Information processing system, information processing method, and program

ABSTRACT

An information processing system includes: a first detection device that acquires information about a first domain; a plurality of second detection devices, each of which acquires information about a domain included in the first domain; a selection unit that selects at least one second detection device from the plurality of second detection devices based on a state of a target obtained from the acquired information about the first domain; and an aggregating unit that aggregates the information about the domain acquired by the selected at least one second detection device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of U.S. application Ser. No.16/086,794, filed Sep. 20, 2018, which is a National Stage ofInternational Application No. PCT/JP2017/011653 filed Mar. 23, 2017,claiming priority based on Japanese Patent Application No. 2016-059143filed Mar. 23, 2016, the disclosures of which are incorporated herein intheir entirety.

TECHNICAL FIELD

The present invention relates to an information processing system, aninformation processing method, and a program.

BACKGROUND ART

Face authentication systems are sometimes used as a means for confirmingpersons entering and exiting a venue such as a theme park or an eventvenue.

Patent Document 1 describes, as a related technique, a technique thatcontrols a gaze camera based on position information of a monitoredtarget imaged from above by an overhead camera.

PRIOR ART DOCUMENT Patent Document

[Patent Document 1] Japanese Unexamined Patent Application, FirstPublication No. 2013-168757

DISCLOSURE OF THE INVENTION Problem to be Solved by the Invention

When confirming a large number of persons entering and exiting a venuesuch as a theme park or an event venue, there is a possibility that thepersons entering and exiting the venue may experience dissatisfactiondue to congestion and the like if authentication processing is slow.

Therefore, there has been demand for a technique capable of rapidlyauthenticating an authentication target existing in a predeterminedarea.

An exemplary object of the present invention is to provide aninformation processing system, an information processing method, and aprogram capable of solving the above problem.

Means for Solving the Problem

An information processing system according to a first exemplary aspectof the present invention includes: a first detection device thatacquires information about a first domain; a plurality of seconddetection devices, each of which acquires information about a domainincluded in the first domain; a selection unit that selects at least onesecond detection device from the plurality of second detection devicesbased on a state of a target obtained from the acquired informationabout the first domain; and an aggregating unit that aggregates theinformation about the domain acquired by the selected at least onesecond detection device.

An information processing method according to a second exemplary aspectof the present invention includes: acquiring information about a firstdomain; selecting, based on a state of a target obtained from theacquired information about the first domain, at least one detectiondevice from a plurality of detection devices, each of which acquiresinformation about a domain included in the first domain; and aggregatingthe information about the domain acquired by the selected at least onedetection device.

A program according to a third exemplary aspect of the present inventioncauses a computer to execute: acquiring information about a firstdomain; selecting, based on a state of a target obtained from theacquired information about the first domain, at least one detectiondevice from a plurality of detection devices, each of which acquiresinformation about a domain included in the first domain; and aggregatingthe information about the domain acquired by the selected at least onedetection device.

Effects of the Invention

According to an exemplary embodiment of the present invention, it ispossible to quickly authenticate an authentication target existing in apredetermined area.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram showing the configuration of an authenticationsystem according to a first exemplary embodiment of the presentinvention.

FIG. 2 is a top view of a predetermined area according to the firstexemplary embodiment of the present invention.

FIG. 3 is a diagram showing the configuration of an authenticationprocessing device according to the first exemplary embodiment of thepresent invention.

FIG. 4 is a diagram showing a first data table in the first exemplaryembodiment of the present invention.

FIG. 5 is a diagram showing a second data table in the first exemplaryembodiment of the present invention.

FIG. 6 is a diagram showing a third data table in the first exemplaryembodiment of the present invention.

FIG. 7 is a diagram showing the processing flow of the authenticationsystem according to the first exemplary embodiment of the presentinvention.

FIG. 8 is a diagram showing the configuration of an authenticationsystem according to a second exemplary embodiment of the presentinvention.

FIG. 9 is a diagram showing the processing flow of the authenticationsystem according to the second exemplary embodiment of the presentinvention.

FIG. 10 is a diagram showing the configuration of an authenticationsystem according to a third exemplary embodiment of the presentinvention.

FIG. 11 is a diagram showing the configuration of an authenticationprocessing device according to the third exemplary embodiment of thepresent invention.

FIG. 12 is a diagram showing the processing flow of the authenticationsystem according to the third exemplary embodiment of the presentinvention.

FIG. 13 is a diagram showing the configuration of an authenticationprocessing device according to a fourth exemplary embodiment of thepresent invention.

FIG. 14 is a diagram showing the processing flow of an authenticationsystem according to the fourth exemplary embodiment of the presentinvention.

FIG. 15 is a diagram showing the configuration of an authenticationsystem according to a fifth exemplary embodiment of the presentinvention.

FIG. 16 is a diagram showing the configuration of an authenticationsystem according to an exemplary embodiment of the present invention.

EMBODIMENTS FOR CARRYING OUT THE INVENTION First Exemplary Embodiment

Hereunder, exemplary embodiments will be described in detail withreference to the drawings.

The configuration of an authentication system 1 (information processingsystem) according to a first exemplary embodiment of the presentinvention will be described.

As shown in FIG. 1, the authentication system 1 according to the firstexemplary embodiment of the present invention includes a first sensingdevice 10 (first detection device), second sensing devices 20 a, 20 b,20 c, 20 d, 20 e, 20 f, and 20 g (second detection devices), and anauthentication processing device 30.

The second sensing devices 20 a to 20 g are collectively referred to assecond sensing devices 20.

A predetermined area (first domain) indicated by reference symbol R(referred to as the “predetermined area R” below) is shown in FIG. 1.

As shown in FIG. 2, the first sensing device 10 is provided in aposition that enables an overhead view of authentication targets A, B,C, D, E, F, G, H, I, J, K, and L (referred to as the “authenticationtargets A to L” below) in the predetermined area R.

