Security apparatus and method
A security apparatus. A service is supplied to a user while maintaining the security of the service. A person discrimination section discriminates the user to be supplied the service. A user situation decision section decides whether the user is under a situation to use the service. An infringement situation decision section detects whether a non-user intrudes into a use area of the service in order to decide whether the security of the service is infringed. A service control section supplies the service to the user in case the person discrimination section discriminates the user, and controls a supply of the service if the use situation decision section decides the user is not under the situation to use the service or the infringement situation decision section decides that the security of the service is infringed.
Latest Kabushiki Kaisha Toshiba Patents:
- MAGNETIC DISK DEVICE WITH RECORDING CURRENT ARRANGEMENT
- CONTEXT MATCHING RELATED INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING DEVICE
- SENSOR AND CAPACITOR DEVICE
- CERAMIC CIRCUIT SUBSTRATE, SEMICONDUCTOR DEVICE, METHOD FOR MANUFACTURING CERAMIC CIRCUIT SUBSTRATE, AND METHOD FOR MANUFACTURING SEMICONDUCTOR DEVICE
- ELECTROCHEMICAL DEVICE, SENSOR, AND SENSOR SYSTEM
This application is a reissue of Ser. No. 08/810,623 filed on Feb. 28, 1997 (U.S. Pat. No. 6,049,875).
BACKGROUND OF THE INVENTION1. Field of the Invention
The present invention relates to a security apparatus and a method for supplying a service to a user by confirming a use situation of the user and infringement situation of non-user in order to keep safety and reliability for the service.
2. Description of the Related Art
A method to specify the user in service-use area by electrical means and to execute security for each kind of service is very important in present electrical society. Various kinds of security means, for example, memorized number, magnetic card, IC card, wireless card, sound comparison, fingerprint comparison, retina comparison and face comparison, have been used. However, the memorized number, the magnetic card, the IC card and the wireless card specifies the user by information only the user knows or with a memory device key for only the user. Therefore, they are in danger of being used unjustly.
On the other hand, sound comparison, fingerprint comparison, retina comparison, and face comparison are effective personal confirmation means to defect detect an other's unjust use because the user's physical features are used as a key. However, the personal confirmation is only used at the beginning of service. After the service begins, the service can not be interrupted. Therfore Therefore, even if an other person changes for the user after the service is begun, the service can not be interrupted. In short, this kind of service includes danger that the other person utilizes the service unjusty unjustly. This kind of problem is included in the memorized number, the magnetic card, the IC card and the wireless card.
As mentiored mentioned above, the known security apparatuses include the following problems.
(1) After security is cancelled by confirming the user, security function is not executed while supplying the service. Therefore, even if an other person changes for the user, the service is still supplied continuously.
(2) While supplying the service to the user, it often happens that an other person watches information not to be disclosed on display from behind the user. This problem occurs because security is not provided in the physical space surrounding the user and the apparatus even if security is executed inside the apparatus electrically. Especially, this problem happens when the service is supplied to the user in public place in which other persons are not excluded.
SUMMARY OF THE INVENTIONIt is an object of the present invention to provide a security apparatus and method to supply a service to the user while safety and reliability for the service are kept.
According to the present invention, there is provided a security apparatus for a device supplying a service to a user, comprising: person discrimination means for recognizing a user requesting the service; use situation decision means for deciding whether the user is under a situation to use the service; infringement situation decision means for detecting whether a non-user intrudes into a use area the service to decide whether of the service is infringed; service control means for supplying the service to the user in case said person discrimination means recognizes the user, and for controlling a supply of the service if said use situation decision means decides the user is not under the situation to use the service or if said infringement situation decision means decides that the security of the service is infringed.
Further in accordance with the present invention, there is provided a security method associated with supplying a service to a user, comprising the step of: recognizing a user desiring the service: supplying the service to the user if the user is recognized; deciding whether the user is under a situation to use the service; deciding whether a non-user intrudes into a use area of the service; and controlling the supply of the service if the user is not under the situation to use the service or if the non-user is intruding into the use area of the service.
Further in accordance with the present invention, there is also provided a computer readable memory containing computer-readable instructions to supply a service to a user, comprising: instruction means for causing a computer to recognize a user desiring the service; instruction means for causing a computer to supply the service to the user if the user is recognized; instruction means for causing a computer to decide whether the user is under a situation to use the service; instruction means for causing a computer to decide whether a non-user intrudes into a use area of the service; and instruction means for causing a computer to control a supply of the service if the user is decided not under the situation to use the service or the non-user is decided to intrude into the use area of the service.
