TW201721490A - Biometrics locking and unlocking system and method therefore - Google Patents
Biometrics locking and unlocking system and method therefore Download PDFInfo
- Publication number
- TW201721490A TW201721490A TW104141232A TW104141232A TW201721490A TW 201721490 A TW201721490 A TW 201721490A TW 104141232 A TW104141232 A TW 104141232A TW 104141232 A TW104141232 A TW 104141232A TW 201721490 A TW201721490 A TW 201721490A
- Authority
- TW
- Taiwan
- Prior art keywords
- instruction
- unlocking
- module
- locking
- lock
- Prior art date
Links
Abstract
Description
一種鎖定與解鎖系統及其方法,尤其是指一種透過生物特徵進行鎖定與解鎖系統及其方法。A locking and unlocking system and method therefor, and more particularly to a locking and unlocking system and method thereof through biometrics.
隨著科技的進步與發展,使用者可以使用多種類的隨身電子裝置,在隨身電子裝置上通常具有鎖定與解鎖的功能,若在公共場合使用隨身電子裝置時,在解鎖隨身電子裝置則有解鎖方式(例如:密碼…等)外洩的可能性。With the advancement and development of technology, users can use a variety of portable electronic devices, which usually have the function of locking and unlocking on the portable electronic device. If the portable electronic device is used in public, the unlocked portable electronic device is unlocked. The possibility of leaking the way (eg password, etc.).
除此之外,現在對於門禁控管、車輛門鎖…等,亦可透過電子門禁的方式進行控管,這種門禁控管通常是透過晶片卡、晶片鎖…等的形式進行解鎖,然而不同的電子門禁則需要對應的晶片卡、晶片鎖…等,則會造成使用者需要攜帶過多的晶片卡、晶片鎖…等,造成使用上的不便。In addition, now, for access control, vehicle door locks, etc., it can also be controlled by electronic access control. This access control is usually unlocked by means of wafer cards, wafer locks, etc. The electronic access control requires a corresponding wafer card, wafer lock, etc., which may cause the user to carry too many wafer cards, wafer locks, etc., resulting in inconvenience in use.
綜上所述,可知先前技術中長期以來一直存在電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題,因此有必要提出改進的技術手段,來解決此一問題。In summary, it can be known that in the prior art, there has been a long-standing problem that the unlocking method is leaked when the electronic device is unlocked and the use of different wafer cards or wafer locks is inconvenient to use, so it is necessary to propose an improved technical means to solve this problem. A problem.
有鑒於先前技術存在電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題,本發明遂揭露一種透過生物特徵進行鎖定與解鎖系統及其方法,其中:In view of the prior art, there is a problem that the unlocking method is leaked when the electronic device is unlocked, and the electronic access control needs to use different wafer cards or wafer locks, which causes inconvenience in use, and the present invention discloses a locking and unlocking system through biometrics and a method thereof, wherein:
本發明所揭露的透過生物特徵進行鎖定與解鎖系統,其包含:至少一受控端以及第一控制裝置,受控端更包含:鎖端生成模組、鎖端傳送模組、鎖端接收模組、鎖端儲存模組、鎖定模組、鎖端驗證模組及解鎖模組;第一控制裝置更包含:生物特徵接收模組、生成模組、第一儲存模組、第一接收模組以及第一傳送模組。The locking and unlocking system for biometrics disclosed in the present invention comprises: at least one controlled end and a first control device, wherein the controlled end further comprises: a lock end generating module, a lock end transmitting module, a lock end receiving module The group, the lock storage module, the locking module, the lock end verification module and the unlocking module; the first control device further comprises: a biometric receiving module, a generating module, a first storage module, and a first receiving module And a first transfer module.
其中,受控端的鎖端生成模組是當受控端第一次執行時,生成金鑰載入指令;受控端的鎖端傳送模組是用以傳送金鑰載入指令;受控端的鎖端接收模組是用以接收鎖定指令,或是接收數位金鑰以及解鎖指令;受控端的鎖端儲存模組是用以儲存數位金鑰;受控端的鎖定模組是用以依據鎖定指令對受控端或是受控端中被指定的文件或程式進行鎖定程序;受控端的鎖端驗證模組是用以依據鎖端儲存模組所儲存的數位金鑰對鎖端接收模組所接收到的數位金鑰進行驗證;及受控端的解鎖模組是用以當鎖端接收模組所接收到的數位金鑰通過驗證模組的驗證時,依據解鎖指令對受控端或是受控端中被指定的文件或程式進行解鎖程序。The lock end generation module of the controlled end generates a key load instruction when the controlled end is executed for the first time; the lock end transfer module of the controlled end is used to transmit the key load instruction; the controlled end lock The terminal receiving module is configured to receive the locking instruction, or receive the digital key and the unlocking instruction; the controlled end locking storage module is used for storing the digital key; the controlled end locking module is used according to the locking instruction pair The controlled file or the program in the controlled end is locked by the specified file or program; the controlled end lock verification module is used to receive the lock receiving module according to the digital key stored by the lock storage module. The digital key is verified; and the unlocking module of the controlled end is used to control the controlled terminal according to the unlocking command when the digital key received by the locking receiving module passes the verification of the verification module. The specified file or program in the terminal is used to unlock the program.
