Authentication system, authentication method and program

ABSTRACT

An authentication system includes at least one processor configured to register user information on a user who is to visit a predetermined location, and scheduled time information on scheduled time at which the user is to visit the predetermined location, in association with each other in a storage, execute, when someone visits the predetermined location, authentication based on visitor information on the someone, the user information, visit time information on time at which the someone visits the predetermined location, and the scheduled time information.

TECHNICAL FIELD

The present disclosure relates to an authentication system, anauthentication method, and a program.

BACKGROUND ART

Hitherto, there is known a technology of verifying, when a user isscheduled to visit a predetermined location, whether a person whoactually visits the predetermined location is an authentic user. InPatent Literature 1, for example, there is described a system configuredto issue in advance an IC card having recorded therein biometricinformation of a user (for example, orderer of items or representative)who is to pick up items stored in a locker, cause the locker to read theIC card to execute biometric authentication, and permit the items storedin the locker to be picked up when the biometric authentication issuccessful.

CITATION LIST Patent Literature

[PTL 1] JP 2010-152842 A

SUMMARY OF INVENTION Technical Problem

However, with the technology of Patent Literature 1, the user isrequired to carry the IC card to pick up the items stored in the locker,and hence there is a fear that the IC card may be stolen or lost. Forexample, when an outsider who has gained the IC card gains in some way aportrait and other information of the user, the outsider can impersonatethe user to pick up the items, and hence security cannot be improvedsufficiently.

It is an object of the present disclosure to improve security in a caseof authenticating a person who has visited a predetermined location.

Solution to Problem

According to one embodiment of the present disclosure, there is providedan authentication system including: registration means for registeringuser information on a user who is to visit a predetermined location, andscheduled time information on scheduled time at which the user is tovisit the predetermined location, in association with each other instorage means; and authentication means for executing, when someonevisits the predetermined location, authentication based on visitorinformation on the someone, the user information, visit time informationon time at which the someone visits the predetermined location, and thescheduled time information.

According to one embodiment of the present disclosure, there is providedan authentication method including: a registration step of registeringuser information on a user who is to visit a predetermined location, andscheduled time information on scheduled time at which the user is tovisit the predetermined location, in association with each other instorage means; and an authentication step of executing, when someonevisits the predetermined location, authentication based on visitorinformation on the someone, the user information, visit time informationon time at which the someone visits the predetermined location, and thescheduled time information.

According to one embodiment of the present disclosure, there is provideda program for causing a computer to function as: registration means forregistering user information on a user who is to visit a predeterminedlocation, and scheduled time information on scheduled time at which theuser is to visit the predetermined location, in association with eachother in storage means; and authentication means for executing, whensomeone visits the predetermined location, authentication based onvisitor information on the someone, the user information, visit timeinformation on time at which the someone visits the predeterminedlocation, and the scheduled time information.

According to one aspect of the present disclosure, the registrationmeans is configured to register the user information on each of aplurality of users who are to visit the predetermined location, and thescheduled time information on scheduled times at which the plurality ofusers are to visit the predetermined location, in association with eachother in the storage means, and the authentication means is configuredto execute the authentication based on the visitor information and, ofthe user information on each of the plurality of users, the userinformation with which the scheduled time information corresponding tothe visit time information is associated.

According to one aspect of the present disclosure, the registrationmeans is configured to register, in association with each of a pluralityof the predetermined locations, the user information on a user who is tovisit the predetermined location, and the scheduled time information onscheduled time at which the user is to visit the predetermined location,in the storage means, and the authentication means is configured toexecute, when the someone visits anyone of the plurality ofpredetermined locations, the authentication based on the visitorinformation on the someone, the user information associated with thepredetermined location, the visit time information on time at which thesomeone visits the predetermined location, and the scheduled timeinformation associated with the predetermined location.

According to one aspect of the present disclosure, the authenticationsystem further includes: presentation means for presenting, to the useror a requester who requests the user to travel, options on time at whichthe user is to visit the predetermined location; and acquisition meansfor acquiring the scheduled time information based on one of the optionsthat is selected by the user or the requester, and the registrationmeans is configured to register the scheduled time information acquiredby the acquisition means in the storage means.

According to one aspect of the present disclosure, the presentationmeans is configured to present the options to the user or the requesterbased on preparation time information on time required for preparationin the predetermined location.

According to one aspect of the present disclosure, the presentationmeans is configured to present the options to the user or the requesterbased on capacity information on a capacity in the predeterminedlocation.

According to one aspect of the present disclosure, the presentationmeans is configured to present the options to the user or the requesterbased on travel time information on time required to travel to thepredetermined location.

According to one aspect of the present disclosure, the presentationmeans is configured to acquire the travel time information based on, ofa plurality of means of travel, means of travel specified by the user orthe requester.

According to one aspect of the present disclosure, the registrationmeans is configured to register, before registering the user informationof the user and the scheduled time information in the storage means,user information on another user who is to visit the predeterminedlocation, and scheduled time information on scheduled time at which theanother user is to visit the predetermined location, in association witheach other in the storage means, the authentication system furtherincludes determination means for determining whether a fear of erroneousauthentication exists between the user and the another user, and thepresentation means is configured to present the options to the user orthe requester based on a result of the determination by thedetermination means.

According to one aspect of the present disclosure, the presentationmeans is configured to present, to the user or the requester, aplurality of the options including the options based on conditionsspecified by the user or the requester, and the options based onconditions obtained by changing a part of the conditions.

According to one aspect of the present disclosure, the registrationmeans is configured to register, before registering the user informationof the user and the scheduled time information in the storage means,user information on another user who is to visit the predeterminedlocation, and scheduled time information on scheduled time at which theanother user is to visit the predetermined location, in association witheach other in the storage means, and the authentication system furtherincludes: determination means for determining whether a fear oferroneous authentication exists between the user and the another user;and additional authentication means for requesting additionalauthentication of the someone based on a result of the determination bythe determination means.

According to one aspect of the present disclosure, the registrationmeans is configured to register biometric information of the user, oridentification information of the user for acquiring the biometricinformation, as the user information in the storage means, the visitorinformation is biometric information of the someone, and theauthentication means is configured to execute the authentication basedon the biometric information of the someone, the biometric informationof the user, the visit time information, and the scheduled timeinformation.

According to one aspect of the present disclosure, the predeterminedlocation is a store at which the user is to pick up an item, thescheduled time information is information on scheduled time at which theuser is to visit the store, the visit time information is information ontime at which the someone visits the store, and the authenticationsystem further includes permission means for permitting the pickup ofthe item at the store when the authentication is successful.

Advantageous Effects of Invention

According to the present disclosure, it is possible to improve securityin the case of authenticating the person who has visited thepredetermined location.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a diagram for illustrating an example of an overallconfiguration of an authentication system.

FIG. 2 is a view for illustrating an example of a flow in which a userorders items.

FIG. 3 is a view for illustrating an example of an order content screendisplayed on a store terminal.

FIG. 4 is a view for illustrating an example of how the user picks upitems in a pickup box.

FIG. 5 is a view for illustrating an example of a notification screendisplayed on the store terminal.

FIG. 6 is a functional block diagram for illustrating an example offunctions achieved in the authentication system.

FIG. 7 is a table for showing a data storage example of a storedatabase.

FIG. 8 is a table for showing a data storage example of a user database.

FIG. 9 is a table for showing a data storage example of an orderdatabase.

FIG. 10 is a table for showing a data storage example of an itemdatabase.

FIG. 11 is a flow chart for illustrating an example of order processing.

FIG. 12 is a flow chart for illustrating the example of the orderprocessing.

FIG. 13 is a flowchart for illustrating an example of pickup processing.

FIG. 14 is a functional block diagram in modification examples of thepresent disclosure.

FIG. 15 is a view for illustrating an example of a confirmation screenin Modification Example (2) of the present disclosure.

DESCRIPTION OF EMBODIMENTS 1. Overall Configuration of AuthenticationSystem

Now, an example of an authentication system according to an embodimentof the present disclosure is described. In this embodiment, descriptionis given taking as an example a case in which the authentication systemis applied to a service of accepting an order of items, but theauthentication system is applicable to various services. Examples ofapplication to other services are described later in modificationexamples.

FIG. 1 is a diagram for illustrating an example of an overallconfiguration of the authentication system. As illustrated in FIG. 1, anauthentication system S includes a server 10, a user terminal 20, astore terminal 30, and a pickup box 40. Each of the server 10, the userterminal 20, the store terminal 30, and the pickup box 40 is connectableto a network N, for example, the Internet. Each of the server 10, theuser terminal 20, the store terminal 30, and the pickup box 40 may beprovided in plurality.

The server 10 is a server computer. The server 10 includes a controlunit 11, a storage unit 12, and a communication unit 13. The controlunit 11 includes at least one microprocessor. The control unit 11executes processing as programmed by programs and data stored in thestorage unit 12. The storage unit 12 includes a main memory unit and anauxiliary memory unit. For example, the main memory unit is a volatilememory, for example, a RAM. Further, for example, the auxiliary memoryunit is a non-volatile memory such as a ROM, an EEPROM, a flash memory,or a hard disk drive. The communication unit 13 is a communicationinterface for wired communication or wireless communication.

The user terminal 20 is a computer to be operated by a user. Forexample, the user terminal 20 is a mobile phone (including a smartphone), a personal digital assistant (including a tablet-type computerand a wearable device), a personal computer, or the like. In thisembodiment, the user terminal 20 includes a control unit 21, a storageunit 22, a communication unit 23, an operation unit 24, a display unit25, and a photographing unit 26. Physical components of the control unit21, the storage unit 22, and the communication unit 23 may be similar tothose of the control unit 11, the storage unit 12, and the communicationunit 13, respectively.

The operation unit 24 is an input device. For example, the operationunit 24 includes a touch panel, a mouse, a keyboard, or buttons. Forexample, the display unit 25 is a liquid crystal display unit or anorganic EL display unit. The photographing unit 26 includes at least onecamera. For example, the photographing unit 26 includes an image pickupelement such as a CCD image sensor or a CMOS image sensor. Thephotographing unit 26 is configured to record, as digital data, an imagetaken by the imaging element. The image may be a still image or a movingimage taken consecutively at a predetermined frame rate.

