, the biometric information authentication unit 95, the personal information inquiry unit 98, the position specification unit 101, the camera selection unit 103, the presentation information generation unit 107, and the communication tool selection unit 109 have a plurality of CPUs, microprocessors, or It may be configured from an FPGA (Field Programmable Gate Array), or may be integrated into one CPU, a microprocessor, or an FPGA.
- the authentication database 93, the action history recording unit 97, and the video recording unit 105 may be configured of a plurality of hard disks, memories, and solid state drives (SSDs), or may be integrated into one hard disk, memory or SSD. Good.
- FIG. 7 is a flowchart showing the procedure of the entrance management method.
- the processing procedure is roughly divided into two types of processing of performing authentication at entry of the worker and processing of specifying the position of the worker in the work room.
- FIG. 7 the process regarding the authentication at the time of entrance of a worker is demonstrated.
- the reader device 37 reads tag ID information of the RFID tag 35 possessed by the worker (step S1).
- the read tag ID information is sent to the tag ID authentication unit 91 of the host computer 81 together with the read time and the read ID information of the reader device 37.
- the worker holds, for example, the index finger over the biological information reading device 38, and the biological information reading device 38 reads the biological information of the worker (step S2).
- the read biometric information is transmitted to the biometric information authentication unit 95 of the host computer 81.
- the tag ID information and the biological information are separately transmitted to the host computer 81, they may be transmitted simultaneously.
- the tag ID authentication unit 91 receives the tag ID information, the ID information of the reader 37, and the reading time.
- the tag ID authentication unit 91 authenticates the received tag ID information, the ID information of the reader 37, and the tag ID information recorded in the authentication database 93 (step S3).
- the authentication of tag ID information collates whether the received tag ID information has the entrance authority of the entrance gate 7 where the reader device 37 is installed. If the authentication is unsuccessful (No in step S4), that is, if the received tag ID information does not have the entrance authority, a warning signal is transmitted to the speaker 39 of the entrance gate 7. If the authentication is successful, that is, if the received tag ID information has an entrance authority (Yes in step S4), the tag ID authentication unit 91 sends the collated tag ID information to the biometric information authentication unit 95.
- the biometric information authentication unit 95 receives tag ID information and biometric information.
- the biometric information authentication unit 95 authenticates the received biometric information and, for example, the vein image of the index finger recorded in the authentication database 93 (step S5), and a worker having tag ID information is registered in advance. Certify your identity. If the authentication of the biometric information is unsuccessful (No in step S6), the biometric information authentication unit 95 transmits a warning signal to the speaker 39 of the entrance gate 7. If the authentication of the biometric information is successful (Yes in step S6), the biometric information authentication unit 95 records the association between the received tag ID information and the biometric information in the authentication database 93, and moves to the entrance door 40 of the entrance gate 7. Send an admission signal. Further, by recording the tag ID information, the ID information of the reader device 37, and the reading time in the action history recording unit 97, the entrance history of the worker remains as a record (step S7).
- the entrance door 40 when the entrance door 40 receives an entrance permission signal, the entrance door 40 opens (step S8), and a worker can enter the working room 3.
- the speaker 39 of the entrance gate 7 receives the warning signal, a warning sound indicating that the user can not enter from the speaker 39 is notified to the worker (step S9).
- the entrance permission signal is not sent to the entrance door 40, the entrance door 40 is not opened.
- the RFID tag 35 possessed by the worker has the right to enter the working room 3. Further, by collating the pre-registered biometric information having the admission authority with the biometric information read at the time of admission, by establishing the association between the tag ID information of the read RFID tag 35 and the read biometric information, It is possible to ensure the reliability and security of the identity of the worker who holds the RFID tag 35. Thus, it is possible to prevent a person who has illegally obtained the RFID tag 35 from intruding into the work room 3. Furthermore, if the RFID tag 35 is detected in the work room 3, it can be guaranteed that the worker who holds the RFID tag 35 is the person himself.
- FIG. 8 is a flow chart showing the flow of specifying the position of the worker in the work room.
