[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2024057542A1 - Server device, system, method of controlling server device, and storage medium - Google Patents

Server device, system, method of controlling server device, and storage medium Download PDF

Info

Publication number
WO2024057542A1
WO2024057542A1 PCT/JP2022/034793 JP2022034793W WO2024057542A1 WO 2024057542 A1 WO2024057542 A1 WO 2024057542A1 JP 2022034793 W JP2022034793 W JP 2022034793W WO 2024057542 A1 WO2024057542 A1 WO 2024057542A1
Authority
WO
WIPO (PCT)
Prior art keywords
dangerous goods
owner
server device
information
information provision
Prior art date
Application number
PCT/JP2022/034793
Other languages
French (fr)
Japanese (ja)
Inventor
崇 安田
伸明 川瀬
塁 石山
Original Assignee
日本電気株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 日本電気株式会社 filed Critical 日本電気株式会社
Priority to PCT/JP2022/034793 priority Critical patent/WO2024057542A1/en
Publication of WO2024057542A1 publication Critical patent/WO2024057542A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Definitions

  • the present invention relates to a server device, a system, a control method for a server device, and a storage medium.
  • Patent Document 1 states that it provides a technology that reliably manages records related to the use of firearms, etc., and allows a licensee to easily confirm the records.
  • the possession permission application information management system of Patent Document 1 includes a storage section, an information input reception section, a possession permission application information updating section, and an information output section.
  • the storage unit associates the identification information of the person licensed to possess a firearm, the identification information of the firearm owned by the person licensed to possess a firearm, and usage record information including the date, place, and purpose of use of the firearm by the person licensed to possess a firearm. retains possession permit application information that has been submitted.
  • the information input reception unit receives input of identification information of a person licensed to possess a firearm, and identification information and/or usage record information of the firearm.
  • the possession permit application information updating unit updates the possession permit application information corresponding to the identification information of the person with firearm possession permission received by the information input reception unit into the firearm identification information and/or use record information received by the information input reception unit. is updated and saved in the storage unit.
  • the information output unit outputs possession permit application information based on a predetermined input operation.
  • Patent Document 2 states that when identifying the difference between bullets fired from a firearm, the influence of the proficiency level of the appraisal work by the appraiser is eliminated as much as possible, and accurate discrimination is efficiently realized.
  • Patent Document 2 discloses a method and an apparatus for identifying the difference between a handgun that fired a bullet to be tested and a handgun that fired a bullet to be compared. The method in this document involves imaging a bullet to be inspected, acquiring an image of the bullet using an image acquisition means, and applying an enhancement process to make surface features such as flaws on the surface of the bullet to be inspected apparent in the acquired image. Apply by treatment means.
  • the method of the document uses a calculation means to calculate the similarity between an image that has been subjected to enhancement processing and an image that has been subjected to enhancement processing on a pre-stored image of a comparison target bullet, and then Information regarding the similarity of the two bullets and images of the two bullets to be compared are output on the screen.
  • JP 2021-111369 Publication JP2013-210690A
  • Patent Document 1 is limited to disclosing a technology related to gun management
  • Patent Document 2 is limited to disclosing a technology related to differentiating bullets.
  • the main object of the present invention is to provide a server device, a system, a control method for a server device, and a storage medium that contribute to making it easier to identify the owner of a dangerous object.
  • the storage means stores the object fingerprint in association with the owner identification information for identifying the owner for each of the plurality of dangerous objects, and the object fingerprint acquired from the object is included.
  • object authentication using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints is performed to authenticate the object included in the owner information provision request.
  • a server device comprising: information provision control means that identifies the owner identification information corresponding to a fingerprint and notifies the identified owner identification information to a source of the owner information provision request. .
  • the server device includes an investigative agency terminal and a server device, and the server device associates owner identification information that identifies the owner with object fingerprints for each of a plurality of dangerous objects.
  • a storage means for storing the object fingerprints acquired from the object; and upon receiving an owner information provision request including the object fingerprint acquired from the object from the investigative agency terminal, the object fingerprint included in the owner information provision request and the plurality of stored objects; By executing object authentication using a fingerprint, the owner identification information corresponding to the object fingerprint included in the owner information provision request is identified, and the identified owner identification information is notified to the investigation agency terminal.
  • a system comprising: an information provision control means.
  • owner identification information for identifying the owner and object fingerprints are stored in association with each other for each of a plurality of dangerous objects, and the object fingerprints acquired from the objects are stored.
  • object authentication using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints is performed to authenticate the object included in the owner information provision request.
  • a method of controlling a server device is provided, which specifies the owner specifying information corresponding to a fingerprint and notifies the source of the owner information provision request of the specified owner specifying information.
  • a computer installed in a server device stores a process of associating and storing owner identification information for identifying an owner and an object fingerprint for each of a plurality of dangerous objects;
  • object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints, thereby identifying the owner.
  • a computer-readable storage medium is provided that stores.
  • a server device a system, a control method for the server device, and a storage medium that contribute to making it easier to identify the owner of a dangerous object.
  • the effects of the present invention are not limited to the above. According to the present invention, other effects may be achieved instead of or in addition to the above effects.
  • FIG. 1 is a diagram for explaining an overview of one embodiment.
  • FIG. 2 is a flowchart illustrating the operation of one embodiment.
  • FIG. 3 is a diagram showing an example of a schematic configuration of the hazardous materials management system according to the first embodiment.
  • FIG. 4 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 5 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 6 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 7 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 8 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 1 is a diagram for explaining an overview of one embodiment.
  • FIG. 2 is a flowchart illustrating the operation of one embodiment.
  • FIG. 3 is a diagram showing an example of a schematic configuration of the hazardous materials management system according to the first embodiment.
  • FIG. 9 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 10 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 11 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 12 is a diagram illustrating an example of a processing configuration of the server device according to the first embodiment.
  • FIG. 13 is a diagram illustrating an example of the gun management database according to the first embodiment.
  • FIG. 14 is a diagram showing an example of the bullet management database according to the first embodiment.
  • FIG. 15 is a flowchart showing an example of the operation of the dangerous goods sales control section according to the first embodiment.
  • FIG. 16 is a flowchart illustrating an example of the operation of the information provision control unit according to the first embodiment.
  • FIG. 17 is a diagram illustrating an example of the processing configuration of the seller terminal according to the first embodiment.
  • FIG. 18 is a diagram illustrating an example of a processing configuration of the investigative agency terminal according to the first embodiment.
  • FIG. 19 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 20 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment.
  • FIG. 21 is a diagram illustrating an example of a bullet case management database according to a modification of the first embodiment.
  • FIG. 22 is a diagram illustrating an example of a processing configuration of a server device according to a modification of the first embodiment.
  • FIG. 23 is a diagram illustrating an example of a bullet object fingerprint management database according to a modification of the first embodiment.
  • FIG. 24 is a diagram illustrating an example of a display on an investigative agency terminal according to the second embodiment.
  • FIG. 25 is a diagram illustrating an example of a display on an investigative agency terminal according to the second embodiment.
  • FIG. 26 is a diagram illustrating an example of a display on an investigative agency terminal according to the second embodiment.
  • FIG. 27 is a diagram illustrating an example of the hardware configuration of a server device according to the present disclosure.
  • the server device 100 includes a storage unit 101 and an information provision control unit 102 (see FIG. 1).
  • the storage unit 101 stores owner identification information for identifying the owner and object fingerprints in association with each other for each of a plurality of dangerous objects (step S1 in FIG. 2).
  • the information provision control unit 102 receives an owner information provision request including an object fingerprint acquired from the object, it executes object authentication using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. (Step S2).
  • the information provision control means 102 specifies the owner identification information corresponding to the object fingerprint included in the owner information provision request by executing object authentication, and uses the identified owner identification information in the owner information provision request. The sender is notified (step S3).
  • An object fingerprint can be used as identification information that can uniquely identify an object (hazardous industrial product).
  • the server device 100 stores information for identifying the owner of the dangerous object (for example, name and address) and the object fingerprint in association with each other.
  • owner identification information for example, name and address
  • the server device 100 notifies the operating organization or the like of the identified owner identification information (for example, the name and address of the owner of the belongings left behind). In this way, the server device 100 can easily identify the owner of the dangerous object by using the object fingerprint of the dangerous object.
  • the dangerous goods management system is a system that manages the owners of dangerous goods.
  • the dangerous goods management system manages dangerous goods such as guns, bullets (ammunition), swords, and powerful drugs that cannot be purchased without the purchaser presenting an identification card.
  • the configuration, operation, etc. of a dangerous goods management system will be explained using guns and bullets as examples of dangerous goods.
  • the objects to be managed by the dangerous goods management system according to the present disclosure are not limited to guns or bullets.
  • the dangerous goods management system (information processing system) according to the first embodiment includes a management center, a plurality of businesses, and an investigation agency.
  • the management center manages the manufacturers, distribution routes, etc. of dangerous goods (guns, bullets).
  • the management center is operated by a national administrative agency or a private company commissioned by the government.
  • the management center screens applicants for purchasing dangerous goods and manages information on people who have purchased dangerous goods.
  • the management center also cooperates in criminal investigations in response to requests from investigative agencies (police, prosecutors, etc.).
  • the management center includes a server device 10.
  • the server device 10 is a server that handles the main operations of the management center.
  • the server device 10 may be installed in a building of a management center, or may be installed on a network (on a cloud).
  • Examples of businesses operating hazardous materials management systems include manufacturers of hazardous materials (gun manufacturers, bullet manufacturers), distribution businesses that distribute hazardous materials, and distributors that sell hazardous materials.
  • the investigating agency is a public agency such as the police or prosecutor's office.
  • hazardous materials management system operators and investigative agencies have information processing devices such as servers and terminals. Each device included in the hazardous materials management system is interconnected. Specifically, the server device 10 and the operator's terminal etc. are connected by wired or wireless communication means and are configured to be able to communicate with each other.
  • a dangerous goods management system may include a plurality of server devices 10.
  • Object fingerprints are patterns (graphic patterns, pattern patterns) that are unique to each product (object). More specifically, the object fingerprint is not the design of the product, but the uneven color, unevenness, minute scratches, etc. that are unique to each individual product. Since the object fingerprint is unique information for each product, object fingerprints obtained from the same product match (substantially match). That is, the object fingerprint functions as an ID that can uniquely identify the manufactured gun.
  • the gun manufacturer's production line includes a gun manufacturing management terminal 20 and a camera-equipped microscope 21.
  • the camera-equipped microscope 21 and the gun manufacturing management terminal 20 are connected by wired or wireless communication means.
  • Object fingerprints are obtained by photographing an enlarged object under appropriate lighting conditions. Specifically, a worker on the gun manufacturing line operates the camera-equipped microscope 21 via the gun manufacturing management terminal 20 . The camera-equipped microscope 21 photographs a predetermined area of the gun (the black area in FIG. 4) and transmits the image data to the gun manufacturing management terminal 20.
  • the gun manufacturing management terminal 20 acquires (generates and extracts) an object fingerprint from the acquired image data. For example, the gun manufacturing management terminal 20 generates an object fingerprint by applying a predetermined filter, correction, etc. to image data. Note that since existing technology can be used to obtain the object fingerprint, a more detailed explanation will be omitted.
  • an object fingerprint functions as an ID that allows a product to be uniquely identified, it is desirable that it remains unchanged for a long period of time (ideally, forever). Therefore, it is desirable for gun manufacturers to obtain the object fingerprint from a location where the object fingerprint does not change easily. For example, it is preferable that the object fingerprint be obtained from the bottom of the grip or from a plate attached to the gun.
  • the operator When the object fingerprint is taken, the operator inputs the serial number of the gun from which the object fingerprint was taken into the gun manufacturing control terminal 20. For example, an operator reads a serial number stamped on a gun and inputs the read serial number into the gun manufacturing control terminal 20. Alternatively, the operator operates a camera (not shown in FIG. 4) via the gun manufacturing control terminal 20 to photograph the serial number.
  • the gun manufacturing control terminal 20 may acquire the serial number by analyzing image data showing the serial number.
  • the gun manufacturing management terminal 20 sends a manufactured gun information notification including the manufactured gun's object fingerprint (hereinafter referred to as gun object fingerprint), serial number, and business ID (manufacturer ID). is transmitted to the server device 10.
  • gun object fingerprint the manufactured gun's object fingerprint
  • serial number the manufactured gun's object fingerprint
  • business ID manufacturer ID
  • the business ID is an ID for identifying a business included in the hazardous materials management system. Any identification information can be used as the business ID.
  • the business ID is shared between the management center and each business by any method. For example, a system administrator determines a business ID and notifies each business operator of the determined business ID.
  • the server device 10 associates the company ID, serial number, and gun object fingerprint included in the manufactured gun information notification and stores them in the gun management database. Details of the gun management database will be described later.
  • the bullet manufacturer's production line includes a bullet production management terminal 30 and a camera-equipped microscope 31.
  • the camera-equipped microscope 31 and the bullet production management terminal 30 are connected by wired or wireless communication means.
  • the operator operates the camera-equipped microscope 31 via the bullet manufacturing management terminal 30 to obtain image data for generating object fingerprints.
  • the camera-equipped microscope 31 automatically photographs a bullet carried by a belt conveyor or the like, and transmits image data for generating the object fingerprint to the bullet manufacturing management terminal 30.
  • the bullet manufacturing management terminal 30 generates and stores a bullet object fingerprint (hereinafter referred to as a bullet object fingerprint) from the acquired image data.
  • a bullet object fingerprint hereinafter referred to as a bullet object fingerprint
  • the bullets whose object fingerprints have been taken are stored in the bullet case in the order in which the object fingerprints were taken.
  • the operator inputs the "case ID" given to the bullet case into the bullet manufacturing management terminal 30.
  • the operator reads the case ID attached to the bullet case and inputs the read case ID into the bullet manufacturing management terminal 30.
  • the case ID has been converted into a barcode, two-dimensional barcode, etc.
  • the operator inputs the case ID into the bullet manufacturing management terminal 30 using a barcode reader (not shown in FIG. 5). do.
  • the bullet manufacturing management terminal 30 Upon acquiring the case ID, the bullet manufacturing management terminal 30 sends a "manufactured bullet information notification" that includes the bullet manufacturer's business ID, the case ID, and at least one bullet object fingerprint stored in the bullet case corresponding to the case ID. ” to the server device 10. For example, when 100 bullets are stored in one bullet case, a manufacturing bullet information notification including one case ID and 100 bullet object fingerprints is transmitted to the server device 10.
  • the server device 10 associates the business ID, case ID, and at least one bullet object fingerprint included in the manufactured bullet information notification and stores them in the bullet management database. Details of the bullet management database will be described later.
  • Distribution businesses that handle dangerous goods are required to report the distribution route of the dangerous goods to the control center.
  • the distribution business enters information identifying the dangerous goods (see FIGS. 6 and 7).
  • the distribution business when purchasing hazardous materials, the distribution business enters into the distribution business terminal 40 information that identifies the supplier and sales destination of the dangerous materials (for example, the business IDs of the supplier and sales destination).
  • the distribution business terminal 40 stores information such as the business ID of the company (distribution business), the business IDs of suppliers and sales destinations, and information identifying the hazardous materials handled (hazardous material identification information; for example, gun serial numbers, bullets, etc.).
  • a "dangerous goods distribution notification" including the case ID) is sent to the server device 10.
  • the server device 10 searches the corresponding database using the dangerous goods identification information (gun serial number or bullet case case ID) included in the dangerous goods distribution notification as a key, and identifies the dangerous goods (guns, bullets) to be distributed. do.
  • the server device 10 stores the distribution route (business IDs of the supplier, distribution business, and sales destination) in the entry of the specified dangerous goods.
  • a store clerk at a sales business temporarily takes identification documents (for example, a driver's license with a facial image attached) from a person who wishes to purchase dangerous goods.
  • the store clerk operates the seller terminal 50 to take a photograph of the identification document received from the prospective purchaser.
  • the store clerk or the like operates the seller terminal 50 to obtain biometric information of the person who wishes to purchase the dangerous goods.
  • biometric information examples include data (feature amounts) calculated from physical characteristics unique to an individual, such as a face, a fingerprint, a voice print, a vein, a retina, and a pattern of the iris of the eye.
  • the biometric information may be image data such as a face image or a fingerprint image.
  • the biometric information may be anything that includes the user's physical characteristics as information. In the embodiment disclosed herein, a case will be described in which biometric information regarding a person's "face” (a face image or a feature amount generated from a face image) is used.
  • the seller terminal 50 controls a camera to take a picture of the person who wishes to purchase, and obtains a facial image.
  • the seller terminal 50 collects the dangerous goods identification information that identifies the dangerous goods, the identity verification documents (image data showing the identity verification documents), the biometric information (facial image), and the seller's information.
  • a “sales availability determination request” including the business ID is transmitted to the server device 10.
  • the dangerous substance identification information is, for example, the serial number of a gun or the case ID of a bullet case.
  • a sales business that sells guns inputs the serial number of the gun into the seller terminal 50.
  • a sales business that sells bullets inputs the case ID of the bullet case into the seller terminal 50.
  • the server device 10 determines whether the dangerous goods can be sold to the person who wishes to purchase the dangerous goods. Specifically, the server device 10 determines that the dangerous goods can be sold if the identity of the purchaser is successfully verified and the purchaser is not a criminal or the like. Note that the server device 10 determines that identity verification has been successful when the photographed facial image obtained by photographing the person wishing to purchase dangerous goods and the facial image obtained from the identity verification document are of the same person. do.
  • the server device 10 acquires information that identifies the owner of the dangerous goods (owner identification information). For example, the server device 10 reads owner identification information from an identification document presented at a seller by a person who wishes to purchase a dangerous object (an owner of a dangerous object).
  • the server device 10 reads the name and address of the dangerous goods owner from the identification document as the owner identification information.
  • the server device 10 reads the ID (ID issued by a public institution) from the identity verification document as the owner identification information.
  • the server device 10 reads out a driver's license number, social security number, national insurance number, etc. as owner identification information.
  • the server device 10 stores the acquired owner identification information in the database. Specifically, the server device 10 stores the gun purchaser's owner identification information in the gun management database. Alternatively, the server device 10 stores the owner identification information of the bullet purchaser in the bullet management database.
  • the server device 10 transmits the determination result (dangerous goods can be sold or cannot be sold) to the seller terminal 50.
  • the salesperson sells the dangerous goods.
  • the store clerk at the retailer refuses to sell the dangerous goods. For example, if identity verification fails or if the person wishing to purchase dangerous goods is listed on a blacklist, which will be described later, the sale of dangerous goods will be refused.
  • the management center will cooperate with criminal investigations by investigative agencies. Items left at a crime scene (eg, a gun and/or bullets) are brought to an investigative agency.
  • the investigation agency includes an investigation agency terminal 60 and a camera-equipped microscope 61.
  • the camera-equipped microscope 61 and the investigation agency terminal 60 are connected by wired or wireless communication means.
  • An investigator or the like of an investigative agency operates the investigative agency terminal 60 to request the management center (server device 10) to provide information regarding the belongings left behind.
  • an investigator or the like operates a camera-equipped microscope 61 via an investigation agency terminal 60 to obtain image data for generating an object fingerprint.
  • the investigation agency terminal 60 generates an object fingerprint of the belongings left behind from the acquired image data. For example, as shown in FIG. 10, when a gun is recovered as a leftover item, an object fingerprint of the gun is generated. As shown in FIG. 11, when a bullet is recovered as a leftover item, an object fingerprint of the bullet is generated.
  • the investigation agency or the like obtains information by requesting the manufacturer of the dangerous object to provide information regarding the location where the object fingerprint is obtained from the dangerous object (in the example of FIG. 4, the black area of the gun).
  • an investigative agency or the like obtains the location from which the fingerprint of the object is to be obtained via the management center. Note that the location where object fingerprints are obtained from dangerous objects will not be disclosed to general consumers.
  • the investigation agency terminal 60 transmits an "owner information provision request" including the generated object fingerprint (gun object fingerprint or bullet object fingerprint) to the server device 10. do.
  • the server device 10 Upon receiving the owner information provision request, the server device 10 compares the object fingerprint included in the owner information provision request with the object fingerprint registered in the database, and identifies the dangerous object corresponding to the leftover item. For example, when the server device 10 obtains a gun object fingerprint, it uses at least one or more gun object fingerprints registered in the gun management database to identify an entry corresponding to a gun left at a crime scene. Alternatively, when the server device 10 obtains the bullet object fingerprint, it identifies an entry corresponding to the bullet left at the crime scene using at least one or more bullet object fingerprints registered in the bullet management database.
  • the server device 10 reads owner identification information (for example, name and address, or ID such as driver's license number) of the entry identified by the verification process from the database.
  • owner identification information for example, name and address, or ID such as driver's license number
  • the server device 10 transmits the read owner identification information to the investigation agency terminal 60.
  • the investigation agency terminal 60 presents the acquired owner identification information to an investigator or the like. Investigators use the information presented to them in criminal investigations.
  • FIG. 12 is a diagram illustrating an example of a processing configuration (processing module) of the server device 10 according to the first embodiment.
  • the server device 10 includes a communication control unit 201, a dangerous goods manufacturing management unit 202, a dangerous goods distribution management unit 203, a dangerous goods sales control unit 204, an information provision control unit 205, and a storage unit. 206.
  • the communication control unit 201 is a means for controlling communication with other devices. For example, the communication control unit 201 receives data (packets) from the gun manufacturing management terminal 20. Further, the communication control unit 201 transmits data to the gun manufacturing management terminal 20. The communication control unit 201 passes data received from other devices to other processing modules. The communication control unit 201 transmits data acquired from other processing modules to other devices. In this way, other processing modules transmit and receive data to and from other devices via the communication control unit 201.
  • the communication control unit 201 has a function as a reception unit that receives data from another device, and a function as a transmission unit that transmits data to the other device.
  • the dangerous goods manufacturing management department 202 is a means for managing the manufacturing of dangerous goods (guns or bullets).
  • the dangerous goods manufacturing management unit 202 receives dangerous goods identification information that identifies the manufactured dangerous goods and object fingerprints of the manufactured dangerous goods from the manufacturer's terminal.
  • the dangerous goods manufacturing management unit 202 stores the received dangerous goods identification information and object fingerprint in a dangerous goods management database (gun management database, bullet management database).
  • the dangerous goods manufacturing management department 202 processes the "manufactured gun information notification" received from the gun manufacturing management terminal 20 or the "manufactured bullet information notification” received from the bullet manufacturing management terminal 30.
  • the dangerous goods manufacturing management department 202 Upon receiving the manufacturing gun information notification, the dangerous goods manufacturing management department 202 adds a new entry to the gun management database (see FIG. 13).
  • the dangerous goods manufacturing management unit 202 registers the business ID (manufacturer ID), gun serial number, and gun object fingerprint included in the received manufactured gun information notification in the newly added entry.
  • the gun management database shown in FIG. 13 is an example, and is not intended to limit the items to be stored.
  • the date and time when the manufacturing gun information notification was processed may be registered in the gun management database.
  • the dangerous goods manufacturing management department 202 processes the manufactured bullet information notification in the same manner as the manufactured gun information notification. Specifically, the dangerous goods manufacturing management department 202 registers the information included in the manufactured bullet information notification in the bullet management database (see FIG. 14).
  • the bullet object fingerprint field of the bullet management database stores at least one bullet object fingerprint of a bullet.
  • the dangerous goods distribution management unit 203 is a means for managing the distribution of dangerous goods (guns or bullets).
  • the dangerous goods distribution management unit 203 receives the dangerous goods identification information of the dangerous goods to be distributed and the distribution route of the dangerous goods to be distributed from the terminal of the distribution business operator.
  • the dangerous goods distribution management unit 203 stores the distribution route of the dangerous goods to be distributed in the entry specified by searching the dangerous goods management database using the dangerous goods identification information of the dangerous goods to be distributed.
  • the dangerous goods distribution management department 203 processes the "dangerous goods distribution notification" received from the distribution business terminal 40.
  • the dangerous goods distribution management unit 203 searches the database using the dangerous goods identification information (gun serial number or bullet case case ID) included in the dangerous goods distribution notification as a key, and identifies the corresponding entry.
  • the dangerous goods distribution management unit 203 searches the gun management database using the gun serial number as a key and identifies the corresponding entry.
  • the dangerous goods distribution management unit 203 searches the bullet management database using the case ID as a key and identifies the corresponding entry.
  • the dangerous goods distribution management unit 203 stores the distribution route (business ID of each supplier, distribution business operator, and sales destination) included in the dangerous goods distribution notification in the distribution route field of the specified entry.
  • the business ID that is first written in the distribution route field matches the manufacturer ID of the gun or bullet. Further, among the setting values in the distribution route field, units separated by semicolons correspond to distribution routes sent from one distribution business operator.
  • the distribution route consisting of "mID01", "ID02", and "ID03" indicates that the distribution business with ID02 purchased guns from the manufacturer with mID01 and sold them to the sales destination with ID03. .
  • the dangerous goods sales control unit 204 is a means for controlling the sale of dangerous goods (guns or bullets).
  • the dangerous goods sales control unit 204 receives a sales propriety determination request including the identification document of the person who wishes to purchase the dangerous goods and the biometric information acquired from the person who wishes to purchase the dangerous goods from the terminal of the sales business. If the dangerous goods sales control unit 204 succeeds in verifying the identity using at least the biometric information written on the identification document and the biometric information obtained from the person wishing to purchase the dangerous goods, the dangerous goods sales control unit 204 determines whether the sales business wishes to purchase the dangerous goods. permit a person to sell dangerous goods.
  • FIG. 15 is a flowchart showing an example of the operation of the dangerous goods sales control unit 204 according to the first embodiment. The operation of the dangerous goods sales control unit 204 according to the first embodiment will be described with reference to FIG. 15.
  • the dangerous goods sales control unit 204 Upon receiving the sales permission determination request, the dangerous goods sales control unit 204 carries out identity verification regarding the person who wishes to purchase the dangerous goods. Specifically, the dangerous goods sales control unit 204 executes a matching process using the biometric information obtained from the identification document included in the sales permission determination request and the biometric information obtained from the purchase applicant (step S101). ).
  • the dangerous goods sales control unit 204 effectively uses the biometric information (facial image) written on the identification document and the biometric information (facial image) obtained by photographing the person wishing to purchase the dangerous goods. Determine whether or not there is a match and verify the identity.
  • the dangerous goods sales control unit 204 generates feature amounts from each of the facial image included in the sales permission determination request and the facial image written (affixed) on the identification document.
  • the dangerous goods sales control unit 204 extracts the eyes, nose, mouth, etc. from the face image as feature points. Thereafter, the dangerous goods sales control unit 204 calculates the positions of each feature point and the distance between each feature point as feature quantities (generates a feature vector made up of a plurality of feature quantities).
  • the dangerous goods sales control unit 204 executes a matching process (one-to-one matching) using the two generated feature amounts. Specifically, the dangerous goods sales control unit 204 calculates the degree of similarity between corresponding face images using two feature amounts. The dangerous goods sales control unit 204 determines whether the two images are face images of the same person based on the result of threshold processing for the calculated degree of similarity. Note that chi-square distance, Euclidean distance, or the like can be used for the similarity. The farther the distance, the lower the similarity, and the closer the distance, the higher the similarity.
  • the dangerous goods sales control unit 204 determines that the identity verification has been successful. If the degree of similarity is less than or equal to a predetermined value, the dangerous goods sales control unit 204 determines that the identity verification has failed.
  • step S102 If the identity verification fails (step S102, No branch), the dangerous goods sales control unit 204 sets "sale not possible" in response to the sale permission determination request (step S103).
  • the dangerous goods sales control unit 204 determines whether the person wishing to purchase the dangerous goods is listed on a blacklist created by an investigative agency or the like (blacklist determination ; step S104). That is, the dangerous goods sales control unit 204 determines that the person who wishes to purchase the dangerous goods does not fall under the category of a person prohibited from selling dangerous goods by an investigative agency or the like.
  • the dangerous goods sales control unit 204 sends a server (crime history server; not shown in FIG. 3, etc.) having the above-mentioned blacklist to a server that has the above-mentioned blacklist, and blacklists the person who wishes to purchase the dangerous goods as a person who cannot purchase the dangerous goods. Inquire whether it is on the list.
  • the dangerous goods sales control unit 204 transmits the facial image of the person wishing to purchase the dangerous goods to a crime history server that has a blacklist in which biometric information of criminals and the like is stored.
  • the dangerous goods sales control unit 204 receives the determination result (listed on the blacklist, not listed on the blacklist) from the crime history server.
  • the dangerous goods sales control unit 204 may transmit information (for example, name, address, etc.) identifying the person who wishes to purchase the dangerous goods to a server having a blacklist.
  • information for example, name, address, etc.
  • the determination of whether a person wishing to purchase dangerous goods is on a blacklist may be made using biometric information (a facial image or a feature amount generated from a facial image), or by using information such as a person's name. It may also be carried out using biometric information (a facial image or a feature amount generated from a facial image), or by using information such as a person's name. It may also be carried out using biometric information (a facial image or a feature amount generated from a facial image), or by using information such as a person's name. It may also be carried out using biometric information (a facial image or a feature amount generated from a facial image), or by using information such as a person's name. It may also be carried out using biometric information (a facial image or a feature amount generated from a facial image
  • step S105 If it is listed on the blacklist (step S105, Yes branch), the dangerous goods sales control unit 204 sets "sale not allowed" in response to the sale permission determination request (step S103).
  • step S105 If it is not listed on the blacklist (step S105, No branch), the dangerous goods sales control unit 204 sets "saleable" in response to the saleability determination request (step S106).
  • the dangerous goods sales control unit 204 stores the business ID (seller ID) included in the sales permission/prohibition determination notification in a database (gun management database, bullet management database). Furthermore, the dangerous goods sales control unit 204 stores in the database "owner identification information" that identifies the purchaser (the owner of the dangerous goods) who is permitted to sell the dangerous goods.
  • the dangerous goods sales control unit 204 stores the name, address, etc. of the owner of the dangerous goods (the name, address, etc. written on the identification document) in the database.
  • the dangerous goods sales control unit 204 stores the ID obtained from the identification document (for example, driver's license number, social security number, national insurance number, etc.) in the database as owner identification information.