The store terminal 30 is a computer to be operated by store staff. Forexample, the store terminal 30 is a mobile phone, a personal digitalassistant, a personal computer, or the like. In this embodiment, thestore terminal 30 includes a control unit 31, a storage unit 32, acommunication unit 33, an operation unit 34, a display unit 35, and aphotographing unit 36. Physical components of the control unit 31, thestorage unit 32, the communication unit 33, the operation unit 34, thedisplay unit 35, and the photographing unit 36 may be similar to thoseof the control unit 11, the storage unit 12, the communication unit 13,the operation unit 24, the display unit 25, and the photographing unit26, respectively.

The pickup box 40 is a box configured to store items. For example, thepickup box 40 has a configuration equivalent to that of a smart phone ora tablet terminal, and includes a control unit 41, a storage unit 42, acommunication unit 43, an operation unit 44, a display unit 45, and aphotographing unit 46. Physical components of the control unit 41, thestorage unit 42, the communication unit 43, the operation unit 44, thedisplay unit 45, and the photographing unit 46 may be similar to thoseof the control unit 11, the storage unit 12, the communication unit 13,the operation unit 24, the display unit 25, and the photographing unit26, respectively. Alternatively, the pickup box 40 may have a simpleconfiguration as in the modification examples to be described later.

Programs and data described to be stored in the storage units 12, 22,32, and 42 may be supplied through the network N. Further, hardwarecomponents of each of the server 10, the user terminal 20, the storeterminal 30, and the pickup box 40 are not limited to theabove-mentioned examples, and various kinds of hardware are applicable.For example, a reading unit (for example, an optical disc drive or amemory card slot) configured to read a computer-readable informationstorage medium, or an input/output unit (for example, a USB port)configured to input/output data to/from an external device may beincluded. For example, programs or data stored in an information storagemedium may be supplied via the reading unit or the input/output unit.

2. Overview of Authentication System

In this embodiment, processing of the authentication system S isdescribed taking as an example a case in which the user operates theuser terminal 20 to order items of a store, and the user himself orherself visits the store empty-handed to pick up the items. The store isan example of a predetermined location that the user is to visit. Forthat reason, description of “store” in this embodiment can be read as“predetermined location.” The term “visiting” has similar meaning tocoming, going, or traveling.

Further, in this embodiment, an eating and drinking establishment isdescribed as an example of the store, and food and drink are describedas an example of the items. In regard to the authentication system S,the authentication system S is applicable to a service of ordering itemsof a certain store. Examples of application to other types of stores aredescribed later in the modification examples. Further, the predeterminedlocation that the user is to visit may be a certain location as well asa store. Examples of application to other locations are also describedlater in the modification examples.

FIG. 2 is a view for illustrating an example of a flow in which a userorders items. As illustrated in FIG. 2, when the user starts anapplication for accepting an order of items, which is installed in theuser terminal 20, a menu screen G1 is displayed on the display unit 25.In this embodiment, description is given of a case in which each ofscreens shown in FIG. 2 is displayed as a screen of the application, buteach of the screens may be displayed as a screen of a browser.

The menu screen G1 displays input forms F10 and F11 for inputting searchconditions, and a button B12 for executing a search. The searchconditions are conditions for searching for at least one of a store andan item. The search conditions may be any conditions, and include atleast one of a postal code, an area, a store name, and a genre, forexample. When the user inputs the search conditions in the input formsF10 and F11 and selects the button B12, a search result screen G2showing search results is displayed on the display unit 25.

The search result screen G2 displays a list L20 of stores found in thesearch based on the search conditions input by the user. The list L20displays at least one store in a selectable manner. When the userselects any one of the stores in the list L20, a details screen G3showing details of the store is displayed on the display unit 25.

The details screen G3 displays a list L30 of items of the store selectedby the user. The list L30 displays at least one item in a selectablemanner. The user selects certain items in the list L30 and puts theselected items in the shopping cart. The user causes each of the menuscreen G1, the search result screen G2, and the details screen G3 to bedisplayed until he or she finds desired items, and puts the desireditems in the shopping cart. When the user puts the desired items in theshopping cart and performs operation for confirming the order content, aconfirmation screen G4 is displayed on the display unit 25.

The confirmation screen G4 displays a store name, an address, a phonenumber, and other information on the store, and an item name,quantities, a price, and other information on each of the items in theshopping cart. The confirmation screen G4 displays, along with thosepieces of information, buttons B40 for selecting an arrival time window,and a button B41 for confirming the order. Although details are to bedescribed later, in this embodiment, possible arrival time windows arecalculated in consideration of various factors, such as cooking time forthe items, a staff capacity, a capacity of the pickup box 40, and traveltime of the user.

When the user selects any one of the buttons B40 and then selects thebutton B41, the server 10 accepts the order of the user, and executespayment processing with the use of a credit card number registered inadvance or the like. When the payment processing is complete, the server10 transmits a notification indicating the order content of the user tothe store terminal 30. When receiving the notification, the storeterminal 30 displays an order content screen showing the order contentof the user on the display unit 35.

FIG. 3 is a view for illustrating an example of the order content screendisplayed on the store terminal 30. As illustrated in FIG. 3, an ordercontent screen G5 displays item names and other information of ordereditems, a name and other information of the user, and a scheduled arrivaltime window. In this embodiment, description is given of a case in whichthe order content screen G5 is displayed as a screen of an applicationinstalled in the store terminal 30, but may be displayed as a screen ofa browser. Alternatively, contents similar to those of the order contentscreen G5 may be displayed through use of an electronic mail, an SNS, orthe like.

When staff sees the order content screen G5, the staff starts cookingthe items so as to be in time for the scheduled arrival time window. Thestaff completes cooking and wrapping the items before the scheduledarrival time window, and stores the items in the pickup box 40. The usertravels from a departure point, for example, his or her home, to thestore so as to be in time for the scheduled arrival time window, andpicks up the items in the pickup box 40.

FIG. 4 is a view for illustrating an example of how the user picks upthe items in the pickup box 40. As illustrated in FIG. 4, the pickup box40 is arranged inside or outside of the store. In FIG. 4, of thecomponents of the pickup box 40 illustrated in FIG. 1, only thecommunication unit 43 and the photographing unit 46 are illustrated, butthe operation unit 44 and the display unit 45 may also be arranged onthe user side. In this case, an item pickup procedure may be displayedon the display unit 45, and the user may perform operation for pickingup the items on the operation unit 44.

The pickup box 40 in this embodiment includes spaces in which itemsordered by a plurality of users can be stored, respectively. Forexample, the pickup box 40 is divided into three spaces, and can storeorders for three users. The spaces in the pickup box 40 are not limitedto the example in this embodiment, and may include a space or spaces inwhich an order or orders of one user, two users, or four or more userscan be stored. Alternatively, a plurality of pickup boxes 40 may bearranged in the store.

The staff is to attach, to wrapped items, memos describing informationfor identifying to which user the items belong. Those pieces ofinformation may be imparted to the items by any other method, forexample, directly writing on a wrapping bag. By looking at those piecesof information, the user can identify the items he or she is supposed topick up even when items for a plurality of orders are stored in thepickup box 40.

For example, the pickup box 40 has doors on the front side and the backside, respectively, as seen from the user. The door on the front side isused for the user to pick up the items. The door on the front side islocked in principle. When the user who has arrived is successfullyauthenticated, the door on the front side of the pickup box 40 isunlocked. In this embodiment, face authentication is described as anexample of the authentication, but various known methods are applicableto the authentication itself. Application examples of otherauthentication are described later in the modification examples. Thedoor on the back side is used for the staff to store the items.

When the user has arrived in a time window specified by himself orherself, the user causes the photographing unit 46 of the pickup box 40to photograph his or her face. The pickup box 40 transmits, to theserver 10, a taken image obtained as a result of the photographing bythe photographing unit 46. The server 10 executes the faceauthentication based on a feature amount of a face shown in the takenimage received from the pickup box 40, and a feature amount of a faceextracted from a portrait registered in advance by the user.

When the face authentication is successful, the door on the front sideof the pickup box 40 is unlocked. When the door on the front side isunlocked, the user opens the door to pick up the items. After picking upthe items, the user closes the door on the front side. This completesthe pickup of the items at the store. The door on the front side may beopened and closed automatically under control of the pickup box 40. Whenthe face authentication has failed, a notification screen for notifyingthe staff of the failure is displayed on the display unit 35 of thestore terminal 30.

FIG. 5 is a view for illustrating an example of the notification screendisplayed on the store terminal 30. As illustrated in FIG. 5, anotification screen G6 displays a message that the face authenticationhas failed to prompt the staff to help the user as instructed in amanual. When the staff sees the notification screen G6, the staffattends the user in front of the pickup box 40. After verballyconfirming validity of the user based on the information displayed onthe notification screen G6, the staff hands the items in the pickup box40 to the user. The staff may request the user to present his or heridentification card. Thereafter, when the staff selects a button B60,the server 10 is notified that the pickup of the items is complete.

As described above, in this embodiment, even when the user arrives atthe store empty-handed, as long as the face authentication issuccessful, the user can pick up the items without directly contactingthe staff. It should be noted, however, that because the faceauthentication is not completely accurate, when simple faceauthentication is used alone, there is a fear that a malicious outsidermay impersonate the user to pick up the items. This risk is not limitedto the face authentication, and is also true for other authentication.

To address the above-mentioned problem, in this embodiment, it isensured that even with an authentic user, the face authentication endsup unsuccessfully unless the user arrives at the store in the timewindow specified by himself or herself. Consequently, even when anoutsider who resembles the user in face comes to the store, the outsidercannot pick up the items without permission unless he or she knows thetime window specified by the user. In this manner, the authenticationsystem S is configured to improve security by using not only simple faceauthentication but also temporal information that is unknown to theoutsider. Details of this technology are described below.

3. Functions Achieved in Authentication System

FIG. 6 is a functional block diagram for illustrating an example offunctions achieved in the authentication system S. Now, description isgiven of functions achieved by each of the server 10, the user terminal20, the store terminal 30, and the pickup box 40.

