Suspicious person report system and suspicious person report method

ABSTRACT

A system includes a biometric sensor that detects biometric data of a person in a first region and a presuming unit calculating, from the biometric data, a stress index and presuming that the person is a person to be tracked based on the calculated stress index. The system also includes a first camera acquiring first image data of the person in the first region and a second camera acquiring second image data of the person in a second region. The system further includes a monitoring unit that tracks the target person in the second region by checking the second image data with the first image data corresponding to the target person.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a Continuation Application of U.S. patentapplication Ser. No. 16/295,014, filed on Mar. 7, 2019, which is aContinuation of U.S. patent application Ser. No. 15/681,922, filed onAug. 21, 2017 and now U.S. Pat. No. 10,269,198 issued on Apr. 23, 2019,which claims priority to Japanese Patent Application No. 2016-167550filed on Aug. 30, 2016 and Japanese Patent Application No. 2016-166722filed on Aug. 29, 2016. The disclosures of the above-mentioned documentsare incorporated by reference herein in their entireties.

BACKGROUND 1. Technical Field

The present disclosure relates to a technique of reporting a suspiciousperson, for example, in an airport.

2. Description of the Related Art

In recent years, there have been proposed various techniques ofpresuming an emotion of a person using vital data of the person. Forexample, Japanese Unexamined Patent Application Publication (Translationof PCT Application) No. 2003-534864 (P2003-534864A) discloses atechnique for determining a psychological state of a person usingthermal image data of the face of the person. P2003-534864A alsoproposes to use the technique to detect terrorists and smugglers.

SUMMARY

It is demanded to accurately determine a suspicious person in an airportand the like.

One non-limiting and exemplary embodiment provides the techniquesdescribed below.

In one general aspect, the techniques disclosed here feature asuspicious person report system, including: a biometric sensor thatdetects biometric data of a person in a first region; a presuming unitthat calculates, from the biometric data, a stress index indicating adegree of stress and presumes that the person is a suspicious personwhen the calculated stress index is higher than a predeterminedreference value; a first camera that acquires first image data includingan image of the person in the first region; a second camera thatacquires second image data including an image of the person in a secondregion, the second region being a route that the person passes afterleaving the first region before entering a third region; a monitoringunit that checks the second image data with the first image datacorresponding to the person presumed as the suspicious person to therebytrack the person presumed as the suspicious person in the second regionand determine whether or not the person presumed as the suspiciousperson enters the third region; and a warning unit that emits a warningwhen the monitoring unit determines that the person presumed as thesuspicious person enters the third region.

It should be noted that general or specific embodiments may beimplemented as a system, a method, an integrated circuit, a computerprogram, a storage medium, or any selective combination thereof.

Additional benefits and advantages of the disclosed embodiments willbecome apparent from the specification and drawings. The benefits and/oradvantages may be individually obtained by the various embodiments andfeatures of the specification and drawings, which need not all beprovided in order to obtain one or more of such benefits and/oradvantages.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of an airport to which a suspicious personreport system according to an embodiment of the present disclosure isapplied;

FIG. 2 is a block diagram showing an overall configuration of asuspicious person report system according to a first embodiment;

FIG. 3 is a diagram showing an example of a suspicious person managementtable according to the first embodiment;

FIG. 4 is a sequence chart showing the operation of the suspiciousperson report system;

FIG. 5 is a sequence chart following FIG. 4;

FIG. 6 is a block diagram showing an overall configuration of asuspicious person report system according to a second embodiment;

FIG. 7 is a diagram showing an example of a suspicious person managementtable according to the second embodiment;

FIG. 8 is a sequence chart showing the operation of the suspiciousperson report system according to the second embodiment;

FIG. 9 is a sequence chart following FIG. 8;

FIG. 10 is a block diagram showing an overall configuration of asuspicious person report system according to a third embodiment;

FIG. 11 is a diagram showing a suspicious person management ableaccording to the third embodiment;

FIG. 12 is a flowchart for explaining processing for determining arelated suspicious person;

FIG. 13 is a diagram showing a suspicious person management ableaccording to a modification of the third embodiment;

FIG. 14 is a schematic diagram of an airport to which a suspiciousperson report system according to another embodiment of the presentdisclosure is applied;

FIG. 15 is a block diagram showing an overall configuration of asuspicious person report system according to a fourth embodiment;

FIG. 16 is a diagram showing an example of a suspicious personmanagement table according to the fourth embodiment;

FIG. 17 is a sequence chart showing the operation of the suspiciousperson report system;

FIG. 18 is a sequence chart following FIG. 17;

FIG. 19 is a block diagram showing an overall configuration of asuspicious person report system according to a fifth embodiment;

FIG. 20 is a diagram showing an example of a suspicious personmanagement table according to the fifth embodiment;

FIG. 21 is a sequence chart showing the operation of the suspiciousperson report system according to the fifth embodiment;

FIG. 22 is a sequence chart following FIG. 21;

FIG. 23 is a block diagram showing an overall configuration of asuspicious person report system according to a sixth embodiment;

FIG. 24 is a diagram showing an example of a suspicious personmanagement table according to the sixth embodiment;

FIG. 25 is a sequence chart showing the operation of the suspiciousperson report system according to the sixth embodiment; and

FIG. 26 is a sequence chart following FIG. 25.

DETAILED DESCRIPTION

(Underlying Knowledge Forming Basis of the Present Disclosure)

P2003-534864A discloses that use of a psychological state of each persondetermined based on a thermal image data of the person enables detectionof a suspicious person such as a smuggler of drug in a border securitypoint or a terrorist in a foreign facility.

In an airport, a port, or the like, in general, first, an entrantundergoes an immigration check in an immigration check area. Thereafter,in a customs area, the entrant is inspected as to whether the entrant iscarrying a suspicious object.

However, P2003-534864A does not take into account at all, for example,two or more regions located apart from one another in the airport suchas the immigration check area and the customs area where the entrant isobliged to pass in order. Therefore, this technique cannot find out asuspicious person by effectively using the two or more regions.

Even if the technique of P2003-534864A is applied in the immigrationcheck area to attempt to arrest a suspicious person, there is a riskthat immigration officers permit passage of a suspicious person in theimmigration check area since the immigration officers need to check alarge number of entrants. In this case, the technique of P2003-534864Acannot find out the suspicious person later because the technique doesnot involve recoding information on the suspicious person in a memory.

Further, it is also conceivable that an entrant performs suspiciousbehavior of handing a suspicious object to a different person on a routefrom the immigration check area to the customs area. Therefore, it isnecessary to monitor suspicious people on the route as well.

However, P2003-534864A does not take the above issues into account atall, and therefore has a problem that suspicious behavior by asuspicious person on the route cannot be checked.

Under these circumstances, the present disclosure presents a techniquecapable of determining a suspicious person by effectively using two ormore regions located apart from one another where an entrant is obligedto pass in order.

An overview of an aspect of the present disclosure is as describedbelow.

[Item 1]

A suspicious person report system, including:

a biometric sensor that detects biometric data of a person in a firstregion;

a presuming unit that calculates, from the biometric data, a stressindex indicating a degree of stress and presumes that the person is asuspicious person when the calculated stress index is higher than apredetermined reference value;

a first camera that acquires first image data including an image of theperson in the first region;

a second camera that acquires second image data including an image ofthe person in a second region, the second region being a route that theperson passes after leaving the first region before entering a thirdregion;

a monitoring unit that checks the second image data with the first imagedata corresponding to the person presumed as the suspicious person tothereby track the person presumed as the suspicious person in the secondregion and determine whether or not the person presumed as thesuspicious person enters the third region; and

a warning unit that emits a warning when the monitoring unit determinesthat the person presumed as the suspicious person enters the thirdregion.

With the configuration of the item 1, the biometric data and the firstimage data of the person entering the first region are acquired. If thestress index obtained from the biometric data is higher than thereference value, the person is presumed as a suspicious person.

It is possible to monitor an action of the suspicious person in thesecond region as well by checking the second image data captured by thesecond camera set in the second region, where the suspicious personpasses after leaving the first region, with the first image dataconcerning the person presumed as the suspicious person. When thesuspicious person enters the third region through the second region, thewarning is emitted.

Therefore, even if an officer permits passage of the suspicious personin the first region, the suspicious person can be found out since thewarning is emitted when the suspicious person enters the third region.Therefore, it is possible to find out the suspicious person byeffectively using two or more regions located apart from one anotherwhere a person is obliged to pass in order.

The action of the suspicious person can be monitored in the secondregion between the first region and the third region as well. Therefore,it is possible to check a suspicious action by the suspicious person inthe second region by analyzing the second image data.

[Item 2]

The suspicious person report system according to the item 1, furtherincluding a third camera that acquires third image data including animage of the person in the third region, wherein

the monitoring unit checks the third image data with the first imagedata and determines that the person presumed as the suspicious personenters the third region when the third image data includes an image ofthe person presumed as the suspicious person.

With the configuration of the item 2, the person entering the thirdregion is captured as the third image data by the third camera set inthe third region. When the third image data includes an image of aperson image indicated by the first image data concerning the personpresumed as the suspicious person, the warning is emitted. Therefore,even if the sight of the suspicious person is lost when the suspiciousperson enters the third region from the second region, it is possible tosurely find out the suspicious person in the third region.

[Item 3]

The suspicious person report system according to the item 1, furtherincluding:

a first acquirer that acquires a passport number of the person in thefirst region; and

a second acquirer that acquires a passport number of the person in thethird region, wherein

when the passport number acquired by the second acquirer matches thepassport number acquired by the first acquirer from the person presumedas the suspicious person, the monitoring unit determines that the personpresumed as the suspicious person enters the third region.