  • the dangerous goods sales control unit 204 may store the biological information (facial information; face image, feature amount) of the owner of the dangerous goods in the database.
  • the biometric information stored in the database may be biometric information obtained from an identification document or may be biometric information obtained from a person who wishes to purchase dangerous goods.
  • the dangerous goods sales control unit 204 transmits a response to the sales permission determination request (determination result; sale possible, sale not possible) to the seller terminal 50 (step S107).
  • the dangerous goods sales control unit 204 performs identity verification when one-on-one matching using the biometric information written on the identity verification document and the biometric information obtained from the person wishing to purchase the dangerous goods is successful. Determine it as successful. Furthermore, if the dangerous goods sales control unit 204 succeeds in verifying the identity of the person who wishes to purchase the dangerous goods, and the person who wishes to purchase the dangerous goods is not listed on the blacklist as a person who cannot purchase dangerous goods, the dangerous goods sales control unit 204 will Business operators are permitted to sell hazardous materials to those who wish to purchase them.
  • the information provision control unit 205 is a means for controlling information provision to investigative agencies and the like.
  • the information provision control unit 205 When the information provision control unit 205 receives an owner information provision request including an object fingerprint obtained from an object (a dangerous item that is left behind), the information provision control unit 205 sends the object fingerprint included in the owner information provision request and a plurality of object fingerprints stored in the database. Perform object authentication using object fingerprints. The information provision control unit 205 identifies the owner identification information corresponding to the object fingerprint included in the owner information provision request through object authentication, and uses the identified owner identification information as the source of the owner information provision request (investigation). Notify the engine terminal 60).
  • the information provision control unit 205 processes information provision requests such as "owner information provision requests" received from the investigation agency terminal 60.
  • FIG. 16 is a flowchart showing an example of the operation of the information provision control unit 205 according to the first embodiment. The operation of the information provision control unit 205 when receiving an owner information provision request will be described with reference to FIG. 16.
  • the information provision control unit 205 When receiving an owner information provision request, the information provision control unit 205 provides the investigative agency with owner identification information corresponding to the object fingerprint included in the request.
  • the information provision control unit 205 executes object authentication using the object fingerprint included in the owner information provision request and the object fingerprint stored in the dangerous goods management database (step S201). Note that detailed explanation will be omitted since existing technology can be applied to object authentication by the information provision control unit 205, but the information provision control unit 205 performs object authentication through the following process. .
  • the information provision control unit 205 matches object fingerprints (images taken of dangerous objects) using an image matching method using local feature amounts and an algorithm that verifies the consistency of the geometric arrangement of feature points.
  • the information provision control unit 205 extracts, from the object fingerprint (object fingerprint image), a place where the luminance changes sharply and whose position can be stably determined as a feature point.
  • the information provision control unit 205 converts the local brightness pattern around the feature point into data as a feature amount.
  • the information provision control unit 205 calculates a pair of feature points with the smallest difference in feature amount from both images to be compared.
  • the information provision control unit 205 verifies the geometric consistency of the overall arrangement of feature points.
  • the information provision control unit 205 extracts a pair group whose relative positional relationship with other feature points is consistent from the obtained pair group.
  • the information provision control unit 205 calculates a matching score for both images using the total number of feature points extracted from the two images to be matched and the number of feature point pairs whose geometric arrangement is correct.
  • the information provision control unit 205 determines that object authentication has been successful if the matching score is greater than or equal to a predetermined threshold.
  • the information provision control unit 205 determines that object authentication has failed if the matching score is smaller than a predetermined threshold.
  • the information provision control unit 205 executes the object authentication described above using the gun object fingerprint stored in the gun management database. Furthermore, if the object fingerprint included in the owner information provision request is a bullet object fingerprint, the information provision control unit 205 executes the object authentication using the bullet object fingerprint stored in the bullet management database.
  • step S202 If object authentication fails (step S202, No branch), the information provision control unit 205 notifies the investigation agency terminal 60 that the dangerous object corresponding to the object fingerprint included in the owner information provision request is not registered in the database. do. Specifically, the information provision control unit 205 transmits a negative response to the investigating agency terminal 60 (step S203).
  • step S202 If the object authentication is successful (step S202, Yes branch), the information provision control unit 205 acquires the owner identification information of the entry (entry in the gun management database or bullet management database) corresponding to the object fingerprint for which the object authentication was successful. (Step S204).
  • the information provision control unit 205 transmits an affirmative response including the acquired owner identification information to the investigating agency terminal 60 (step S205).
  • the storage unit 206 is a means for storing information necessary for the operation of the server device 10.
  • the storage unit 206 stores, for each of a plurality of dangerous objects, owner identification information that identifies the owner and object fingerprints in association with each other. Further, the storage unit 206 is constructed with a dangerous goods management database (gun management database, bullet management database) that stores owner identification information and object fingerprints regarding each of a plurality of dangerous goods.
  • a dangerous goods management database gun management database, bullet management database
  • the gun manufacturing management terminal 20 A detailed explanation regarding the processing configuration and operation of the gun manufacturing management terminal 20 will be omitted.
  • Examples of the gun manufacturing management terminal 20 include a tablet, a computer (a personal computer, a notebook computer), and the like.
  • the gun manufacturing management terminal 20 can be any equipment or device as long as it accepts operator operations and can communicate with the server device 10 and the like.
  • the gun manufacturing management terminal 20 acquires image data from the camera-equipped microscope 21 and generates a gun object fingerprint from the image data.
  • the gun manufacturing management terminal 20 transmits a manufactured gun information notification including the generated gun object fingerprint, the serial number of the gun, and the gun manufacturer's business ID (manufacturer ID) to the server device 10.
  • bullet manufacturing management terminal 30 A detailed explanation regarding the processing configuration and operation of the bullet manufacturing management terminal 30 will be omitted.
  • Examples of the bullet manufacturing management terminal 30 include a tablet, a computer (a personal computer, a notebook computer), and the like.
  • the bullet manufacturing management terminal 30 can be any equipment or device as long as it accepts operator operations and can communicate with the server device 10 and the like.
  • the bullet manufacturing management terminal 30 acquires image data from the camera-equipped microscope 31 and generates a bullet object fingerprint from the image data.
  • the bullet manufacturing management terminal 30 sends a manufactured bullet information notification including the generated bullet object fingerprint, the case ID of the bullet case in which the bullet is stored, and the business ID (manufacturer ID) of the bullet manufacturer to the server. to the device 10.
  • Distributor terminal A detailed description of the processing configuration and operation of the distributor terminal 40 will be omitted.
  • Examples of the distributor terminal 40 include a tablet, a computer (a personal computer, a notebook computer), and the like.
  • the distribution company terminal 40 can be any equipment or device as long as it accepts operations from a worker and can communicate with the server device 10 and the like.
  • the distribution business terminal 40 acquires dangerous goods identification information (serial number of the gun, case ID of the bullet case) that identifies the dangerous goods (gun or bullet) to be distributed.
  • the distribution business terminal 40 transmits to the server device 10 a dangerous goods distribution notification that includes the company's business ID, the supplier's business ID, the sales destination's business ID, and the acquired dangerous goods identification information.
  • FIG. 17 is a diagram showing an example of a processing configuration (processing module) of the seller terminal 50 according to the first embodiment.
  • the seller terminal 50 includes a communication control section 301, an identification document acquisition section 302, a biometric information acquisition section 303, a determination request section 304, and a storage section 305.
  • the communication control unit 301 is a means for controlling communication with other devices. For example, the communication control unit 301 receives data (packets) from the server device 10. Furthermore, the communication control unit 301 transmits data to the server device 10. The communication control unit 301 passes data received from other devices to other processing modules. The communication control unit 301 transmits data acquired from other processing modules to other devices. In this way, other processing modules transmit and receive data to and from other devices via the communication control unit 301.
  • the communication control unit 301 has a function as a receiving unit that receives data from another device, and a function as a transmitting unit that transmits data to the other device.
  • the identity verification document acquisition unit 302 is a means for acquiring image data showing the identity verification document of a person who wishes to purchase dangerous goods.
  • the identity verification document acquisition unit 302 controls a camera device to acquire image data showing the identity verification document in response to an operation by a salesperson or the like.
  • the identity verification document acquisition unit 302 controls a scanner to acquire image data showing the identity verification document.
  • the identity verification document acquisition unit 302 delivers the acquired image data to the determination request unit 304.
  • the biological information acquisition unit 303 is a means for acquiring biological information of a person who wishes to purchase dangerous goods.
  • the biometric information acquisition unit 303 controls a camera device in response to an operation by a salesperson or the like, and acquires biometric information (for example, a facial image) of a person who wishes to purchase.
  • the biometric information acquisition unit 303 extracts a facial image from the acquired image data.
  • the biological information acquisition unit 303 may extract a face image (face region) from the image data using a learning model learned by a CNN (Convolutional Neural Network).
  • the biometric information acquisition unit 303 may extract the facial image using a method such as template matching.
  • the biometric information acquisition unit 303 delivers the extracted facial image to the determination requesting unit 304.
  • the determination requesting unit 304 is a means for requesting the server device 10 to make a determination as to whether or not it is possible to sell dangerous goods to customers who wish to purchase dangerous goods.
  • the determination requesting unit 304 Upon acquiring the identity verification documents and biometric information (facial image) regarding the person wishing to purchase dangerous goods, the determination requesting unit 304 determines whether the person is purchasing the dangerous goods, including the identity verification documents, the biological information, the business ID (seller ID), and the dangerous goods identification information. A request for determination of availability is sent to the server device 10.
  • the determination request unit 304 receives the determination result (saleable, unsaleable) from the server device 10.
  • the determination requesting unit 304 presents the received determination result (saleable or unsaleable) to a store clerk of the retailer or the like.
  • the storage unit 305 is a means for storing information necessary for the operation of the seller terminal 50.
  • FIG. 18 is a diagram showing an example of a processing configuration (processing module) of the investigation agency terminal 60 according to the first embodiment.
  • the investigation agency terminal 60 includes a communication control section 401, an object fingerprint acquisition section 402, an information provision requesting section 403, and a storage section 404.
  • the communication control unit 401 is a means for controlling communication with other devices. For example, the communication control unit 401 receives data (packets) from the server device 10. The communication control unit 401 also transmits data to the server device 10. The communication control unit 401 passes data received from other devices to other processing modules. The communication control unit 401 transmits data acquired from other processing modules to other devices. In this way, the other processing modules transmit and receive data to and from other devices via the communication control unit 401.
  • the communication control unit 401 has a function as a receiving unit that receives data from other devices and a function as a transmitting unit that transmits data to other devices.
  • the object fingerprint acquisition unit 402 is a means for acquiring object fingerprints of items left behind at a crime scene or the like.
  • the object fingerprint acquisition unit 402 controls the camera-equipped microscope 61 according to the operation of an investigator or the like, and acquires image data showing the remains (gun or bullet).
  • the object fingerprint acquisition unit 402 generates an object fingerprint from the acquired image data.
  • the object fingerprint acquisition unit 402 delivers the generated object fingerprint to the information provision requesting unit 403.
  • the information provision requesting unit 403 is a means for requesting the server device 10 to provide information regarding left behind items (guns or bullets). When an investigator or the like requests information regarding the owner of a leftover item, the information provision requesting unit 403 transmits an "owner information provision request" including the acquired object fingerprint to the server device 10.
  • the information provision request unit 403 receives a response (positive response, negative response) to the owner information provision request from the server device 10.
  • the information provision requesting unit 403 presents information corresponding to the obtained response to an investigator or the like.
  • the information requesting unit 403 notifies the investigator etc. that the owner of the belongings could not be identified.
  • the information provision requesting unit 403 If a positive response is received, the information provision requesting unit 403 provides owner identification information (name and address, ID, etc.) that identifies the owner of the leftover item (purchaser of the leftover item) to the investigator, etc. present. For example, the information provision requesting unit 403 displays the owner identification information included in the affirmative response on a display or the like.
  • owner identification information name and address, ID, etc.
  • the storage unit 404 is a means for storing information necessary for the operation of the investigation agency terminal 60.
  • FIG. 19 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment. Referring to FIG. 19, the operation of the dangerous goods management system according to the first embodiment regarding the sale of dangerous goods will be described.
  • the seller terminal 50 transmits to the server device 10 a request for determining whether or not the product can be sold, including identification documents, biometric information (facial image), business ID (seller ID), and hazardous material identification information of the person wishing to purchase the dangerous goods. (Step S01).
  • the server device 10 Upon receiving the sales availability determination request, the server device 10 verifies the identity of the person wishing to purchase (step S02).
  • the server device 10 confirms that the person wishing to purchase does not fall under the category of criminals listed on the blacklist (blacklist determination; step S03).
  • the server device 10 If the identity verification is successful and the blacklist determination is successful (the person wishing to purchase does not fall under the category of a criminal), the server device 10 notifies the seller terminal 50 that "sale is possible" (step S04).
  • the seller terminal 50 notifies the salesperson's clerk that the dangerous goods can be sold to the person who wishes to purchase the dangerous goods (step S05).
  • FIG. 20 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment. Referring to FIG. 20, the operation related to information provision of the hazardous materials management system according to the first embodiment will be described.
  • the investigation agency terminal 60 acquires the object fingerprint of the leftover item (gun or bullet) (step S11).
  • the investigative agency terminal 60 transmits an owner information provision request including the object fingerprint of the leftover item to the server device 10 (step S12).
  • the server device 10 executes object authentication using the object fingerprint included in the owner information provision request and the object fingerprint registered in the database (step S13).
  • the server device 10 acquires the owner identification information of the leftover item (gun or bullet) from the database (gun management database or bullet management database) (step S14).
  • the server device 10 notifies the investigative agency terminal 60 of the acquired owner identification information (step S15).
  • the investigative agency terminal 60 presents the notified owner identification information to an investigator of the investigative agency (step S16).
  • the server device 10 uses a bullet management database, which is a single database, regarding bullet management and information provision.
  • the server device 10 may manage bullets and provide information using a plurality of databases.
  • a case ID for identifying a bullet case in which a bullet is stored is registered in the server device 10.
  • the bullet manufacturer notifies the server device 10 of the case ID (ID converted into a two-dimensional barcode or the like) of the bullet case.
  • a distribution company that handles bullet cases (bullet cases containing bullets) notifies the server device 10 of the case ID of the purchased bullet case.
  • a vendor who sells bullets (bullet cases) notifies the server device 10 of the case ID of the bullet case to be sold to a bullet purchaser.
  • the bullet manufacturing management terminal 30 may transmit a manufacturing bullet information notification including the case ID of the bullet case to the server device 10.
  • the manufactured bullet notification does not include the bullet object fingerprint.
  • the distribution business terminal 40 transmits a dangerous goods distribution notification including the case ID of the bullet case to the server device 10.
  • the seller terminal 50 transmits a sales permission determination request including the case ID of the bullet case.
  • the server device 10 constructs a bullet case management database for managing bullet cases by processing notifications and requests (manufactured bullet information notification, dangerous goods distribution notification, sales propriety determination request) received from each business operator. .
  • each processing module of the dangerous goods manufacturing management section 202, the dangerous goods distribution management section 203, and the dangerous goods sales control section 204 of the server device 10 performs the processing, control, etc. described in the first embodiment. conduct.
  • a bullet case management database as shown in FIG. 21 is constructed.
  • the bullet case management database stores case IDs of manufactured bullets in association with information specifying distribution routes and owners (bullet purchasers).
  • the object fingerprint of the bullet and the case ID of the bullet case storing the bullet are registered in the server device 10 at an arbitrary timing.
  • a bullet manufacturer that manufactures bullets takes bullet object fingerprints for each bullet housed in a bullet case.
  • the bullet manufacturer obtains the case ID of the bullet case that stores the bullet from which the bullet object fingerprint was taken.
  • the bullet manufacturer (terminal, computer, etc. installed at the bullet manufacturer) transmits the acquired at least one object bullet fingerprint and the corresponding case ID to the server device 10.
  • the entity that transmits the bullet object fingerprint and case ID to the server device 10 is not limited to the bullet manufacturer. Any entity included in the dangerous goods management system can send the bullet object fingerprint and case ID to the server device 10. That is, the bullet object fingerprint and the case ID need only be transmitted to the server device 10 before the bullet stored in the bullet case is sold to the bullet purchaser.
  • FIG. 22 is a diagram illustrating an example of a processing configuration (processing module) of the server device 10 according to a modification of the first embodiment.
  • a case ID processing unit 207 is added to the configuration of the server device 10 according to the first embodiment.
  • the case ID processing unit 207 is a means for processing the received bullet object fingerprint and case ID.
  • the case ID processing unit 207 receives the bullet object fingerprint and case ID from a bullet manufacturer or the like, it stores the received bullet object fingerprint and case ID in the bullet object fingerprint management database (see FIG. 23).
  • the information provision control unit 205 Upon receiving the owner information provision request including the bullet object fingerprint collected from the bullet in the remains, the information provision control unit 205 stores the bullet object fingerprint included in the owner information provision request and the bullet object fingerprint management database. Execute object authentication using bullet object fingerprints. When the object authentication is successful, the information provision control unit 205 searches the bullet case management database using the case ID specified by the object authentication as a key, and identifies the corresponding entry.
  • the information provision control unit 205 transmits the owner identification information of the identified entry to the investigation agency terminal 60.
  • the object fingerprint of a dangerous object and information identifying the owner of the dangerous object are stored in the server device 10. That is, when a gun or bullet is sold, after the identity of the purchaser of the gun or bullet is confirmed, the object fingerprint of the gun or bullet and the purchaser's information are stored in association with each other. An investigation agency can easily obtain information regarding the owner of a leftover item (gun or bullet) left at a crime scene by transmitting the object fingerprint of the leftover item (gun or bullet) to the server device 10.
  • Investigative agencies can determine whether the bullet at the scene was fired from the suspect's gun by comparing the streaks left on the bullet with the streaks obtained by test-firing the suspect's gun. It is possible to confirm the facts. However, the investigating agency cannot determine the ownership of the bullets left at the scene through such comparison. On the other hand, in the dangerous goods management system according to the first embodiment, the investigation agency can identify the owner (purchaser) of the bullet remaining at the crime scene.
  • the server device 10 stores the distribution route of hazardous materials. That is, in the dangerous goods management system according to the first embodiment, complete traceability of dangerous goods such as guns and bullets is ensured.
  • the configuration of the hazardous materials management system according to the second embodiment can be the same as that of the first embodiment, so the explanation corresponding to FIG. 3 will be omitted.
  • the processing configurations of the server device 10, the seller terminal 50, the investigative agency terminal 60, etc. according to the second embodiment can also be the same as those of the first embodiment, so a description thereof will be omitted.
  • the investigative agency terminal 60 may request the server device 10 to provide information regarding the distribution route of the left behind item (gun or bullet).
  • the information provision request unit 403 transmits a “distribution route information provision request” including the object fingerprint of the leftover item to the server device 10.
  • the server device 10 Upon receiving the distribution route information provision request, the server device 10 (information provision control unit 205) reads the distribution route set in the distribution route field from the entry specified by object authentication. The information provision control unit 205 notifies the investigation agency terminal 60 of the read distribution route.
  • the information provision request unit 403 of the investigation agency terminal 60 provides the received distribution route to the investigator. For example, the information provision requesting unit 403 displays information regarding the distribution route on a display, or prints the information using a printer.
  • the information provision requesting unit 403 displays information as shown in FIG. 24 on a display or the like.
  • Investigators use the presented distribution routes in criminal investigations. For example, an investigator may interview a seller about the person who purchased a dangerous item.
  • the investigative agency terminal 60 may request the server device 10 to provide overall information regarding the belongings left behind.
  • the information provision request unit 403 transmits a “remaining item information provision request” including the object fingerprint of the leftover item to the server device 10.
  • the information provision control unit 205 of the server device 10 that has received the request to provide information on the left behind reads the entry specified by object authentication from the database.
  • the information provision control unit 205 transmits the information written in the read entry (manufacturer ID, distribution route, seller ID, owner identification information, etc.) to the investigation agency terminal 60.
  • the information provision requesting unit 403 of the investigation agency terminal 60 provides the received information (information regarding the belongings left behind) to the investigator, etc.
  • the information provision requesting unit 403 displays information as shown in FIG. 25 on a display or the like.
  • the server device 10 may also send the biometric information to the investigation agency terminal 60.
  • the information provision requesting unit 403 of the investigative agency terminal 60 may perform a display including the received biometric information (facial image) (see FIG. 26).
  • the server device 10 can provide various information registered in the dangerous goods management database to investigative agencies and the like. Specifically, upon receiving a distribution route information provision request including an object fingerprint acquired from an object (leftover item), the server device 10 performs object authentication to determine the distribution route corresponding to the object fingerprint included in the distribution route information provision request. Identify. The server device 10 notifies the source (investigative agency terminal 60) of the distribution route information provision request of the identified distribution route. In this way, the dangerous goods management system according to the second embodiment can provide investigative agencies with information about the factory where the bullets, etc. were manufactured, their distribution routes, etc. regarding bullets and guns left at crime scenes.
  • FIG. 27 is a diagram illustrating an example of the hardware configuration of the server device 10.
  • the server device 10 can be configured by an information processing device (so-called computer), and has the configuration illustrated in FIG. 27.
  • the server device 10 includes a processor 311, a memory 312, an input/output interface 313, a communication interface 314, and the like.
  • the components such as the processor 311 are connected by an internal bus or the like and are configured to be able to communicate with each other.
  • the configuration shown in FIG. 27 is not intended to limit the hardware configuration of the server device 10.
  • the server device 10 may include hardware that is not shown, and may not include the input/output interface 313 if necessary.
  • the number of processors 311 and the like included in the server device 10 is not limited to the example shown in FIG. 27; for example, a plurality of processors 311 may be included in the server device 10.
  • the processor 311 is, for example, a programmable device such as a CPU (Central Processing Unit), an MPU (Micro Processing Unit), or a DSP (Digital Signal Processor). Alternatively, the processor 311 may be a device such as an FPGA (Field Programmable Gate Array) or an ASIC (Application Specific Integrated Circuit). The processor 311 executes various programs including an operating system (OS).
  • OS operating system
  • the memory 312 is a RAM (Random Access Memory), a ROM (Read Only Memory), an HDD (Hard Disk Drive), an SSD (Solid State Drive), or the like.
  • the memory 312 stores OS programs, application programs, and various data.
  • the input/output interface 313 is an interface for a display device or input device (not shown).
  • the display device is, for example, a liquid crystal display.
  • the input device is, for example, a device such as a keyboard or a mouse that receives user operations.
  • the communication interface 314 is a circuit, module, etc. that communicates with other devices.
  • the communication interface 314 includes a NIC (Network Interface Card).
  • the functions of the server device 10 are realized by various processing modules.
  • the processing module is realized, for example, by the processor 311 executing a program stored in the memory 312. Further, the program can be recorded on a computer-readable storage medium.
  • the storage medium can be non-transitory, such as a semiconductor memory, a hard disk, a magnetic recording medium, an optical recording medium, etc. That is, the present invention can also be implemented as a computer program product.
  • the above program can be updated via a network or by using a storage medium that stores the program.
  • the processing module may be realized by a semiconductor chip.
  • the seller terminal 50 and the like can also be configured by an information processing device in the same way as the server device 10, and the basic hardware configuration thereof is not different from the server device 10, so a description thereof will be omitted.
  • the server device 10 which is an information processing device, is equipped with a computer, and the functions of the server device 10 can be realized by having the computer execute a program. Further, the server device 10 executes the control method for the server device 10 using the program.
  • the operation of the dangerous goods management system was explained using guns and bullets as examples of dangerous goods.
  • the hazardous materials targeted by the hazardous materials management system may be either guns or bullets.
  • the distribution company terminal 40 of the distribution company transmits a "dangerous goods distribution notification" to the server device 10 in order to register the distribution route of the dangerous goods in the system.
  • the distribution business terminal 40 does not need to send the dangerous goods distribution notification to the server device 10.
  • gun manufacturers and bullet manufacturers can do so without sending dangerous goods identification information (gun serial number, bullet case case ID) to the server device 10. good. That is, the serial number of a gun and the case ID of a bullet case are not essential information for identifying the owner of a dangerous object.
  • the server device 10 requests an external server to make a determination using a blacklist.
  • the server device 10 may perform the determination using the blacklist.
  • the server device 10 does not need to perform determination using a blacklist.
  • the server device 10 may notify the seller terminal 50 of the reason for the sale of the dangerous goods being determined to be “not possible”. Specifically, the server device 10 may notify the seller terminal 50 of the reason why the product is determined to be unsaleable, such as "failed to verify identity” or "listed on a blacklist.” Alternatively, if the person who wishes to purchase dangerous goods is a person listed on the blacklist, the server device 10 stores information about the person who wishes to purchase dangerous goods (for example, name) and information about the purchasing agent (for example, store name and location) may be notified to the police, etc.
  • the server device 10 stores information about the person who wishes to purchase dangerous goods (for example, name) and information about the purchasing agent (for example, store name and location) may be notified to the police, etc.
  • an investigator or the like of an investigative agency may input the serial number into the investigative agency terminal 60.
  • the investigative agency terminal 60 may transmit a request for providing owner information including the serial number of the gun to the server device 10.
  • the server device 10 may search the gun management database using the serial number as a key, and transmit the owner identification information of the corresponding entry to the investigating agency terminal 60.
  • the investigative agency can identify the owner of the gun by sending the object fingerprint obtained from the gun left behind to the server device 10. You can know.
  • a gun management database and a bullet management database are configured inside the server device 10, but these databases may be configured in an external database server or the like. That is, some functions of the server device 10 may be implemented in another server. More specifically, if the above-mentioned "dangerous goods sales control section (dangerous goods sales control means)", “information provision control section (information provision control means)”, etc. are implemented in any of the devices included in the system. That's fine.
  • each device for example, the server device 10 and the seller terminal 50
  • the data transmitted and received between these devices may be encrypted.
  • Biometric information and the like are transmitted and received between these devices, and in order to appropriately protect this information, it is desirable that encrypted data be transmitted and received.
  • each embodiment may be used alone or in combination.
  • the present invention is suitably applicable to a dangerous goods management system that manages dangerous goods such as guns and bullets.
  • owner information provision request including an object fingerprint acquired from an object
  • object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints.
  • a server device comprising: [Additional note 2] A request to determine whether or not a sale is possible is received from a terminal of a sales business operator, which includes the identification documents of a person wishing to purchase dangerous goods and the biometric information acquired from the person wishing to purchase said dangerous goods, and the biometric information written in the said identity verification documents is received from a terminal of a sales business. and dangerous goods sales control that allows the sales business to sell the dangerous goods to the person who wishes to purchase the dangerous goods if the identity verification using biometric information obtained from the person who wishes to purchase the dangerous goods is successful.
  • the server device according to supplementary note 1, further comprising means.
  • the dangerous goods sales control means succeeds in the identity verification when one-on-one matching using the biometric information written in the identity verification document and the biometric information obtained from the person wishing to purchase the dangerous goods is successful.
  • the server device which determines that the server device has [Additional note 4]
  • the dangerous goods sales control means if the identity of the person wishing to purchase the dangerous goods has been successfully verified and the person wishing to purchase the dangerous goods is not listed on a blacklist as a person who cannot purchase dangerous goods,
  • the server device according to appendix 3, which allows a sales business to sell dangerous goods to a person who wishes to purchase the dangerous goods.
  • the dangerous goods sales control means sends biometric information of the person who wishes to purchase the dangerous goods to the server having the blacklist, so that the person who wishes to purchase the dangerous goods is included in the blacklist as a person who cannot purchase the dangerous goods.
  • the server device according to supplementary note 4 which makes an inquiry as to whether or not the server device is listed in .
  • the server device according to appendix 5 wherein the storage means stores owner identification information and object fingerprints regarding each of the plurality of dangerous objects in a dangerous object management database.
  • Receive dangerous goods identification information that identifies a manufactured dangerous object and an object fingerprint of the manufactured dangerous object from a manufacturer's terminal, and store the received dangerous goods identification information and object fingerprint in the dangerous goods management database.
  • the server device further comprising dangerous goods production management means.
  • the dangerous goods identification information of the dangerous goods to be distributed and the distribution route of the dangerous goods to be distributed are received from a terminal of a distributor, and the dangerous goods management is performed using the dangerous goods identification information of the dangerous goods to be distributed.
  • the server device according to appendix 7, further comprising a dangerous goods distribution management means that stores a distribution route of the dangerous goods to be distributed in an entry specified by searching a database.
  • the information provision control means receives a distribution route information provision request including an object fingerprint acquired from the object, the information provision control means identifies the distribution route corresponding to the object fingerprint included in the distribution route information provision request by the object authentication.
  • the server device according to appendix 8, wherein the server device notifies the transmission source of the distribution route information provision request of the identified distribution route.
  • the server device according to any one of Supplementary Notes 1 to 9, wherein the dangerous substance is a gun or a bullet.
  • the biometric information is a facial image or a feature amount generated from the facial image.
  • An investigative agency terminal a server device; including; The server device includes: storage means for storing owner identification information for identifying the owner and object fingerprints in association with each other for each of the plurality of dangerous objects;
  • owner information provision request including an object fingerprint obtained from the object
  • object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints.
  • an information provision control means that specifies the owner identification information corresponding to the object fingerprint included in the owner information provision request and notifies the identified owner identification information to the investigative agency terminal; A system equipped with.
  • a method for controlling a server device comprising: identifying the owner specifying information corresponding to an object fingerprint included in an owner information providing request, and notifying a transmission source of the owner information providing request of the specified owner specifying information.