The embodiments of the present invention are described below with reference to the drawings.
The situation that a non-user infringes the security of the user represents that a person other than the confirmed user intentionally or accidentally uses the service while the service is supplied to the confirmed user. The other person can then interact with the operation or information to be disclosed only to the confirmed user. When the user interacts with the service application of the system through a display, the other person looks on the display behind the user. Otherwise, the other person intends to interact with the service application in the user's absence within the predetermined time.
In order to detect each situation, the situation detection section 1 monitors service-use area using image or sound. Especially, the use situation of the user and the infringement situation of the security are detected by the image (person detection/direction of face detection/person confirmation) and the sound (person detection/person specification/chattering detection). Monitoring may be wireless.
The service supply permission section 2 controls start/interruption/interruption and cancellation/end of the service for the service supply section 3 according to the detection result of the situation detection section 1. In this case, the service supply permission section 2 starts the supply of the service when the user is specified in the service-use area. The service supply permission section 2 controls the supply of the service in at least one of the cases where the user does not utilize the service or where the security of the user is infringed. Especially when the use does not utilize the service during the supply of the service, the supply of the service finishes. If the security of the user is infringed by another person, the supply of the service interupts interrupts until the infringement is relieved. The service supply section 3 supplies various kinds of service under the control of the service supply permission section 2. For example, an uninhabited ATM (antomatic automatic teller's machine), a portable terminal, or a computer used by several persons may comprise the service supply section 3.
The person comparison section 13 compares the person present area image with the content of a person comparison dictionary to specify which person is present in the secure area image. The person comparison dictionary previously stores at least comparison information of persons permitted to use the service. The person comparison section 13 outputs person discrimination information D2 representing whether the person present coincides with a person permitted to use the service. If the person present coincides with a person permitted to use the service in the person comparison dictionary, the person present is registered as the user who can be supplied the service.
The use situation decision section 14 detects whether the user is under a situation capable of using the service. After the user of the person area is registered and if the registered user is now included in the person discrimination information D2, the user is decided to be capable of using the service. The use situation decison decision section 14 outputs use situation information D3 representing whether the user is capable of using the service.
The infringement situation decision section 15 detects whether a non-user infringes the security of the service. If a person other than the user utilizing the service now is included in the person discrimination information D2, the infringement situation decision section 15 decides that the security of the service is infringed, and outputs infringement situation information D4 indicates a breach of security. The person detection/non-detection information D1, the person discrimination information D2, the use situation information D3, the infringement situation information D4 are called person information. The person information is read out by the service supply permission section 2 (step S1 in
The above process steps (steps S1-S7) are the same as normal confirmation of security (from confirming the user to begining beginning the supply of the service). In this place, after the supply of the service is begun, the registered user exists in the service-use area and the registered person must be detected at step S1. After the supply of the service is begun, the processing is returned to step S8 through steps S1 and S2.
The service supply permission section 2 decides whether the registered person is using the service according to the use situation information D3 (step S8). As a result, if the situation of using the service is detected, for example, a user's absence continues above a predetermined time (“No” at step S8), the service supply permission section 2 terminates the supply of the service immediately (step S9). Next, the registration of the user is cancelled (step S10) and the processing returns to step S1 in order to register a new user.
On the other hand, the service supply permission section 2 decides whether a non-user infringes the security of the user according to the infringement situation information D4 (step S11). As a result, if the situation that a non-user infringes the security is detected, for example, an other person watches the display behind the user during the supply of the service (“Yes” at step S11), the service supply permission section 2 temporarily interrupts the service to maintain security untill the security is not infringed (step S12). If a situation that the security is not infringed is detected during the interruption of the service (“Yes” at step S13), the service supply permission section 2 cancels the interruption of the service and begins the supply of the service (step S14).
In this way, in case the user permitted the service is specified in the service use area, the supply of the service is begun. During the supply of the service, if the user is not using the service or if the security is breached, the supply of the service finishes or interrupts. Accordingly, the security is maintained during all periods of begining beginning/supplying/end of the service. For example, in case the registered user is confirmed and supplied money through an Automatic Teller Machine, or the user operates a handy terminal by watching secret information on a display, the security of the user is effectively protected according to the present invention.
Next, additional embodiments of the present invention will be explained.
