<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ep-patent-document PUBLIC "-//EPO//EP PATENT DOCUMENT 1.4//EN" "ep-patent-document-v1-4.dtd">
<ep-patent-document id="EP07713926B1" file="EP07713926NWB1.xml" lang="en" country="EP" doc-number="2116499" kind="B1" date-publ="20140820" status="n" dtd-version="ep-patent-document-v1-4">
<SDOBI lang="en"><B000><eptags><B001EP>ATBECHDEDKESFRGBGRITLILUNLSEMCPTIESILTLVFIRO..CY..TRBGCZEEHUPLSK....IS..............................</B001EP><B005EP>J</B005EP><B007EP>DIM360 Ver 2.41 (21 Oct 2013) -  2100000/0</B007EP></eptags></B000><B100><B110>2116499</B110><B120><B121>EUROPEAN PATENT SPECIFICATION</B121></B120><B130>B1</B130><B140><date>20140820</date></B140><B190>EP</B190></B100><B200><B210>07713926.9</B210><B220><date>20070208</date></B220><B240><B241><date>20090702</date></B241></B240><B250>ja</B250><B251EP>en</B251EP><B260>en</B260></B200><B400><B405><date>20140820</date><bnum>201434</bnum></B405><B430><date>20091111</date><bnum>200946</bnum></B430><B450><date>20140820</date><bnum>201434</bnum></B450><B452EP><date>20140321</date></B452EP></B400><B500><B510EP><classification-ipcr sequence="1"><text>B66B   5/00        20060101AFI20130724BHEP        </text></classification-ipcr><classification-ipcr sequence="2"><text>G08B  13/196       20060101ALI20130724BHEP        </text></classification-ipcr><classification-ipcr sequence="3"><text>B66B   1/46        20060101ALI20130724BHEP        </text></classification-ipcr></B510EP><B540><B541>de</B541><B542>AUFZUGSSICHERHEITSSYSTEM</B542><B541>en</B541><B542>ELEVATOR SECURITY SYSTEM</B542><B541>fr</B541><B542>SYSTÈME DE SÉCURITÉ D'ASCENSEUR</B542></B540><B560><B561><text>JP-A- 2003 109 129</text></B561><B561><text>JP-A- 2003 109 129</text></B561><B561><text>JP-A- 2005 132 549</text></B561><B561><text>JP-A- 2006 103 854</text></B561><B561><text>JP-A- 2006 109 014</text></B561><B561><text>JP-A- 2006 109 014</text></B561><B561><text>JP-A- 2007 022 776</text></B561><B561><text>JP-A- 2007 022 776</text></B561><B565EP><date>20130730</date></B565EP></B560></B500><B700><B720><B721><snm>KURODA, Shinichi</snm><adr><str>c/o Mitsubishi Electric Corporation
7-3 Marunouchi 2-chome
Chiyoda-ku</str><city>Tokyo 100-8310</city><ctry>JP</ctry></adr></B721></B720><B730><B731><snm>Mitsubishi Electric Corporation</snm><iid>100785331</iid><irf>135 545 a/scho</irf><adr><str>7-3, Marunouchi 2-chome</str><city>Chiyoda-ku
Tokyo 100-8310</city><ctry>JP</ctry></adr></B731></B730><B740><B741><snm>HOFFMANN EITLE</snm><iid>100061036</iid><adr><str>Patent- und Rechtsanwälte 
Arabellastrasse 4</str><city>81925 München</city><ctry>DE</ctry></adr></B741></B740></B700><B800><B840><ctry>AT</ctry><ctry>BE</ctry><ctry>BG</ctry><ctry>CH</ctry><ctry>CY</ctry><ctry>CZ</ctry><ctry>DE</ctry><ctry>DK</ctry><ctry>EE</ctry><ctry>ES</ctry><ctry>FI</ctry><ctry>FR</ctry><ctry>GB</ctry><ctry>GR</ctry><ctry>HU</ctry><ctry>IE</ctry><ctry>IS</ctry><ctry>IT</ctry><ctry>LI</ctry><ctry>LT</ctry><ctry>LU</ctry><ctry>LV</ctry><ctry>MC</ctry><ctry>NL</ctry><ctry>PL</ctry><ctry>PT</ctry><ctry>RO</ctry><ctry>SE</ctry><ctry>SI</ctry><ctry>SK</ctry><ctry>TR</ctry></B840><B860><B861><dnum><anum>JP2007052210</anum></dnum><date>20070208</date></B861><B862>ja</B862></B860><B870><B871><dnum><pnum>WO2008096433</pnum></dnum><date>20080814</date><bnum>200833</bnum></B871></B870><B880><date>20091111</date><bnum>200946</bnum></B880></B800></SDOBI>
<description id="desc" lang="en"><!-- EPO <DP n="1"> -->
<heading id="h0001">TECHNICAL FIELD</heading>
<p id="p0001" num="0001">The present invention relates to an elevator security system that includes an authenticating apparatus that authenticates permission to use an elevator.</p>
<heading id="h0002">BACKGROUND ART</heading>
<p id="p0002" num="0002">Conventionally, as described in <patcit id="pcit0001" dnum="JP2006103854A"><text>JP 2006-103854 A</text></patcit>, elevator security systems have been proposed in which an area around an authenticating apparatus that authenticates permission to use an elevator is photographed by a security camera when a predetermined operation is performed on the authenticating apparatus. In these conventional elevator security systems, a date and time that the operation was performed on the authenticating apparatus, and an authentication result, etc., are displayed on a display portion</p>
<p id="p0003" num="0003"><patcit id="pcit0002" dnum="JP2007022776A"><text>JP 2007/22776 A</text></patcit> discloses a security system for an elevator comprising a camera inside an elevator car. A face image of a passenger is processed to be compared against image data of wanted criminals stored in a wanted criminals database, which is supplied and updated by an external source. When it is determined that a passenger is a wanted criminal, an information part sends the face image to a remote monitoring center.</p>
<p id="p0004" num="0004">Also according to <patcit id="pcit0003" dnum="JP2003109129A"><text>JP 2003/109129 A</text></patcit>, previously registered face images are used to identify suspicious persons by determining that the suspicious person is not among the previously registered face images, in order to inform a manager or watchman to take countermeasures.</p>
<p id="p0005" num="0005"><patcit id="pcit0004" dnum="JP2006109014A"><text>JP 2006/109014 A</text></patcit> discloses a suspicious person determining device which takes into account a face direction determined<!-- EPO <DP n="2"> --> from an photographed image of a person's face over some time. If the face direction coincides over a prescribed period of time, the person is determined as a suspicious.</p>
<p id="p0006" num="0006"><patcit id="pcit0005" dnum="JP2006103854A"><text>JP 2006/103854 A</text></patcit> discloses a security system for an elevator in which a data address of image data from a crime prevention camera recorded in a recoding means is linked to a certification operation of an elevator user so that image date and user operation can be retrieved in common for display.</p>
<heading id="h0003">DISCLOSURE OF THE INVENTION</heading>
<heading id="h0004">PROBLEM TO BE SOLVED BY THE INVENTION</heading>
