TECHNICAL FIELD
[0001] The present invention relates to an elevator security system that includes an authenticating
apparatus that authenticates permission to use an elevator.
BACKGROUND ART
[0002] Conventionally, elevator security systems have been proposed in which an area around
an authenticating apparatus that authenticates permission to use an elevator is photographed
by a security camera when a predetermined operation is performed on the authenticating
apparatus. In these conventional elevator security systems, a date and time that the
operation was performed on the authenticating apparatus, and an authentication result,
etc., are displayed on a display portion (See Patent Literature 1).
[0003]
[Patent Literature 1]
Japanese Patent Laid-Open No. 2006-103854 (Gazette)
DISCLOSURE OF THE INVENTION
PROBLEM TO BE SOLVED BY THE INVENTION
[0004] However, in conventional elevator security systems, because the date and time and
the authentication result are only displayed on the display portion, it is not possible
to decide if an elevator user is a suspicious person or if the person has simply pressed
a wrong button.
[0005] The present invention aims to solve the above problems and an object of the present
invention is to provide an elevator security system that enables improvements in security
by determining whether or not an elevator user is a suspicious person.
MEANS FOR SOLVING THE PROBLEM
[0006] In order to achieve the above object, according to one aspect of the present invention,
there is provided an elevator security system characterized in including: an authenticating
apparatus that authenticates permission to use an elevator in response to a predetermined
authorizing operation being performed; a security camera for photographing a user
who performs the authorizing operation; a processor including: a recording medium
in which stored information is stored that includes suspicious person image data for
identifying a suspicious person; a sampling portion that samples facial portion image
data of the user from image data from the security camera as sampled image data only
if authentication by the authenticating apparatus results in a denial of permission;
and a determining portion that determines whether or not the user is a suspicious
person by searching whether or not identifying image data that can be recognized as
identical to the sampled image data are present in the stored information as the suspicious
person image data, and also that records the sampled image data in the recording medium
as the suspicious person image data if presence of the identifying image data is negated;
and an alarm device that issues a warning that indicates that the user is a suspicious
person if a determination is made by the determining portion that the user is a suspicious
person.
EFFECTS OF THE INVENTION
[0007] In an elevator security system according to the present invention, because facial
portion image data of a user are sampled as sampled image data by the sampling portion
only if the authentication result is "failed", and sampled image data that have been
sampled in the past are stored in the recording medium as suspicious person image
data, and whether a user is a suspicious person or not can be determined by searching
whether or not identifying image data that can be recognized as identical to the sampled
image data from the sampling portion are present as suspicious person image data,
a user who has had an authentication result "failed" in the past can be designated
a suspicious person, enabling determination as to whether or not an elevator user
is a suspicious person to be performed easily. Thus, use of an elevator by suspicious
persons can be prevented, enabling elevator security to be improved.
BRIEF DESCRIPTION OF THE DRAWINGS
[0008]
Figure 1 is a block diagram that shows an elevator security system according to Embodiment
1 of the present invention;
Figure 2 is a flowchart that shows actions of a determining portion from Figure 1;
Figure 3 is a block diagram that shows an elevator security system according to Embodiment
2 of the present invention; and
Figure 4 is a flowchart for explaining processing actions of a determining portion
from Figure 3.
BEST MODE FOR CARRYING OUT THE INVENTION
[0009] Preferred embodiments of the present invention will now be explained with reference
to the drawings.
Embodiment 1
[0010] Figure 1 is a block diagram that shows an elevator security system according to Embodiment
1 of the present invention. An elevator that moves a car inside a hoistway elevator
is disposed in a building. The car can be stopped at a plurality of floors by control
from an elevator control board 1. An elevator authenticating apparatus 2 is disposed
on a predetermined floor (in this example, a first floor (1F) which is a lobby floor.
[0011] The authenticating apparatus 2 authenticates permission to use the elevator in response
to a predetermined authorizing operation being performed. Examples of a predetermined
authorizing operation include operations such as holding a card on which personal
information is registered, or a key, etc., over the authenticating apparatus 2, for
example.
[0012] When the permission to use the elevator is authenticated, the authenticating apparatus
2 generates authenticating information 21 that includes an authentication result that
is either "passed" or "failed". The authenticating apparatus 2 has a clock function,
and generates date and time information 22 that corresponds to the date and time that
the authorizing operation was performed when the authorizing operation is performed.