(a) ease of monopoly of terminal/improvement of common use of terminal (second embodiment)
In the first embodiment, another person can not use the terminal while the user is supplied the service through the terminal. Therefore, the other person must wait to use the same terminal untill until the first user finishes. In short, in the first embodiment, use by a specified user for the terminal excludes use by an other another person.
In a second embodiment, in case the situation for the user not capable of using the service is detected before the supply of the service for the user finishes, the supply of the service is reserved (interrupted) and the new user can be supplied the service from the begining beginning. As a result, during the interruption of the service, a different service is supplied to another user. When the original user comes back to the terminal, the reserved service is supplied to the original user again. Therefore, while each service is not completed respectively, plural users can be supplied each service from the same terminal one after another. Additionally, if the original user does not come back to the same terminal, the reserved service is finished and memory area corresponding to the reserved service is relieved to save memory resources.
In this place, assume that a user A creates a document using a terminal A and leaves from the terminal A without completing the work. The terminal A detects that the user A is not using the service (“No” at step S8) and that the supply of the service is not completed (“No” at step S15). The service of creating the document at the present time is stored (reserved) in a memory area of the terminal and the supply of the teminal terminal is interrupted (step S16, S17). In this case, the situation for the user not using the service is detected according to the use situation information D3. Completion situation of the supply of the service is decided by completion notice sent by the user. Next, a user B is confirmed by the teminal terminal A and works through the terminal A. Assume that when the user A comes back to the terminal A, the user B goes away from the terminal A. The terminal A newly reserves the results of the service for the user B (steps S8, S15, S16, S17) and begins the supply of the reserved service to the user A (steps S8, S11, S13, S14). The memory area to store the result of the service is commonly used by each terminal on the network. Therefore, if the user B is confirmed by a terminal B (steps S4, S6, S7), the reserved result of the service for the user B is supplied through the terminal B (steps S8, S11, S13, S14). On the other hand, if the user A does not come back to the terminal A during a predetermined time (“Yes” at step S18), the terminal A finishes the service of the user A immediately and relieves the memory area corresponding to the service result of the user A (steps S9, S10). In this way, a situation of storing many service results in memory area is prevented. The predetermined time as decison decision standard at step S18 is freely set by the kind of the service.
As mentioned above, in the second embodiment, the supply of the service for each user is reserved untill until the work of each user is completed. In short, a right service-use generated by confirming the user is assured untill until the user's work is completed. The user B does not have to wait untill until the user A finishes using the terminal. By changing the user A for the user B, the user B can use the terminal without infringement for the security of the user A.
(b) Extention Extension for unspecified user (third embodiment)
In the first embodiment, in order to be supplied the service, the user must be confirmed as a registered person. In short, if the user is not previously registered, he can not be supplied the service. However, there is a service to be used by many and unspecified persons. Therefore, in a third embodiment, the service is supplied to an unspecified person without confirmation. At that time, a comparison dictionary of the unspecified person is generate and registered. During the supply of the service, the user (the unspecified person) is discriminated from other users by referring to the comparison dictionary. Therefore, the service is supplied to many and unspecified persons while the security is maintained.
(c) Warning of infringement (fourth embodiment)
In the fourth embodiment, when an infringement situation of the security is detected, a warning is sent to the user. In this case, the service supply permission section 2 controlls controls the begining beginning and end of the service and does not execute interruption and cancellation of the service in case of infringement of the security.
(d) Interactive controlling in case of warning (fifth embodiment)
In the fifth embodiment, by using input means (key board) and output means (display), the supply of the service is controlled by the user's operation for the warning.
The interactive control section 4 receives an indication of the user for the warning of the infringement and controlls the supply of the service according to the indication. The kind of the indication is continuation/interruption/end of the service. The user selects the kind of the indication by, for example, using a keyboard. In
If the user indicates continuation of the service (“CONTINUATION” at step S21), the interactive control section 4 outputs the indication of continuation to the service supply permission section 2. The service supply section 3 continues to supply the service according to the indication of continuation.
If the user indicates interruption of the service (“INTERRUPTION” at step S21), the interactive control section 4 outputs the indication of interruption to the service supply permission section 2. The service supply section 3 interrupts the supply of the service according to the indication of the interruption.
If the user indices end of the service (“END” at step S21), the interractive interactive control section 4 outputs the indication of end to the service supply permission section 2. The service supply section 3 finishes the supply of the service.