[3-1. Functions Achieved in Server]

As illustrated in FIG. 6, a data storage unit 100, a presentation unit101, an acquisition unit 102, a registration unit 103, an authenticationunit 104, and a permission unit 105 are achieved in the server 10. Thedata storage unit 100 is mainly achieved by the storage unit 12. Each ofthe presentation unit 101, the acquisition unit 102, the registrationunit 103, the authentication unit 104, and the permission unit 105 ismainly achieved by the control unit 11.

[Data Storage Unit]

The data storage unit 100 is configured to store data required forauthentication. Here, as an example of the data stored in the datastorage unit 100, a store database DB1, a user database DB2, an orderdatabase DB3, and an item database DB4 are described.

FIG. 7 is a table for showing a data storage example of the storedatabase DB1. As shown in FIG. 7, the store database DB1 is a databasestoring information on each of a plurality of stores. For example, thestore database DB1 stores a store ID, a store name, a password, a genre,an area, an address, a phone number, an email address, a store image,and capacity information. The store database DB1 can be updated by thestaff.

The store ID is information for uniquely identifying the store. Thepassword is used to log in from the application installed in the storeterminal 30. The store name, the genre, the area, and the address areused as indices in a search. The store database DB1 includes otherinformation such as a description and reviews of the store, and theother information may be used as the indices.

The capacity information is information on a capacity of the store. Theterm “capacity” means processing ability in the store. In thisembodiment, description is given of a case in which the capacity isexpressed by a numerical value, but the capacity may be expressed byanother element, for example, a character. As the numerical valuebecomes higher, the capacity becomes larger. As the capacity becomeslarger, time required from when the order is accepted to when thepreparation is complete becomes shorter.

In a case of a capacity in terms of facilities, for example, thecapacity information may indicate at least one of the number and sizesof pickup boxes 40, and the number of items that can be stored therein,or may indicate at least one of the number and types of cookingfacilities of the store, and the size of a kitchen thereof. Meanwhile,in a case of a capacity in terms of personnel, for example, the capacityinformation indicates at least one of the number of staff members, anability of the staff, the number of items that can be cooked, andcrowdedness of the store. The numerical value indicated by the capacityinformation may be changed depending on at least one of the time of theday and the day of the week.

FIG. 8 is a table for showing a data storage example of the userdatabase DB2. As shown in FIG. 8, the user database DB2 is a databasestoring information on each of a plurality of users. The user databaseDB2 stores a user ID, and the name, a password, age, sex, an address, aphone number, an email address, uploaded data of a portrait, a featureamount of a face calculated based on the portrait, means of travel tothe store, and payment information of the user. The user database DB2can be updated through operation by the user.

The feature amount of the face is information obtained by convertingfeatures of the face into numerical values, and indicates relativepositions, sizes, shapes, or other features of face parts, for example.In this embodiment, the feature amount of the face shown in the portraitis calculated in advance, but the feature amount of the face may becalculated on the spot at the time of authentication. When a pluralityof portraits are registered, the feature amount of the face iscalculated for each of the portraits.

Various methods are applicable to the face authentication itself, andfor example, principal component analysis, linear discriminant analysis,elastic matching, a hidden Markov model, or other methods areapplicable, and the feature amount may be calculated with a formulacorresponding to one of those methods. For example, the feature amountof the face is expressed by a multidimensional vector, but may beexpressed in other forms such as an array or a single numerical value.

In this embodiment, the feature amount of the face is an example ofauthentication information. The authentication information isinformation used in authentication. The authentication information maybe any information corresponding to the authentication method, and maybe, for example, a fingerprint pattern, a voice print pattern, a veinpattern, an autograph pattern, a password, a passcode, a PIN, or asecret word. Further, for example, at least one of a user ID, age, sex,an address, a phone number, and an email address may correspond to theauthentication information. Still further, other information, forexample, date of birth of the user, may be stored in advance in the userdatabase DB2 so that the other information corresponds to theauthentication information, for example.

The means of travel is a method of travel to the store. The means oftravel may also be referred to as “means of transportation.” Forexample, of a plurality of types of means of travel such as on foot, bybike, by car, by train, and by bus, means of travel specified by theuser is stored in the user database DB2. When the user does not specifyany means of travel, default means of travel (for example, on foot) isstored in the user database DB2. In this embodiment, a reference travelspeed is defined for each means of travel.

The payment information is information used in electronic payment. Thepayment information may be any information used in payment, and is, forexample, a credit card number, a debit card number, an account number ofa bank account, an account associated with an electronic money orpoints, or identification information of a wallet registered on the web.In addition, the payment information may be an account of an electronicpayment application or other information, for example.

FIG. 9 is a table for showing a data storage example of the orderdatabase DB3. As shown in FIG. 9, the order database DB3 is a databasestoring information on orders accepted by each of a plurality of stores.For example, the order database DB3 stores an order ID, a store ID,orderer information, order content information, scheduled timeinformation, and receiver information. The order database DB3 is updatedevery time an order is accepted. The order database DB3 may store otherinformation, for example, information indicating a current status of theorder (such as “preparation of the items is complete” or “pickup of theitems is complete”).

The orderer information is information on an orderer. The orderer is auser who ordered items. For example, the orderer information includes atleast one of a user ID, name, age, sex, a phone number, and an emailaddress of the orderer. The order content information is information ondetails of ordered items. For example, the order content informationincludes an item ID, quantities, and presence or absence of an option ofeach of the ordered items.

The scheduled time information is information on scheduled time at whicha receiver is to visit the store. In this embodiment, description isgiven of a case in which the scheduled time information indicates a timewindow having a fixed length, but the scheduled time information mayindicate a pinpoint time instead of a time window. Alternatively, thetime window indicated by the scheduled time information is not limitedto 30 minutes as in this embodiment, and may have any length. Forexample, the time window may be shorter than 30 minutes, such as a timewindow in units of 5 minutes or 10 minutes, or may be longer than 30minutes, such as 1 hour or 2 hours. The scheduled time information isonly required to include at least one of a date and a time, and mayinclude the date alone or the time alone, for example.

The receiver information is information on the receiver. The receiver isa user who is to pick up the items. In other words, the receiver is auser who is to actually visit the store. The receiver may also bereferred to as “visitor.” For example, the receiver information includesat least one of a user ID, name, age, sex, a phone number, and an emailaddress of the receiver. In this embodiment, description is given of acase in which the orderer and the receiver are the same, but the ordererand the receiver may be different. When the orderer and the receiver aredifferent, the orderer may specify the receiver, or the receiver may bedetermined automatically without being specified by the orderer. Forexample, the receiver may be an acquaintance of the orderer, such as afamily member, a friend, or a colleague of the orderer, or may be anon-acquaintance of the orderer, for example, an item pickup agent.

FIG. 10 is a table for showing a data storage example of the itemdatabase DB4. As shown in FIG. 10, the item database DB4 is a databasestoring information on items of each of a plurality of stores. Forexample, the item database DB4 stores a store ID, an item ID, an itemname, a price, an item image, and preparation time information. The itemdatabase DB4 can be updated by the staff.

The preparation time information is information on preparation timerequired to prepare the item. The preparation time information may bespecified by the staff, or may be determined automatically depending onthe type of the item. In this embodiment, the items are food and drink,and hence the preparation time information is a numerical valueindicating time required to cook the item. In the data storage exampleof FIG. 10, the preparation time information indicates preparation timefor one unit of the item, but the preparation time may be indicated forevery two or more units. In this case, the preparation time informationmay be set so that as the number of units becomes larger, thepreparation time becomes longer.

[Presentation Unit]

The presentation unit 101 is configured to present, to the user or arequester who requests the user to travel, options on time at which theuser is to visit the store. In this embodiment, the orderer correspondsto the requester. Further, in this embodiment, description is given ofthe case in which the orderer and the receiver are the same user, andhence the presentation unit 101 presents the options to the user who isto visit the store.

The term “options” means images for selecting times or time windowsindicated by the scheduled time information. In this embodiment,description is given of a case in which the buttons B40 of theconfirmation screen G4 correspond to the options. For that reason,description of “buttons B40” in this embodiment can be read as“options.” The options may be any other images, and may be check boxes,a pulldown menu, or radio buttons, for example.

As the options, times or time windows that can be candidates for thescheduled time information are shown. In the example of FIG. 2, thepresentation unit 101 presents three buttons B40 as the options, anddifferent time windows are shown thereon, respectively. The number ofoptions presented by the presentation unit 101 is not limited to threeas in FIG. 2, and may be any number. For example, the presentation unit101 may present one option, two options, or four or more options. Whenthe options indicate time windows, the time windows indicated by theindividual options may partially overlap each other.

The times or time windows indicated by the options may be, of times ortime windows at or in which the user can visit the store, shortest timesor time windows, or later times or time windows. The phrase “times ortime windows at or in which the user can visit the store” means times ortime windows at or in which desired items or services can be provided.The times are times later than the time at which the user made apredetermined request (in this embodiment, ordered the items). A lengthof time from when the user made the request to when the user can visitthe store may be a fixed value or a variable value. In this embodiment,the length is a variable value, and is determined depending on the itemsin the shopping cart, for example.

The presentation by the presentation unit 101 may be made by, inaddition to a visual method using the images, an aural method usingvoices. Further, in this embodiment, the presentation unit 101 isachieved by the server 10, and hence the presentation unit 101 makes thepresentation by transmitting, to the user terminal 20, data fordisplaying the buttons B40 (such as image data of the buttons B40 andHTML data). When the presentation is made by the aural method, thepresentation unit 101 may make the presentation by transmitting, to theuser terminal 20, audio data indicating the times or time windows.

In this embodiment, the presentation unit 101 presents the buttons B40to the user or the requester based on the preparation time informationon time required for preparation in the store. The phrase “preparationin the store” means preparation of items or services provided at thestore. When food and drink correspond to the items as in thisembodiment, cooking and wrapping the food and drink correspond to thepreparation. The time required for preparation is time required fromwhen the preparation is started to when the preparation is complete.