<p id="p0007" num="0007">However, in conventional elevator security systems, because the date and time and the authentication result are only displayed on the display portion, it is not possible to decide if an elevator user is a suspicious person or if the person has simply pressed a wrong button.</p>
<p id="p0008" num="0008">The present invention aims to solve the above problems and an object of the present invention is to provide an elevator security system that enables improvements in security by determining whether or not an elevator user is a suspicious person.</p>
<heading id="h0005">MEANS FOR SOLVING THE PROBLEM</heading>
<p id="p0009" num="0009">The above object is solved by an elevator security system comprising an authenticating apparatus that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed; a security camera for photographing a user who performs the authorizing operation; a processor comprising a sampling portion that samples facial portion image data of the user from image data from the security camera as sampled image data only if authentication by the authenticating apparatus results in a denial of permission; a recording medium in which stored information is stored that<!-- EPO <DP n="3"> --> includes suspicious person image data consisting of sampled image data that have been sampled in the past for identifying a suspicious person; and a determining portion that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data are present in the stored information as the suspicious person image data, and that records the sampled image data in the recording medium as the suspicious person image data if presence of the identifying image data is negated; and an alarm device that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion that the user is a suspicious person.</p>
<heading id="h0006">EFFECTS OF THE INVENTION</heading>
<p id="p0010" num="0010">In an elevator security system according to the present invention, because facial portion image data of a user are sampled as sampled image data by the sampling portion only if the authentication result is "failed", and sampled image data that have been sampled in the past are stored in the recording medium as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data from the sampling portion are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.</p>
<heading id="h0007">BRIEF DESCRIPTION OF THE DRAWINGS</heading>
<p id="p0011" num="0011">
<ul id="ul0001" list-style="none" compact="compact">
<li><figref idref="f0001">Figure 1</figref> is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention;<!-- EPO <DP n="4"> --></li>
<li><figref idref="f0002">Figure 2</figref> is a flowchart that shows actions of a determining portion from <figref idref="f0001">Figure 1</figref>;</li>
<li><figref idref="f0003">Figure 3</figref> is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention; and</li>
<li><figref idref="f0004">Figure 4</figref> is a flowchart for explaining processing actions of a determining portion from <figref idref="f0003">Figure 3</figref>.</li>
</ul></p>
<heading id="h0008">BEST MODE FOR CARRYING OUT THE INVENTION</heading>
<p id="p0012" num="0012">Preferred embodiments of the present invention will now be explained with reference to the drawings.</p>
<heading id="h0009">Embodiment 1</heading>
<p id="p0013" num="0013"><figref idref="f0001">Figure 1</figref> is a block diagram that shows an elevator security system according to Embodiment 1 of the present invention. An elevator that moves a car inside a hoistway elevator is disposed in a building. The car can be stopped at a plurality of floors by control from an elevator control board 1. An elevator authenticating apparatus 2 is disposed on a predetermined floor (in this example, a first floor (1 F) which is a lobby floor) .</p>
<p id="p0014" num="0014">The authenticating apparatus 2 authenticates permission to use the elevator in response to a predetermined authorizing operation being performed. Examples of a predetermined authorizing operation include operations such as holding a card on which personal information is registered, or a key, etc., over the authenticating apparatus 2, for example.</p>
<p id="p0015" num="0015"><!-- EPO <DP n="5"> --> When the permission to use the elevator is authenticated, the authenticating apparatus 2 generates authenticating information 21 that includes an authentication result that is either "passed" or "failed". The authenticating apparatus 2 has a clock function, and generates date and time information 22 that corresponds to the date and time that the authorizing operation was performed when the authorizing operation is performed.</p>
<p id="p0016" num="0016">The authenticating information 21 is sent from the authenticating apparatus 2 to the elevator control board 1. If the authentication result from the authenticating apparatus 2 is "failed", the elevator control board 1 disables call registration by the operation of landing buttons (not shown), and releases the disabling of call registration only if the authentication result from the authenticating apparatus 2 is "passed".</p>
<p id="p0017" num="0017">A security camera 3 for photographing users that perform the authorizing operation on the authenticating apparatus 2 is disposed on the floor on which the authenticating apparatus 2 is disposed (the lobby floor). The security camera 3 photographs a predetermined range in the vicinity of the authenticating apparatus 2.<br/>
The security camera 3 is also capable of serial photography. In addition, the security camera 3 constantly outputs image data 23 that are obtained by that photography.</p>
<p id="p0018" num="0018">The authenticating information 21, the date and time information 22, and the image data 23 are sent to a processor 4. The processor 4 performs processes related to the determination of whether or not the user is a suspicious person based on the authenticating information 21, the date and time information 22, and the image data 23. The processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 7.</p>