In this way, when the user receives the warning of infringement, the user can select continuation/interruption/end of service by using interactive function. As a result, if the user works through equipment in an office, whenever an office colleague (person not necessary for security) stands behind the user, interruption of the work is excluded. In short a change for the worse an interruption, of use-feeling of the equipment is avoided. Otherwise, when using the equipment in a public place, interruption of the service is indicated by the user for the warning of a non-user standing behind the user.
In the fifth embodiment, the user can select the indication to keep security in case of infringement of the security. After selecting the indication, the apparatus (equipment) can automatically keep the security of the user. In this case, if the warning of the infringement is outputted as an image, the user understands circumstances around the user by watching the image (the user and non-user are included). The user can select the indication (continuation/interruption/end of the service) according to the circumstances.
(e) Default action of neglecting the warning (sixth embodiment)
In the sixth embodiment, in case the indication is not selected by the user within predetermined time after generating the warning, the apparatus automatically executes predetermined (default) controlling of the supply of the service. This predetermined controlling is freely set by the user.
In this way, if the user neglects a warning of infringement, the security of the user is kept according to a predetermined control (action of default). Otherwise, it is possible to control the supply of the service different form the predetermined control for some reasons by a user's indication in case of the warning. For example, in an office, as for the warning generated whenever a colleague stands behind the user operating the equipment, the user does not have to indicate continuation of the service. The predetermined control is already set as continuation of the service. In this case, the user can continue the operation while neglecting the warning. In case the user operates the equipment in a public place, the predetermined control is set as interruption of the service. In this case, security of the user for the equipment is protected while he neglects the warning.
(f) Security degree by unit of service/information (seventh embodiment)
In the above embodiments, predetermined security is activated for service or information. However, security degree is actually different by unit of service/information. If a fixed security degree is activated, useless interruption of the service is often executed. This happens in case of plural workers using information equipment. Accordingly, it is desired that the security is activated according to the kind of the service/information. For example, assume that electric mail is transmitted using a PC (personal computer) or a document is created using WP (word processor). Plural services are then supplied on the display of the equipment. The electric mail represents a private letter and its security degree is high. On the other hand, the security degree of the document by WP differs according to the kind of the document. While the user creates the document whose security degree is low, the security degree of the document grows by adding another important document. In this way, the security degree is dynamically changed according to the kind of the service/information.
In the seventh embodiment, the security degree is changed by unit of the service/information.
As for setting the security degree, for example, the user sets disclosure-possible at the head portion of mail to be sent. A window showing the mail tool does not react to the infringement of the security. As for both sending side or receiving side, the mail is able to remain disclosing.
If the user indicates a strict secret at the header of a document, the WP window to display the document reacts to the infringement of security. For example, the sequrity security degree for creating the document is dynamically changed by adding other important document. In this way, even if the service is supplied to the same object, the supply of the service is interrupted or continued according to the content (for example, regular document or strict secret document).
(g) detection of visual line 1 (eighth embodiment)
In the above embodiments, when another person watches the display behind the user creating a document, the infringement of security of the user is detected. However, it is not necessary to pay attention to the other person, but to pay attention to the visual line (or line of sight) of the user. For example, when the visual line of the user leaves the screen of the display, the window may be closed. In the eighth embodiment, by detecting a visual line of the user as use situation, the supply of the service is interrupted when the visual line leaves the screen.
In this way, in the eighth embodiment, the visual line information D5 is outputted to the service supply permission section 2 as one of the person information.
In this way, in the eighth embodiment, detection of the visual line of the user controlls controls the supply of the service. Therefore, when another person walks behind the user, security of the service is kept only if the visual line of the user departs from the display.
(h) Detection of visual line 2 (ninth embodiment)
In the eighth embodiment, a direction of the visual line of the user controlls controls the supply of the service. However, if another person looks furtively at the display behind the user, the supply of the service can not be controlled. If the user turns his eyes away from the display whenever the other person walks behind the user, the supply of the service is interrupted to every time. Therefore, in the ninth embodiment, detection of the visual line of the non-user controlls controls the supply of the service.
In this way, in the ninth embodiment, the detection of the visual line of the non-user controlls the supply of the service. Therefore, in case the non-user looks furtively at the display behind the user, the security of the service for the user is kept.
(i) Detection of visual line 3 (tenth embodiment)
In the tenth embodiment, detection of the visual line of the user and the non-user controlls controls the supply of the service.