For example, the presentation unit 101 calculates the time required forpreparation based on at least one of the number and types of items thatthe user has put in the shopping cart, and acquires the calculated timeas the preparation time information. For example, as the number of itemsbecomes larger, the time required for preparation becomes longer.Further, for example, in the presentation unit 101, when the items areof a predetermined type that takes a larger amount of work, the timerequired for preparation becomes relatively longer.

In this embodiment, the preparation time information of individual itemsis defined in the item database DB4, and hence the presentation unit 101presents the buttons B40 based on the preparation time informationassociated with the items that the user has put in the shopping cart.For example, the presentation unit 101 adds, to the current time, atotal value of times indicated by the preparation time informationassociated with the items that the user has put in the shopping cart tocalculate time at which the user can visit the store. The presentationunit 101 presents the buttons B40 for selecting the time or later timewindows.

In this embodiment, the presentation unit 101 presents the buttons B40to the user or the requester based on the capacity information on thecapacity at the store. When the capacity indicated by the capacityinformation changes depending on the time or time window, thepresentation unit 101 calculates the time required for preparation basedon the capacity information corresponding to the time or time window ator in which the user is to visit the store.

For example, in the case of the capacity in terms of facilities, as thenumber of pickup boxes 40 indicated by the capacity information becomeslarger, the times or time windows indicated by the buttons B40 becomeearlier. Further, for example, as the size of the pickup box 40indicated by the capacity information becomes larger, the times or timewindows indicated by the buttons B40 become earlier. Still further, forexample, as the number of items that can be stored in the pickup box 40indicated by the capacity information becomes larger, the times or timewindows indicated by the buttons B40 become earlier.

For example, the presentation unit 101 determines time windows in whichthe pickup box 40 is available based on the order database DB3 and thecapacity information, and presents buttons B40 indicating the determinedtime windows. The time windows in which the pickup box 40 is availablemeans that a total number of items that can be stored, which isdetermined based on the capacity information, is less than the number ofitems of orders accepted in the time window.

Meanwhile, for example, in the case of the capacity in terms ofpersonnel, as the number of staff members indicated by the capacityinformation becomes larger, the times or time windows indicated by thebuttons B40 become earlier. Further, for example, as the ability of thestaff indicated by the capacity information becomes higher, the times ortime windows indicated by the buttons B40 become earlier. Still further,for example, as the number of items that can be cooked, which isindicated by the capacity information, becomes larger, the times or timewindows indicated by the buttons B40 become earlier. Yet further, forexample, as the crowdedness of the store indicated by the capacityinformation becomes less crowded, the times or time windows indicated bythe buttons B40 become earlier.

In this embodiment, the presentation unit 101 presents the buttons B40to the user or the requester based on travel time information on timerequired to travel to the store. This travel is travel from apredetermined departure point to the store. For example, the departurepoint is an address of the user specified as the receiver, or coordinateinformation (for example, latitude/longitude information) correspondingto the address. Further, for example, the user terminal 20 may include aGPS receiver, and the departure point may be current positioninformation detected with the use of the GPS receiver. As each of themethod of determining the position, and the method of calculating thetime required to travel, a known method can be used. The time requiredto travel may be calculated through division of a distance along a routefrom the departure point to the store by a predetermined speed.

The means of travel may be fixed to be unchangeable, but any means oftravel can be specified in this embodiment. Accordingly, thepresentation unit 101 acquires the travel time information based on, ofthe plurality of means of travel, the means of travel specified by theuser or the requester. The presentation unit 101 acquires the traveltime information based on a travel speed associated with the specifiedmeans of travel. It is assumed that a relationship between the means oftravel and the travel speed is stored in advance in the data storageunit 100. The presentation unit 101 divides the distance from thedeparture point to the store by the travel speed associated with thespecified means of travel to acquire the travel time information.

[Acquisition Unit]

The acquisition unit 102 is configured to acquire the scheduled timeinformation based on the button B40 selected by the user or therequester. In this embodiment, the acquisition unit 102 acquires, as thescheduled time information, the time window indicated by the selectedbutton B40. It is assumed that the data storage unit 100 storesassociation between information identifying the individual buttons B40,and the time windows indicated by the buttons B40. The acquisition unit102 acquires, as the scheduled time information, the time windowassociated with the button B40 selected by the user.

[Registration Unit]

The registration unit 103 is configured to register, in the data storageunit 100, user information on a user who is to visit a predeterminedstore, and scheduled time information on scheduled time at which theuser is to visit the store, in association with each other. The term“association” means allowing one piece of information to be used toretrieve another piece of information. In this embodiment, storing theuser information and the scheduled time information in the same recordof the order database DB3 corresponds to the association therebetween.

The user information is authentication information corresponding to anindex (correct answer) in authentication, or information associated withthe authentication information. In this embodiment, description is givenof a case in which the user ID stored in the order database DB3corresponds to the user information. For that reason, description of“user ID stored in the order database DB3” in this embodiment can beread as “user information.”

The user information may be information of any type. For example, theuser information may be at least one of name, date of birth, a phonenumber, and an email address, or the authentication information itself,such as a feature amount of the face, a password, a passcode, a PIN, ora secret word.

The term “registration” means recording in the data storage unit 100. Inthis embodiment, storing information in the order database DB3corresponds to the registration. In this embodiment, when an order isaccepted, the registration unit 103 generates an order ID so as not toduplicate those of other orders, and registers the store ID of the storein which the user placed the order, the orderer information, the ordercontent information, the scheduled time information, and the receiverinformation in association with one another in the order database DB3.The scheduled time information is acquired by the acquisition unit 102.Other information may be acquired with the use of information receivedfrom the user terminal 20 (for example, the user ID of the user andinformation indicating contents of the shopping cart), the storedatabase DB1, the user database DB2, and the item database DB4.

In this embodiment, a plurality of users may visit one store, and hencethe registration unit 103 registers a user ID of each of the pluralityof users who are to visit the store, and scheduled time information onscheduled times at which the users are to visit the store, inassociation with each other in the order database DB3. In other words,the registration unit 103 registers, for each of the users who are tovisit the store, the user ID and the scheduled time information inassociation with each other in the order database DB3.

In this embodiment, orders for each of a plurality of stores areaccepted, and hence the registration unit 103 registers, in associationwith each of the plurality of stores, a user ID of a user who is tovisit the store, and scheduled time information on scheduled time atwhich the user is to visit the store, in the order database DB3. Inother words, the registration unit 103 registers, for each of thestores, the user ID and the scheduled time information in associationwith each other in the order database DB3.

In this embodiment, one of the buttons B40 is selected by the user orthe requester, and the scheduled time information is acquired by theacquisition unit 102. Thus, the registration unit 103 registers thescheduled time information acquired by the acquisition unit 102 in theorder database DB3. Instead of being selected by the user or therequester, the scheduled time information may be determinedautomatically on the server 10 side.

In this embodiment, biometric authentication is executed, and hence theregistration unit 103 registers biometric information of the user, oridentification information of the user for acquiring the biometricinformation as the user information in the order database DB3. Thisembodiment takes as an example a case in which the user ID correspondsto the identification information, but the identification informationmay be any other information, for example, a name. Further, in thisembodiment, description is given of a case in which the user ID, whichis an example of the identification information, is stored in the orderdatabase DB3, but a feature amount of a face, which is an example of thebiometric information, may be stored in the order database DB3.

[Authentication Unit]

The authentication unit 104 executes, when someone visits the store,authentication based on visitor information on the someone, the user IDregistered by the registration unit 103, visit time information on timeat which the someone visits the store, and the scheduled timeinformation registered by the registration unit 103. The term “someone”means a person who has visited the store. The store may be visited bythe user or an outsider. From the view of the authentication system S,at a time point at which someone visits the store, it is not known whothe person is, and hence description is given as described above in thisembodiment.

The visitor information is authentication information of the person whohas visited the store. Stated differently, the visitor information isauthentication information corresponding to a query in authentication.In this embodiment, description is given of a case in which a featureamount of a face of the person who has visited the store corresponds tothe visitor information, but the visitor information may be anyauthentication information depending on the authentication method used.For example, the visitor information may be at least one of a user ID,name, date of birth, a phone number, and an email address, or may beother authentication information, such as another piece of biometricinformation, for example, a fingerprint pattern, a password, a passcode,a PIN, a two-dimensional code, or a secret word.

The authentication unit 104 acquires the visitor information with theuse of a device in the store. In this embodiment, the pickup box 40 isdescribed as an example of the device. However, the device may be anydevice in the store, and may be, for example, the store terminal 30, ora user terminal 20 possessed by the user who has come to the store.

For example, the authentication unit 104 calculates the feature amountof the face of the person who has visited the store based on a takenimage obtained as a result of photographing by the photographing unit 46of the pickup box 40, and acquires the calculated feature amount as thevisitor information. The taken image itself may correspond to thevisitor information. Alternatively, when the visitor information can beacquired with the use of a component other than the photographing unit46, the visitor information may be acquired with the use of the othercomponent. For example, the visitor information may be acquired with theuse of the communication unit 43, the operation unit 44, or a sensor(such as a fingerprint sensor or an infrared sensor) capable ofdetecting a physical quantity in nature.

The visit time information is the current time when the authenticationunit 104 executes authentication, times before and after the currenttime, or a time window thereof. In this embodiment, when someone visitsthe store, a taken image is transmitted from the pickup box 40 to theserver 10 and the authentication is started. As a result, the visit timeinformation is the current time when the server 10 receives the takenimage. The current time may be acquired with the use of a real-timeclock or the GPS, for example. The visit time information may indicateanother time or time window, for example, a time at which the takenimage was taken.

In this embodiment, the user information registered by the registrationunit 103 is not the authentication information itself, but the user IDof the user who is the receiver (user ID included in the receiverinformation stored in the order database DB3). For that reason, theauthentication unit 104 refers to the user database DB2, and acquiresauthentication information of the receiver associated with the user IDregistered by the registration unit 103. The authentication unit 104determines that the authentication is successful when the visitorinformation and the authentication information of the receiver match orare similar, and the visit time information and the scheduled timeinformation correspond to each other.