With the item 3, the passport number is acquired in addition to thefirst image data of the suspicious person in the first region.Therefore, it is possible to surely find out the suspicious person inthe third region by checking the passport number acquired in the thirdregion with the passport number of the person presumed as the suspiciousperson. It is possible to track an action of the suspicious person inthe second region using the first image data concerning the personpresumed as the suspicious person.

[Item 4]

The suspicious person report system according to the item 1, furtherincluding a third camera that acquires third image data including animage of the person in the third region, wherein

when detecting, in the second image data, a person approaching theperson presumed as the suspicious person within a first distance, themonitoring unit presumes that the approaching person is a relatedsuspicious person, checks the third image data with the second imagedata including an image of the person presumed as the related suspiciousperson and determines that the person presumed as the related suspiciousperson enters the third region when the third image data includes animage of the person presumed as the related suspicious person, and

when the monitoring unit determines that the person presumed as therelated suspicious person enters the third region, the warning unitemits a warning.

With the configuration of the item 4, when a person entering an areawithin a predetermined first distance from the suspicious person isdetected using the second image data, the person is presumed as arelated suspicious person. Therefore, even if a suspicious objectcarried by the suspicious person is handed to the related suspiciousperson in the second region, it is possible to find out the relatedsuspicious person and seize the suspicious object.

[Item 5]

The suspicious person report system according to the item 1, furtherincluding a third camera that acquires third image data including animage of the person in the third region, wherein

when detecting, in the second image data, that a different personapproaching the person presumed as the suspicious person within a firstdistance performs a specific action, the monitoring unit presumes thatthe dofferent person performing the specific action is a relatedsuspicious person, checks the third image data with the second imagedata including an image of the different person presumed as the relatedsuspicious person and determines that the different person presumed asthe related suspicious person enters the third region when the thirdimage data includes an image of the different person presumed as therelated suspicious person, and

when the monitoring unit determines that the person presumed as therelated suspicious person enters the third region, the warning unitemits a warning.

With the configuration of the item 5, when it is detected from thesecond image data that a person entering an area within a predeterminedfirst distance from the suspicious person performs the specific action,the person is presumed as a related suspicious person. Therefore, evenif a suspicious object carried by the suspicious person is handed to therelated suspicious person in the second region, it is possible to findout the related suspicious person and seize the suspicious object.

[Item 6]

The suspicious person report system according to the item 1, furtherincluding a third camera that acquires third image data including animage of the person in the third region, wherein

when detecting, in the second image data, that any of belongings of theperson presumed as the suspicious person is handed to a differentperson, the monitoring unit presumes that the different person is arelated suspicious person, checks the third image data with the secondimage data including an image of the different person presumed as therelated suspicious person and, when the third image data includes animage of the different person presumed as the related suspicious person,determines that the different person presumed as the related suspiciousperson enters the third region, and

when the monitoring unit determines that the person presumed as therelated suspicious person enters the third region, the warning unitemits a warning.

With the configuration of the item 6, when it is detected using thesecond image data that any of belongings of the suspicious person ishanded to a different person, the different person is presumed as arelated suspicious person. Therefore, even if a suspicious object, whichis any of belongings of the suspicious person, is handed to the relatedsuspicious person in the second region, it is possible to find out therelated suspicious person and seize the suspicious object.

[Item 7]

The suspicious person report system according to the item 1, wherein

the first image data includes a face image of the person; and

the warning unit displays the face image of the person presumed as thesuspicious person.

With the configuration of the item 7, since a report of the suspiciousperson is performed by displaying the face image of the suspiciousperson on a display device, it is easy to find out the suspiciousperson.

[Item 8]

The suspicious person report system according to the item 1, furtherincluding a memory that records the first image data corresponding tothe person presumed as the suspicious person, wherein

the monitoring unit checks the second image data with the first imagedata recorded in the memory to thereby track the person presumed as thesuspicious person in the second region.

[Item 9]

The suspicious person report system according to the item 2, furtherincluding a memory that records the first image data corresponding tothe person presumed as the suspicious person, wherein

the monitoring unit checks the third image data with the first imagedata recorded in the memory and determines that the person presumed asthe suspicious person enters the third region when the third image dataincludes an image of the person presumed as the suspicious person.

[Item 10]

The suspicious person report system according to the item 3, furtherincluding a memory that records the passport number corresponding to theperson presumed as the suspicious person, the passport number beingacquired by the first acquirer, wherein

when the passport number acquired by the second acquirer matches thepassport number recorded in the memory, the monitoring unit determinesthat the person presumed as the suspicious person enters the thirdregion.

[Item 11]

The suspicious person report system according to any one of the items 1to 10, wherein

the first region is an immigration check area, and

the third region is a customs area.

With the configuration of the item 11, it is possible to emit thewarning when the person presumed as the suspicious person in theimmigration check area enters the customs area.

[Item 12]

The suspicious person report system according to the item 11, whereinthe warning unit emits the warning to an officer in the customs area.

With the configuration of the item 12, since the warning is emitted tothe officer in the customs, it is possible to surely prevent entrance ofthe suspicious person into a country.

[Item 13]

A suspicious person report system, comprising:

a biometric sensor that detects biometric data of a person in a firstregion;

a presuming unit that calculates, from the biometric data, a stressindex indicating a degree of stress and presumes that the person is asuspicious person when the calculated stress index is higher than apredetermined reference value;

a first acquirer that acquires first identification information of theperson in the first region;

a second acquirer that acquires second identification information of theperson entering a second region where the person proceeds after leavingthe first region;

a monitoring unit that determines whether or not the secondidentification information matches the first identification informationcorresponding to the person presumed as the suspicious person; and

a warning unit that emits a warning when the monitoring unit determinesthat the second identification information matches the firstidentification information corresponding to the person presumed as thesuspicious person.

With the configuration of the item 13, the biometric data of the personentering the first region is acquired. If the stress index obtained fromthe biometric data is higher than the reference value, the person ispresumed as a suspicious person. The first identification information ofthe person is acquired.

In the second region where the person proceeds after leaving the firstregion, the second identification information of the person entering thesecond region is acquired.

When the first identification information of the person presumed as thesuspicious person, and the second identification information match eachother, the warning is emitted.

Therefore, even if an officer permits passage of the suspicious personin the first region, since the warning is emitted when the suspiciousperson enters the second region, it is possible to find out thesuspicious person.

In this way, according to this aspect, it is possible to find out asuspicious person by effectively using two or more regions located apartfrom one another where an entrant is obliged to pass in order.

[Item 14]

The suspicious person report system according to the item 13, wherein

the first identification information includes first image data includingan image of the person,

the second identification information includes second image dataincluding an image of the person, and

the monitoring unit checks the second image data with the first imagedata corresponding to the person presumed as the suspicious person anddetermines that the second identification information matches the firstidentification information when the second image data includes an imageof the person presumed as the suspicious person.

With the configuration of the item 14, the first image data of thesuspicious person is acquired in the first region and, if the secondimage data acquired in the second region includes the image of thesuspicious person, it is determined that the first identificationinformation and the second identification information match each other,and the warning is emitted. Therefore, it is possible to find out thesuspicious person using image data as identification information.

[Item 15]

The suspicious person report system according to the item 13, wherein

the first identification information includes a first passport number,

the second identification information includes a second passport number,and

the monitoring unit determines whether or not the second passport numbermatches the first passport number corresponding to the person presumedas the suspicious person.

With the configuration of the item 15, a first passport number of thesuspicious person is acquired in the first region and the warning isemitted if the first passport number and a second passport numberacquired in the second region match each other. Therefore, it ispossible to find out the suspicious person by effectively using apassport number uniquely allocated to the person.

[Item 16]

The suspicious person report system according to the item 14, wherein

the first image data and the second image data each include an faceimage of the person, and

the warning unit displays the face image corresponding to the personpresumed as the suspicious person.

With the configuration of the item 16, since the suspicious person isreported by displaying the face image of the suspicious person on adisplay device, it is easy to find out the suspicious person.

[Item 17]

The suspicious person report system according to the item 15, wherein

the first identification information further includes first image dataincluding an image of the person, and

the warning unit displays the image of the person presumed as thesuspicious person.

With the configuration of the item 17, since a report of the suspiciousperson is performed by displaying the face image of the suspiciousperson on a display device, it is easy to find out the suspiciousperson.

[Item 18]

The suspicious person report system according to the item 13, furtherincluding a memory that records the first identification informationcorresponding to the person presumed as the suspicious person, wherein

the monitoring unit determines whether or not the second identificationinformation matches the first identification information recorded in thememory.

[Item 19]

The suspicious person report system according to any one of the items 13to 18, wherein

the first region is an immigration check area, and

the second region is a customs area.

With the configuration of the item 19, it is possible to emit thewarning when the person presumed as the suspicious person in theimmigration check area enters the customs area.

[Item 20]

The suspicious person report system according to the item 19, whereinthe warning unit emits the warning to an officer in the customs area.

With the configuration of the item 20, since the warning is emitted tothe officer in the customs, it is possible to prevent entrance of thesuspicious person into a country.

Embodiment

FIG. 1 is a schematic diagram of an airport to which a suspicious personreport system 1 according to an embodiment of the present disclosure isapplied. The airport is an international airport and includes an arrivalgate G, an immigration check area A1, a customs area A3, and a passageA2 that connects the immigration check area A1 and the customs area A3.The immigration check area A1 is an example of a first region. Thecustoms area A3 is an example of a third region. The passage A2 is anexample of a second region. The arrival gate G is a place where anentrant 200 disembarking from an airplane F arriving from a foreigncountry passes first. The entrant 200 (an example of a person) passedthrough the arrival gate G advances to the immigration check area A1first.