[0013] The authenticating information 21 is sent from the authenticating apparatus 2 to
the elevator control board 1. If the authentication result from the authenticating
apparatus 2 is "failed", the elevator control board 1 disables call registration by
the operation of landing buttons (not shown), and releases the disabling of call registration
only if the authentication result from the authenticating apparatus 2 is "passed".
[0014] A security camera 3 for photographing users that perform the authorizing operation
on the authenticating apparatus 2 is disposed on the floor on which the authenticating
apparatus 2 is disposed (the lobby floor). The security camera 3 photographs a predetermined
range in the vicinity of the authenticating apparatus 2.
The security camera 3 is also capable of serial photography. In addition, the security
camera 3 constantly outputs image data 23 that are obtained by that photography.
[0015] The authenticating information 21, the date and time information 22, and the image
data 23 are sent to a processor 4. The processor 4 performs processes related to the
determination of whether or not the user is a suspicious person based on the authenticating
information 21, the date and time information 22, and the image data 23. The processor
4 has a recording medium 5, a sampling portion 6, and a determining portion 7.
[0016] Stored information that includes suspicious person image data for identifying suspicious
persons is stored in the recording medium 5. The suspicious person image data that
are stored in the recording medium 5 are also associated with the date and time information
and saved.
[0017] The sampling portion 6 determines the ability to process the image data 23 from the
security camera 3 based on the authenticating information 21. Specifically, the sampling
portion 6 performs processing of the image data 23 if the authentication result from
the authenticating apparatus 2 is "failed", and stops the processing of the image
data 23 if the authentication result from the authenticating apparatus 2 is "passed".
In other words, processing of the image data 23 by the sampling portion 6 is performed
by sampling image data from a facial portion of the user in the image data 23 as sampled
image data 24 only if the authentication that is performed by the authenticating apparatus
2 results in a denial of permission. The sampled image data 24 that have been sampled
by the processing of the sampling portion 6 are sent to the determining portion 7
from the sampling portion 6.
[0018] The determining portion 7 receives the sampled image data 24 from the sampling portion
6 and the date and time information 22 from the authenticating apparatus 2. The determining
portion 7 has a searching portion 8. The searching portion 8 searches whether or not
identifying image data that can be recognized as identical to the sampled image data
24 (i.e., image data that identify a facial portion that is identical to the facial
portion of the user identified by the sampled image data 24) are present as suspicious
person image data in the stored information. Moreover, the method for searching the
stored information is not dependent on any specific method, provided that the algorithm
outputs presence or absence of identifying image data as a search result.
[0019] If identifying image data are not present as suspicious person image data in the
stored information, the searching portion 8 records the sampled image data 24 as suspicious
person image data in the recording medium 5, and also records the date and time information
22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated
with the sampled image data 24. If the identifying image data are present as suspicious
person image data in the stored information, the searching portion 8 adds the date
and time information 22 from the authenticating apparatus 2 to past date and time
information that has been associated with the identifying image data.
[0020] In this manner, among users who have operated the authenticating apparatus 2 in the
past, sampled image data (facial portion image data) of users whose authentication
result in the authenticating apparatus 2 was "failed" are accumulated as suspicious
person image data in the recording medium 5, and the date and time information when
the authentication result was "failed" is accumulated so as to be associated with
the suspicious person image data.
[0021] The determining portion 7 determines whether or not the user who performed the authorizing
operation is a suspicious person based on the search results from the searching portion
8. Specifically, the determining portion 7 determines that the user is a legitimate
user if the presence of identifying image data is negated by the searching portion
8 (i.e., if identifying image data are not present as suspicious person image data
in the stored information). The determining portion 7 determines that the user is
a suspicious person if the presence of identifying image data is found by the searching
portion 8 (i.e., if identifying image data are present as suspicious person image
data in the stored information).
[0022] The determining portion 7 outputs the sampled image data 24 to an alarm device 9
as warning image data 25 only when it has determined that the user is a suspicious
person.
[0023] Moreover, the processor 4 is constituted by a computer that has: an arithmetic processing
portion (a CPU), a storage portion (ROM, RAM, etc.), and a signal input/output portion.
The functions of the sampling portion 6 and the determining portion 7 are implemented
by the computer of the processor 4. That is, programs for implementing the functions
of the sampling portion 6 and the determining portion 7 are stored in the storage
portion of the computer. The data processing portion executes arithmetic processing
that relates to the functions of the processor 4 based on the programs that are stored
in the storage portion.