- the reader devices 45, 47, 49, 51, 53, 55 arranged at various places read tag ID information of the RFID tag 35 at predetermined time cycles.
- the reader device reads the tag ID information (step S21), and sends the read reader ID information of the reader device and the read time to the host computer 81 together with the tag ID information. Send.
- the reading time may be a transmission time to the host computer 81 or may be a time when the host computer 81 receives data.
- the host computer 81 receives the sent tag ID information, reader ID information and reading time, and records these pieces of information in the action history recording unit 97 (step S22).
- the recorded information is also sent to the personal information inquiry unit 98.
- the personal information inquiring unit 98 inquires the tag ID information with the personal information recorded in the authentication database 93 (step S23), and searches for an employee number and a name corresponding to the tag ID information.
- the retrieved employee number and name and the reader ID information corresponding to these information are sent to the position specifying unit 101.
- the position specifying unit 101 specifies the position of the worker in the work room 3 from the reader ID information (step S24). That is, among the 13 areas in the work room 3, which area the operator is in is specified.
- the identified position information is sent to the presentation information generation unit 107.
- the presentation information generation unit 107 generates presentation information in which the employee number and the name of the worker corresponding to the identified position information are associated (step S25).
- the generated presentation information is sent to the monitor 79 and displayed (step S26). Further, the position information specified by the position specifying unit 101 is sent to the communication tool selecting unit 109.
- the communication tool selection unit 109 selects a communication tool closest to the specific area corresponding to the received position information from the communication tools in the work room 3 (step S27), and this communication tool, the monitoring room 5, and the communication tool 83. And connect.
- the manager of the monitoring room 5 can call the worker through the microphone.
- the worker since the worker can also hear the manager's voice from the speaker, he can talk to the manager from the communication tool combined with the speaker.
- FIG. 9 is a diagram showing position information presented to the observer.
- the floor plan 110 of the work room 3 is displayed.
- the floor plan 110 is displayed with color coding for each area.
- the operator displays a black circle on the area corresponding to each position information.
- the area where the worker is present, the employee number and the name of the worker are displayed next to the plan view 110.
- the supervisor in the monitoring room 5 can know in real time the position and the name of the worker who works in the working room 3. For example, it can be seen that the worker's name in the area 45a is ⁇ ⁇ ⁇ .
- the action history of the worker can be confirmed later.
- FIG. 10 is a flow chart showing a flow for specifying the position of the worker in the work room.
- step S21 The tag ID information reading in the work room 3 (step S21), the tag ID information recording in the monitoring room 5 (step S22), and the tag ID information inquiry (step S23) are common steps, so the description will be omitted.
- the position specification unit 101 specifies the position of the worker in the work room 3 from the reader ID information, and sends the specified position information to the camera selection unit 103 and the presentation information generation unit 107.
- the camera selection unit 103 selects a camera for photographing the specified area (step S31), and displays this camera image on the monitor 79. Further, the selected camera image is recorded in the video recording unit 105 (step S32).
- the presentation information generation unit 107 generates presentation information in which the employee number, the name, and the like of the worker correspond to the position information of the worker specified by the position specifying unit 101, and sends the generated information to the monitor 79 (step S25).
- FIG. 11 is a diagram showing position information presented to a supervisor. As shown in FIG. 11, on the monitor 79, the image in the work room 3 and the employee numbers and names of the workers contained in the image are displayed in character information. Since the photographed image at a predetermined position of each camera is associated with the divided area in the work room 3, the relationship between the worker in the photographed image and the character information can be understood. Each camera may be capable of zoom adjustment and pan / tilt adjustment, and the observer can see the worker in more detail by the camera operation.
- the communication tool selection (step S27) is a common step, so the description will be omitted.
- the supervisor can know the situation of the work of the worker in more detail.
- FIG. 12 is a flow chart showing a flow for specifying the position of a specific worker in the work room.
- This position specifying method is used, for example, when a supervisor wants to call a specific worker who does not know in which work room they are working.
- the monitor uses the input unit 100 of the host computer 81 to input the worker number of the worker (step S41).
