Security guarantee method and system
First Claim
1. A security system for permitting only an authorized person to conduct a security object action extending to a plurality of security zones, comprising:
- a portable device issued for said authorized person, and storing verification information capable of verifying authenticity of said portable device and inherent information as information inherent to said authorized person of said portable device;
security zone security means for verifying authenticity of said portable device by using said verification information stored in said portable device carried by a person intending to enter a security zone, permitting admission of said person carrying said portable device, authenticity of which is so verified, into said security zone, and rejecting admission of said person carrying said portable device, authenticity of which is not verified, into said security zone;
storage means;
inherent information read means for reading said inherent information stored in said portable device from said portable device, authenticity of which is verified by said security zone security means, and storing said inherent information to said storage means;
inherent information input means for accepting, when a person having said portable device of verified authenticity intends to conduct said security object action in a first zone, the input of inherent information by said person;
security object action security means for permitting said security object action of said person as being the authentic person in said first zone when said inherent information accepted by said information input means coincides with said inherent information stored in said storage means, and rejecting said security object action of said person when said inherent information accepted by said information input means does not coincide with said inherent information stored in said storage means; and
leaving management means for gaining access to said portable device carried by said person leaving said first security zone, stipulating said inherent information stored in said storage means, and erasing said stipulated inherent information from said storage means.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system wherein, when a staff enters a building, a smart card carried by the staff is verified, and staff information inclusive of a staff number and fingerprint information is read from the smart card and is stored temporarily in a temporary storage file. When the staff logs on to a terminal, the fingerprint of the staff is read by a fingerprint input device (LS) and verified with the fingerprint information of the temporary storage file for verification. When the staff leaves the building, the staff number is read from the smart card the staff carries, and the corresponding staff information is erased from the temporary storage file. Security of a security object inside a security zone can be improved.
-
Citations
20 Claims
-
1. A security system for permitting only an authorized person to conduct a security object action extending to a plurality of security zones, comprising:
-
a portable device issued for said authorized person, and storing verification information capable of verifying authenticity of said portable device and inherent information as information inherent to said authorized person of said portable device;
security zone security means for verifying authenticity of said portable device by using said verification information stored in said portable device carried by a person intending to enter a security zone, permitting admission of said person carrying said portable device, authenticity of which is so verified, into said security zone, and rejecting admission of said person carrying said portable device, authenticity of which is not verified, into said security zone;
storage means;
inherent information read means for reading said inherent information stored in said portable device from said portable device, authenticity of which is verified by said security zone security means, and storing said inherent information to said storage means;
inherent information input means for accepting, when a person having said portable device of verified authenticity intends to conduct said security object action in a first zone, the input of inherent information by said person;
security object action security means for permitting said security object action of said person as being the authentic person in said first zone when said inherent information accepted by said information input means coincides with said inherent information stored in said storage means, and rejecting said security object action of said person when said inherent information accepted by said information input means does not coincide with said inherent information stored in said storage means; and
leaving management means for gaining access to said portable device carried by said person leaving said first security zone, stipulating said inherent information stored in said storage means, and erasing said stipulated inherent information from said storage means. - View Dependent Claims (2, 3, 4, 16)
-
-
5. A method of accomplishing security in a security system for permitting only an authentic person to conduct a security object action extending to a plurality of security zones, comprising the steps of:
-
issuing a portable device storing verification information capable of verifying authenticity of said portable device and inherent information as information inherent to an authentic user to whom said portable device is issued, to said authentic person;
verifying authenticity of said portable device by using said verification information stored in said portable device carried by a person intending to enter said security zone in a security system, permitting said user carrying said portable device, authenticity of which is so verified, to enter said security zone, and rejecting a person carrying said portable device, authenticity of which is not verified, to enter said security zone;
reading said inherent information stored in said portable device from said portable device, authenticity of which is verified, in said security system, and storing said inherent information inside said security system;
accepting, when a person having said portable device of verified authenticity intends to conduct said security object action in a first zone, the input of inherent information from said person;
permitting said security object action in said first zone by said person as being the authentic person when said inherent information accepted coincides with said inherent information stored in said security system, and rejecting said security object action by said person when said inherent information accepted by said information input means does not coincide with said inherent information stored in said security system; and
gaining access to said portable device carried by said person leaving said first security zone in said security system, stipulating said inherent information stored in said security system, and erasing said stipulated inherent information from inside said security system, in said security system.
