Information processing device

ABSTRACT

An information processing device according to the present invention includes a first acquiring unit configured to acquire first authentication information of a person, a tracking unit configured to track a person from whom the first authentication information has been acquired based on a captured image captured by an image capturing device, a second acquiring unit configured to acquire second authentication information of a person in a predetermined place, and an associating unit configured to associate the first authentication information and the second authentication information of the same person based on the result of tracking a person.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/686,342 filed Nov. 18, 2019 which is based upon and claims thebenefit of priority from Japanese patent application No. 2018-218473,filed on Nov. 21, 2018, the disclosure of which is incorporated hereinin its entirety by reference.

TECHNICAL FIELD

The present invention relates to an information processing device inwhich information necessary for person authentication is registered, aninformation processing method, and a non-transitory computer-readablemedium storing a program.

BACKGROUND ART

As a means for restricting and managing a person entering and leaving aspecific place such as an office and an event venue, an authenticationsystem that performs authentication by checking whether a person whointends to pass is a person registered beforehand is used. For example,with the development of human face authentication technology, at a gateinstalled at the entrance of a specific place, a walk-through faceauthentication system that performs face authentication based on a faceimage of a person captured with a camera installed at the gate is used.An authentication system using face authentication is not limited tobeing used in authentication of a person when the person enters andleaves a specific place, and is also used in a scene of specifying anindividual, such as when making an electronic payment.

An authentication system may perform not only face authentication butalso authentication using other biometric information, such asfingerprint authentication and iris authentication. Moreover, there is atwo-factor authentication system that performs authentication of twofactors in combination in order to further increase security. Forexample, Patent Document 1 describes combination of face authenticationwith the result of recognition of an IC tag.

-   Patent Document 1: Japanese Unexamined Patent Application    Publication No. JP-A 2015-176220-   Patent Document 2: Japanese Unexamined Patent Application    Publication No. JP-A 2009-151711

When using the two-factor authentication system described above, it isnecessary to associate and register two pieces of authenticationinformation of the same person. However, there is a problem that ittakes time to associate two pieces of authentication information.Moreover, Patent Document 2 describes, instead of using the two-factorauthentication system, associating biometric information and faceinformation with a registrant ID so as to correspond to differentauthentication devices that use different factors. In this case,however, it also takes time to associate two pieces of authenticationinformation.

SUMMARY OF THE INVENTION

Accordingly, an object of the present invention is to solve theabovementioned problem that it takes time to associate multiple piecesof authentication information.

An information processing device according to an example aspect of thepresent invention includes at least one memory storing instructions andat least one processor coupled to the at least one memory. The at leastone processor executes the instructions to: acquire first authenticationinformation of a person; track a person from whom the firstauthentication information has been acquired, based on a captured imagecaptured by an image capturing device; acquire second authenticationinformation of a person in a predetermined place; and based on a resultof tracking a person, associate the first authentication information andthe second authentication information of a same person.

A non-transitory computer-readable medium storing a program according toanother example aspect of the present invention includes instructionsfor causing at least one processor included by an information processingdevice to realize execution of processes to: acquire firstauthentication information of a person; track a person from whom thefirst authentication information has been acquired, based on a capturedimage captured by an image capturing device; acquire secondauthentication information of a person in a predetermined place; andbased on a result of tracking a person, associate the firstauthentication information and the second authentication information ofa same person.

An information processing method according to another example aspect ofthe present invention is an information processing method executed by atleast one processor included by an information processing device. The atleast one processor executes processes to: acquire first authenticationinformation of a person, and track a person from whom the firstauthentication information has been acquired, based on a captured imagecaptured by an image capturing device; acquire second authenticationinformation of a person in a predetermined place; and based on a resultof tracking a person associate the first authentication information andthe second authentication information of a same person.

With the configurations described above, the present invention allowsfor easily associating multiple pieces of authentication information.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a view showing an overall structure of an authenticationsystem in a first example embodiment of the present invention;

FIG. 2 is a block diagram showing a configuration of an authenticationdevice disclosed in FIG. 1 ;

FIG. 3 is a view showing how authentication information is registered bythe authentication system disclosed in FIG. 1 ;

FIG. 4 is a view showing how authentication information is registered bythe authentication system disclosed in FIG. 1 ;

FIG. 5 is a sequence diagram showing an operation when authenticationinformation is registered by the authentication system disclosed in FIG.1 ;

FIG. 6 is a flowchart showing an operation when authenticationinformation is registered by the authentication device disclosed in FIG.1 ;

FIG. 7 is a view showing how authentication is performed by theauthentication system disclosed in FIG. 1 ;

FIG. 8 is a view showing how authentication is performed by theauthentication system disclosed in FIG. 1 ;

FIG. 9 is a sequence diagram showing an operation when authentication isperformed by the authentication system disclosed in FIG. 1 ;

FIG. 10 is a flowchart showing an operation when authentication isperformed by the authentication device disclosed in FIG. 1 ;

FIG. 11 is a view showing the overall structure of an authenticationsystem according to a second example embodiment of the present inventionand how the authentication system is used;

FIG. 12 is a view showing an example of information stored in theauthentication system disclosed in FIG. 11 ;

FIG. 13A is a block diagram showing hardware components of aninformation processing device according to a third example embodiment ofthe present invention;

FIG. 13B is a block diagram showing a configuration of the informationprocessing device according to the third example embodiment of thepresent invention;

FIG. 13C is a flowchart showing an operation of the informationprocessing device according to the third example embodiment of thepresent invention;

FIG. 14 is a view showing an example of an overall structure of anauthentication system in a fourth example embodiment of the presentinvention;

FIG. 15 is a block diagram showing a configuration of an authenticationdevice disclosed in FIG. 14 ;

FIG. 16 is a view showing another example of the overall structure ofthe authentication system in the fourth example embodiment of thepresent invention;

FIG. 17 is a block diagram showing a configuration of an authenticationdevice disclosed in FIG. 16 ; and

FIG. 18 is a block diagram showing a configuration of an informationprocessing device according to the fourth example embodiment of thepresent invention.

EXAMPLE EMBODIMENT First Example Embodiment

A first example embodiment of the present invention will be describedwith reference to FIGS. 1 to 10 . FIGS. 1 and 2 are views for describingthe configuration of an authentication system. FIGS. 3 to 10 are viewsfor describing the processing operation of the authentication system.

[Configuration]

An authentication system (an information processing system) according tothe present invention is a system that performs person authentication inorder to limit entry and exit of a person or identify a person at aspecific place such as an office, an event venue, and a shop. Theauthentication system according to the present invention performsso-called two-factor authentication; for example, it performs gaitauthentication and face authentication of a person. However, two-factorauthentication by the authentication system is not necessarily limitedto gait authentication or face authentication, and may be performed byusing any two pieces of authentication information as long as they canbe acquired from a person.

To be specific, the authentication system in this example embodiment isa system that authenticates a person at a gate G for limiting entry andexit of a person at a specific place. Therefore, as shown in FIG. 1 ,the authentication system includes a first camera C1 that captures animage of a person heading for the gate G, a second camera C2 installedat the gate G, a card reader R installed at the gate G, and anauthentication device 10 that performs person authentication andcontrols opening and closing of the gate G. However, the authenticationsystem according to the present invention is not necessarily limited tobeing used for authentication of a person at the gate G for limitingentry and exit of a person, and may perform person authentication at anyplace. Below, the respective components will be described in detail.

Although not shown, the gate G includes an opening/closing bar that iscontrolled to be unopened when passage of a person is denied and openedwhen allowed. As shown in FIG. 1 , an area located immediately beforethe gate G is set as a face authentication area A for capturing a faceimage of a person P3 as will be described later.