The first sensing device 10 measures the state of one or moreauthentication targets existing in the predetermined area R. The stateof an authentication target may represent, for example, the position ofthe authentication target existing in the predetermined area R, or thedirection of the authentication target.

Specifically, the first sensing device 10 is an imaging device forexample. If an authentication target is a person, the first sensingdevice 10 acquires a first image that includes the position of theperson in the predetermined area R and the direction of the face of theperson, by imaging the person in the predetermined area R from above.

The second sensing devices 20 are provided at the periphery of thepredetermined area R in positions that enable sensing information aboutan authentication target existing in the predetermined area R to beacquired.

Specifically, the second sensing devices 20 are each provided inpositions that are determined based on their own performance withrespect to acquiring sensing information about the authenticationtarget, the performance of the other second sensing devices 20 withrespect to acquiring sensing information about the authenticationtarget, and the installation positions of the other second sensingdevices 20. If the second sensing devices 20 are imaging devices, forexample, the performance with respect to acquiring sensing informationrefers to the size of the area in which sensing information can beacquired (second domain), which is determined according to the angle ofview as shown for the second sensing device 20 e in FIG. 2 (area Rel).

One or more second sensing devices 20 are selected from among all of thesecond sensing devices 20 based on the state of the authenticationtarget acquired by the first sensing device 10. The selected secondsensing device 20 acquires sensing information about one or moreauthentication targets existing in the predetermined area R. The sensinginformation represents, for example, the shape of the authenticationtarget, the color of the authentication target, and the like, and isinformation that enables identification of the authentication target.

Specifically, the second sensing device 20 is an imaging device forexample. If the authentication target is a person, the second sensingdevice 20 that is capable of acquiring sensing information with respectto the person thereof is selected based on the position of the person inthe predetermined area R and the direction of the face of the personindicated by the first image captured by the first sensing device 10.Each of the selected second sensing devices 20 respectively acquire asecond image that includes the face of the person representing theimaging target and the color of the clothing worn by the person thereof.

For example, if the predetermined area R is not very large and secondsensing devices 20 are installed at the four corners of thepredetermined area R and the like, the second sensing device 20positioned in a direction in which the face of the target is facing maybe selected.

As shown in FIG. 3, the authentication processing device 30 includes anauthentication management device 30 a and an authentication device 30 b.

The authentication management device 30 a includes a stateidentification unit 301, a second sensing device selection unit(selection unit) 302, an authentication target exclusion unit 305, anauthentication target tracking unit 306, and a storage unit 307.

The authentication device 30 b includes an authentication unit(aggregating unit) 303, an authentication completion determination unit304, and a storage unit 308. An authentication device 30 b is providedin each of the second sensing devices 20.

The state identification unit 301 identifies the state of each of theauthentication targets measured by the first sensing device 10.

For example, the state identification unit 301 analyzes the first imagecaptured by the first sensing device 10 using a technique described inPCT International Publication No. WO 2015/186519. The stateidentification unit 301 identifies the position of each of theauthentication targets in the predetermined R and the direction of theface of each of the authentication targets, by analyzing the firstimage.

The second sensing device selection unit 302 selects the second sensingdevice 20 based on the state of each of the authentication targetsidentified by the state identification unit 301.

The second sensing device selection unit 302 selects the second sensingdevice 20 based on the state of a target in which authenticationprocessing is not complete. A target in which authentication is notcomplete refers to an authentication target that remains after theauthentication target exclusion unit 305 described below has excludedthe authentication targets in which authentication is determined to becomplete, from the authentication targets.

The authentication unit 303 performs authentication processing using thesensing information about each of the authentication targets acquired bythe selected second sensing device 20.

The authentication completion determination unit 304 determines whetheror not authentication of an authentication target is complete.

The authentication target exclusion unit 305 excludes a target in whichauthentication is determined to be complete, from the targets of thenext authentication processing.

The authentication target tracking unit 306, for example, tracks anauthentication target using a technique described in PCT InternationalPublication No. WO 2014/083910.

The storage unit 307 stores various pieces of information necessary forthe processing performed by the authentication management device 30 a.

For example, the storage unit 307 stores a first data table TBL1 asshown in FIG. 4. The first data table TBL1 indicates a correspondencerelationship between each of the second sensing devices 20 and the areain which each of the second sensing devices 20 are capable of acquiringsensing information. The information in the first data table TBL1 andthat is stored by the storage unit 307, about the area in which sensinginformation can be acquired may be defined by a set of coordinate pointsindicating an outline of the area thereof. The information in the firstdata table TBL1 and that is stored by the storage unit 307, about thearea in which sensing information can be acquired may be defined by afunction indicating an outline of the area thereof. If the informationin the first data table TBL1 about the area in which sensing informationcan be acquired is a function, the outline of the area thereof may bedivided into a plurality of sections, and the outline of the area may bedefined by a plurality of functions that represent each of the sections.

Furthermore, the storage unit 307 stores a second data table TBL2 asshown in FIG. 5. The second data table TBL2 shows a correspondencerelationship between each of the second sensing devices 20 and theposition in which each of the second sensing devices 20 is provided (ascoordinates with respect to an origin O).

The storage unit 308 stores various pieces of information necessary forthe processing performed by the authentication device 30 b.

For example, the storage unit 308 stores a third data table TBL3 asshown in FIG. 6. The third data table TBL3 shows a correspondencerelationship between each of the authentication targets A to L and thesensing information about each of the authentication targets A to L.

Next, the processing of the authentication system 1 according to thefirst exemplary embodiment of the present invention will be described.

Here, the processing flow of the authentication system 1 according tothe first exemplary embodiment of the present invention shown in FIG. 7will be described.