第一控制裝置的生物特徵接收模組是用以接收生物特徵;第一控制裝置的生成模組是用以將生物特徵進行數位轉換為數位金鑰;第一控制裝置的第一儲存模組是用以儲存數位金鑰;第一控制裝置的第一接收模組,用以接收金鑰載入指令、鎖定指令或是解鎖指令;及第一控制裝置的第一傳送模組是用以當接收到金鑰載入指令時,傳送數位金鑰至與金鑰載入指令對應的受控端;當接收到鎖定指令時,傳送鎖定指令至與鎖定指令對應的受控端;當接收到解鎖指令時,傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端。The biometric receiving module of the first control device is configured to receive the biometric feature; the generating module of the first control device is configured to digitally convert the biometric feature into a digital key; the first storage module of the first control device is For storing a digital key; the first receiving module of the first control device is configured to receive a key loading command, a locking command or an unlocking command; and the first transmitting module of the first control device is configured to receive When the key is loaded into the instruction, the digital key is transferred to the controlled end corresponding to the key loading instruction; when the locking instruction is received, the locking instruction is transmitted to the controlled end corresponding to the locking instruction; when the unlocking instruction is received At the same time, the digital key is transmitted and the unlock command is sent to the controlled end corresponding to the unlock command.
本發明所揭露的透過生物特徵進行鎖定與解鎖方法,其包含下列步驟:The method for locking and unlocking through biometrics disclosed in the present invention comprises the following steps:
首先,第一控制裝置接收生物特徵並將生物特徵進行數位轉換為數位金鑰並儲存;接著,提供至少一受控端,受控端第一次執行時,生成金鑰載入指令並傳送至第一控制裝置;接著,第一控制裝置依據金鑰載入指令傳送數位金鑰至與金鑰載入指令對應的受控端;接著,受控端儲存數位金鑰;接著,第一控制裝置接收鎖定指令,並傳送鎖定指令至與鎖定指令對應的受控端;接著,受控端依據鎖定指令對受控端或是受控端中被指定的文件或程式進行鎖定程序;接著,第一控制裝置接收解鎖指令,並傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端;接著,受控端依據受控端所儲存的數位金鑰對受控端所接收到的數位金鑰進行驗證;最後,當受控端所接收到的數位金鑰通過驗證時,依據解鎖指令對受控端或是受控端中被指定的文件或程式進行解鎖程序。First, the first control device receives the biometrics and digitally converts the biometrics into digital keys and stores them; and then provides at least one controlled end, and when the controlled end is executed for the first time, generates a key loading instruction and transmits the a first control device; then, the first control device transmits the digital key to the controlled end corresponding to the key loading instruction according to the key loading instruction; then, the controlled terminal stores the digital key; then, the first control device Receiving a lock instruction and transmitting a lock instruction to the controlled end corresponding to the lock instruction; then, the controlled end locks the specified file or program in the controlled end or the controlled end according to the lock instruction; then, the first The control device receives the unlocking instruction, and transmits the digital key and the unlocking command to the controlled end corresponding to the unlocking instruction; then, the controlled terminal receives the digital key received by the controlled terminal according to the digital key stored by the controlled terminal. Verification; finally, when the digital key received by the controlled terminal passes the verification, the specified file or program in the controlled or controlled terminal is unlocked according to the unlocking instruction. .
本發明所揭露的系統及方法如上,與先前技術之間的差異在於本發明透過由生物特徵轉換的數位金鑰提供多種受控端的鎖定與解鎖功能,可以有效的避免電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題。The system and method disclosed in the present invention are different from the prior art in that the present invention provides a plurality of locked and unlocked functions of the controlled terminal through the digital key converted by the biometric feature, thereby effectively preventing the unlocking mode when the electronic device is unlocked. Leakage and electronic access control require the use of different wafer cards or wafer locks to cause inconvenience.
透過上述的技術手段,本發明可以達成提供便捷性且具隱密性解鎖與鎖定裝置的技術功效。Through the above technical means, the present invention can achieve the technical effect of providing a convenient and secret unlocking and locking device.
以下將配合圖式及實施例來詳細說明本發明的實施方式,藉此對本發明如何應用技術手段來解決技術問題並達成技術功效的實現過程能充分理解並據以實施。The embodiments of the present invention will be described in detail below with reference to the drawings and embodiments, so that the application of the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented.
以下將說明本發明的運作系統與方法,並請同時參考「第1圖」、「第2A圖」以及「第2B圖」所示,「第1圖」繪示為本發明透過生物特徵進行鎖定與解鎖系統的系統方塊圖;「第2A圖」以及「第2B圖」繪示為本發明透過生物特徵進行鎖定與解鎖方法的方法流程圖。The operation system and method of the present invention will be described below, and please refer to "Fig. 1", "2A" and "2B", and "Fig. 1" shows that the present invention is locked by biometrics. A system block diagram of the unlocking system; "2A" and "2B" illustrate a flow chart of a method for locking and unlocking biometrics according to the present invention.