The first camera C1 (an image capturing device) is an image capturingdevice for capturing an image of the walking motions of persons P1, P2,and P3 walking toward the gate G. For this reason, as shown in FIG. 1 ,the first camera C1 is installed so as to set a space where the personsP1, P2, and P3 heading for the gate G may walk, such as a walking pathto the gate G, as an image capturing range and so as to be able tocapture an image of the whole bodies of the persons P1, P2, and P3. Forexample, the first camera C1 is installed on the ceiling of a spacewhere the gate G is installed. The image capturing range of the firstcamera C1 also includes the face authentication area A locatedimmediately before the gate G. However, the first camera C1 may beinstalled at any place.

The second camera C2 (an acquisition device) is an image capturingdevice that is installed at the gate G and captures a face image of theperson P3 who is in the face authentication area A located immediatelybefore the gate G. For this reason, as shown in FIG. 1 , the secondcamera C2 is installed so as to be able to capture an image of the upperbody including the face portion of the person P3 who is in the faceauthentication area A. Moreover, the second camera C2 includes a displaypart that displays the captured face image and displays anauthentication result representing whether or not to allow for passingthrough the gate G. However, the second camera C2 may be installed atany place, and may not necessarily include the display part.

The card reader R reads person identification information thatidentifies the person P3 stored in a card D presented by the person P3who is in the face authentication area A. For example, the card reader Rreads person identification information stored in the card D bynear-field communication such as RFID (Radio Frequency Identifier).

The authentication device 10 (an information processing device) isformed by one or more information processing devices each including anarithmetic logic unit and a storage unit. As shown in FIG. 1 , theauthentication device 10 has wired or wireless connection to the gate G,the first camera C1, the second camera C2, and the card reader R, and isinstalled within a facility where the gate G is installed or at a placethat is different from the facility.

As shown in FIG. 2 , the authentication device 10 includes a gaitextraction part 11, a face extraction part 12, a registration part 13,and a gate control part 14 that are constructed by execution of aprogram by the arithmetic logic unit. Moreover, the authenticationdevice 10 includes a gait data storage part 15 and an authenticationdata storage part 16 that are constructed in the storage unit.

The gait extraction part 11 (a first acquisition unit, a tracking unit)acquires a captured image captured by the first camera C1 describedabove. Then, the gait extraction part 11 first extracts the persons P1,P2, and P3 who are in the captured image and extracts gait data (firstauthentication information) representing the features of the walkingmotions of the persons P1, P2, and P3. For example, the gait extractionpart 11 extracts a moving object itself within the captured image as aperson, or determines and extracts a person based on the shape, color orthe like of the moving object. Then, for example, based on the featuresof the extracted person such as the walking silhouette, head position,and height of the extracted person, the gait extraction part 11 extractsthe feature value of the walking motion and uses the feature value asgait data. Because gait data extraction and authentication to bedescribed later can be realized by an existing technique, a detaileddescription thereof will be omitted.

Further, the gait extraction part 11 tracks the extracted persons P1,P2, and P3 within the captured image, assigns identification informationto each of the persons P1, P2, and P3, associates the gait dataextracted from the person with the identification information assignedto the person, and stores into the gait data storage part 15. Forexample, as shown in FIG. 1 , when extracting gait data of a pluralityof persons P1, P2, and P3 within the captured image, the gait extractionpart 11 assigns identification information to each of the persons P1,P2, and P3, associates the gait data extracted from each of the personsP1, P2, and P3 with the identification information of the person, andstores into the gait data storage part 15.

Further, the gait extraction part 11 checks whether or not the personP1, P2, P3 tracked within the captured image is located in the faceauthentication area A (a predetermined place) and, when detecting thatthe person P1, P2, P3 is located in the face authentication area A,transmits the gait data extracted from the person P1, P2, P3 to the faceextraction part 12. For example, when detecting that the person P3 islocated in the face authentication area A as shown in FIG. 1 , the gaitextraction part 11 retrieves stored gait data stored so as to beassociated with the identification information of the person P3 from thegait data storage part 15 and transmits to the face extraction part 12.

The face extraction part 12 (a second acquisition part) acquires acaptured image captured by the second camera C2 installed at the gate Gdescribed above. The captured image captured by the second camera C2 isan image in which the upper body including the face portion of theperson P1 located in the face authentication area A is captured, and theface extraction part 12 extracts a face image from the captured image.For example, the face extraction part 12 extracts a face image based onthe color, shape and so on of an object within the captured image. Then,the face extraction part 12 extracts face data (second authenticationinformation) representing the feature value of a face from the extractedface image. For example, the face extraction part 12 extracts andacquires face data representing the feature value of a face from theface image based on the shape of the face, the positions of therespective parts forming the face, and so on.

Then, the face extraction part 12 associates the face data acquired asdescribed above with the gait data notified by the gait extraction part11 at a timing when the person gets located in the face authenticationarea A. That is, when the person P3 gets located in the faceauthentication area A as shown in FIG. 1 , the face extraction part 12almost simultaneously acquires the face data of the person P3 and thegait data of the person P3 already extracted by the gait extraction part11, and acquires and associates both the data as gait data and face dataof the person P3.

Further, when acquiring gait data and face data because a person getslocated in the face authentication area A, the face extraction part 12checks whether or not person identification information has been readfrom the card D by the card reader R and the person identificationinformation has been notified by the card reader R. This is fordetecting an operation of holding the owned card D over the card readerR in a case where the person P1 gets located in the face authenticationarea A and performs authentication registration for the first time asshown in FIG. 4 to be described later. For this reason, in a case whereperson identification information has been notified almostsimultaneously with acquisition of the face data, the face extractionpart 12 acquires the notified person identification information asperson identification information of the person from whom the face datahas been acquired, and further associates the gait data and the facedata acquired at almost the same timing with the person identificationinformation, and transmits to the registration part 13. Thus, aregistration process by the registration part 13 is performed.

On the other hand, in a case where, when the face extraction part 12acquires the gait data and the face data because the person gets locatedin the face authentication area A, person identification information isnot read by the card reader R and the person identification informationis not notified, the face extraction part 12 proceeds to anauthentication process. This is because, as shown in FIG. 8 to bedescribed later, in a case where authentication registration has alreadybeen performed and an authentication process is performed when theperson P1 gets located in the face authentication area A, the operationof holding the card D over the card reader R is not performed. For thisreason, in a case where person identification information is notnotified almost simultaneously with acquisition of face data, the faceextraction part 12 transmits the acquired and associated gait data andface data to the gate control part 14. Thus, the authentication processby the gate control part 14 is performed.

The registration part 13 (an associating unit) performs the registrationprocess of acquiring person identification information, gait data, andface data that are transmitted from the face extraction part 12,associating them as authentication information of the same person, andregistering into the authentication data storage part 16. With this, forexample, as for the person P1 shown in FIG. 3 , gait data is acquiredbefore the person P1 reaches the gate G. Then, as shown in FIG. 4 , theperson P1 is tracked until getting located in the face authenticationarea A before the gate G, and face data of the person P1 is acquired inthe face authentication area A. With this, it is possible toautomatically register gait data and face data of the same person as aset of authentication information.

However, when registering gait data and face data of a person, theregistration part 13 performs authentication of person identificationinformation read from the card D, acquired almost simultaneously withthe gait data and the face data. In a case where the personidentification is registered beforehand and the authentication hassucceeded, the registration part 13 registers the gait data and the facedata of the person as a set of authentication information. That is, in acase where person identification information stored in the card D isregistered as information of a person who is allowed to pass through thegate G beforehand, the authentication of this person succeeds and a setof authentication information is thereby automatically registered. In acase where authentication of person identification information succeeds,the registration part 13 notifies it to the gate control part 14.

The gate control part 14 (a collating unit) judges that authenticationof a person has succeeded when notified by the registration part 13 thatauthentication of person identification information has succeeded. Then,the gate control part 14 causes the display part included by the secondcamera C2 to display that the authentication succeeded and also controlsthe gate G to open to allow the person to pass through.