In the immigration check area A1, an immigration check of the entrant200 is performed. In the immigration check area A1, there is one or moreimmigration check gates G1 where one or more immigration officers 100are posted. The immigration officer 100 checks a passport of the entrant200 and questions about a purpose of entry and the like to check whetherthe entrant 200 is a suspicious person. When determining that theentrant 200 is not a suspicious person, the immigration officer 100permits the entrant 200 to pass the immigration check gate G1. On theother hand, when determining that the entrant 200 is a suspiciousperson, the immigration officer 100 does not permit the entrant 200 topass the immigration check gate G1.

The entrant 200 permitted to pass the immigration check gate G1 moves tothe customs area A3 through the passage A2. In the customs area A3, itis inspected whether the entrant 200 intends to smuggle articlesprohibited to be brought into the country.

In the customs area A3, there are one or more customs gates G2 where oneor more customs officers 400 are posted. The customs officer 400 asksthe entrant 200 various questions to determine whether the entrant 200is a suspicious person. When determining that the entrant 200 is asuspicious person, the customs officer 400 checks belongings of theentrant 200. When determining that the entrant 200 is not a suspiciousperson, the customs officer 400 permits the entrant 200 to pass thecustoms gate G2. When determining that the entrant 200 is a suspiciousperson, the customs officer 400 does not permit the entrant 200 to passthe customs gate G2.

In the immigration check area A1, one or more biometric sensors 2, oneor more first cameras 3, and one or more first scanners 61 are disposedrespectively at the one or more immigration check gates G1. One or moresecond cameras 4 are disposed in the passage A2. In the customs area A3,one or more third cameras 5, one or more second scanners 62, and one ormore warning units 9 are disposed respectively at the one or morecustoms gates G2.

A monitoring unit 7 is communicatively connected to a presuming unit 6.The presuming unit 6 and the monitoring unit 7 are each configured by acomputer. The presuming unit 6 is communicatively connected to thebiometric sensor 2. The monitoring unit 7 is communicatively connectedto the first camera 3, the first scanner 61, the second camera 4, thethird camera 5, and the second scanner 62. In the example shown in FIG.1, the presuming unit 6 and the monitoring unit 7 are configured byseparate computers and communicatively connected to each other via acommunication line such as a LAN. However, this is an example. Thepresuming unit 6 and the monitoring unit 7 may be configured by onecomputer. The presuming unit 6 and the monitoring unit 7 may be set inan airport or may be set outside the airport. The presuming unit 6 andthe monitoring unit 7 may be a cloud server present on a cloud.

First Embodiment

FIG. 2 is a block diagram showing an overall configuration of thesuspicious person report system 1 according to a first embodiment. Thesuspicious person report system 1 includes the biometric sensor 2, thefirst camera 3, the second camera 4, the third camera 5, the presumingunit 6, the monitoring unit 7, a memory 8, and the warning unit 9. Notethat, in the first embodiment, since the first scanner 61 and the secondscanner 62 are not used, the first scanner 61 and the second scanner 62are not shown in FIG. 2.

The biometric sensor 2 includes a measurer that measures biometric data,a processor that performs predetermined signal processing on measurementdata measured by the measurer, and a communicator that transmits thebiometric data to the presuming unit 6. The predetermined signalprocessing is, for example, noise removal processing. The biometricsensor 2 detects biometric data of a person who enters the immigrationcheck area A1. As the biometric data, for example, vital data such as abrain wave, a brain blood flow, a pulse wave, a blood pressure, arespiration rate, a body temperature, and perspiration can be adopted.

When the brain wave and the brain blood flow are adopted as thebiometric data, a brain wave meter and a brain blood flow meter can beadopted as the biometric sensor 2. When the pulse wave and the bloodpressure are adopted as the biometric data, a brain wave meter and ablood pressure meter can be adopted as the biometric sensor 2. When therespiration rate is adopted as the biometric data, a respiration metercan be adopted as the biometric sensor 2. When the body temperature isadopted as the biometric data, a thermometer can be adopted as thebiometric sensor 2. When the perspiration is adopted as the biometricdata, a perspiration state meter can be adopted as the biometric sensor2. When a thermal image is adopted as the biometric data, an infraredcamera can be adopted as the biometric sensor 2. The biometric sensor 2may be a biometric sensor that detects biometric data in non-contactwith a person or may be a biometric sensor that detects biometric datain contact with the person.

The biometric sensor 2 is communicatively connected to the presumingunit 6 by radio or wire. Under an instruction of the immigration officer100, when measurement of biometric data is started, the biometric sensor2 only has to measure biometric data at a fixed sampling interval andtransmit a measurement value to the presuming unit 6 in association witha user ID. The user ID is a symbol string uniquely given to identify anindividual entrant 200.

As the radio, a wireless LAN such as Bluetooth (registered trademark) orIEEE802.11 can be adopted. As the wire, Ethernet (registered trademark)can be adopted.

The presuming unit 6 calculates, from the biometric data detected by thebiometric sensor 2, a stress index indicating a degree of stress of theentrant 200 and, when the stress index is higher than a predeterminedreference value, presumes the entrant 200 as a suspicious person, andtransmits a detection signal indicating that the suspicious person isdetected to the monitoring unit 7. The detection signal includes a userID given to the biometric data of the suspicious person.

For example, Japanese Patent No. 5257525 (JP5257525B) discloses atechnique for performing a frequency analysis of fluctuation in aheartbeat interval from brain wave data to detect stress of a person.Specifically, it is disclosed that the frequency analysis of theheartbeat interval is performed to detect a level HF of a high-frequencypeak that occurs at a frequency of about 0.3 Hz and a level LF of alow-frequency peak that occurs at a frequency of about 0.1 Hz anddetermine that stress of a person is higher as LF/HF is larger.

Therefore, the presuming unit 6 only has to adopt the LF/HF disclosed inthe patent as a stress index of the entrant 200 and, when the stressindex is larger than a predetermined threshold, determine the entrant200 as a suspicious person.

Japanese Patent No. 5735592 (JP5735592B) discloses that acomfortableness degree of a user is evaluated in ten stages of −5 to +5from biometric data such as a heart rate, a pulse, and a bodytemperature.

Therefore, the presuming unit 6 only has to adopt the comfortablenessdegree disclosed in the patent as a stress index and, when the stressindex is larger than a threshold, determine the entrant 200 as asuspicious person. In this case, the presuming unit 6 only has tocalculate the stress index from a brain wave, a brain blood flow, apulse, a blood pressure, a respiration rate, a body temperature, andperspiration.

Japanese Unexamined Patent Application Publication No. 2012-249797(JP2012-249797A) discloses that a value obtained by linearly combining aheart rate, a body temperature, a blood pressure, and perspiration iscalculated as a stress value.

Therefore, the presuming unit 6 only has to adopt the stress valuedisclosed in the publication as a stress index and, when the stressindex is larger than a threshold, determine that the entrant 200 is asuspicious person.

The presuming unit 6 may calculate a stress index of the entrant 200from thermal image data as disclosed in P2003-534864A.

The first camera 3 is provided in the immigration check area A1,captures an image of each entrant 200 entering a predetermined checkposition before the immigration check gate G1, and acquires first imagedata including an image of the entrant 200. An optical axis and an angleof view of the first camera 3 are set such that the first camera 3 cancapture an image of the face or the whole body of the entrant 200entering the check position. Every time a new entrant 200 enters thecheck position of the immigration check gate G1, the first camera 3captures an image of the entrant 200 and outputs obtained first imagedata to the monitoring unit 7.

The second camera 4 is provided in the passage A2, captures an image ofa person passing the passage A2 at a predetermined frame rate, andtransmits a captured image to the monitoring unit 7. When the totallength of the passage A2 is long and one second camera 4 cannot capturean image of the entire region of the passage A2, two or more secondcameras 4 may be set such that the entire region of the passage A2 canbe captured.

The third camera 5 is provided in the customs area A3, captures an imageof each entrant 200 entering a predetermined check position before thecustoms gate G2, and acquires third image data including an image of theentrant 200. An optical axis and an angle of view of the third camera 5are set such that the third camera 5 can capture an image of the face orthe whole body of the entrant 200 entering the check position. Everytime a new entrant 200 enters the check position of the customs gate G2,the third camera 5 captures an image of the entrant 200 and outputsobtained third image data to the monitoring unit 7.

The monitoring unit 7 records the first image data of the suspiciousperson presumed by the presuming unit 6 in the memory 8 and checks thesecond image acquired by the second camera 4 with the first image datarecorded in the memory 8 to thereby track the suspicious person in thepassage A2.

Specifically, when receiving the detection signal transmitted from thepresuming unit 6, the monitoring unit 7 records the first image datacaptured by the first camera 3 in a suspicious person management tableT1 included in the memory 8 in association with a user ID included inthe detection signal.

FIG. 3 is a diagram showing an example of the suspicious personmanagement table T1 according to the first embodiment. The suspiciousperson management table T1 is a two-dimensional table in which user IDsand image data are recorded in association with each other. A user IDissued by the monitoring unit 7 is recorded in a field of “user ID”.First image data concerning the user ID is recorded in a field of “imagedata”.

The monitoring unit 7 checks the second image data captured by thesecond camera 4 with the first image data recorded in the suspiciousperson management table T1 to track a suspicious person passing thepassage A2. The monitoring unit 7 calculates similarity of a featurevalue of the suspicious person extracted from the first image data andfeature values of one or more objects included in the second image dataand, if an object having similarity equal to or larger than a specifiedvalue is included in the second image data, determines that thesuspicious person is included in the second image data. The monitoringunit 7 tracks the suspicious person by marking, in the second imagedata, the object indicating the suspicious person to track thesuspicious person until the suspicious person frames out from an exit ofthe passage A2.