On the other hand, assume that the direction of the user points to the predetermined area of the display (the user does not turn his eyes away from the display) (“No” at step S26) and the situation detection section 1 detects that the non-user infringes the service of the user (“Yes” at step S11). In this case, the visual line detection section 16 keeps watch for movement of the visual line of the non-user. If the direction of the visual line of the non-user points to the predetermined area of the display (the non-user watches the display behind the user) (“No” at step S27), the situation detection section 1 outputs the visual line information to the service supply permission section 2. The service supply permission section 2 controlls controls the service supply section 3 to interrupt the supply of the service (step S12).
In this way, in the tenth embodiment, detection of the visual line of the user and the non-user controlls controls the supply of the service. Therefore, the security of the service for the user is strengthened.
In the eighth, ninth, tenth embodiments, the visual line of the user or the non-user is detected. However, by detecting a direction of a face of the user or non-user, the supply of the service may be controlled. In this case, as for the user, if the direction of the user's face does not point to the display, the supply of the service is interrupted. As for the non-user, if the direction of the non-user's face points to the display, the supply of the service is interrupted. As for the method for detecting the direction of the face, the face area is extracted from the image including the user or the non-user. The direction of the face is pursued according to the face area.
In the above embodiments, the image is used for detecting the person information. However, sound or wireless may be used for detecting the person information. In case of the sound, the user is specified by the user's voice existing in the service-use area. If the user's voice is continuously detected, it is decided that the user is under a situation to be supplied the service. If a voice other than the user's is detected, it is decided that the security of the service of the user is infringed. In case of the wireless, the user is specified by detecting ID information of a wireless card. The user previously brings the wireless card with him. If the ID information of the user's wireless card is continuously detected, it is decided that the user is under a situation to be supplied the service. If ID information other than the user's wireless card is detected, it is decided that the sequrity security of the service of the user is infringed.
A memory can be used to store instructions for performing the process described above, such a memory can be a CD-ROM, floppy disk, hard disk, magnetic tape, semiconductor memory, and so on.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with the true scope and spirit of the invention being indicated by the following claims.
Claims
1. A security apparatus for a device supplying a service to a user in a service use area surrounding the user, comprising:
- image input means for continuously inputting an image to monitor the service use area;
- person discrimination means for continuously recognizing a person in the input image, and for registering the person as a user allowed to use the service if the person is recognized as an authorized user;
- use situation decision means for deciding that the user is not under a situation to use the service in case the user is not recognized in the input image;
- infringement situation decision means for deciding that a security of the service use area is infringed in case at least one person other than the authorized user is recognized in the input image; and
- service control means for supplying the service to the authorized user and for controlling a supply of the service if said use situation decision means decides that the user is not under the situation to use the service or if said infringement situation decision means decides that the security of the service use area is infringed.
2. The security apparatus according to claim 1, wherein said service control means finishes the supply of the service in case said use situation decision means decides the user is not under the situation to use the service.
3. The security apparatus according to claim 1,
- wherein said service control means interrupts the supply of the service until the infringement situation is relieved in case said infringement situation decision means decides the security of the service is infringed.
4. The security apparatus according to claim 1,
- wherein said service control means decides whether work of the user for the service is completed or not in case said use situation decision means decides the user is not under the situation to use the service.
5. The security apparatus according to claim 4,
- wherein said service control means finishes the supply of the service in case the work of the user for the service is completed, interrupts the supply of the service in case the work of the user for the service is not completed, and relieves an interruption of the supply of the service in case said use situation decision means decides the user is under the situation to use the service again.
6. The security apparatus according to claim 1,
- wherein said person discrimination means recognizes the user by referring to a person comparison dictionary to recognize persons allowed to use the service.
7. The security apparatus according to claim 1,
- wherein said person discrimination means generates a person comparison dictionary to recognize unspecified users allowed to use the service, and recognizes the unspecified person by referring to the person comparison dictionary while the unspecified person is a user.
8. The security apparatus according to claim 1,
- wherein said service control means sends a warning to the user when said infringement situation decision means decides the security of the service is infringed.
9. The security apparatus according to claim 8,
- wherein said service control means controls the supply of the service in accordance with an indication of the user being warned.
10. The security apparatus according to claim 1,
- wherein said service control means controls the supply of the service in accordance with security degrees preset in a unit of the service information for the service.
11. The security apparatus according to claim 1,
- wherein said service control means detects movement of the visual line or a direction of the face of the user and controls the supply of the service in accordance with the movement of the visual line or the direction of the face of the user.