本發明所揭露的透過生物特徵進行鎖定與解鎖系統,其包含:至少一受控端10以及第一控制裝置20,受控端10更包含:鎖端生成模組11、鎖端傳送模組12、鎖端接收模組13、鎖端儲存模組14、鎖定模組15、鎖端驗證模組16及解鎖模組17;第一控制裝置20更包含:生物特徵接收模組21、生成模組22、第一儲存模組23、第一接收模組24以及第一傳送模組25。The locking and unlocking system of the biometrics disclosed in the present invention comprises: at least one controlled end 10 and a first control device 20, the controlled end 10 further comprising: a lock end generating module 11 and a lock end transmitting module 12 The lock receiving module 13 , the lock end storage module 14 , the lock module 15 , the lock end verification module 16 and the unlocking module 17 ; the first control device 20 further includes: a biometric receiving module 21 and a generating module 22. The first storage module 23, the first receiving module 24, and the first transmitting module 25.
第一控制裝置20可以是穿戴式裝置或是可攜式裝置,上述的穿戴式裝置可以是電子手錶,在此僅為舉例說明之,並不以此侷限本發明的應用範疇,上述的可攜式裝置包含有智慧型手機、平板電腦…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The first control device 20 may be a wearable device or a portable device. The wearable device may be an electronic wristwatch, which is merely exemplified herein, and is not limited to the application scope of the present invention. The device includes a smart phone, a tablet, etc., which are merely illustrative and are not intended to limit the scope of application of the present invention.
第一控制裝置20的生物特徵接收模組21是用以接收使用者的生物特徵(步驟101),生物特徵包含有指紋、聲紋、虹膜以及視網膜…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The biometric receiving module 21 of the first control device 20 is configured to receive biometric features of the user (step 101), and the biometric features include a fingerprint, a voiceprint, an iris, a retina, etc., which are merely illustrated by way of example, and This does not limit the scope of application of the invention.
接著,透過第一控制裝置20的生成模組21將第一控制裝置20的生物特徵接收模組21所接收到的生物特徵進行數位轉換為數位金鑰(步驟101),由於每一個人的生物特徵是獨一無二的,故第一控制裝置20的生成模組21所生成即是唯一的數位金鑰。Then, the biometric feature received by the biometrics receiving module 21 of the first control device 20 is digitally converted into a digital key by the generating module 21 of the first control device 20 (step 101), due to the biometric characteristics of each individual. It is unique, so the generation module 21 of the first control device 20 generates a unique digital key.
接著,由第一控制裝置20的第一儲存模組23將第一控制裝置20的生成模組21所生成的數位金鑰加以儲存(步驟101)。Next, the digital key generated by the generation module 21 of the first control device 20 is stored by the first storage module 23 of the first control device 20 (step 101).
受控端10可以是硬體形式或是軟體形式,值得注意的是,若受控端10為軟體形式則必須要背景執行於安裝的裝置中,上述的硬體形式包含有電子門鎖、汽車門鎖、機車鎖、智慧型家電、桌上型電腦、筆記型電腦、平板電腦、智慧型手機…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇,上述的裝置包含有桌上型電腦、筆記型電腦、平板電腦、智慧型手機…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The controlled end 10 may be in the form of a hardware or a soft body. It is worth noting that if the controlled end 10 is in the form of a software, it must be implemented in the installation device. The above-mentioned hardware form includes an electronic door lock and a car. Door locks, locomotive locks, smart home appliances, desktop computers, notebook computers, tablet computers, smart phones, etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention. The inclusion of a desktop computer, a notebook computer, a tablet computer, a smart phone, etc., is merely illustrative, and is not intended to limit the scope of application of the present invention.
並當受控端10第一次執行時,受控端10的鎖端生成模組11生成金鑰載入指令,並透過受控端10的鎖端傳送模組12透過無線傳輸方式將金鑰載入指令傳送至第一控制裝置20(步驟102),上述的無線傳輸方式包含有Wi-Fi、藍芽(Bluetooth)、近場通訊(Near Field Communication,NFC)、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。And when the controlled terminal 10 is executed for the first time, the lock generating module 11 of the controlled terminal 10 generates a key loading command, and transmits the key through the wireless transmission mode through the lock transmitting module 12 of the controlled terminal 10. The load command is transmitted to the first control device 20 (step 102), and the wireless transmission method includes Wi-Fi, Bluetooth, Near Field Communication (NFC), 3G, 4G, etc. This is for illustrative purposes only and is not intended to limit the scope of application of the invention.
接著,第一控制裝置20的第一接收模組24即可自受控端10的鎖端傳送模組12接收金鑰載入指令,第一控制裝置20的第一傳送模組25即可將第一控制裝置20的第一儲存模組23所儲存的數位金鑰傳送至與金鑰載入指令對應的受控端10(步驟103)。Then, the first receiving module 24 of the first control device 20 can receive the key loading command from the lock transfer module 12 of the controlled terminal 10, and the first transmitting module 25 of the first control device 20 can The digital key stored by the first storage module 23 of the first control device 20 is transferred to the controlled terminal 10 corresponding to the key load instruction (step 103).
接著,受控端10的鎖端接收模組13即可自第一控制裝置20的第一傳送模組25接收數位金鑰,並由受控端10的鎖端儲存模組14儲存受控端10的鎖端接收模組13所接收到的數位金鑰(步驟104)。Then, the lock receiving module 13 of the controlled terminal 10 can receive the digital key from the first transmitting module 25 of the first control device 20, and the controlled storage terminal 14 of the controlled terminal 10 stores the controlled terminal. The lock of the 10 receives the digital key received by the module 13 (step 104).