It is assumed that the authentication system 1 has the configurationshown in FIG. 1. It is assumed that the authentication processing device30 has the configuration shown in FIG. 3. It is assumed that theauthentication targets A to L are people. It is assumed that the firstsensing device 10 and each of the second sensing devices 20 are imagingdevices.

In the authentication system 1, the first sensing device 10 measures thestate of each of the authentication targets A to L existing in thepredetermined area R (step S1).

Specifically, by imaging the authentication targets A to L in thepredetermined area R from above, the first sensing device 10 captures afirst image that includes (indicates) the position of each of theauthentication targets A to L in the predetermined area R and thedirection of the face of each of the authentication targets A to L.

The state identification unit 301 acquires the state of each of theauthentication targets A to L existing in the predetermined area R, fromthe first sensing device 10 (step S2).

For example, the state identification unit 301 acquires the first imagefrom the first sensing device 10. The first image includes (informationindicating) the position of each of the authentication targets A to L inthe predetermined area R and the direction of the face of each of theauthentication targets A to L.

The state identification unit 301 identifies the acquired state of eachof the authentication targets A to L (step S3).

For example, the state identification unit 301 analyzes the acquiredfirst image using a technique described in PCT International PublicationNo. WO 2015/186519. The state identification unit 301 identifies theposition of each of the authentication targets A to L in thepredetermined area R and the direction of the face of each of theauthentication targets by analyzing the first image.

The state identification unit 301 transmits state information indicatingthe identified state of each of the authentication targets A to L to thesecond sensing device selection unit 302.

The second sensing device selection unit 302 receives the stateinformation from the state identification unit 301.

The second sensing device selection unit 302 selects the second sensingdevice 20 based on the received state information (step S4).

As a specific example, a case where the second sensing device selectionunit 302 selects a second sensing device 20 with respect to theauthentication target F will be described.

It is assumed that the position of the authentication target F in thepredetermined area R identified by the state identification unit 301 isindicated by “(X,Y)=(x1,y1)”, which are coordinates in an X-axisdirection and a Y-axis direction with respect to the origin O shown inFIG. 2. Furthermore, it is assumed that the face of the authenticationtarget F is facing in the direction of arrow W.

The second sensing device selection unit 302 reads the first data tableTBL1 from the storage unit 307. The first data table TBL1 shows acorrespondence relationship between each of the second sensing devices20 and the area in which each of the second sensing devices 20 arecapable of acquiring sensing information.

The second sensing device selection unit 302 compares the positions ofthe authentication targets existing in the predetermined R which isincluded in the state indicated by the acquired state information, andeach of the sensing information acquirable areas in the first data tableTBL1. As a result of the comparison, the second sensing device selectionunit 302 identifies, with respect to each of the authentication targets,the sensing information acquirable areas that include the position ofthe authentication target.

The second sensing device selection unit 302 identifies the secondsensing devices 20 that correspond to the identified sensing informationacquirable areas.

The second sensing device selection unit 302 selects a second sensingdevice 20 from the identified second sensing devices 20, based on thedirection of the face of the authentication target, which is included inthe state indicated by the acquired state information. For example, thesecond sensing device selection unit 302 reads the second data tableTBL2 shown in FIG. 5 from the storage unit 307. The second sensingdevice selection unit 302 calculates the angles formed between a vectorrepresenting the direction of the face of the authentication target andvectors from the authentication target toward each of the second sensingdevices 20. The second sensing device selection unit 302 selects thesecond sensing device 20 corresponding to the vector that forms thesmallest angle.

The second sensing device selection unit 302 transmits selectioninformation indicating the selected second sensing device 20 to theauthentication unit 303 (step S5).

The authentication unit 303 receives the selection information from thesecond sensing device selection unit 302 (step S6).

The authentication unit 303 acquires the sensing information from thesecond sensing device 20 indicated by the received selection information(step S7).

The authentication unit 303 authenticates the authentication targetusing the acquired sensing information (step S8).

For example, the authentication unit 303 reads the third data table TBL3shown in FIG. 6 from the storage unit 308. The authentication unit 303sequentially compares the acquired sensing information with the sensinginformation indicated in the third data table TBL3. The authenticationunit 303 determines whether or not the acquired sensing informationmatches the sensing information indicated in the third data table TBL3.

The authentication completion determination unit 304 determines whetheror not authentication of the authentication target is complete (stepS9).

For example, if the sensing information acquired by the authenticationunit 303 matches the sensing information indicated in the third datatable TBL3, the authentication completion determination unit 304determines that authentication of the authentication targetcorresponding to the sensing information indicated in the third datatable TBL3 determined as being matched, is complete. If theauthentication unit 303 determines that the acquired sensing informationdoes not match the sensing information shown in the third data tableTBL3, the authentication completion determination unit 304 determinesthat authentication of the authentication target is not complete.

If the authentication completion determination unit 304 determines thatauthentication of the authentication target is not complete (NO in stepS9), the process returns to the processing of step S6.

If the authentication completion determination unit 304 determines thatauthentication of the authentication target is complete (YES in stepS9), it notifies the authentication target exclusion unit 305 of theauthentication target determined to have complete authentication (stepS10).

The authentication target exclusion unit 305 excludes the target, inwhich the authentication completion determination unit 304 hasdetermined that authentication is complete, from the authenticationtargets of the next authentication processing (step S11).

For example, the authentication completion determination unit 304identifies from the second image the position of the authenticationtarget in the predetermined area R, which corresponds to the sensinginformation determined by the authentication unit 303 to be matching thesensing information shown in the third data table TBL3, using atechnique described in PCT International Publication No. WO 2014/083910.The authentication completion determination unit 304 determines thatauthentication of the authentication target existing in the positionidentified from the first image, which corresponds to the position inthe predetermined area R identified from the second image, is complete.The authentication completion determination unit 304 notifies theauthentication target exclusion unit 305 of the authentication target inwhich authentication is determined to be complete. The authenticationtarget exclusion unit 305 excludes the target existing in the positionidentified from the first image, which corresponds to the position inthe predetermined R identified from the second image, from theauthentication targets of the next authentication processing.