Landscapes

  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Provided is a server device that contributes to facilitating the identification of the owner of a hazardous object. The server device is provided with a storing means and an information provision control means. The storing means stores, for each of a plurality of hazardous objects, the following in mutual association: owner-identifying information for identifying owners; and object fingerprints. When an owner information provision request including an object fingerprint acquired from an object is received, the information provision control means executes an object authentication using the object fingerprint included in the owner information provision request and a plurality of stored object fingerprints. By executing the object authentication, the information provision control means identifies the owner-identifying information corresponding to the object fingerprint included in the owner information provision request, and notifies the sender of the owner information provision request about the identified owner-identifying information.

Description

サーバ装置、システム、サーバ装置の制御方法及び記憶媒体Server device, system, control method for server device, and storage medium
 本発明は、サーバ装置、システム、サーバ装置の制御方法及び記憶媒体に関する。 The present invention relates to a server device, a system, a control method for a server device, and a storage medium.
 銃の管理に関する技術や犯罪に使われた弾丸の鑑定に関する技術が存在する。 There are technologies related to gun management and identification of bullets used in crimes.
 例えば、特許文献1には、銃砲の使用等に関する記録を確実に管理し、使用許可者がその記録を簡便に確認することができる技術を提供する、と記載されている。特許文献1の所持許可申請情報管理システムは、記憶部と、情報入力受付部と、所持許可申請情報更新部と、情報出力部と、を備える。記憶部は、銃砲所持許可者の識別情報と、銃砲所持許可者が所持する銃砲の識別情報と、銃砲所持許可者が銃砲を使用した日付、場所、及び用途を含む使用記録情報とが対応付けられたものである、所持許可申請情報を保持する。情報入力受付部は、銃砲所持許可者の識別情報と、銃砲の識別情報及び/又は使用記録情報との入力を受け付ける。所持許可申請情報更新部は、情報入力受付部により受け付けられた銃砲所持許可者の識別情報に対応する所持許可申請情報を、情報入力受付部により受け付けられた銃砲の識別情報及び/又は使用記録情報により更新して記憶部に保存する。情報出力部は、所定の入力操作に基づいて所持許可申請情報を出力する。 For example, Patent Document 1 states that it provides a technology that reliably manages records related to the use of firearms, etc., and allows a licensee to easily confirm the records. The possession permission application information management system of Patent Document 1 includes a storage section, an information input reception section, a possession permission application information updating section, and an information output section. The storage unit associates the identification information of the person licensed to possess a firearm, the identification information of the firearm owned by the person licensed to possess a firearm, and usage record information including the date, place, and purpose of use of the firearm by the person licensed to possess a firearm. retains possession permit application information that has been submitted. The information input reception unit receives input of identification information of a person licensed to possess a firearm, and identification information and/or usage record information of the firearm. The possession permit application information updating unit updates the possession permit application information corresponding to the identification information of the person with firearm possession permission received by the information input reception unit into the firearm identification information and/or use record information received by the information input reception unit. is updated and saved in the storage unit. The information output unit outputs possession permit application information based on a predetermined input operation.
 特許文献2には、銃器から発射された弾丸の異同識別を行うに当たり、鑑定員による鑑定作業の習熟度の影響を極力排除し、正確な異同識別を効率的に実現する、と記載されている。特許文献2は、検査対象の弾丸を発射した拳銃と比較対象の弾丸を発射した拳銃との異同を識別する方法及びその装置を開示する。当該文献の方法は、検査対象の弾丸を撮像して弾丸の画像を画像取得手段で取得し、取得した画像において検査対象の弾丸の表面のきずなどの特徴を顕在化するための強調処理を画像処理手段で施す。さらに、当該文献の方法は、強調処理を施した画像と予め記憶されていた比較対象の弾丸の画像に強調処理を施した画像との間の類似性を演算手段で算出し、算出した画像間の類似性に関する情報と比較対象の二つの弾丸の画像とを画面上に出力する。 Patent Document 2 states that when identifying the difference between bullets fired from a firearm, the influence of the proficiency level of the appraisal work by the appraiser is eliminated as much as possible, and accurate discrimination is efficiently realized. . Patent Document 2 discloses a method and an apparatus for identifying the difference between a handgun that fired a bullet to be tested and a handgun that fired a bullet to be compared. The method in this document involves imaging a bullet to be inspected, acquiring an image of the bullet using an image acquisition means, and applying an enhancement process to make surface features such as flaws on the surface of the bullet to be inspected apparent in the acquired image. Apply by treatment means. Furthermore, the method of the document uses a calculation means to calculate the similarity between an image that has been subjected to enhancement processing and an image that has been subjected to enhancement processing on a pre-stored image of a comparison target bullet, and then Information regarding the similarity of the two bullets and images of the two bullets to be compared are output on the screen.
特開2021-111369号公報JP 2021-111369 Publication 特開2013-210690号公報JP2013-210690A
 銃が犯罪に使われることがある。この場合、犯罪現場に残された弾丸が遺留品として回収されることがある。遺留品である弾丸を用いて捜査が行われるが、現状では弾丸の所有者を特定する方法がない。他の危険物でも同様であり、犯罪現場に残された遺留品の所有者を特定することは困難な場合が多い。 Guns are sometimes used in crimes. In this case, bullets left at the crime scene may be recovered as artifacts. An investigation is being conducted using the bullet that was left behind, but there is currently no way to identify the owner of the bullet. The same is true for other dangerous objects, and it is often difficult to identify the owner of items left at a crime scene.
 この点、特許文献1や特許文献2に開示された技術を適用しても上記問題を解決できない。特許文献1は、銃の管理に関する技術を開示することに留まり、特許文献2は、弾丸の異同識別に関する技術を開示することに留まるためである。 In this regard, even if the techniques disclosed in Patent Document 1 and Patent Document 2 are applied, the above problem cannot be solved. This is because Patent Document 1 is limited to disclosing a technology related to gun management, and Patent Document 2 is limited to disclosing a technology related to differentiating bullets.
 本発明は、危険物の所有者の特定を容易にすることに寄与する、サーバ装置、システム、サーバ装置の制御方法及び記憶媒体を提供することを主たる目的とする。 The main object of the present invention is to provide a server device, a system, a control method for a server device, and a storage medium that contribute to making it easier to identify the owner of a dangerous object.
 本発明の第1の視点によれば、複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する、記憶手段と、物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する、情報提供制御手段と、を備える、サーバ装置が提供される。 According to a first aspect of the present invention, the storage means stores the object fingerprint in association with the owner identification information for identifying the owner for each of the plurality of dangerous objects, and the object fingerprint acquired from the object is included. When an owner information provision request is received, object authentication using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints is performed to authenticate the object included in the owner information provision request. A server device is provided, comprising: information provision control means that identifies the owner identification information corresponding to a fingerprint and notifies the identified owner identification information to a source of the owner information provision request. .
 本発明の第2の視点によれば、捜査機関端末と、サーバ装置と、を含み、前記サーバ装置は、複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する、記憶手段と、物体から取得された物体指紋を含む所有者情報提供要求を前記捜査機関端末から受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記捜査機関端末に通知する、情報提供制御手段と、を備える、システムが提供される。 According to a second aspect of the present invention, the server device includes an investigative agency terminal and a server device, and the server device associates owner identification information that identifies the owner with object fingerprints for each of a plurality of dangerous objects. a storage means for storing the object fingerprints acquired from the object; and upon receiving an owner information provision request including the object fingerprint acquired from the object from the investigative agency terminal, the object fingerprint included in the owner information provision request and the plurality of stored objects; By executing object authentication using a fingerprint, the owner identification information corresponding to the object fingerprint included in the owner information provision request is identified, and the identified owner identification information is notified to the investigation agency terminal. A system is provided, comprising: an information provision control means.
 本発明の第3の視点によれば、サーバ装置において、複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶し、物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する、サーバ装置の制御方法が提供される。 According to the third aspect of the present invention, in the server device, owner identification information for identifying the owner and object fingerprints are stored in association with each other for each of a plurality of dangerous objects, and the object fingerprints acquired from the objects are stored. When an owner information provision request is received, object authentication using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints is performed to authenticate the object included in the owner information provision request. A method of controlling a server device is provided, which specifies the owner specifying information corresponding to a fingerprint and notifies the source of the owner information provision request of the specified owner specifying information.
 本発明の第4の視点によれば、サーバ装置に搭載されたコンピュータに、複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する処理と、物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する処理と、を実行させるためのプログラムを記憶する、コンピュータ読取可能な記憶媒体が提供される。 According to the fourth aspect of the present invention, a computer installed in a server device stores a process of associating and storing owner identification information for identifying an owner and an object fingerprint for each of a plurality of dangerous objects; When an owner information provision request including the acquired object fingerprint is received, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints, thereby identifying the owner. A program for executing a process of identifying the owner identifying information corresponding to the object fingerprint included in the information provision request and notifying the identified owner identifying information to the source of the owner information providing request. A computer-readable storage medium is provided that stores.
 本発明の各視点によれば、危険物の所有者の特定を容易にすることに寄与する、サーバ装置、システム、サーバ装置の制御方法及び記憶媒体が提供される。なお、本発明の効果は上記に限定されない。本発明により、当該効果の代わりに、又は当該効果と共に、他の効果が奏されてもよい。 According to each aspect of the present invention, there are provided a server device, a system, a control method for the server device, and a storage medium that contribute to making it easier to identify the owner of a dangerous object. Note that the effects of the present invention are not limited to the above. According to the present invention, other effects may be achieved instead of or in addition to the above effects.
図1は、一実施形態の概要を説明するための図である。FIG. 1 is a diagram for explaining an overview of one embodiment. 図2は、一実施形態の動作を示すフローチャートである。FIG. 2 is a flowchart illustrating the operation of one embodiment. 図3は、第1の実施形態に係る危険物管理システムの概略構成の一例を示す図である。FIG. 3 is a diagram showing an example of a schematic configuration of the hazardous materials management system according to the first embodiment. 図4は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 4 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図5は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 5 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図6は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 6 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図7は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 7 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図8は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 8 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図9は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 9 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図10は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 10 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図11は、第1の実施形態に係る危険物管理システムの動作を説明するための図である。FIG. 11 is a diagram for explaining the operation of the hazardous materials management system according to the first embodiment. 図12は、第1の実施形態に係るサーバ装置の処理構成の一例を示す図である。FIG. 12 is a diagram illustrating an example of a processing configuration of the server device according to the first embodiment. 図13は、第1の実施形態に係る銃管理データベースの一例を示す図である。FIG. 13 is a diagram illustrating an example of the gun management database according to the first embodiment. 図14は、第1の実施形態に係る弾丸管理データベースの一例を示す図である。FIG. 14 is a diagram showing an example of the bullet management database according to the first embodiment. 図15は、第1の実施形態に係る危険物販売制御部の動作の一例を示すフローチャートである。FIG. 15 is a flowchart showing an example of the operation of the dangerous goods sales control section according to the first embodiment. 図16は、第1の実施形態に係る情報提供制御部の動作の一例を示すフローチャートである。FIG. 16 is a flowchart illustrating an example of the operation of the information provision control unit according to the first embodiment. 図17は、第1の実施形態に係る販売者端末の処理構成の一例を示す図である。FIG. 17 is a diagram illustrating an example of the processing configuration of the seller terminal according to the first embodiment. 図18は、第1の実施形態に係る捜査機関端末の処理構成の一例を示す図である。FIG. 18 is a diagram illustrating an example of a processing configuration of the investigative agency terminal according to the first embodiment. 図19は、第1の実施形態に係る危険物管理システムの動作の一例を示すシーケンス図である。FIG. 19 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment. 図20は、第1の実施形態に係る危険物管理システムの動作の一例を示すシーケンス図である。FIG. 20 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment. 図21は、第1の実施形態の変形例に係る弾丸ケース管理データベースの一例を示す図である。FIG. 21 is a diagram illustrating an example of a bullet case management database according to a modification of the first embodiment. 図22は、第1の実施形態の変形例にサーバ装置の処理構成の一例を示す図である。FIG. 22 is a diagram illustrating an example of a processing configuration of a server device according to a modification of the first embodiment. 図23は、第1の実施形態の変形例に係る弾丸物体指紋管理データベースの一例を示す図である。FIG. 23 is a diagram illustrating an example of a bullet object fingerprint management database according to a modification of the first embodiment. 図24は、第2の実施形態に係る捜査機関端末の表示の一例を示す図である。FIG. 24 is a diagram illustrating an example of a display on an investigative agency terminal according to the second embodiment. 図25は、第2の実施形態に係る捜査機関端末の表示の一例を示す図である。FIG. 25 is a diagram illustrating an example of a display on an investigative agency terminal according to the second embodiment. 図26は、第2の実施形態に係る捜査機関端末の表示の一例を示す図である。FIG. 26 is a diagram illustrating an example of a display on an investigative agency terminal according to the second embodiment. 図27は、本願開示に係るサーバ装置のハードウェア構成の一例を示す図である。FIG. 27 is a diagram illustrating an example of the hardware configuration of a server device according to the present disclosure.
 はじめに、一実施形態の概要について説明する。なお、この概要に付記した図面参照符号は、理解を助けるための一例として各要素に便宜上付記したものであり、この概要の記載はなんらの限定を意図するものではない。また、特段の釈明がない場合には、各図面に記載されたブロックはハードウェア単位の構成ではなく、機能単位の構成を表す。各図におけるブロック間の接続線は、双方向及び単方向の双方を含む。一方向矢印については、主たる信号(データ)の流れを模式的に示すものであり、双方向性を排除するものではない。なお、本明細書及び図面において、同様に説明されることが可能な要素については、同一の符号を付することにより重複説明が省略され得る。 First, an overview of one embodiment will be described. Note that the drawing reference numerals added to this summary are added to each element for convenience as an example to aid understanding, and the description of this summary is not intended to be limiting in any way. Furthermore, unless otherwise specified, the blocks depicted in each drawing represent the configuration of functional units rather than the configuration of hardware units. Connection lines between blocks in each figure include both bidirectional and unidirectional connections. The unidirectional arrows schematically indicate the main signal (data) flow, and do not exclude bidirectionality. Note that, in this specification and the drawings, elements that can be explained in the same manner may be designated by the same reference numerals, so that redundant explanation can be omitted.
 一実施形態に係るサーバ装置100は、記憶手段101と、情報提供制御手段102と、を備える(図1参照)。記憶手段101は、複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する(図2のステップS1)。情報提供制御手段102は、物体から取得された物体指紋を含む所有者情報提供要求を受信すると、所有者情報提供要求に含まれる物体指紋と記憶された複数の物体指紋を用いた物体認証を実行する(ステップS2)。情報提供制御手段102は、物体認証を実行することで、所有者情報提供要求に含まれる物体指紋に対応する所有者特定情報を特定し、当該特定された所有者特定情報を所有者情報提供要求の送信元に通知する(ステップS3)。 The server device 100 according to one embodiment includes a storage unit 101 and an information provision control unit 102 (see FIG. 1). The storage unit 101 stores owner identification information for identifying the owner and object fingerprints in association with each other for each of a plurality of dangerous objects (step S1 in FIG. 2). When the information provision control unit 102 receives an owner information provision request including an object fingerprint acquired from the object, it executes object authentication using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. (Step S2). The information provision control means 102 specifies the owner identification information corresponding to the object fingerprint included in the owner information provision request by executing object authentication, and uses the identified owner identification information in the owner information provision request. The sender is notified (step S3).
 物体指紋は、物体(工業製品である危険物)を一意に特定可能な識別情報として用いることができる。サーバ装置100は、危険物の所有者を特定するための情報(例えば、氏名及び住所)と物体指紋を対応付けて記憶する。サーバ装置100は、捜査機関等から物体(遺留品)の物体指紋を取得すると、当該取得した物体指紋に対応する所有者特定情報を特定する。サーバ装置100は、特定した所有者特定情報(例えば、遺留品の所有者の氏名及び住所)を操作機関等に通知する。このように、サーバ装置100は、危険物の物体指紋を用いることで、危険物の所有者の特定を容易に行える。 An object fingerprint can be used as identification information that can uniquely identify an object (hazardous industrial product). The server device 100 stores information for identifying the owner of the dangerous object (for example, name and address) and the object fingerprint in association with each other. When the server device 100 acquires an object fingerprint of an object (remained belongings) from an investigation agency or the like, it specifies owner identification information corresponding to the acquired object fingerprint. The server device 100 notifies the operating organization or the like of the identified owner identification information (for example, the name and address of the owner of the belongings left behind). In this way, the server device 100 can easily identify the owner of the dangerous object by using the object fingerprint of the dangerous object.
 以下に具体的な実施形態について、図面を参照してさらに詳しく説明する。 Specific embodiments will be described in more detail below with reference to the drawings.
[第1の実施形態]
 第1の実施形態について、図面を用いてより詳細に説明する。
[First embodiment]
The first embodiment will be described in more detail using the drawings.
 第1の実施形態に係る危険物管理システムは、危険物の所有者等を管理するシステムである。例えば、第1の実施形態に係る危険物管理システムは、銃、弾丸(弾薬)、刀剣、劇薬等の購入者による身分証明書の提示がなければ購入できない危険物を管理の対象とする。 The dangerous goods management system according to the first embodiment is a system that manages the owners of dangerous goods. For example, the dangerous goods management system according to the first embodiment manages dangerous goods such as guns, bullets (ammunition), swords, and powerful drugs that cannot be purchased without the purchaser presenting an identification card.
 第1の実施形態では、銃及び弾丸を危険物の例にとり危険物管理システムの構成、動作等を説明する。ただし、本願開示に係る危険物管理システムの管理対象は銃又は弾丸に限定されないことは勿論である。 In the first embodiment, the configuration, operation, etc. of a dangerous goods management system will be explained using guns and bullets as examples of dangerous goods. However, it goes without saying that the objects to be managed by the dangerous goods management system according to the present disclosure are not limited to guns or bullets.
[システムの構成]
 図3に示すように、第1の実施形態に係る危険物管理システム(情報処理システム)には、管理センターと、複数の事業者と、捜査機関と、が含まれる。
[System configuration]
As shown in FIG. 3, the dangerous goods management system (information processing system) according to the first embodiment includes a management center, a plurality of businesses, and an investigation agency.
 管理センターは、危険物(銃、弾丸)の製造元、流通経路等の管理を行う。管理センターは、国の行政機関又は国から委託された民間企業により運営される。管理センターは、危険物の購入希望者を審査したり、危険物を購入した人物の情報を管理したりする。また、管理センターは、捜査機関(警察、検察等)からの要請に応じて犯罪捜査に協力する。 The management center manages the manufacturers, distribution routes, etc. of dangerous goods (guns, bullets). The management center is operated by a national administrative agency or a private company commissioned by the government. The management center screens applicants for purchasing dangerous goods and manages information on people who have purchased dangerous goods. The management center also cooperates in criminal investigations in response to requests from investigative agencies (police, prosecutors, etc.).
 管理センターは、サーバ装置10を備える。サーバ装置10は、管理センターの主たる業務を担うサーバである。サーバ装置10は、管理センターの建物に設置されていてもよいし、ネットワーク上(クラウド上)に設置されていてもよい。 The management center includes a server device 10. The server device 10 is a server that handles the main operations of the management center. The server device 10 may be installed in a building of a management center, or may be installed on a network (on a cloud).
 危険物管理システムの事業者として、危険物の製造業者(銃製造業者、弾丸製造業者)、危険物の流通を事業とする流通事業者、危険物を販売する販売業者等が例示される。 Examples of businesses operating hazardous materials management systems include manufacturers of hazardous materials (gun manufacturers, bullet manufacturers), distribution businesses that distribute hazardous materials, and distributors that sell hazardous materials.
 捜査機関は、上述のように、警察、検察等の公的機関である。 As mentioned above, the investigating agency is a public agency such as the police or prosecutor's office.
 図3には図示していないが、危険物管理システムの事業者、捜査機関は、サーバや端末等の情報処理装置を有している。危険物管理システムに含まれる各装置は相互に接続されている。具体的には、サーバ装置10と事業者の端末等は、有線又は無線の通信手段により接続され、相互に通信が可能となるように構成されている。 Although not shown in FIG. 3, hazardous materials management system operators and investigative agencies have information processing devices such as servers and terminals. Each device included in the hazardous materials management system is interconnected. Specifically, the server device 10 and the operator's terminal etc. are connected by wired or wireless communication means and are configured to be able to communicate with each other.
 図3に示す危険物管理システムの構成は例示であって、その構成を限定する趣旨ではない。例えば、危険物管理システムには複数のサーバ装置10が含まれていてもよい。 The configuration of the hazardous materials management system shown in FIG. 3 is an example, and is not intended to limit the configuration. For example, a dangerous goods management system may include a plurality of server devices 10.
[概略動作]
 続いて、第1の実施形態に係る危険物管理システムの概略動作について説明する。
[Overview of operation]
Next, the general operation of the hazardous materials management system according to the first embodiment will be described.
<銃の製造>
 銃製造業者の製造工場において、製品の品質チェックが終了した銃から「物体指紋」が採取される。なお、物体指紋は、製品とは非接触で取得されるので製品(銃)の品質に影響を与えない。
<Gun manufacturing>
At a gun manufacturer's manufacturing plant, "object fingerprints" are taken from guns that have undergone product quality checks. Note that since the object fingerprint is acquired without contacting the product, it does not affect the quality of the product (gun).
 物体指紋は、製品(物体)ごとに固有な紋様(図形パターン、紋様パターン)である。より詳細には、物体指紋は、製品のデザイン等ではなく、個々の製品に特有な色むら、凹凸、または微小な傷などである。物体指紋は製品ごとに固有な情報であるので、同じ製品から取得された物体指紋は一致(実質的に一致)する。即ち、物体指紋は、製造物である銃を一意に識別可能なIDとして機能する。 Object fingerprints are patterns (graphic patterns, pattern patterns) that are unique to each product (object). More specifically, the object fingerprint is not the design of the product, but the uneven color, unevenness, minute scratches, etc. that are unique to each individual product. Since the object fingerprint is unique information for each product, object fingerprints obtained from the same product match (substantially match). That is, the object fingerprint functions as an ID that can uniquely identify the manufactured gun.
 図4に示すように、銃製造業者の製造ラインには、銃製造管理端末20と、カメラ付き顕微鏡21と、が含まれる。カメラ付き顕微鏡21と銃製造管理端末20は、有線又は無線の通信手段により接続されている。 As shown in FIG. 4, the gun manufacturer's production line includes a gun manufacturing management terminal 20 and a camera-equipped microscope 21. The camera-equipped microscope 21 and the gun manufacturing management terminal 20 are connected by wired or wireless communication means.
 物体指紋は、適切な照明条件で拡大した対象物を撮影することで取得される。具体的には、銃製造ラインの作業者は、銃製造管理端末20を介してカメラ付き顕微鏡21を操作する。カメラ付き顕微鏡21は、銃の予め定められた領域(図4の黒色領域)を撮影し、画像データを銃製造管理端末20に送信する。 Object fingerprints are obtained by photographing an enlarged object under appropriate lighting conditions. Specifically, a worker on the gun manufacturing line operates the camera-equipped microscope 21 via the gun manufacturing management terminal 20 . The camera-equipped microscope 21 photographs a predetermined area of the gun (the black area in FIG. 4) and transmits the image data to the gun manufacturing management terminal 20.
 銃製造管理端末20は、取得した画像データから物体指紋を取得(生成、抽出)する。例えば、銃製造管理端末20は、画像データに所定のフィルタや補正等を施すことで物体指紋を生成する。なお、物体指紋の取得に関し、既存の技術を使用することができるので、より詳細な説明を省略する。 The gun manufacturing management terminal 20 acquires (generates and extracts) an object fingerprint from the acquired image data. For example, the gun manufacturing management terminal 20 generates an object fingerprint by applying a predetermined filter, correction, etc. to image data. Note that since existing technology can be used to obtain the object fingerprint, a more detailed explanation will be omitted.
 上述のように、物体指紋は、製品を一意に識別可能とするIDとして機能することから、長期間(理想的には永久に)不変であることが望ましい。そこで、銃製造業者は、物体指紋が容易に変わることない箇所から当該物体指紋を取得するのが望ましい。例えば、グリップの底から物体指紋が取得されたり、銃に付属するプレート等から物体指紋が取得されたりするのが好ましい。 As mentioned above, since an object fingerprint functions as an ID that allows a product to be uniquely identified, it is desirable that it remains unchanged for a long period of time (ideally, forever). Therefore, it is desirable for gun manufacturers to obtain the object fingerprint from a location where the object fingerprint does not change easily. For example, it is preferable that the object fingerprint be obtained from the bottom of the grip or from a plate attached to the gun.
 物体指紋が採取されると、作業者は、当該物体指紋が採取された銃のシリアル番号を銃製造管理端末20に入力する。例えば、作業者は、銃に打刻されたシリアル番号を読み取り、当該読み取ったシリアル番号を銃製造管理端末20に入力する。あるいは、作業者は、銃製造管理端末20を介してカメラ(図4に図示せず)を操作し、シリアル番号を撮影する。銃製造管理端末20は、シリアル番号が映る画像データを解析することでシリアル番号を取得してもよい。 When the object fingerprint is taken, the operator inputs the serial number of the gun from which the object fingerprint was taken into the gun manufacturing control terminal 20. For example, an operator reads a serial number stamped on a gun and inputs the read serial number into the gun manufacturing control terminal 20. Alternatively, the operator operates a camera (not shown in FIG. 4) via the gun manufacturing control terminal 20 to photograph the serial number. The gun manufacturing control terminal 20 may acquire the serial number by analyzing image data showing the serial number.
 シリアル番号が入力されると、銃製造管理端末20は、製造された銃の物体指紋(以下、銃物体指紋と表記する)、シリアル番号、事業者ID(製造者ID)を含む製造銃情報通知をサーバ装置10に送信する。 When the serial number is input, the gun manufacturing management terminal 20 sends a manufactured gun information notification including the manufactured gun's object fingerprint (hereinafter referred to as gun object fingerprint), serial number, and business ID (manufacturer ID). is transmitted to the server device 10.
 事業者IDは、危険物管理システムに含まれる事業者を識別するためのIDである。事業者IDには、任意の識別情報を用いることができる。事業者IDは、管理センター及び各事業者の間において任意の方法によって共有される。例えば、システム管理者が事業者IDを決定し当該決定された事業者IDを各事業者に通知する。 The business ID is an ID for identifying a business included in the hazardous materials management system. Any identification information can be used as the business ID. The business ID is shared between the management center and each business by any method. For example, a system administrator determines a business ID and notifies each business operator of the determined business ID.
 サーバ装置10は、製造銃情報通知に含まれる事業者ID、シリアル番号、銃物体指紋を対応付けて銃管理データベースに記憶する。銃管理データベースの詳細は後述する。 The server device 10 associates the company ID, serial number, and gun object fingerprint included in the manufactured gun information notification and stores them in the gun management database. Details of the gun management database will be described later.
<弾丸の製造>
 弾丸製造業者の製造工場において、製品の品質チェックが終了した弾丸から「物体指紋」が採取される。
<Manufacture of bullets>
At a bullet manufacturer's manufacturing plant, "object fingerprints" are taken from bullets that have undergone product quality checks.
 図5に示すように、弾丸製造業者の製造ラインには、弾丸製造管理端末30と、カメラ付き顕微鏡31と、が含まれる。カメラ付き顕微鏡31と弾丸製造管理端末30は、有線又は無線の通信手段により接続されている。 As shown in FIG. 5, the bullet manufacturer's production line includes a bullet production management terminal 30 and a camera-equipped microscope 31. The camera-equipped microscope 31 and the bullet production management terminal 30 are connected by wired or wireless communication means.
 作業者は、弾丸製造管理端末30を介してカメラ付き顕微鏡31を操作し、物体指紋を生成するための画像データを取得する。あるいは、カメラ付き顕微鏡31は、ベルトコンベア等により運ばれてくる弾丸を自動的に撮影し、上記物体指紋を生成するための画像データを弾丸製造管理端末30に送信する。 The operator operates the camera-equipped microscope 31 via the bullet manufacturing management terminal 30 to obtain image data for generating object fingerprints. Alternatively, the camera-equipped microscope 31 automatically photographs a bullet carried by a belt conveyor or the like, and transmits image data for generating the object fingerprint to the bullet manufacturing management terminal 30.
 弾丸製造管理端末30は、取得した画像データから弾丸の物体指紋(以下、弾丸物体指紋と表記する)を生成し、記憶する。 The bullet manufacturing management terminal 30 generates and stores a bullet object fingerprint (hereinafter referred to as a bullet object fingerprint) from the acquired image data.
 物体指紋が採取された弾丸は、当該物体指紋が採取された順番で弾丸ケースに格納される。所定数の弾丸が弾丸ケースに格納されると(弾丸ケースが弾丸で満杯になると)、作業者は、弾丸ケースに付与されている「ケースID」を弾丸製造管理端末30に入力する。 The bullets whose object fingerprints have been taken are stored in the bullet case in the order in which the object fingerprints were taken. When a predetermined number of bullets are stored in the bullet case (when the bullet case is full of bullets), the operator inputs the "case ID" given to the bullet case into the bullet manufacturing management terminal 30.
 例えば、作業者は、弾丸ケースに付されたケースIDを読み取り、当該読み取ったケースIDを弾丸製造管理端末30に入力する。あるいは、ケースIDがバーコードや2次元バーコード等に変換されている場合には、作業者は、バーコードリーダ(図5に図示せず)を用いてケースIDを弾丸製造管理端末30に入力する。 For example, the operator reads the case ID attached to the bullet case and inputs the read case ID into the bullet manufacturing management terminal 30. Alternatively, if the case ID has been converted into a barcode, two-dimensional barcode, etc., the operator inputs the case ID into the bullet manufacturing management terminal 30 using a barcode reader (not shown in FIG. 5). do.
 ケースIDを取得すると、弾丸製造管理端末30は、弾丸製造業者の事業者ID、ケースID、当該ケースIDに対応する弾丸ケースに格納された少なくとも1以上の弾丸物体指紋を含む「製造弾丸情報通知」をサーバ装置10に送信する。例えば、1つの弾丸ケースに100発の弾丸が格納される場合には、1つのケースID及び100個の弾丸物体指紋を含む製造弾丸情報通知がサーバ装置10に送信される。 Upon acquiring the case ID, the bullet manufacturing management terminal 30 sends a "manufactured bullet information notification" that includes the bullet manufacturer's business ID, the case ID, and at least one bullet object fingerprint stored in the bullet case corresponding to the case ID. ” to the server device 10. For example, when 100 bullets are stored in one bullet case, a manufacturing bullet information notification including one case ID and 100 bullet object fingerprints is transmitted to the server device 10.
 サーバ装置10は、製造弾丸情報通知に含まれる事業者ID、ケースID、少なくとも1以上の弾丸物体指紋を対応付けて弾丸管理データベースに記憶する。弾丸管理データベースの詳細は後述する。 The server device 10 associates the business ID, case ID, and at least one bullet object fingerprint included in the manufactured bullet information notification and stores them in the bullet management database. Details of the bullet management database will be described later.
<危険物の流通>
 危険物(銃、弾丸)を取り扱う流通事業者は、当該危険物の流通経路を管理センターに報告する必要がある。危険物(銃、弾丸)を仕入れると、流通事業者は、当該危険物を特定する情報を入力する(図6、図7参照)。
<Distribution of dangerous goods>
Distribution businesses that handle dangerous goods (guns, bullets) are required to report the distribution route of the dangerous goods to the control center. When purchasing dangerous goods (guns, bullets), the distribution business enters information identifying the dangerous goods (see FIGS. 6 and 7).
 例えば、図6に示すように、流通事業者が銃を仕入れた場合には、作業者は、銃のシリアル番号を流通事業者端末40に入力する。図7に示すように、流通事業者が弾丸を仕入れた場合には、作業者は、弾丸ケースのケースIDを流通事業者端末40に入力する。 For example, as shown in FIG. 6, when a distribution company purchases a gun, an operator inputs the serial number of the gun into the distribution company terminal 40. As shown in FIG. 7, when a distribution company purchases bullets, an operator inputs the case ID of the bullet case into the distribution company terminal 40.