- the entered employee number is sent to the personal information inquiry unit 98.
- the personal information inquiring unit 98 inquires the employee number to the personal information recorded in the authentication database 93 (step S42), and searches for tag ID information corresponding to the employee number.
- the retrieved tag ID information is sent to the position specifying unit 101.
- the position specifying unit 101 searches the action history recording unit 97 for the sent tag ID information (step S43), and acquires the reader ID information recorded together with the tag ID information most recently. Based on the acquired reader ID information, the position of the worker in the work room 3 in which the reader device corresponding to the reader ID information is installed is specified (step S44). The identified position information is sent to the presentation information generation unit 107.
- the presentation information generation unit 107 generates presentation information associated with the worker's employee number and name, etc., corresponding to the identified position information (step S27), and displays the presentation information on the monitor 79 (step S28). ).
- the presentation information may be a sketch of the work room 3 or a camera image.
- the monitor can know in real time in which area of the work room the worker of the input employee number is located.
- the communication tool selection unit 109 selects the connection with the communication tool closest to the worker (step S29), the communication tool in the monitoring room 5 can directly talk to the worker.
- FIG. 13 is a flowchart showing a flow of identifying personal information of a worker leaving the work room.
- the reader device 41 reads tag ID information of the RFID tag 35 possessed by the worker (step S51).
- the read tag ID information is transmitted to the tag ID authentication unit 91 of the host computer 81 together with the read time and the read ID information of the reader device 41.
- the biological information reading device 43 reads the biological information of the worker (step S52).
- the read biometric information is transmitted to the biometric information authentication unit 95 of the host computer 81.
- the tag ID authentication unit 91 receives the sent tag ID information, the ID information of the reader device 41, and the reading time.
- the tag ID authentication unit 91 authenticates the received tag ID information, the ID information of the reader device 41, and the tag ID information recorded in the authentication database 93 used for the collation at the entrance gate 7 (step S53).
- a warning signal is transmitted to the speaker 42 of the exit gate 9. If the authentication of the received tag ID information is successful (Yes in step S54), the tag ID authentication unit 91 sends the authenticated tag ID information to the biometric information authentication unit 95.
- the biometric information authentication unit 95 receives biometric information from the biometric information reading device 43.
- the received biometric information and the tag ID information are authenticated with the vein image of the forefinger associated with the tag ID information recorded in the authentication database 93 used for the collation at the entrance gate 7 (step S55). It is determined whether the worker having the ID information is the person registered in advance. Therefore, it is determined whether the user has the authentication biometric information collated by the entrance gate 7 and the tag ID information. If the authentication of the biometric information is not successful (No in step S56), a warning signal is transmitted to the speaker 39 of the entrance gate 7. If the authentication of the biometric information is successful (Yes in step S56), the exit permission signal is transmitted to the exit door 44 of the exit gate 9. Further, by recording the tag ID information and the reading time in the action history recording unit 97, the leaving of the worker remains as a record (step S57).
- the exit door 44 when the exit door 44 receives the exit permission signal, the exit door 44 opens (step S58), and the worker can exit the working room 3 outside. Further, when the speaker 39 receives the warning signal, a warning sound is notified from the speaker 42 to the worker (step S59). At this time, since the exit permission signal is not sent to the exit door 44, the exit door 44 is not opened.
- the worker holding the RFID tag 35 leaving the working room 3 is not wrong as the person by collating the biometric information recorded in association with the RFID tag 35 with the biometric information read at the time of exit You can check that. This makes it possible to reliably identify who has left the working room 3 even if something goes wrong in the working room 3.
- the management system 1 ′ in the second embodiment includes the number of workers shown in the image taken in the work room 3 and the work room shown in the image It has a function of comparing the number of RFID tags detected in the three areas.
- FIG. 14 is a block diagram showing a schematic configuration of an entrance management system according to a second embodiment.
- the host computer 81 'according to the second embodiment is obtained by adding a tag count unit 111, an image processing unit 113, and a number comparing unit 115 to the host computer 81 according to the first embodiment.
