A non-intrusive access control method. First, identification of a tag and
real-time circumstance information both related to a detection area are
acquired. Next, whether the tag is permitted is determined based on
circumstance identification corresponding to the detection area, the tag
and the real-time circumstance information.