 また、危険物を仕入れた場合、流通事業者は、当該危険物の仕入れ先と販売先を特定する情報(例えば、仕入れ先と販売先の事業者ID)を流通事業者端末40に入力する。 Furthermore, when purchasing hazardous materials, the distribution business enters into the distribution business terminal 40 information that identifies the supplier and sales destination of the dangerous materials (for example, the business IDs of the supplier and sales destination).
 流通事業者端末40は、自社(流通事業者)の事業者ID、仕入れ先及び販売先の事業者ID、取り扱った危険物を特定する情報(危険物特定情報;例えば、銃のシリアル番号、弾丸ケースのケースID)を含む「危険物流通通知」をサーバ装置10に送信する。 The distribution business terminal 40 stores information such as the business ID of the company (distribution business), the business IDs of suppliers and sales destinations, and information identifying the hazardous materials handled (hazardous material identification information; for example, gun serial numbers, bullets, etc.). A "dangerous goods distribution notification" including the case ID) is sent to the server device 10.
 サーバ装置10は、危険物流通通知に含まれる危険物特定情報(銃のシリアル番号又は弾丸ケースのケースID)をキーとして対応するデータベースを検索し、流通対象の危険物(銃、弾丸)を特定する。サーバ装置10は、特定した危険物のエントリに流通経路(仕入れ先、流通事業者、販売先それぞれの事業者ID)を記憶する。 The server device 10 searches the corresponding database using the dangerous goods identification information (gun serial number or bullet case case ID) included in the dangerous goods distribution notification as a key, and identifies the dangerous goods (guns, bullets) to be distributed. do. The server device 10 stores the distribution route (business IDs of the supplier, distribution business, and sales destination) in the entry of the specified dangerous goods.
<危険物の販売>
 危険物を最終消費者に販売する販売事業者は、危険物を購入希望者に販売することの許可を管理センターから取得する必要がある(図8、図9参照)。
<Sales of dangerous goods>
A sales business that sells dangerous goods to end consumers needs to obtain permission from the management center to sell dangerous goods to those who wish to purchase them (see FIGS. 8 and 9).
 具体的には、販売事業者の店員等は、危険物の購入希望者から本人確認書類(例えば、顔画像が付された運転免許証等)を一時的に預かる。店員は、販売者端末50を操作して、購入希望者から預かった本人確認書類を撮影する。 Specifically, a store clerk at a sales business temporarily takes identification documents (for example, a driver's license with a facial image attached) from a person who wishes to purchase dangerous goods. The store clerk operates the seller terminal 50 to take a photograph of the identification document received from the prospective purchaser.
 また、店員等は、販売者端末50を操作して、危険物の購入希望者の生体情報を取得する。 Additionally, the store clerk or the like operates the seller terminal 50 to obtain biometric information of the person who wishes to purchase the dangerous goods.
 なお、生体情報には、例えば、顔、指紋、声紋、静脈、網膜、瞳の虹彩の模様(パターン)といった個人に固有の身体的特徴から計算されるデータ(特徴量)が例示される。あるいは、生体情報は、顔画像、指紋画像等の画像データであってもよい。生体情報は、利用者の身体的特徴を情報として含むものであればよい。本願開示の実施形態では、人の「顔」に関する生体情報(顔画像又は顔画像から生成された特徴量)を用いる場合について説明する。 Note that examples of biometric information include data (feature amounts) calculated from physical characteristics unique to an individual, such as a face, a fingerprint, a voice print, a vein, a retina, and a pattern of the iris of the eye. Alternatively, the biometric information may be image data such as a face image or a fingerprint image. The biometric information may be anything that includes the user's physical characteristics as information. In the embodiment disclosed herein, a case will be described in which biometric information regarding a person's "face" (a face image or a feature amount generated from a face image) is used.
 例えば、販売者端末50は、カメラを制御して購入希望者を撮影し、顔画像を取得する。 For example, the seller terminal 50 controls a camera to take a picture of the person who wishes to purchase, and obtains a facial image.
 本人確認書類と生体情報を取得すると、販売者端末50は、危険物を特定する危険物特定情報、本人確認書類(本人確認書類が映る画像データ)、生体情報(顔画像)及び販売事業者の事業者IDを含む「販売可否判定要求」をサーバ装置10に送信する。なお、上述のように、危険物特定情報は、例えば、銃のシリアル番号や弾丸ケースのケースIDである。図8に示すように、銃を販売する販売事業者は、銃のシリアル番号を販売者端末50に入力する。図9に示すように、弾丸を販売する販売事業者は、弾丸ケースのケースIDを販売者端末50に入力する。 After acquiring the identity verification documents and biometric information, the seller terminal 50 collects the dangerous goods identification information that identifies the dangerous goods, the identity verification documents (image data showing the identity verification documents), the biometric information (facial image), and the seller's information. A “sales availability determination request” including the business ID is transmitted to the server device 10. Note that, as described above, the dangerous substance identification information is, for example, the serial number of a gun or the case ID of a bullet case. As shown in FIG. 8, a sales business that sells guns inputs the serial number of the gun into the seller terminal 50. As shown in FIG. 9, a sales business that sells bullets inputs the case ID of the bullet case into the seller terminal 50.
 販売可否判定要求を受信すると、サーバ装置10は、危険物の購入希望者に危険物を販売可能か否か判定する。具体的には、サーバ装置10は、当該購入希望者の本人確認に成功し、且つ、当該購入希望者が犯罪者等ではない場合に、危険物の販売が可能と判定する。なお、サーバ装置10は、危険物の購入希望者を撮影することで得られる撮影顔画像と本人確認書類から得られる顔画像が同一人物の顔画像である場合に、本人確認に成功したと判定する。 Upon receiving the sales permission determination request, the server device 10 determines whether the dangerous goods can be sold to the person who wishes to purchase the dangerous goods. Specifically, the server device 10 determines that the dangerous goods can be sold if the identity of the purchaser is successfully verified and the purchaser is not a criminal or the like. Note that the server device 10 determines that identity verification has been successful when the photographed facial image obtained by photographing the person wishing to purchase dangerous goods and the facial image obtained from the identity verification document are of the same person. do.
 危険物の販売が可能と判定されると、サーバ装置10は、危険物の所有者を特定する情報(所有者特定情報)を取得する。例えば、サーバ装置10は、危険物の購入希望者(危険物の所有者)が販売業者で提示した本人確認書類から所有者特定情報を読み出す。 If it is determined that the dangerous goods can be sold, the server device 10 acquires information that identifies the owner of the dangerous goods (owner identification information). For example, the server device 10 reads owner identification information from an identification document presented at a seller by a person who wishes to purchase a dangerous object (an owner of a dangerous object).
 例えば、サーバ装置10は、本人確認書類から危険物所有者の氏名及び住所を所有者特定情報として読み出す。あるいは、サーバ装置10は、本人確認書類からID(公的機関から発行されたID)を所有者特定情報として読み出す。例えば、サーバ装置10は、運転免許証番号、社会保障番号、国民保険番号等を所有者特定情報として読み出す。 For example, the server device 10 reads the name and address of the dangerous goods owner from the identification document as the owner identification information. Alternatively, the server device 10 reads the ID (ID issued by a public institution) from the identity verification document as the owner identification information. For example, the server device 10 reads out a driver's license number, social security number, national insurance number, etc. as owner identification information.
 サーバ装置10は、上記取得した所有者特定情報をデータベースに記憶する。具体的には、サーバ装置10は、銃購入者の所有者特定情報を銃管理データベースに記憶する。あるいは、サーバ装置10は、弾丸購入者の所有者特定情報を弾丸管理データベースに記憶する。 The server device 10 stores the acquired owner identification information in the database. Specifically, the server device 10 stores the gun purchaser's owner identification information in the gun management database. Alternatively, the server device 10 stores the owner identification information of the bullet purchaser in the bullet management database.
 サーバ装置10は、判定結果(危険物を販売可、販売不可)を販売者端末50に送信する。管理センターから「危険物の販売可」を通知された場合、販売業者の店員は、危険物を販売する。管理センターから「危険物の販売不可」を通知された場合、販売業者の店員は、危険物の販売を拒否する。例えば、本人確認に失敗した場合や後述するブラックリストに危険物の購入希望者が掲載されていた場合に、危険物の販売は拒否される。 The server device 10 transmits the determination result (dangerous goods can be sold or cannot be sold) to the seller terminal 50. When notified by the management center that ``dangerous goods can be sold,'' the salesperson sells the dangerous goods. When notified by the management center that the sale of dangerous goods is not allowed, the store clerk at the retailer refuses to sell the dangerous goods. For example, if identity verification fails or if the person wishing to purchase dangerous goods is listed on a blacklist, which will be described later, the sale of dangerous goods will be refused.
<捜査機関への協力>
 管理センターは、捜査機関等の犯罪捜査に協力する。犯罪現場に残された遺留品(例えば、銃及び/又は弾丸)が捜査機関に持ち込まれる。図10、図11に示すように、捜査機関には、捜査機関端末60と、カメラ付き顕微鏡61と、が含まれる。カメラ付き顕微鏡61と捜査機関端末60は、有線又は無線の通信手段により接続されている。
<Cooperation with investigative agencies>
The management center will cooperate with criminal investigations by investigative agencies. Items left at a crime scene (eg, a gun and/or bullets) are brought to an investigative agency. As shown in FIGS. 10 and 11, the investigation agency includes an investigation agency terminal 60 and a camera-equipped microscope 61. The camera-equipped microscope 61 and the investigation agency terminal 60 are connected by wired or wireless communication means.
 捜査機関の捜査官等は、捜査機関端末60を操作して管理センター(サーバ装置10)に遺留品に関する情報提供を求める。 An investigator or the like of an investigative agency operates the investigative agency terminal 60 to request the management center (server device 10) to provide information regarding the belongings left behind.
 具体的には、捜査官等は、捜査機関端末60を介してカメラ付き顕微鏡61を操作し、物体指紋を生成するための画像データを取得する。捜査機関端末60は、取得した画像データから遺留品の物体指紋を生成する。例えば、図10に示すように、銃が遺留品として回収された場合には、当該銃の物体指紋が生成される。図11に示すように、弾丸が遺留品として回収された場合には、当該弾丸の物体指紋が生成される。 Specifically, an investigator or the like operates a camera-equipped microscope 61 via an investigation agency terminal 60 to obtain image data for generating an object fingerprint. The investigation agency terminal 60 generates an object fingerprint of the belongings left behind from the acquired image data. For example, as shown in FIG. 10, when a gun is recovered as a leftover item, an object fingerprint of the gun is generated. As shown in FIG. 11, when a bullet is recovered as a leftover item, an object fingerprint of the bullet is generated.
 ここで、捜査機関等は、危険物から物体指紋を取得する位置(図4の例では銃の黒色領域)に関する情報提供を、危険物の製造業者に求めることで把握する。あるいは、捜査機関等は、管理センターを介して、上記物体指紋を取得する位置を取得する。なお、危険物から物体指紋を取得する位置は、一般消費者等には非公開とする。 Here, the investigation agency or the like obtains information by requesting the manufacturer of the dangerous object to provide information regarding the location where the object fingerprint is obtained from the dangerous object (in the example of FIG. 4, the black area of the gun). Alternatively, an investigative agency or the like obtains the location from which the fingerprint of the object is to be obtained via the management center. Note that the location where object fingerprints are obtained from dangerous objects will not be disclosed to general consumers.
 捜査官が遺留品の所有者に関する情報提供を要望すると、捜査機関端末60は、上記生成した物体指紋(銃物体指紋又は弾丸物体指紋)を含む「所有者情報提供要求」をサーバ装置10に送信する。 When the investigator requests the provision of information regarding the owner of the property, the investigation agency terminal 60 transmits an "owner information provision request" including the generated object fingerprint (gun object fingerprint or bullet object fingerprint) to the server device 10. do.
 所有者情報提供要求を受信すると、サーバ装置10は、当該所有者情報提供要求に含まれる物体指紋とデータベースに登録された物体指紋を照合し、遺留品に対応する危険物を特定する。例えば、サーバ装置10は、銃物体指紋を所得した場合には、銃管理データベースに登録された少なくとも1以上の銃物体指紋を用いて犯罪現場に残された銃に相当するエントリを特定する。あるいは、サーバ装置10は、弾丸物体指紋を所得した場合には、弾丸管理データベースに登録された少なくとも1以上の弾丸物体指紋を用いて犯罪現場に残された弾丸に相当するエントリを特定する。 Upon receiving the owner information provision request, the server device 10 compares the object fingerprint included in the owner information provision request with the object fingerprint registered in the database, and identifies the dangerous object corresponding to the leftover item. For example, when the server device 10 obtains a gun object fingerprint, it uses at least one or more gun object fingerprints registered in the gun management database to identify an entry corresponding to a gun left at a crime scene. Alternatively, when the server device 10 obtains the bullet object fingerprint, it identifies an entry corresponding to the bullet left at the crime scene using at least one or more bullet object fingerprints registered in the bullet management database.
 サーバ装置10は、照合処理により特定されたエントリの所有者特定情報(例えば、氏名及び住所、又は、運転免許証番号等のID)をデータベースから読み出す。 The server device 10 reads owner identification information (for example, name and address, or ID such as driver's license number) of the entry identified by the verification process from the database.
 サーバ装置10は、読み出した所有者特定情報を捜査機関端末60に送信する。捜査機関端末60は、取得した所有者特定情報を捜査官等に提示する。捜査官等は、提示された情報を犯罪捜査に役立てる。 The server device 10 transmits the read owner identification information to the investigation agency terminal 60. The investigation agency terminal 60 presents the acquired owner identification information to an investigator or the like. Investigators use the information presented to them in criminal investigations.
 続いて、第1の実施形態に係る危険物管理システムに含まれる各装置の詳細について説明する。 Next, details of each device included in the hazardous materials management system according to the first embodiment will be explained.
[サーバ装置]
 図12は、第1の実施形態に係るサーバ装置10の処理構成(処理モジュール)の一例を示す図である。図12を参照すると、サーバ装置10は、通信制御部201と、危険物製造管理部202と、危険物流通管理部203と、危険物販売制御部204と、情報提供制御部205と、記憶部206と、を備える。
[Server device]
FIG. 12 is a diagram illustrating an example of a processing configuration (processing module) of the server device 10 according to the first embodiment. Referring to FIG. 12, the server device 10 includes a communication control unit 201, a dangerous goods manufacturing management unit 202, a dangerous goods distribution management unit 203, a dangerous goods sales control unit 204, an information provision control unit 205, and a storage unit. 206.
 通信制御部201は、他の装置との間の通信を制御する手段である。例えば、通信制御部201は、銃製造管理端末20からデータ(パケット)を受信する。また、通信制御部201は、銃製造管理端末20に向けてデータを送信する。通信制御部201は、他の装置から受信したデータを他の処理モジュールに引き渡す。通信制御部201は、他の処理モジュールから取得したデータを他の装置に向けて送信する。このように、他の処理モジュールは、通信制御部201を介して他の装置とデータの送受信を行う。通信制御部201は、他の装置からデータを受信する受信部としての機能と、他の装置に向けてデータを送信する送信部としての機能と、を備える。 The communication control unit 201 is a means for controlling communication with other devices. For example, the communication control unit 201 receives data (packets) from the gun manufacturing management terminal 20. Further, the communication control unit 201 transmits data to the gun manufacturing management terminal 20. The communication control unit 201 passes data received from other devices to other processing modules. The communication control unit 201 transmits data acquired from other processing modules to other devices. In this way, other processing modules transmit and receive data to and from other devices via the communication control unit 201. The communication control unit 201 has a function as a reception unit that receives data from another device, and a function as a transmission unit that transmits data to the other device.
 危険物製造管理部202は、危険物(銃又は弾丸)の製造に関する管理を行う手段である。危険物製造管理部202は、製造された危険物を特定する危険物特定情報と当該製造された危険物の物体指紋を製造業者の端末から受信する。危険物製造管理部202は、当該受信した危険物特定情報と物体指紋を危険物管理データベース(銃管理データベース、弾丸管理データベース)に記憶する。 The dangerous goods manufacturing management department 202 is a means for managing the manufacturing of dangerous goods (guns or bullets). The dangerous goods manufacturing management unit 202 receives dangerous goods identification information that identifies the manufactured dangerous goods and object fingerprints of the manufactured dangerous goods from the manufacturer's terminal. The dangerous goods manufacturing management unit 202 stores the received dangerous goods identification information and object fingerprint in a dangerous goods management database (gun management database, bullet management database).
 危険物製造管理部202は、銃製造管理端末20から受信する「製造銃情報通知」又は弾丸製造管理端末30から受信する「製造弾丸情報通知」を処理する。 The dangerous goods manufacturing management department 202 processes the "manufactured gun information notification" received from the gun manufacturing management terminal 20 or the "manufactured bullet information notification" received from the bullet manufacturing management terminal 30.
 製造銃情報通知を受信すると、危険物製造管理部202は、銃管理データベースに新たなエントリを追加する(図13参照)。危険物製造管理部202は、新たに追加したエントリに受信した製造銃情報通知に含まれる事業者ID(製造者ID)、銃のシリアル番号、銃物体指紋を登録する。 Upon receiving the manufacturing gun information notification, the dangerous goods manufacturing management department 202 adds a new entry to the gun management database (see FIG. 13). The dangerous goods manufacturing management unit 202 registers the business ID (manufacturer ID), gun serial number, and gun object fingerprint included in the received manufactured gun information notification in the newly added entry.
 なお、図13に示す銃管理データベースは例示であって、記憶する項目等を限定する趣旨ではない。例えば製造銃情報通知を処理した日時が銃管理データベースに登録されていてもよい。 Note that the gun management database shown in FIG. 13 is an example, and is not intended to limit the items to be stored. For example, the date and time when the manufacturing gun information notification was processed may be registered in the gun management database.
 危険物製造管理部202は、製造弾丸情報通知に関しても製造銃情報通知と同様に処理する。具体的には、危険物製造管理部202は、製造弾丸情報通知に含まれる情報を弾丸管理データベースに登録する(図14参照)。 The dangerous goods manufacturing management department 202 processes the manufactured bullet information notification in the same manner as the manufactured gun information notification. Specifically, the dangerous goods manufacturing management department 202 registers the information included in the manufactured bullet information notification in the bullet management database (see FIG. 14).
 なお、図14に示すように、弾丸管理データベースの弾丸物体指紋フィールドには、少なくとも1以上の弾丸の弾丸物体指紋が記憶される。 As shown in FIG. 14, the bullet object fingerprint field of the bullet management database stores at least one bullet object fingerprint of a bullet.
 危険物流通管理部203は、危険物(銃又は弾丸)の流通に関する管理を行う手段である。危険物流通管理部203は、流通対象の危険物の危険物特定情報と当該流通対象の危険物の流通経路を流通事業者の端末から受信する。危険物流通管理部203は、流通対象の危険物の危険物特定情報を用いて危険物管理データベースを検索することで特定されたエントリに当該流通対象の危険物の流通経路を記憶する。 The dangerous goods distribution management unit 203 is a means for managing the distribution of dangerous goods (guns or bullets). The dangerous goods distribution management unit 203 receives the dangerous goods identification information of the dangerous goods to be distributed and the distribution route of the dangerous goods to be distributed from the terminal of the distribution business operator. The dangerous goods distribution management unit 203 stores the distribution route of the dangerous goods to be distributed in the entry specified by searching the dangerous goods management database using the dangerous goods identification information of the dangerous goods to be distributed.
 危険物流通管理部203は、流通事業者端末40から受信する「危険物流通通知」を処理する。危険物流通管理部203は、危険物流通通知に含まれる危険物特定情報(銃のシリアル番号又は弾丸ケースのケースID)をキーとしてデータベースを検索し、対応するエントリを特定する。 The dangerous goods distribution management department 203 processes the "dangerous goods distribution notification" received from the distribution business terminal 40. The dangerous goods distribution management unit 203 searches the database using the dangerous goods identification information (gun serial number or bullet case case ID) included in the dangerous goods distribution notification as a key, and identifies the corresponding entry.
 危険物流通通知に銃のシリアル番号が含まれる場合には、危険物流通管理部203は、銃のシリアル番号をキーとして銃管理データベースを検索し、対応するエントリを特定する。危険物流通通知に弾丸ケースのケースIDが含まれる場合には、危険物流通管理部203は、当該ケースIDをキーとして弾丸管理データベースを検索し、対応するエントリを特定する。 When the serial number of the gun is included in the dangerous goods distribution notification, the dangerous goods distribution management unit 203 searches the gun management database using the gun serial number as a key and identifies the corresponding entry. When the case ID of the bullet case is included in the dangerous goods distribution notification, the dangerous goods distribution management unit 203 searches the bullet management database using the case ID as a key and identifies the corresponding entry.
 危険物流通管理部203は、特定したエントリの流通経路フィールドに危険物流通通知に含まれる流通経路(仕入れ先、流通事業者、販売先それぞれの事業者ID)を記憶する。 The dangerous goods distribution management unit 203 stores the distribution route (business ID of each supplier, distribution business operator, and sales destination) included in the dangerous goods distribution notification in the distribution route field of the specified entry.
 なお、図13、図14に示すように、流通経路フィールドに最初に記載される事業者IDは銃又は弾丸の製造者IDに一致する。また、流通経路フィールドの設定値のうちセミコロンで区切られた単位が1つの流通事業者から送信された流通経路に相当する。図13の例では、「mID01」、「ID02」、「ID03」からなる流通経路は、ID02の流通事業者が、mID01の製造事業者から銃を仕入れ、ID03の販売先に販売したことを示す。 Note that, as shown in FIGS. 13 and 14, the business ID that is first written in the distribution route field matches the manufacturer ID of the gun or bullet. Further, among the setting values in the distribution route field, units separated by semicolons correspond to distribution routes sent from one distribution business operator. In the example of FIG. 13, the distribution route consisting of "mID01", "ID02", and "ID03" indicates that the distribution business with ID02 purchased guns from the manufacturer with mID01 and sold them to the sales destination with ID03. .
 危険物販売制御部204は、危険物(銃又は弾丸)の販売に関する制御を行う手段である。 The dangerous goods sales control unit 204 is a means for controlling the sale of dangerous goods (guns or bullets).
 危険物販売制御部204は、危険物の購入希望者の本人確認書類と危険物の購入希望者から取得された生体情報を含む販売可否判定要求を販売事業者の端末から受信する。危険物販売制御部204は、少なくとも、本人確認書類に記載された生体情報と危険物の購入希望者から取得された生体情報を用いた本人確認に成功すると、販売事業者が危険物の購入希望者に危険物を販売することを許可する。 The dangerous goods sales control unit 204 receives a sales propriety determination request including the identification document of the person who wishes to purchase the dangerous goods and the biometric information acquired from the person who wishes to purchase the dangerous goods from the terminal of the sales business. If the dangerous goods sales control unit 204 succeeds in verifying the identity using at least the biometric information written on the identification document and the biometric information obtained from the person wishing to purchase the dangerous goods, the dangerous goods sales control unit 204 determines whether the sales business wishes to purchase the dangerous goods. permit a person to sell dangerous goods.
 危険物販売制御部204は、販売者端末50から受信する「販売可否判定要求」を処理する。図15は、第1の実施形態に係る危険物販売制御部204の動作の一例を示すフローチャートである。図15を参照しつつ、第1の実施形態に係る危険物販売制御部204の動作を説明する。 The dangerous goods sales control unit 204 processes a "sale permission determination request" received from the seller terminal 50. FIG. 15 is a flowchart showing an example of the operation of the dangerous goods sales control unit 204 according to the first embodiment. The operation of the dangerous goods sales control unit 204 according to the first embodiment will be described with reference to FIG. 15.
 販売可否判定要求を受信すると、危険物販売制御部204は、危険物の購入希望者に関する本人確認を実施する。具体的には、危険物販売制御部204は、販売可否判定要求に含まれる本人確認書類から得られる生体情報と上記購入希望者から取得された生体情報を用いた照合処理を実行する(ステップS101)。 Upon receiving the sales permission determination request, the dangerous goods sales control unit 204 carries out identity verification regarding the person who wishes to purchase the dangerous goods. Specifically, the dangerous goods sales control unit 204 executes a matching process using the biometric information obtained from the identification document included in the sales permission determination request and the biometric information obtained from the purchase applicant (step S101). ).
 具体的には、危険物販売制御部204は、本人確認書類に記載された生体情報(顔画像)と危険物の購入希望者を撮影することで得られる生体情報(顔画像)が実質的に一致するか否かを判定し本人確認を行う。 Specifically, the dangerous goods sales control unit 204 effectively uses the biometric information (facial image) written on the identification document and the biometric information (facial image) obtained by photographing the person wishing to purchase the dangerous goods. Determine whether or not there is a match and verify the identity.
 危険物販売制御部204は、販売可否判定要求に含まれる顔画像と本人確認書類に記載(貼付)された顔画像のそれぞれから特徴量を生成する。 The dangerous goods sales control unit 204 generates feature amounts from each of the facial image included in the sales permission determination request and the facial image written (affixed) on the identification document.
 なお、特徴量の生成処理に関しては既存の技術を用いることができるので、その詳細な説明を省略する。例えば、危険物販売制御部204は、顔画像から目、鼻、口等を特徴点として抽出する。その後、危険物販売制御部204は、特徴点それぞれの位置や各特徴点間の距離を特徴量として計算する(複数の特徴量からなる特徴ベクトルを生成する)。 Note that existing technology can be used for feature value generation processing, so a detailed explanation thereof will be omitted. For example, the dangerous goods sales control unit 204 extracts the eyes, nose, mouth, etc. from the face image as feature points. Thereafter, the dangerous goods sales control unit 204 calculates the positions of each feature point and the distance between each feature point as feature quantities (generates a feature vector made up of a plurality of feature quantities).
 次に、危険物販売制御部204は、当該生成された2つの特徴量を用いた照合処理(1対1照合)を実行する。具体的には、危険物販売制御部204は、2つの特徴量を用いて対応する顔画像間の類似度を算出する。危険物販売制御部204は、当該算出した類似度に対する閾値処理の結果に基づき、2つの画像が同一人物の顔画像か否かを判定する。なお、当該類似度には、カイ二乗距離やユークリッド距離等を用いることができる。距離が離れているほど類似度は低く、距離が近いほど類似度が高い。 Next, the dangerous goods sales control unit 204 executes a matching process (one-to-one matching) using the two generated feature amounts. Specifically, the dangerous goods sales control unit 204 calculates the degree of similarity between corresponding face images using two feature amounts. The dangerous goods sales control unit 204 determines whether the two images are face images of the same person based on the result of threshold processing for the calculated degree of similarity. Note that chi-square distance, Euclidean distance, or the like can be used for the similarity. The farther the distance, the lower the similarity, and the closer the distance, the higher the similarity.
 類似度が所定の値よりも大きければ(距離が所定の値よりも短ければ)、危険物販売制御部204は、本人確認成功と判定する。類似度が所定の値以下であれば、危険物販売制御部204は、本人確認失敗と判定する。 If the degree of similarity is greater than a predetermined value (if the distance is shorter than a predetermined value), the dangerous goods sales control unit 204 determines that the identity verification has been successful. If the degree of similarity is less than or equal to a predetermined value, the dangerous goods sales control unit 204 determines that the identity verification has failed.
 本人確認に失敗すると(ステップS102、No分岐)、危険物販売制御部204は、販売可否判定要求に対する応答に「販売不可」を設定する(ステップS103)。 If the identity verification fails (step S102, No branch), the dangerous goods sales control unit 204 sets "sale not possible" in response to the sale permission determination request (step S103).
 本人確認に成功すると(ステップS102、Yes分岐)、危険物販売制御部204は、危険物の購入希望者が捜査機関等により作成されたブラックリストに掲載されているか否か判定する(ブラックリスト判定;ステップS104)。即ち、危険物販売制御部204は、危険物の購入希望者が捜査機関等から危険物の販売を禁止された人物に該当しないことを判定する。 If the identity verification is successful (step S102, Yes branch), the dangerous goods sales control unit 204 determines whether the person wishing to purchase the dangerous goods is listed on a blacklist created by an investigative agency or the like (blacklist determination ; step S104). That is, the dangerous goods sales control unit 204 determines that the person who wishes to purchase the dangerous goods does not fall under the category of a person prohibited from selling dangerous goods by an investigative agency or the like.
 具体的には、危険物販売制御部204は、上記ブラックリストを有するサーバ(犯罪履歴サーバ;図3等に図示せず)に対し、危険物の購入希望者が危険物を購入できない人物としてブラックリストに掲載されているか否かを問い合わせる。具体的には、危険物販売制御部204は、犯罪者等の生体情報が記憶されたブラックリストを有する犯罪履歴サーバに危険物の購入希望者の顔画像を送信する。危険物販売制御部204は、当該犯罪履歴サーバから判定結果(ブラックリストに掲載、ブラックリストに不掲載)を受信する。 Specifically, the dangerous goods sales control unit 204 sends a server (crime history server; not shown in FIG. 3, etc.) having the above-mentioned blacklist to a server that has the above-mentioned blacklist, and blacklists the person who wishes to purchase the dangerous goods as a person who cannot purchase the dangerous goods. Inquire whether it is on the list. Specifically, the dangerous goods sales control unit 204 transmits the facial image of the person wishing to purchase the dangerous goods to a crime history server that has a blacklist in which biometric information of criminals and the like is stored. The dangerous goods sales control unit 204 receives the determination result (listed on the blacklist, not listed on the blacklist) from the crime history server.
 なお、危険物販売制御部204は、危険物の購入希望者を特定する情報(例えば、氏名や住所等)を、ブラックリストを有するサーバに送信してもよい。即ち、危険物の購入希望者がブラックリストに掲載されているか否かの判定は、生体情報(顔画像又は顔画像から生成された特徴量)を用いて行われてもよいし、氏名等を用いて行われてもよい。 Incidentally, the dangerous goods sales control unit 204 may transmit information (for example, name, address, etc.) identifying the person who wishes to purchase the dangerous goods to a server having a blacklist. In other words, the determination of whether a person wishing to purchase dangerous goods is on a blacklist may be made using biometric information (a facial image or a feature amount generated from a facial image), or by using information such as a person's name. It may also be carried out using
 ブラックリストに掲載されていると(ステップS105、Yes分岐)、危険物販売制御部204は、販売可否判定要求に対する応答に「販売不可」を設定する(ステップS103)。 If it is listed on the blacklist (step S105, Yes branch), the dangerous goods sales control unit 204 sets "sale not allowed" in response to the sale permission determination request (step S103).
 ブラックリストに掲載されていなければ(ステップS105、No分岐)、危険物販売制御部204は、販売可否判定要求に対する応答に「販売可」を設定する(ステップS106)。 If it is not listed on the blacklist (step S105, No branch), the dangerous goods sales control unit 204 sets "saleable" in response to the saleability determination request (step S106).
 また、危険物販売制御部204は、販売可否判定通知に含まれる事業者ID(販売者ID)をデータベース(銃管理データベース、弾丸管理データベース)に記憶する。さらに、危険物販売制御部204は、危険物の販売が許可された購入希望者(危険物の所有者)を特定する「所有者特定情報」をデータベースに記憶する。 Additionally, the dangerous goods sales control unit 204 stores the business ID (seller ID) included in the sales permission/prohibition determination notification in a database (gun management database, bullet management database). Furthermore, the dangerous goods sales control unit 204 stores in the database "owner identification information" that identifies the purchaser (the owner of the dangerous goods) who is permitted to sell the dangerous goods.
 例えば、危険物販売制御部204は、危険物の所有者の氏名及び住所等(本人確認書類に記載された氏名、住所等)をデータベースに記憶する。あるいは、危険物販売制御部204は、本人確認書類から得られるID(例えば、運転免許証番号、社会保障番号、国民保険番号等)を所有者特定情報としてデータベースに記憶する。 For example, the dangerous goods sales control unit 204 stores the name, address, etc. of the owner of the dangerous goods (the name, address, etc. written on the identification document) in the database. Alternatively, the dangerous goods sales control unit 204 stores the ID obtained from the identification document (for example, driver's license number, social security number, national insurance number, etc.) in the database as owner identification information.
 あるいは、危険物販売制御部204は、危険物の所有者の生体情報(顔情報;顔画像、特徴量)をデータベースに記憶してもよい。当該データベースに記憶される生体情報は、本人確認書類から得られる生体情報でもよいし、危険物の購入希望者から得られる生体情報であってもよい。 Alternatively, the dangerous goods sales control unit 204 may store the biological information (facial information; face image, feature amount) of the owner of the dangerous goods in the database. The biometric information stored in the database may be biometric information obtained from an identification document or may be biometric information obtained from a person who wishes to purchase dangerous goods.
 危険物販売制御部204は、販売可否判定要求に対する応答(判定結果;販売可、販売不可)を販売者端末50に送信する(ステップS107)。 The dangerous goods sales control unit 204 transmits a response to the sales permission determination request (determination result; sale possible, sale not possible) to the seller terminal 50 (step S107).
 このように、危険物販売制御部204は、本人確認書類に記載された生体情報と危険物の購入希望者から取得された生体情報を用いた1対1照合に成功した場合に、本人確認に成功したと判定する。さらに、危険物販売制御部204は、危険物の購入希望者の本人確認に成功し、且つ、危険物の購入希望者が危険物を購入できない人物としてブラックリストに掲載されていない場合に、販売事業者が危険物の購入希望者に危険物を販売することを許可する。 In this way, the dangerous goods sales control unit 204 performs identity verification when one-on-one matching using the biometric information written on the identity verification document and the biometric information obtained from the person wishing to purchase the dangerous goods is successful. Determine it as successful. Furthermore, if the dangerous goods sales control unit 204 succeeds in verifying the identity of the person who wishes to purchase the dangerous goods, and the person who wishes to purchase the dangerous goods is not listed on the blacklist as a person who cannot purchase dangerous goods, the dangerous goods sales control unit 204 will Business operators are permitted to sell hazardous materials to those who wish to purchase them.
 情報提供制御部205は、捜査機関等に対する情報提供に関する制御を行う手段である。 The information provision control unit 205 is a means for controlling information provision to investigative agencies and the like.
 情報提供制御部205は、物体(遺留品である危険物)から取得された物体指紋を含む所有者情報提供要求を受信すると、所有者情報提供要求に含まれる物体指紋とデータベースに記憶された複数の物体指紋を用いた物体認証を実行する。情報提供制御部205は、物体認証により所有者情報提供要求に含まれる物体指紋に対応する所有者特定情報を特定し、当該特定された所有者特定情報を所有者情報提供要求の送信元(捜査機関端末60)に通知する。 When the information provision control unit 205 receives an owner information provision request including an object fingerprint obtained from an object (a dangerous item that is left behind), the information provision control unit 205 sends the object fingerprint included in the owner information provision request and a plurality of object fingerprints stored in the database. Perform object authentication using object fingerprints. The information provision control unit 205 identifies the owner identification information corresponding to the object fingerprint included in the owner information provision request through object authentication, and uses the identified owner identification information as the source of the owner information provision request (investigation). Notify the engine terminal 60).