When the visitor information and the authentication information of thereceiver do not match or are not similar, or when the visit timeinformation and the scheduled time information do not correspond to eachother, the authentication unit 104 determines that the authenticationhas failed. In other words, in order for the authentication to besuccessful, it is required to satisfy the following two conditions: thevisitor information and the authentication information of the receivermatch or are similar, and the visit time information and the scheduledtime information correspond to each other, and the authentication isunsuccessful even when only one of the two conditions is satisfied.

The phrase “the visitor information and the authentication informationof the receiver match” means that the visitor information and theauthentication information of the receiver are the same. For example, ina case of an authentication method in which perfect matching is requiredas in password authentication, passcode authentication, or PINauthentication, in order for the authentication to be successful, it isrequired that the visitor information and the authentication informationof the receiver match.

The phrase “the visitor information and the authentication informationof the receiver are similar” means that a difference between the visitorinformation and the authentication information of the receiver is lessthan a threshold value, or that the visitor information and theauthentication information of the receiver partially match. Ina case ofan authentication method in which determination is made based onsimilarity of the authentication information as in the biometricauthentication, in order for the authentication to be successful, it isrequired that the visitor information and the authentication informationof the receiver be similar. In such an authentication method, it is rarethat the authentication information matches perfectly, but theauthentication is successful also when the authentication informationmatches perfectly.

The phrase “the visit time information and the scheduled timeinformation correspond to each other” means that the visit timeinformation and the scheduled time information match, or that adeviation in time between the visit time information and the scheduledtime information is less than a threshold value. In this embodiment, thetime indicated by the visit time information being included in the timewindow indicated by the scheduled time information corresponds to thevisit time information and the scheduled time information correspondingto each other. In a case in which the scheduled time informationindicates a time instead of a time window, the time indicated by thevisit time information and the time indicated by the scheduled timeinformation matching, or a time difference therebetween being less thana threshold value corresponds to the visit time information and thescheduled time information corresponding to each other.

In this embodiment, a plurality of users may visit one store, and hencethe authentication unit 104 executes authentication based on the visitorinformation and, of user IDs of the plurality of users, a user ID withwhich the scheduled time information corresponding to the visit timeinformation is associated. In other words, of user IDs registered in theorder database DB3, the user ID with which the scheduled timeinformation corresponding to the visit time information is associated isused in the authentication.

In this embodiment, orders for each of a plurality of stores areaccepted, and hence, when someone has visited one of the plurality ofstores, the authentication unit 104 executes authentication based onvisitor information on the person who has visited the store, a user IDassociated with the store, visit time information on time at whichsomeone visits the store, and scheduled time information associated withthe store. In other words, of the user IDs and the scheduled timeinformation registered in the order database DB3, the user ID and thescheduled time information with which the store ID of the store thatsomeone has visited is associated are used in the authentication.

In this embodiment, the visitor information is biometric information ofthe person who has visited the store, and hence the authentication unit104 executes the authentication based on the biometric information ofthe person who has visited the store, the biometric information of theuser, the visit time information, and the scheduled time information.

[Permission Unit]

The permission unit 105 permits, when the authentication by theauthentication unit 104 is successful, execution of predeterminedprocessing. In this embodiment, the store at which the user picks up theitems corresponds to the predetermined location, the information on thescheduled time at which the user is to visit the store corresponds tothe scheduled time information, and information on time at which someonevisits the store corresponds to the visit time information.Consequently, the permission unit 105 permits the pickup of the items atthe store when the authentication is successful.

In this embodiment, the permission unit 105 permits the pickup of theitems by transmitting, to the pickup box 40, a notification that theauthentication is successful. The permission unit 105 may permit thepickup of the items by transmitting the notification to anothercomputer, for example, the store terminal 30. Further, the predeterminedprocessing permitted by the permission unit 105 is not limited to thetransmission of the notification. The predetermined processing may beany processing depending on a situation to which the authenticationsystem S is applied, and other examples of the predetermined processingare described later in the modification examples.

[3-2. Functions Achieved in User Terminal]

As illustrated in FIG. 6, a data storage unit 200 and a reception unit201 are achieved in the user terminal 20. The data storage unit 200 ismainly achieved by the storage unit 22. The reception unit 201 is mainlyachieved by the control unit 21.

[Data Storage Unit]

The data storage unit 200 is configured to store data required to orderitems. For example, the data storage unit 200 stores an IP address ofthe server 10 and other information. Further, for example, a datastorage unit 300 stores the application for accepting the order.

[Reception Unit]

The reception unit 201 is configured to receive various operations. Forexample, the reception unit 201 is configured to receive selection of abutton B40. The reception unit 201 transmits, to the server 10,information for identifying the selected button B40. The operationreceived by the reception unit 201 is not limited to the selection ofthe button B40, and may be various other operations.

[3-3. Functions Achieved in Store Terminal]

As illustrated in FIG. 6, a data storage unit 300 and a notificationunit 301 are achieved in the store terminal 30. The data storage unit300 is mainly achieved by the storage unit 32. The notification unit 301is mainly achieved by the control unit 31.

[Data Storage Unit]

The data storage unit 300 is mainly achieved by the storage unit 32. Thedata storage unit 300 is configured to store data required for storeoperation. For example, the data storage unit 300 stores the IP addressof the server 10 and other information. Further, for example, the datastorage unit 300 stores an application for supporting the storeoperation.

[Notification Unit]

When the authentication by the authentication unit 104 has failed, thenotification unit 301 issues a predetermined notification to the staff.In this embodiment, description is given of a case in which thepredetermined notification is the notification screen G6, but thepredetermined notification may be any notification that theauthentication has failed. For example, transmitting a predeterminedmessage through use of an electronic mail, an SNS, or the like maycorrespond to the issuing of the predetermined notification, or issuinga push notification in the store terminal 30 may correspond to theissuing of the predetermined notification.

[3-4. Functions Achieved in Pickup Box]

As illustrated in FIG. 6, a data storage unit 400 and an execution unit401 are achieved in the pickup box 40. The data storage unit 400 ismainly achieved by the storage unit 42. The execution unit 401 is mainlyachieved by the control unit 41.

[Data Storage Unit]

The data storage unit 400 is configured to store data required for theauthentication. For example, the data storage unit 400 stores the IPaddress of the server 10 and other information. Further, for example,the data storage unit 400 stores a program for unlocking the pickup box40 when the notification that the authentication is successful isreceived from the server 10.

[Execution Unit]

The execution unit 401 transmits, to the server 10, the taken imageobtained as a result of photographing by the photographing unit 46. Theexecution unit 401 receives a result of the authentication from theserver 10. When the notification that the authentication is successfulis received, the execution unit 401 unlocks the pickup box 40. It isonly required that the execution unit 401 execute processing permittedwhen the authentication is successful, and the processing executed bythe execution unit 401 is not limited to the unlocking. For example,when the pickup box 40 can be unlocked from the operation unit 44, theprocessing executed by the execution unit 401 may be processing ofprompting the staff to unlock the pickup box 40. Alternatively, forexample, the processing executed by the execution unit 401 may beprocessing of causing the display unit 45 to display a predeterminedmessage.

[4. Processing Executed in Authentication System]

Next, processing executed in the authentication system S is described.Here, description is given of order processing for ordering items, andpickup processing for picking up the items. The processing describedbelow is an example of processing executed by the functional blocksillustrated in FIG. 6.

[4-1. Order Processing]

FIG. 11 and FIG. 12 are flow charts for illustrating an example of theorder processing. The order processing illustrated in FIG. 11 and FIG.12 is executed by the control units 11, 21, and 31 operating inaccordance with the programs stored in the storage units 12, 22, and 32,respectively. The order processing is executed when the applicationinstalled in the user terminal 20 is started. The user may be requiredto log in when the application is started, or log-in may be executedautomatically based on information stored in the user terminal 20. Whensome information is transmitted from the user terminal 20 to the server10, the user ID is also transmitted.

As illustrated in FIG. 11, the user terminal 20 displays the menu screenG1 on the display unit 25 (Step S100). When the menu screen G1 isdisplayed in Step S100, the user terminal 20 receives inputs of thesearch conditions in the input forms F10 and F11.

When the search conditions are input in the input forms F10 and F11 andthe button B12 is selected, the user terminal 20 transmits a searchrequest to the server 10 (Step S101). The search request is a requestfor searching for at least one of a store and items, and is made bytransmitting data having a predetermined format. The search requestincludes the search conditions input by the user.

When the search request is received, the server 10 executes a searchbased on the search conditions input by the user, and the store databaseDB1 (Step S102), and transmits search results to the user terminal 20(Step S103). In Step S102, the server 10 executes the search with theuse of the search conditions as queries, and information, for example,the address, stored in the store database DB1 as indices. The searchresults transmitted in Step S103 include a store ID, a store name, astore image, and other information of a store hit in the search. Inother words, the search results include the information displayed on thesearch result screen G2.

When the search results are received, the user terminal 20 displays thesearch result screen G2 on the display unit 25 (Step S104). When thesearch result screen G2 is displayed in Step S104, the user terminal 20receives selection of a store shown in the list L20. When a store isselected from the list L20, the user terminal 20 transmits, to theserver 10, a store ID of the store selected by the user (Step S105).

When the store ID is received, the server 10 transmits, to the userterminal 20, information on the store selected by the user based on thestore database DB1 (Step S106). This information may be any informationon the store selected by the user, and may include the store name, thegenre, the address, the item names, the prices, and the item image, forexample. In other words, this information includes the informationdisplayed on the details screen G3.

When the information on the store selected by the user is received, theuser terminal 20 displays the details screen G3 on the display unit 25(Step S107). When the details screen G3 is displayed in Step S107, theuser terminal 20 receives selection of items shown in the list L30.

When items are selected from the list L30, the user terminal 20 adds,with respect to the server 10, the items selected by the user to theshopping cart (Step S108). When a predetermined operation for proceedingto the confirmation screen G4 is performed, the user terminal 20transmits contents of the shopping cart to the server 10 (Step S109).The contents of the shopping cart are stored in the storage unit 22, andfor example, item IDs and quantities of the items selected by the userare stored. The store ID of the store that sells the items may be storedin the contents of the shopping cart.

