MONITORING DEVICE, MONITORING METHOD, AND MONITORING PROGRAM
First Claim
1. A monitoring device which monitors an object existing in a detection area, comprising:
- a detection unit which detects the object in the detection area;
an authentication information acquisition unit which acquires authentication information on the object detected by the detection unit;
a registered authentication information storage unit which stores registered authentication information on an object admitted into the detection area; and
a determination unit which acquires, based on the authentication information acquired by the authentication information acquisition unit and the registered authentication information, a number of registered authentication objects indicating a number of objects holding authentication information which matches the registered authentication information, and a number of unregistered authentication objects indicating a number of objects holding authentication information which does not match the registered authentication information, and sets an alert mode when the detection unit detects existence of the object, and when the number of registered authentication objects is zero, and for determining a suspicious object based on the number of registered authentication objects, the number of unregistered authentication objects, and the alert mode.
1 Assignment
0 Petitions
Accused Products
Abstract
To continuously detect a suspicious person, and to provide information for identifying the suspicious person, a monitoring device for monitoring an object existing in a detection area includes: a detection unit for detecting existence of the object in the detection area; an authentication information acquisition unit for acquiring authentication information held by the detected object; a registered authentication information storage unit for storing registered authentication information on an object admitted into the detection area; a determination unit for acquiring, based on the authentication information and the registered authentication information, a number of registered authentication objects and a number of unregistered authentication objects, for setting an alert mode when the detection unit detects the existence of the object, and when the number of registered authentication objects is zero, and for determining a suspicious object based on the number of registered authentication objects, the number of unregistered authentication objects, and the alert mode; and an alarming/notifying unit for notifying an alarm based on a result of determination by the determination unit.
-
Citations
20 Claims
-
1. A monitoring device which monitors an object existing in a detection area, comprising:
-
a detection unit which detects the object in the detection area; an authentication information acquisition unit which acquires authentication information on the object detected by the detection unit; a registered authentication information storage unit which stores registered authentication information on an object admitted into the detection area; and a determination unit which acquires, based on the authentication information acquired by the authentication information acquisition unit and the registered authentication information, a number of registered authentication objects indicating a number of objects holding authentication information which matches the registered authentication information, and a number of unregistered authentication objects indicating a number of objects holding authentication information which does not match the registered authentication information, and sets an alert mode when the detection unit detects existence of the object, and when the number of registered authentication objects is zero, and for determining a suspicious object based on the number of registered authentication objects, the number of unregistered authentication objects, and the alert mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 18, 19, 20)
-
-
14. A monitoring method for monitoring an object existing in a detection area, comprising:
-
storing registered authentication information on an object admitted into the detection area in a registered authentication information storage unit; detecting existence of the object in the detection area; acquiring authentication information held by the detected object; acquiring, based on the acquired authentication information and the registered authentication information, a number of registered authentication objects indicating a number of objects holding the registered authentication information, and a number of unregistered authentication objects indicating a number of objects holding authentication information other than the registered authentication information; setting an alert mode when the existence of the object is detected, and when the number of registered authentication objects is zero; determining a suspicious object based on the number of registered authentication objects, the number of unregistered authentication objects, and the alert mode; and issuing a notice of an alarm based on a result of the determining. - View Dependent Claims (15, 16)
-
-
17. A monitoring program for monitoring an object existing in a detection area, causing a computer to carry out the procedures of:
-
acquiring a notice indicating detection of existence of the object in the detection area, and authentication information held by the detected object; reading registered authentication information indicating admission into the detection area from a registered authentication information storage unit; acquiring, based on the acquired authentication information and the registered authentication information, a number of registered authentication objects indicating a number of objects holding the registered authentication information, and a number of unregistered authentication objects indicating a number of objects holding authentication information which is not the registered authentication information; setting an alert mode when the existence of the object is detected, and when the number of registered authentication objects is zero; and determining a suspicious object based on the number of registered authentication objects, the number of unregistered authentication objects, and the alert mode.
-
Specification