12. The security apparatus according to claim 1,
- wherein said service control means detects movement of the visual line or a direction of the face of the non-user and controls the supply of the service in accordance with the movement of the visual line or the direction of the face of the non-user.
13. A security apparatus for a device supplying a service to a user, comprising:
- person discrimination means for recognizing a user requesting the service;
- use situation decision means for deciding whether the user is under a situation to use the service;
- infringement situation decision means for detecting whether a non-user intrudes into a use area of the service to decide whether the service is infringed; and
- service control means for supplying the service to the user in case said person discrimination means recognizes the user, and for controlling a supply of the service if said use situation decision means decides the user is not under the situation to use the service or if said infringement situation decision means decides that the security of the service is infringed,
- wherein said service control means decides whether work of the user for the service is completed or not in case said use situation decision means decides the user is not under the situation to use the service,
- wherein said service control means finishes the supply of the service in case the work of the user for the service is completed, interrupts the supply of the service in case the work of the user for the service is not completed, and relieves an interruption of the supply of the service in case said use situation decision means decides the user is under the situation to use the service again, and
- wherein said service control means finishes the supply of the service in case said use situation decision means decides the user is not under the situation to use the service within a predetermined time during the interruption of the supply of the service.
14. A security apparatus for a device supplying a service to a user, comprising:
- person discrimination means for recognizing a user requesting the service;
- use situation decision means for deciding whether the user is under a situation to use the service;
- infringement situation decision means for detecting whether a non-user intrudes into a use area of the service to decide whether the service is infringed; and
- service control means for supplying the service to the user in case said person discrimination means recognizes the user, and for controlling a supply of the service if said use situation decision means decides the user is not under the situation to use the service or if said infringement situation decision means decides that the security of the service is infringed,
- wherein said service control means sends a warning to the user when said infringement situation decision means decides the security of the service is infringed,
- wherein said service control means controls the supply of the service in accordance with an indication of the user being warned, and
- wherein said service control means controls the supply of the service in accordance with predetermined control information in case of a non-response of the user within a predetermined time after warning of the infringement.
15. A security method associated with supplying a service to a user in a service use area surrounding the user, comprising the steps of:
- continuously inputting an image to monitor the service use area;
- continuously recognizing a person in the input image;
- registering the person as a user allowed to use the service if the person is recognized as an authorized user;
- supplying the service to the authorized user;
- deciding that the user is not under a situation to use the service in case the user is not recognized in the input image;
- deciding that a security of the service use area is infringed in case at least one person other than the authorized user is recognized in the input image; and
- controlling the supply of the service if the user is not under the situation to use the service or if the security of the service use area is infringed.
16. A computer readable memory containing computer-readable instructions to supply a service to a user in a service use area surrounding the user, comprising:
- instruction means for causing a computer to continuously input an image to monitor the service use area;
- instruction means for causing a computer to continuously recognize a person in the input image;
- instruction means for causing a computer to registor the person as a user allowed to use the service if the person is recognized as an authorized user;
- instruction means for causing a computer to supply the service to the authorized user;
- instruction means for causing a computer to decide that the user is not under a situation to use the service in case the user is not recognized in the input image;
- instruction means for causing a computer to decide that a security of the service use area is infringed in case at least one person other than the authorized user is recognized in the input image; and
- instruction means for causing a computer to control a supply of the service if the user is not under the situation to use the service or if the security of the service use area is infringed.
17. A security control apparatus for controlling a supply of a service to a user in a service area, comprising:
- a monitor unit configured to continuously input images of the service area;
- a recognition unit configured to recognize the user as an authorized user from the input images, and to recognize at least one person other than the authorized user from the input images; and
- a service control unit configured to supply the service to the authorized user when the user is recognized in the input images, and to control the supply of the service to the authorized user when the person other than the authorized user is recognized in the input images.
18. The security control apparatus according to claim 17, wherein said service control unit interrupts the supply of the service when the user is not recognized in the input images.
19. The security control apparatus according to claim 17, wherein said service control unit interrupts the supply of the service when the person other than the authorized user is recognized in the input images.
20. The security control apparatus according to claim 17, wherein said service control unit decides whether work of the user for the service is completed when the user is not recognized in the input images.
21. The security control apparatus according to claim 20, wherein said service control unit finishes the supply of the service if the work of the user for the service is completed, interrupts the supply of the service if the work of the user for the service is not completed, and relieves an interruption of the supply of the service when the user is recognized in the input images again.