As the feature value of the suspicious person, a feature value of theface of the suspicious person may be adopted or a feature value ofclothes worn by the suspicious person may be adopted. The monitoringunit 7 records the first image data of the suspicious person in thesuspicious person management table T1. However, this is an example. Themonitoring unit 7 may record a feature value of the suspicious personextracted from the first image data. The same applies to embodimentsexplained below.

Referring back to FIG. 2, every time the third image data is transmittedfrom the third camera 5, the monitoring unit 7 checks the third imagedata with the first image data recorded in the suspicious personmanagement table T1 and determines whether the suspicious person isincluded in the third image data. When the suspicious person is includedin the third image data, the monitoring unit 7 determines that thesuspicious person enters the customs area A3. Specifically, themonitoring unit 7 calculates similarity of a feature value of thesuspicious person extracted from the first image data and a featurevalue of a person extracted from the third image data and, if thecalculated similarity is equal to or larger than a specified value,determines that the suspicious person enters the customs area A3. As thespecified value, a predetermined value for regarding two of them as thesame person can be adopted.

When determining that the suspicious person enters the customs area A3,the monitoring unit 7 causes the warning unit 9 to emit a warning.

The warning unit 9 is configured by a display device set in the customsarea A3. As the display device, a liquid crystal display, an organic ELdisplay, and the like can be adopted. A display surface of the displaydevice faces the customs officer 400. The display device is disposedsuch that only the customs officer 400 can visually recognize an image.

The warning unit 9 only has to emit a warning by, for example,displaying a face image of the suspicious person or a whole body imageof the suspicious person. In this case, the warning unit 9 only has toreceive image data of the suspicious person from the monitoring unit 7and display the image of the suspicious person. As a warning method bythe warning unit 9, an aspect in which the face image and the whole bodyimage are displayed on the display device is explained above. However,this is an example. For example, the warning unit 9 may be configured byan LED lamp and turn on the LED lamp to emit a warning. Alternatively,the warning unit 9 may be configured by a speaker and emit a warning byoutputting, from the speaker, a voice message for informing that thesuspicious person enters the customs area A3.

The memory 8 is configured by a nonvolatile rewritable storage devicemounted on a computer communicatively connected to the monitoring unit 7and stores the suspicious person management table T1 and the like. Thememory 8 may be connected to the monitoring unit 7 via a communicationline such as a LAN or may be provided on the cloud. The memory 8 may becommunicatively connected to the presuming unit 6. The memory 8 may beconfigured by the storage device of the monitoring unit 7.

<Sequence>

The operation of the suspicious person report system 1 is explained.FIG. 4 is a sequence chart showing the operation of the suspiciousperson report system 1. FIG. 5 is a sequence chart following FIG. 4.

(S01) The biometric sensor 2 measures biometric data of the entrant 200entering the check position in the immigration check area A1. Thebiometric sensor 2 gives a user ID to each entrant 200 and transmits theuser ID to the presuming unit 6 in association with biometric data. Notethat, when the biometric sensor 2 is configured by a contact-typebiometric sensor, the biometric sensor 2 is attached to the entrant 200by the immigration officer 100 or another officer. The biometric sensor2 only has to start measurement of biometric data, for example, with aninput of a measurement start instruction from the immigration officer100 as a trigger, measure biometric data at a fixed sampling intervaluntil a measurement end instruction is input from the immigrationofficer 100, and transmit the measured biometric data to the presumingunit 6 in association with a user ID.

(S02) In parallel to the processing in S01, the first camera 3 capturesan image of the entrant 200 being checked, acquires first image data,and transmits the first image data to the monitoring unit 7. The firstcamera 3 only has to capture an image of an entrant, for example, withan input of an image capture instruction from the immigration officer100 as a trigger and transmit the acquired first image data to themonitoring unit 7.

(S03) The presuming unit 6 calculates a stress index from the biometricdata received from the biometric sensor 2 and determines whether theentrant 200 is a suspicious person. When determining that the entrant200 is a suspicious person, the presuming unit 6 generates a detectionsignal including a user ID associated with biometric data of thesuspicious person and transmits the detection signal to the monitoringunit 7. On the other hand, when determining that the entrant 200 is nota suspicious person, the presuming unit 6 ends the processing.

(S04) When receiving the detection signal, the monitoring unit 7 recordsthe first image data transmitted from the first camera 3 in thesuspicious person management table T1 in association with the user ID ofthe suspicious person included in the detection signal. Consequently,the first image data of the suspicious person is recorded. Themonitoring unit 7 only has to record first image data transmitted withina fixed period around a time of reception of the detection signal in thesuspicious person management table T1 as the first image data of thesuspicious person. As the fixed period, a period estimated to beconsumed for measurement of biometric data and capturing of first imagedata concerning the same person is adopted.

(S05) The second camera 4 transmits the second image data to themonitoring unit 7. Note that the second camera 4 always captures animage of the passage A2 at a predetermined frame rate and transmits thesecond image data to the monitoring unit 7 at the predetermined framerate.

(S06) The monitoring unit 7 checks the second image data captured by thesecond camera 4 with the first image data of the suspicious personrecorded in the suspicious person management table T1 and determineswhether the suspicious person is included in the second image data. Whenthe suspicious person is included in the second image data, themonitoring unit 7 marks the suspicious person in the second image dataand tracks the suspicious person until the suspicious person frames outfrom the exist of the passage A2. When the suspicious person is notincluded in the second image data, the monitoring unit 7 ends theprocessing.

(S07) The third camera 5 captures an image of the entrant 200 enteringthe check position in the customs area A3, acquires third image data ofthe entrant 200, and transmits the third image data to the monitoringunit 7. The third camera 5 only has to capture an image of the entrant200, for example, with an input of an image capture instruction from thecustoms officer 400 as a trigger and transmit the third image data tothe monitoring unit 7.

(S08) The monitoring unit 7 checks the third image data captured by thethird camera 5 with the first image data of the suspicious personrecorded in the suspicious person management table T1 and determineswhether the suspicious person is included in the third image data.

(S09) When the monitoring unit 7 determines that the suspicious personis included in the third image data, the warning unit 9 displays a faceimage or a whole body image of the suspicious person on the displaydevice. Consequently, the customs officer 400 can recognize that theentrant 200 in front of the customs officer 400 is the suspicious personand can take necessary measures. Examples of the necessary measuresinclude a measure for opening a bag carried by the suspicious person andinspecting belongings of the suspicious person in detail and a measurefor moving the suspicious person to another interrogation room andinterrogating the suspicious person.

As explained above, with the suspicious person report system 1, thebiometric data and the first image data of the entrant 200 entering theimmigration check area A1 are acquired and, if the stress index obtainedfrom the biometric data is higher than the reference value, the entrant200 is presumed as a suspicious person, and the first image data isrecorded in the memory 8.

An action of the suspicious person is monitored in the passage A2 bychecking the second image data captured by the second camera 4 with thefirst image data recorded in the memory 8.

When the suspicious person indicated by the first image data recorded inthe memory 8 is included in the third image data obtained by capturingan image of the entrant 200 entering the customs area A3 with the thirdcamera 5, the warning is emitted.

Therefore, even if the immigration officer 100 permits passage of thesuspicious person in the immigration check area A1, since the warning isemitted when the suspicious person enters the customs area A3, it ispossible to find out the suspicious person. In this way, the suspiciousperson report system 1 can find out the suspicious person by effectivelyusing the immigration check area A1 and the customs area A3 providedapart from each other where an entrant is obliged to pass in order inthe airport.

Since an action of the suspicious person is monitored in the passage A2as well, even if the suspicious person performs an action for handing asuspicious object carried by the suspicious person to a different personin the passage A2, it is possible to find out the fact by analyzing thesecond image data.

Note that, since the passage A2 and the customs area A3 are continuous,the second camera 4 is sometimes capable of tracking an entrant to findwhich customs gate G2 the entrant enters. In an airport where there isonly one customs gate G2, the entrant 200 framing out from the exit ofthe passage A2 can be regarded as entering the customs gate G2 next.

Therefore, if the customs gate G2 that the suspicious person enters canbe found out using the second image data, the monitoring unit 7 maycause the warning unit 9 of the customs gate G2 to emit a warning.Alternatively, in the airport where there is only one customs gate G2,when the monitoring unit 7 can confirm that the suspicious person framesout from the exit of the passage A2 in the second image data, themonitoring unit 7 may cause the warning unit 9 to emit a warning. Inthis case, the monitoring unit 7 can emit the warning without using thethird camera 5. Therefore, the third camera 5 is unnecessary.

Second Embodiment

FIG. 6 is a block diagram showing an overall configuration of asuspicious person report system 1A according to a second embodiment. Thesuspicious person report system 1A is characterized by reporting asuspicious person using a passport number of a passport carried by theentrant 200. FIG. 6 is different from FIG. 2 in that a first scanner 61is added in the immigration check area A1 and a second scanner 62 isprovided instead of the third camera 5 in the customs area A3. Notethat, in the second embodiment, components same as the components in thefirst embodiment are denoted by the same reference numerals and signsand explanation of the components is omitted.

The first scanner 61 is provided in the immigration check area A1,reads, according to an instruction of the immigration officer 100, apassport number described in a passport presented by the entrant 200 inthe immigration check gate G1, and transmits the passport number to themonitoring unit 7. Note that, in the case of a passport in which apassport number is stored in an electronic chip, the first scanner 61only has to acquire the passport number by communicating with theelectronic chip. The same applies to the second scanner 62.

The second scanner 62 is provided in the customs area A3, reads,according to an instruction of the customs officer 400, a passportnumber described in a passport presented by the entrant 200 in thecustoms gate G2, and transmits the passport number to the monitoringunit 7.