當使用者需要對特定的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行鎖定,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的鎖定指令,鎖定指令即可與特定的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將鎖定指令傳送至對應的受控端10(步驟105)。When the user needs to lock a specified file or program in a specific controlled terminal 10 (here, a hardware form) or a controlled terminal 10 (in this case, a software form), the user can pass the first The combination of the selected mechanism, the button and the touch provided by the control device 20 selects the specific controlled terminal 10 to receive the generated lock command by the first receiving module 24 of the first control device 20, and the lock command can be specific to The controlled terminals 10 correspond to each other, and the lock command is transmitted to the corresponding controlled terminal 10 through the first transfer module 25 of the first control device 20 (step 105).
接著,受控端10的鎖端接收模組13即可自第一控制裝置20的第一傳送模組25接收鎖定指令,即可再由受控端10的鎖定模組15依據鎖定指令對受控端10或是受控端10中被指定的文件或程式進行鎖定程序(步驟106),藉此可以提供快速且便利受控端10或是受控端10中被指定的文件或程式的鎖定功能。Then, the lock receiving module 13 of the controlled terminal 10 can receive the locking command from the first transmitting module 25 of the first control device 20, and can be controlled by the locking module 15 of the controlled terminal 10 according to the locking command. The terminal 10 or the designated file or program in the controlled terminal 10 performs a locking process (step 106), thereby providing fast and convenient locking of the designated file or program in the controlled terminal 10 or the controlled terminal 10. Features.
當使用者需要對特定的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行解鎖,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的解鎖指令,解鎖指令即可與特定的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將數位金鑰以及解鎖指令傳送至與解鎖指令對應的受控端10(步驟107)。When the user needs to unlock the specified file or program in the specific controlled terminal 10 (here, the hardware form) or the controlled terminal 10 (in this case, the software form), the user can The combination of the selected mechanism, the button and the touch provided by the control device 20 selects the specific controlled terminal 10 to receive the generated unlocking command by the first receiving module 24 of the first control device 20, and the unlocking command can be associated with the specific The controlled terminals 10 correspond to each other, and the digital key and the unlocking command are transmitted to the controlled terminal 10 corresponding to the unlocking command through the first transmitting module 25 of the first control device 20 (step 107).
接著,受控端10的鎖端接收模組13即可自第一控制裝置20的第一傳送模組25接收數位金鑰以及解鎖指令,即可再由受控端10的鎖端驗證模組16依據受控端10的鎖端儲存模組14所儲存的數位金鑰對受控端10的鎖端接收模組13所接收到的數位金鑰進行驗證(步驟108)。Then, the lock receiving module 13 of the controlled terminal 10 can receive the digital key and the unlocking command from the first transmitting module 25 of the first control device 20, and then the locking end verification module of the controlled terminal 10 can be used. The digital key received by the lock receiving module 13 of the controlled terminal 10 is verified according to the digital key stored by the lock storage module 14 of the controlled terminal 10 (step 108).
當受控端10的鎖端接收模組13所接收到的數位金鑰通過受控端10的鎖端驗證模組16的驗證時,即可透過受控端10的解鎖模組17依據解鎖指令對受控端10或是受控端10中被指定的文件或程式進行解鎖程序(步驟109),藉此可以提供快速且便利受控端10或是受控端10中被指定的文件或程式的解鎖功能。When the digital key received by the lock receiving module 13 of the controlled terminal 10 is verified by the lock end verification module 16 of the controlled terminal 10, the unlocking module 17 of the controlled terminal 10 can be used according to the unlocking command. An unlocking process (step 109) is performed on the designated file or program in the controlled terminal 10 or the controlled terminal 10, thereby providing a fast and convenient controlled file or program in the controlled terminal 10 or the controlled terminal 10. Unlock feature.
值得注意的是,在受控端10的解鎖模組17依據解鎖指令對受控端10或是受控端10中被指定的文件或程式進行解鎖程序已達到預設時間時,受控端10的鎖定模組15將會對已被解鎖的受控端10或是受控端10中被指定的文件或程式再次進行鎖定程序(步驟110)。It should be noted that when the unlocking module 17 of the controlled terminal 10 unlocks the specified file or program in the controlled terminal 10 or the controlled terminal 10 according to the unlocking command, the controlled terminal 10 is reached. The locking module 15 will again perform a locking procedure on the controlled terminal 10 or the designated file or program in the controlled terminal 10 (step 110).
在透過生物特徵進行鎖定與解鎖系統中可進一步包含伺服端30,伺服端30是提供可以遠端對受控端10進行受控端10或是受控端10中被指定的文件或程式的鎖定與解鎖,透過第一控制裝置20的第一傳送模組25以無線傳輸方式將第一控制裝置20的生成模組21所生成的數位金鑰傳送至伺服端30,上述無線傳輸方式包含有Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The servo end 30 may be further included in the locking and unlocking system through the biometric feature, and the servo end 30 provides a remote lock on the controlled end 10 or the designated file or program in the controlled end 10 of the controlled end 10. And unlocking, the digital key generated by the generating module 21 of the first control device 20 is transmitted to the server 30 by the first transmission module 25 of the first control device 20 in a wireless transmission manner, and the wireless transmission method includes Wi. -Fi, 3G, 4G, etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention.