<p id="p0019" num="0019">Stored information that includes suspicious person image data for identifying suspicious persons is stored in the recording medium 5. The suspicious person image data that are stored in the recording medium 5 are also associated with the date and time information and saved.</p>
<p id="p0020" num="0020">The sampling portion 6 determines the ability to process the image<!-- EPO <DP n="6"> --> data 23 from the security camera 3 based on the authenticating information 21. Specifically, the sampling portion 6 performs processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "failed", and stops the processing of the image data 23 if the authentication result from the authenticating apparatus 2 is "passed". In other words, processing of the image data 23 by the sampling portion 6 is performed by sampling image data from a facial portion of the user in the image data 23 as sampled image data 24 only if the authentication that is performed by the authenticating apparatus 2 results in a denial of permission. The sampled image data 24 that have been sampled by the processing of the sampling portion 6 are sent to the determining portion 7 from the sampling portion 6.</p>
<p id="p0021" num="0021">The determining portion 7 receives the sampled image data 24 from the sampling portion 6 and the date and time information 22 from the authenticating apparatus 2. The determining portion 7 has a searching portion 8. The searching portion 8 searches whether or not identifying image data that can be recognized as identical to the sampled image data 24 (i.e., image data that identify a facial portion that is identical to the facial portion of the user identified by the sampled image data 24) are present as suspicious person image data in the stored information. Moreover, the method for searching the stored information is not dependent on any specific method, provided that the algorithm outputs presence or absence of identifying image data as a search result.</p>
<p id="p0022" num="0022">If identifying image data are not present as suspicious person image data in the stored information, the searching portion 8 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. If the identifying image data are present as suspicious person image data in the stored information, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data.</p>
<p id="p0023" num="0023">In this manner, among users who have operated the authenticating<!-- EPO <DP n="7"> --> apparatus 2 in the past, sampled image data (facial portion image data) of users whose authentication result in the authenticating apparatus 2 was "failed" are accumulated as suspicious person image data in the recording medium 5, and the date and time information when the authentication result was "failed" is accumulated so as to be associated with the suspicious person image data.</p>
<p id="p0024" num="0024">The determining portion 7 determines whether or not the user who performed the authorizing operation is a suspicious person based on the search results from the searching portion 8. Specifically, the determining portion 7 determines that the user is a legitimate user if the presence of identifying image data is negated by the searching portion 8 (i.e., if identifying image data are not present as suspicious person image data in the stored information). The determining portion 7 determines that the user is a suspicious person if the presence of identifying image data is found by the searching portion 8 (i.e., if identifying image data are present as suspicious person image data in the stored information).</p>
<p id="p0025" num="0025">The determining portion 7 outputs the sampled image data 24 to an alarm device 9 as warning image data 25 only when it has determined that the user is a suspicious person.</p>
<p id="p0026" num="0026">Moreover, the processor 4 is constituted by a computer that has: an arithmetic processing portion (a CPU), a storage portion (ROM, RAM, etc.), and a signal input/output portion. The functions of the sampling portion 6 and the determining portion 7 are implemented by the computer of the processor 4. That is, programs for implementing the functions of the sampling portion 6 and the determining portion 7 are stored in the storage portion of the computer. The data processing portion executes arithmetic processing that relates to the functions of the processor 4 based on the programs that are stored in the storage portion.</p>
<p id="p0027" num="0027">The alarm device 9 is disposed at a predetermined position in a vicinity of the authenticating apparatus 2. The alarm device 9 generates an alarm that indicates that the user is a suspicious person in response to receiving warning image data 25 from the determining portion 7. In addition, the alarm<!-- EPO <DP n="8"> --> device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (i.e., the sampled image data) as a warning. The alarm device 9 issues a warning sound together with the display of the image on the display portion 10.</p>
<p id="p0028" num="0028">Next, operation will be explained. Photography by a security camera 3 is performed continuously on the floor on which the authenticating apparatus 2 is disposed (the lobby floor). Thus, image data 23 from the security camera 3 is sent to the sampling portion 6 continuously. Processing of the image data 23 is not performed by the sampling portion 6 and output of sampled image data 24 from the sampling portion 6 is stopped if an authorizing operation has not been performed on the authenticating apparatus 2.</p>
<p id="p0029" num="0029">When an authorizing operation is performed on the authenticating apparatus 2 by a user, permission to use the elevator is authenticated by the authenticating apparatus 2. If the authentication result is "failed" (i.e., the authentication returns that use of the elevator is not permitted), then call registration by operation of the landing buttons is disabled by control from the elevator control board 1. Consequently, call registration cannot be performed even if the landing buttons are operated.</p>
<p id="p0030" num="0030">In that case, processing of the image data 23 is performed by the sampling portion 6. Facial portion image data of the user from the image data 23 of the security camera 3 is thereby sampled as sampled image data 24.</p>