For example, the authentication target tracking unit 306 tracks thetargets of the next authentication processing using a techniquedescribed in PCT International Publication No. WO 2014/083910 (stepS12).

The authentication system 1 repeats the processing of steps S1 to S12.

The processing flow of the authentication system 1 according to thefirst exemplary embodiment of the present invention has been describedabove.

The authentication system 1 according to the first exemplary embodimentof the present invention mentioned above includes the first sensingdevice 10, the second sensing devices 20, and the authenticationprocessing device 30. The first sensing device 10 is provided in aposition that enables an overhead view of the authentication targets Ato L in the predetermined area R. The first sensing device 10 measuresthe state of one or more authentication targets existing in thepredetermined area R. The second sensing devices 20 are provided at theperiphery of the predetermined area R in positions that enable sensinginformation about an authentication target existing in the predeterminedarea R to be acquired. One or more second sensing devices 20 areselected from among all of the second sensing devices 20 based on thestate of the authentication target acquired by the first sensing device10. The selected second sensing device 20 acquires sensing informationabout one or more authentication targets existing in the predeterminedarea R. The authentication processing device 30 includes the stateidentification unit 301, the second sensing device selection unit 302,the authentication unit 303, the authentication completion determinationunit 304, the authentication target exclusion unit 305, theauthentication target tracking unit 306, and the storage unit 307. Thestate identification unit 301 identifies the state of each of theauthentication targets measured by the first sensing device 10. Thesecond sensing device selection unit 302 selects the second sensingdevice 20 based on the state of each of the authentication targetsidentified by the state identification unit 301. The second sensingdevice selection unit 302 selects the second sensing device 20 based onthe state of a target in which authentication processing is not completeafter the authentication target exclusion unit 305 mentioned below hasexcluded the authentication targets in which authentication isdetermined to be complete. The authentication unit 303 performsauthentication processing using the sensing information about each ofthe authentication targets acquired by the selected second sensingdevice 20. The authentication completion determination unit 304determines whether or not authentication of an authentication target iscomplete. The authentication target exclusion unit 305 excludes a targetin which authentication is determined to be complete, from the targetsof the next authentication processing. The authentication targettracking unit 306 tracks an authentication target. The storage unit 307stores various pieces of information necessary for the processingperformed by the authentication management device 30.

In this manner, the authentication system 1 is capable of rapidlyauthenticating an authentication target existing in a predeterminedarea.

Second Exemplary Embodiment

The configuration of an authentication system 1 according to a secondexemplary embodiment of the present invention will be described.

As shown in FIG. 8, the authentication system 1 according to the secondexemplary embodiment of the present invention includes a first sensingdevice 10, second sensing devices 20 a and 20 b, and an authenticationprocessing device 30.

The second sensing devices 20 a and 20 b are collectively referred to assecond sensing devices 20.

Furthermore, a predetermined area R is shown in FIG. 8.

As shown in FIG. 8, the first sensing device 10 is provided in aposition that enables an overhead view of authentication targets A to Lin the predetermined area R.

The first sensing device 10 measures the state of one or moreauthentication targets existing in the predetermined area R.

The second sensing device 20 a is provided with respect to thepredetermined area R shown in FIG. 8 on the left rear side in themovement direction of the authentication targets A to L indicated byarrow W2. The second sensing device 20 b is provided with respect to thepredetermined R shown in FIG. 8 in a position forward of the secondsensing device 20 a on the left side in the movement direction of theauthentication targets A to L indicated by arrow W2, such that it isseparated from the second sensing device 20 a.

The authentication processing device 30 according to the secondexemplary embodiment of the present invention includes, in the samemanner as the authentication processing device 30 according to the firstexemplary embodiment of the present invention, an authenticationmanagement device 30 a, and an authentication device 30 b.

The second sensing device selection unit 302 according to the secondexemplary embodiment of the present invention selects the second sensingdevices 20 in a predetermined order.

Next, the processing of the authentication system 1 according to thesecond exemplary embodiment of the present invention will be described.

Here, the processing flow of the authentication system 1 according tothe second exemplary embodiment of the present invention shown in FIG. 9will be described.

It is assumed that the authentication system 1 has the configurationshown in FIG. 8. It is assumed that the authentication processing device30 has the configuration shown in FIG. 3. It is assumed that theauthentication targets A to L are people. It is assumed that the firstsensing device 10 and each of the second sensing devices 20 are imagingdevices.

The authentication system 1 performs the processing of steps Si to S3.

The second sensing device selection unit 302 selects the second sensingdevices 20 in a predetermined order (step S13).

Specifically, the second sensing device selection unit 302 firstlyselects the second sensing device 20 a, which is capable of detectingthe authentication targets A to L at the earliest time and is providedat the rearmost position with respect to the movement direction of theauthentication targets A to L. Next, when the processing of step S13 hasbeen performed, the second sensing device selection unit 302 furtherselects the second sensing device 20 b, which is capable of detectingthe authentication targets A to L at the next earliest time after thesecond sensing device 20 a, and is provided one position forward of thesecond sensing device 20 a. In the same manner, each time the processingof step S13 is performed, the second sensing device 20 provided oneposition forward is further selected.

The authentication system 1 performs the processing of steps S5 to S12.

The second sensing devices 20 that no longer detect the authenticationtargets A to L as a result of the authentication targets A to Ladvancing in the movement direction may be stopped.

The processing flow of the authentication system 1 according to thesecond exemplary embodiment of the present invention has been describedabove.

