Individual certification system, certification label and individual certification method

A technology for authentication labels and authentication systems, applied in the direction of instruments, data processing applications, printing, etc., can solve problems such as inappropriate facilities or enterprises

Active Publication Date: 2007-04-25
HITACHI INFORMATION & CONTROL SOLUTIONS LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The employee puts the IC card at the work station, but he himself stays in other places, and the same result will be the same
[0007] On the other hand, although the personal authentication technology in the above-mentioned Patent Document 1 is very effective for authenticating a specific individual, it is difficult to say whether it is applied to the above-mentioned facilities or companies from the viewpoint of required cost or required authentication accuracy. is proper
Furthermore, keeping personal information such as biometric information is not suitable for the above-mentioned facilities or companies, let alone organizations with special missions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Individual certification system, certification label and individual certification method
  • Individual certification system, certification label and individual certification method
  • Individual certification system, certification label and individual certification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings.

[0026] "Constitution and Outline of Personal Authentication System"

[0027] First, the configuration and outline of a personal authentication system according to an embodiment of the present invention will be described. As shown in the configuration block diagram of FIG. 1 , the personal authentication system includes an authentication tag 1 , a personal authentication device 2 , an information management device 3 , and security devices 4 and 5 . The personal authentication device 2 , the security devices 4 and 5 can communicate with the authentication tag 1 wirelessly, and on the other hand, they are connected to the information management device 3 through a wireless or wired network 6 . The placement places of various components in the specified facilities are explained below. The authentication label 1 is attached to the user of the facility. The person...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A personal identification system comprises an identification tag 1, a personal identification apparatus 2, an information management apparatus 3, and security apparatuses 4 and 5. The personal identification apparatus 2, and the security apparatuses 4 and 5 can radio communicate with the identification tag 1, and on the other hand, are connected with the information management apparatus 3 through a radio or cable network 6. When the identification tag 1 is attached to a user of a facility, the personal identification apparatus 2 performs personal information registration, and validates the identification tag 1. If the identification tag 1 is valid, the security apparatus 4 controls the facility so as to allow the user to use the facility. The identification tag 1 invalidates itself when detecting that it is removed from the user. Thereby, users can use equipments in the facility as long as the identification tag 1 is attached.

Description

technical field [0001] The present invention relates to a personal authentication system, an authentication tag, and a personal authentication method for ensuring the safety of a facility by performing personal authentication every time a user intends to use equipment in the facility. Background technique [0002] In facilities such as hotels, saunas, and sports clubs, since many customers come and go, corresponding security measures are required. There are lockers for storing valuables during the use of the facility, rooms and equipment that can be restricted in use according to the qualifications held or the amount of payment, so access to these facilities by users must be managed. Specifically, wristband-type keys are distributed to users, or IC (Integrated Circuit) cards in which personal information is registered are distributed. [0003] Moreover, in companies or enterprises, of course, security is also required. In order to comprehensively manage the attendance of em...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q90/00G06K9/00G06K7/00B42D15/10G06F1/00G06F15/00G06F21/33G06F21/34G06K17/00G06K19/10
Inventor 栗山裕之在塚俊之伴秀行相模太大宫昭弘
Owner HITACHI INFORMATION & CONTROL SOLUTIONS LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products