- the configuration of the management system 1 'in the second embodiment is the same as that of the management system 1 of the first embodiment except for the matters described below.
- the tag count counting unit 111, the image processing unit 113, and the number checking unit 115 are configured by a plurality of CPUs, microprocessors, or field programmable gate arrays (FPGAs) and a plurality of hard disks, memories, or SSDs. It may be integrated into one CPU, microprocessor or FPGA and one hard disk, memory or SSD.
- the tag number counting unit 111 as a counting unit counts the number of RFID tags 35 detected in a predetermined area photographed by the camera.
- the position information of each worker specified by the position specifying unit 101 is sent to the tag number counting unit 111. Since the number of position information is the number of RFID tags 35, the position information is used to count the number of tags for each imaging area of each camera.
- the counted tag number is sent to the number comparing unit 115.
- the image processing unit 113 extracts an image of a person included in a predetermined image area of the captured image using image processing, and detects the number of images of the person.
- the detection of the human image uses, for example, pattern matching or HOG (Histograms of Oriented Gradients).
- the number of detected human images is sent to the number comparing unit 115.
- FIG. 11 illustrates the image of the camera 59
- two human images are detected from the image shown in FIG. Since the image area and the area where the position is specified are related, it is possible to detect in which area the image of the person is in the image area to which the lowermost dot of the image of the person belongs. . Further, since the detection area of the camera 59 is the areas 45a, 45b, 47a, even if there is an image of a person on the area 51b, the image of this person is not detected.
- the number checking unit 115 determines whether the number of tags detected by the tag number counting unit 111 matches the number of people detected by the image processing unit 113. If the number of tags matches the number of people, the process ends. If the number of tags does not match the number of people, a warning signal and a corresponding camera image are sent to the monitor 79.
- the monitor 79 displays a camera image for capturing an area in which the number of tags does not match the number of people. In addition, warning information indicating that they do not match is displayed.
- FIG. 15 is a flow chart showing the flow of comparison between the number of tags and the number of workers.
- the tag ID information reading (step S1) in the work room 3 is the same as that of the first embodiment, so the description will be omitted.
- the host computer 81 'receives the tag ID information, the reader ID information and the reading time sent from the working room 3. These pieces of information are subjected to the processing described in the first embodiment, and position information of each worker detected at the same time from the position specifying unit 101 is sent to the tag number counting unit 111.
- the tag number counting unit 111 counts the number of pieces of tag ID information detected for each assigned imaging area (step S71). As shown in FIG. 16, for example, detection areas of the camera 59 are areas 45a, 45b, and 47a. The number of pieces of position information (the number of tag ID information) specified by the position specifying unit 101 in these areas is counted. The counted number of pieces of tag ID information is sent to the number check unit 115.
- the image processing unit 113 detects an image of a person in the detection area in the captured image of the camera, and counts the number of images of the detected person (step S72). The counted number is sent to the number check unit 115.
- the number comparing unit 115 determines whether or not the counted number of tag ID information (position information) matches the counted number of people (step S73). If the counted number of tag ID information matches the counted number of people (Yes in step S73), there is no problem and the process is ended. If the counted number of tag ID information and the counted number of people do not match (No in step S73), warning information for warning that they do not match is displayed on the monitor 79 (step S74). In addition, an image of a camera for capturing an area whose number does not match is displayed on the monitor 79 (step S75). Further, a communication tool capable of communicating with the area whose number does not match is selected (step S76). The observer can confirm the situation with the worker using the communication tool. Also, the observer can be careful to carry, for example, the RFID tag 35.
- the worker must always carry the RFID tag 35 in the work room 3. Therefore, it is possible to prevent a worker from making fraud while placing the RFID tag 35 at another place in the work room 3.
- the present invention is not limited to the above embodiment, but can be modified as follows.
- the entrance management system 1 includes a biological information reader 38 as a first biological information reader, a reader 37 as a first reader, a biological information authentication unit 95 as an authentication unit, a reader 45 as a second reader, 47, 49, 51, 53, 55, and the position specifying unit 101 may be configured.