When the contents of the shopping cart are received, the server 10acquires preparation time information of the items in the shopping cartbased on the store database DB1 and the item database DB4 (Step S110).In Step S110, the server 10 calculates, based on capacity information ofthe store stored in the store database DB1, and the preparation timeinformation of the individual items stored in the item database DB4, atotal value of cooking time required to complete cooking of all theitems in the shopping cart, and acquires the calculated total value asthe preparation time information.

The server 10 calculates, based on the store database DB1 and the userdatabase DB2, a distance from the departure point to the store (StepS111). In Step S111, the server 10 calculates a distance betweenlatitude/longitude information corresponding to the address of the storestored in the store database DB1, and latitude/longitude informationcorresponding to the address of the user stored in the user databaseDB2.

Transitioning to FIG. 12, the server 10 acquires travel time informationbased on the user database DB2 and the distance calculated in Step S111(Step S112). In Step S112, the server 10 calculates travel time bydividing the distance calculated in Step S111 by a speed correspondingto the means of travel stored in the user database DB2.

The server 10 calculates earliest possible arrival time based on thecurrent time acquired with the use of the real-time clock, for example,the preparation time information acquired in Step S110, and the traveltime information calculated in Step S111 (Step S113). In Step S113, theserver 10 calculates the earliest possible arrival time by adding, tothe current time, longer one of the time indicated by the preparationtime information and the time indicated by the travel time information.

The server 10 acquires, based on the store database DB1, the orderdatabase DB3, and the earliest time calculated in Step S113, candidatetime information on candidate times indicated by the buttons B40 (StepS114). In Step S114, the server 10 determines, of time windows at orafter the earliest time, a predetermined number of time windows in whichthe pickup box 40 is available, as the candidate time information basedon capacity information of the pickup box 40 stored in the storedatabase DB1, and the ordered contents stored in the order database DB3.For example, the server 10 increments the earliest time by 30 minutes,and checks availability of the pickup box 40 in the time window. Whenthe pickup box 40 is available, the server 10 acquires the time windowas a candidate, and when the pickup box 40 is not available, the server10 checks availability for the next 30 minutes. The server 10 repeatsthose processes until the predetermined number of (in this embodiment,three) candidates are found.

The server 10 transmits, to the user terminal 20, the candidate timeinformation acquired in Step S114 (Step S115). In Step S114, theinformation to be displayed in the confirmation screen G4 (that is,information for displaying buttons B40 corresponding to the candidatetime information) is transmitted.

When the candidate time information is received, the user terminal 20displays the confirmation screen G4 on the display unit 25 (Step S116).When the confirmation screen G4 is displayed in Step S116, the userterminal 20 receives selection of a button B40.

When the button B41 is selected under a state in which any one of thebuttons B40 is selected by the user, the user terminal 20 transmits anorder request to the server 10 (Step S117). The order request is arequest for confirming the order, and is made by transmitting datahaving a predetermined format. The order request includes informationfor identifying the scheduled time information selected by the user.

When the order request is received, the server 10 executes processing ofaccepting the order based on the user database DB2, and registers theuser ID, the scheduled time information, and the like (Step S118). InStep S118, the server 10 executes payment processing, and registers,based on the information included in the order request, the order ID,the store ID, the orderer information, the order content information,the scheduled time information, and the receiver informationcorresponding to the accepted order, in association with each other inthe order database DB3.

The server 10 transmits details of the order content to the storeterminal 30 (Step S119). When the details are received, the storeterminal 30 displays the order content screen G5 on the display unit 35(Step S120), and the processing ends.

[4-2. Pickup Processing]

FIG. 13 is a flow chart for illustrating an example of the pickupprocessing. The pickup processing illustrated in FIG. 13 is executed bythe control units 11, 31, and 41 operating in accordance with theprograms stored in the storage units 12, 32, and 42, respectively. Thepickup processing may be executed at a suitable timing, and may beexecuted, for example, when a predetermined operation is received on theoperation unit 44 of the pickup box 40. Alternatively, for example, ahuman detection sensor may be mounted in advance on the pickup box 40,and the pickup processing may be executed when the human detectionsensor detects someone approaching the human detection sensor.

As illustrated in FIG. 13, the pickup box 40 transmits, to the server10, the store ID, and a taken image obtained as a result ofphotographing by the photographing unit 46 (Step S200). It is assumedthat the store ID is stored in the storage unit 42.

When the store ID and the taken image are received, the server 10calculates, based on the received taken image, a feature amount of aface of someone who has arrived at the store (Step S201). The featureamount of the face calculated in Step S201 is an example of the visitorinformation.

The server 10 acquires the current time as the visit time information,and acquires, based on the order database DB3, and the store ID receivedin Step S201, a user ID of a user who is scheduled to arrive at thestore at the current time (Step S202). In Step S202, the server 10refers to the order database DB3 to acquire the user ID with which thestore ID received from the pickup box 40, and the scheduled timeinformation corresponding to the visit time information are associated.

The server 10 acquires, based on the user database DB2, and the user IDreceived from the pickup box 40, a feature amount of a face of the userwho is scheduled to arrive at the store at the current time (Step S203).In Step S203, the server 10 refers to the user database DB2 to acquirethe feature amount associated with the user ID acquired in Step S202.When a plurality of user IDs are acquired in Step S202, a correspondingnumber of feature amounts are acquired.

The server 10 executes authentication based on the feature amountcalculated in Step S201, and the feature amount acquired in Step S203(Step S204). In Step S204, the server 10 calculates a distance betweenthose two feature amounts. When the distance is less than a thresholdvalue, the server 10 determines that the authentication is successful.When the distance is the threshold value or more, the server 10determines that the authentication has failed.

When the authentication is successful (Step S204: success), the server10 transmits a notification of success to the pickup box 40 (Step S205).The notification of success is a notification indicating that theauthentication is successful, and is issued by transmitting data havinga predetermined format.

When the notification of success is received, the pickup box 40 unlocksthe door on the front side (Step S206). In Step S206, the pickup box 40may automatically open the door on the front side that has beenunlocked. Thereafter, the user takes out the items in the pickup box 40.After taking out the items, the user closes the door on the front sideof the pickup box 40. When the door on the front side is closed, thepickup box 40 transmits a pickup completion notification to the server10 (Step S207). The pickup completion notification is a notificationthat the pickup of the items is complete, and is issued by transmittingdata having a predetermined format. When the pickup completionnotification is received, the server 10 updates the order database DB3(Step S208), and the processing ends. In Step S208, a recordcorresponding to the order for which the pickup is complete may bedeleted from the order database DB3, or in a case in which informationindicating a pickup status (for example, “before pickup” or “picked up”)is stored in the order database DB3, the information may be updated to“picked up.”

Meanwhile, when the authentication has failed (Step S204: failure), theserver 10 transmits a notification of failure to the store terminal 30(Step S209). The notification of failure is a notification that theauthentication is successful, and is issued by transmitting data havinga predetermined format. When the notification of failure is received,the store terminal 30 displays the notification screen G6 on the displayunit 35 (Step S210), and the processing ends. When the staff finisheshelping as instructed in the manual and selects the button B60, thestore terminal 30 notifies the server 10 thereof, and the order databaseDB3 is updated as in Step S208.

According to the authentication system S of this embodiment, whensomeone has visited the store, the authentication is executed based onthe visitor information, the user ID registered in the order databaseDB3, the visit time information, and the scheduled time information.Consequently, not only simple face authentication is executed, but alsotemporal factors are considered so that security can be improved. Forexample, even when a malicious outsider who resembles the user in facehas visited the store, the authentication is not successful and theitems cannot be picked up unless in the time window indicated by thescheduled time information, and hence the security can be improved.

Further, with the authentication system S executing the authenticationbased on the visitor information and, of the user IDs of the pluralityof users, the user ID with which the scheduled time informationcorresponding to the visit time information is associated, even when theplurality of users are to visit the store, the authentication can beexecuted also in consideration of the temporal factors, and hence thesecurity can be improved.

Still further, when someone has visited any one of the plurality ofstores, with the authentication system S executing the authenticationbased on the visitor information on the someone who has visited thestore, the user ID associated with the store, the visit time informationon time at which someone arrived at the store, and the scheduled timeinformation associated with the store, even when each of a plurality ofstores accept orders, the authentication can be executed also inconsideration of the temporal factors, and hence the security can beimproved.

Yet further, with the authentication system S acquiring the scheduledtime information based on the button B40 selected by the user, andregistering the scheduled time information in the order database DB3,the user can be allowed to select a desired time or time window, andhence convenience of the user can be increased. As a result, the usercan pick up the items more reliably, and a turnover rate of the pickupbox 40 can be increased.

Yet further, with the authentication system S presenting the buttons B40to the user based on the preparation time information, the buttons B40of the times or time windows at or in which the user who is to arrivethe store can pick up the items reliably can be presented also inconsideration of the time required to prepare the items ordered by theuser. As a result, the user who has visited the store is not required towait, and hence convenience of the user can be increased.

Yet further, with the authentication system S presenting the buttons B40to the user based on the capacity information, the buttons B40 of thetimes or time windows at or in which the user who is to visit the storecan pick up the items reliably can be presented in consideration of thecapacity in terms of facilities and the capacity in terms of personnelof the store. As a result, the user who has arrived at the store is notrequired to wait, and hence convenience of the user can be increased.

Yet further, with the authentication system S presenting the buttons B40to the user based on the travel time information, the buttons B40 of thetimes or time windows at or in which the user who is to arrive at thestore can pickup the items reliably can be presented in consideration oftime required for the user to travel to the store. As a result, it ispossible to prevent a situation in which the user cannot be in time forthe time or time window specified by himself or herself, and henceconvenience of the user can be increased.

Yet further, with the authentication system S acquiring the travel timeinformation based on, of the plurality of means of travel, the means oftravel specified by the user, correct travel time information can beacquired in consideration of actual means of travel used by the user tothe store. As a result, reliability that the user who has arrived at thestore picks up the items can be further increased.

Yet further, with the authentication system S executing theauthentication based on the biometric information of the person who hasvisited the store, the biometric information of the user, the visit timeinformation, and the scheduled time information, even when the uservisits the store empty-handed, authentication with high security can beexecuted.