 情報提供制御部205は、捜査機関端末60から受信する「所有者情報提供要求」等の情報提供要求を処理する。図16は第1の実施形態に係る情報提供制御部205の動作の一例を示すフローチャートである。図16を参照し、所有者情報提供要求を受信した場合の情報提供制御部205の動作を説明する。 The information provision control unit 205 processes information provision requests such as "owner information provision requests" received from the investigation agency terminal 60. FIG. 16 is a flowchart showing an example of the operation of the information provision control unit 205 according to the first embodiment. The operation of the information provision control unit 205 when receiving an owner information provision request will be described with reference to FIG. 16.
 所有者情報提供要求を受信した場合、情報提供制御部205は、当該要求に含まれる物体指紋に対応する所有者特定情報を捜査機関に提供する。 When receiving an owner information provision request, the information provision control unit 205 provides the investigative agency with owner identification information corresponding to the object fingerprint included in the request.
 具体的には、情報提供制御部205は、所有者情報提供要求に含まれる物体指紋と危険物管理データベースに記憶された物体指紋を用いた物体認証を実行する(ステップS201)。なお、情報提供制御部205による物体認証には、既存の技術を適用することができるので詳細な説明を省略するが、情報提供制御部205は、概略、以下のような処理により物体認証を行う。 Specifically, the information provision control unit 205 executes object authentication using the object fingerprint included in the owner information provision request and the object fingerprint stored in the dangerous goods management database (step S201). Note that detailed explanation will be omitted since existing technology can be applied to object authentication by the information provision control unit 205, but the information provision control unit 205 performs object authentication through the following process. .
 情報提供制御部205は、局所特徴量を用いた画像照合手法と、特徴点の幾何的な配置の整合性を検証するアルゴリズムを用いて物体指紋(危険物を撮影した画像)の照合を行う。はじめに、情報提供制御部205は、物体指紋(物体指紋画像)から、輝度の変化が急峻で、位置が安定して求まる場所を特徴点として抽出する。その後、情報提供制御部205は、特徴点周辺の局所的な輝度パターンを特徴量としてデータ化する。さらに、情報提供制御部205は、照合する双方の画像から、特徴量の差が最少となる特徴点をペアとして算出する。最後に、情報提供制御部205は、特徴点の全体的な配置の幾何学的整合性を検証する。情報提供制御部205は、求められたペア群から、他の特徴点との相対的な位置関係が矛盾しないペア群を抽出する。情報提供制御部205は、照合する2つの画像から抽出された特徴点の数の合計と、幾何的な配置が正しい特徴点ペアの数と、を用いて両画像の照合スコアを計算する。情報提供制御部205は、当該照合スコアが所定の閾値以上であれば、物体認証に成功したと判定する。情報提供制御部205は、当該照合スコアが所定の閾値より小さければ、物体認証に失敗したと判定する。 The information provision control unit 205 matches object fingerprints (images taken of dangerous objects) using an image matching method using local feature amounts and an algorithm that verifies the consistency of the geometric arrangement of feature points. First, the information provision control unit 205 extracts, from the object fingerprint (object fingerprint image), a place where the luminance changes sharply and whose position can be stably determined as a feature point. Thereafter, the information provision control unit 205 converts the local brightness pattern around the feature point into data as a feature amount. Further, the information provision control unit 205 calculates a pair of feature points with the smallest difference in feature amount from both images to be compared. Finally, the information provision control unit 205 verifies the geometric consistency of the overall arrangement of feature points. The information provision control unit 205 extracts a pair group whose relative positional relationship with other feature points is consistent from the obtained pair group. The information provision control unit 205 calculates a matching score for both images using the total number of feature points extracted from the two images to be matched and the number of feature point pairs whose geometric arrangement is correct. The information provision control unit 205 determines that object authentication has been successful if the matching score is greater than or equal to a predetermined threshold. The information provision control unit 205 determines that object authentication has failed if the matching score is smaller than a predetermined threshold.
 なお、所有者情報提供要求に含まれる物体指紋が銃物体指紋であれば、情報提供制御部205は、銃管理データベースに記憶された銃物体指紋を用いて上記物体認証を実行する。また、所有者情報提供要求に含まれる物体指紋が弾丸物体指紋であれば、情報提供制御部205は、弾丸管理データベースに記憶された弾丸物体指紋を用いて上記物体認証を実行する。 Note that if the object fingerprint included in the owner information provision request is a gun object fingerprint, the information provision control unit 205 executes the object authentication described above using the gun object fingerprint stored in the gun management database. Furthermore, if the object fingerprint included in the owner information provision request is a bullet object fingerprint, the information provision control unit 205 executes the object authentication using the bullet object fingerprint stored in the bullet management database.
 物体認証に失敗すると(ステップS202、No分岐)、情報提供制御部205は、所有者情報提供要求に含まれる物体指紋に対応する危険物はデータベースに登録されていない旨を捜査機関端末60に通知する。具体的には、情報提供制御部205は、否定応答を捜査機関端末60に送信する(ステップS203)。 If object authentication fails (step S202, No branch), the information provision control unit 205 notifies the investigation agency terminal 60 that the dangerous object corresponding to the object fingerprint included in the owner information provision request is not registered in the database. do. Specifically, the information provision control unit 205 transmits a negative response to the investigating agency terminal 60 (step S203).
 物体認証に成功すると(ステップS202、Yes分岐)、情報提供制御部205は、物体認証に成功した物体指紋に対応するエントリ(銃管理データベース又は弾丸管理データベースのエントリ)の所有者特定情報を取得する(ステップS204)。 If the object authentication is successful (step S202, Yes branch), the information provision control unit 205 acquires the owner identification information of the entry (entry in the gun management database or bullet management database) corresponding to the object fingerprint for which the object authentication was successful. (Step S204).
 情報提供制御部205は、当該取得した所有者特定情報を含む肯定応答を捜査機関端末60に送信する(ステップS205)。 The information provision control unit 205 transmits an affirmative response including the acquired owner identification information to the investigating agency terminal 60 (step S205).
 記憶部206は、サーバ装置10の動作に必要な情報を記憶する手段である。記憶部206は、複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する。また、記憶部206には、複数の危険物それぞれに関する所有者特定情報と物体指紋を記憶する危険物管理データベース(銃管理データベース、弾丸管理データベース)が構築される。 The storage unit 206 is a means for storing information necessary for the operation of the server device 10. The storage unit 206 stores, for each of a plurality of dangerous objects, owner identification information that identifies the owner and object fingerprints in association with each other. Further, the storage unit 206 is constructed with a dangerous goods management database (gun management database, bullet management database) that stores owner identification information and object fingerprints regarding each of a plurality of dangerous goods.
[銃製造管理端末]
 銃製造管理端末20の処理構成、動作に関する詳細な説明は省略する。銃製造管理端末20には、タブレットやコンピュータ(パーソナルコンピュータ、ノートパソコン)等が例示される。銃製造管理端末20は、作業者の操作を受け付け、サーバ装置10等と通信可能であれば任意の機器、デバイスとすることができる。
[Gun manufacturing control terminal]
A detailed explanation regarding the processing configuration and operation of the gun manufacturing management terminal 20 will be omitted. Examples of the gun manufacturing management terminal 20 include a tablet, a computer (a personal computer, a notebook computer), and the like. The gun manufacturing management terminal 20 can be any equipment or device as long as it accepts operator operations and can communicate with the server device 10 and the like.
 銃製造管理端末20は、カメラ付き顕微鏡21から画像データを取得し、当該画像データから銃物体指紋を生成する。銃製造管理端末20は、当該生成された銃物体指紋と、銃のシリアル番号と、銃製造業者の事業者ID(製造者ID)と、を含む製造銃情報通知をサーバ装置10に送信する。 The gun manufacturing management terminal 20 acquires image data from the camera-equipped microscope 21 and generates a gun object fingerprint from the image data. The gun manufacturing management terminal 20 transmits a manufactured gun information notification including the generated gun object fingerprint, the serial number of the gun, and the gun manufacturer's business ID (manufacturer ID) to the server device 10.
[弾丸製造管理端末]
 弾丸製造管理端末30の処理構成、動作に関する詳細な説明は省略する。弾丸製造管理端末30には、タブレットやコンピュータ(パーソナルコンピュータ、ノートパソコン)等が例示される。弾丸製造管理端末30は、作業者の操作を受け付け、サーバ装置10等と通信可能であれば任意の機器、デバイスとすることができる。
[Bullet production management terminal]
A detailed explanation regarding the processing configuration and operation of the bullet manufacturing management terminal 30 will be omitted. Examples of the bullet manufacturing management terminal 30 include a tablet, a computer (a personal computer, a notebook computer), and the like. The bullet manufacturing management terminal 30 can be any equipment or device as long as it accepts operator operations and can communicate with the server device 10 and the like.
 弾丸製造管理端末30は、カメラ付き顕微鏡31から画像データを取得し、当該画像データから弾丸物体指紋を生成する。弾丸製造管理端末30は、当該生成された弾丸物体指紋と、弾丸が格納された弾丸ケースのケースIDと、弾丸製造業者の事業者ID(製造者ID)と、を含む製造弾丸情報通知をサーバ装置10に送信する。 The bullet manufacturing management terminal 30 acquires image data from the camera-equipped microscope 31 and generates a bullet object fingerprint from the image data. The bullet manufacturing management terminal 30 sends a manufactured bullet information notification including the generated bullet object fingerprint, the case ID of the bullet case in which the bullet is stored, and the business ID (manufacturer ID) of the bullet manufacturer to the server. to the device 10.
[流通事業者端末]
 流通事業者端末40の処理構成、動作に関する詳細な説明は省略する。流通事業者端末40には、タブレットやコンピュータ(パーソナルコンピュータ、ノートパソコン)等が例示される。流通事業者端末40は、作業者の操作を受け付け、サーバ装置10等と通信可能であれば任意の機器、デバイスとすることができる。
[Distributor terminal]
A detailed description of the processing configuration and operation of the distributor terminal 40 will be omitted. Examples of the distributor terminal 40 include a tablet, a computer (a personal computer, a notebook computer), and the like. The distribution company terminal 40 can be any equipment or device as long as it accepts operations from a worker and can communicate with the server device 10 and the like.
 流通事業者端末40は、流通対象の危険物(銃又は弾丸)を特定する危険物特定情報(銃のシリアル番号、弾丸ケースのケースID)を取得する。流通事業者端末40は、自社の事業者ID、仕入れ先の事業者ID、販売先の事業者ID、上記取得した危険物特定情報を含む危険物流通通知をサーバ装置10に送信する。 The distribution business terminal 40 acquires dangerous goods identification information (serial number of the gun, case ID of the bullet case) that identifies the dangerous goods (gun or bullet) to be distributed. The distribution business terminal 40 transmits to the server device 10 a dangerous goods distribution notification that includes the company's business ID, the supplier's business ID, the sales destination's business ID, and the acquired dangerous goods identification information.
[販売者端末]
 図17は、第1の実施形態に係る販売者端末50の処理構成(処理モジュール)の一例を示す図である。図17を参照すると、販売者端末50は、通信制御部301と、本人確認書類取得部302と、生体情報取得部303と、判定要求部304と、記憶部305と、を備える。
[Seller terminal]
FIG. 17 is a diagram showing an example of a processing configuration (processing module) of the seller terminal 50 according to the first embodiment. Referring to FIG. 17, the seller terminal 50 includes a communication control section 301, an identification document acquisition section 302, a biometric information acquisition section 303, a determination request section 304, and a storage section 305.
 通信制御部301は、他の装置との間の通信を制御する手段である。例えば、通信制御部301は、サーバ装置10からデータ(パケット)を受信する。また、通信制御部301は、サーバ装置10に向けてデータを送信する。通信制御部301は、他の装置から受信したデータを他の処理モジュールに引き渡す。通信制御部301は、他の処理モジュールから取得したデータを他の装置に向けて送信する。このように、他の処理モジュールは、通信制御部301を介して他の装置とデータの送受信を行う。通信制御部301は、他の装置からデータを受信する受信部としての機能と、他の装置に向けてデータを送信する送信部としての機能と、を備える。 The communication control unit 301 is a means for controlling communication with other devices. For example, the communication control unit 301 receives data (packets) from the server device 10. Furthermore, the communication control unit 301 transmits data to the server device 10. The communication control unit 301 passes data received from other devices to other processing modules. The communication control unit 301 transmits data acquired from other processing modules to other devices. In this way, other processing modules transmit and receive data to and from other devices via the communication control unit 301. The communication control unit 301 has a function as a receiving unit that receives data from another device, and a function as a transmitting unit that transmits data to the other device.
 本人確認書類取得部302は、危険物の購入希望者の本人確認書類が映る画像データを取得する手段である。本人確認書類取得部302は、販売業者の店員等による操作に応じて、カメラ装置を制御して本人確認書類が映る画像データを取得する。あるいは、本人確認書類取得部302は、スキャナーを制御して本人確認書類が映る画像データを取得する。 The identity verification document acquisition unit 302 is a means for acquiring image data showing the identity verification document of a person who wishes to purchase dangerous goods. The identity verification document acquisition unit 302 controls a camera device to acquire image data showing the identity verification document in response to an operation by a salesperson or the like. Alternatively, the identity verification document acquisition unit 302 controls a scanner to acquire image data showing the identity verification document.
 本人確認書類取得部302は、取得した画像データを判定要求部304に引き渡す。 The identity verification document acquisition unit 302 delivers the acquired image data to the determination request unit 304.
 生体情報取得部303は、危険物の購入希望者の生体情報を取得する手段である。生体情報取得部303は、販売業者の店員等の操作に応じてカメラ装置を制御し、購入希望者の生体情報(例えば、顔画像)を取得する。生体情報取得部303は、取得した画像データから顔画像を抽出する。 The biological information acquisition unit 303 is a means for acquiring biological information of a person who wishes to purchase dangerous goods. The biometric information acquisition unit 303 controls a camera device in response to an operation by a salesperson or the like, and acquires biometric information (for example, a facial image) of a person who wishes to purchase. The biometric information acquisition unit 303 extracts a facial image from the acquired image data.
 なお、生体情報取得部303による顔画像の抽出処理には既存の技術を用いることができるので詳細な説明を省略する。例えば、生体情報取得部303は、CNN(Convolutional Neural Network)により学習された学習モデルを用いて、画像データの中から顔画像(顔領域)を抽出してもよい。あるいは、生体情報取得部303は、テンプレートマッチング等の手法を用いて顔画像を抽出してもよい。 Note that existing technology can be used for the facial image extraction process by the biometric information acquisition unit 303, so a detailed explanation will be omitted. For example, the biological information acquisition unit 303 may extract a face image (face region) from the image data using a learning model learned by a CNN (Convolutional Neural Network). Alternatively, the biometric information acquisition unit 303 may extract the facial image using a method such as template matching.
 生体情報取得部303は、抽出した顔画像を判定要求部304に引き渡す。 The biometric information acquisition unit 303 delivers the extracted facial image to the determination requesting unit 304.
 判定要求部304は、危険物の購入を希望する顧客に危険物の販売が可能か否かに関する判定をサーバ装置10に要求する手段である。 The determination requesting unit 304 is a means for requesting the server device 10 to make a determination as to whether or not it is possible to sell dangerous goods to customers who wish to purchase dangerous goods.
 判定要求部304は、危険物の購入希望者に関する本人確認書類及び生体情報(顔画像)を取得すると、本人確認書類、生体情報、事業者ID(販売者ID)及び危険物特定情報を含む販売可否判定要求をサーバ装置10に送信する。 Upon acquiring the identity verification documents and biometric information (facial image) regarding the person wishing to purchase dangerous goods, the determination requesting unit 304 determines whether the person is purchasing the dangerous goods, including the identity verification documents, the biological information, the business ID (seller ID), and the dangerous goods identification information. A request for determination of availability is sent to the server device 10.
 判定要求部304は、サーバ装置10から判定結果(販売可、販売不可)を受信する。判定要求部304は、当該受信した判定結果(販売可、販売不可)を販売業者の店員等に提示する。 The determination request unit 304 receives the determination result (saleable, unsaleable) from the server device 10. The determination requesting unit 304 presents the received determination result (saleable or unsaleable) to a store clerk of the retailer or the like.
 記憶部305は、販売者端末50の動作に必要な情報を記憶する手段である。 The storage unit 305 is a means for storing information necessary for the operation of the seller terminal 50.
[捜査機関端末]
 図18は、第1の実施形態に係る捜査機関端末60の処理構成(処理モジュール)の一例を示す図である。図18を参照すると、捜査機関端末60は、通信制御部401と、物体指紋取得部402と、情報提供要求部403と、記憶部404と、を備える。
[Investigation agency terminal]
FIG. 18 is a diagram showing an example of a processing configuration (processing module) of the investigation agency terminal 60 according to the first embodiment. Referring to FIG. 18, the investigation agency terminal 60 includes a communication control section 401, an object fingerprint acquisition section 402, an information provision requesting section 403, and a storage section 404.
 通信制御部401は、他の装置との間の通信を制御する手段である。例えば、通信制御部401は、サーバ装置10からデータ(パケット)を受信する。また、通信制御部401は、サーバ装置10に向けてデータを送信する。通信制御部401は、他の装置から受信したデータを他の処理モジュールに引き渡す。通信制御部401は、他の処理モジュールから取得したデータを他の装置に向けて送信する。このように、他の処理モジュールは、通信制御部401を介して他の装置とデータの送受信を行う。通信制御部401は、他の装置からデータを受信する受信部としての機能と、他の装置に向けてデータを送信する送信部としての機能と、を備える。 The communication control unit 401 is a means for controlling communication with other devices. For example, the communication control unit 401 receives data (packets) from the server device 10. The communication control unit 401 also transmits data to the server device 10. The communication control unit 401 passes data received from other devices to other processing modules. The communication control unit 401 transmits data acquired from other processing modules to other devices. In this way, the other processing modules transmit and receive data to and from other devices via the communication control unit 401. The communication control unit 401 has a function as a receiving unit that receives data from other devices and a function as a transmitting unit that transmits data to other devices.
 物体指紋取得部402は、犯罪現場等に残された遺留品の物体指紋を取得する手段である。物体指紋取得部402は、捜査官等の操作に応じてカメラ付き顕微鏡61を制御し、遺留品(銃又は弾丸)が映る画像データを取得する。 The object fingerprint acquisition unit 402 is a means for acquiring object fingerprints of items left behind at a crime scene or the like. The object fingerprint acquisition unit 402 controls the camera-equipped microscope 61 according to the operation of an investigator or the like, and acquires image data showing the remains (gun or bullet).
 物体指紋取得部402は、取得した画像データから物体指紋を生成する。 The object fingerprint acquisition unit 402 generates an object fingerprint from the acquired image data.
 物体指紋取得部402は、生成した物体指紋を情報提供要求部403に引き渡す。 The object fingerprint acquisition unit 402 delivers the generated object fingerprint to the information provision requesting unit 403.
 情報提供要求部403は、遺留品(銃又は弾丸)に関する情報提供をサーバ装置10に要求する手段である。情報提供要求部403は、捜査官等が遺留品の所有者に関する情報提供を求めている場合には、上記取得した物体指紋を含む「所有者情報提供要求」をサーバ装置10に送信する。 The information provision requesting unit 403 is a means for requesting the server device 10 to provide information regarding left behind items (guns or bullets). When an investigator or the like requests information regarding the owner of a leftover item, the information provision requesting unit 403 transmits an "owner information provision request" including the acquired object fingerprint to the server device 10.
 情報提供要求部403は、サーバ装置10から所有者情報提供要求に対する応答(肯定応答、否定応答)を受信する。情報提供要求部403は、取得した応答に応じた情報を捜査官等に提示する。 The information provision request unit 403 receives a response (positive response, negative response) to the owner information provision request from the server device 10. The information provision requesting unit 403 presents information corresponding to the obtained response to an investigator or the like.
 否定応答を受信した場合には、情報提供要求部403は、遺留品の所有者は特定できなかった旨を捜査官等に通知する。 If a negative response is received, the information requesting unit 403 notifies the investigator etc. that the owner of the belongings could not be identified.
 肯定応答を受信した場合には、情報提供要求部403は、遺留品の所有者(遺留品の購入者)を特定する所有者特定情報(氏名及び住所、又は、ID等)を捜査官等に提示する。例えば、情報提供要求部403は、肯定応答に含まれる所有者特定情報をディスプレイ等に表示する。 If a positive response is received, the information provision requesting unit 403 provides owner identification information (name and address, ID, etc.) that identifies the owner of the leftover item (purchaser of the leftover item) to the investigator, etc. present. For example, the information provision requesting unit 403 displays the owner identification information included in the affirmative response on a display or the like.
 記憶部404は、捜査機関端末60の動作に必要な情報を記憶する手段である。 The storage unit 404 is a means for storing information necessary for the operation of the investigation agency terminal 60.
[システムの動作]
 続いて、第1の実施形態に係る認証システムの動作について説明する。なお、危険物の製造及び流通に関する危険物管理システムの動作に関する説明は省略する。
[System operation]
Next, the operation of the authentication system according to the first embodiment will be explained. Note that a description of the operation of the hazardous materials management system regarding the production and distribution of hazardous materials will be omitted.
 図19は、第1の実施形態に係る危険物管理システムの動作の一例を示すシーケンス図である。図19を参照し、第1の実施形態に係る危険物管理システムの危険物販売に関する動作について説明する。 FIG. 19 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment. Referring to FIG. 19, the operation of the dangerous goods management system according to the first embodiment regarding the sale of dangerous goods will be described.
 販売者端末50は、危険物の購入希望者の本人確認書類、生体情報(顔画像)、事業者ID(販売者ID)及び危険物特定情報を含む販売可否判定要求をサーバ装置10に送信する(ステップS01)。 The seller terminal 50 transmits to the server device 10 a request for determining whether or not the product can be sold, including identification documents, biometric information (facial image), business ID (seller ID), and hazardous material identification information of the person wishing to purchase the dangerous goods. (Step S01).
 販売可否判定要求を受信すると、サーバ装置10は、購入希望者の本人確認を行う(ステップS02)。 Upon receiving the sales availability determination request, the server device 10 verifies the identity of the person wishing to purchase (step S02).
 本人確認に成功すると、サーバ装置10は、購入希望者がブラックリストに掲載された犯罪者等に該当しないことを確認する(ブラックリスト判定;ステップS03)。 If the identity verification is successful, the server device 10 confirms that the person wishing to purchase does not fall under the category of criminals listed on the blacklist (blacklist determination; step S03).
 本人確認に成功し、且つ、ブラックリスト判定に成功(購入希望者が犯罪者等に該当しないと)すると、サーバ装置10は、「販売可」を販売者端末50に通知する(ステップS04)。 If the identity verification is successful and the blacklist determination is successful (the person wishing to purchase does not fall under the category of a criminal), the server device 10 notifies the seller terminal 50 that "sale is possible" (step S04).
 販売者端末50は、危険物の購入希望者に危険物を販売可能であることを販売業者の店員等に通知する(ステップS05)。 The seller terminal 50 notifies the salesperson's clerk that the dangerous goods can be sold to the person who wishes to purchase the dangerous goods (step S05).
 図20は、第1の実施形態に係る危険物管理システムの動作の一例を示すシーケンス図である。図20を参照し、第1の実施形態に係る危険物管理システムの情報提供に関する動作について説明する。 FIG. 20 is a sequence diagram illustrating an example of the operation of the hazardous materials management system according to the first embodiment. Referring to FIG. 20, the operation related to information provision of the hazardous materials management system according to the first embodiment will be described.
 捜査機関端末60は、遺留品(銃又は弾丸)の物体指紋を取得する(ステップS11)。 The investigation agency terminal 60 acquires the object fingerprint of the leftover item (gun or bullet) (step S11).
 捜査機関端末60は、遺留品の物体指紋を含む所有者情報提供要求をサーバ装置10に送信する(ステップS12)。 The investigative agency terminal 60 transmits an owner information provision request including the object fingerprint of the leftover item to the server device 10 (step S12).
 サーバ装置10は、所有者情報提供要求に含まれる物体指紋とデータベースに登録された物体指紋を用いた物体認証を実行する(ステップS13)。 The server device 10 executes object authentication using the object fingerprint included in the owner information provision request and the object fingerprint registered in the database (step S13).
 物体認証に成功すると、サーバ装置10は、遺留品(銃又は弾丸)の所有者特定情報をデータベース(銃管理データベース又は弾丸管理データベース)から取得する(ステップS14)。 If the object authentication is successful, the server device 10 acquires the owner identification information of the leftover item (gun or bullet) from the database (gun management database or bullet management database) (step S14).
 サーバ装置10は、取得した所有者特定情報を捜査機関端末60に通知する(ステップS15)。 The server device 10 notifies the investigative agency terminal 60 of the acquired owner identification information (step S15).
 捜査機関端末60は、通知された所有者特定情報を捜査機関の捜査官等に提示する(ステップS16)。 The investigative agency terminal 60 presents the notified owner identification information to an investigator of the investigative agency (step S16).
<第1の実施形態に係る変形例>
 第1の実施形態では、弾丸の管理及び情報提供に関し、サーバ装置10は、単一のデータベースである弾丸管理データベースを用いることを説明した。しかし、サーバ装置10は、複数のデータベースを用いて弾丸の管理及び情報提供を行ってもよい。
<Modification example according to the first embodiment>
In the first embodiment, it has been described that the server device 10 uses a bullet management database, which is a single database, regarding bullet management and information provision. However, the server device 10 may manage bullets and provide information using a plurality of databases.
 第1の実施形態の変形例に係る危険物管理システムでは、弾丸が格納された弾丸ケースを識別するためのケースIDがサーバ装置10に登録される。具体的には、弾丸製造業者が、弾丸ケースのケースID(2次元バーコード等に変換されたID)をサーバ装置10に通知する。同様に、弾丸ケース(弾丸が格納された弾丸ケース)を取り扱う流通事業者は、仕入れた弾丸ケースのケースIDをサーバ装置10に通知する。同様に、弾丸(弾丸ケース)を販売する販売業者は、弾丸の購入者に販売する弾丸ケースのケースIDをサーバ装置10に通知する。 In the dangerous goods management system according to the modification of the first embodiment, a case ID for identifying a bullet case in which a bullet is stored is registered in the server device 10. Specifically, the bullet manufacturer notifies the server device 10 of the case ID (ID converted into a two-dimensional barcode or the like) of the bullet case. Similarly, a distribution company that handles bullet cases (bullet cases containing bullets) notifies the server device 10 of the case ID of the purchased bullet case. Similarly, a vendor who sells bullets (bullet cases) notifies the server device 10 of the case ID of the bullet case to be sold to a bullet purchaser.
 なお、各事業者によるケースIDの通知は、第1の実施形態で説明した方法と同様とすることができるので詳細な説明は省略する。例えば、弾丸製造管理端末30は、弾丸ケースのケースIDを含む製造弾丸情報通知をサーバ装置10に送信すればよい。なお、当該製造弾丸通知には弾丸物体指紋は含まれていない。流通事業者端末40は、弾丸ケースのケースIDを含む危険物流通通知をサーバ装置10に送信する。同様に、販売者端末50は、弾丸ケースのケースIDを含む販売可否判定要求を送信する。 Note that the notification of the case ID by each business operator can be the same as the method described in the first embodiment, so detailed explanation will be omitted. For example, the bullet manufacturing management terminal 30 may transmit a manufacturing bullet information notification including the case ID of the bullet case to the server device 10. Note that the manufactured bullet notification does not include the bullet object fingerprint. The distribution business terminal 40 transmits a dangerous goods distribution notification including the case ID of the bullet case to the server device 10. Similarly, the seller terminal 50 transmits a sales permission determination request including the case ID of the bullet case.
 サーバ装置10は、各事業者から受信した通知、要求(製造弾丸情報通知、危険物流通通知、販売可否判定要求)を処理することで、弾丸ケースを管理するための弾丸ケース管理データベースを構築する。具体的には、サーバ装置10の危険物製造管理部202、危険物流通管理部203及び危険物販売制御部204の各処理モジュールは、第1の実施形態で説明したような処理、制御等を行う。その結果、図21に示すような弾丸ケース管理データベースが構築される。弾丸ケース管理データベースは、製造された弾丸のケースIDと、流通経路、所有者(弾丸購入者)を特定する情報を対応付けて記憶する。 The server device 10 constructs a bullet case management database for managing bullet cases by processing notifications and requests (manufactured bullet information notification, dangerous goods distribution notification, sales propriety determination request) received from each business operator. . Specifically, each processing module of the dangerous goods manufacturing management section 202, the dangerous goods distribution management section 203, and the dangerous goods sales control section 204 of the server device 10 performs the processing, control, etc. described in the first embodiment. conduct. As a result, a bullet case management database as shown in FIG. 21 is constructed. The bullet case management database stores case IDs of manufactured bullets in association with information specifying distribution routes and owners (bullet purchasers).
 さらに、第1の実施形態に係る危険物管理システムにおいて、任意のタイミングで、弾丸の物体指紋と当該弾丸を格納された弾丸ケースのケースIDがサーバ装置10に登録される。例えば、弾丸を製造する弾丸製造業者が、弾丸ケースに収納された各弾丸の弾丸物体指紋を採取する。さらに、当該弾丸製造業者は、弾丸物体指紋が採取された弾丸を格納する弾丸ケースのケースIDを取得する。 Further, in the dangerous goods management system according to the first embodiment, the object fingerprint of the bullet and the case ID of the bullet case storing the bullet are registered in the server device 10 at an arbitrary timing. For example, a bullet manufacturer that manufactures bullets takes bullet object fingerprints for each bullet housed in a bullet case. Furthermore, the bullet manufacturer obtains the case ID of the bullet case that stores the bullet from which the bullet object fingerprint was taken.
 弾丸製造業者(弾丸製造業者に設置された端末、コンピュータ等)は、取得した少なくとも1以上の物体弾丸指紋と対応するケースIDをサーバ装置10に送信する。 The bullet manufacturer (terminal, computer, etc. installed at the bullet manufacturer) transmits the acquired at least one object bullet fingerprint and the corresponding case ID to the server device 10.
 なお、弾丸物体指紋とケースIDをサーバ装置10に送信する主体は、弾丸製造業者に限定されない。危険物管理システムに含まれる任意の主体が、弾丸物体指紋とケースIDをサーバ装置10に送信することができる。即ち、弾丸ケースに格納された弾丸が、弾丸購入者に販売されるまでに弾丸物体指紋とケースIDがサーバ装置10に送信されればよい。 Note that the entity that transmits the bullet object fingerprint and case ID to the server device 10 is not limited to the bullet manufacturer. Any entity included in the dangerous goods management system can send the bullet object fingerprint and case ID to the server device 10. That is, the bullet object fingerprint and the case ID need only be transmitted to the server device 10 before the bullet stored in the bullet case is sold to the bullet purchaser.
 図22は、第1の実施形態の変形例に係るサーバ装置10の処理構成(処理モジュール)の一例を示す図である。図22を参照すると、第1の実施形態に係るサーバ装置10の構成にケースID処理部207が追加されている。 FIG. 22 is a diagram illustrating an example of a processing configuration (processing module) of the server device 10 according to a modification of the first embodiment. Referring to FIG. 22, a case ID processing unit 207 is added to the configuration of the server device 10 according to the first embodiment.
 ケースID処理部207は、受信した弾丸物体指紋とケースIDを処理する手段である。ケースID処理部207は、弾丸物体指紋とケースIDを弾丸製造業者等から受信すると、当該受信した弾丸物体指紋とケースIDを弾丸物体指紋管理データベースに記憶する(図23参照)。 The case ID processing unit 207 is a means for processing the received bullet object fingerprint and case ID. When the case ID processing unit 207 receives the bullet object fingerprint and case ID from a bullet manufacturer or the like, it stores the received bullet object fingerprint and case ID in the bullet object fingerprint management database (see FIG. 23).
 遺留品の弾丸から採取された弾丸物体指紋を含む所有者情報提供要求を受信すると、情報提供制御部205は、所有者情報提供要求に含まれる弾丸物体指紋と弾丸物体指紋管理データベースに記憶された弾丸物体指紋を用いた物体認証を実行する。物体認証に成功すると、情報提供制御部205は、物体認証により特定されたケースIDをキーとして弾丸ケース管理データベースを検索し、対応するエントリを特定する。 Upon receiving the owner information provision request including the bullet object fingerprint collected from the bullet in the remains, the information provision control unit 205 stores the bullet object fingerprint included in the owner information provision request and the bullet object fingerprint management database. Execute object authentication using bullet object fingerprints. When the object authentication is successful, the information provision control unit 205 searches the bullet case management database using the case ID specified by the object authentication as a key, and identifies the corresponding entry.
 情報提供制御部205は、特定されたエントリの所有者特定情報を捜査機関端末60に送信する。 The information provision control unit 205 transmits the owner identification information of the identified entry to the investigation agency terminal 60.
 このように、弾丸ケースのケースIDを用いた弾丸(弾丸ケース)のトレーサビリティシステムが確立されている場合、弾丸の物体指紋とケースIDを対応付けて記憶する処理を追加することで犯罪現場に残された弾丸の所有者を特定するシステムが構築される。即ち、弾丸物体指紋とケースIDを任意のタイミングで取得し、システムに登録することで、犯罪現場に残された弾丸の所有者(弾丸の購入者)を特定するシステムが容易に構築される。 In this way, if a traceability system for bullets (bullet casings) using the case ID of bullet casings has been established, adding a process to associate and store the object fingerprint of the bullet and the case ID will allow the bullets to remain at the crime scene. A system will be built to identify the owner of the bullet. That is, by acquiring the bullet object fingerprint and case ID at an arbitrary timing and registering them in the system, a system for identifying the owner of the bullet left at the crime scene (bullet purchaser) can be easily constructed.