The authentication system 1 according to the second exemplary embodimentof the present invention mentioned above includes the first sensingdevice 10, the second sensing devices 20, and the authenticationprocessing device 30. The second sensing device selection unit 302selects the second sensing devices 20 in a predetermined order.

In this manner, the authentication system 1 is capable of operating onlythe second sensing devices necessary for authentication, therebyreducing energy consumption. Furthermore, the authentication system 1can rapidly authenticate an authentication target existing in apredetermined area.

Third Exemplary Embodiment

The configuration of an authentication system 1 according to a thirdexemplary embodiment of the present invention will be described.

As shown in FIG. 10, the authentication system 1 according to the thirdexemplary embodiment of the present invention includes a first sensingdevice 10, second sensing devices 20 a 1, 20 a 2, 20 b 1 and 20 b 2, andan authentication processing device 30.

The second sensing devices 20 a 1 to 20 b 2 are collectively referred toas second sensing devices 20.

Furthermore, a predetermined area R is shown in FIG. 10.

As shown in FIG. 10, the first sensing device 10 is provided in aposition that enables an overhead view of authentication targets A to Lin the predetermined area R.

The first sensing device 10 measures the state of one or moreauthentication targets existing in the predetermined area R.

The second sensing device 20 a 1 is provided with respect to thepredetermined area R shown in FIG. 10 on the left rear side in themovement direction of the authentication targets A to L indicated byarrow W2. The second sensing device 20 a 2 is provided with respect tothe predetermined area R shown in FIG. 10 on the right rear side in themovement direction of the authentication targets A to L. The secondsensing device 20 b 1 is provided with respect to the predetermined areaR shown in FIG. 10 on the left front side in the movement direction ofthe authentication targets A to L. The second sensing device 20 b 2 isprovided with respect to the predetermined area R shown in FIG. 10 onthe right front side in the movement direction of the authenticationtargets A to L.

As shown in FIG. 11, the authentication processing device 30 accordingto the third exemplary embodiment of the present invention includes anauthentication management device 30 a, an authentication device 30 b,and a synthesis authentication

The second sensing device selection unit 302 according to the thirdexemplary embodiment of the present invention selects the second sensingdevices 20 in a predetermined order.

The synthesis authentication device 30 c includes an authenticationcompletion determination unit 304, a storage unit 308, and anauthentication unit 309.

The authentication unit 309 includes a synthesis unit 310.

The synthesis unit 310 synthesizes sensing information with respect to asingle authentication target obtained from the plurality of selectedsecond sensing devices 20.

The authentication unit 309 authenticates an authentication target basedon the sensing information synthesized by the synthesis unit 310.

Next, the processing of the authentication system 1 according to thethird exemplary embodiment of the present invention will be described.

Here, the processing flow of the authentication system 1 according tothe third exemplary embodiment of the present invention shown in FIG. 12will be described.

It is assumed that the authentication system 1 has the configurationshown in FIG. 10. It is assumed that the authentication processingdevice 30 has the configuration shown in FIG. 11. It is assumed that theauthentication targets A to L are people. It is assumed that the firstsensing device 10 and each of the second sensing devices 20 are imagingdevices.

The authentication system 1 performs the processing of steps S1 to S3.

The second sensing device selection unit 302 selects the second sensingdevices 20 in pairs in a predetermined order (step S14).

Specifically, the second sensing device selection unit 302 firstlyselects the second sensing device 20 a 1 and the second sensing device20 a 2, which are capable of detecting the authentication targets A to Lat the earliest time and are provided at the rearmost position withrespect to the movement direction of the authentication targets A to L.Next, when the processing of step S14 has been performed, the secondsensing device selection unit 302 further selects the second sensingdevice 20 b 1 and the second sensing device 20 b 2, which are capable ofdetecting the authentication targets A to L at the next earliest timeafter the second sensing device 20 a 1 and the second sensing device 20a 2, and are provided one position forward of the second sensing device20 a 1 and the second sensing device 20 a 2. In the same manner, eachtime the processing of step S14 is performed, the second sensing devices20 provided one position forward are further selected in pairs.

The authentication system 1 performs the processing of steps S5 to S7.The synthesis unit 310 synthesizes the sensing information with respectto a single authentication target obtained from the plurality ofselected second sensing devices 20 (step S15).

The authentication unit 309 authenticates an authentication target basedon the sensing information synthesized by the synthesis unit 310 (stepS16).

The authentication system 1 performs the processing of steps S9 to S12.

However, the synthesis authentication device 30 c performs theprocessing of steps S6 to S7, steps S15 to S16, and steps S9 to S10.

The authentication device 30 b according to the third exemplaryembodiment of the present invention may authenticate an authenticationtarget in the same manner as the authentication device 30 b according tothe second exemplary embodiment of the present invention, andauthenticate the authentication target by synthesizing sensinginformation when authentication is not complete.

The second sensing devices 20 that no longer detect the authenticationtargets A to L as a result of the authentication targets A to Ladvancing in the movement direction may be stopped.

The processing flow of the authentication system 1 according to thethird exemplary embodiment of the present invention has been describedabove.

The authentication system 1 according to the third exemplary embodimentof the present invention mentioned above includes the first sensingdevice 10, the second sensing devices 20, and the authenticationprocessing device 30. The authentication processing device 30 includesthe authentication management device 30 a, the authentication device 30b, and the synthesis authentication device 30 c. The second sensingdevice selection unit 302 according to the third exemplary embodiment ofthe present invention selects the second sensing devices 20 in apredetermined order. The synthesis authentication device 30 c includesthe authentication completion determination unit 304, the storage unit308, and the authentication unit 309. The authentication unit 309includes the synthesis unit 310. The synthesis unit 310 synthesizes thesensing information with respect to a single authentication targetobtained from the plurality of selected second sensing devices 20. Theauthentication unit 309 authenticates an authentication target based onthe sensing information synthesized by the synthesis unit 310.

