(19)
(11) EP 2 116 499 A1

(12) EUROPEAN PATENT APPLICATION
published in accordance with Art. 153(4) EPC

(43) Date of publication:
11.11.2009 Bulletin 2009/46

(21) Application number: 07713926.9

(22) Date of filing: 08.02.2007
(51) International Patent Classification (IPC): 
B66B 5/00(2006.01)
G08B 13/196(2006.01)
(86) International application number:
PCT/JP2007/052210
(87) International publication number:
WO 2008/096433 (14.08.2008 Gazette 2008/33)
(84) Designated Contracting States:
AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

(71) Applicant: Mitsubishi Electric Corporation
Chiyoda-ku Tokyo 100-8310 (JP)

(72) Inventor:
  • KURODA, Shinichi
    Tokyo 100-8310 (JP)

(74) Representative: HOFFMANN EITLE 
Patent- und Rechtsanwälte Arabellastrasse 4
81925 München
81925 München (DE)

   


(54) ELEVATOR SECURITY SYSTEM


(57) A processor has: a recording medium, a sampling portion, and a determining portion. Stored information that includes suspicious person image data for specifying a suspicious person is stored in the recording medium. The sampling portion samples facial portion image data of a user from image data from a security camera as sampled image data only if an authentication result from an authenticating apparatus is "failed". The determining portion determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as suspicious person image data. The determining portion also records the sampled image data as suspicious person image data in the recording medium if presence of the identifying image data is negated. If it is determined by the determining portion that the user is a suspicious person, a warning is issued by an alarm device.




Description

TECHNICAL FIELD



[0001] The present invention relates to an elevator security system that includes an authenticating apparatus that authenticates permission to use an elevator.

BACKGROUND ART



[0002] Conventionally, elevator security systems have been proposed in which an area around an authenticating apparatus that authenticates permission to use an elevator is photographed by a security camera when a predetermined operation is performed on the authenticating apparatus. In these conventional elevator security systems, a date and time that the operation was performed on the authenticating apparatus, and an authentication result, etc., are displayed on a display portion (See Patent Literature 1).

[0003] 

[Patent Literature 1]
Japanese Patent Laid-Open No. 2006-103854 (Gazette)


DISCLOSURE OF THE INVENTION


PROBLEM TO BE SOLVED BY THE INVENTION



[0004] However, in conventional elevator security systems, because the date and time and the authentication result are only displayed on the display portion, it is not possible to decide if an elevator user is a suspicious person or if the person has simply pressed a wrong button.

[0005] The present invention aims to solve the above problems and an object of the present invention is to provide an elevator security system that enables improvements in security by determining whether or not an elevator user is a suspicious person.

MEANS FOR SOLVING THE PROBLEM



[0006] In order to achieve the above object, according to one aspect of the present invention, there is provided an elevator security system characterized in including: an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed; a security camera for photographing a user who performs the authorizing operation; a processor including: a recording medium in which stored information is stored that includes suspicious person image data for identifying a suspicious person; a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; and a determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and also that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; and an alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion that the user is a suspicious person.

EFFECTS OF THE INVENTION



[0007] In an elevator security system according to the present invention, because facial portion image data of a user are sampled as sampled image data by the sampling portion only if the authentication result is "failed", and sampled image data that have been sampled in the past are stored in the recording medium as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data from the sampling portion are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.

BRIEF DESCRIPTION OF THE DRAWINGS



[0008] 

Figure 1 is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention;

Figure 2 is a flowchart that shows actions of a determining portion from Figure 1;

Figure 3 is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention; and

Figure 4 is a flowchart for explaining processing actions of a determining portion from Figure 3.


BEST MODE FOR CARRYING OUT THE INVENTION



[0009] Preferred embodiments of the present invention will now be explained with reference to the drawings.

Embodiment 1



[0010] Figure 1 is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention. An elevator that moves a car inside a hoistway elevator is disposed in a building. The car can be stopped at a plurality of floors by control from an elevator control board 1. An elevator authenticating apparatus 2 is disposed on a predetermined floor (in this example, a first floor (1F) which is a lobby floor.

[0011] The authenticating apparatus 2 authenticates permission to use the elevator in response to a predetermined authorizing operation being performed. Examples of a predetermined authorizing operation include operations such as holding a card on which personal information is registered, or a key, etc., over the authenticating apparatus 2, for example.

[0012]  When the permission to use the elevator is authenticated, the authenticating apparatus 2 generates authenticating information 21 that includes an authentication result that is either "passed" or "failed". The authenticating apparatus 2 has a clock function, and generates date and time information 22 that corresponds to the date and time that the authorizing operation was performed when the authorizing operation is performed.