 以上のように、第1の実施形態に係る危険物管理システムにおいて、危険物の物体指紋と当該危険物の所有者を特定する情報がサーバ装置10に記憶される。即ち、銃や弾丸が販売されると、当該銃や弾丸の購入者の身元確認の後、銃や弾丸の物体指紋と購入者の情報が対応付けて記憶される。捜査機関は、犯罪現場に残された遺留品(銃又は弾丸)の物体指紋をサーバ装置10に送信することで、当該遺留品の所有者に関する情報を容易に取得できる。 As described above, in the dangerous goods management system according to the first embodiment, the object fingerprint of a dangerous object and information identifying the owner of the dangerous object are stored in the server device 10. That is, when a gun or bullet is sold, after the identity of the purchaser of the gun or bullet is confirmed, the object fingerprint of the gun or bullet and the purchaser's information are stored in association with each other. An investigation agency can easily obtain information regarding the owner of a leftover item (gun or bullet) left at a crime scene by transmitting the object fingerprint of the leftover item (gun or bullet) to the server device 10.
 ここで、捜査機関は、弾丸に残る線条痕と、容疑者が所持する銃を試射することで得られる線条痕と、を比較することで、現場の弾丸が容疑者の銃から発射された裏付けを取ることができる。しかし、捜査機関は、当該比較によって現場に残された弾丸の所有者を得ることはできない。対して、第1の実施形態に係る危険物管理システムにおいて、捜査機関は、犯罪現場に残る弾丸の所有者(購入者)を特定することができる。 Investigative agencies can determine whether the bullet at the scene was fired from the suspect's gun by comparing the streaks left on the bullet with the streaks obtained by test-firing the suspect's gun. It is possible to confirm the facts. However, the investigating agency cannot determine the ownership of the bullets left at the scene through such comparison. On the other hand, in the dangerous goods management system according to the first embodiment, the investigation agency can identify the owner (purchaser) of the bullet remaining at the crime scene.
 また、サーバ装置10は、危険物の流通経路を記憶する。即ち、第1の実施形態に係る危険物管理システムにおいて、銃や弾丸といった危険物の完全なトレーサビリティが確保される。 Additionally, the server device 10 stores the distribution route of hazardous materials. That is, in the dangerous goods management system according to the first embodiment, complete traceability of dangerous goods such as guns and bullets is ensured.
[第2の実施形態]
 続いて、第2の実施形態について図面を参照して詳細に説明する。
[Second embodiment]
Next, a second embodiment will be described in detail with reference to the drawings.
 第1の実施形態では、捜査機関が遺留品の所有者に関する情報提供を管理センターに要求する場合について説明した。第2の実施形態では、捜査機関が他の情報提供を管理センターに要求する場合について説明する。 In the first embodiment, a case has been described in which an investigative agency requests the management center to provide information regarding the owner of a leftover item. In the second embodiment, a case will be described in which an investigative agency requests the management center to provide other information.
 なお、第2の実施形態に係る危険物管理システムの構成は第1の実施形態と同一とすることができるので図3に相当する説明を省略する。また、第2の実施形態に係るサーバ装置10、販売者端末50及び捜査機関端末60等の処理構成も第1の実施形態と同一とすることができるので、その説明を省略する。 Note that the configuration of the hazardous materials management system according to the second embodiment can be the same as that of the first embodiment, so the explanation corresponding to FIG. 3 will be omitted. Furthermore, the processing configurations of the server device 10, the seller terminal 50, the investigative agency terminal 60, etc. according to the second embodiment can also be the same as those of the first embodiment, so a description thereof will be omitted.
 以下、第1の実施形態と第2の実施形態の相違点を中心に説明する。 Hereinafter, the differences between the first embodiment and the second embodiment will be mainly described.
 第2の実施形態に係る捜査機関端末60は、遺留品(銃又は弾丸)の流通経路に関する情報提供をサーバ装置10に要求してもよい。この場合、情報提供要求部403は、遺留品の物体指紋を含む「流通経路情報提供要求」をサーバ装置10に送信する。 The investigative agency terminal 60 according to the second embodiment may request the server device 10 to provide information regarding the distribution route of the left behind item (gun or bullet). In this case, the information provision request unit 403 transmits a “distribution route information provision request” including the object fingerprint of the leftover item to the server device 10.
 流通経路情報提供要求を受信したサーバ装置10(情報提供制御部205)は、物体認証により特定されたエントリから流通経路フィールドに設定された流通経路を読み出す。情報提供制御部205は、読み出した流通経路を捜査機関端末60に通知する。 Upon receiving the distribution route information provision request, the server device 10 (information provision control unit 205) reads the distribution route set in the distribution route field from the entry specified by object authentication. The information provision control unit 205 notifies the investigation agency terminal 60 of the read distribution route.
 捜査機関端末60の情報提供要求部403は、受信した流通経路を捜査官等に提供する。例えば、情報提供要求部403は、流通経路に関する情報をディスプレイに表示する、又は、プリンターを使って当該情報を印刷する。 The information provision request unit 403 of the investigation agency terminal 60 provides the received distribution route to the investigator. For example, the information provision requesting unit 403 displays information regarding the distribution route on a display, or prints the information using a printer.
 例えば、情報提供要求部403は、図24に示すような情報をディスプレイ等に表示する。捜査官等は、提示された流通経路を犯罪捜査に役立てる。例えば、捜査官は、販売業者に危険物を購入した人物の聞き込みを行う。 For example, the information provision requesting unit 403 displays information as shown in FIG. 24 on a display or the like. Investigators use the presented distribution routes in criminal investigations. For example, an investigator may interview a seller about the person who purchased a dangerous item.
 あるいは、捜査機関端末60は、遺留品に関する全体的な情報提供をサーバ装置10に要求してもよい。この場合、情報提供要求部403は、遺留品の物体指紋を含む「遺留品情報提供要求」をサーバ装置10に送信する。 Alternatively, the investigative agency terminal 60 may request the server device 10 to provide overall information regarding the belongings left behind. In this case, the information provision request unit 403 transmits a “remaining item information provision request” including the object fingerprint of the leftover item to the server device 10.
 遺留品情報提供要求を受信したサーバ装置10の情報提供制御部205は、物体認証により特定されたエントリをデータベースから読み出す。情報提供制御部205は、当該読み出したエントリに記載された情報(製造者ID、流通経路、販売者ID、所有者特定情報等)を捜査機関端末60に送信する。 The information provision control unit 205 of the server device 10 that has received the request to provide information on the left behind reads the entry specified by object authentication from the database. The information provision control unit 205 transmits the information written in the read entry (manufacturer ID, distribution route, seller ID, owner identification information, etc.) to the investigation agency terminal 60.
 捜査機関端末60の情報提供要求部403は、受信した情報(遺留品に関する情報)を捜査官等に提供する。例えば、情報提供要求部403は、図25に示すような情報をディスプレイ等に表示する。 The information provision requesting unit 403 of the investigation agency terminal 60 provides the received information (information regarding the belongings left behind) to the investigator, etc. For example, the information provision requesting unit 403 displays information as shown in FIG. 25 on a display or the like.
 あるいは、サーバ装置10は、危険物所有者の生体情報(顔画像)をデータベースに記憶している場合には、当該生体情報も捜査機関端末60に送信してもよい。捜査機関端末60の情報提供要求部403は、受信した生体情報(顔画像)を含む表示を行ってもよい(図26参照)。 Alternatively, if the server device 10 stores the biometric information (facial image) of the dangerous object owner in the database, the server device 10 may also send the biometric information to the investigation agency terminal 60. The information provision requesting unit 403 of the investigative agency terminal 60 may perform a display including the received biometric information (facial image) (see FIG. 26).
 以上のように、第2の実施形態に係るサーバ装置10は、危険物管理データベースに登録された種々の情報を捜査機関等に提供可能である。具体的には、サーバ装置10は、物体(遺留品)から取得された物体指紋を含む流通経路情報提供要求を受信すると、物体認証により流通経路情報提供要求に含まれる物体指紋に対応する流通経路を特定する。サーバ装置10は、特定された流通経路を流通経路情報提供要求の送信元(捜査機関端末60)に通知する。このように、第2の実施形態に係る危険物管理システムは、犯罪現場に残された弾丸や銃に関し、当該弾丸等が製造された工場やその流通経路等を捜査機関に提供できる。 As described above, the server device 10 according to the second embodiment can provide various information registered in the dangerous goods management database to investigative agencies and the like. Specifically, upon receiving a distribution route information provision request including an object fingerprint acquired from an object (leftover item), the server device 10 performs object authentication to determine the distribution route corresponding to the object fingerprint included in the distribution route information provision request. Identify. The server device 10 notifies the source (investigative agency terminal 60) of the distribution route information provision request of the identified distribution route. In this way, the dangerous goods management system according to the second embodiment can provide investigative agencies with information about the factory where the bullets, etc. were manufactured, their distribution routes, etc. regarding bullets and guns left at crime scenes.
 続いて、危険物管理システムを構成する各装置のハードウェアについて説明する。図27は、サーバ装置10のハードウェア構成の一例を示す図である。 Next, the hardware of each device that makes up the hazardous materials management system will be explained. FIG. 27 is a diagram illustrating an example of the hardware configuration of the server device 10.
 サーバ装置10は、情報処理装置(所謂、コンピュータ)により構成可能であり、図27に例示する構成を備える。例えば、サーバ装置10は、プロセッサ311、メモリ312、入出力インターフェイス313及び通信インターフェイス314等を備える。上記プロセッサ311等の構成要素は内部バス等により接続され、相互に通信可能に構成されている。 The server device 10 can be configured by an information processing device (so-called computer), and has the configuration illustrated in FIG. 27. For example, the server device 10 includes a processor 311, a memory 312, an input/output interface 313, a communication interface 314, and the like. The components such as the processor 311 are connected by an internal bus or the like and are configured to be able to communicate with each other.
 但し、図27に示す構成は、サーバ装置10のハードウェア構成を限定する趣旨ではない。サーバ装置10は、図示しないハードウェアを含んでもよいし、必要に応じて入出力インターフェイス313を備えていなくともよい。また、サーバ装置10に含まれるプロセッサ311等の数も図27の例示に限定する趣旨ではなく、例えば、複数のプロセッサ311がサーバ装置10に含まれていてもよい。 However, the configuration shown in FIG. 27 is not intended to limit the hardware configuration of the server device 10. The server device 10 may include hardware that is not shown, and may not include the input/output interface 313 if necessary. Furthermore, the number of processors 311 and the like included in the server device 10 is not limited to the example shown in FIG. 27; for example, a plurality of processors 311 may be included in the server device 10.
 プロセッサ311は、例えば、CPU(Central Processing Unit)、MPU(Micro Processing Unit)、DSP(Digital Signal Processor)等のプログラマブルなデバイスである。あるいは、プロセッサ311は、FPGA(Field Programmable Gate Array)、ASIC(Application Specific Integrated Circuit)等のデバイスであってもよい。プロセッサ311は、オペレーティングシステム(OS;Operating System)を含む各種プログラムを実行する。 The processor 311 is, for example, a programmable device such as a CPU (Central Processing Unit), an MPU (Micro Processing Unit), or a DSP (Digital Signal Processor). Alternatively, the processor 311 may be a device such as an FPGA (Field Programmable Gate Array) or an ASIC (Application Specific Integrated Circuit). The processor 311 executes various programs including an operating system (OS).
 メモリ312は、RAM(Random Access Memory)、ROM(Read Only Memory)、HDD(Hard Disk Drive)、SSD(Solid State Drive)等である。メモリ312は、OSプログラム、アプリケーションプログラム、各種データを格納する。 The memory 312 is a RAM (Random Access Memory), a ROM (Read Only Memory), an HDD (Hard Disk Drive), an SSD (Solid State Drive), or the like. The memory 312 stores OS programs, application programs, and various data.
 入出力インターフェイス313は、図示しない表示装置や入力装置のインターフェイスである。表示装置は、例えば、液晶ディスプレイ等である。入力装置は、例えば、キーボードやマウス等のユーザ操作を受け付ける装置である。 The input/output interface 313 is an interface for a display device or input device (not shown). The display device is, for example, a liquid crystal display. The input device is, for example, a device such as a keyboard or a mouse that receives user operations.
 通信インターフェイス314は、他の装置と通信を行う回路、モジュール等である。例えば、通信インターフェイス314は、NIC(Network Interface Card)等を備える。 The communication interface 314 is a circuit, module, etc. that communicates with other devices. For example, the communication interface 314 includes a NIC (Network Interface Card).
 サーバ装置10の機能は、各種処理モジュールにより実現される。当該処理モジュールは、例えば、メモリ312に格納されたプログラムをプロセッサ311が実行することで実現される。また、当該プログラムは、コンピュータが読み取り可能な記憶媒体に記録することができる。記憶媒体は、半導体メモリ、ハードディスク、磁気記録媒体、光記録媒体等の非トランジェント(non-transitory)なものとすることができる。即ち、本発明は、コンピュータプログラム製品として具現することも可能である。また、上記プログラムは、ネットワークを介してダウンロードするか、あるいは、プログラムを記憶した記憶媒体を用いて、更新することができる。さらに、上記処理モジュールは、半導体チップにより実現されてもよい。 The functions of the server device 10 are realized by various processing modules. The processing module is realized, for example, by the processor 311 executing a program stored in the memory 312. Further, the program can be recorded on a computer-readable storage medium. The storage medium can be non-transitory, such as a semiconductor memory, a hard disk, a magnetic recording medium, an optical recording medium, etc. That is, the present invention can also be implemented as a computer program product. Furthermore, the above program can be updated via a network or by using a storage medium that stores the program. Furthermore, the processing module may be realized by a semiconductor chip.
 なお、販売者端末50等もサーバ装置10と同様に情報処理装置により構成可能であり、その基本的なハードウェア構成はサーバ装置10と相違する点はないので説明を省略する。 It should be noted that the seller terminal 50 and the like can also be configured by an information processing device in the same way as the server device 10, and the basic hardware configuration thereof is not different from the server device 10, so a description thereof will be omitted.
 情報処理装置であるサーバ装置10は、コンピュータを搭載し、当該コンピュータにプログラムを実行させることでサーバ装置10の機能が実現できる。また、サーバ装置10は、当該プログラムによりサーバ装置10の制御方法を実行する。 The server device 10, which is an information processing device, is equipped with a computer, and the functions of the server device 10 can be realized by having the computer execute a program. Further, the server device 10 executes the control method for the server device 10 using the program.
[変形例]
 なお、上記実施形態にて説明した危険物管理システムの構成、動作等は例示であって、システムの構成等を限定する趣旨ではない。
[Modified example]
Note that the configuration, operation, etc. of the hazardous materials management system described in the above embodiments are merely examples, and are not intended to limit the configuration, etc. of the system.
 上記実施形態では、危険物として銃及び弾丸を例にとり危険物管理システムの動作を説明した。しかし、危険物管理システムが対象とする危険物は銃及び弾丸のいずれか一方でもよい。 In the above embodiment, the operation of the dangerous goods management system was explained using guns and bullets as examples of dangerous goods. However, the hazardous materials targeted by the hazardous materials management system may be either guns or bullets.
 上記実施形態では、危険物の流通経路をシステムに登録するために流通事業者の流通事業者端末40が「危険物流通通知」をサーバ装置10に送信する場合について説明した。しかし、危険物の流通経路を記憶する必要がない場合には、流通事業者端末40は危険物流通通知をサーバ装置10に送信する必要がない。 In the above embodiment, a case has been described in which the distribution company terminal 40 of the distribution company transmits a "dangerous goods distribution notification" to the server device 10 in order to register the distribution route of the dangerous goods in the system. However, if there is no need to store the distribution route of dangerous goods, the distribution business terminal 40 does not need to send the dangerous goods distribution notification to the server device 10.
 危険物の流通経路をシステムに登録する必要がない場合には、銃製造業者や弾丸製造業者は危険物特定情報(銃のシリアル番号、弾丸ケースのケースID)をサーバ装置10に送信せずともよい。即ち、銃のシリアル番号や弾丸ケースのケースIDは、危険物の所有者を特定するために必須な情報ではない。 If there is no need to register the distribution route of dangerous goods in the system, gun manufacturers and bullet manufacturers can do so without sending dangerous goods identification information (gun serial number, bullet case case ID) to the server device 10. good. That is, the serial number of a gun and the case ID of a bullet case are not essential information for identifying the owner of a dangerous object.
 上記実施形態では、サーバ装置10は、ブラックリストを用いた判定を外部のサーバに依頼することを説明した。しかし、当該ブラックリストを用いた判定はサーバ装置10が実行してもよい。 In the above embodiment, it has been explained that the server device 10 requests an external server to make a determination using a blacklist. However, the server device 10 may perform the determination using the blacklist.
 あるいは、法令等によりブラックリストによる判定(危険物の購入者が犯罪者等ではないことの確認)が定められていない場合には、サーバ装置10はブラックリストによる判定を実施しなくてもよい。 Alternatively, if laws and regulations do not provide for determination using a blacklist (confirmation that the purchaser of dangerous goods is not a criminal, etc.), the server device 10 does not need to perform determination using a blacklist.
 販売可否判定を処理した際、危険物の販売が「不可」と判定された場合には、サーバ装置10は、当該販売不可と判定された原因を販売者端末50に通知してもよい。具体的には、サーバ装置10は、「本人確認に失敗」や「ブラックリストに掲載」等の販売不可と判定された原因を販売者端末50に通知してもよい。あるいは、危険物の購入希望者がブラックリストに掲載された人物である場合には、サーバ装置10は、当該購入希望者の情報(例えば、氏名)及び購入業者の情報(例えば、店舗の名称及び場所)を警察等に通知してもよい。 When processing the sales propriety determination, if it is determined that the sale of dangerous goods is "not possible", the server device 10 may notify the seller terminal 50 of the reason for the sale of the dangerous goods being determined to be "not possible". Specifically, the server device 10 may notify the seller terminal 50 of the reason why the product is determined to be unsaleable, such as "failed to verify identity" or "listed on a blacklist." Alternatively, if the person who wishes to purchase dangerous goods is a person listed on the blacklist, the server device 10 stores information about the person who wishes to purchase dangerous goods (for example, name) and information about the purchasing agent (for example, store name and location) may be notified to the police, etc.
 銃が犯罪現場に残され、当該遺留品の銃からシリアル番号が取得できる場合には、捜査機関の捜査官等は当該シリアル番号を捜査機関端末60に入力してもよい。捜査機関端末60は、銃のシリアル番号を含む所有者情報提供要求等をサーバ装置10に送信してもよい。サーバ装置10は、シリアル番号をキーとして銃管理データベースを検索し、対応するエントリの所有者特定情報を捜査機関端末60に送信してもよい。換言すれば、遺留品の銃からシリアル番号を取得できない場合であっても、捜査機関は、当該遺留品の銃から得られる物体指紋をサーバ装置10に送信することで、遺留品の所有者を知ることができる。 If a gun is left at a crime scene and a serial number can be obtained from the gun left behind, an investigator or the like of an investigative agency may input the serial number into the investigative agency terminal 60. The investigative agency terminal 60 may transmit a request for providing owner information including the serial number of the gun to the server device 10. The server device 10 may search the gun management database using the serial number as a key, and transmit the owner identification information of the corresponding entry to the investigating agency terminal 60. In other words, even if the serial number cannot be obtained from the gun left behind, the investigative agency can identify the owner of the gun by sending the object fingerprint obtained from the gun left behind to the server device 10. You can know.
 上記実施形態では、サーバ装置10の内部に銃管理データベース、弾丸管理データベースが構成される場合について説明したが、これらデータベースは外部のデータベースサーバ等に構築されてもよい。即ち、サーバ装置10の一部の機能は別のサーバに実装されていてもよい。より具体的には、上記説明した「危険物販売制御部(危険物販売制御手段)」、「情報提供制御部(情報提供制御手段)」等がシステムに含まれるいずれかの装置に実装されていればよい。 In the above embodiment, a case has been described in which a gun management database and a bullet management database are configured inside the server device 10, but these databases may be configured in an external database server or the like. That is, some functions of the server device 10 may be implemented in another server. More specifically, if the above-mentioned "dangerous goods sales control section (dangerous goods sales control means)", "information provision control section (information provision control means)", etc. are implemented in any of the devices included in the system. That's fine.
 各装置(例えば、サーバ装置10、販売者端末50)間のデータ送受信の形態は特に限定されないが、これら装置間で送受信されるデータは暗号化されていてもよい。これらの装置間では、生体情報等が送受信され、これらの情報を適切に保護するためには、暗号化されたデータが送受信されることが望ましい。 Although the form of data transmission and reception between each device (for example, the server device 10 and the seller terminal 50) is not particularly limited, the data transmitted and received between these devices may be encrypted. Biometric information and the like are transmitted and received between these devices, and in order to appropriately protect this information, it is desirable that encrypted data be transmitted and received.
 上記説明で用いた流れ図(フローチャート、シーケンス図)では、複数の工程(処理)が順番に記載されているが、実施形態で実行される工程の実行順序は、その記載の順番に制限されない。実施形態では、例えば各処理を並行して実行する等、図示される工程の順番を内容的に支障のない範囲で変更することができる。 Although a plurality of steps (processes) are described in order in the flowcharts (flowcharts, sequence diagrams) used in the above description, the order in which the steps are executed in the embodiment is not limited to the order in which they are described. In the embodiment, the order of the illustrated steps can be changed within a range that does not affect the content, such as executing each process in parallel, for example.
 上記の実施形態は本願開示の理解を容易にするために詳細に説明したものであり、上記説明したすべての構成が必要であることを意図したものではない。また、複数の実施形態について説明した場合には、各実施形態は単独で用いてもよいし、組み合わせて用いてもよい。例えば、実施形態の構成の一部を他の実施形態の構成に置き換えることや、実施形態の構成に他の実施形態の構成を加えることも可能である。さらに、実施形態の構成の一部について他の構成の追加、削除、置換が可能である。 The above embodiments have been described in detail to facilitate understanding of the present disclosure, and it is not intended that all the configurations described above are necessary. Further, when a plurality of embodiments are described, each embodiment may be used alone or in combination. For example, it is also possible to replace a part of the configuration of the embodiment with the configuration of another embodiment, or to add the configuration of another embodiment to the configuration of the embodiment. Furthermore, it is possible to add, delete, or replace some of the configurations of the embodiments with other configurations.
 上記の説明により、本発明の産業上の利用可能性は明らかであるが、本発明は、銃や弾丸等の危険物に関する管理を行う危険物管理システムなどに好適に適用可能である。 The industrial applicability of the present invention is clear from the above description, and the present invention is suitably applicable to a dangerous goods management system that manages dangerous goods such as guns and bullets.
 上記の実施形態の一部又は全部は、以下の付記のようにも記載され得るが、以下には限られない。
[付記1]
 複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する、記憶手段と、
 物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する、情報提供制御手段と、
 を備える、サーバ装置。
[付記2]
 危険物の購入希望者の本人確認書類と前記危険物の購入希望者から取得された生体情報を含む販売可否判定要求を販売事業者の端末から受信し、前記本人確認書類に記載された生体情報と前記危険物の購入希望者から取得された生体情報を用いた本人確認に成功すると、前記販売事業者が前記危険物の購入希望者に危険物を販売することを許可する、危険物販売制御手段をさらに備える、付記1に記載のサーバ装置。
[付記3]
 前記危険物販売制御手段は、前記本人確認書類に記載された生体情報と前記危険物の購入希望者から取得された生体情報を用いた1対1照合に成功した場合に、前記本人確認に成功したと判定する、付記2に記載のサーバ装置。
[付記4]
 前記危険物販売制御手段は、前記危険物の購入希望者の本人確認に成功し、且つ、前記危険物の購入希望者が危険物を購入できない人物としてブラックリストに掲載されていない場合に、前記販売事業者が前記危険物の購入希望者に危険物を販売することを許可する、付記3に記載のサーバ装置。
[付記5]
 前記危険物販売制御手段は、前記危険物の購入希望者の生体情報を、前記ブラックリストを有するサーバに送信することで、前記危険物の購入希望者が危険物を購入できない人物として前記ブラックリストに掲載されているか否かの問合せを行う、付記4に記載のサーバ装置。
[付記6]
 前記記憶手段は、前記複数の危険物それぞれに関する所有者特定情報と物体指紋を危険物管理データベースに記憶する、付記5に記載のサーバ装置。
[付記7]
 製造された危険物を特定する危険物特定情報と前記製造された危険物の物体指紋を製造業者の端末から受信し、前記受信した危険物特定情報と物体指紋を前記危険物管理データベースに記憶する、危険物製造管理手段をさらに備える、付記6に記載のサーバ装置。
[付記8]
 流通対象の危険物の前記危険物特定情報と前記流通対象の危険物の流通経路を流通事業者の端末から受信し、前記流通対象の危険物の前記危険物特定情報を用いて前記危険物管理データベースを検索することで特定されたエントリに前記流通対象の危険物の流通経路を記憶する、危険物流通管理手段をさらに備える、付記7に記載のサーバ装置。
[付記9]
 前記情報提供制御手段は、前記物体から取得された物体指紋を含む流通経路情報提供要求を受信すると、前記物体認証により前記流通経路情報提供要求に含まれる物体指紋に対応する前記流通経路を特定し、前記特定された流通経路を前記流通経路情報提供要求の送信元に通知する、付記8に記載のサーバ装置。
[付記10]
 前記危険物は、銃又は弾丸である、付記1乃至9のいずれか一項に記載のサーバ装置。
[付記11]
 前記生体情報は、顔画像又は前記顔画像から生成された特徴量である、付記2乃至9のいずれか一項に記載のサーバ装置。
[付記12]
 捜査機関端末と、
 サーバ装置と、
 を含み、
 前記サーバ装置は、
 複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する、記憶手段と、
 物体から取得された物体指紋を含む所有者情報提供要求を前記捜査機関端末から受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記捜査機関端末に通知する、情報提供制御手段と、
 を備える、システム。
[付記13]
 サーバ装置において、
 複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶し、
 物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する、サーバ装置の制御方法。
[付記14]
 サーバ装置に搭載されたコンピュータに、
 複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する処理と、
 物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する処理と、
 を実行させるためのプログラムを記憶する、コンピュータ読取可能な記憶媒体。
Part or all of the above embodiments may be described as in the following additional notes, but are not limited to the following.
[Additional note 1]
storage means for storing owner identification information for identifying the owner and object fingerprints in association with each other for each of the plurality of dangerous objects;
When an owner information provision request including an object fingerprint acquired from an object is received, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. Information provision control means that specifies the owner identification information corresponding to the object fingerprint included in the owner information provision request, and notifies the identified owner identification information to the transmission source of the owner information provision request;
A server device comprising:
[Additional note 2]
A request to determine whether or not a sale is possible is received from a terminal of a sales business operator, which includes the identification documents of a person wishing to purchase dangerous goods and the biometric information acquired from the person wishing to purchase said dangerous goods, and the biometric information written in the said identity verification documents is received from a terminal of a sales business. and dangerous goods sales control that allows the sales business to sell the dangerous goods to the person who wishes to purchase the dangerous goods if the identity verification using biometric information obtained from the person who wishes to purchase the dangerous goods is successful. The server device according to supplementary note 1, further comprising means.
[Additional note 3]
The dangerous goods sales control means succeeds in the identity verification when one-on-one matching using the biometric information written in the identity verification document and the biometric information obtained from the person wishing to purchase the dangerous goods is successful. The server device according to supplementary note 2, which determines that the server device has
[Additional note 4]
The dangerous goods sales control means, if the identity of the person wishing to purchase the dangerous goods has been successfully verified and the person wishing to purchase the dangerous goods is not listed on a blacklist as a person who cannot purchase dangerous goods, The server device according to appendix 3, which allows a sales business to sell dangerous goods to a person who wishes to purchase the dangerous goods.
[Additional note 5]
The dangerous goods sales control means sends biometric information of the person who wishes to purchase the dangerous goods to the server having the blacklist, so that the person who wishes to purchase the dangerous goods is included in the blacklist as a person who cannot purchase the dangerous goods. The server device according to supplementary note 4, which makes an inquiry as to whether or not the server device is listed in .
[Additional note 6]
The server device according to appendix 5, wherein the storage means stores owner identification information and object fingerprints regarding each of the plurality of dangerous objects in a dangerous object management database.
[Additional note 7]
Receive dangerous goods identification information that identifies a manufactured dangerous object and an object fingerprint of the manufactured dangerous object from a manufacturer's terminal, and store the received dangerous goods identification information and object fingerprint in the dangerous goods management database. , the server device according to appendix 6, further comprising dangerous goods production management means.
[Additional note 8]
The dangerous goods identification information of the dangerous goods to be distributed and the distribution route of the dangerous goods to be distributed are received from a terminal of a distributor, and the dangerous goods management is performed using the dangerous goods identification information of the dangerous goods to be distributed. The server device according to appendix 7, further comprising a dangerous goods distribution management means that stores a distribution route of the dangerous goods to be distributed in an entry specified by searching a database.
[Additional note 9]
When the information provision control means receives a distribution route information provision request including an object fingerprint acquired from the object, the information provision control means identifies the distribution route corresponding to the object fingerprint included in the distribution route information provision request by the object authentication. , the server device according to appendix 8, wherein the server device notifies the transmission source of the distribution route information provision request of the identified distribution route.
[Additional note 10]
The server device according to any one of Supplementary Notes 1 to 9, wherein the dangerous substance is a gun or a bullet.
[Additional note 11]
The server device according to any one of Supplementary Notes 2 to 9, wherein the biometric information is a facial image or a feature amount generated from the facial image.
[Additional note 12]
An investigative agency terminal,
a server device;
including;
The server device includes:
storage means for storing owner identification information for identifying the owner and object fingerprints in association with each other for each of the plurality of dangerous objects;
When an owner information provision request including an object fingerprint obtained from the object is received from the investigation agency terminal, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. an information provision control means that specifies the owner identification information corresponding to the object fingerprint included in the owner information provision request and notifies the identified owner identification information to the investigative agency terminal;
A system equipped with.
[Additional note 13]
In the server device,
For each of multiple dangerous objects, owner identification information that identifies the owner and object fingerprints are associated and stored,
When an owner information provision request including an object fingerprint acquired from an object is received, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. A method for controlling a server device, the method comprising: identifying the owner specifying information corresponding to an object fingerprint included in an owner information providing request, and notifying a transmission source of the owner information providing request of the specified owner specifying information.
[Additional note 14]
On the computer installed in the server device,
processing for storing owner identification information for identifying the owner and object fingerprints in association with each other for each of the plurality of dangerous objects;
When an owner information provision request including an object fingerprint acquired from an object is received, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. a process of identifying the owner identification information corresponding to the object fingerprint included in the owner information provision request, and notifying the identified owner identification information to the transmission source of the owner information provision request;
A computer-readable storage medium that stores a program for executing.
 なお、引用した上記の先行技術文献の各開示は、本書に引用をもって繰り込むものとする。以上、本発明の実施形態を説明したが、本発明はこれらの実施形態に限定されるものではない。これらの実施形態は例示にすぎないということ、及び、本発明のスコープ及び精神から逸脱することなく様々な変形が可能であるということは、当業者に理解されるであろう。即ち、本発明は、請求の範囲を含む全開示、技術的思想にしたがって当業者であればなし得る各種変形、修正を含むことは勿論である。 Furthermore, each disclosure of the cited prior art documents mentioned above shall be incorporated into this document by reference. Although the embodiments of the present invention have been described above, the present invention is not limited to these embodiments. It will be understood by those skilled in the art that these embodiments are illustrative only and that various modifications can be made without departing from the scope and spirit of the invention. That is, it goes without saying that the present invention includes the entire disclosure including the claims and various modifications and modifications that can be made by those skilled in the art in accordance with the technical idea.
10 サーバ装置
20 銃製造管理端末
21 カメラ付き顕微鏡
30 弾丸製造管理端末
31 カメラ付き顕微鏡
40 流通事業者端末
50 販売者端末
60 捜査機関端末
61 カメラ付き顕微鏡
100 サーバ装置
101 記憶手段
102 情報提供制御手段
201 通信制御部
202 危険物製造管理部
203 危険物流通管理部
204 危険物販売制御部
205 情報提供制御部
206 記憶部
207 ケースID処理部
301 通信制御部
302 本人確認書類取得部
303 生体情報取得部
304 判定要求部
305 記憶部
311 プロセッサ
312 メモリ
313 入出力インターフェイス
314 通信インターフェイス
401 通信制御部
402 物体指紋取得部
403 情報提供要求部
404 記憶部
10 Server device 20 Gun manufacturing management terminal 21 Camera-equipped microscope 30 Bullet manufacturing management terminal 31 Camera-equipped microscope 40 Distributor terminal 50 Seller terminal 60 Investigation agency terminal 61 Camera-equipped microscope 100 Server device 101 Storage means 102 Information provision control means 201 Communication control unit 202 Dangerous goods manufacturing management unit 203 Dangerous goods distribution management unit 204 Dangerous goods sales control unit 205 Information provision control unit 206 Storage unit 207 Case ID processing unit 301 Communication control unit 302 Identity verification document acquisition unit 303 Biometric information acquisition unit 304 Judgment request unit 305 Storage unit 311 Processor 312 Memory 313 Input/output interface 314 Communication interface 401 Communication control unit 402 Object fingerprint acquisition unit 403 Information provision request unit 404 Storage unit