Further, in a case where person identification information of a personis not input from the card D and an authentication information setincluding gait data and face data is transmitted from the faceextraction part 12, the gate control part 14 performs the authenticationprocess. At this time, the gate control part 14 performs collation bychecking whether or not gait data and face data corresponding toacquired gait data and face data are associated and stored in theauthentication data storage part 16. In a case where the acquired gaitdata and face data are associated and stored in the authentication datastorage part 16, the gate control part 14 judges that authentication ofthe person is succeeded. After that, the gate control part 14 causes thedisplay part included by the second camera C2 to display that theauthentication has succeeded and also controls the gate G to open toallow the person to pass through.

On the other hand, in a case where the acquired gait data and face dataare not associated or stored in the authentication data storage part 16,the gate control part 14 judges that authentication of the person hasfailed. After that, the gate control part 14 causes the display partincluded by the second camera C2 to display that the authentication hasfailed and also controls the gate G to be unopened to deny the personfrom passing through.

In this example embodiment, the gate control part 14 may judge thatauthentication of a person has succeeded in a case where, although gaitdata and face data transmitted from the face extraction part 12 are notassociated or stored in the authentication data storage part 16, onlythe face data is registered in the authentication data storage part 16.That is, the gate control part 14 may judge authentication of a personhas succeeded in a case where, although collation of the gait data hasfailed, collation of the face data has succeeded. This is for respondingto such a situation that, for example, gait data of a person may havechanged from gait data registered in the authentication data storagepart 16 due to injury or change in physical condition.

In this case, the gate control part 14 causes the display part includedby the second camera C2 to display that the authentication has succeededand also controls the gate G to open to allow the person to passthrough. In addition, the gate control part 14 transmits the acquiredgait data and face data to the registration part 13 so that they arereregistered. With this, the registration part 13 retrieves gait dataassociated with the face data from the authentication data storage part16, and replaces the retrieved gait data with the transmitted gait data.With this, the new gait data is associated with the already registeredface data.

[Operation]

Next, the operation of the authentication system will be described withreference to FIGS. 3 to 10 . First, an operation to registerauthentication information of the person P1 will be described withreference to views showing the motion of the person of FIGS. 3 and 4 ,the sequence diagram of FIG. 5 , and the flowchart of FIG. 6 .

When the person P1 registers authentication information for the firsttime, the person P1 heads for the gate G with the card D in which personidentification information of the person P1 is stored as shown in FIG. 3. At this time, the authentication device 10 acquires a captured imagecaptured by the first camera C1 (step S1 of FIG. 5 ), and analyzes thecaptured image. To be specific, the authentication device 10 extractsthe person P1 within the captured image, and extracts gait data of theperson P1 (step S2 of FIG. 5 , step S11 of FIG. 6 , a first process).Then, the authentication device 10 assigns identification information tothe person P1, associates the gait data with the identificationinformation and stores into the gait data storage part 15, and alsotracks the person P1 (step S2 of FIG. 5 , step S11 of FIG. 6 , the firstprocess).

After that, while the person P1 is moving toward the gate G, theauthentication device checks whether or not the person P1 tracked withinthe captured image is located in the face authentication area A setimmediately before the gate G. When detecting that the person P1 islocated in the face authentication area A as shown in FIG. 4 (step S3 ofFIG. 5 , Yes at step S12 of FIG. 6 ), the authentication device 10retrieves gait data of the person P1 extracted from the captured imageobtained by capturing an image of the person P1 from the gait datastorage part (step S4 of FIG. 5 , step S13 of FIG. 6 ). Then, theauthentication device 10 acquires a captured image captured by thesecond camera C2 installed at the gate G (step S5 of FIG. 5 ). At thistime, the captured image captured by the second camera C2 is an image ofthe upper body including the face portion of the person P1 located inthe face authentication area A, and the authentication device 10extracts a face image from the captured image. Then, the authenticationdevice 10 extracts face data representing the feature value of the faceof the person P1 from the extracted face image (step S6 of FIG. 5 , stepS14 of FIG. 6 , a second process). With this, the authentication device10 can obtain an authentication information set including gait data andface data of the person P1.

The person P1 located in the face authentication area A immediatelybefore the gate G holds the owned card D over the card reader Rinstalled at the gate G in order to register authentication informationfor the first time. Then, the authentication device 10 acquires personidentification information of the person P1 stored in the card D read bythe card reader R (step S6 of FIG. 5 , Yes at step S15 of FIG. 6 ).Thus, when acquiring person identification information from the card Dalmost simultaneously with acquisition of the authentication informationset, the authentication device 10 performs the registration process inthe following manner.

As the registration process, the authentication device 10 first performscollation by checking whether the person identification information isregistered beforehand (step S8 of FIG. 5 , step S16 of FIG. 6 ). As aresult of the collation, in a case where the acquired personidentification information is registered, the authentication device 10judges that authentication of the person has succeeded (Yes at step S16of FIG. 6 ). Then, the authentication device 10 stores and registers thegait data and the face data of the person P1 as an authenticationinformation set into the authentication data storage part 16 (step S9 ofFIG. 5 , step S17 of FIG. 6 , a third process). Moreover, theauthentication device 10 controls the gate G to open (step S10 of FIG. 5, step S18 of FIG. 18 ) to allow the person to pass through.

Meanwhile, in a case where the acquired person identificationinformation is not registered, the authentication device 10 judges thatauthentication of the person has failed (No at step S16 of FIG. 6 ).Then, the authentication device 10 does not open the gate G, and deniesthe person from passing through.

Next, an operation when the person P1 passes through the gate will bedescribed with reference to views showing the motion of a person ofFIGS. 7 and 8 , a sequence diagram of FIG. 9 , and flowcharts of FIGS. 6and 10 .

When the person P1, whose authentication information has already beenregistered, intends to pass through the gate G, the person P1 heads forthe gate G without holding the card D as shown in FIG. 7 . At this time,the authentication device 10 acquires a captured image captured by thefirst camera C1 (step S22 of FIG. 9 ), and analyzes the captured image.To be specific, the authentication device 10 extracts the person P1within the captured image, and extracts the gait data of the person P1(step S12 of FIG. 9 , step S11 of FIG. 6 ). Then, the authenticationdevice 10 assigns identification information to the person P1,associates the gait data with the identification information, and storesthem into the gait data storage part 15, and also tracks the person P1(step S22 of FIG. 9 , step S11 of FIG. 6 , a fourth process).

After that, while the person P1 is moving toward the gate G, theauthentication device checks whether or not the person P1 tracked withinthe captured image is located in the face authentication area A setimmediately before the gate G. When detecting that the person P1 islocated in the face authentication area A as shown in FIG. 8 (step S23of FIG. 9 , Yes at step S12 of FIG. 6 ), the authentication device 10retrieves, from the gait data storage part 15, the gait data of theperson P1 extracted from the captured image obtained by capturing theperson P1 (step S24 of FIG. 9 , step S13 of FIG. 6 ). Then, theauthentication device 10 acquires a captured image captured by thesecond camera C2 installed at the gate G (step S25 of FIG. 9 ). At thistime, the captured image captured by the second camera C2 is an image ofthe upper body including the face portion of the person P1 located inthe face authentication area A, and the authentication device 10extracts a face image from the captured image. Then, the authenticationdevice 10 extracts face data representing the feature value of the faceof the person P1 from the extracted face image (step S26 of FIG. 9 ,step S14 of FIG. 6 , a fifth process). With this, the authenticationdevice 10 can acquire an authentication information set including thegait data and the face data of the person P1.

Then, the person P1 located in the face authentication area Aimmediately before the gate G intends to pass through the gate G and,unlike in the abovementioned case, the person P1 does not hold the cardD over the card reader R. The authentication device 10 does not performacquisition of the person identification information of the person P1stored in the card D almost simultaneously with acquisition of theauthentication information set (No at step S15 of FIG. 6 ). In thiscase, the authentication device 10 performs the authentication processin the following manner (continued to the flowchart of FIG. 10 ).

As the authentication process, the authentication device 10 performs acollation process to check whether or not the acquired gait data andface data of the person P1 are associated and stored as correspondinggait data and face data in the authentication data storage part 16 (stepS27 of FIG. 9 , step S31 of FIG. 10 , a sixth process). In a case wherethe acquired gait data and face data of the person P1 are stored in theauthentication data storage part 16, the gate control part 14 judgesthat authentication of the person has succeeded (Yes at step S32 of FIG.10 ). After that, the authentication device 10 controls the gate G toopen, and allows the person to pass through (step S28 of FIG. 9 , stepS35 of FIG. 10 ).