Yet further, with the authentication system S permitting the pickup ofthe items at the store when the authentication is successful, theauthentic user is allowed to pick up the items reliably. In addition,the user can pick up the items without contacting the staff, and henceconvenience on the store side is also increased as a measure againstinfectious diseases.

5. Modification Examples

The present disclosure is not limited to the embodiment described above,and can be modified suitably without departing from the spirit of thepresent disclosure.

FIG. 14 is a functional block diagram in modification examples of thepresent disclosure. As illustrated in FIG. 14, in the modificationexamples described below, a determination unit 106 and an additionalauthentication unit 107 are achieved in addition to the functionsdescribed in the embodiment. Each of the determination unit 106 and theadditional authentication unit 107 is achieved mainly by the controlunit 11.

(1) For example, it is assumed that a user A, and another user B whoresembles the user A in face have ordered items at the same store X, andhave gone to pick up the items in the same time window. In this case,from the view of the authentication system S, the user A and the user Bcannot be distinguished from each other, and there is a fear that theuser A may be erroneously authenticated as the user B. On the contrary,there is also a fear that the user B may be erroneously authenticated asthe user A.

To address the above-mentioned problem, in a case in which, when theuser A is to order items at the store X, another user B who resemblesthe user A in face has already placed an order at the store X, thebutton B40 of a time window in which the user B is to visit the storemay be prevented from being displayed on the confirmation screen G4 ofthe user A. In other words, the buttons B40 of other time windows may bedisplayed on the confirmation screen G4 of the user A so as to avoid thetime window in which the user B is to visit the store X.

Before registering a user ID and scheduled time information of a user Ain the order database DB3, the registration unit 103 registers a user IDon another user B who is to visit the store, and scheduled timeinformation on scheduled time at which the other user B is to visit thestore, in association with each other in the order database DB3. A flowin which the user B places the order and the user ID is registered is asdescribed in the embodiment.

The authentication system S according to Modification Example (1) of thepresent disclosure includes the determination unit 106. Thedetermination unit 106 is configured to determine whether there is afear of erroneous authentication between the user A and the other userB. The term “erroneous authentication” means that the user A isauthenticated as the other user B, or that the other user B isauthenticated as the user A. Stated differently, the term “erroneousauthentication” means that the user A and the other user B cannot bedistinguished from each other in the authentication.

For example, when success or failure of the authentication is determineddepending on similarity of the authentication information as in thebiometric authentication, authentication information of the user A andauthentication information of the user B matching or being similarcorresponds to a fear of erroneous authentication. In the case ofauthentication information expressed in a vector form as with a featureamount of a face, a distance between a feature amount of a face of theuser A and a feature amount of a face of the user B being less than athreshold value corresponds to a fear of erroneous authentication.Further, for example, when success or failure of the authentication isdetermined depending on matching of the authentication information as inPIN authentication, the authentication information of the user A and theauthentication information of the user B matching or being similarcorresponds to a fear of erroneous authentication.

In this modification example, when the user A places an order at a storeX, the determination unit 106 determines whether there is a fear oferroneous authentication based on the feature amount of the face of theuser A and the feature amount of the face of the user B, which areregistered in the user database DB2. It is assumed that the user B hasalready placed an order at the same store X as the user A, and has notpicked up items. For that reason, a user who has already placed an orderat the same store X as the user A and has picked up items is not asubject of the determination by the determination unit 106.

It is assumed that, for the items ordered by the user B, the user B whohas ordered the items himself or herself goes to the store X to pick upthe items. In other words, for both of the order of the user A and theorder of the user B, the orderer and the receiver are the same. Even ifthe orderer and the receiver are different in at least one of the orderof the user A and the order of the user B, the determination unit 106may determine whether there is a fear of erroneous authentication basedon the feature amount of the face of the receiver in the order of theuser A and the feature amount of the face of the receiver in the orderof the user B.

Further, in this modification example, description is given of a case inwhich the determination by the determination unit 106 is executed beforethe confirmation screen G4 of the user A is displayed, but the timing atwhich the determination by the determination unit 106 is executed may beany timing before the user ID and the scheduled time information thatcorrespond to the order of the user A are registered in the orderdatabase DB3.

The presentation unit 101 presents the buttons B40 to the user based ona result of the determination by the determination unit 106. When it isdetermined that there is no fear of erroneous authentication between theuser A and the other user B, the presentation unit 101 presents thebuttons B40 as in the embodiment. When it is determined that there is afear of erroneous authentication between the user A and the other userB, the presentation unit 101 presents buttons B40 of other time windowsso as to avoid the time window indicated by the scheduled timeinformation of the other user B. In this case, a method of determiningthe other time windows is different only in that the time indicated bythe scheduled time information of the other user B is excluded, and abasic determination method is similar to that in the embodiment.

According to Modification Example (1), with the buttons B40 beingpresented to the user A based on the result of determination as towhether there is a fear of erroneous authentication between the user Aand the other user B, occurrence of erroneous authentication can beprevented reliably.

(2) Further, for example, when an item that takes considerable time forcooking is in the shopping cart, there is a fear that a button B40 of atime window in which the user can go for pickup is not displayed on theconfirmation screen G4. In this case, when the user deletes the itemfrom the shopping cart, pickup in an earlier time window in which theuser can go for pickup may become available. On the contrary, even whenthe user does not delete the item from the shopping cart, pickup in alater time window in which the user can go for pickup may becomeavailable.

Accordingly, through displaying of, on the confirmation screen G4, inaddition to the buttons B40 described in the embodiment, at least one ofa button B40 of an earlier time window that becomes available when thecontent of the shopping cart is changed, and a button B40 of a timewindow that is later than the time windows indicated by the buttons B40described in the embodiment, more flexible pickup is allowed, to therebyincrease convenience of the user.

FIG. 15 is a view for illustrating an example of the confirmation screenG4 in Modification Example (2) of the present disclosure. As illustratedin FIG. 15, the presentation unit 101 in this modification examplepresents, to the user, a plurality of buttons B40 including buttons B40Abased on the conditions specified by the user, and a button B40B basedon a condition obtained by changing a part of the conditions.

The term “conditions” means conditions for determining a possiblearrival time or time window. In this modification example, at least oneof the number of items, types of the items, and the means of travelcorresponds to the conditions. The phrase “condition obtained bychanging a part of the conditions” means a condition obtained bychanging at least one of those conditions. The change of the conditionsmay be executed on the authentication system S side, or by operation ofthe user.

In the case of the example of FIG. 15, the presentation unit 101 reducesthe number of units of an item, which is a condition specified by theuser, from 15 to 10 to present the button B40B indicating an earliertime window. The presentation unit 101 may reduce the numbers of unitsof a plurality of items to present a button B40 indicating an evenearlier time window. The presentation unit 101 may delete at least oneitem instead of reducing the number of units of an item to present thebutton B40B indicating an early time window.

The presentation unit 101 may present the button B40B by changing thecurrent means of travel and calculating the time at which the user canvisit the store. For example, the presentation unit 101 may present thebutton B40B indicating an earlier time window by changing to means oftravel that is higher in travel speed than the means of travel that iscurrently selected. Further, for example, the presentation unit 101 mayallow the user to select whether to change the items in the shoppingcart, or to change the means of travel.

Further, for example, the presentation unit 101 may change both of theitems in the shopping cart and the means of travel to present the buttonB40B indicating an earlier time window. Still further, for example, thepresentation unit 101 may allow the user to select whether the userdesires a time window that is later than the time windows indicated bythe buttons B40A, and when the user desires the time window, thepresentation unit 101 may present a button B40B indicating a later timewindow.

According to Modification Example (2), by presenting, to the user, theplurality of buttons B40 including the buttons B40A based on theconditions specified by the user, and the button B40B based on thecondition obtained by changing a part of the conditions, in a case inwhich there is no desired time or time window, when the user makes somecompromise to change the conditions, the user can visit the store at orin the desired time or time window, and hence convenience of the usercan be increased.

(3) Further, for example, in a case in which a user A and another user Bwho resembles the user A in face order items at the same store X, and goto pick up the items in the same time window, additional authentication,for example, PIN authentication, may be required of at least one of theuser A and the other user B.

The authentication system S according to Modification Example (3) of thepresent disclosure includes a registration unit 103 and a determinationunit 106. Details of each of the registration unit 103 and thedetermination unit 106 are as described in Modification Example (1).

The authentication system S according to Modification Example (3)includes an additional authentication unit 107. The additionalauthentication unit 107 is configured to require the additionalauthentication of the person who has visited the store based on a resultof determination by the determination unit 106. When it is determinedthat there is no fear of erroneous authentication between the user A andthe other user B, the additional authentication unit 107 does notrequire the additional authentication. When it is determined that thereis a fear of erroneous authentication between the user A and the otheruser B, the presentation unit 101 requires the additionalauthentication.

The additional authentication is authentication different from theauthentication by the authentication unit 104. The “additionalauthentication” means authentication executed separately from theauthentication by the authentication unit 104, and is not necessarilyexecuted after the authentication by the authentication unit 104. Theadditional authentication may be executed before the authentication bythe authentication unit 104. The additional authentication may beauthentication of two or more steps combining a plurality ofauthentication methods.

Various authentication methods are applicable to an authenticationmethod of the additional authentication itself. For example, when theauthentication by the authentication unit 104 is face authentication,the additional authentication may be biometric authentication (forexample, fingerprint authentication) other than the face authentication.Alternatively, for example, when the authentication by theauthentication unit 104 is the biometric authentication, the additionalauthentication may be authentication (for example, PIN authentication)other than the biometric authentication.

It is assumed that authentication information required for theadditional authentication is registered in advance in the user databaseDB2. For example, when the finger print authentication is used as theadditional authentication, a correct fingerprint pattern is registeredin advance in the user database DB2. Alternatively, for example, whenthe PIN authentication is used as the additional authentication, acorrect PIN is registered in advance in the user database DB2. Whenanother authentication method is used as the additional authentication,authentication information corresponding to the another authenticationmethod is registered in advance in the user database DB2.