Claims (14)

  1.  複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する、記憶手段と、
     物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する、情報提供制御手段と、
     を備える、サーバ装置。
    storage means for storing owner identification information for identifying the owner and object fingerprints in association with each other for each of the plurality of dangerous objects;
    When an owner information provision request including an object fingerprint acquired from an object is received, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. Information provision control means that specifies the owner identification information corresponding to the object fingerprint included in the owner information provision request, and notifies the identified owner identification information to the transmission source of the owner information provision request;
    A server device comprising:
  2.  危険物の購入希望者の本人確認書類と前記危険物の購入希望者から取得された生体情報を含む販売可否判定要求を販売事業者の端末から受信し、前記本人確認書類に記載された生体情報と前記危険物の購入希望者から取得された生体情報を用いた本人確認に成功すると、前記販売事業者が前記危険物の購入希望者に危険物を販売することを許可する、危険物販売制御手段をさらに備える、請求項1に記載のサーバ装置。 A request to determine whether or not a sale is possible is received from a terminal of a sales business operator, which includes the identification documents of a person wishing to purchase dangerous goods and the biometric information acquired from the person wishing to purchase said dangerous goods, and the biometric information written in the said identity verification documents is received from a terminal of a sales business. and dangerous goods sales control that allows the sales business to sell the dangerous goods to the person who wishes to purchase the dangerous goods if the identity verification using biometric information obtained from the person who wishes to purchase the dangerous goods is successful. The server device according to claim 1, further comprising means.
  3.  前記危険物販売制御手段は、前記本人確認書類に記載された生体情報と前記危険物の購入希望者から取得された生体情報を用いた1対1照合に成功した場合に、前記本人確認に成功したと判定する、請求項2に記載のサーバ装置。 The dangerous goods sales control means succeeds in the identity verification when one-on-one matching using the biometric information written in the identity verification document and the biometric information obtained from the person wishing to purchase the dangerous goods is successful. The server device according to claim 2, which determines that the server device has done so.
  4.  前記危険物販売制御手段は、前記危険物の購入希望者の本人確認に成功し、且つ、前記危険物の購入希望者が危険物を購入できない人物としてブラックリストに掲載されていない場合に、前記販売事業者が前記危険物の購入希望者に危険物を販売することを許可する、請求項3に記載のサーバ装置。 The dangerous goods sales control means, if the identity of the person wishing to purchase the dangerous goods has been successfully verified and the person wishing to purchase the dangerous goods is not listed on a blacklist as a person who cannot purchase dangerous goods, The server device according to claim 3, which permits a sales business to sell dangerous goods to a person who wishes to purchase said dangerous goods.
  5.  前記危険物販売制御手段は、前記危険物の購入希望者の生体情報を、前記ブラックリストを有するサーバに送信することで、前記危険物の購入希望者が危険物を購入できない人物として前記ブラックリストに掲載されているか否かの問合せを行う、請求項4に記載のサーバ装置。 The dangerous goods sales control means sends biometric information of the person who wishes to purchase the dangerous goods to the server having the blacklist, so that the person who wishes to purchase the dangerous goods is placed on the blacklist as a person who cannot purchase the dangerous goods. 5. The server device according to claim 4, wherein the server device makes an inquiry as to whether or not the information is published in .
  6.  前記記憶手段は、前記複数の危険物それぞれに関する所有者特定情報と物体指紋を危険物管理データベースに記憶する、請求項5に記載のサーバ装置。 The server device according to claim 5, wherein the storage means stores owner identification information and object fingerprints regarding each of the plurality of dangerous objects in a dangerous object management database.
  7.  製造された危険物を特定する危険物特定情報と前記製造された危険物の物体指紋を製造業者の端末から受信し、前記受信した危険物特定情報と物体指紋を前記危険物管理データベースに記憶する、危険物製造管理手段をさらに備える、請求項6に記載のサーバ装置。 Receive dangerous goods identification information that identifies a manufactured dangerous object and an object fingerprint of the manufactured dangerous object from a manufacturer's terminal, and store the received dangerous goods identification information and object fingerprint in the dangerous goods management database. 7. The server device according to claim 6, further comprising: , dangerous goods production management means.
  8.  流通対象の危険物の前記危険物特定情報と前記流通対象の危険物の流通経路を流通事業者の端末から受信し、前記流通対象の危険物の前記危険物特定情報を用いて前記危険物管理データベースを検索することで特定されたエントリに前記流通対象の危険物の流通経路を記憶する、危険物流通管理手段をさらに備える、請求項7に記載のサーバ装置。 The dangerous goods identification information of the dangerous goods to be distributed and the distribution route of the dangerous goods to be distributed are received from a terminal of a distributor, and the dangerous goods management is performed using the dangerous goods identification information of the dangerous goods to be distributed. 8. The server device according to claim 7, further comprising a dangerous goods distribution management means that stores a distribution route of the dangerous goods to be distributed in an entry specified by searching a database.
  9.  前記情報提供制御手段は、前記物体から取得された物体指紋を含む流通経路情報提供要求を受信すると、前記物体認証により前記流通経路情報提供要求に含まれる物体指紋に対応する前記流通経路を特定し、前記特定された流通経路を前記流通経路情報提供要求の送信元に通知する、請求項8に記載のサーバ装置。 When the information provision control means receives a distribution route information provision request including an object fingerprint acquired from the object, the information provision control means identifies the distribution route corresponding to the object fingerprint included in the distribution route information provision request by the object authentication. 9. The server device according to claim 8, wherein the server device notifies the transmission source of the distribution route information provision request of the specified distribution route.
  10.  前記危険物は、銃又は弾丸である、請求項1乃至9のいずれか一項に記載のサーバ装置。 The server device according to any one of claims 1 to 9, wherein the dangerous object is a gun or a bullet.
  11.  前記生体情報は、顔画像又は前記顔画像から生成された特徴量である、請求項2乃至9のいずれか一項に記載のサーバ装置。 The server device according to any one of claims 2 to 9, wherein the biometric information is a facial image or a feature amount generated from the facial image.
  12.  捜査機関端末と、
     サーバ装置と、
     を含み、
     前記サーバ装置は、
     複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する、記憶手段と、
     物体から取得された物体指紋を含む所有者情報提供要求を前記捜査機関端末から受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記捜査機関端末に通知する、情報提供制御手段と、
     を備える、システム。
    An investigative agency terminal,
    a server device;
    including;
    The server device includes:
    storage means for storing owner identification information for identifying the owner and object fingerprints in association with each other for each of the plurality of dangerous objects;
    When an owner information provision request including an object fingerprint acquired from the object is received from the investigation agency terminal, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. an information provision control means that specifies the owner identification information corresponding to the object fingerprint included in the owner information provision request and notifies the identified owner identification information to the investigative agency terminal;
    A system equipped with.
  13.  サーバ装置において、
     複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶し、
     物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する、サーバ装置の制御方法。
    In the server device,
    For each of multiple dangerous objects, owner identification information that identifies the owner and object fingerprints are associated and stored,
    When an owner information provision request including an object fingerprint acquired from an object is received, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. A method for controlling a server device, the method comprising: identifying the owner specifying information corresponding to an object fingerprint included in an owner information providing request, and notifying a transmission source of the owner information providing request of the specified owner specifying information.
  14.  サーバ装置に搭載されたコンピュータに、
     複数の危険物それぞれに関し、所有者を特定する所有者特定情報と物体指紋を対応付けて記憶する処理と、
     物体から取得された物体指紋を含む所有者情報提供要求を受信すると、前記所有者情報提供要求に含まれる物体指紋と前記記憶された複数の物体指紋を用いた物体認証を実行することで、前記所有者情報提供要求に含まれる物体指紋に対応する前記所有者特定情報を特定し、前記特定された所有者特定情報を前記所有者情報提供要求の送信元に通知する処理と、
     を実行させるためのプログラムを記憶する、コンピュータ読取可能な記憶媒体。
    On the computer installed in the server device,
    processing for storing owner identification information for identifying the owner and object fingerprints in association with each other for each of the plurality of dangerous objects;
    When an owner information provision request including an object fingerprint acquired from an object is received, object authentication is performed using the object fingerprint included in the owner information provision request and the plurality of stored object fingerprints. a process of identifying the owner identification information corresponding to the object fingerprint included in the owner information provision request, and notifying the identified owner identification information to the transmission source of the owner information provision request;
    A computer-readable storage medium that stores a program for executing.
PCT/JP2022/034793 2022-09-16 2022-09-16 Server device, system, method of controlling server device, and storage medium WO2024057542A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2022/034793 WO2024057542A1 (en) 2022-09-16 2022-09-16 Server device, system, method of controlling server device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2022/034793 WO2024057542A1 (en) 2022-09-16 2022-09-16 Server device, system, method of controlling server device, and storage medium