In this manner, the authentication system 1 is capable of operating onlythe second sensing devices necessary for authentication, therebyreducing energy consumption. Furthermore, the authentication system 1can more rapidly authenticate an authentication target existing in apredetermined area by performing authentication by synthesizing sensinginformation obtained from both the left and right sides of each of theauthentication targets A to L.

Fourth Exemplary Embodiment

The configuration of an authentication system 1 according to a fourthexemplary embodiment of the present invention will be described.

The authentication system 1 according to the fourth exemplary embodimentof the present invention includes, in the same manner as theauthentication system 1 according to the first exemplary embodiment ofthe present invention, a first sensing device 10, second sensing devices20 a and 20 b, and an authentication processing device 30.

As shown in FIG. 13, the authentication device 30 b includes anauthentication unit 303, an authentication completion determination unit304, a storage unit 308, and a sensing device control unit 311.

The sensing device control unit 311 controls the functions of the secondsensing devices 20.

Specifically, if the second sensing devices 20 are imaging devices, thesensing device control unit 311 changes the direction, the angle ofview, and the like of the second sensing devices 20. Furthermore, when amirror is provided and the second sensing devices 20 image anauthentication target reflected by the mirror, the sensing devicecontrol unit 311 changes the direction of the mirror. In the fourthexemplary embodiment of the present invention, if the second sensingdevices 20 image an authentication target reflected in the mirror,changing the direction of the mirror is a part of the function of thesecond sensing devices 20.

Next, the processing of the authentication system 1 according to thefourth exemplary embodiment of the present invention will be described.

Here, the processing flow of the authentication system 1 according tothe fourth exemplary embodiment of the present invention shown in FIG.14 will be described.

It is assumed that the authentication system 1 has the configurationshown in FIG. 1. It is assumed that the authentication processing device30 has the configuration shown in FIG. 13. It is assumed that theauthentication targets A to L are people. It is assumed that the firstsensing device 10 and each of the second sensing devices 20 are imagingdevices.

The authentication system 1 performs the processing of steps S1 to S4.

The second sensing device selection unit 302 transmits selectioninformation indicating the selected second sensing devices 20 and stateinformation, to the authentication device 30 b (step S17).

The sensing device control unit 311 receives the selection informationand the state information from the second sensing device selection unit302 (step S18).

The sensing device control unit 311 controls the functions of the secondsensing devices based on the selection information and the stateinformation (step S19).

Specifically, the sensing device control unit 311 changes the angle andthe angle of view of the second sensing devices 20 indicated by theselection information, so as to give an angle and angle of view forimaging the face of the authentication target included in the stateindicated by the state information, as much as possible from the front.

The authentication system 1 performs the processing of steps S6 to S12.

The processing flow of the authentication system 1 according to thefourth exemplary embodiment of the present invention has been describedabove.

The authentication system 1 according to the fourth exemplary embodimentof the present invention mentioned above includes the first sensingdevice 10, the second sensing devices 20, and the authenticationprocessing device 30. The authentication processing device 30 includesthe authentication management device 30 a, and the authentication device30 b. The sensing device control unit 311 controls the functions of thesecond sensing devices 20 based on selection information and stateinformation.

In this manner, the authentication system 1 is capable of acquiringsensing information from the second sensing devices 20 that furtherimproves the accuracy of authentication. The authentication system 1 iscapable of rapidly authenticating an authentication target existing in apredetermined area.

Fifth Exemplary Embodiment

The configuration of an authentication system 1 according to a fifthexemplary embodiment of the present invention will be described.

As shown in FIG. 15, the authentication system 1 according to the fifthexemplary embodiment of the present invention includes a first sensingdevice 10, second sensing devices 20 a to 20 g, and an authenticationprocessing device 30.

The authentication processing device 30 includes an authenticationmanagement device 30 a, and an authentication device 30 b.

The authentication management device 30 a includes a stateidentification unit 301, a second sensing device selection unit 302, anauthentication target exclusion unit 305, an authentication targettracking unit 306, and a storage unit 307.

The authentication device 30 b includes an authentication unit 303, anauthentication completion determination unit 304, and a storage unit308. An authentication device 30 b is provided in each of the secondsensing devices 20. Furthermore, an authentication device 30 b isfurther provided in the first sensing device 10.

The second sensing device selection unit 302 selects the second sensingdevices 20 based on the state of each of the authentication targetsidentified by the state identification unit 301. Furthermore, the secondsensing device selection unit 302 may select the first sensing device 10instead of the second sensing devices when an authentication targetidentified by the state identification unit 301 is facing the firstsensing device 10.

The processing flow of the authentication system 1 according to thefifth exemplary embodiment of the present invention has been describedabove.

The authentication system 1 according to the fifth exemplary embodimentof the present invention mentioned above includes the first sensingdevice 10, the second sensing devices 20, and the authenticationprocessing device 30. The authentication processing device 30 includesthe authentication management device 30 a, and the authentication device30 b. The authentication device 30 b is further provided in the firstsensing device 10. The second sensing device selection unit 302 selectsthe first sensing device 10 instead of the second sensing devices 20when an authentication target identified by the state identificationunit 301 is facing the first sensing device 10.

In this manner, the authentication system 1 is capable of acquiringsensing information from the first sensing device 10. The authenticationsystem 1 is capable of more rapidly authenticating an authenticationtarget existing in a predetermined area.

In an exemplary embodiment of the present invention, the positions ofeach of the authentication targets A to L in the predetermined area Rare not limited to positions identified based on the first imagecaptured by the first sensing device 10. The first sensing device 10 is,for example, a sensor that detects the presence of an object asdescribed in Japanese Unexamined Patent Application, First PublicationNo. 2014-170431, and the position of each of the authentication targetsA to L in the predetermined area R may be identified based on thepresence of an object in the predetermined area R detected by the firstsensing device 10.