接著,伺服端30的伺服端接收模組31即可自第一控制裝置20的第一傳送模組25接收數位金鑰,並由伺服端30的伺服端儲存模組32儲存數位金鑰(步驟201)。Then, the server receiving module 31 of the server 30 can receive the digital key from the first transmitting module 25 of the first control device 20, and the server storage module 32 of the server 30 stores the digital key (step 201).
當受控端10第一次執行時,受控端10的鎖端生成模組11生成金鑰載入指令,並透過受控端10的鎖端傳送模組12透過無線傳輸方式將金鑰載入指令傳送至伺服端30,上述的無線傳輸方式包含有Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。When the controlled terminal 10 is executed for the first time, the lock generating module 11 of the controlled terminal 10 generates a key loading command, and transmits the key through the wireless transmission mode through the lock transmitting module 12 of the controlled terminal 10. The incoming command is transmitted to the server 30. The above wireless transmission method includes Wi-Fi, 3G, 4G, etc., which are merely illustrative, and are not intended to limit the scope of application of the present invention.
接著,伺服端30的伺服端接收模組31即可自受控端10的鎖端傳送模組12接收金鑰載入指令,再透過伺服端30的伺服端驗證模組33對金鑰載入指令進行驗證(步驟202),以確認受控端10是否為正確需要被鎖定或是解鎖的受控端10,當金鑰載入指令通過伺服端30的伺服端驗證模組33的驗證時,即可由伺服端30的伺服端傳送模組34將伺服端30的伺服端儲存模組32鎖儲存的數位金鑰傳送至與金鑰載入指令對應的受控端10(步驟203),在受控端10接收到數位金鑰後的執行過程可以參考上述說明內容,在此不再進行贅述。Then, the server receiving module 31 of the server 30 can receive the key loading command from the lock transfer module 12 of the controlled terminal 10, and then load the key through the server end verification module 33 of the server 30. The instruction is verified (step 202) to confirm whether the controlled terminal 10 is the controlled terminal 10 that needs to be locked or unlocked correctly. When the key loading instruction is verified by the server end verification module 33 of the server 30, The server-side transfer module 34 of the server 30 can transfer the digital key stored by the server storage module 32 of the server 30 to the controlled terminal 10 corresponding to the key-loading command (step 203). For the execution process after the terminal 10 receives the digital key, reference may be made to the above description, and details are not described herein.
當使用者需要對遠端的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行鎖定,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的鎖定指令,鎖定指令即可與遠端的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將鎖定指令傳送至伺服端30(步驟204)。When the user needs to lock the specified file or program in the remote controlled terminal 10 (here, the hardware form) or the controlled terminal 10 (in this case, the software form), the user can The combination of the selected mechanism, the button and the touch provided by the first control device 20 selects the specific controlled terminal 10 to receive the generated locking command by the first receiving module 24 of the first control device 20, and the locking command can be The remote controlled terminals 10 correspond to each other, and the lock command is transmitted to the servo terminal 30 through the first transfer module 25 of the first control device 20 (step 204).
伺服端30的伺服端接收模組31即可自第一控制裝置20的第一傳送模組25接收鎖定指令,即可再由伺服端30的伺服端傳送模組34傳送鎖定指令至與鎖定指令對應的受控端10,而受控端10的鎖定模組15依據鎖定指令對受控端10或是受控端10中被指定的文件或程式進行鎖定程序(步驟106)。The servo terminal receiving module 31 of the server 30 can receive the locking command from the first transmitting module 25 of the first control device 20, and then the servo terminal transmitting module 34 of the server 30 can transmit the locking command to the locking command. Corresponding controlled terminal 10, and the locking module 15 of the controlled terminal 10 performs a locking procedure on the controlled file 10 or the designated file or program in the controlled terminal 10 according to the locking instruction (step 106).
當使用者需要對遠端的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行解鎖,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的解鎖指令,解鎖指令即可與遠端的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將解鎖指令傳送至伺服端30。When the user needs to unlock the specified file or program in the remote controlled terminal 10 (here, the hardware form) or the controlled terminal 10 (in this case, the software form), the user can The combination of the selected mechanism, the button and the touch provided by the first control device 20 selects the specific controlled terminal 10 to receive the generated unlocking command by the first receiving module 24 of the first control device 20, and the unlocking command can be The remote controlled terminals 10 correspond to each other, and the unlocking command is transmitted to the servo terminal 30 through the first transmitting module 25 of the first control device 20.
伺服端30的伺服端接收模組31即可自第一控制裝置20的第一傳送模組25接收解鎖指令,即可再由伺服端30的伺服端傳送模組34傳送伺服端30的伺服端儲存模組32所儲存的數位金鑰以及解鎖指令至與解鎖指令對應的受控端10(步驟205),由受控端10的鎖端驗證模組16對受控端10的鎖端接收模組13所接收到的數位金鑰進行驗證(步驟108),而當受控端10的鎖端接收模組13所接收到的數位金鑰通過受控端10的鎖端驗證模組16的驗證時,即可透過受控端10的解鎖模組17依據解鎖指令對受控端10或是受控端10中被指定的文件或程式進行解鎖程序(步驟109)。The servo end receiving module 31 of the server 30 can receive the unlocking command from the first transmitting module 25 of the first control device 20, and then the servo end of the servo end 30 can be transmitted by the servo end transmitting module 34 of the server 30. The digital key stored in the storage module 32 and the unlocking command are sent to the controlled terminal 10 corresponding to the unlocking instruction (step 205), and the lock end receiving module of the controlled terminal 10 is received by the lock end verification module 16 of the controlled terminal 10. The digital key received by the group 13 is verified (step 108), and the digital key received by the lock receiving module 13 of the controlled terminal 10 is verified by the lock end verification module 16 of the controlled terminal 10. At this time, the unlocking module 17 of the controlled terminal 10 can perform an unlocking process on the controlled file 10 or the designated file or program in the controlled terminal 10 according to the unlocking command (step 109).