[0024] The alarm device 9 is disposed at a predetermined position in a vicinity of the authenticating
apparatus 2. The alarm device 9 generates an alarm that indicates that the user is
a suspicious person in response to receiving warning image data 25 from the determining
portion 7. In addition, the alarm device 9 has a display portion 10 that displays
an image that is obtained from the warning image data 25 (i.e., the sampled image
data) as a warning. The alarm device 9 issues a warning sound together with the display
of the image on the display portion 10.
[0025] Next, operation will be explained. Photography by a security camera 3 is performed
continuously on the floor on which the authenticating apparatus 2 is disposed (the
lobby floor). Thus, image data 23 from the security camera 3 is sent to the sampling
portion 6 continuously. Processing of the image data 23 is not performed by the sampling
portion 6 and output of sampled image data 24 from the sampling portion 6 is stopped
if an authorizing operation has not been performed on the authenticating apparatus
2.
[0026] When an authorizing operation is performed on the authenticating apparatus 2 by a
user, permission to use the elevator is authenticated by the authenticating apparatus
2. If the authentication result is "failed" (i.e., the authentication returns that
use of the elevator is not permitted), then call registration by operation of the
landing buttons is disabled by control from the elevator control board 1. Consequently,
call registration cannot be performed even if the landing buttons are operated.
[0027] In that case, processing of the image data 23 is performed by the sampling portion
6. Facial portion image data of the user from the image data 23 of the security camera
3 is thereby sampled as sampled image data 24.
[0028] The sampled image data 24 that has been sampled by the sampling portion 6 is sent
to the determining portion 7. Next, whether the user is a suspicious person or not
is determined by the determining portion 7 based on the sampled image data 24. If
it is determined that the user is a suspicious person, the sampled image data 24 are
sent from the determining portion 7 to the alarm device 9 as warning image data 25.
Thus, the image that is obtained from the warning image data 25 is displayed on the
display portion 10 as a warning. At that point, the warning sound issues from the
warning device 9.
[0029] If it is determined that the user is a legitimate user, transmission of the warning
image data 25 from the determining portion 7 to the alarm device 9 is not performed,
nor is warning performed by the alarm device 9.
[0030] On the other hand, if the authentication result is "passed" (i.e., if the authentication
returns that use of the elevator is permitted), then disabling of call registration
by operation of the landing buttons is released by control from the elevator control
board 1. In that case, call registration can be performed by operating the landing
buttons, and a car that responds to the call registration is moved to the lobby floor
(the floor on which the authenticating apparatus 2 is disposed). Here, processing
of the image data 23 is not performed by the sampling portion 6, and output of the
sampled image data 24 from the sampling portion 6 remains stopped.
[0031] Next, processing actions of the determining portion 7 will be explained. Figure 2
is a flowchart that shows actions of the determining portion 7 from Figure 1. In the
figure, when the determining portion 7 receives sampled image data 24 from the sampling
portion 6 (S1), the searching portion 8 searches whether or not image data that can
be recognized as identical to the sampled image data 24 (identifying image data) are
stored in the recording medium 5 as suspicious person image data (S2).
[0032] If the identifying image data are not present as suspicious person image data, the
searching portion 8 records the sampled image data 24 in the recording medium 5 as
suspicious person image data, and also records the date and time information 22 from
the authenticating apparatus 2 in the recording medium 5 so as to be associated with
the sampled image data 24 (S3). In that case, the determining portion 7 determines
that the user is not a suspicious person (S4).
[0033] On the other hand, if the identifying image data are present as suspicious person
image data, the searching portion 8 adds the date and time information 22 from the
authenticating apparatus 2 to past date and time information that has been stored
in the recording medium 5 so as to be associated with the identifying image data (S5).
In that case, the determining portion 7 determines that the user is a suspicious person
(S6), and also outputs the sampled image data 24 to the alarm device 9 as warning
image data 25 (S7). Processing by the determining portion 7 is performed in this manner.
[0034] In an elevator security system of this kind, because facial portion image data of
a user are sampled as sampled image data 24 by the sampling portion 6 only if the
authentication result is "flailed", and sampled image data 24 that have been sampled
in the past are stored in the recording medium 5 as suspicious person image data,
and whether a user is a suspicious person or not can be determined by searching whether
or not identifying image data that can be recognized as identical to the sampled image
data 24 from the sampling portion 6 are present as suspicious person image data, a
user who has had an authentication result "failed" in the past can be designated a
suspicious person, enabling determination as to whether or not an elevator user is
a suspicious person to be performed easily. Thus, use of an elevator by suspicious
persons can be prevented, enabling elevator security to be improved.
