TW201721490A - Biometrics locking and unlocking system and method therefore - Google Patents

Biometrics locking and unlocking system and method therefore Download PDF

Info

Publication number
TW201721490A
TW201721490A TW104141232A TW104141232A TW201721490A TW 201721490 A TW201721490 A TW 201721490A TW 104141232 A TW104141232 A TW 104141232A TW 104141232 A TW104141232 A TW 104141232A TW 201721490 A TW201721490 A TW 201721490A
Authority
TW
Taiwan
Prior art keywords
instruction
unlocking
module
locking
lock
Prior art date
Application number
TW104141232A
Other languages
Chinese (zh)
Other versions
TWI578185B (en
Inventor
林春吉
阮惠平
Original Assignee
英業達股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 英業達股份有限公司 filed Critical 英業達股份有限公司
Priority to TW104141232A priority Critical patent/TWI578185B/en
Application granted granted Critical
Publication of TWI578185B publication Critical patent/TWI578185B/en
Publication of TW201721490A publication Critical patent/TW201721490A/en

Links

Abstract

A biometrics locking and unlocking system and method therefore is disclosed. Kinds of controlled terminals can be locked and unlocked through digital keys transformed from biometrics. Therefore, the effect of providing convenience and privacy locking and unlocking mechanism may be achieved.

Description

透過生物特徵進行鎖定與解鎖系統及其方法Locking and unlocking system by biometrics and method thereof

一種鎖定與解鎖系統及其方法,尤其是指一種透過生物特徵進行鎖定與解鎖系統及其方法。A locking and unlocking system and method therefor, and more particularly to a locking and unlocking system and method thereof through biometrics.

隨著科技的進步與發展,使用者可以使用多種類的隨身電子裝置,在隨身電子裝置上通常具有鎖定與解鎖的功能,若在公共場合使用隨身電子裝置時,在解鎖隨身電子裝置則有解鎖方式(例如:密碼…等)外洩的可能性。With the advancement and development of technology, users can use a variety of portable electronic devices, which usually have the function of locking and unlocking on the portable electronic device. If the portable electronic device is used in public, the unlocked portable electronic device is unlocked. The possibility of leaking the way (eg password, etc.).

除此之外,現在對於門禁控管、車輛門鎖…等,亦可透過電子門禁的方式進行控管,這種門禁控管通常是透過晶片卡、晶片鎖…等的形式進行解鎖,然而不同的電子門禁則需要對應的晶片卡、晶片鎖…等,則會造成使用者需要攜帶過多的晶片卡、晶片鎖…等,造成使用上的不便。In addition, now, for access control, vehicle door locks, etc., it can also be controlled by electronic access control. This access control is usually unlocked by means of wafer cards, wafer locks, etc. The electronic access control requires a corresponding wafer card, wafer lock, etc., which may cause the user to carry too many wafer cards, wafer locks, etc., resulting in inconvenience in use.

綜上所述,可知先前技術中長期以來一直存在電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題,因此有必要提出改進的技術手段,來解決此一問題。In summary, it can be known that in the prior art, there has been a long-standing problem that the unlocking method is leaked when the electronic device is unlocked and the use of different wafer cards or wafer locks is inconvenient to use, so it is necessary to propose an improved technical means to solve this problem. A problem.

有鑒於先前技術存在電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題,本發明遂揭露一種透過生物特徵進行鎖定與解鎖系統及其方法,其中:In view of the prior art, there is a problem that the unlocking method is leaked when the electronic device is unlocked, and the electronic access control needs to use different wafer cards or wafer locks, which causes inconvenience in use, and the present invention discloses a locking and unlocking system through biometrics and a method thereof, wherein:

本發明所揭露的透過生物特徵進行鎖定與解鎖系統,其包含:至少一受控端以及第一控制裝置,受控端更包含:鎖端生成模組、鎖端傳送模組、鎖端接收模組、鎖端儲存模組、鎖定模組、鎖端驗證模組及解鎖模組;第一控制裝置更包含:生物特徵接收模組、生成模組、第一儲存模組、第一接收模組以及第一傳送模組。The locking and unlocking system for biometrics disclosed in the present invention comprises: at least one controlled end and a first control device, wherein the controlled end further comprises: a lock end generating module, a lock end transmitting module, a lock end receiving module The group, the lock storage module, the locking module, the lock end verification module and the unlocking module; the first control device further comprises: a biometric receiving module, a generating module, a first storage module, and a first receiving module And a first transfer module.

其中,受控端的鎖端生成模組是當受控端第一次執行時,生成金鑰載入指令;受控端的鎖端傳送模組是用以傳送金鑰載入指令;受控端的鎖端接收模組是用以接收鎖定指令,或是接收數位金鑰以及解鎖指令;受控端的鎖端儲存模組是用以儲存數位金鑰;受控端的鎖定模組是用以依據鎖定指令對受控端或是受控端中被指定的文件或程式進行鎖定程序;受控端的鎖端驗證模組是用以依據鎖端儲存模組所儲存的數位金鑰對鎖端接收模組所接收到的數位金鑰進行驗證;及受控端的解鎖模組是用以當鎖端接收模組所接收到的數位金鑰通過驗證模組的驗證時,依據解鎖指令對受控端或是受控端中被指定的文件或程式進行解鎖程序。The lock end generation module of the controlled end generates a key load instruction when the controlled end is executed for the first time; the lock end transfer module of the controlled end is used to transmit the key load instruction; the controlled end lock The terminal receiving module is configured to receive the locking instruction, or receive the digital key and the unlocking instruction; the controlled end locking storage module is used for storing the digital key; the controlled end locking module is used according to the locking instruction pair The controlled file or the program in the controlled end is locked by the specified file or program; the controlled end lock verification module is used to receive the lock receiving module according to the digital key stored by the lock storage module. The digital key is verified; and the unlocking module of the controlled end is used to control the controlled terminal according to the unlocking command when the digital key received by the locking receiving module passes the verification of the verification module. The specified file or program in the terminal is used to unlock the program.