- a biological information reader 38 as a first biological information reader
- a reader 37 as a first reader
- a biological information authentication unit 95 as an authentication unit
- a reader 45 as a second reader
- the position specifying unit 101 may be configured.
- the position of the user who holds the wireless tag can be specified by the plurality of reader devices 45, 47, 49, 51, 53, 55 arranged so that the reading areas are different in the management area. Since the location of the user is identified, it is possible to manage the user's behavior in the controlled area. When the user enters the control area, by establishing the association between the ID information of the wireless tag and the biometric information of the user, the user at the position specified by the wireless tag can receive the biometric information The degree of credibility of the person who owns it increases. Therefore, it is possible to prevent the user's fraudulent acts in the controlled area.
- the number of reader devices installed in the control area is not limited to six, and may be any number of two or more. Also, there may not be a supervisor.
- each reading field of reader apparatus 45, 47, 49, 51, 53, 55 overlapped, it is not restricted to this. That is, the reading areas of the tag ID information of the respective reader devices do not have to overlap.
- the reader device may be arranged such that only the area around the important apparatus is the area for reading tag ID information.
- the entrance management system 1 includes the communication tools 65, 67, 69, 71, 73, 75, 83 and the communication tool selection unit 109.
- the configuration may not be provided. .
- the inside of the work room 3 is photographed using a plurality of cameras in the work room 3, but the invention is not limited to this. As long as the camera has a 360 degree view angle, only one camera may be installed. By correlating the viewing angle of the camera with the reading area of the reader device in advance, it is possible to know in which part of the camera image the worker whose tag is detected is taken.
- the position of the worker is specified based on the ID information of the reader detected by the RFID tag 35.
- the position of the worker may be specified based on the radio wave intensity of the detected RFID tag 35.
- the radio wave intensity a value obtained by reading the RFID tag 35 at predetermined time intervals shorter than one cycle period and counting the number read in one cycle period can be used. When the worker is close to the reader device, the count value is large, and when the worker is far from the reader device, the count value is small. Therefore, it can be known whether the worker is near or far from the reader device.
- FIG. 17 is a view showing an example of the arrangement of the reader device.
- the reading area Ar of each reader device An overlaps the reading area Ar of the reader device An arranged next to it.
- the square lattice arrangement is not limited to the square arrangement, and may be a rectangular arrangement.
- the arrangement of the reader apparatus An is not limited to the square lattice, and may be arranged in a triangular lattice.
- the triangular grid arrangement has a smaller overlapping area of the reading area Ar as compared with the square lattice arrangement, and therefore the same number of reader apparatuses An Even in the triangular lattice arrangement, a wider range can be read.
- the square lattice arrangement since the overlapping area is large, the position of the RFID tag 35 is specified in more detail.
- the controlled entry area may be a facility such as a factory, a bank, a hospital, a company, a data center, as well as a room such as a work room.