In an exemplary embodiment of the present invention, a sensor sheetusing a presence sensing technique or the like capable of detectingfootprints may be provided on the entire floor of the predetermined areaR as the first sensing device 10, wherein the positions where footprintsare detected are identified as the position of each of theauthentication targets A to L in the predetermined area R, and thedirection of the authentication target is identified assuming that thedirection of the footprint represents the direction of the face of theauthentication target.

In an exemplary embodiment of the present invention, the first sensingdevice 10 is not limited to a device that detects both the direction ofthe authentication targets A to L and their positions in thepredetermined area R. For example, the first sensing device 10 detectsonly the position of each of the authentication targets A to L in thepredetermined area R. The second sensing device selection unit 302identifies, based on this comparison, the sensing information acquirablearea that includes the position of the authentication target withrespect to each of the authentication targets. The second sensing deviceselection unit 302 identifies the second sensing device 20 thatcorresponds to the identified sensing information acquirable area. Theauthentication unit 303 receives selection information that includes allof the identified second sensing devices 20, from the second sensingdevice selection unit 302. The authentication unit 303 acquires sensinginformation from all of the second sensing devices 20 indicated by thereceived selection information in an arbitrary order. The authenticationunit 303 completes authentication of the authentication target thereofif the acquired sensing information matches the sensing informationindicated in the third data table TBL3. If the acquired sensinginformation does not match the sensing information indicated in thethird data table TBL3, the authentication unit 303 may performauthentication of the authentication target by acquiring sensinginformation from another second sensing device 20.

The configuration of the information processing system 1 according to anexemplary embodiment of the present invention will be described.

As shown in FIG. 16, the information processing system 1 includes afirst detection device 10, second detection devices 20, a selection unit302, and an aggregating unit 303.

The first detection device 10 acquires information about a first domain.

The second detection devices 20 acquire information about each of thesecond domains included in the first domain.

The selection unit 302 selects the second detection devices 20 based onthe state of the target obtained from the information acquired by thefirst detection device 10.

The aggregating unit 303 aggregates information from the seconddetection devices 20 selected by the selection unit 302.

In this manner, the information processing system 1 is capable ofrapidly acquiring sensing information about an authentication targetexisting in a predetermined area. As a result, the informationprocessing system 1 is capable of more rapidly authenticating anauthentication target existing in a predetermined area.

A case has been described in which the authentication processing device30 according to an exemplary embodiment of the present inventionincluded the authentication management device 30 a, the authenticationdevice 30 b, and the synthesis authentication device 30 c. However, theauthentication processing device 30 is not limited to a case in which itincludes the authentication management device 30 a, the authenticationdevice 30 b, and the synthesis authentication device 30 c. Thefunctional units provided in the authentication processing device 30according to an exemplary embodiment of the present invention may,within a range where appropriate processing can be performed, beprovided in one or more of the authentication management device 30 a,the authentication device 30 b, the synthesis authentication device 30c, and another device.

The processing flow in an exemplary embodiment of the present inventionis such that the order of processing may be changed within a range whereappropriate processing can be performed.

In an exemplary embodiment of the present invention, the authenticationunit 303 reads from the storage unit 308, information indicating thecorrespondence relationship between the appearance position of theauthentication target in the first image captured by the first sensingdevice 10 and the appearance position of the authentication target inthe second image captured by the second sensing devices 20. Theauthentication unit 303 identifies the position in which theauthentication target identified in the first image acquired from thefirst sensing device 10 appears in the second image acquired from thesecond sensing device 20, based on the correspondence relationship thathas been read. For example, the authentication unit 303 identifies theposition in which the authentication target F shown in FIG. 2, which wasidentified in the first image acquired from the first sensing device 10,appears on the left side in the second image acquired from the secondsensing device 20 g. The authentication unit 303 authenticates theauthentication target that appears at the position on the left side inthe second image. The authentication unit 303 may perform authenticationof the authentication target in this manner.

The storage units 307 and 308, and the other storage units in anexemplary embodiment of the present invention may each be providedanywhere within a range where appropriate transmission and reception ofinformation can be performed. Furthermore, a plurality of storage units307 and 308 and other storage units may exist and dispersively store thedata within a range where appropriate transmission and reception ofinformation can be performed.

Exemplary embodiments of the present invention have been described. Theauthentication management device 30 a, the authentication device 30 b,the synthesis authentication device 30 c, and the authenticationprocessing device 30 mentioned above may each have an internal computersystem. Further, the steps in the processing mentioned above are storedin a computer-readable recording medium in the form of a program, andthe processing described above is performed by the computer reading andexecuting the program. Here, the computer-readable recording mediumrefers to a magnetic disk, a magneto-optical disk, a CD-ROM, a DVD-ROM,a semiconductor memory, or the like. Furthermore, the computer programmay be transmitted to the computer by means of a communication line, andthe computer receiving the transmission may execute the program thereof.

Moreover, the program described above may realize a portion of thefunctions mentioned above. Further, the program described above may be afile that realizes the functions mentioned above by being combined witha program already recorded on the computer system, as a so-calleddifference file (difference program).

Although several exemplary embodiments of the present invention havebeen described, the exemplary embodiments are examples and do not limitthe scope of the invention. In the exemplary embodiments, additions,various omissions, substitutions, and changes may be made withoutdeparting from the gist of the invention.

The exemplary embodiments described above may also be described entirelyor in part by the following supplementary notes, without being limitedto the following.

Supplementary Note 1

An information processing system comprising:

a first detection device that acquires information about a first domain;

a plurality of second detection devices, each of which acquiresinformation about a domain included in the first domain;

a selection unit that selects at least one second detection device fromthe plurality of second detection devices based on a state of a targetobtained from the acquired information about the first domain; and

an aggregating unit that aggregates the information about the domainacquired by the selected at least one second detection device.

