Abstract:
A management method manages devices in a home includes, receiving operation information on one of the devices when an operation is performed for the one of the devices, specifying times at which the operation was performed, in accordance with the information, and receiving, whenever a state is entered when no one is expected to be home, time information when the state has been entered. Specifying in-home-absence times at which a state has been entered when no one is expected to be home, according to the time information, for each of the devices, calculating time differences for the specified operation times, and for each of the devices, specifying the performed operation as a first behavior of the person correlated to a behavior before the person leaves home, when variation of the calculated time differences of the corresponding one of the devices is equal to or lower than a threshold.
Abstract:
Specification of a time is received from a device that uses an in-home-presence probability calculation system, a probability that a person is at home at the specified time is calculated on the basis of a specified operation time and a specified correlation when the specified operation time is a time within a period of a certain time ending at the time at which the specification has been received, and information as to whether or not a person is at home is output to the device on the basis of the calculated probability.
Abstract:
In an authentication method according to the present disclosure, (1) a device transmits device history information with a CRL added thereto (hereinafter, device history information with added CRL) to a controller, (2) the controller transmits the device history information with added CRL to a server, and (3) if the version of the CRL included in the device history information with added CRL is older than the version of the CRL stored on the server, the server judges that the controller is unauthorized.
Abstract:
A device control method used in a device control system in which an operation terminal is used to remotely operate a device with a server device mediating between the operation terminal and the device, the device control method including: acquiring, upon reception of an operation instruction for operation of the device from the operation terminal, environment information pertaining to at least one of the device and the operation terminal; performing a determination of whether or not to cause execution of processing corresponding to the operation instruction based on whether or not the environment information satisfies a predetermined condition; and causing the device to execute an execution command for execution of the processing when a result of the determination is affirmative, and not causing the device to execute the execution command when the result of the determination is negative.
Abstract:
An authentication system according to the present disclosure includes a first controller connected to a first server via a first network, a second controller connected to a second server via a second network, and a device. The device compares a next issue date described in a first certificate revocation list acquired from the first controller and an issue date described in a second certificate revocation list acquired from the second controller thereby determining whether the first controller is invalid or not.
Abstract:
A server holds correspondence information in which a device identifier of a device for which an authentication process is successful and area network information concerning an area network including a controller are associated with each other. In the case where the authentication process is successful, the device holds area network information concerning an area network including a controller for which authentication is successful. In response to a connection request from a new device, the server checks whether an identifier of the new device is registered in the correspondence information. If the identifier is registered, the server determines whether the area network information associated with the identifier matches the area network information held by the new device. If the pieces of information do not match, the server detects the new device as an unauthorized device.
Abstract:
A device control method used in a device control system in which an operation terminal is used to remotely operate a device with a server device mediating between the operation terminal and the device, the device control method including: acquiring, upon reception of an operation instruction for operation of the device from the operation terminal, environment information pertaining to at least one of the device and the operation terminal; performing a determination of whether or not to cause execution of processing corresponding to the operation instruction based on whether or not the environment information satisfies a predetermined condition; and causing the device to execute an execution command for execution of the processing when a result of the determination is affirmative, and not causing the device to execute the execution command when the result of the determination is negative.
Abstract:
Device control method including: operation receiving step of receiving a device control operation for controlling a device; determining step of determining whether an operation terminal is in a first state or a second state; limiting step of, when determined in the determining step that the operation terminal is in the second state, limiting a range of controls of the device made available to the operation terminal when in the second state so as to correspond to part of a range of controls of the device made available to the operation terminal when in the first state; and device controlling step of controlling the device based on the device control operation. When determined in the determining step that the operation terminal is in the second state, the device is controlled within the range of controls of the device made available to the operation terminal when in the second state.
Abstract:
A system includes a biometric sensor that detects biometric data of a person in a first region and a presuming unit calculating, from the biometric data, a stress index and presuming that the person is a person to be tracked based on the calculated stress index. The system also includes a first camera acquiring first image data of the person in the first region and a second camera acquiring second image data of the person in a second region. The system further includes a monitoring unit that checks the second image data with the first image data corresponding to the target person to track the target person in the second region and determine whether the suspicious person enters the second region. The system also includes a warning unit that emits a warning when the monitoring unit determines that the target person enters the second region.
Abstract:
A suspicious person report system includes: a biometric sensor detecting biometric data of a person in a first region; a presuming unit calculating, from the biometric data, a stress index and presuming that the person is a suspicious person when the calculated stress index is higher than a reference value; a first camera acquiring first image data of the person in the first region; a second camera acquiring second image data of the person in a second region, the second region being a route after the first region before a third region; a monitoring unit checking the second image data with the first image data corresponding to the suspicious person to thereby track the suspicious person in the second region and determine whether the suspicious person enters the third region; and a warning unit emitting a warning when the monitoring unit determines that the suspicious person enters the third region.