When receiving a detection signal from the presuming unit 6, themonitoring unit 7 records the first image data transmitted from thefirst camera 3 and the passport number transmitted from the firstscanner 61 in the same period in a suspicious person management table T2(FIG. 7) included in the memory 8 in association with each other.

When the passport number of the suspicious person recorded in thesuspicious person management table T2 and the passport number read bythe second scanner 62 match each other, the monitoring unit 7 causes thewarning unit 9 to emit a warning.

FIG. 7 is a diagram showing an example of the suspicious personmanagement table T2 according to the second embodiment. The suspiciousperson management table T2 is different from the suspicious personmanagement table T1 in that a passport number is provided instead of theuser ID. Since the passport number is uniquely given to the individualentrant 200, the passport number is capable of uniquely identifying asuspicious person. Therefore, in the second embodiment, the passportnumber is adopted instead of the user ID. Note that, in the secondembodiment, image data of a suspicious person is recorded in thesuspicious person management table T2 in order to track the suspiciousperson in the second image data.

In the second embodiment, since a user ID is not used, the biometricsensor 2 does not need to issue a user ID. Therefore, it is possible toreduce a processing load on the biometric sensor 2.

<Sequence>

FIG. 8 is a sequence chart showing the operation of the suspiciousperson report system 1A according to the second embodiment. FIG. 9 is asequence chart following FIG. 8.

Note that, in FIGS. 8 and 9, kinds of processing same as the kinds ofprocessing shown in FIGS. 4 and 5 are denoted by the same referencesigns and explanation of the kinds of processing is omitted.

(S81) S81 is processing performed in parallel to S01 and S02. The firstscanner 61 reads a passport number of the entrant 200 and transmits thepassport number to the monitoring unit 7.

(S82) S82 is processing following S03. When receiving a detectionsignal, the monitoring unit 7 records the first image data transmittedfrom the first camera 3 in the suspicious person management table T2 inassociation with the passport number transmitted from the first scanner61. Consequently, the first image and the passport number of thesuspicious person are recorded together. The monitoring unit 7 only hasto record first image data and a passport number transmitted within afixed period around a time of reception of the detection signal in thesuspicious person management table T2 as the first image data and thepassport number of the suspicious person. As the fixed period, a periodestimated to be consumed for measurement of biometric data, capturing offirst image data, and acquisition of a passport number of the sameperson is adopted.

(S83) S83 is processing following S07. The second scanner 62 reads,according to an instruction of the customs officer 400, a passportnumber presented by the entrant 200 entering the check position in thecustoms area A3 and transmits the passport number to the monitoring unit7.

(S84) S84 is processing following S83. The monitoring unit 7 checkswhether the passport number of the suspicious person recorded in thesuspicious person management table T2 and the passport number read bythe second scanner 62 match each other.

When the monitoring unit 7 determines that the two passport numbersmatch each other, the warning unit 9 emits a warning (S09). When the twopassport numbers do not match each other, the processing ends.

As explained above, with the suspicious person report system 1A, thepassport number is also acquired in addition to the first image data ofthe suspicious person in the immigration check area A1 and recorded inthe suspicious person management table T2. Therefore, the suspiciousperson report system 1A can find out the suspicious person in thecustoms area A3 by checking the passport number acquired in the customsarea A3 with the passport number recorded in the suspicious personmanagement table T2. Since the first image data of the suspicious personis recorded in the suspicious person management table T2, the suspiciousperson report system 1A can track an action of the suspicious person inthe passage A2 using the first image data.

Third Embodiment

FIG. 10 is a block diagram showing an overall configuration of asuspicious person report system 1B according to a third embodiment. Thesuspicious person report system 1B is characterized by finding out, inthe passage A2, a related suspicious person conspiring with a suspiciousperson. FIG. 10 is different from FIG. 6 in that the third camera 5 isprovided in the customs area A3. Note that, in the third embodiment,components same as the components in the first and second embodimentsare denoted by the same reference numerals and signs and explanation ofthe components is omitted.

When detecting, from second image data, that an entrant 200 differentfrom a suspicious person being tracked in the second image data entersan area within a predetermined first distance from the suspiciousperson, the monitoring unit 7 presumes that the different entrant is arelated suspicious person. The monitoring unit 7 extracts fourth imagedata indicating the presumed related suspicious person from the secondimage data and records the fourth image data in a suspicious personmanagement table T3 included in the memory 8.

FIG. 11 is a diagram showing the suspicious person management table T3according to the third embodiment. In the suspicious person managementtable T3, a field of “related suspicious person” is further provided inaddition to the fields of the suspicious person management table T1shown in FIG. 3. In the field of “related suspicious person”, the fourthimage data indicating the related suspicious person is recorded. As thefourth image data, a face image of the related suspicious person may beadopted or a whole body image of the related suspicious person may beadopted. As the fourth image data, a feature value of the face image ofthe related suspicious person or a feature value of the whole body imageof the related suspicious person may be adopted.

Referring back to FIG. 10, the monitoring unit 7 checks the third imagedata captured by the third camera 5 with the fourth image data recordedin the suspicious person management table T3 and determines whether therelated suspicious person is included in the third image data. Whendetermining that the related suspicious person is included in the thirdimage data, the monitoring unit 7 causes the warning unit 9 to emit awarning. Note that the monitoring unit 7 performs, in parallel, thedetermination concerning whether the suspicious person is included inthe third image data captured by the third camera 5 explained in thefirst embodiment.

FIG. 12 is a flowchart for explaining processing for determining arelated suspicious person. In the third embodiment, the sequence chartin the first embodiment shown in FIGS. 4 and 5 is adopted as a sequencechart. The flowchart of FIG. 12 is executed in S06 shown in FIG. 5.

First, the monitoring unit 7 checks the second image data with the firstimage data recorded in the suspicious person management table T3 anddetermines whether the suspicious person is included in the second imagedata. If the suspicious person is included in the second image data (YESin S101), the monitoring unit 7 starts tracking of the suspicious personand determines, from the second image data, presence or absence of aperson who enters within a first distance from the suspicious personbeing tracked (S102). On the other hand, if the suspicious person is notincluded in the second image data (NO in S101), the monitoring unit 7ends the processing.

Examples of the first distance include an estimated distance between thesuspicious person and a different person at which the suspicious personcan take an action of handing any of belongings held by the suspiciousperson to a different person. Note that the monitoring unit 7 only hasto execute processing in S102 by, for example, extracting, with imageprocessing, movements of people appearing in the second image dataincluding the suspicious person.

If there is a person entering the area within the first distance fromthe suspicious person (YES in S102), the monitoring unit 7 determinesthe person as a related suspicious person (S105). The monitoring unit 7extracts the fourth image data indicating the related suspicious personfrom the second image data and records the fourth image data in thesuspicious person management table T3 in association with a user ID ofthe suspicious person (S106).

On the other hand, if there is no person entering the area within thefirst distance from the suspicious person (NO in S102), the monitoringunit 7 advances the processing to S103.

In S103, the monitoring unit 7 determines whether a person entering anarea within a second distance from the suspicious person performs aspecific action. The second distance is larger than the first distance.As an example of the second distance, an estimated distance between thesuspicious person and a different person at which the suspicious personcan take an action of throwing any of belongings to the different personcan be adopted.

Examples of the specific action include an action in which the personentering the area within the second distance receives the belonging fromthe suspicious person and an action in which the person entering withinthe second distance catches the belonging thrown by the suspiciousperson.

If the person entering the area within the second distance from thesuspicious person performs the specific action (YES in S103), theprocessing proceeds to S105. If the person entering the area within thesecond distance from the suspicious person does not perform the specificaction (NO in S103), the processing proceeds to S104.

In S104, the monitoring unit 7 determines whether the different personcarries the belonging carried by the suspicious person. The monitoringunit 7 monitors the belongings of the suspicious person in the secondimage data. When detecting that any of the belongings is lost from thesuspicious person and the different person carries the belonging, themonitoring unit 7 only has to determine that the different personcarries the belonging carried by the suspicious person. Consequently,even if the second camera 4 cannot grasp a scene in which the suspiciousperson hands the belonging to the related suspicious person because thescene is hidden behind the different person or an obstacle, it ispossible to detect the related suspicious person. Examples of thebelongings of the suspicious person include a bag or a suitcase of thesuspicious person and an article gripped by a hand of the suspiciousperson.

If the monitoring unit 7 detects in S104 that any of the belongingscarried by the suspicious person is carried by the different person (YESin S104), the monitoring unit 7 advances the processing to S105. On theother hand, if the monitoring unit 7 does not detect that the belongingcarried by the suspicious person is carried by the different person (NOin S104), the monitoring unit 7 ends the processing.

As explained above, with the suspicious person report system 1B, even ifthe suspicious person hands any of the belongings to a different personin the passage A2, the fourth image data indicating the different personis recorded in the suspicious person management table T3. When therelated suspicious person is included in the third image data capturedby the third camera 5, a warning is emitted. Therefore, it is possibleto report presence of the related suspicious person conspiring with thesuspicious person to the customs officer 400 in the customs area A3. Asa result, it is possible to seize the belonging handed from thesuspicious person to the related suspicious person as suspicious objectsin the customs and find out the suspicious person and the relatedsuspicious person.

(Modification of the Third Embodiment)

Note that, in the above explanation, the monitoring unit 7 checks thethird image data with the first image data to determine whether thesuspicious person is included in the third image data. However, this isan example. The monitoring unit 7 may find out the suspicious personusing the method explained in the second embodiment.

In this case, the monitoring unit 7 only has to record the passportnumber read by the first scanner 61 in the suspicious person managementtable T4 in association with the first image data of the suspiciousperson. FIG. 13 is a diagram showing a suspicious person managementtable T4 according to a modification of the third embodiment. Thesuspicious person management table T4 includes a field of a passportnumber instead of the field of the user ID in the suspicious personmanagement table T3.