[0013] The authenticating information 21 is sent from the authenticating apparatus 2 to the elevator control board 1. If the authentication result from the authenticating apparatus 2 is "failed", the elevator control board 1 disables call registration by the operation of landing buttons (not shown), and releases the disabling of call registration only if the authentication result from the authenticating apparatus 2 is "passed".

[0014] A security camera 3 for photographing users that perform the authorizing operation on the authenticating apparatus 2 is disposed on the floor on which the authenticating apparatus 2 is disposed (the lobby floor). The security camera 3 photographs a predetermined range in the vicinity of the authenticating apparatus 2.
The security camera 3 is also capable of serial photography. In addition, the security camera 3 constantly outputs image data 23 that are obtained by that photography.

[0015] The authenticating information 21, the date and time information 22, and the image data 23 are sent to a processor 4. The processor 4 performs processes related to the determination of whether or not the user is a suspicious person based on the authenticating information 21, the date and time information 22, and the image data 23. The processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 7.

[0016] Stored information that includes suspicious person image data for identifying suspicious persons is stored in the recording medium 5. The suspicious person image data that are stored in the recording medium 5 are also associated with the date and time information and saved.

[0017] The sampling portion 6 determines the ability to process the image data 23 from the security camera 3 based on the authenticating information 21. Specifically, the sampling portion 6 performs processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "failed", and stops the processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "passed". In other words, processing of the image data 23 by the sampling portion 6 is performed by sampling image data from a facial portion of the user in the image data 23 as sampled image data 24 only if the authentication that is performed by the authenticating apparatus 2 results in a denial of permission. The sampled image data 24 that have been sampled by the processing of the sampling portion 6 are sent to the determining portion 7 from the sampling portion 6.

[0018] The determining portion 7 receives the sampled image data 24 from the sampling portion 6 and the date and time information 22 from the authenticating apparatus 2. The determining portion 7 has a searching portion 8. The searching portion 8 searches whether or not identifying image data that can be recognized as identical to the sampled image data 24 (i.e., image data that identify a facial portion that is identical to the facial portion of the user identified by the sampled image data 24) are present as suspicious person image data in the stored information. Moreover, the method for searching the stored information is not dependent on any specific method, provided that the algorithm outputs presence or absence of identifying image data as a search result.

[0019] If identifying image data are not present as suspicious person image data in the stored information, the searching portion 8 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. If the identifying image data are present as suspicious person image data in the stored information, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data.

[0020] In this manner, among users who have operated the authenticating apparatus 2 in the past, sampled image data (facial portion image data) of users whose authentication result in the authenticating apparatus 2 was "failed" are accumulated as suspicious person image data in the recording medium 5, and the date and time information when the authentication result was "failed" is accumulated so as to be associated with the suspicious person image data.

[0021] The determining portion 7 determines whether or not the user who performed the authorizing operation is a suspicious person based on the search results from the searching portion 8. Specifically, the determining portion 7 determines that the user is a legitimate user if the presence of identifying image data is negated by the searching portion 8 (i.e., if identifying image data are not present as suspicious person image data in the stored information). The determining portion 7 determines that the user is a suspicious person if the presence of identifying image data is found by the searching portion 8 (i.e., if identifying image data are present as suspicious person image data in the stored information).

[0022] The determining portion 7 outputs the sampled image data 24 to an alarm device 9 as warning image data 25 only when it has determined that the user is a suspicious person.

[0023] Moreover, the processor 4 is constituted by a computer that has: an arithmetic processing portion (a CPU), a storage portion (ROM, RAM, etc.), and a signal input/output portion. The functions of the sampling portion 6 and the determining portion 7 are implemented by the computer of the processor 4. That is, programs for implementing the functions of the sampling portion 6 and the determining portion 7 are stored in the storage portion of the computer. The data processing portion executes arithmetic processing that relates to the functions of the processor 4 based on the programs that are stored in the storage portion.

[0024] The alarm device 9 is disposed at a predetermined position in a vicinity of the authenticating apparatus 2. The alarm device 9 generates an alarm that indicates that the user is a suspicious person in response to receiving warning image data 25 from the determining portion 7. In addition, the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (i.e., the sampled image data) as a warning. The alarm device 9 issues a warning sound together with the display of the image on the display portion 10.

[0025] Next, operation will be explained. Photography by a security camera 3 is performed continuously on the floor on which the authenticating apparatus 2 is disposed (the lobby floor). Thus, image data 23 from the security camera 3 is sent to the sampling portion 6 continuously. Processing of the image data 23 is not performed by the sampling portion 6 and output of sampled image data 24 from the sampling portion 6 is stopped if an authorizing operation has not been performed on the authenticating apparatus 2.