在透過生物特徵進行鎖定與解鎖系統中可進一步包含第二控制裝置40,第二控制裝置40是用以提供第一控制裝置20遺失或是主動進行複製使用,即第二控制裝置40可以包含第一控制裝置20所有的功能與模組,並請參考上述說明,在此不再進行贅述,在第二控制裝置40需要複製第一控制裝置20時,第二控制裝置40的第二傳送模組41會以無線傳輸方式傳送驗證資訊至伺服端30(步驟208),上述的無線傳輸方式包含有Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The second control device 40 is further included in the locking and unlocking system for the biometric feature. The second control device 40 is configured to provide the first control device 20 to be lost or actively used for copying, that is, the second control device 40 may include All the functions and modules of the control device 20, and please refer to the above description, and no further description is made here. When the second control device 40 needs to copy the first control device 20, the second transmission module of the second control device 40 41, the verification information is transmitted to the server 30 by wireless transmission (step 208), and the wireless transmission method includes Wi-Fi, 3G, 4G, etc., which are merely illustrative, and are not limited thereto. The scope of application.
接著,伺服端30的伺服端接收模組31即可自第二控制裝置40的第二傳送模組41接收驗證資訊,再透過伺服端30的伺服端驗證模組33對驗證資訊進行驗證(步驟206),並當驗證資訊通過伺服端30的伺服端驗證模組33的驗證時,即判斷出第二控制裝置40為合法可複製的裝置,伺服端30的伺服端傳送模組34即可將伺服端30的伺服端儲存模組32所儲存的數位金鑰傳送至第二控制裝置40(步驟207)。Then, the server receiving module 31 of the server 30 can receive the verification information from the second transmission module 41 of the second control device 40, and then verify the verification information through the server verification module 33 of the server 30 (steps) 206), and when the verification information is verified by the server verification module 33 of the server 30, it is determined that the second control device 40 is a legally replicable device, and the server transmitting module 34 of the server 30 can The digital key stored by the server storage module 32 of the server 30 is transmitted to the second control device 40 (step 207).
第二控制裝置40的第二接收模組42即可自伺服端30的伺服端傳送模組34接收數位金鑰,並透過第二控制裝置40的第二儲存模組43儲存第二控制裝置40的第二接收模組42所接收到的數位金鑰(步驟209),解以完成第一控制裝置20的複製。The second receiving module 42 of the second control device 40 can receive the digital key from the server transmitting module 34 of the server 30 and store the second controller 40 through the second storage module 43 of the second control device 40. The digital key received by the second receiving module 42 (step 209) is solved to complete the copying of the first control device 20.
綜上所述,可知本發明與先前技術之間的差異在於本發明透過由生物特徵轉換的數位金鑰提供多種受控端的鎖定與解鎖功能,可以有效的避免電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題。In summary, it can be seen that the difference between the present invention and the prior art is that the present invention provides a plurality of locked and unlocked functions of the controlled terminal through the biometrically converted digital key, which can effectively prevent the unlocking mode of the electronic device from being unlocked and Electronic access control requires the use of different wafer cards or wafer locks to cause inconvenience.
藉由此一技術手段可以來解決先前技術所存在電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題,進而達成提供便捷性且具隱密性解鎖與鎖定裝置的技術功效。The technical means can solve the problem that the unlocking mode of the electronic device in the prior art is unlocked when the electronic device is unlocked, and the use of different wafer cards or wafer locks is inconvenient, thereby achieving convenience and confidential unlocking. The technical effect of the locking device.
雖然本發明所揭露的實施方式如上,惟所述的內容並非用以直接限定本發明的專利保護範圍。任何本發明所屬技術領域中具有通常知識者,在不脫離本發明所揭露的精神和範圍的前提下,可以在實施的形式上及細節上作些許的更動。本發明的專利保護範圍,仍須以所附的申請專利範圍所界定者為準。While the embodiments of the present invention have been described above, the above description is not intended to limit the scope of the invention. Any changes in the form and details of the embodiments may be made without departing from the spirit and scope of the invention. The scope of the invention is to be determined by the scope of the appended claims.