[0035] Because the alarm device 9 has a display portion 10 that displays an image that is
obtained from the warning image data 25 (the sampled image data) as a warning, the
warning that indicates that the person is suspicious can be presented visually, facilitating
identification of the suspicious person to whom the warning refers.
[0036] Moreover, in the above example, the alarm device 9 is installed in the vicinity of
the authenticating apparatus 2, but the alarm device 9 may also be installed in a
control room of the building. The warning from the alarm device 9 can thereby be transmitted
to a controller who is stationed inside the control room, enabling elevator security
to be improved further.
Embodiment 2
[0037] Figure 3 is a block diagram that shows an elevator security system according to Embodiment
2 of the present invention. In the figure, a processor 4 has a recording medium 5,
a sampling portion 6, and a determining portion 31. Configuration of the recording
medium 5 and the sampling portion 6 is similar to that of the recording medium 5 and
the sampling portion 6 according to Embodiment 1. The determining portion 31 has a
searching portion 32 and a condition comparing portion 33.
[0038] In response to the determining portion 7 receiving sampled image data 24, the searching
portion 32 searches whether or not identifying image data (i.e., image data that can
be recognized as identical to the sampled image data 24) are present as suspicious
person image data in the stored information in the recording medium 5. As a result
of the search, if identifying image data are not present as suspicious person image
data in the stored information, the searching portion 32 records the sampled image
data 24 as suspicious person image data in the recording medium 5, and also records
the date and time information 22 from the authenticating apparatus 2 in the recording
medium 5 so as to be associated with the sampled image data 24. In addition, as a
result of the search, if the identifying image data are present as suspicious person
image data in the stored information, the searching portion 32 adds the date and time
information 22 from the authenticating apparatus 2 to past date and time information
that has been associated with the identifying image data, and outputs the sampled
image data 24, the past date and time information that has been linked to the identifying
image data, and the date and time information 22 from the authenticating apparatus
2 to the condition comparing portion 33 as suspicious person candidate information
26.
[0039] The condition comparing portion 33 determines whether or not the suspicious person
candidate information 26 satisfies preset suspicious person qualifying conditions.
[0040] Specifically, the condition comparing portion 33 obtains the count of past date and
time information that has been linked to the identifying image data in the suspicious
person candidate information 26 (Count), and compares the obtained count of past date
and time information (Count) and a set count value (a predetermined threshold value)
(TH1) that has been preset. The condition comparing portion 33 also obtains the past
date and time information that has been linked to the identifying image data in the
suspicious person candidate information 26 (the newest past date and time information
item if more than one past date and time information item exists) and the date and
time information 22 from the authenticating apparatus 2, and compares a time difference
between the obtained past date and time information and the date and time information
22 from the authenticating apparatus 2 (Time) and a set time value (a predetermined
threshold value) (TH2) that has been preset. The set time value can be set to one
minute, for example.
[0041] The condition comparing portion 33 determines that the user does not satisfy the
suspicious person qualifying conditions only if a relationship between the past date
and time information count (Count) and the set count value (TH1) satisfies Expression
(1) and a relationship between the date and time information time difference (Time)
and the set time value (TH2) satisfies Expression (3). The condition comparing portion
33 determines that the user satisfies the suspicious person qualifying conditions
if a relationship between the past date and time information count (Count) and the
set count value (TH1) satisfies Expression (2), or a relationship between the date
and time information time difference (Time) and the set time value (TH2) satisfies
Expression (4).
[0043] The determining portion 31 determines that the user is a suspicious person only if
the condition comparing portion 33 has made a determination that the user satisfies
the suspicious person qualifying conditions. The determining portion 31 also outputs
the sampled image data 24 that is included in the suspicious person candidate information
26 to the alarm device 9 as warning image data 25 only if it has been determined that
the user is a suspicious person. The rest of the configuration is similar to that
of Embodiment 1.
[0044] Next, operation will be explained. Because operation according to the present embodiment
is similar to operation according to Embodiment 1 except for processing actions of
the determining portion 31, only the processing actions of the determining portion
31 will be explained.
[0045] Figure 4 is a flowchart that shows actions of the determining portion 31 from Figure
3. In the figure, when the determining portion 31 receives sampled image data 24 from
the sampling portion 6 (S11), the searching portion 32 searches whether or not image
data that can be recognized as identical to the sampled image data 24 (identifying
image data) are stored in the recording medium 5 as suspicious person image data (S12).