<p id="p0031" num="0031">The sampled image data 24 that has been sampled by the sampling portion 6 is sent to the determining portion 7. Next, whether the user is a suspicious person or not is determined by the determining portion 7 based on the sampled image data 24. If it is determined that the user is a suspicious person, the sampled image data 24 are sent from the determining portion 7 to the alarm device 9 as warning image data 25. Thus, the image that is obtained from the warning image data 25 is displayed on the display portion 10 as a warning. At that point, the warning sound issues from the warning device 9.</p>
<p id="p0032" num="0032">If it is determined that the user is a legitimate user, transmission of the<!-- EPO <DP n="9"> --> warning image data 25 from the determining portion 7 to the alarm device 9 is not performed, nor is warning performed by the alarm device 9.</p>
<p id="p0033" num="0033">On the other hand, if the authentication result is "passed" (i.e., if the authentication returns that use of the elevator is permitted), then disabling of call registration by operation of the landing buttons is released by control from the elevator control board 1. In that case, call registration can be performed by operating the landing buttons, and a car that responds to the call registration is moved to the lobby floor (the floor on which the authenticating apparatus 2 is disposed). Here, processing of the image data 23 is not performed by the sampling portion 6, and output of the sampled image data 24 from the sampling portion 6 remains stopped.</p>
<p id="p0034" num="0034">Next, processing actions of the determining portion 7 will be explained. <figref idref="f0002">Figure 2</figref> is a flowchart that shows actions of the determining portion 7 from <figref idref="f0001">Figure 1</figref>. In the figure, when the determining portion 7 receives sampled image data 24 from the sampling portion 6 (S1), the searching portion 8 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S2).</p>
<p id="p0035" num="0035">If the identifying image data are not present as suspicious person image data, the searching portion 8 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S3). In that case, the determining portion 7 determines that the user is not a suspicious person (S4).</p>
<p id="p0036" num="0036">On the other hand, if the identifying image data are present as suspicious person image data, the searching portion 8 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in the recording medium 5 so as to be associated with the identifying image data (S5). In that case, the determining portion 7 determines that the user is a suspicious person (S6), and also outputs the sampled image data 24 to the alarm device 9 as warning image<!-- EPO <DP n="10"> --> data 25 (S7). Processing by the determining portion 7 is performed in this manner.</p>
<p id="p0037" num="0037">In an elevator security system of this kind, because facial portion image data of a user are sampled as sampled image data 24 by the sampling portion 6 only if the authentication result is "flailed", and sampled image data 24 that have been sampled in the past are stored in the recording medium 5 as suspicious person image data, and whether a user is a suspicious person or not can be determined by searching whether or not identifying image data that can be recognized as identical to the sampled image data 24 from the sampling portion 6 are present as suspicious person image data, a user who has had an authentication result "failed" in the past can be designated a suspicious person, enabling determination as to whether or not an elevator user is a suspicious person to be performed easily. Thus, use of an elevator by suspicious persons can be prevented, enabling elevator security to be improved.</p>
<p id="p0038" num="0038">Because the alarm device 9 has a display portion 10 that displays an image that is obtained from the warning image data 25 (the sampled image data) as a warning, the warning that indicates that the person is suspicious can be presented visually, facilitating identification of the suspicious person to whom the warning refers.</p>
<p id="p0039" num="0039">Moreover, in the above example, the alarm device 9 is installed in the vicinity of the authenticating apparatus 2, but the alarm device 9 may also be installed in a control room of the building. The warning from the alarm device 9 can thereby be transmitted to a controller who is stationed inside the control room, enabling elevator security to be improved further.</p>
<heading id="h0010">Embodiment 2</heading>
<p id="p0040" num="0040"><figref idref="f0003">Figure 3</figref> is a block diagram that shows an elevator security system according to Embodiment 2 of the present invention. In the figure, a processor 4 has a recording medium 5, a sampling portion 6, and a determining portion 31. Configuration of the recording medium 5 and the<!-- EPO <DP n="11"> --> sampling portion 6 is similar to that of the recording medium 5 and the sampling portion 6 according to Embodiment 1. The determining portion 31 has a searching portion 32 and a condition comparing portion 33.</p>
<p id="p0041" num="0041">In response to the determining portion 7 receiving sampled image data 24, the searching portion 32 searches whether or not identifying image data (i.e., image data that can be recognized as identical to the sampled image data 24) are present as suspicious person image data in the stored information in the recording medium 5. As a result of the search, if identifying image data are not present as suspicious person image data in the stored information, the searching portion 32 records the sampled image data 24 as suspicious person image data in the recording medium 5, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24. In addition, as a result of the search, if the identifying image data are present as suspicious person image data in the stored information, the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been associated with the identifying image data, and outputs the sampled image data 24, the past date and time information that has been linked to the identifying image data, and the date and time information 22 from the authenticating apparatus 2 to the condition comparing portion 33 as suspicious person candidate information 26.</p>