10‧‧‧受控端
11‧‧‧鎖端生成模組
12‧‧‧鎖端傳送模組
13‧‧‧鎖端接收模組
14‧‧‧鎖端儲存模組
15‧‧‧鎖定模組
16‧‧‧鎖端驗證模組
17‧‧‧解鎖模組
20‧‧‧第一控制裝置
21‧‧‧生物特徵接收模組
22‧‧‧生成模組
23‧‧‧第一儲存模組
24‧‧‧第一接收模組
25‧‧‧第一傳送模組
30‧‧‧伺服端
31‧‧‧伺服端接收模組
32‧‧‧伺服端儲存模組
33‧‧‧伺服端驗證模組
34‧‧‧伺服端傳送模組
40‧‧‧第二控制裝置
41‧‧‧第二傳送模組
42‧‧‧第二接收模組
43‧‧‧第二儲存模組
步驟101‧‧‧第一控制裝置接收生物特徵並將生物特徵進行數位轉換為數位金鑰並儲存
步驟102‧‧‧提供至少一受控端,受控端第一次執行時,生成金鑰載入指令並傳送至第一控制裝置
步驟103‧‧‧第一控制裝置依據金鑰載入指令傳送數位金鑰至與金鑰載入指令對應的受控端
步驟104‧‧‧受控端儲存數位金鑰
步驟105‧‧‧第一控制裝置接收鎖定指令,並傳送鎖定指令至與鎖定指令對應的受控端
步驟106‧‧‧受控端依據鎖定指令對受控端或是受控端中被指定的文件或程式進行鎖定程序
步驟107‧‧‧第一控制裝置接收解鎖指令,並傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端
步驟108‧‧‧受控端依據受控端所儲存的數位金鑰對受控端所接收到的數位金鑰進行驗證
步驟109‧‧‧當受控端所接收到的數位金鑰通過驗證時,依據解鎖指令對受控端或是受控端中被指定的文件或程式進行解鎖程序
步驟110‧‧‧當受控端解鎖受控端或是受控端中被指定的文件或程式且解鎖時間已達到預設時間時,對受控端或是受控端中被指定的文件或程式進行鎖定程序
步驟201‧‧‧伺服端自第一控制裝置接收數位金鑰並加以儲存
步驟202‧‧‧伺服端自受控端接收金鑰載入指令以進行驗證
步驟203‧‧‧當金鑰載入指令通過伺服端的驗證時,傳送數位金鑰至與金鑰載入指令對應的受控端
步驟204‧‧‧伺服端自第一控制裝置接收鎖定指令時,傳送鎖定指令至與鎖定指令對應的受控端
步驟205‧‧‧伺服端自第一控制裝置接收解鎖指令時,傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端
步驟206‧‧‧伺服端接收驗證資訊以進行驗證
步驟207‧‧‧當驗證資訊通過伺服端的驗證時,傳送數位金鑰
步驟208‧‧‧第二控制裝置傳送驗證資訊至伺服端
步驟208‧‧‧第二控制裝置自伺服端接收數位金鑰並加以儲存10‧‧‧ controlled end
11‧‧‧Lock-end generation module
12‧‧‧Lock Transfer Module
13‧‧‧Lock receiving module
14‧‧‧Lock storage module
15‧‧‧Locking module
16‧‧‧Lock end verification module
17‧‧‧Unlocking module
20‧‧‧First control unit
21‧‧‧Biometric Receiver Module
22‧‧‧Generation Module
23‧‧‧First storage module
24‧‧‧First Receiver Module
25‧‧‧First transmission module
30‧‧‧Server
31‧‧‧Server receiving module
32‧‧‧Server storage module
33‧‧‧Server Verification Module
34‧‧‧Servo transmission module
40‧‧‧Second control device
41‧‧‧Second transmission module
42‧‧‧second receiving module
43‧‧‧Second storage module step 101‧‧‧ First control device receives biometrics and digitally converts biometrics into digital keys and stores steps 102‧‧‧ provides at least one controlled end, controlled end At one execution, a key load instruction is generated and transmitted to the first control device. Step 103‧‧ The first control device transmits the digital key according to the key load command to the controlled end step corresponding to the key load command 104‧‧‧The controlled end stores the digital key. Step 105‧‧ The first control device receives the lock command and transmits the lock command to the controlled end corresponding to the lock command. Step 106‧‧‧ The controlled end is controlled according to the lock command The specified program or program in the console or the controlled terminal performs the locking procedure. Step 107‧ The first control device receives the unlocking command and transmits the digital key and the unlocking command to the controlled terminal corresponding to the unlocking command. ‧ The controlled terminal verifies the digital key received by the controlled terminal according to the digital key stored by the controlled terminal. 109‧‧‧ When the digital key received by the controlled terminal passes the verification, The unlocking command unlocks the specified file or program in the controlled or controlled terminal. Step 110‧‧‧ When the controlled terminal unlocks the specified file or program in the controlled or controlled terminal and the unlocking time has expired When the preset time is reached, the specified program or program in the controlled terminal or the controlled terminal is locked. Step 201‧‧ The server receives the digital key from the first control device and stores it. Step 202‧‧‧ Servo The terminal receives the key load instruction from the controlled end to perform the verification step 203.‧‧ When the key load instruction is verified by the server, the digital key is transferred to the controlled end corresponding to the key load instruction. Step 204‧ ‧ When the servo terminal receives the lock command from the first control device, the lock command is transmitted to the controlled end corresponding to the lock command. Step 205‧‧ When the servo terminal receives the unlock command from the first control device, the digital key and the unlock command are transmitted. To the controlled terminal corresponding to the unlocking command, step 206‧‧‧ The server receives the verification information for verification step 207‧‧‧ When the verification information is verified by the server, the digital key is transmitted 208‧‧‧ The second control device transmits the verification information to the servo terminal. Step 208‧‧ The second control device receives the digital key from the servo and stores it
第1圖繪示為本發明透過生物特徵進行鎖定與解鎖系統的系統方塊圖。 第2A圖以及第2B圖繪示為本發明透過生物特徵進行鎖定與解鎖方法的方法流程圖。FIG. 1 is a block diagram of a system for locking and unlocking a biometric feature according to the present invention. 2A and 2B are flowcharts showing a method for locking and unlocking a biometric according to the present invention.