On the other hand, in a case where the collation of the face data of theacquired gait data and the face data has failed (No at step S32 and Noat step S33 of FIG. 10 ), the authentication device 10 judges thatauthentication of the person P1 has failed (step S36 of FIG. 10 ). Inthis case, the authentication device 10 keeps the gate G unopened anddenies the person P1 from passing through.

However, in a case where, although collation of the gait data of theacquired gait data and the face data has failed, the collation of theface data has succeeded (Yes at step S33 of FIG. 10 ), theauthentication device 10 judges that authentication of the person P1 hassucceeded. In this case, the authentication device 10 associates thenewly extracted gait data with the successfully collated face datastored in the authentication data storage part 16, and reregisters intothe authentication data storage part 16 (step S34 of FIG. 10 ). Then,the authentication device controls the gate G to open to allow theperson to pass through (step S28 of FIG. 9 , step S35 of FIG. 10 ).

As described above, the authentication system according to the presentinvention allows two pieces of authentication information including gaitdata and face data of the same person to be associated and registeredautomatically when the person passes through the gate G. As a result, anoperation to associate authentication information is facilitated, and atwo-factor authentication system can be easily used. Moreover, even ifgait data that is one of the authentication information changes, it ispossible to automatically reregister gait data, so that use of atwo-factor authentication system is further facilitated.

In the above description, when two pieces of authentication informationincluding gait data and face data are associated, person identificationinformation of the person P1 stored in the card D is used, but it is notnecessarily required to use the person identification information. Forexample, it is possible to acquire gait data and face data of allpersons passing through the gate G in the abovementioned manner and,when such data is not registered as authentication information, registeras a set of authentication information of the person.

Further, in the above description, gait data and face data are used asauthentication information, but other data may be used. For example,instead of gait data, information representing the features of anothermoving motion of a person may be used, or information representing thefeatures of the appearance such as the figure of a person may be used.Moreover, for example, instead of face data, other biologicalinformation such as a person's iris or fingerprint may be acquired by anacquisition device installed at the gate G, and information that canauthenticate another person may be used.

Further, in the above description, when a tracked person gets located atthe gate G, the gait data of the person is retrieved from the gait datastorage part 15, and the collation of gait data together with the facedata acquired at the gate G is performed, but the collation of gait datamay be performed while a person is tracked. That is, the authenticationdevice 10 may, before a person gets located at the gate G afterextraction of gait data of the person, perform collation by checkingwhether or not the gate data has already been registered asauthentication information. Then, the authentication device 10 may storethe result of the collation of the gait data while tracking the person,and perform final authentication together with the result of collationof face data performed when the person gets located at the gate G.

The gait extraction part 11 of the authentication device 10 stores gaitdata extracted from a captured image captured by the first camera C1into the gait data storage part 15, but may delete the gait data fromthe gait data storage part 15 at any timing. For example, theauthentication device 10 may delete the gait data at a timing when thetracked person disappears from the captured image captured by the firstcamera C1 and cannot be tracked any more, or at a timing when thetracked person gets located at the gate G and the gait data of theperson is retrieved from the gait data storage part 15. The timing ofdeleting the gait data may be any timing. For example, theauthentication device 10 may delete the gait data that has been storedfor a given time after being stored in the gait data storage part 15.

Second Example Embodiment

Next, a second example embodiment of the present invention will bedescribed with reference to FIGS. 11 and 12 . FIG. 11 is a view fordescribing the configuration and processing operation of anauthentication system, and FIG. 12 is a view showing an example of dataprocessed by an authentication device.

The authentication system in this example embodiment includes almost thesame configuration as in the first example embodiment, but a scene touse is different. For example, the authentication system in this exampleembodiment performs two-factor authentication of a person within a shopand automatically performs a settlement process on a person who issuccessfully authenticated at a checkout counter.

To be specific, the authentication system in this example embodimentincludes the first camera C1 configured to capture an image of a personmoving within a shop, the second camera C2 installed at a cash registerG′, a card reader (not shown) installed at the cash register G′, and theauthentication device 10 configured to perform a person authenticationprocess and a settlement process for purchase within the shop. Below, anoperation to register authentication information and an operation toperform a person authentication process and perform a settlement processby the authentication device 10 will be described along with the motionof a person. A device performing the settlement process and a deviceperforming the person authentication process may be separately provided.

In a case where the person P1 registers authentication information forthe first time, the person P1 has a card (not shown) in which personidentification information of the person P1 is stored and heads for thecash register G′. For example, the card is a credit card that can beused for settlement. The authentication device 10 acquires a capturedimage captured by the first camera C1, and extracts gait data of personswithin the captured image, that is, gait data of the persons P1, P2, andP3 within the shop. The authentication device 10 assigns identificationinformation to each of the persons P1, P2, and P3, associates the gaitdata of each of the persons with the identification information of theperson and stores, and also tracks each of the persons P1, P2, and P3.

After that, while the persons P1, P2, and P3 within the shop are moving,the authentication device 10 checks whether or not the person P1 trackedwithin the captured image is located in a face authentication area A′set immediately before the cash register G′. When detecting that theperson P1 gets located in the face authentication area A′ as shown inFIG. 11 , the authentication device 10 retrieves the gait data of theperson P1 extracted from the captured image obtained by capturing theimage of the person P1 from the gait data storage part 15. Theauthentication device 10 acquires a captured image captured by thesecond camera C2 installed at the cash register G′. At this time, thecaptured image captured by the second camera C2 is an image of the upperbody including the face portion of the person P1 located in the faceauthentication area A′, and the authentication device 10 extracts a faceimage from the captured image. Then, the authentication device 10extracts face data representing the feature value of the face of theperson P1 from the extracted face image. With this, the authenticationdevice 10 can acquire an authentication information set including thegait data and face data of the person P1.

In order to register authentication information for the first time, theperson P1 located in the face authentication area A′ immediately beforethe cash register G′ hands the owned card to a clerk at the cashregister G′, or causes the installed card reader R to read theinformation. The authentication device 10 acquires credit cardinformation that is person identification information of the person P1stored in the card D read by the card reader R. With this, theauthentication device 10 stores and registers the credit cardinformation associated with the gait data and face data of the personP1.

When the person P1 visits the shop at a later date, the authenticationdevice 10 acquires a captured image captured by the first camera C1, andextracts gait data of the person P1. Then, the authentication device 10assigns identification information to the person P1, associates the gaitdata with the identification information, and stores into the gait datastorage part 15, and also tracks the person P1. At this time, theauthentication device 10 may perform collation by checking whether ornot the acquired gait data is already registered. In this case, when thecollation of the gait data has succeeded, the authentication device 10may store the identification information (AA BB) of the person P1 forwhom the collation of the gait data has succeeded onto the memory andwait for face data collation and settlement availability as shown inFIG. 12 . For example, in a case where the person P1 is in the state oftime t1 in FIG. 11 , the authentication device 10 stores datarepresenting a state where the collation of the gait data has merelysucceeded onto the memory as shown in FIG. 12 .

After that, while the person P1 is moving toward the cash register G′,the authentication device 10 checks whether or not the person P1 trackedwithin the captured image is located in the face authentication area A′set immediately before the cash register G′. As shown in FIG. 12 , whendetecting that the person P1 gets located in the face authenticationarea A′, the authentication device 10 retrieves face data registered soas to be associated with the gait data extracted from the person P1.Then, the authentication device 10 acquires a captured image captured bythe second camera C2 installed at the cash register G′, and extractsface data representing the feature value of the face of the person P1from the face image. The authentication device 10 checks whether or notthe acquired face data of the person P1 agrees with the face dataregistered so as to be associated with the gait data that has alreadybeen collated successfully. At this time, on the memory shown in FIG. 12, for the person P1 (AA BB), data representing Ready state representingface authentication is being performed is stored at time t2, and datarepresenting a state where face authentication has succeeded andsettlement is available is stored at time t3. With this, theauthentication device 10 can perform settlement by using credit cardinformation registered for the person P1 whose authentication hassucceeded.