<p id="p0042" num="0042">The condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies preset suspicious person qualifying conditions.</p>
<p id="p0043" num="0043">Specifically, the condition comparing portion 33 obtains the count of past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (Count), and compares the obtained count of past date and time information (Count) and a set count value (a predetermined threshold value) (TH1) that has been preset. The condition comparing portion 33 also obtains the past date and time information that has been linked to the identifying image data in the suspicious person candidate information 26 (the newest past date and time information item if more than one past date and time information item exists) and the date and<!-- EPO <DP n="12"> --> time information 22 from the authenticating apparatus 2, and compares a time difference between the obtained past date and time information and the date and time information 22 from the authenticating apparatus 2 (Time) and a set time value (a predetermined threshold value) (TH2) that has been preset. The set time value can be set to one minute, for example.</p>
<p id="p0044" num="0044">The condition comparing portion 33 determines that the user does not satisfy the suspicious person qualifying conditions only if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (1) and a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (3). The condition comparing portion 33 determines that the user satisfies the suspicious person qualifying conditions if a relationship between the past date and time information count (Count) and the set count value (TH1) satisfies Expression (2), or a relationship between the date and time information time difference (Time) and the set time value (TH2) satisfies Expression (4).<maths id="math0001" num="(1)"><math display="block"><mfenced><mi>Count</mi></mfenced><mo>≤</mo><mfenced separators=""><mi>TH</mi><mo>⁢</mo><mn>1</mn></mfenced></math><img id="ib0001" file="imgb0001.tif" wi="52" he="7" img-content="math" img-format="tif"/></maths> <maths id="math0002" num="(2)"><math display="block"><mfenced><mi>Count</mi></mfenced><mo>&gt;</mo><mfenced separators=""><mi>TH</mi><mo>⁢</mo><mn>1</mn></mfenced></math><img id="ib0002" file="imgb0002.tif" wi="52" he="7" img-content="math" img-format="tif"/></maths> <maths id="math0003" num="(3)"><math display="block"><mfenced><mi>Time</mi></mfenced><mo>&gt;</mo><mfenced separators=""><mi>TH</mi><mo>⁢</mo><mn>2</mn></mfenced></math><img id="ib0003" file="imgb0003.tif" wi="50" he="7" img-content="math" img-format="tif"/></maths> <maths id="math0004" num="(4)"><math display="block"><mfenced><mi>Time</mi></mfenced><mo>≤</mo><mfenced separators=""><mi>TH</mi><mo>⁢</mo><mn>2</mn></mfenced></math><img id="ib0004" file="imgb0004.tif" wi="51" he="7" img-content="math" img-format="tif"/></maths></p>
<p id="p0045" num="0045">The determining portion 31 determines that the user is a suspicious person only if the condition comparing portion 33 has made a determination that the user satisfies the suspicious person qualifying conditions. The determining portion 31 also outputs the sampled image data 24 that is included in the suspicious person candidate information 26 to the alarm device 9 as warning image data 25 only if it has been determined that the user is a suspicious person. The rest of the configuration is similar to that of Embodiment 1.</p>
<p id="p0046" num="0046">Next, operation will be explained. Because operation according to the present embodiment is similar to operation according to Embodiment 1 except<!-- EPO <DP n="13"> --> for processing actions of the determining portion 31, only the processing actions of the determining portion 31 will be explained.</p>
<p id="p0047" num="0047"><figref idref="f0004">Figure 4</figref> is a flowchart that shows actions of the determining portion 31 from <figref idref="f0003">Figure 3</figref>. In the figure, when the determining portion 31 receives sampled image data 24 from the sampling portion 6 (S11), the searching portion 32 searches whether or not image data that can be recognized as identical to the sampled image data 24 (identifying image data) are stored in the recording medium 5 as suspicious person image data (S12).</p>
<p id="p0048" num="0048">If the identifying image data are not present as suspicious person image data, the searching portion 32 records the sampled image data 24 in the recording medium 5 as suspicious person image data, and also records the date and time information 22 from the authenticating apparatus 2 in the recording medium 5 so as to be associated with the sampled image data 24 (S13). In that case, the determining portion 31 determines that the user is not a suspicious person (S14).</p>
<p id="p0049" num="0049">On the other hand, if the identifying image data are present as suspicious person image data, the searching portion 32 adds the date and time information 22 from the authenticating apparatus 2 to past date and time information that has been stored in stored in the recording medium 5 so as to be associated with the identifying image data (S15). In that case, suspicious person candidate information 26 is sent from the searching portion 32 to the condition comparing portion 33.</p>
<p id="p0050" num="0050">Next, the condition comparing portion 33 determines whether or not the suspicious person candidate information 26 satisfies the suspicious person qualifying conditions (S16). If the suspicious person qualifying conditions are not satisfied, the determining portion 31 determines that the user is not a suspicious person (S14).</p>
<p id="p0051" num="0051">If the suspicious person qualifying conditions are satisfied, the determining portion 31 determines that the user is a suspicious person (S17), and also outputs the sampled image data 24 to the alarm device 9 as warning image data 25 (S18). Processing by the determining portion 31 is performed<!-- EPO <DP n="14"> --> in this manner.</p>