-
-
6. A security system for permitting only an authentic person to conduct a security object action extending to a plurality of zones, comprising:
-
a portable device issued to said authentic person in common for a plurality of zones, and recording verification information capable of verifying authenticity of said portable device and inherent information as information inherent to said authentic user to whom said portable device is issued;
security zone security means for verifying authenticity of said portable device by using said verification information stored in said portable device carried by a person intending to enter a first security zone of a plurality of said zones, permitting said person carrying said portable device, authenticity of which is verified, to enter said first security zone of a plurality of said zones, and rejecting said person carrying said portable device, authenticity of which is not verified, to enter said first security zone of a plurality of zones;
storage means;
inherent information read means for reading said inherent information stored in said portable device from said portable device, authenticity of which is verified by said security zone security means, carried by said person entering said first security zone of a plurality of said zones, and storing said inherent information in said storage means;
information input means for accepting, when a person having said portable device of verified authenticity intends to conduct said security object action in a first zone, the input of inherent information from said person;
security object action security means for permitting said person as being the authentic person to conduct said security object action in said first zone when said inherent information accepted by said information input means coincides with said inherent information stored in said storage means, and rejecting said person to conduct said security object action when said inherent information accepted by said information input means does not coincide with said inherent information stored in said storage means; and
leaving management means for gaining access to said portable device carried by said person leaving said first security zone of a plurality of said zones, stipulating said inherent information stored in said storage means, and erasing said stipulated inherent information from said storage means. - View Dependent Claims (9, 12)
-
-
7. A security system for permitting only an authentic person to conduct a security object action extending to a plurality of zones, comprising:
-
a portable device issued to an authentic person in common to a plurality of said zones, and recording verification information capable of verifying authenticity of said portable device and inherent information as information inherent to said authentic person to whom said portable device is issued;
inherent information read means for gaining access to said portable device carried by a person intending to enter a plurality of said zones and to conduct said security object action, verifying authenticity of said portable device by using said verification information stored, reading said inherent information stored in said portable device from said portable device of said person carrying said portable device authenticity of which is verified, and storing said inherent information to storage means;
inherent information input means for accepting, when a person having said portable device of verified authenticity intends to conduct said security object action in a first zone, the input of inherent information from said person;
security object action security means for permitting said person as being the authentic person to conduct said security object action in said first zone when said inherent information accepted by said input means coincides with said inherent information stored in said storage means, and rejecting said person to conduct said security object action when said inherent information accepted by said information input means does not coincide with said inherent information stored in said storage means; and
leaving management means for gaining access to said portable device carried by said person leaving said first zone of a plurality of zones, stipulating said inherent information stored in said inherent information storage means, and erasing said stipulated inherent information from said storage means. - View Dependent Claims (10, 13)
-
-
8. A security system for permitting only an authentic person to conduct a security object action extending to a plurality of zones, comprising:
-
a portable device issued to said authentic person in common to a plurality of said zones, and recording verification information capable of verifying authenticity of said portable device and inherent information as information inherent to said authentic person to whom said portable device is issued;
inherent information read means for verifying authenticity of said portable device by using said verification information stored in said portable device carried by a person intending to conduct said security object action in a plurality of said zones, reading said inherent information stored in said portable device from said portable device, authenticity of which is verified, and storing said inherent information to storage means;
inherent information input means for accepting, when a person having said portable device of verified authenticity intends to conduct said security object action in a first zone, the input of inherent information from said person; and
security object action security means for permitting said person as being the authentic person to conduct said security object action in said first zone when said inherent information accepted by said information input means coincides with said inherent information stored in said storage means, and rejecting said person to conduct said security object action when said inherent information accepted by said information input means does not coincide with said inherent information stored in said storage means. - View Dependent Claims (11, 14)
-
-
15. A security system for permitting an authentic person to use a terminal or a computer room, comprising:
-
a portable device having a verification information issued to an authentic person;
verification means verifying said verification information by using said portable device carried by a person at an entrance of a building;
access means reading said verification information out of said portable device to store in said access means;
second verification means verifying said verification information by reading said verification information from said access means when said person intends to use a terminal or a computer room; and
erasing means erasing said verification information from said access means when said person leaves said building. - View Dependent Claims (17, 18, 19, 20)
-
Specification