Third Example Embodiment

Next, a third example embodiment of the present invention will bedescribed with reference to FIGS. 13A to 13C. FIGS. 13A and 13B areblock diagrams showing the configuration of an information processingdevice in the third example embodiment, and FIG. 13C is a flowchartshowing the operation of the information processing device. In thisexample embodiment, the overview of the configurations of theauthentication systems described in the first and second exampleembodiments will be shown.

First, with reference to FIG. 13A, the hardware components of aninformation processing device 100 in this example embodiment will bedescribed. The information processing device 100 is formed by a generalinformation processing device and, as an example, includes hardwarecomponents as shown below:

-   -   a Central Processing Unit, CPU, 101 (an arithmetic logic unit)    -   a Read Only Memory, ROM, 102 (a storage unit)    -   a Random Access Memory, RAM, 103 (a storage unit)    -   programs 104 loaded to RAM 303    -   a storage device 105 for storing programs 104    -   a drive device 106 that reads from and writes onto a storage        medium 110 outside the information processing device    -   a communication interface 107 that connects to a communication        network 111 outside the information processing device    -   an input/output interface 108 that inputs/outputs data    -   a bus 109 that connects the respective components.

Through the CPU 101 acquiring and executing the programs 104, theinformation processing device 100 can construct and include a firstacquiring unit 121, a tracking unit 122, a second acquiring unit 123,and an associating unit 124 that are shown in FIG. 13B. The programs 104are previously stored in, for example, the storage device 105 or the ROM102, and the CPU 101 loads to the RAM 103 and executes as necessary. Theprograms 104 may be supplied to the CPU 101 via the communicationnetwork 111, or the programs 104 may be previously stored in the storagemedium 110 and retrieved and given by the drive device 106 to CPU 101.Meanwhile, the abovementioned first acquiring unit 121, tracking unit122, second acquiring unit 123, and associating unit 124 may beconstructed by an electronic circuit.

That is, the information processing device 100 in this exampleembodiment includes:

-   -   the first acquiring unit 121 configured to acquire first        authentication information of a person;    -   the tracking unit 122 configured to track a person from whom the        first authentication information has been acquired, based on a        captured image captured by an image capturing device;    -   the second acquiring unit 123 configured to acquire second        authentication information of a person at a predetermined place;        and    -   the associating unit 124 configured to associate the first        authentication information and the second authentication        information of a same person, based on a result of tracking a        person.

FIG. 13A shows an example of the hardware components of the informationprocessing device 100, and the hardware components of the informationprocessing device are not limited to the components described above. Forexample, the information processing device may include part of thecomponents described above; for example, the information processingdevice may include the components except the drive device 106.

Through the functions of the first acquiring unit 121, the tracking unit122, the second acquiring unit 123, and the associating unit 124 thatare constructed by the program as described above, the informationprocessing device 100 executes an information processing method shown inthe flowchart of FIG. 13C.

As shown in FIG. 13C, the information processing device 100 of the aboveconfiguration operates so as to execute:

-   -   a first step (step S101) for acquiring first authentication        information of a person, and also tracking a person from whom        the first authentication information has been acquired, based on        a captured image captured by an image capturing device;    -   a second step (step S102) for acquiring second authentication        information of a person at a predetermined place; and    -   a third step (step S103) for associating the first        authentication information and the second authentication        information of a same person, based on a result of tracking a        person.

According to the invention, the information processing device acquiresboth first authentication information and second authenticationinformation of a person and also tracks the person, thereby being ableto associate the first authentication information and the secondauthentication information of the same person. As a result, theoperation of associating authentication information including twofactors is facilitated, and a two-factor authentication system can beeasily used.

Fourth Example Embodiment

Next, a fourth example embodiment of the present invention will bedescribed with reference to FIGS. 14 to 18 . Although automaticallyregistering two pieces of authentication information, such as gait dataand face data, has been described in the above example embodiments, itis assumed in this example embodiment that an authentication systemregisters one piece of authentication information. First, a case ofregistering face data as one piece of authentication information will bedescribed with reference to FIGS. 14 and 15 .

The authentication system in this example embodiment does not includethe first camera C1 of the authentication system described in the firstexample embodiment and, as shown in FIG. 14, includes the second cameraC2 installed at the gate G, the card reader R installed at the gate G,and an authentication device 200 that performs a person authenticationprocess and control of opening and closing of the gate G. As shown inFIG. 15 , the authentication device 200 includes a face extraction part220, a registration part 230, and a gate control part 240 that areconstructed through an arithmetic logic unit installed therein executinga program. Moreover, the authentication device 200 includes anauthentication data storage part 260 formed in a storage unit installedtherein. In the detailed description of the respective components below,a component different from that of the above example embodiments will bemainly described. Therefore, the authentication device 200 of thisexample embodiment has the same function as in the above exampleembodiments except described below.

The face extraction part 220 (an acquiring unit) acquires a capturedimage captured by the second camera C2 installed at the gate G. Then,the face extraction part 220 extracts a face image of the person P3 fromthe captured image, and extracts face data (authentication information)representing the feature value of a face from the extracted face image.That is, the face extraction part 220 acquires face data from the personP3 located in an area before the gate G (a predetermined place).

Further, the face extraction part 220 checks whether or not, whenacquiring the face data as described above, the card reader R (a readingdevice) reads person identification information from the card D and thecard reader R notifies the person identification information(predetermined information). In the case of being notified of the personidentification information almost simultaneously with acquisition of theface data, the face extraction part 220 acquires the notified personidentification information as person identification information of theperson from whom the face data has been acquired, and associates theface data acquired at almost the same timing with the personidentification information and transmits to the registration part 230.With this, the registration part 230 can detect that the person P3 getslocated in the area before the gate G and, at this timing, performs aregistration process to be described below.

On the other hand, in a case where, when the face extraction part 220acquires the face data, the card reader R does not read personidentification information and does not notify the person identificationinformation, the face extraction part 220 proceeds to an authenticationprocess. This is because the person has already been authenticated andregistered, and therefore, does not hold the card D over the card readerR when performing the authentication process. For this reason, in thecase of being not notified of person identification information almostsimultaneously with acquisition of the face data, the face extractionpart 220 transmits the acquired face data to the gate control part 240.By acquiring the face data, the gate control part 240 can detect thatthe person gets located in the area before the gate G, and performs theauthentication process to be described below.

The registration part 230 (a registering unit) performs a registrationprocess to acquire person identification information and face datatransmitted from the face extraction part 220, associates them asauthentication information, and register into the authentication datastorage part 260. At this time, the registration part 230 performsauthentication of the person identification information read from thecard D and acquired almost simultaneously with the face data. In a casewhere the person identification information has been previouslyregistered and the authentication has succeeded, the registration part230 registers the face data of the person as authentication information.That is, in a case where the person identification information stored inthe card D has been registered beforehand as information of a personallowed to pass through the gate G, authentication information isautomatically registered through success of authentication of the personidentification information.

When notified by the registration part 230 that authentication of personidentification has succeeded, the gate control part 240 (a collatingunit) judges that authentication of a person has succeeded. Then, thegate control part 240 controls the gate G to open and allows the personto pass through.

Further, the gate control part 240 performs the authentication processwhen person identification information of a person is not input from thecard D and authentication information of face data is transmitted fromthe face extraction part 220. At this time, the gate control part 240performs collation by checking whether or not face data corresponding tothe acquired face data is registered in the authentication data storagepart 260. In a case where the acquired face data is registered in theauthentication data storage part 260, the gate control part 240 judgesthat authentication of the person has succeeded. After that, the gatecontrol part 240 controls the gate G to open and allows the person topass through.