<p id="p0052" num="0052">In an elevator security system of this kind, because the determining portion 31 determines whether or not a user is a suspicious person by comparing a count of past date and time information that has been associated with the identifying image data and a predetermined threshold value, it is possible to designate as a suspicious person only a user for whom the authentication result has been "failed" frequently. Consequently, legitimate users who have accidentally had an authentication result "failed" in the past can be excluded from being treated as suspicious persons, enabling erroneous determinations to be prevented.</p>
<p id="p0053" num="0053">Because the determining portion 31 determines whether or not a user is a suspicious person by comparing a time difference between past date and time information that has been associated with the identifying image data and date and time information 22 from the authenticating apparatus 2 with a predetermined threshold value, it can be determined that a user is a suspicious person when an authentication result is repeatedly "failed" a number of times in a short time, enabling accuracy in determining whether or not someone is a suspicious person to be improved.</p>
<p id="p0054" num="0054">Moreover, the configuration may also be such that elevator running information is transmitted to the display portion 10 from the elevator control board 1, and the display portion 10 displays the elevator running information during normal operation, and display images that are obtained from the suspicious person image data instead of the elevator running information or together with the elevator running information when warning image data 25 is input.</p>
</description>
<claims id="claims01" lang="en"><!-- EPO <DP n="15"> -->
<claim id="c-en-01-0001" num="0001">
<claim-text>An elevator security system comprising:
<claim-text>an authenticating apparatus (2) that authenticates permission to use an elevator in response to a predetermined authorizing operation being performed;</claim-text>
<claim-text>a security camera (3) for photographing a user who performs the authorizing operation;</claim-text>
<claim-text>a processor (4) comprising:
<claim-text>a sampling portion (6) that samples facial portion image data (24) of the user from image data from the security camera (3) as sampled image data (23) only if authentication by the authenticating apparatus results in a denial of permission;</claim-text>
<claim-text>a recording medium (5) in which stored information is stored that includes suspicious person image data consisting of sampled image data that have been sampled in the past for identifying a suspicious person;</claim-text>
<claim-text>and</claim-text>
<claim-text>a determining portion (7) that determines whether or not the user is a suspicious person by searching whether or not identifying image data that can be recognized as identical to the sampled image data (24) are present in the stored information as the suspicious person image data, and that records the sampled image data (24) in the recording medium (5)<!-- EPO <DP n="16"> --> as the suspicious person image data if presence of the identifying image data is negated; and</claim-text></claim-text>
<claim-text>an alarm device (9) that issues a warning that indicates that the user is a suspicious person if a determination is made by the determining portion (7) that the user is a suspicious person.</claim-text></claim-text></claim>
<claim id="c-en-01-0002" num="0002">
<claim-text>An elevator security system according to Claim 1, <b>characterized in that</b>:
<claim-text>the authenticating apparatus (2) generates date and time information (22) that corresponds to a date and time that the authorizing operation was performed;</claim-text>
<claim-text>the determining portion (7) associates and records the date and time information (22) and the sampled image data (24) in the recording medium (5) if presence of the identifying image data is negated, and adds the date and</claim-text>
<claim-text>time information (22) from the authenticating apparatus (2) to past date and time information (22) that has been associated with the identifying image data if the identifying image data are present in the stored information; and</claim-text>
<claim-text>the determination by the determining portion (7) as to whether or not the user is a suspicious person is made by comparing:
<claim-text>a count of the past date and time information (22) that has been associated with the identifying image data; and</claim-text>
<claim-text>a predetermined threshold value.</claim-text></claim-text></claim-text></claim>
<claim id="c-en-01-0003" num="0003">
<claim-text>An elevator security system according to Claim 1, <b>characterized in that</b>:
<claim-text>the authenticating apparatus (2) generates date and time<!-- EPO <DP n="17"> --> information (22) that corresponds to a date and time that the authorizing operation was performed;</claim-text>
<claim-text>the determining portion (7) associates and records the date and time information (22) and the sampled image data (24) in the recording medium (5) if presence of the identifying image data is negated, and adds the date and time information (22) from the authenticating apparatus (2) to past date and time information (22) that has been associated with the identifying image data if the identifying image data are present in the stored information; and</claim-text>
<claim-text>the determination by the determining portion (7) as to whether or not the user is a suspicious person is made by comparing:
<claim-text>a time difference between the date and time information (22) that has been associated with the identifying image data and the date and time information (22) from the authenticating apparatus (2); and</claim-text>
<claim-text>a predetermined threshold value.</claim-text></claim-text></claim-text></claim>
<claim id="c-en-01-0004" num="0004">