Publications (1)

Publication Number Publication Date
WO2024057542A1 true WO2024057542A1 (en) 2024-03-21

Family

ID=90274745

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2022/034793 WO2024057542A1 (en) 2022-09-16 2022-09-16 Server device, system, method of controlling server device, and storage medium

Country Status (1)

Country Link
WO (1) WO2024057542A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003099691A (en) * 2001-09-26 2003-04-04 Omron Corp User collation settlement method, system for the same, collation server and settlement device
JP2005056164A (en) * 2003-08-05 2005-03-03 Nec Soft Ltd Management and collation system, management and collation device, management and collation method, and program for firearm and bullet mark
JP2008310481A (en) * 2007-06-13 2008-12-25 Softbank Mobile Corp Sales system, sales shop, and sales method
WO2021130890A1 (en) * 2019-12-25 2021-07-01 日本電気株式会社 Management system, management device, and management method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003099691A (en) * 2001-09-26 2003-04-04 Omron Corp User collation settlement method, system for the same, collation server and settlement device
JP2005056164A (en) * 2003-08-05 2005-03-03 Nec Soft Ltd Management and collation system, management and collation device, management and collation method, and program for firearm and bullet mark
JP2008310481A (en) * 2007-06-13 2008-12-25 Softbank Mobile Corp Sales system, sales shop, and sales method
WO2021130890A1 (en) * 2019-12-25 2021-07-01 日本電気株式会社 Management system, management device, and management method

Similar Documents

Publication Publication Date Title
US11843709B2 (en) Secure digital fingerprint key object database
JP7060221B2 (en) Goods information management equipment, systems, methods and programs
US10824999B2 (en) Systems and methods for implementing hybrid public-private block-chain ledgers
US20210342957A1 (en) Secure and traceable manufactured parts
US11764974B2 (en) Method and system for certification and authentication of objects
US11075766B1 (en) Method and system for certification and authentication of objects
US20190303951A1 (en) Systems and methods for using codes and images within a blockchain
US20190188732A1 (en) System and method for ensuring credibility of items in a supply chain management
WO2019246626A1 (en) Decentralized identity verification platforms
CN107636662A (en) Web content certification
KR102069002B1 (en) History management method, apparatus and program for preventing fake using blockchain
US20210351927A1 (en) System, method and computer program product for mitigating customer onboarding risk
US20160100299A1 (en) Communication Method And System To Process And Control The Legality Of Products
WO2024057542A1 (en) Server device, system, method of controlling server device, and storage medium
Saadiah Consortium blockchain for military supply chain
US20210090011A1 (en) Identifying and Tracking System for Searching Items
JP6828311B2 (en) Information information system, information processing device and program
KR20210058091A (en) Method for providing history management system by assigning authentication mark and blockchain-based fake prevention
KR20210058092A (en) Blockchain-based transaction history management method with transactor authentication using eid
CN112118112B (en) Certificate copy using method and node equipment
US20220198167A1 (en) Method and system for registering and authenticating items
KR20210058090A (en) Blockchain-based method for authentication and history management using eid
JP2005056164A (en) Management and collation system, management and collation device, management and collation method, and program for firearm and bullet mark
KR101882956B1 (en) Device and system for adult vow of customer and method for getting adult vow of customer

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22958861

Country of ref document: EP

Kind code of ref document: A1