As described above, in the authentication system in this exampleembodiment, it is possible to automatically register face data servingas authentication information of a person at the time of passage throughthe gate G. As a result, registration of authentication information isfacilitated, and an authentication system can be easily used. In thebackground art, it is necessary to, regarding a person for whomauthentication may be performed with even a little possibility, registerauthentication information beforehand in an authentication informationdatabase. Therefore, there is a problem that a lot of unnecessaryauthentication information is registered and the time to collate becomeslong. In the authentication system in this exemplary embodiment, it isnot required to perform registration of authentication informationbeforehand. Moreover, since unnecessary authentication information isnot registered, the time to collate can be shortened. The authenticationinformation acquired from the person in the area in front of the gate Gis not limited to the face data described above, and may be otherbiological information such as the iris or fingerprint of the person,and may be other information that allows authentication of a person.

Further, in the above description, at the time of registration ofauthentication information, person identification information of aperson stored in the card D is used. However, the person identificationinformation is not necessarily used. For example, in a case where facedata is acquired as described above for all persons passing through thegate G and such data is not registered as authentication information, itmay be registered as person authentication information as it is.

Next, a case of registering gait data as one authentication informationwill be described with reference to FIGS. 16 and 17 .

The authentication system in this example embodiment does not includethe second camera C2 installed in the authentication system described inthe first example embodiment and, as shown in FIG. 16 , includes thefirst camera C1 that captures an image of a person heading for the gateG, the card reader R installed at the gate G, and the authenticationdevice 200 that executes a person authentication process and control ofopening and closing of the gate G. As shown in FIG. 17 , theauthentication device 200 includes a gait extraction part 210, theregistration part 230, and the gate control part 240 that areconstructed through the arithmetic logic unit installed thereinexecuting a program. Moreover, the authentication device 200 includes agait data storage part 250 and an authentication data storage part 260that are formed in the storage unit installed therein. In the detaileddescription of the respective components below, a component differentfrom that of the above example embodiments will be mainly described.Therefore, the authentication device 200 has the same function as in theabove example embodiments except described below.

The first camera C1 is an image capturing device for capturing an imageof the walking motions of the persons P1, P2, and P3 walking toward thegate G as in the first example embodiment. At this time, an imagecapturing range of the first camera C1 includes an area-before-gate a (apredetermined place) located immediately before the gate G. Thearea-before-gate a is equivalent to the face authentication area A inthe first example embodiment.

The gait extraction part 210 (an acquiring unit, a tracking unit)acquires a captured image captured by the first camera C1 describedabove. Then, the gait extraction part 210 extracts the persons P1, P2,and P3 who are within the captured image, and extracts gait data(authentication information) representing the features of the walkingmotions of the persons P1, P2, and P3. Moreover, the gait extractionpart 210 tracks the extracted persons P1, P2, and P3 within the capturedimage, assigns identification information to each of the persons P1, P2,and P3, associates the identification information with the gait dataextracted from the same person, and stores into the gait data storagepart 250.

Further, the gait extraction part 210 checks whether or not the personsP1, P2, and P3 tracked within the captured image are located in thearea-before-gate a and, when detecting that the person gets located inthe area-before-gate a, checks whether or not person identificationinformation has been read from the card D at the card reader R and theperson identification information has been notified by the card readerR. In a case where the person identification information has beennotified almost simultaneously with detection of the person located inthe area-before-gate a, the gait extraction part 210 acquires thenotified person identification information as person identificationinformation of the person from whom the gait data has been acquired,associates the gait data with the person identification information, andtransmits to the registration part 230. Thus, the registration part 230can detect that the person P3 gets located in the area before the gate Gby acquiring the result of tracking the person and the personidentification information, and performs a registration process to bedescribed below at this timing.

On the other hand, in a case where, when the gait extraction part 210detects that the person gets located in the area-before-gate a, theperson identification information is not read at the card reader R andthe person identification information is not notified, the gaitextraction part 210 proceeds to an authentication process. This isbecause the person has already been authenticated and registered anddoes not hold the card D over the card reader R at the time of theauthentication process. Therefore, in a case where, when the gaitextraction part detects that the person gets located in thearea-before-gate a, the person identification information is notnotified, the gait extraction part 210 transmits gait data of the personlocated in the area-before-gate a to the gate control part 240. The gatecontrol part 240 can detect that the person gets located in thearea-before-gate a by acquiring the gait data, and performs theauthentication process to be described below.

The registration part 230 (a registering unit) performs a registrationprocess of acquiring person identification information and gait datatransmitted from the gait extraction part 210 and associating them asauthentication information of the same person to register into theauthentication data storage part 260. At this time, the registrationpart 230 performs authentication of the person identificationinformation read from the card D acquired together with the gait data.In a case where the person identification information has beenregistered beforehand and the authentication has succeeded, theregistration part 230 registers the gait data of the person asauthentication information. That is, in a case where the personidentification information stored in the card D has been registered asinformation of a person allowed to pass through the gate G beforehand,authentication of the person identification information succeeds, andauthentication information is thereby registered automatically.

When receiving notification that authentication of the personidentification information has succeeded from the registration part 230,the gate control part 240 (a collating unit) judges that authenticationof the person has succeeded. Then, the gate control part 240 controlsthe gate G to open and allows the person to pass through.

Further, in a case where person identification information of a personhas not been input from the card D and authentication information suchas gait data is transmitted from the gait extraction part 210, the gatecontrol part 240 performs the authentication process. At this time, thegate control part 240 performs collation by checking whether or not gaitdata corresponding to the acquired gait data is registered in theauthentication data storage part 260. Then, in a case where the acquiredgait data is registered in the authentication data storage part 260, thegate control part 240 judges that the person is successfullyauthenticated. After that, the gate control part 240 controls the gate Gto open and allows the person to pass through.

As described above, in the authentication system in this exampleembodiment, it is possible to automatically register gait data servingas authentication information of a person when the person passes throughthe gate G. As a result, registration of authentication information isfacilitated, and the authentication system can be used with ease. In thebackground art, it is necessary to, regarding a person for whomauthentication may be performed with even a little possibility, registerauthentication information beforehand in an authentication informationdatabase. Therefore, there is a problem that a lot of unnecessaryauthentication information is registered and the time to collate becomeslong. In the authentication system in this exemplary embodiment, it isnot required to perform registration of authentication informationbeforehand. Moreover, since unnecessary authentication information isnot registered, it is possible to shorten the time to collate. Theauthentication information acquired from the person is not limited tothe gait data described above, and may be information representing thefeature of another motion of a person, and may be informationrepresenting the feature of the outline like body shape of a person.

Further, in the above description, person identification information ofa person stored in the card D is used at the time of registration ofauthentication information. However, the person identificationinformation does not need to be used necessarily. For example, in a casewhere gait data of a person detected to be located in thearea-before-gate a as a result of tracking the person is not registeredas authentication information, it may be registered as authenticationinformation of the person as it is.

The authentication system in this example embodiment described above maybe configured as shown in FIG. 18 . FIG. 18 is a block diagram showingthe configuration of an information processing device, and shows theoverview of the configuration of an authentication system in thisexample embodiment.

As shown in FIG. 18 , an information processing device 300 in thisexample embodiment includes:

-   -   an acquiring unit 310 configured to acquire authentication        information of a person; and    -   a registering unit 320 configured to, when detecting that a        person gets located in a predetermined place, register        authentication information of the person.

The acquiring unit 310 and the registering unit 320 may be constructedby an arithmetic logic unit included by the information processingdevice 300 executing a program, or may be constructed by an electroniccircuit.

The information processing device 300 of the above configurationoperates so as to execute a process of:

-   -   acquiring authentication information of a person; and    -   when detecting that a person gets located in a predetermined        place, registering authentication information of the person.

According to the invention, the information processing device canautomatically register authentication information of a person. As aresult, registration of authentication information is facilitated, andthe authentication system can be used with ease.

<Supplementary Notes>

The whole or part of the example embodiments disclosed above can bedescribed as the following supplementary notes. The overview of theconfigurations of an information processing device, a non-transitorycomputer-readable medium storing a program, and an informationprocessing method according to the present invention will be describedbelow. However, the present invention is not limited to the followingconfigurations.