The additional authentication unit 107 acquires authenticationinformation of the person who has visited the store with the use of thestore terminal 30. For example, when the finger print authentication isused as the additional authentication, the additional authenticationunit 107 acquires a fingerprint pattern of the person who has visitedthe store with the use of the photographing unit 36 or a fingerprintsensor. Alternatively, for example, when the PIN authentication is usedas the additional authentication, the additional authentication unit 107acquires a PIN input by the person who has visited the store with theuse of the operation unit 34. When the another authentication method isused as the additional authentication, the authentication informationcorresponding to the another authentication method is acquired with theuse of the store terminal 30.

The additional authentication unit 107 executes the additionalauthentication based on the authentication information of the person whohas visited the store, and the authentication information for theadditional authentication, which is registered in the user database DB2.Determination in a known authentication method is applicable to thedetermination as to success or failure of the additional authenticationitself. For example, when the finger print authentication is used as theadditional authentication, success or failure of the additionalauthentication is determined based on similarity between the fingerprintpattern of the person who has visited the store, and the fingerprintpattern registered in the user database DB2. Alternatively, for example,when the PIN authentication is used as the additional authentication,success or failure of the additional authentication is determined basedon matching between the PIN input by the person who has visited thestore, and the PIN registered in the user database DB2.

The permission unit 105 permits pickup of the items at the store whenthe authentication by the authentication unit 104 is successful, and theadditional authentication by the additional authentication unit 107 issuccessful. The permission unit 105 does not permit pickup of the itemsat the store when the authentication by the authentication unit 104 hasfailed, or the additional authentication by the additionalauthentication unit 107 has failed. In other words, in order for thepickup of the items to be permitted, the following three conditions arerequired to be satisfied: success of the authentication, success of theadditional authentication, and matching between the visit timeinformation and the scheduled time information.

According to Modification Example (3), by requiring the additionalauthentication of the person who has visited the store based on theresult of the determination as to whether there is a fear of erroneousauthentication between the user and another user, occurrence of theerroneous authentication can be prevented reliably.

(4) Further, for example, the modification examples described above maybe combined.

Still further, for example, a receiver may be a person who is yet toperform user registration. For example, also in a case in which itemsordered by a user who has performed user registration are to be pickedup by a family member who is yet to perform user registration, theauthentication system S may execute authentication of the family member.In this case, the user registers a portrait and other information of thefamily member in the order database DB3 at the time of ordering. Theserver 10 may execute the authentication based on a feature amount of aface of the family member, which is extracted from the portraitregistered in the order database DB3, and a feature amount of a face ofthe family member obtained as a result of photographing by thephotographing unit 46 of the pickup box 40.

Yet further, for example, the pickup box 40 may have a configurationthat is simpler than the configuration described in this embodiment. Forexample, the pickup box 40 may have a simple configuration not includingthe control unit 41, the storage unit 42, the operation unit 44, and thedisplay unit 45. Alternatively, for example, the pickup box 40 mayinclude only the photographing unit 46 connected to the store terminal30, and transmit a taken image to the store terminal 30. Alternatively,for example, the pickup box 40 may be connected to the store terminal 30without including even the photographing unit 46. In this case, thepickup box 40 may unlock and open/close the door as instructed by thestore terminal 30. With the pickup box 40 having a simple configuration,complicated setting operation can be eliminated when the pickup box 40is installed in the store.

Yet further, for example, the pickup box 40 has been described as thedevice configured to acquire the visitor information, but a device in ornear the store may be used to acquire the visitor information. Forexample, the store terminal 30 may be used to acquire the visitorinformation. Alternatively, for example, the visitor information may beacquired by the user bringing the user terminal 20 to the store to takean image of his or her face with the user terminal 20 and transmit theimage to the server 10. In this case, the visit to the store may bedetected based on positional information using the GPS receiver of theuser terminal 20, for example.

Yet further, for example, description has been given of the case inwhich an eating and drinking establishment corresponds to the store, butas to the store, a supermarket, a convenience store, a drugstore, a bookstore, a consumer electronics mass retailer, or a general store maycorrespond to the store. Further, for example, food and drink,commodities, clothing, books, consumer electronics, general merchandise,or the like may correspond to the items sold at those stores. Theauthentication system S is applicable to a situation in which the uservisits one of those certain stores to pick up those certain items.

Yet further, for example, description has been given of the case inwhich the authentication system S is applied to the service of acceptingan order, but the authentication system S may be applied to otherservices. For example, the authentication system S may be applied toauthentication at the time of admission to a concert, sport, or otherevents. In this case, a scheduled time or time window at or in which theuser is admitted is determined in advance. When someone visits thevenue, the authentication system S may execute authentication as in theembodiment to admit the user. In addition, for example, theauthentication system S may be applied to authentication for admissionto an art museum and other facilities, authentication for priorityadmission (what is called “fastpass”) to an amusement park and otherrecreational facilities, and authentication for check-in toaccommodation facilities.

Yet further, for example, description has been given of the case inwhich main functions are achieved in the server 10, but the functionsmay be shared by a plurality of computers. For example, the functionsmay be shared among the server 10, the user terminal 20, the storeterminal 30, and the pickup box 40. For example, the authenticationprocessing may be executed in the user terminal 20, the store terminal30, or the pickup box 40 instead of the server 10. Further, for example,when the authentication system S includes a plurality of servercomputers, the functions may be shared among the plurality of servercomputers. Still further, for example, the data described to be storedin the data storage unit 100 may be stored by a computer other than theserver 10.

1. An authentication system, comprising at least one processorconfigured to: register user information on a user who is to visit apredetermined location, and scheduled time information on scheduled timeat which the user is to visit the predetermined location, in associationwith each other in a storage; and execute, when someone visits thepredetermined location, authentication based on visitor information onthe someone, the user information, visit time information on time atwhich the someone visits the predetermined location, and the scheduledtime information.
 2. The authentication system according to claim 1,wherein the at least one processor is configured to register the userinformation on each of a plurality of users who are to visit thepredetermined location, and the scheduled time information on scheduledtimes at which the plurality of users are to visit the predeterminedlocation, in association with each other in the storage, and wherein theat least one processor is configured to execute the authentication basedon the visitor information and, of the user information on each of theplurality of users, the user information with which the scheduled timeinformation corresponding to the visit time information is associated.3. The authentication system according to claim 1, wherein the at leastone processor is configured to register, in association with each of aplurality of the predetermined locations, the user information on a userwho is to visit the predetermined location, and the scheduled timeinformation on scheduled time at which the user is to visit thepredetermined location, in the storage, and wherein the at least oneprocessor is configured to execute, when the someone visits any one ofthe plurality of predetermined locations, the authentication based onthe visitor information on the someone, the user information associatedwith the predetermined location, the visit time information on time atwhich the someone visits the predetermined location, and the scheduledtime information associated with the predetermined location.
 4. Theauthentication system according to claim 1, wherein the at least oneprocessor is configured to: present, to the user or a requester whorequests the user to travel, options on time at which the user is tovisit the predetermined location, acquire the scheduled time informationbased on one of the options that is selected by the user or therequester, and register the scheduled time information in the storage.5. The authentication system according to claim 4, wherein the at leastone processor is configured to present the options to the user or therequester based on preparation time information on time required forpreparation in the predetermined location.
 6. The authentication systemaccording to claim 4, wherein the at least one processor is configuredto present the options to the user or the requester based on capacityinformation on a capacity in the predetermined location.
 7. Theauthentication system according to claim 4, wherein the at least oneprocessor is configured to present the options to the user or therequester based on travel time information on time required to travel tothe predetermined location.
 8. The authentication system according toclaim 7, wherein the at least one processor is configured to acquire thetravel time information based on, of a plurality of means of travel,means of travel specified by the user or the requester.
 9. Theauthentication system according to claim 4, wherein the at least oneprocessor is configured to register, before registering the userinformation of the user and the scheduled time information in thestorage, user information on another user who is to visit thepredetermined location, and scheduled time information on scheduled timeat which the another user is to visit the predetermined location, inassociation with each other in the storage, wherein the at least oneprocessor is configured to determine whether a fear of erroneousauthentication exists between the user and the another user, and whereinthe at least one processor is configured to present the options to theuser or the requester based on a result of the determination.
 10. Theauthentication system according to claim 4, wherein the at least oneprocessor is configured to present, to the user or the requester, aplurality of the options including the options based on conditionsspecified by the user or the requester, and the options based onconditions obtained by changing a part of the conditions.
 11. Theauthentication system according to claim 1, wherein the at least oneprocessor is configured to register, before registering the userinformation of the user and the scheduled time information in thestorage, user information on another user who is to visit thepredetermined location, and scheduled time information on scheduled timeat which the another user is to visit the predetermined location, inassociation with each other in the storage, and wherein the at least oneprocessor is configured to: determine whether a fear of erroneousauthentication exists between the user and the another user; and requestadditional authentication of the someone based on a result of thedetermination.
 12. The authentication system according to claim 1,wherein the at least one processor is configured to register biometricinformation of the user, or identification information of the user foracquiring the biometric information, as the user information in thestorage, wherein the visitor information is biometric information of thesomeone, and wherein the at least one processor is configured to executethe authentication based on the biometric information of the someone,the biometric information of the user, the visit time information, andthe scheduled time information.
 13. The authentication system accordingto claim 1, wherein the predetermined location is a store at which theuser is to pick up an item, wherein the scheduled time information isinformation on scheduled time at which the user is to visit the store,wherein the visit time information is information on time at which thesomeone visits the store, and wherein the at least one processor isconfigured to permit the pickup of the item at the store when theauthentication is successful.
 14. An authentication method, comprising:registering user information on a user who is to visit a predeterminedlocation, and scheduled time information on scheduled time at which theuser is to visit the predetermined location, in association with eachother in storage; and executing, when someone visits the predeterminedlocation, authentication based on visitor information on the someone,the user information, visit time information on time at which thesomeone visits the predetermined location, and the scheduled timeinformation.
 15. A non-transitory computer-readable information storagemedium for storing a program for causing a computer to: register userinformation on a user who is to visit a predetermined location, andscheduled time information on scheduled time at which the user is tovisit the predetermined location, in association with each other in astorage; and execute, when someone visits the predetermined location,authentication based on visitor information on the someone, the userinformation, visit time information on time at which the someone visitsthe predetermined location, and the scheduled time information.