- the entrance management system and entrance management method according to the present invention are useful as entrance management in entrance management areas such as factories, banks, hospitals, companies, data centers and the like.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Alarm Systems (AREA)
Abstract
La présente invention concerne un système de gestion d'entrée/de sortie comprenant : un premier dispositif de lecture d'informations biométriques qui est installé au niveau d'une porte d'entrée d'une zone au niveau de laquelle l'entrée d'utilisateurs est gérée, et qui lit des informations biométriques ; un premier dispositif de lecture qui est installé au niveau de la porte d'entrée et qui lit des informations d'identification d'une étiquette sans fil ; une unité d'authentification qui authentifie les informations biométriques lues par le premier dispositif de lecture d'informations biométriques, par comparaison desdites informations biométriques à des informations biométriques préenregistrées ayant une autorité d'entrée, et qui établit une liaison entre lesdites informations biométriques et les informations d'ID lues par le premier dispositif de lecture ; une pluralité de seconds dispositifs de lecture installés dans la zone de telle sorte que les régions de lecture d'informations d'ID d'étiquette sans fil diffèrent ; et une unité d'identification de position qui identifie la position de l'utilisateur dans la zone, sur la base des informations d'ID lues par les seconds dispositifs de lecture.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2019516727A JP6624340B2 (ja) | 2017-07-21 | 2018-07-19 | 入場管理システムおよび入場管理方法 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2017-142064 | 2017-07-21 | ||
| JP2017142064 | 2017-07-21 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019017440A1 true WO2019017440A1 (fr) | 2019-01-24 |
Family
ID=65016054
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2018/027145 Ceased WO2019017440A1 (fr) | 2017-07-21 | 2018-07-19 | Système et procédé de gestion d'entrée/de sortie |
Country Status (2)
| Country | Link |
|---|---|
| JP (1) | JP6624340B2 (fr) |
| WO (1) | WO2019017440A1 (fr) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2021174434A (ja) * | 2020-04-30 | 2021-11-01 | コニカミノルタ株式会社 | 通信端末、位置検出システム、およびプログラム |
| JP7015901B1 (ja) | 2020-12-28 | 2022-02-03 | 株式会社フジタ | 入退場管理システム、ユニットパネル、およびユニットハウス |
| JP2022041404A (ja) * | 2020-09-01 | 2022-03-11 | コニカミノルタ株式会社 | 通信端末、位置検出システム、およびプログラム |
| JP2024023744A (ja) * | 2020-02-28 | 2024-02-21 | 綜合警備保障株式会社 | タグ携帯監視装置、タグ携帯監視システム及びタグ携帯監視方法 |
| US11924196B2 (en) | 2020-04-30 | 2024-03-05 | Konica Minolta, Inc. | Communication terminal and position detection system |
| WO2024053045A1 (fr) * | 2022-09-08 | 2024-03-14 | 日本電気株式会社 | Système de traitement d'informations, procédé de traitement d'informations et support d'enregistrement |
| WO2025191814A1 (fr) * | 2024-03-14 | 2025-09-18 | 日本電気株式会社 | Dispositif de traitement d'informations, procédé de traitement d'informations et support d'enregistrement |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040229560A1 (en) * | 2002-10-10 | 2004-11-18 | Maloney William C. | Methods of tracking and verifying human assets |
| JP2006146736A (ja) * | 2004-11-24 | 2006-06-08 | Hitachi Ltd | センサと無線ネットワークを利用した個人認証システム |
| JP2011047270A (ja) * | 2010-09-24 | 2011-03-10 | Oki Electric Industry Co Ltd | ゲート装置、管理装置 |
| WO2011043732A1 (fr) * | 2009-10-05 | 2011-04-14 | Actatek Pte Ltd | Conservation d'enregistrements dans un système d'accès sécurisé |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0511039A (ja) * | 1991-07-02 | 1993-01-19 | Shimizu Corp | 所在確認システム |
| JP2004005511A (ja) * | 2002-03-26 | 2004-01-08 | Toshiba Corp | 監視システム、監視方法および監視プログラム |
-
2018
- 2018-07-19 WO PCT/JP2018/027145 patent/WO2019017440A1/fr not_active Ceased