Supplementary Note 2

The information processing system according to supplementary note 1,wherein the state of the target comprises a position and a direction ofthe target.

Supplementary Note 3

The information processing system according to supplementary note 1 or2, further comprising:

an authentication unit that authenticates the target based on theinformation acquired by the aggregating unit.

Supplementary Note 4

The information processing system according to supplementary note 3,further comprising:

an authentication completion determination unit that determines whetherauthentication of the target is complete; and

an authentication target exclusion unit that excludes a target in whichauthentication is determined to be complete from targets of a nextauthentication,

wherein the selection unit selects at least one second detection devicefrom the plurality of second detection devices based on a state of atarget in which authentication is not complete.

Supplementary Note 5

The information processing system according to supplementary note 4,

wherein the first detection device and each of the plurality of seconddetection devices are respectively imaging devices, the informationprocessing system further comprising:

a storage unit that stores information indicating a correspondencerelationship between an appearance position of a target in a capturedimage acquired by the first sensing device and an appearance position ofa target in a captured image acquired by one of the plurality of seconddetection devices,

wherein the authentication unit identifies, based on the correspondencerelationship, a position in which a target identified in a capturedimage acquired by the first sensing device appears in a captured imageacquired by one of the plurality of second detection devices, andauthenticates the identified target.

Supplementary Note 6

The information processing system according to any one of supplementarynotes 1 to 5, further comprising:

an authentication target tracking unit that tracks the target,

wherein the plurality of second detection devices are installed suchthat they are separated in a movement direction of the target, and

the selection unit selects the second detection device based on thetracking result of the target.

Supplementary Note 7

The information processing system according to any one of supplementarynotes 1 to 6,

wherein the selection unit selects a plurality of second detectiondevices among the plurality of second detection devices with respect toone target based on a state of the target, and

the aggregating unit synthesizes information with respect to the onetarget aggregated from the selected plurality of second detectiondevices.

Supplementary Note 8

The information processing system according to any one of supplementarynotes 1 to 7, further comprising:

a control unit that controls a function of the selected at least onesecond detection device according to a state of the target.

Supplementary Note 9

The information processing system according to any one of supplementarynotes 1 to 8, wherein the selection unit selects the first detectiondevice.

Supplementary Note 10

The information processing system according to any one of supplementarynotes 1 to 9,

wherein the first detection device is a sensor that acquires informationrelated to a footprint of the target, and

the selection unit selects at least one second detection device from theplurality of second detection devices based on the state of the targetthat includes the footprint of the target.

Supplementary Note 11

An information processing method comprising:

acquiring information about a first domain;

selecting, based on a state of a target obtained from the acquiredinformation about the first domain, at least one detection device from aplurality of detection devices, each of which acquires information abouta domain included in the first domain; and

aggregating the information about the domain acquired by the selected atleast one detection device.

Supplementary Note 12

A program causes a computer to execute:

acquiring information about a first domain;

selecting, based on a state of a target obtained from the acquiredinformation about the first domain, at least one detection device from aplurality of detection devices, each of which acquires information abouta domain included in the first domain; and

aggregating the information about the domain acquired by the selected atleast one detection device.

INDUSTRIAL APPLICABILITY

The present invention may be applied to an information processingsystem, an information processing method, and a program.

REFERENCE SYMBOLS

1 Authentication system (information processing system)

10 First sensing device (first detection device)

20, 20 a to 20 g Second sensing device (second detection device)

30 Authentication processing device

30 a Authentication management device

30 b Authentication device

30 c Synthesis authentication device

301 State identification unit

302 Second sensing device selection unit (selection unit)

303, 309 Authentication unit (aggregating unit)

304 Authentication completion determination unit

305 Authentication target exclusion unit

306 Authentication target tracking unit

307, 308 Storage unit

310 Synthesis unit

311 Sensing device control unit

1. An information processing system comprising: at least one memory configured to store a program; and a computer configured to execute the program to perform: acquiring a state of a target with use of a first sensing device; selecting at least one second sensing device based on the acquired state of the target; and aggregating sensing information about the target acquired by the selected second detection device, wherein the selected second sensing device captures an image of the target reflected by a mirror.
 2. The information processing system according to claim 1, wherein the at least one processor is configured to perform: changing the direction of the mirror.
 3. The information processing system according to claim 1, wherein the state of the target comprises a position and a direction of the target.
 4. The information processing system according to claim 1, wherein the computer is further configured to authenticate the target based on the sensing information.
 5. An information processing method comprising: acquiring a state of a target with use of a first sensing device; selecting at least one second sensing device based on the acquired state of the target; and aggregating sensing information about the target acquired by the selected second detection device, the selected second sensing device capturing an image of the target reflected by a mirror.
 6. The information processing method according to claim 5, further comprising: changing the direction of the mirror .
 7. The information processing method according to claim 5, wherein the acquiring the state of the target includes acquiring a position and a direction of the target.
 8. The information processing method according to claim 5, further comprising: authenticating the target based on the sensing information.
 9. A non-transitory recording medium storing a program, the program causing a computer to perform: acquiring a state of a target with use of a first sensing device; selecting at least one second sensing device based on the acquired state of the target; and aggregating sensing information about the target acquired by the selected second detection device, the selected second sensing device capturing an image of the target reflected by a mirror.
 10. The non-transitory recording medium according to claim 9, wherein the program further causes the computer to perform: changing the direction of the mirror.
 11. The non-transitory recording medium according to claim 9, wherein the acquiring the state of the target includes acquiring a position and a direction of the target.
 12. The non-transitory recording medium according to claim 9, wherein the program further causes the computer to perform: authenticating the target based on the sensing information. 