When the passport number read by the second scanner 62 matches thepassport number recorded in the suspicious person management table T4,the monitoring unit 7 determines that the suspicious person enters thecustoms area A3.

On the other hand, the related suspicious person indicated by the fourthimage data is included in the third image data captured by the thirdcamera 5, the monitoring unit 7 determines that the related suspiciousperson enters the customs area A3. The fourth image data is usedconcerning the related suspicious person rather than the passport numberbecause, the passport number of the related suspicious person cannot beidentified beforehand since the related suspicious person is detectedwhen passing the passage A2.

As explained above, in the modification of the third embodiment, evenwhen the suspicious person is found out using the passport number, it isalso possible to find out the related suspicious person.

(Other Modifications)

In the examples of the suspicious person management tables T1 to T4shown in FIGS. 3, 7, 11, and 13, only one record is included. However,this is an example. When two or more suspicious persons aresimultaneously tracked in parallel, two or more records for thesuspicious people are included in each of the suspicious personmanagement tables T1 to T4. In this case, the monitoring unit 7 only hasto determine whether the suspicious person enters the customs area A3 bychecking the third image data with each of two or more first image datarecorded in the two or more records. Alternatively, the monitoring unit7 only has to determine whether the suspicious person enters the customsarea A3 by checking the passport number read by the second scanner 62with each of two or more passport numbers recorded in the two or morerecords.

Another Embodiment

FIG. 14 is a schematic diagram of an airport to which a suspiciousperson report system 2 according to an embodiment of the presentdisclosure is applied. The airport is an international airport andincludes the arrival gate G, the immigration check area A1, and thecustoms area A3. The immigration check area A1 is an example of a firstregion. The customs area A3 is an example of a second region. Thearrival gate G is a place where the entrant 200 disembarking from theairplane F arriving from a foreign country passes first. The entrant 200(an example of a person) passed through the arrival gate G advances tothe immigration check area A1 first.

In the immigration check area A1, an immigration check of the entrant200 is performed. In the immigration check area A1, there is the one ormore immigration check gates G1 where the one or more immigrationofficers 100 are posted. The immigration officer 100 checks a passportof the entrant 200 and questions about a purpose of entry and the liketo check whether the entrant 200 is a suspicious person. Whendetermining that the entrant 200 is not a suspicious person, theimmigration officer 100 permits the entrant 200 to pass the immigrationcheck gate G1. On the other hand, when determining that the entrant 200is a suspicious person, the immigration officer 100 does not permit theentrant 200 to pass the immigration check gate G1.

The entrant 200 permitted to pass the immigration check gate G1 moves tothe customs area A3 through the passage A2. In the customs area A3, itis inspected whether the entrant 200 intends to smuggle articlesprohibited to be brought into the country.

In the customs area A3, there are the one or more customs gates G2 wherethe one or more customs officers 400 are posted. The customs officer 400asks the entrant 200 various questions to determine whether the entrant200 is a suspicious person. When determining that the entrant 200 is asuspicious person, the customs officer 400 checks belongings of theentrant 200. When determining that the entrant 200 is not a suspiciousperson, the customs officer 400 permits the entrant 200 to pass thecustoms gate G2. When determining that the entrant 200 is a suspiciousperson, the customs officer 400 does not permit the entrant 200 to passthe customs gate G2.

In the immigration check area A1, the one or more biometric sensors 2,the one or more first cameras 3, and the one or more first scanners 61are disposed respectively at the one or more immigration check gates G1.In the customs area A3, the one or more second cameras 4, the one ormore second scanners 62, and the one or more warning units 9 aredisposed respectively at the one or more customs gates G2. At least oneof the first camera 3 and the first scanner 61 is an example of a firstacquirer. At least one of the second camera 4 and the second scanner 62is an example of a second acquirer.

The monitoring unit 7 is communicatively connected to the presuming unit6. The presuming unit 6 and the monitoring unit 7 are each configured bya computer. The presuming unit 6 is communicatively connected to thebiometric sensor 2. The monitoring unit 7 is communicatively connectedto the first camera 3, the first scanner 61, the second camera 4, andthe second scanner 62. In the example shown in FIG. 14, the presumingunit 6 and the monitoring unit 7 are configured by separate computersand communicatively connected to each other via a communication linesuch as a LAN. However, this is an example. The presuming unit 6 and themonitoring unit 7 may be configured by one computer. The presuming unit6 and the monitoring unit 7 may set in an airport or may be set outsidethe airport. The presuming unit 6 and the monitoring unit 7 may be acloud server present on a cloud.

Fourth Embodiment

FIG. 15 is a block diagram showing an overall configuration of thesuspicious person report system 2 according to a fourth embodiment. Thesuspicious person report system 2 includes the biometric sensor 2, thefirst camera 3, the second camera 4, the presuming unit 6, themonitoring unit 7, the memory 8, and the warning unit 9. Note that, inthe fourth embodiment, since the first scanner 61 and the second scanner62 are not used, the first scanner 61 and the second scanner 62 are notshown in FIG. 15.

The biometric sensor 2 includes a measurer that measures biometric data,a processor that performs predetermined signal processing on measurementdata measured by the measurer, and a communicator that transmits thebiometric data to the presuming unit 6. The predetermined signalprocessing is, for example, noise removal processing. The biometricsensor 2 detects biometric data of a person who enters the immigrationcheck area A1. As the biometric data, for example, vital data such as abrain wave, a brain blood flow, a pulse wave, a blood pressure, arespiration rate, a body temperature, and perspiration can be adopted.

When the brain wave and the brain blood flow are adopted as thebiometric data, a brain wave meter and a brain blood flow meter can beadopted as the biometric sensor 2. When the pulse wave and the bloodpressure are adopted as the biometric data, a brain wave meter and ablood pressure meter can be adopted as the biometric sensor 2. When therespiration rate is adopted as the biometric data, a respiration metercan be adopted as the biometric sensor 2. When the body temperature isadopted as the biometric data, a thermometer can be adopted as thebiometric sensor 2. When the perspiration is adopted as the biometricdata, a perspiration state meter can be adopted as the biometric sensor2. When a thermal image is adopted as the biometric data, an infraredcamera can be adopted as the biometric sensor 2. The biometric sensor 2may be a biometric sensor that detects biometric data in non-contactwith a person or may be a biometric sensor that detects biometric datain contact with the person.

The biometric sensor 2 is communicatively connected to the presumingunit 6 by radio or wire. Under an instruction of the immigration officer100, when measurement of biometric data is started, the biometric sensor2 only has to measure biometric data at a fixed sampling interval andtransmit a measurement value to the presuming unit 6 in association witha user ID. The user ID is a symbol string uniquely given to identify anindividual entrant 200.

As the radio, a wireless LAN such as Bluetooth (registered trademark) orIEEE802.11 can be adopted. As the wire, Ethernet (registered trademark)can be adopted.

The presuming unit 6 calculates, from the biometric data detected by thebiometric sensor 2, a stress index indicating a degree of stress of theentrant 200 and, when the stress index is higher than a predeterminedreference value, presumes that the entrant 200 is a suspicious person,and transmits a detection signal indicating that the suspicious personis detected to the monitoring unit 7. The detection signal includes auser ID given to the biometric data of the suspicious person.

For example, JP5257525B discloses a technique for performing a frequencyanalysis of fluctuation in a heartbeat interval from brain wave data todetect stress of a person. Specifically, it is disclosed that thefrequency analysis of the heartbeat interval is performed to detect alevel HF of a high-frequency peak that occurs at a frequency of about0.3 Hz and a level LF of a low-frequency peak that occurs at a frequencyof about 0.1 Hz and determine that stress of a person is higher as LF/HFis larger.

Therefore, the presuming unit 6 only has to adopt the LF/HF disclosed inthe patent as a stress index of the entrant 200 and, when the stressindex is larger than a predetermined threshold, determine the entrant200 as a suspicious person.

JP5735592B discloses that a comfortableness degree of a user isevaluated in ten stages of −5 to +5 from biometric data such as a heartrate, a pulse, and a body temperature.

Therefore, the presuming unit 6 only has to adopt the comfortablenessdegree disclosed in the patent as a stress index and, when the stressindex is larger than a threshold, determine the entrant 200 as asuspicious person. In this case, the presuming unit 6 only has tocalculate the stress index from a brain wave, a brain blood flow, apulse, a blood pressure, a respiration rate, a body temperature, andperspiration.

JP2012-249797A discloses that a value obtained by linearly combining aheart rate, a body temperature, a blood pressure, and perspiration iscalculated as a stress value.

Therefore, the presuming unit 6 only has to adopt the stress valuedisclosed in the publication as a stress index and, when the stressindex is larger than a threshold, determine the entrant 200 as asuspicious person.

The presuming unit 6 may calculate a stress index of the entrant 200from the thermal image data as disclosed in P2003-534864A.

The first camera 3 is provided in the immigration check area A1. Thefirst camera 3 captures an image of each entrant 200 entering apredetermined check position before the immigration check gate G1 andacquires first image data including an image of the entrant 200. Thefirst image data is an example of first identification information. Anoptical axis and an angle of view of the first camera 3 are set suchthat the first camera 3 can capture an image of at least the face or thewhole body of the entrant 200 entering the check position. Every time anew entrant 200 enters the check position before the immigration checkgate G1, the first camera 3 captures an image of the entrant 200 andoutputs obtained first image data to the monitoring unit 7.