22. The security control apparatus according to claim 17, wherein said recognition unit recognizes the user by referring to a person comparison dictionary to recognize persons allowed to use the service.
23. The security control apparatus according to claim 17, wherein said recognition unit generates a person comparison dictionary to recognize an unspecified person allowed to use the service, and recognizes the unspecified person as the user by referring to the person comparison dictionary.
24. The security control apparatus according to claim 17, wherein said service control unit sends a warning to the user when the person other than the authorized user is recognized in the input images.
25. The security control apparatus according to claim 24, wherein said service control unit controls the supply of the service in accordance with an indication of the user being warned.
26. The security control apparatus according to claim 17, wherein said service control unit controls the supply of the service in accordance with a security degree preset to each kind of the service.
27. The security control apparatus according to claim 17, wherein said service control unit detects a movement of the visual line or a direction of the face of the user, and controls the supply of the service in accordance with the movement of the visual line or the direction of the face of the user.
28. The security control apparatus according to claim 17, wherein said service control unit detects a movement of the visual line or a direction of the face of the nonuser, and controls the supply of the service in accordance with the movement of the visual line or the direction of the face of the non user.
29. A security control apparatus for controlling a supply of a service to a user in a service area, comprising:
- a person recognition unit configured to recognize a user requesting the service;
- a use situation decision unit configured to decide whether the user is under a situation to use the service in accordance with recognition result of said person recognition unit;
- an intrusion situation decision unit configured to decide whether a non user intrudes into the service area in accordance with recognition result of said person recognition unit; and
- a service control unit configured to supply the service to the user when said person recognition unit recognizes the user, and to control a supply of the service when said use situation decision unit decides the user is not under the situation to use the service or when said intrusion situation decision unit decides the non user intrudes into the service area.
30. The security control apparatus according to claim 29, wherein said service control unit interrupts the supply of the service when said use situation decision unit decides the user is not under a situation to use the service.
31. The security control apparatus according to claim 29, wherein said service control unit interrupts the supply of the service when said intrusion situation decision unit decides the non user intrudes into the service area.
32. The security control apparatus according to claim 29, wherein said service control unit decides whether work of the user for the service is completed or not when said use situation decision unit decides the user is not under the situation to use the service.
33. The security control apparatus according to claim 32, wherein said service control unit finishes the supply of the service if the work of the user for the service is completed, interrupts the supply of the service if the work of the user for the service is not completed, and relieves an interruption of the supply of the service when said use situation decision unit decides the user is under the situation to use the service again.
34. The security control apparatus according to claim 33, wherein said service control unit finishes the supply of the service when said use situation decision unit decides the user is not under the situation to use the service within a predetermined time during the interruption of the supply of the service.
35. The security control apparatus according to claim 29, wherein said service control unit sends a warning to the user when said intrusion situation decision unit decides the non user intrudes into the service area.
36. The security control apparatus according to claim 35, wherein said service control unit controls the supply of the service in accordance with an indication of the user being warned.
37. The security control apparatus according to claim 36, wherein said service control unit controls the supply of the service in accordance with predetermined control information in case of a non response of the user within a predetermined time after warning of the intrusion.
38. A security method for controlling a supply of a service to a user in a service area, comprising the steps of:
- continuously inputting images of the service area;
- recognizing the user as an authorized user from the input images;
- recognizing at least one person other than the authorized user from the input images;
- supplying the service to the authorized user when the user is recognized in the input images; and
- controlling the supply of the service to the authorized user when the person other than the authorized user is recognized in the input images.
39. A computer readable memory containing computer readable instructions to control a supply of a service to a user in a service area, comprising:
- an instruction unit to continuously input images of the service area;
- an instruction unit to recognize the user as an authorized user from the input images;
- an instruction unit to recognize at least one person other than the authorized user from the input images;
- an instruction unit to supply the service to the authorized user when the user is recognized in the input images; and
- an instruction unit to control the supply of the service to the authorized user when the person other than the authorized user is recognized in the input images.
40. A security apparatus for supplying a service to a user in a service use area, the security apparatus comprising:
- image input means for continuously inputting an image to monitor the service use area;
- person discrimination means for continuously recognizing a person in the input image means and for registering the person as an authorized user of the service if the person is recognized;
- use situation decision means for deciding whether the authorized user is under a situation to use the service;
- infringement situation decision means for deciding that a security of the service use area is infringed in case at least one person other than the authorized user is recognized in the input image; and
- service control means for supplying the service to the authorized user and for controlling a supply of the service when the infringement situation decision means decides that the security of the service use area is infringed while the use situation decision means has decided that the authorized user is under the situation to use the service.