<claim-text>An elevator security system according to any of Claims 1 through 3, <b>characterized in that</b> the alarm device (9) has a display portion (1 0) that displays an image that is obtained from the sampled image data (24) as the warning.</claim-text></claim>
</claims>
<claims id="claims02" lang="de"><!-- EPO <DP n="18"> -->
<claim id="c-de-01-0001" num="0001">
<claim-text>Aufzugssicherheitssystem, Folgendes umfassend:
<claim-text>eine Authentisierungsvorrichtung (2), die eine Erlaubnis zur Verwendung eines Aufzugs in Reaktion auf das Ausführen eines festgelegten Autorisierungsvorganges authentisiert,</claim-text>
<claim-text>eine Sicherheitskamera (3) zum Fotografieren eines Benutzers, der den Autorisierungsvorgang ausführt,</claim-text>
<claim-text>einen Prozessor (4), Folgendes umfassend:
<claim-text>einen Abtastabschnitt (6), der Gesichtsabschnitt-Bilddaten (24) des Benutzers aus Bilddaten der Sicherheitskamera (3) als abgetastete Bilddaten (23) abtastet, nur wenn die Authentifizierung durch die Authentifizierungsvorrichtung zu einer Verweigerung der Erlaubnis führt,</claim-text>
<claim-text>ein Aufzeichnungsmedium (5), in dem gespeicherte Informationen gespeichert sind, welche die Bilddaten verdächtiger Personen beinhalten, die aus abgetasteten Bilddaten bestehen, die in der Vergangenheit für die Identifizierung einer verdächtigen Person abgetastet wurden,</claim-text>
<claim-text>und</claim-text>
<claim-text>einen Bestimmungsabschnitt (7), der bestimmt, ob der Benutzer eine verdächtige Person ist oder nicht, indem er fahndet, ob in den gespeicherten Informationen identifizierende Bilddaten, die als identisch mit den abgetasteten Bilddaten (24) erkannt werden können, als Bilddaten verdächtiger Personen vorhanden sind, und<!-- EPO <DP n="19"> --> der die abgetasteten Bilddaten (24) als Bilddaten verdächtiger Personen im Aufzeichnungsmedium (5) aufzeichnet, wenn das Vorhandensein der identifizierenden Bilddaten verneint wird, und</claim-text>
<claim-text>eine Alarmeinrichtung (9), die eine Warnung ausgibt, die anzeigt, dass der Benutzer eine verdächtige Person ist, wenn vom Bestimmungsabschnitt (7) eine Bestimmung vorgenommen wird, dass der Benutzer eine verdächtige Person ist.</claim-text></claim-text></claim-text></claim>
<claim id="c-de-01-0002" num="0002">
<claim-text>Aufzugssicherheitssystem nach Anspruch 1, <b>dadurch gekennzeichnet, dass</b>:
<claim-text>die Authentisierungsvorrichtung (2) Datums- und Zeitinformationen (22) erzeugt, die einem Datum und einem Zeitpunkt entsprechen, zu dem der Autorisierungsvorgang ausgeführt wurde,</claim-text>
<claim-text>der Bestimmungsabschnitt (7) die Datums- und Zeitinformationen (22) und die abgetasteten Bilddaten (24) zuordnet und im Aufzeichnungsmedium (5) aufzeichnet, wenn das Vorhandensein der identifizierenden Bilddaten verneint wird, und der die Datums- und Zeitinformationen (22) von der Authentisierungsvorrichtung (2) zu Datums- und Zeitinformationen (22) aus der Vergangenheit hinzufügt, die den identifizierenden Bilddaten zugeordnet wurden, wenn die identifizierenden Bilddaten in den gespeicherten Informationen vorhanden sind, und</claim-text>
<claim-text>die Bestimmung durch den Bestimmungsabschnitt (7), ob der Benutzer eine verdächtige Person ist oder nicht, ausgeführt wird durch Vergleichen:<!-- EPO <DP n="20"> -->
<claim-text>einer Anzahl der Datums- und Zeitinformationen (22) aus der Vergangenheit, die den identifizierenden Bilddaten zugeordnet wurden, mit</claim-text>
<claim-text>einem festgelegten Grenzwert.</claim-text></claim-text></claim-text></claim>
<claim id="c-de-01-0003" num="0003">
<claim-text>Aufzugssicherheitssystem nach Anspruch 1, <b>dadurch gekennzeichnet, dass</b>:
<claim-text>die Authentisierungsvorrichtung (2) Datums- und Zeitinformationen (22) erzeugt, die einem Datum und einem Zeitpunkt entsprechen, zu dem der Autorisierungsvorgang ausgeführt wurde,</claim-text>
<claim-text>der Bestimmungsabschnitt (7) die Datums- und Zeitinformationen (22) und die abgetasteten Bilddaten (24) zuordnet und im Aufzeichnungsmedium (5) aufzeichnet, wenn das Vorhandensein der identifizierenden Bilddaten verneint wird, und die Datums- und Zeitinformationen (22) von der Authentisierungsvorrichtung (2) zu Datums- und Zeitinformationen (22) aus der Vergangenheit hinzufügt, die den identifizierenden Bilddaten zugeordnet wurden, wenn die identifizierenden Bilddaten in den gespeicherten Informationen vorhanden sind, und</claim-text>
<claim-text>die Bestimmung durch den Bestimmungsabschnitt (7), ob der Benutzer eine verdächtige Person ist oder nicht, ausgeführt wird durch Vergleichen:
<claim-text>einer Zeitabweichung zwischen den Datums- und zeitinformationen (22), die den identifizierenden Bilddaten zugeordnet wurden, und den Datums- und Zeitinformationen (22) aus der Authentisierungsvorrichtung (2) mit</claim-text>
<claim-text>einem festgelegten Grenzwert.</claim-text></claim-text><!-- EPO <DP n="21"> --></claim-text></claim>
<claim id="c-de-01-0004" num="0004">
<claim-text>Aufzugssicherheitssystem nach einem der Ansprüche 1 bis 3, <b>dadurch gekennzeichnet, dass</b> die Alarmeinrichtung (9) einen Anzeigeabschnitt (10) aufweist, der als Warnung ein Bild anzeigt, das aus den abgetasteten Bilddaten (24) gewonnen wird.</claim-text></claim>
</claims>
<claims id="claims03" lang="fr"><!-- EPO <DP n="22"> -->
<claim id="c-fr-01-0001" num="0001">
<claim-text>Système de sécurité pour ascenseur comprenant :
<claim-text>un appareil d'authentification (2) qui authentifie une permission d'utilisation d'un ascenseur en réponse à une opération d'autorisation prédéterminée étant effectuée ;</claim-text>
<claim-text>une caméra de sécurité (3) pour photographier un utilisateur qui effectue l'opération d'autorisation ;</claim-text>
<claim-text>un processeur (4) comprenant :
<claim-text>une partie d'échantillonnage (6) qui échantillonne des données d'image de partie faciale (24) de l'utilisateur à partir de données d'image provenant de la caméra de sécurité (3) en tant que données d'image échantillonnées (23) uniquement si l'authentification par l'appareil d'authentification conduit à un refus de permission ;</claim-text>