The second camera 4 is provided in the customs area A3. The secondcamera 4 captures an image of each entrant 200 entering a predeterminedcheck position before the customs gate G2 and acquires second image dataof the entrant 200. The second image data is an example of secondidentification information. An optical axis and an angle of view of thesecond camera 4 are set such that the second camera 4 can capture animage of at least the face or the whole body of the entrant 200 enteringthe check position. Every time a new entrant 200 enters the checkposition before the customs gate G2, the second camera 4 captures animage of the entrant 200 and outputs obtained second image data to themonitoring unit 7.

The monitoring unit 7 records the first image data of the personpresumed as the suspicious person by the presuming unit 6 in the memory8.

Specifically, when receiving the detection signal transmitted from thepresuming unit 6, the monitoring unit 7 records the first image datacaptured by the first camera 3 in a suspicious person management tableT5 included in the memory 8 in association with a user ID included inthe detection signal.

FIG. 16 is a diagram showing an example of the suspicious personmanagement table T5 according to the fourth embodiment. The suspiciousperson management table T5 is a two-dimensional table in which user IDsand image data are recorded in association with each other. A user IDissued by the monitoring unit 7 is recorded in a field of “user ID”.First image data concerning the user ID is recorded in a field of “imagedata”.

Referring back to FIG. 15, every time the second image data istransmitted from the second camera 4, the monitoring unit 7 checks thesecond image data with the first image data recorded in the suspiciousperson management table T5 and determines whether the suspicious personis included in the second image data.

Specifically, the monitoring unit 7 calculates similarity of a featurevalue of the suspicious person extracted from the first image data and afeature value of a person extracted from the second image data and, ifthe calculated similarity is equal to or larger than a specified value,determines that the suspicious person is included in the second imagedata. As the specified value, a predetermined value for regarding thetwo of them as the same person can be adopted.

As the feature value of the suspicious person, a feature value of theface of the suspicious person may be adopted or a feature value ofclothes worn by the suspicious person may be adopted. The monitoringunit 7 records the first image data of the suspicious person in thesuspicious person management table T5. However, this is an example. Thefeature value of the suspicious person extracted from the first imagedata may be recorded. The same applies in embodiments explained below.

When determining that the suspicious person is included in the secondimage data, the monitoring unit 7 causes the warning unit 9 to emit awarning.

The warning unit 9 is configured by a display device set in the customsarea A3. As the display device, a liquid crystal display, an organic ELdisplay, and the like can be adopted. A display surface of the displaydevice faces the customs officer 400. The display device is disposedsuch that only the customs officer 400 can visually recognize an image.

The warning unit 9 only has to emit a warning by, for example,displaying a face image of the suspicious person or a whole body imageof the suspicious person to emit the warning. In this case, the warningunit 9 only has to receive image data of the suspicious person from themonitoring unit 7 and display the image data of the suspicious person.As a warning method by the warning unit 9, an aspect in which the faceimage and the whole body image are displayed on the display device isexplained above. However, this is an example. For example, the warningunit 9 may be configured by an LED lamp and turn on the LED lamp to emitthe warning. Alternatively, the warning unit 9 may be configured by aspeaker and emit the warning by outputting, from the speaker, a voicemessage for informing that the suspicious person enters the customs areaA3.

The memory 8 is configured by a nonvolatile rewritable storage devicemounted on a computer communicatively connected to the monitoring unit 7and stores the suspicious person management table T5 and the like. Thememory 8 may be connected to the monitoring unit 7 via a communicationline such as a LAN or may be provided on the cloud. The memory 8 may becommunicatively connected to the presuming unit 6. The memory 8 may beconfigured by the storage device of the monitoring unit 7.

<Sequence>

The operation of the suspicious person report system 2 is explained.FIG. 17 is a sequence chart showing the operation of the suspiciousperson report system 2. FIG. 18 is a sequence chart following FIG. 17.

(S01) The biometric sensor 2 measures biometric data of the entrant 200entering the check position in the immigration check area A1. Thebiometric sensor 2 gives a user ID to each entrant 200 and transmits theuser ID to the presuming unit 6 in association with biometric data. Notethat, when the biometric sensor 2 is configured by a contact-typebiometric sensor, the biometric sensor 2 is attached to the entrant 200by the immigration officer 100 or another officer. The biometric sensor2 only has to start measurement of biometric data, for example, with aninput of a measurement start instruction from the immigration officer100 as a trigger, measure biometric data at a fixed sampling intervaluntil a measurement end instruction is input from the immigrationofficer 100, and transmit the measured biometric data to the presumingunit 6 in association with the user ID.

(S02) In parallel to the processing in S01, the first camera 3 capturesan image of the entrant 200 being checked, acquires first image data,and transmits the first image data to the monitoring unit 7. The firstcamera 3 only has to capture an image of an entrant, for example, withan input of an image capture instruction from the immigration officer100 as a trigger and transmit the acquired first image data to themonitoring unit 7.

(S03) The presuming unit 6 calculates a stress index from the biometricdata received from the biometric sensor 2 and determines whether theentrant 200 is a suspicious person. When determining that the entrant200 is a suspicious person, the presuming unit 6 generates a detectionsignal including a user ID associated with biometric data of thesuspicious person and transmits the detection signal to the monitoringunit 7. On the other hand, when determining that the entrant 200 is nota suspicious person, the presuming unit 6 ends the processing.

(S04) When receiving the detection signal, the monitoring unit 7 recordsthe first image data transmitted from the first camera 3 in the sameperiod in the suspicious person management table T5 in association withthe user ID of the suspicious person included in the detection signal.Consequently, the first image data of the suspicious person is recorded.The monitoring unit 7 only has to record first image data transmittedwithin a fixed period around a time of reception of the detection signalin the suspicious person management table T5 as the first image data ofthe suspicious person. As the fixed period, a period estimated to beconsumed for measurement of biometric data and capturing of first imagedata concerning the same person is adopted.

(S05) The second camera 4 captures an image of the entrant 200 enteringthe check position in the customs area A3, acquires second image data ofthe entrant 200, and transmits the second image data to the monitoringunit 7. The second camera 4 only has to capture an image of the entrant200, for example, with an input of an image capture instruction from thecustoms officer 400 as a trigger, and transmit the second image data tothe monitoring unit 7.

(S06) The monitoring unit 7 checks the second image data captured by thesecond camera 4 with the first image data of the suspicious personrecorded in the suspicious person management table T5 and determineswhether the suspicious person is included in the second image data.

(S07) When the monitoring unit 7 determines that the suspicious personis included in the second image data, the warning unit 9 displays a faceimage or a whole body image of the suspicious person on the displaydevice. Consequently, the customs officer 400 can recognize that theentrant 200 in front of the customs officer 400 is the suspicious personand can take necessary measures. Examples of the necessary measuresinclude a measure for opening a bag carried by the suspicious person andinspecting belongings of the suspicious person in detail and a measurefor moving the suspicious person to another interrogation room andinterrogating the suspicious person.

As explained above, with the suspicious person report system 2, thebiometric data and the first image data of the entrant 200 entering theimmigration check area A1 are acquired and, if the stress index obtainedfrom the biometric data is higher than the reference value, the entrant200 is presumed as a suspicious person, and the first image data isrecorded in the memory 8.

When the suspicious person indicated by the first image data recorded inthe memory 8 is included in the second image data obtained by capturingan image of the entrant 200 entering the customs area A3 with the secondcamera 4, the warning is emitted.

Therefore, even if the immigration officer 100 permits passage of thesuspicious person in the immigration check area A1, since the warning isemitted when the suspicious person enters the customs area A3, it ispossible to find out the suspicious person.

As explained above, with the suspicious person report system 2, it ispossible to find out the suspicious person by effectively using theimmigration check area A1 and the customs area A3 provided apart fromeach other where an entrant is obliged to pass in order in the airport.

Fifth Embodiment

FIG. 19 is a block diagram showing an overall configuration of asuspicious person report system 2A according to a fifth embodiment. Thesuspicious person report system 2A is characterized by reporting asuspicious person using a passport number of a passport carried by theentrant 200. FIG. 19 is different from FIG. 15 in that the first scanner61 is provided in the immigration check area A1 instead of the firstcamera 3 and the second scanner 62 is provided in the customs area A3instead of the second camera 4. Note that, in the fifth embodiment,components same as the components in the fourth embodiment are denotedby the same reference numerals and signs and explanation of thecomponents is omitted.

The first scanner 61 is provided in the immigration check area A1. Thefirst scanner 61 reads, according to an instruction of the immigrationofficer 100, a passport number described in a passport presented by theentrant 200 in the immigration check gate G1 and transmits the passportnumber to the monitoring unit 7. The passport number read by the firstscanner 61 is an example of a first passport number. Note that, in thecase of a passport in which a passport number is stored in an electronicchip, the first scanner 61 only has to acquire the passport number bycommunicating with the electronic chip. The same applies to the secondscanner 62.

The second scanner 62 is provided in the customs area A3. The secondscanner 62 reads, according to an instruction of the customs officer400, a passport number described in a passport presented by the entrant200 before the customs gate G2 and transmits the passport number to themonitoring unit 7. The passport number read by the second scanner 62 isan example of a second passport number.

When receiving a detection signal from the presuming unit 6, themonitoring unit 7 records the passport number transmitted from the firstscanner 61 in the same period in a suspicious person management table T6(FIG. 20) included in the memory 8 as a passport number of thesuspicious person.

When the passport number of the suspicious person recorded in thesuspicious person management table T6 and the passport number read bythe second scanner 62 match each other, the monitoring unit 7 causes thewarning unit 9 to emit a warning.