(Supplementary Note 1)

An information processing device comprising:

-   -   a first acquiring unit configured to acquire first        authentication information of a person;    -   a tracking unit configured to track a person from whom the first        authentication information has been acquired, based on a        captured image captured by an image capturing device;    -   a second acquiring unit configured to acquire second        authentication information of a person in a predetermined place;        and    -   an associating unit configured to associate the first        authentication information and the second authentication        information of a same person, based on a result of tracking a        person.

(Supplementary Note 2)

The information processing device according to Supplementary Note 1,wherein:

-   -   the first acquiring unit is configured to, based on the captured        image, acquire the first authentication information of a person        shown in the captured image;    -   the tracking unit is configured to track movement up to the        predetermined place of a person from whom the first        authentication information has been acquired;    -   the second acquiring unit is configured to acquire the second        authentication information of a person from an acquisition        device installed in the predetermined place; and    -   the associating unit is configured to associate the first        authentication information of a person tracked up to the        predetermined place and the second authentication information of        a person located in the predetermined place, based on a result        of tracking a person.

(Supplementary Note 3)

The information processing device according to Supplementary Note 2,wherein:

-   -   the tracking unit is configured to detect that a person from        whom the first authentication information has been acquired is        located in the predetermined place; and    -   the associating unit is configured to associate the second        authentication information of a person acquired when the person        gets located in the predetermined place and the already acquired        first authentication information of a person tracked up to the        predetermined place.

(Supplementary Note 4)

The information processing device according to any of SupplementaryNotes 1 to 3, wherein:

-   -   the first acquiring unit is configured to, based on the captured        image, acquire information representing a feature of a moving        behavior of a person as the first authentication information;        and    -   the second acquiring unit is configured to acquire biological        information of a person as the second authentication information        by the acquisition device installed in the predetermined place.

(Supplementary Note 5)

The information processing device according to Supplementary Note 4,wherein:

-   -   the first acquiring unit is configured to acquire information        representing a feature of a walking behavior of a person when        the person moves to the predetermined place, as the first        authentication information; and    -   the second acquiring unit is configured to acquire a face        feature value extracted from a face image of a person captured        by the acquisition device installed in the predetermined place,        as the second authentication information.

(Supplementary Note 6)

The information processing device according to any of SupplementaryNotes 1 to 5, further comprising a collating unit configured to, basedon a result of tracking a person, collate the first authenticationinformation and the second authentication information acquired from asame person with the first authentication information and the secondauthentication information that are already associated.

(Supplementary Note 7)

The information processing device according to Supplementary Note 6,wherein the collating unit is configured to, based on a result oftracking a person, collate the first authentication information of aperson tracked up to the predetermined place and the secondauthentication information of a person located in the predeterminedplace with the first authentication information and the secondauthentication information that are already associated.

(Supplementary Note 8)

The information processing device according to Supplementary Note 7,wherein the collating unit is configured to collate the secondauthentication information of a person acquired when the person getslocated in the predetermined place and the already acquired firstauthentication information of a person tracked up to the predeterminedplace with the first authentication information and the secondauthentication information that are already associated.

(Supplementary Note 9)

The information processing device according to any of SupplementaryNotes 6 to 8, wherein the associating unit is configured to, in a casewhere, as a result of collation on a person located in the predeterminedplace, collation of the first authentication information has failed andcollation of the second authentication information has succeeded, newlyassociate the first authentication information of a person tracked up tothe predetermined place with the second authentication information.

(Supplementary Note 10)

A non-transitory computer-readable medium storing a program comprisinginstructions for causing an information processing device to realize:

-   -   a first acquiring unit configured to acquire first        authentication information of a person;    -   a tracking unit configured to track a person from whom the first        authentication information has been acquired, based on a        captured image captured by an image capturing device;    -   a second acquiring unit configured to acquire second        authentication information of a person in a predetermined place;        and    -   an associating unit configured to associate the first        authentication information and the second authentication        information of a same person, based on a result of tracking a        person.

(Supplementary Note 10.1)

The non-transitory computer-readable medium storing the programaccording to Supplementary Note 10, the program comprising instructionsfor causing the information processing device to further realize:

-   -   a collating unit configured to, based on a result of tracking a        person, collate the first authentication information and the        second authentication information acquired from a same person        with the first authentication information and the second        authentication information that are already associated.

(Supplementary Note 11)

An information processing method comprising:

-   -   a first process to acquire first authentication information of a        person, and track a person from whom the first authentication        information has been acquired, based on a captured image        captured by an image capturing device;    -   a second process to acquire second authentication information of        a person in a predetermined place; and    -   a third process to associate the first authentication        information and the second authentication information of a same        person, based on a result of tracking a person.

(Supplementary Note 11.1)

The information processing method according to Supplementary Note 11,wherein:

-   -   the first process is to, based on the captured image, acquire        the first authentication information of a person shown in the        captured image, and track movement up to the predetermined place        of a person from whom the first authentication information has        been acquired;    -   the second process is to acquire the second authentication        information of a person from an acquisition device installed in        the predetermined place; and    -   the third process is to associate the first authentication        information of a person tracked up to the predetermined place        and the second authentication information of a person located in        the predetermined place, based on a result of tracking a person.

(Supplementary Note 11.2)

The information processing method according to Supplementary Note 11.1,wherein:

-   -   the first process is to detect that a person from whom the first        authentication information has been acquired is located in the        predetermined place; and    -   the third process is to associate the second authentication        information of a person acquired when the person gets located in        the predetermined place and the already acquired first        authentication information of a person tracked up to the        predetermined place.

(Supplementary Note 11.3)

The information processing method according to any of SupplementaryNotes 11 to 11.2, wherein:

-   -   the first process is to, based on the captured image, acquire        information representing a feature of a moving behavior of a        person as the first authentication information; and    -   the second process is to acquire biological information of a        person as the second authentication information by the        acquisition device installed in the predetermined place.

(Supplementary Note 11.4)

The information processing method according to Supplementary Note 11.3,wherein:

-   -   the first process is to acquire information representing a        feature of a walking behavior of a person when the person moves        to the predetermined place, as the first authentication        information; and    -   the second process is to acquire a face feature value extracted        from a face image of a person captured by the acquisition device        installed in the predetermined place, as the second        authentication information.

(Supplementary Note 12)

The information processing method according to any of SupplementaryNotes 11 to 11.4, further comprising, after the third process:

-   -   a fourth process to acquire the first authentication information        of a person, and track a person from whom the first        authentication information has been acquired, based on a        captured image captured by an image capturing device;    -   a fifth process to acquire the second authentication information        of a person in a predetermined place; and    -   a sixth process to, based on a result of tracking a person,        collate the first authentication information and the second        authentication information acquired from a same person with the        first authentication information and the second authentication        information that are already associated.

(Supplementary Note 12.1)

The information processing method according to Supplementary Note 12,wherein the sixth process is to, based on a result of tracking a person,collate the first authentication information of a person tracked up tothe predetermined place and the second authentication information of aperson located in the predetermined place with the first authenticationinformation and the second authentication information that are alreadyassociated.

(Supplementary Note 12.2)

The information processing method according to Supplementary Note 12.1,wherein the sixth process is to collate the second authenticationinformation of a person acquired when the person gets located in thepredetermined place and the already acquired first authenticationinformation of a person tracked up to the predetermined place with thefirst authentication information and the second authenticationinformation that are already associated.

(Supplementary Note 13)

The information processing method according to any of SupplementaryNotes 12 to 12.2, wherein the sixth process is to, in a case where, as aresult of collation on a person located in the predetermined place,collation of the first authentication information has failed andcollation of the second authentication information has succeeded, newlyassociate the first authentication information of a person tracked up tothe predetermined place with the second authentication information.

(Supplementary Note 2-1)

An information processing device comprising:

-   -   an acquiring unit configured to acquire authentication        information of a person; and    -   a registering unit configured to, when detecting that a person        gets located in a predetermined place, register authentication        information of the person.