[0026] When an authorizing operation is performed on the authenticating apparatus 2 by a user, permission to use the elevator is authenticated by the authenticating apparatus 2. If the authentication result is "failed" (i.e., the authentication returns that use of the elevator is not permitted), then call registration by operation of the landing buttons is disabled by control from the elevator control board 1. Consequently, call registration cannot be performed even if the landing buttons are operated.

[0027] In that case, processing of the image data 23 is performed by the sampling portion 6. Facial portion image data of the user from the image data 23 of the security camera 3 is thereby sampled as sampled image data 24.

[0028] The sampled image data 24 that has been sampled by the sampling portion 6 is sent to the determining portion 7. Next, whether the user is a suspicious person or not is determined by the determining portion 7 based on the sampled image data 24. If it is determined that the user is a suspicious person, the sampled image data 24 are sent from the determining portion 7 to the alarm device 9 as warning image data 25. Thus, the image that is obtained from the warning image data 25 is displayed on the display portion 10 as a warning. At that point, the warning sound issues from the warning device 9.

[0029] If it is determined that the user is a legitimate user, transmission of the warning image data 25 from the determining portion 7 to the alarm device 9 is not performed, nor is warning performed by the alarm device 9.

[0030] On the other hand, if the authentication result is "passed" (i.e., if the authentication returns that use of the elevator is permitted), then disabling of call registration by operation of the landing buttons is released by control from the elevator control board 1. In that case, call registration can be performed by operating the landing buttons, and a car that responds to the call registration is moved to the lobby floor (the floor on which the authenticating apparatus 2 is disposed). Here, processing of the image data 23 is not performed by the sampling portion 6, and output of the sampled image data 24 from the sampling portion 6 remains stopped.

[0031] Next, processing actions of the determining portion 7 will be explained. Figure 2 is a flowchart that shows actions of the determining portion 7 from Figure 1. In the figure, when the determining portion 7 receives sampled image data 24 from the sampling portion 6 (S1), the searching portion 8 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S2).

[0032] If the identifying image data are not present as suspicious person image data, the searching portion 8 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S3). In that case, the determining portion 7 determines that the user is not a suspicious person (S4).

[0033] On the other hand, if the identifying image data are present as suspicious person image data, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in the recording medium 5 so as to be associated with the identifying image data (S5). In that case, the determining portion 7 determines that the user is a suspicious person (S6), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S7). Processing by the determining portion 7 is performed in this manner.

[0034] In an elevator security system of this kind, because facial portion image data of a user are sampled as sampled image data 24 by the sampling portion 6 only if the authentication result is "flailed", and sampled image data 24 that have been sampled in the past are stored in the recording medium 5 as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data 24 from the sampling portion 6 are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.

[0035] Because the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (the sampled image data) as a warning, the warning that indicates that the person is suspicious can be presented visually, facilitating identification of the suspicious person to whom the warning refers.

[0036] Moreover, in the above example, the alarm device 9 is installed in the vicinity of the authenticating apparatus 2, but the alarm device 9 may also be installed in a control room of the building. The warning from the alarm device 9 can thereby be transmitted to a controller who is stationed inside the control room, enabling elevator security to be improved further.

Embodiment 2



[0037] Figure 3 is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention. In the figure, a processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 31. Configuration of the recording medium 5 and the sampling portion 6 is similar to that of the recording medium 5 and the sampling portion 6 according to Embodiment 1. The determining portion 31 has a searching portion 32 and a condition comparing portion 33.

[0038] In response to the determining portion 7 receiving sampled image data 24, the searching portion 32 searches whether or not identifying image data (i.e., image data that can be recognized as identical to the sampled image data 24) are present as suspicious person image data in the stored information in the recording medium 5. As a result of the search, if identifying image data are not present as suspicious person image data in the stored information, the searching portion 32 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. In addition, as a result of the search, if the identifying image data are present as suspicious person image data in the stored information, the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data, and outputs the sampled image data 24, the past date and time information that has been linked to the identifying image data, and the date and time information 22 from the authenticating apparatus 2 to the condition comparing portion 33 as suspicious person candidate information 26.

[0039] The condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies preset suspicious person qualifying conditions.

[0040] Specifically, the condition comparing portion 33 obtains the count of past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (Count), and compares the obtained count of past date and time information (Count) and a set count value (a predetermined threshold value) (TH1) that has been preset. The condition comparing portion 33 also obtains the past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (the newest past date and time information item if more than one past date and time information item exists) and the date and time information 22 from the authenticating apparatus 2, and compares a time difference between the obtained past date and time information and the date and time information 22 from the authenticating apparatus 2 (Time) and a set time value (a predetermined threshold value) (TH2) that has been preset. The set time value can be set to one minute, for example.