10‧‧‧受控端 10‧‧‧ controlled end
11‧‧‧鎖端生成模組 11‧‧‧Lock-end generation module
12‧‧‧鎖端傳送模組 12‧‧‧Lock Transfer Module
13‧‧‧鎖端接收模組 13‧‧‧Lock receiving module
14‧‧‧鎖端儲存模組 14‧‧‧Lock storage module
15‧‧‧鎖定模組 15‧‧‧Locking module
16‧‧‧鎖端驗證模組 16‧‧‧Lock end verification module
17‧‧‧解鎖模組 17‧‧‧Unlocking module
20‧‧‧第一控制裝置 20‧‧‧First control unit
21‧‧‧生物特徵接收模組 21‧‧‧Biometric Receiver Module
22‧‧‧生成模組 22‧‧‧Generation Module
23‧‧‧第一儲存模組 23‧‧‧First storage module
24‧‧‧第一接收模組 24‧‧‧First Receiver Module
25‧‧‧第一傳送模組 25‧‧‧First transmission module
30‧‧‧伺服端 30‧‧‧Server
31‧‧‧伺服端接收模組 31‧‧‧Server receiving module
32‧‧‧伺服端儲存模組 32‧‧‧Server storage module
33‧‧‧伺服端驗證模組 33‧‧‧Server Verification Module
34‧‧‧伺服端傳送模組 34‧‧‧Servo transmission module
40‧‧‧第二控制裝置 40‧‧‧Second control device
41‧‧‧第二傳送模組 41‧‧‧Second transmission module
42‧‧‧第二接收模組 42‧‧‧second receiving module
43‧‧‧第二儲存模組 43‧‧‧Second storage module
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104141232A TWI578185B (en) | 2015-12-09 | 2015-12-09 | Biometrics locking and unlocking system and method therefore |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104141232A TWI578185B (en) | 2015-12-09 | 2015-12-09 | Biometrics locking and unlocking system and method therefore |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI578185B TWI578185B (en) | 2017-04-11 |
TW201721490A true TW201721490A (en) | 2017-06-16 |
Family
ID=59241160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW104141232A TWI578185B (en) | 2015-12-09 | 2015-12-09 | Biometrics locking and unlocking system and method therefore |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI578185B (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWM329579U (en) * | 2007-10-09 | 2008-04-01 | Htc Corp | Keyless identifier |
TWM440296U (en) * | 2012-04-26 | 2012-11-01 | Kuen-Feng Cheng | Smart mobile monitoring elevator system |
TWI492190B (en) * | 2013-04-08 | 2015-07-11 | 正崴精密工業股份有限公司 | Access control system and control method thereof |
TWI557004B (en) * | 2014-01-10 | 2016-11-11 | Utechzone Co Ltd | Identity authentication system and its method |
TWM508172U (en) * | 2015-05-05 | 2015-09-01 | Taiwan Secom Co Ltd | Access authentication system |
-
2015
- 2015-12-09 TW TW104141232A patent/TWI578185B/en active
Also Published As
Publication number | Publication date |
---|---|
TWI578185B (en) | 2017-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3657370B1 (en) | Methods and devices for authenticating smart card | |
US20230231718A1 (en) | Method of using one device to unlock another device | |
US7664961B2 (en) | Wireless handheld device with local biometric authentication | |
CN107113315B (en) | Identity authentication method, terminal and server | |
EP3748900A1 (en) | System access using a mobile device | |
US20070223685A1 (en) | Secure system and method of providing same | |
US10693641B2 (en) | Secure container based protection of password accessible master encryption keys | |
WO2014083335A2 (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
US11539524B1 (en) | Software credential token process, software, and device | |
US8566579B2 (en) | Obfuscated authentication systems, devices, and methods | |
KR102301742B1 (en) | Method for registering and using non keypad smart door-lock key and access control system thereof | |
CN110738764A (en) | Security control system and method based on intelligent lock | |
CN112425116B (en) | Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment | |
JP2006060392A (en) | Unauthorized-use preventive system and identification method for information terminal device | |
CN110113153B (en) | NFC secret key updating method, terminal and system | |
TWI578185B (en) | Biometrics locking and unlocking system and method therefore | |
CN107070663B (en) | Mobile terminal-based field authentication method and field authentication system | |
KR102442149B1 (en) | Electronic key based on user authentication using external device and operating method therof | |
JP7445528B2 (en) | System, terminal device and control device | |
TWI826077B (en) | Method of locking and unlocking a storage device and related system thereof | |
KR20190047557A (en) | Earphone Device for Providing OTP by using Asynchronous Local Area Radio Communication | |
JP2005016126A (en) | Floating password unlocking system, floating password unlocking method, and its program | |
KR101298216B1 (en) | Authentication system and method using multiple category | |
KR101777042B1 (en) | Card for Generating Electronic Signature based on Asynchronous Local Area Radio Communication | |
JP2023031673A (en) | Storage device management system |