[0046] If the identifying image data are not present as suspicious person image data, the
searching portion 32 records the sampled image data 24 in the recording medium 5 as
suspicious person image data, and also records the date and time information 22 from
the authenticating apparatus 2 in the recording medium 5 so as to be associated with
the sampled image data 24 (S13). In that case, the determining portion 31 determines
that the user is not a suspicious person (S14).
[0047] On the other hand, if the identifying image data are present as suspicious person
image data, the searching portion 32 adds the date and time information 22 from the
authenticating apparatus 2 to past date and time information that has been stored
in stored in the recording medium 5 so as to be associated with the identifying image
data (S15). In that case, suspicious person candidate information 26 is sent from
the searching portion 32 to the condition comparing portion 33.
[0048] Next, the condition comparing portion 33 determines whether or not the suspicious
person candidate information 26 satisfies the suspicious person qualifying conditions
(S16). If the suspicious person qualifying conditions are not satisfied, the determining
portion 31 determines that the user is not a suspicious person (S14).
[0049] If the suspicious person qualifying conditions are satisfied, the determining portion
31 determines that the user is a suspicious person (S17), and also outputs the sampled
image data 24 to the alarm device 9 as warning image data 25 (S18). Processing by
the determining portion 31 is performed in this manner.
[0050] In an elevator security system of this kind, because the determining portion 31 determines
whether or not a user is a suspicious person by comparing a count of past date and
time information that has been associated with the identifying image data and a predetermined
threshold value, it is possible to designate as a suspicious person only a user for
whom the authentication result has been "flailed" frequently. Consequently, legitimate
users who have accidentally had an authentication result "failed" in the past can
be excluded from being treated as suspicious persons, enabling erroneous determinations
to be prevented.
[0051] Because the determining portion 31 determines whether or not a user is a suspicious
person by comparing a time difference between past date and time information that
has been associated with the identifying image data and date and time information
22 from the authenticating apparatus 2 with a predetermined threshold value, it can
be determined that a user is a suspicious person when an authentication result is
repeatedly "failed" a number of times in a short time, enabling accuracy in determining
whether or not someone is a suspicious person to be improved.
[0052] Moreover, the configuration may also be such that elevator running information is
transmitted to the display portion 10 from the elevator control board 1, and the display
portion 10 displays the elevator running information during normal operation, and
display images that are obtained from the suspicious person image data instead of
the elevator running information or together with the elevator running information
when warning image data 25 is input.
1. An elevator security system
characterized in comprising:
an authenticating apparatus that authenticates permission to use an elevator in response
to a predetermined authorizing operation being performed;
a security camera for photographing a user who performs the authorizing operation;
a processor comprising:
a recording medium in which stored information is stored that includes suspicious
person image data for identifying a suspicious person;
a sampling portion that samples facial portion image data of the user from image data
from the security camera as sampled image data only if authentication by the authenticating
apparatus results in a denial of permission; and
a determining portion that determines whether or not the user is a suspicious person
by searching whether or not identifying image data that can be recognized as identical
to the sampled image data are present in the stored information as the suspicious
person image data, and also that records the sampled image data in the recording medium
as the suspicious person image data if presence of the identifying image data is negated;
and
an alarm device that issues a warning that indicates that the user is a suspicious
person if a determination is made by the determining portion that the user is a suspicious
person.
2. An elevator security system according to Claim 1,
characterized in that:
the authenticating apparatus generates date and time information that corresponds
to a date and time that the authorizing operation was performed;
the determining portion associates and records the date and time information and the
sampled image data in the recording medium if presence of the identifying image data
is negated, and adds the date and time information from the authenticating apparatus
to past date and time information that has been associated with the identifying image
data if the identifying image data are present in the stored information; and
the determination by the determining portion as to whether or not the user is a suspicious
person is made by comparing:
a count of the past date and time information that has been associated with the identifying
image data; and
a predetermined threshold value.
3. An elevator security system according to Claim 1,
characterized in that:
the authenticating apparatus generates date and time information that corresponds
to a date and time that the authorizing operation was performed;
the determining portion associates and records the date and time information and the
sampled image data in the recording medium if presence of the identifying image data
is negated, and adds the date and time information from the authenticating apparatus
to past date and time information that has been associated with the identifying image
data if the identifying image data are present in the stored information; and
the determination by the determining portion as to whether or not the user is a suspicious
person is made by comparing:
a time difference between the date and time information that has been associated with
the identifying image data and the date and time information from the authenticating
apparatus; and
a predetermined threshold value.
4. An elevator security system according to any of Claims 1 through 3, characterized in that the alarm device has a display portion that displays an image that is obtained from
the sampled image data as the warning.