[0041] The condition comparing portion 33 determines that the user does not satisfy the suspicious person qualifying conditions only if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (1) and a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (3). The condition comparing portion 33 determines that the user satisfies the suspicious person qualifying conditions if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (2), or a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (4).

[0042] 









[0043] The determining portion 31 determines that the user is a suspicious person only if the condition comparing portion 33 has made a determination that the user satisfies the suspicious person qualifying conditions. The determining portion 31 also outputs the sampled image data 24 that is included in the suspicious person candidate information 26 to the alarm device 9 as warning image data 25 only if it has been determined that the user is a suspicious person. The rest of the configuration is similar to that of Embodiment 1.

[0044] Next, operation will be explained. Because operation according to the present embodiment is similar to operation according to Embodiment 1 except for processing actions of the determining portion 31, only the processing actions of the determining portion 31 will be explained.

[0045] Figure 4 is a flowchart that shows actions of the determining portion 31 from Figure 3. In the figure, when the determining portion 31 receives sampled image data 24 from the sampling portion 6 (S11), the searching portion 32 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S12).

[0046] If the identifying image data are not present as suspicious person image data, the searching portion 32 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S13). In that case, the determining portion 31 determines that the user is not a suspicious person (S14).

[0047] On the other hand, if the identifying image data are present as suspicious person image data, the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in stored in the recording medium 5 so as to be associated with the identifying image data (S15). In that case, suspicious person candidate information 26 is sent from the searching portion 32 to the condition comparing portion 33.

[0048] Next, the condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies the suspicious person qualifying conditions (S16). If the suspicious person qualifying conditions are not satisfied, the determining portion 31 determines that the user is not a suspicious person (S14).

[0049] If the suspicious person qualifying conditions are satisfied, the determining portion 31 determines that the user is a suspicious person (S17), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S18). Processing by the determining portion 31 is performed in this manner.

[0050] In an elevator security system of this kind, because the determining portion 31 determines whether or not a user is a suspicious person by comparing a count of past date and time information that has been associated with the identifying image data and a predetermined threshold value, it is possible to designate as a suspicious person only a user for whom the authentication result has been "flailed" frequently. Consequently, legitimate users who have accidentally had an authentication result "failed" in the past can be excluded from being treated as suspicious persons, enabling erroneous determinations to be prevented.

[0051] Because the determining portion 31 determines whether or not a user is a suspicious person by comparing a time difference between past date and time information that has been associated with the identifying image data and date and time information 22 from the authenticating apparatus 2 with a predetermined threshold value, it can be determined that a user is a suspicious person when an authentication result is repeatedly "failed" a number of times in a short time, enabling accuracy in determining whether or not someone is a suspicious person to be improved.

[0052] Moreover, the configuration may also be such that elevator running information is transmitted to the display portion 10 from the elevator control board 1, and the display portion 10 displays the elevator running information during normal operation, and display images that are obtained from the suspicious person image data instead of the elevator running information or together with the elevator running information when warning image data 25 is input.


Claims

1. An elevator security system characterized in comprising:

an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed;

a security camera for photographing a user who performs the authorizing operation;

a processor comprising:

a recording medium in which stored information is stored that includes suspicious person image data for identifying a suspicious person;

a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; and

a determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and also that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; and

an alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion that the user is a suspicious person.


 
2. An elevator security system according to Claim 1, characterized in that:

the authenticating apparatus generates date and time information that corresponds to a date and time that the authorizing operation was performed;

the determining portion associates and records the date and time information and the sampled image data in the recording medium if presence of the identifying image data is negated, and adds the date and time information from the authenticating apparatus to past date and time information that has been associated with the identifying image data if the identifying image data are present in the stored information; and

the determination by the determining portion as to whether or not the user is a suspicious person is made by comparing:

a count of the past date and time information that has been associated with the identifying image data; and

a predetermined threshold value.


 
3. An elevator security system according to Claim 1, characterized in that:

the authenticating apparatus generates date and time information that corresponds to a date and time that the authorizing operation was performed;

the determining portion associates and records the date and time information and the sampled image data in the recording medium if presence of the identifying image data is negated, and adds the date and time information from the authenticating apparatus to past date and time information that has been associated with the identifying image data if the identifying image data are present in the stored information; and

the determination by the determining portion as to whether or not the user is a suspicious person is made by comparing:

a time difference between the date and time information that has been associated with the identifying image data and the date and time information from the authenticating apparatus; and

a predetermined threshold value.


 
4. An elevator security system according to any of Claims 1 through 3, characterized in that the alarm device has a display portion that displays an image that is obtained from the sampled image data as the warning.
 




Drawing
















Search report







Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description