FIG. 20 is a diagram showing an example of the suspicious personmanagement table T6 according to the fifth embodiment. The suspiciousperson management table T6 is different from the suspicious personmanagement table T5 in that a passport number is provided instead of theuser ID and image data is omitted. Since the passport number is uniquelygiven to the individual entrant 200, the passport number is capable ofuniquely identifying a suspicious person. Therefore, in the fifthembodiment, the passport number is adopted instead of the user ID.

Note that, in the fifth embodiment, since a user ID is not used, thebiometric sensor 2 does not need to issue a user ID. Therefore, it ispossible to reduce a processing load on the biometric sensor 2.

<Sequence>

FIG. 21 is a sequence chart showing the operation of the suspiciousperson report system 2A according to the fifth embodiment. FIG. 22 is asequence chart following FIG. 21.

Note that, in FIGS. 21 and 22, kinds of processing same as the kinds ofprocessing shown in FIGS. 17 and 18 are denoted by the same referencesigns and explanation of the kinds of processing is omitted.

(S02 a) S02 a is processing performed in parallel to S01. The firstscanner 61 reads a passport number of the entrant 200 and transmits thepassport number to the monitoring unit 7.

(S04 a) S04 a is processing following S03. When receiving a detectionsignal, the monitoring unit 7 records the passport number transmittedfrom the first scanner 61 in the suspicious person management table T6.Consequently, the passport number of the suspicious person is recorded.The monitoring unit 7 only has to record a passport number transmittedwithin a fixed period around a time of the reception of the detectionsignal in the suspicious person management table T6 as the passportnumber of the suspicious person. As the fixed period, a period estimatedto be consumed for measurement of biometric data and acquisition of apassport number of the same person is adopted.

(S05 a) S05 a is processing following S04 a. The second scanner 62reads, according to an instruction of the customs officer 400, apassport number presented by the entrant 200 entering the check positionin the customs area A3 and transmits the passport number to themonitoring unit 7.

(S06 a) S06 a is processing following S05 a. The monitoring unit 7checks whether the passport number of the suspicious person recorded inthe suspicious person management table T6 and the passport number readby the second scanner 62 match each other.

When the monitoring unit 7 determines that the two passport numbersmatch each other, the warning unit 9 emits a warning (S07 a). When thetwo passport numbers do not match each other, the processing ends. Sinceimage data of the suspicious person is not acquired, the warning unit 9cannot display image data of the suspicious person. Therefore, thewarning unit 9 may emit a warning by turning on the LED lamp or may emita warning by outputting, from the speaker, a voice message for informingthat the suspicious person intrudes into the customs area A3.

As explained above, with the suspicious person report system 2A, thepassport number of the suspicious person is acquired in the immigrationcheck area A1 and recorded in the suspicious person management table T6.Therefore, the suspicious person report system 2A can find out thesuspicious person in the customs area A3 by checking the passport numberacquired in the customs area A3 with the passport number recorded in thesuspicious person management table T6.

Sixth Embodiment

FIG. 23 is a block diagram showing an overall configuration of asuspicious person report system 2B according to a sixth embodiment. Thesuspicious person report system 2B is characterized by performing awarning by displaying a face image of a suspicious person in thesuspicious person report system 2A in the fifth embodiment.

FIG. 23 is different from FIG. 19 in that the first camera 3 is furtherprovided in the immigration check area A1 and the second scanner 62 isfurther provided in the customs area A3. Note that, in the sixthembodiment, components same as the components in the fifth and sixthembodiments are denoted by the same reference numerals and signs andexplanation of the components is omitted.

When receiving a detection signal from the presuming unit 6, themonitoring unit 7 records a passport number transmitted from the firstscanner 61 in the same period in a suspicious person management table T7(FIG. 24) included in the memory 8 in association with first image dataacquired by the first camera 3.

FIG. 24 is a diagram showing an example of the suspicious personmanagement table T7 according to the sixth embodiment. The suspiciousperson management table T7 is different from the suspicious personmanagement table T6 in that a field of image data is provided inassociation with a passport number. For example, the warning unit 9 iscapable of emitting a warning using the image data.

When a passport number of a suspicious person recorded in the suspiciousperson management table T7 and a passport number read by the secondscanner 62 match each other, the monitoring unit 7 causes the warningunit 9 to emit a warning.

<Sequence>

FIG. 25 is a sequence chart showing the operation of the suspiciousperson report system 2B according the sixth embodiment. FIG. 26 is asequence chart following FIG. 25. Note that, in FIGS. 25 and 26, kindsof processing same as the kinds of processing shown in FIGS. 21 and 22are denoted by the same reference signs and explanation of the kinds ofprocessing is omitted.

(S02, S02 a) S02 is the processing shown in FIG. 17 in which the firstcamera 3 captures an image of the entrant 200 being checked, acquiresfirst image data, and transmits the first image data to the monitoringunit 7. S02 a is the processing shown in FIG. 8 in which the firstscanner 61 reads a passport number of the entrant 200 and transmits thepassport number to the monitoring unit 7. S02 and S02 a are performed inparallel to the processing in S01.

(S04 b) S04 b is processing following S03. When receiving a detectionsignal, the monitoring unit 7 records the first image data transmittedfrom the first camera 3 in the suspicious person management table T7 inassociation with the passport number transmitted from the first scanner61. Consequently, first image data of a suspicious person is recordedtogether with a passport number of the suspicious person. The monitoringunit 7 only has to record first image data and a passport numbertransmitted within a fixed period around a time of the reception of thedetection signal in the suspicious person management table T7 as thefirst image data and the passport number of the suspicious person. Asthe fixed period, a period estimated to be consumed for measurement ofbiometric data, capturing of first image data, and acquisition of apassport number of the same person is adopted.

(S05, S05 a) S05 is the processing shown in FIG. 18 in which the secondcamera 4 captures an image of the entrant 200 entering the checkposition in the customs area A3, acquires second image data of theentrant 200, and transmits the second image data to the monitoring unit7. S05 a is the processing shown in FIG. 22 in which the second scanner62 reads, according to an instruction of the customs officer 400, apassport number present by the entrant 200 entering the check positionin the customs area A3 and transmits the passport number to themonitoring unit 7. S05 and S05 a are performed in parallel.

(S06 a) S06 a is processing following S05 a. The monitoring unit 7checks whether the passport number of the suspicious person recorded inthe suspicious person management table T7 and the passport number readby the second scanner 62 match each other.

(S07) When the monitoring unit 7 determines that the suspicious personis included in the second image data, the warning unit 9 displays a faceimage or a whole body image of the suspicious person on the displaydevice. In this case, the warning unit 9 may display the first imagedata of the suspicious person recorded in the memory 8 in S02 on thedisplay device or may display the second image data of the suspiciousperson captured by the second camera 4 in S05 on the display device.Consequently, the customs officer 400 can recognize that the entrant 200in front of the customs officer 400 is a suspicious person and can takenecessary measures.

As explained above, with the suspicious person report system 2Baccording to the sixth embodiment, the customs officer 400 can easilyfind out the suspicious person since the face image of the suspiciousperson is displayed on the display device.

Note that, in the sixth embodiment, the monitoring unit 7 finds out thesuspicious person by checking the passport number acquired by the firstscanner 61 and the passport number acquired by the second scanner 62.However, this is an example. As in the fourth embodiment, the monitoringunit 7 may find out the suspicious person by checking the first imagedata acquired by the first camera 3 and the second image data acquiredby the second camera 4.

When an aspect is adopted in which the warning unit 9 displays the faceimage of the suspicious person on the display device using the firstimage data acquired by the first camera 3, the second camera 4 isunnecessary in the customs area A3.

(Modification)

In the examples of the suspicious person management tables T5 to T7shown in FIGS. 16, 20, and 24, only one record is included. However,this is an example. When two or more suspicious persons aresimultaneously detected in parallel, two or more records for thesuspicious people are included in the suspicious person managementtables T5 to T7. In this case, the monitoring unit 7 only has todetermine whether the suspicious person is included in the second imagedata by checking the second image data with each of two or more firstimage data recorded in the two or more records. Alternatively, themonitoring unit 7 may check the passport number read by the secondscanner 62 with each of two or more passport numbers recorded in the twoor more records.

The technique of the present disclosure is useful for security measuresin an airport, a port, and the like.

What is claimed is:
 1. A system, comprising: a biometric sensor thatdetects biometric data of a person in a first region; a presuming unitthat calculates, from the biometric data, a stress index indicating adegree of stress and presumes that the person is a target person to betracked based on the calculated stress index; a first camera thatacquires first image data including an image of the person in the firstregion; a second camera that acquires second image data including animage of the person in a second region; and a monitoring unit thattracks the target person to be tracked in the second region by checkingthe second image data with the first image data corresponding to thetarget person to be tracked.
 2. The system according to claim 1, whereinthe presuming unit presumes that the person is the target person to betracked when the calculated stress index is higher than a predeterminedreference value.
 3. The system according to claim 1, wherein the firstimage data includes a face image of the person.
 4. The system accordingto claim 1, further comprising a memory that records the first imagedata corresponding to the target person to be tracked, wherein themonitoring unit tracks the target person to be tracked in the secondregion by checking the second image data with the first image datarecorded in the memory.
 5. The system according to claim 1, wherein thebiometric sensor is a contact based sensor.
 6. The system according toclaim 1, wherein the biometric data includes at least one of a brainwave, a brain blood flow, a pulse wave, a blood pressure, a respirationrate, a body temperature, or perspiration.
 7. A method, comprising:detecting biometric data of a person with a biometric sensor in a firstregion; calculating, from the biometric data, a stress index indicatinga degree of stress, presuming that the person is a target person to betracked based on the calculated stress index; acquiring first image dataincluding an image of the person in the first region; acquiring secondimage data including an image of the person in a second region; andtracking the target person to be tracked in the second region bychecking the second image data with the first image data correspondingto the target person to be tracked.