<claim-text>un support d'enregistrement (5) dans lequel sont stockées des informations stockées qui comportent des données d'image de personne suspecte constituées de données d'image échantillonnées qui ont été échantillonnées dans le passé pour identifier une personne suspecte ;</claim-text>
<claim-text>et</claim-text>
<claim-text>une partie de détermination (7) qui détermine si l'utilisateur est une personne suspecte ou non en recherchant si des données d'image d'identification qui peuvent être reconnues comme étant identiques aux données d'image échantillonnées (24) sont présentes dans les informations stockées comme étant les données d'image de personne suspecte ou non, et qui enregistre les données d'image échantillonnées (24) dans le support d'enregistrement (5) comme étant les données d'image de personne suspecte si la présence des données d'image d'identification est niée ; et</claim-text>
<claim-text>un dispositif d'alarme (9) qui émet un avertissement qui indique que l'utilisateur est une personne suspecte si la partie de détermination (7) détermine que l'utilisateur est une personne suspecte.</claim-text></claim-text><!-- EPO <DP n="23"> --></claim-text></claim>
<claim id="c-fr-01-0002" num="0002">
<claim-text>Système de sécurité pour ascenseur selon la revendication 1, <b>caractérisé en ce que</b> :
<claim-text>l'appareil d'authentification (2) génère des informations de date et d'heure (22) qui correspondent à une date et à une heure auxquelles l'opération d'autorisation a été effectuée ;</claim-text>
<claim-text>la partie de détermination (7) associe et enregistre les informations de date et d'heure (22) et les données d'image échantillonnées (24) dans le support d'enregistrement (5) si la présence des données d'image d'identification est niée, et ajoute les informations de date et d'heure (22) provenant de l'appareil d'authentification (2) à des informations de date et d'heure passées (22) qui ont été associées aux données d'image d'identification si les données d'image d'identification sont présentes dans les informations stockées ; et</claim-text>
<claim-text>la détermination par la partie de détermination (7) selon laquelle l'utilisateur est une personne suspecte ou non est faite en comparant :
<claim-text>un comptage des informations de date et d'heure passées (22) qui ont été associées aux données d'image d'identification ; et</claim-text>
<claim-text>une valeur seuil prédéterminée.</claim-text></claim-text></claim-text></claim>
<claim id="c-fr-01-0003" num="0003">
<claim-text>Système de sécurité pour ascenseur selon la revendication 1, <b>caractérisé en ce que</b> :
<claim-text>l'appareil d'authentification (2) génère des informations de date et d'heure (22) qui correspondent à une date et une heure auxquelles l'opération d'autorisation a été effectuée ;</claim-text>
<claim-text>la partie de détermination (7) associe et enregistre les informations de date et d'heure (22) et les données d'image échantillonnées (24) dans le support d'enregistrement (5) si la présence des données d'image d'identification est niée, et ajoute les informations de date et d'heure (22) provenant de l'appareil<!-- EPO <DP n="24"> --> d'authentification (2) à des informations de date et d'heure passées (22) qui ont été associées aux données d'image d'identification si les données d'image d'identification sont présentes dans les informations stockées ; et</claim-text>
<claim-text>la détermination par la partie de détermination (7) selon laquelle l'utilisateur est une personne suspecte ou non est faite en comparant :
<claim-text>une différence temporelle entre les informations de date et d'heure (22) qui ont été associées aux données d'image d'identification et les informations de date et d'heure (22) provenant de l'appareil d'authentification (2) ; et</claim-text>
<claim-text>une valeur seuil prédéterminée.</claim-text></claim-text></claim-text></claim>
<claim id="c-fr-01-0004" num="0004">
<claim-text>Système de sécurité pour ascenseur selon l'une des revendications 1 à 3, <b>caractérisé en ce que</b> le dispositif d'alarme (9) a une partie d'affichage (10) qui affiche une image qui est obtenue à partir des données d'image échantillonnées (24) en tant qu'avertissement.</claim-text></claim>
</claims>
<drawings id="draw" lang="en"><!-- EPO <DP n="25"> -->
<figure id="f0001" num="1"><img id="if0001" file="imgf0001.tif" wi="165" he="108" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="26"> -->
<figure id="f0002" num="2"><img id="if0002" file="imgf0002.tif" wi="165" he="204" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="27"> -->
<figure id="f0003" num="3"><img id="if0003" file="imgf0003.tif" wi="165" he="112" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="28"> -->
<figure id="f0004" num="4"><img id="if0004" file="imgf0004.tif" wi="165" he="211" img-content="drawing" img-format="tif"/></figure>
</drawings>
<ep-reference-list id="ref-list">
<heading id="ref-h0001"><b>REFERENCES CITED IN THE DESCRIPTION</b></heading>
<p id="ref-p0001" num=""><i>This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.</i></p>
<heading id="ref-h0002"><b>Patent documents cited in the description</b></heading>
<p id="ref-p0002" num="">
<ul id="ref-ul0001" list-style="bullet">
<li><patcit id="ref-pcit0001" dnum="JP2006103854A"><document-id><country>JP</country><doc-number>2006103854</doc-number><kind>A</kind></document-id></patcit><crossref idref="pcit0001">[0002]</crossref><crossref idref="pcit0005">[0006]</crossref></li>
<li><patcit id="ref-pcit0002" dnum="JP2007022776A"><document-id><country>JP</country><doc-number>2007022776</doc-number><kind>A</kind></document-id></patcit><crossref idref="pcit0002">[0003]</crossref></li>
<li><patcit id="ref-pcit0003" dnum="JP2003109129A"><document-id><country>JP</country><doc-number>2003109129</doc-number><kind>A</kind></document-id></patcit><crossref idref="pcit0003">[0004]</crossref></li>
<li><patcit id="ref-pcit0004" dnum="JP2006109014A"><document-id><country>JP</country><doc-number>2006109014</doc-number><kind>A</kind></document-id></patcit><crossref idref="pcit0004">[0005]</crossref></li>
</ul></p>
</ep-reference-list>
</ep-patent-document>
