Search

CN-121986336-A - Authentication system and program

CN121986336ACN 121986336 ACN121986336 ACN 121986336ACN-121986336-A

Abstract

Provided are an authentication system and a program which can release security protection by a simple method. The authentication system includes a1 st display unit that displays a1 st map including an authentication position and showing an authentication icon indicating the authentication position, and a scale that is larger than a predetermined boundary threshold value, a2 nd display unit that displays a2 nd map having a scale that is not larger than the boundary threshold value and showing no authentication icon when the 1 st map is enlarged or when the authentication icon shown in the 1 st map is selected, and a release unit that accepts, in the 2 nd map, that the specified position is within an authentication distance from the authentication position, and releases the security protection.

Inventors

  • TANAKA YOHEI

Assignees

  • 三菱电机楼宇解决方案株式会社

Dates

Publication Date
20260505
Application Date
20230815

Claims (7)

  1. 1. An authentication system, comprising: a1 st display unit that displays a1 st map that includes an authentication position, that displays an authentication icon indicating the authentication position, and that has a scale larger than a predetermined boundary threshold; a2 nd display unit that displays a2 nd map having a scale equal to or smaller than the boundary threshold and not showing the authentication icon when the 1 st map is enlarged or when the authentication icon shown in the 1 st map is selected, and And a release unit that releases the security protection when the specified position is received in the map 2 and is within the authentication distance from the authentication position.
  2. 2. The authentication system of claim 1, wherein, The authentication system further includes a 1 st authentication unit that releases security so that the terminal can access the inside of the network when an authentication condition is satisfied, The 1 st display unit does not display the 1 st map on a terminal that cannot access the network, and displays the 1 st map on a terminal that can access the network through the 1 st authentication unit.
  3. 3. The authentication system according to claim 1 or 2, wherein, The authentication distance is 50m.
  4. 4. The authentication system according to any one of claim 1 to 3, wherein, The authentication location is a location of a construction site where an elevator project is performed.
  5. 5. The authentication system according to any one of claims 1 to 4, wherein, When the authentication icon shown in the 1 st map is selected, the 2 nd display unit displays the 2 nd map including the authentication position with a scale equal to the boundary threshold.
  6. 6. The authentication system according to any one of claims 1 to 4, wherein, When the 1 st map is enlarged so that the scale is equal to or smaller than the boundary threshold, the 2 nd display unit displays the 2 nd map with the scale being the boundary threshold.
  7. 7. A program that causes a computer to execute the steps of: a1 st display step of displaying a1 st map including an authentication position, showing an authentication icon indicating the authentication position, and having a scale larger than a predetermined boundary threshold; A2 nd display step of displaying a2 nd map having a scale below the boundary threshold and not displaying the authentication icon in a case where the 1 st map is enlarged or in a case where the authentication icon displayed in the 1 st map is selected after the 1 st display step, and And a release step of releasing the security protection when the specified position is received in the map 2 after the display step of 2 and is within the authentication distance from the authentication position.

Description

Authentication system and program Technical Field The present disclosure relates to an authentication system and a program. Background Patent document 1 discloses a construction management system for a building. The construction management system is provided with a server. Information related to the construction work, such as contractual matters, images of construction work sites, etc., is collected in a server. By accessing the information stored in the server from the client-side terminal device, the manager-side terminal device, and the construction-side terminal device, construction management can be performed smoothly. Prior art literature Patent literature Patent document 1 Japanese patent laid-open No. 2009-134685 Disclosure of Invention Problems to be solved by the invention However, in the construction management system described in patent document 1, information about various construction sites is collected in a server. For example, if information of a construction work independent of a client can be accessed from a client terminal device, a problem arises in information management. As a countermeasure against this problem, a method of setting a unique password or the like at each construction site is considered. However, in this case, it is necessary to issue a unique password or the like to all relatives on the construction site. Therefore, smooth sharing of information is hindered. The present disclosure has been made to solve the above-described problems. The present disclosure provides an authentication system and a program capable of releasing security protection by a simple method. Means for solving the problems The authentication system includes a 1 st display unit that displays a 1 st map including an authentication position and showing an authentication icon indicating the authentication position, and a scale that is larger than a predetermined boundary threshold value, a 2 nd display unit that displays a 2 nd map having a scale that is not larger than the boundary threshold value and showing no authentication icon when the 1 st map is enlarged or when the authentication icon shown in the 1 st map is selected, and a release unit that accepts, in the 2 nd map, that the specified position is within the authentication distance from the authentication position, and releases the security protection. The program causes a computer to execute a1 st display step of displaying a1 st map including an authentication position and showing an authentication icon indicating the authentication position and having a scale larger than a predetermined boundary threshold value, a 2 nd display step of displaying a 2 nd map having a scale equal to or smaller than the boundary threshold value and not showing the authentication icon when the authentication icon shown in the 1 st map is enlarged or selected after the 1 st display step, and a release step of releasing the security protection when the specified position is received in the 2 nd map within an authentication distance from the authentication position after the 2 nd display step. Effects of the invention According to the present disclosure, the safety protection can be released in a simple manner. Drawings Fig. 1 is a schematic diagram of a management system in embodiment 1. Fig. 2 is a schematic diagram of an imaging unit of the management system in embodiment 1. Fig. 3 is a front view of a camera of the management system in embodiment 1. Fig. 4 is a table showing states of cameras in the management system in embodiment 1. Fig. 5 is a device configuration diagram of a main part of the management system in embodiment 1. Fig. 6 is a functional block diagram of a main part of the management system in embodiment 1. Fig. 7 is a flowchart showing a part of the processing operation of the management system in embodiment 1. Fig. 8 is an authentication screen displayed on the management interface of the management system in embodiment 1. Fig. 9 is a screen of the map 1 displayed on the management interface of the management system in embodiment 1. Fig. 10 is a screen of the map 2 displayed on the management interface of the management system in embodiment 1. Fig. 11 is a screen of the map 2 displayed on the management interface of the management system in embodiment 1. Fig. 12 is a thumbnail screen displayed on the management interface of the management system in embodiment 1. Fig. 13 is a timeline screen displayed in the management interface of the management system in embodiment 1. Fig. 14 is a video display screen displayed on a management interface of the management system in embodiment 1. Fig. 15 is a video display screen displayed on a management interface of the management system in embodiment 1. Fig. 16 is a hardware configuration diagram of an information server of the management system in embodiment 1. Detailed Description The manner in which the present disclosure is practiced is described with reference to the accompanying drawings. In the drawings,