- 2018-07-19 JP JP2019516727A patent/JP6624340B2/ja active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040229560A1 (en) * | 2002-10-10 | 2004-11-18 | Maloney William C. | Methods of tracking and verifying human assets |
| JP2006146736A (ja) * | 2004-11-24 | 2006-06-08 | Hitachi Ltd | センサと無線ネットワークを利用した個人認証システム |
| WO2011043732A1 (fr) * | 2009-10-05 | 2011-04-14 | Actatek Pte Ltd | Conservation d'enregistrements dans un système d'accès sécurisé |
| JP2011047270A (ja) * | 2010-09-24 | 2011-03-10 | Oki Electric Industry Co Ltd | ゲート装置、管理装置 |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2024023744A (ja) * | 2020-02-28 | 2024-02-21 | 綜合警備保障株式会社 | タグ携帯監視装置、タグ携帯監視システム及びタグ携帯監視方法 |
| JP7620076B2 (ja) | 2020-02-28 | 2025-01-22 | 綜合警備保障株式会社 | タグ携帯監視装置、タグ携帯監視システム及びタグ携帯監視方法 |
| JP7468121B2 (ja) | 2020-04-30 | 2024-04-16 | コニカミノルタ株式会社 | 通信端末および位置検出システム |
| JP2021174434A (ja) * | 2020-04-30 | 2021-11-01 | コニカミノルタ株式会社 | 通信端末、位置検出システム、およびプログラム |
| US11924196B2 (en) | 2020-04-30 | 2024-03-05 | Konica Minolta, Inc. | Communication terminal and position detection system |
| JP7463915B2 (ja) | 2020-09-01 | 2024-04-09 | コニカミノルタ株式会社 | 通信端末、位置検出システム、およびプログラム |
| JP2022041404A (ja) * | 2020-09-01 | 2022-03-11 | コニカミノルタ株式会社 | 通信端末、位置検出システム、およびプログラム |
| JP2022103815A (ja) * | 2020-12-28 | 2022-07-08 | 株式会社フジタ | 入退場管理システム、ユニットパネル、およびユニットハウス |
| JP2022104636A (ja) * | 2020-12-28 | 2022-07-08 | 株式会社フジタ | 入退場管理システム、ユニットパネル、およびユニットハウス |
| JP7554214B2 (ja) | 2020-12-28 | 2024-09-19 | 株式会社フジタ | 入退場管理システムおよびユニットハウス |
| JP7015901B1 (ja) | 2020-12-28 | 2022-02-03 | 株式会社フジタ | 入退場管理システム、ユニットパネル、およびユニットハウス |
| WO2024053045A1 (fr) * | 2022-09-08 | 2024-03-14 | 日本電気株式会社 | Système de traitement d'informations, procédé de traitement d'informations et support d'enregistrement |
| JPWO2024053045A1 (fr) * | 2022-09-08 | 2024-03-14 | ||
| WO2025191814A1 (fr) * | 2024-03-14 | 2025-09-18 | 日本電気株式会社 | Dispositif de traitement d'informations, procédé de traitement d'informations et support d'enregistrement |
Also Published As
| Publication number | Publication date |
|---|---|
| JPWO2019017440A1 (ja) | 2019-11-07 |
| JP6624340B2 (ja) | 2019-12-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6624340B2 (ja) | 入場管理システムおよび入場管理方法 | |
| US20250384115A1 (en) | System and method for provisioning a facial recognition-based system for controlling access to a building | |
| JP6887028B2 (ja) | ドアアクセス制御方法、ドアアクセス制御装置、システム及び記憶媒体 | |
| EP3704642B1 (fr) | Procede et systeme de controle de l'acces aux ressources d'entreprise sur la base d'un suivi | |
| JP4751442B2 (ja) | 映像監視システム | |
| US10915777B2 (en) | Communication terminal, communication system, and image processing method | |
| US12167243B2 (en) | System and method for encounter identity verification | |
| US11716330B2 (en) | Mobile enrollment using a known biometric | |
| US11734981B2 (en) | Enhanced entry authorization | |
| WO2019017439A1 (fr) | Système de gestion d'entrée/sortie et procédé de gestion d'entrée/sortie | |
| US20110148576A1 (en) | Device, System and Method for Personnel Tracking and Authentication | |
| JP4571426B2 (ja) | 認証システム | |
| KR102200686B1 (ko) | 안면인식 및 인식표 기반의 병원 관리 시스템 및 방법 | |
| JP2022531150A (ja) | 生体認証を伴うセキュリティ・システム及びプロセス | |
| US8442277B1 (en) | Identity authentication system for controlling egress of an individual visiting a facility | |
| US10057258B2 (en) | Biometric identification device | |
| US12301567B2 (en) | Systems and methods for identity verification | |
| JP2016206904A (ja) | 監視システム | |
| WO2024068034A1 (fr) | Sécurité de périmètre contrôlé | |
| JP6465908B2 (ja) | 管理システム、管理方法 | |
| HK40067680A (en) | Security systems and processes involving biometric authentication | |
| TW201447821A (zh) | 訪客管理系統 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18835172 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2019516727 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18835172 Country of ref document: EP Kind code of ref document: A1 |