41. A security apparatus for supplying a service to a user, the security apparatus comprising:
- person discrimination means for recognizing a user requesting the service;
- use situation decision means for deciding whether the user is under a situation to use the service;
- infringement situation decision means for detecting when a non-user intrudes into a use area of the service;
- service control means for supplying the service to the user in case the person discrimination means recognizes the user and for controlling a supply of the service when the infringement situation decision means detects a non-user intruding into the use area of the service while the use situation decision means has decided that the user is under the situation to use the service, wherein the service control means;
- decides whether work of the user for the service is completed when the use situation decision means decides the user is not under the situation to use the service,
- finishes the supply of the service in case the work of the user for the service is completed, interrupts the supply of the service when the infringement situation decision means detects the non-user intrusion into the use area in case the work of the user for the service is not completed, and relieves an interruption of the supply of the service in case the use situation decision means decides the user is under the situation to use the service again, and
- finishes the supply of the service in case the use situation decision means decides the user is not under the situation to use the service within a predetermined time during the interruption of the supply of the service.
42. A security apparatus for supplying a service to a user, comprising:
- person discrimination means for recognizing a user requesting the service;
- use situation decision means for deciding whether the user is under a situation to use the service;
- infringement situation decision means for detecting whether a non-user intrudes into a use area of the service; and
- service control means for supplying the service to the user in case the person discrimination means recognizes the user, and for controlling a supply of the service when the infringement situation decision means decides the non-user intrudes into the use area of the service while the use situation decision means has decided the user is under the situation to use the service, wherein the service control means;
- sends a warning to the user when the infringement situation decision means detects the non-user intrusion into the user area of the service,
- controls the supply of the service in accordance with an indication of the user, and
- controls the supply of the service in accordance with predetermined control information in case of a non-response of the user within a predetermined time after the warning.
43. A security method associated with supplying a service to a user in a service use area, the security method comprising:
- continuously inputting an image to monitor the service use area;
- continuously recognizing a person in the input image;
- registering the person as an authorized user allowed to use the service if the person is recognized;
- supplying the service to the authorized user;
- deciding that the authorized user is under a situation to use the service;
- deciding that a security of the service use area is infringed in case at least one person other than the authorized user is recognized in the input image; and
- controlling a supply of the service when the security of the service use area is infringed while the authorized user is under the situation to use the service.
44. A computer readable memory having computer-readable instructions to supply a service to a user in a service use area, the computer readable memory comprising:
- means for instructing a computer to continuously input an image of the service use area;
- means for instructing the computer to continuously recognize a person in the input image;
- means for instructing the computer to register the person as an authorized user allowed to use the service if the person is recognized;
- means for instructing the computer to supply the service to the authorized user;
- means for instructing the computer to decide that the authorized user is under a situation to use the service;
- means for instructing the computer to decide that a security of the service use area is infringed in case at least one person other than the authorized user is recognized in the input image; and
- means for instructing the computer to control a supply of the service when the security of the service use area is infringed while the authorized user is under the situation to use the service.
5182770 | January 26, 1993 | Medveczky et al. |
5229764 | July 20, 1993 | Matchett et al. |
5386104 | January 31, 1995 | Sime |
5414852 | May 9, 1995 | Kramer et al. |
5497430 | March 5, 1996 | Sadovnik et al. |
5550968 | August 27, 1996 | Miller et al. |
5560008 | September 24, 1996 | Johnson et al. |
5715417 | February 3, 1998 | Gardien et al. |
6111517 | August 29, 2000 | Atick et al. |
6181803 | January 30, 2001 | Davis |
Type: Grant
Filed: Jun 13, 2001
Date of Patent: Apr 3, 2007
Assignee: Kabushiki Kaisha Toshiba (Tokyo)
Inventors: Kaoru Suzuki (Tokyo), Kazuhiro Fukui (Tokyo), Hisashi Kazama (Tokyo), Osamu Yamaguchi (Tokyo), Eiji Tanaka (Tokyo), Yasuhiro Taniguchi (Tokyo)
Primary Examiner: Hosuk Song
Attorney: Squire, Sanders & Dempsey, L.L.P.
Application Number: 09/881,249
International Classification: H04L 9/32 (20060101);