(Supplementary Note 2-2)

The information processing device according to Supplementary Note 2-1,wherein the registering unit is configured to, by receiving an input ofpredetermined information from a person located in the predeterminedplace, detect that the person is located in the predetermined place andregister the authentication information of the person.

(Supplementary Note 2-3)

The information processing device according to Supplementary Note 2-2,wherein the registering unit is configured to, when receiving an inputof the predetermined information from a person through a reading deviceinstalled in the predetermined place, detect that the person is locatedin the predetermined place and register the authentication informationof the person.

(Supplementary Note 2-4)

The information processing device according to Supplementary Note 2-3,wherein the registering unit is configured to perform authentication ofthe predetermined information when receiving an input of thepredetermined information from a person through the reading deviceinstalled in the predetermined place and register the authenticationinformation of the person when the authentication of the predeterminedinformation has succeeded.

(Supplementary Note 2-5)

The information processing device according to any of SupplementaryNotes 2-1 to 2-4, wherein the acquiring unit is configured to acquirethe authentication information of a person from an acquisition deviceinstalled in the predetermined place.

(Supplementary Note 2-6)

The information processing device according to Supplementary Note 2-5,wherein the acquiring unit is configured to acquire biologicalinformation of a person from the acquisition device installed in thepredetermined place as the authentication information.

(Supplementary Note 2-7)

The information processing device according to any of SupplementaryNotes 2-1 to 2-4, further comprising a tracking unit configured to tracka person from whom the authentication information has been acquired,based on a captured image captured by an image capturing device, whereinthe registering unit is configured to register the authenticationinformation of a person based on a result of tracking the person.

(Supplementary Note 2-8)

The information processing device according to Supplementary Note 2-7,wherein:

-   -   the acquiring unit is configured to acquire the authentication        information of a person shown in the captured image based on the        captured image; and    -   the tracking unit is configured to track movement up to the        predetermined place of a person from whom the authentication        information has been acquired.

(Supplementary Note 2-9)

The information processing device according to Supplementary Note 2-7 or2-8, wherein the acquiring unit is configured to acquire informationrepresenting a feature of a walking behavior of a person when the personmoves to the predetermined place, as the authentication information.

(Supplementary Note 2-10)

The information processing device according to any of SupplementaryNotes 2-1 to 2-9, further comprising a collating unit configured tocollate the authentication information acquired from a person located inthe predetermined place with the registered authentication information.

(Supplementary Note 2-11)

An information processing method comprising:

-   -   acquiring authentication information of a person; and    -   when detecting that a person gets located in a predetermined        place, registering the authentication information of the person.

(Supplementary Note 2-12)

The information processing method according to Supplementary Note 2-11,wherein, by receiving an input of predetermined information from aperson located in the predetermined place, it is detected that theperson is located in the predetermined place, and the authenticationinformation of the person is registered.

(Supplementary Note 2-13)

The information processing method according to Supplementary Note 2-11or 2-12, wherein the authentication information of a person is acquiredfrom an acquisition device installed in the predetermined place.

(Supplementary Note 2-14)

The information processing method according to Supplementary Note 2-11or 2-12, further comprising:

-   -   tracking a person from whom the authentication information has        been acquired, based on a captured image captured by an image        capturing device; and    -   registering the authentication information of a person based on        a result of tracking the person.

(Supplementary Note 2-15)

The information processing method according to Supplementary Note 2-14,wherein:

-   -   the authentication information of a person shown in the captured        image is acquired based on the captured image;    -   movement up to the predetermined place of a person from whom the        authentication information has been acquired is tracked; and    -   the authentication information of a person is registered based        on a result of tracking the person.

(Supplementary Note 2-16)

The information processing method according to any of SupplementaryNotes 2-11 to 2-15, further comprising collating the authenticationinformation acquired from a person located in the predetermined placewith the registered authentication information.

(Supplementary Note 2-17)

A non-transitory computer-readable medium storing a program comprisinginstructions for causing an information processing device to realize:

-   -   an acquiring unit configured to acquire authentication        information of a person; and    -   a registering unit configured to, when detecting that a person        gets located in a predetermined place, register authentication        information of the person.

Meanwhile, the abovementioned program may be stored in various types ofnon-transitory computer-readable mediums and supplied to the computer.The non-transitory computer-readable mediums include various types oftangible storage mediums. The non-transitory computer-readable mediumsinclude, for example, a magnetic recording medium (e.g., a flexibledisk, a magnetic tape, a hard disk drive), a magneto-optical recordingmedium (e.g., a magneto-optical disk), a CD-ROM (Read Only Memory), aCD-R, a CD-R/W, a semiconductor memory (e.g., a mask ROM, PROM(Programmable ROM), an EPROM (Erasable PROM), a flash ROM, and a RAM(Random Access Memory). Moreover, the program may be supplied to thecomputer by various types of transitory computer-readable mediums. Thetransitory computer-readable mediums include, for example, an electricsignal, an optical signal, and an electromagnetic signal. The transitorycomputer-readable medium can provide the computer with the program via awired communication path such as an electric wire and an optical fiber,or via a wireless communication path.

While the present invention has been described above with reference tothe example embodiments thereof, the present invention is not limited tothese example embodiments. The forms and details of the presentinvention may be changed in various manners that can be understood bythose skilled in the art without departing from the spirit and scope ofthe present invention.

LIST OF REFERENCE SYMBOLS

-   -   10 authentication device    -   11 gait extraction part    -   12 face extraction part    -   13 registration part    -   14 gait control part    -   15 gait data storage part    -   16 authentication data storage part    -   100 information processing device    -   110 first acquiring unit    -   120 tracking unit    -   130 second acquiring unit    -   140 associating unit    -   200 authentication device    -   210 gait extraction part    -   220 face extraction part    -   230 registration part    -   240 gate control part    -   250 gait data storage part    -   260 authentication data storage part    -   300 information processing device    -   310 acquiring unit    -   320 registering unit    -   A, A′ face authentication area    -   C1 first camera    -   C2 second camera    -   D card    -   G gate    -   G′ cash register    -   P1, P2, P3 person    -   R card reader

1. An information processing method comprising: extracting a feature ofa person using a camera; tracking the person using the camera; derivingidentification information of the person in an area; and registering thefeature of the person as authentication information of the person inresponse to deriving the identification information of the persontracked.
 2. The information processing method according to claim 1,wherein the feature includes a gait of the person.
 3. The informationprocessing method according to claim 1, wherein the feature includes anappearance of the person.
 4. The information processing method accordingto claim 1, further comprising deriving the identification informationby a card reader located in the area.
 5. An information processingapparatus comprising: at least one memory configured to storeinstructions; and at least one processor configured to execute theinstructions to: extract a feature of a person using a camera; track theperson using the camera; derive identification information of the personin an area; and register the feature of the person as authenticationinformation of the person in response to deriving the identificationinformation of the person tracked.
 6. The information processingapparatus according to claim 5, wherein the feature includes a gait ofthe person.
 7. The information processing apparatus according to claim5, wherein the feature includes an appearance of the person.
 8. Theinformation processing apparatus according to claim 5, wherein the atleast one processor is further configured to execute the instructions toderive the identification information by a card reader located in thearea.
 9. A non-transitory computer-readable medium storing a programtherein, the program comprising instructions for causing an informationprocessing apparatus to execute processes to: extract a feature of aperson using a camera; track the person using the camera; deriveidentification information of the person in an area; and register thefeature of the person as authentication information of the person inresponse to deriving the identification information of the persontracked.
 10. The non-transitory computer-readable medium storing theprogram therein according to claim 9, wherein the feature includes agait of the person.
 11. The non-transitory computer-readable mediumstoring the program therein according to claim 9, wherein the featureincludes an appearance of the person.
 12. The non-transitorycomputer-readable medium storing the program therein according to claim9, the program further comprising instructions for causing theinformation processing apparatus to execute processes to derive theidentification information by a card reader located in the area.