第一控制裝置的生物特徵接收模組是用以接收生物特徵;第一控制裝置的生成模組是用以將生物特徵進行數位轉換為數位金鑰;第一控制裝置的第一儲存模組是用以儲存數位金鑰;第一控制裝置的第一接收模組,用以接收金鑰載入指令、鎖定指令或是解鎖指令;及第一控制裝置的第一傳送模組是用以當接收到金鑰載入指令時,傳送數位金鑰至與金鑰載入指令對應的受控端;當接收到鎖定指令時,傳送鎖定指令至與鎖定指令對應的受控端;當接收到解鎖指令時,傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端。The biometric receiving module of the first control device is configured to receive the biometric feature; the generating module of the first control device is configured to digitally convert the biometric feature into a digital key; the first storage module of the first control device is For storing a digital key; the first receiving module of the first control device is configured to receive a key loading command, a locking command or an unlocking command; and the first transmitting module of the first control device is configured to receive When the key is loaded into the instruction, the digital key is transferred to the controlled end corresponding to the key loading instruction; when the locking instruction is received, the locking instruction is transmitted to the controlled end corresponding to the locking instruction; when the unlocking instruction is received At the same time, the digital key is transmitted and the unlock command is sent to the controlled end corresponding to the unlock command.

本發明所揭露的透過生物特徵進行鎖定與解鎖方法,其包含下列步驟:The method for locking and unlocking through biometrics disclosed in the present invention comprises the following steps:

首先,第一控制裝置接收生物特徵並將生物特徵進行數位轉換為數位金鑰並儲存;接著,提供至少一受控端,受控端第一次執行時,生成金鑰載入指令並傳送至第一控制裝置;接著,第一控制裝置依據金鑰載入指令傳送數位金鑰至與金鑰載入指令對應的受控端;接著,受控端儲存數位金鑰;接著,第一控制裝置接收鎖定指令,並傳送鎖定指令至與鎖定指令對應的受控端;接著,受控端依據鎖定指令對受控端或是受控端中被指定的文件或程式進行鎖定程序;接著,第一控制裝置接收解鎖指令,並傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端;接著,受控端依據受控端所儲存的數位金鑰對受控端所接收到的數位金鑰進行驗證;最後,當受控端所接收到的數位金鑰通過驗證時,依據解鎖指令對受控端或是受控端中被指定的文件或程式進行解鎖程序。First, the first control device receives the biometrics and digitally converts the biometrics into digital keys and stores them; and then provides at least one controlled end, and when the controlled end is executed for the first time, generates a key loading instruction and transmits the a first control device; then, the first control device transmits the digital key to the controlled end corresponding to the key loading instruction according to the key loading instruction; then, the controlled terminal stores the digital key; then, the first control device Receiving a lock instruction and transmitting a lock instruction to the controlled end corresponding to the lock instruction; then, the controlled end locks the specified file or program in the controlled end or the controlled end according to the lock instruction; then, the first The control device receives the unlocking instruction, and transmits the digital key and the unlocking command to the controlled end corresponding to the unlocking instruction; then, the controlled terminal receives the digital key received by the controlled terminal according to the digital key stored by the controlled terminal. Verification; finally, when the digital key received by the controlled terminal passes the verification, the specified file or program in the controlled or controlled terminal is unlocked according to the unlocking instruction. .

本發明所揭露的系統及方法如上,與先前技術之間的差異在於本發明透過由生物特徵轉換的數位金鑰提供多種受控端的鎖定與解鎖功能,可以有效的避免電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題。The system and method disclosed in the present invention are different from the prior art in that the present invention provides a plurality of locked and unlocked functions of the controlled terminal through the digital key converted by the biometric feature, thereby effectively preventing the unlocking mode when the electronic device is unlocked. Leakage and electronic access control require the use of different wafer cards or wafer locks to cause inconvenience.

透過上述的技術手段,本發明可以達成提供便捷性且具隱密性解鎖與鎖定裝置的技術功效。Through the above technical means, the present invention can achieve the technical effect of providing a convenient and secret unlocking and locking device.

以下將配合圖式及實施例來詳細說明本發明的實施方式,藉此對本發明如何應用技術手段來解決技術問題並達成技術功效的實現過程能充分理解並據以實施。The embodiments of the present invention will be described in detail below with reference to the drawings and embodiments, so that the application of the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented.

以下將說明本發明的運作系統與方法,並請同時參考「第1圖」、「第2A圖」以及「第2B圖」所示,「第1圖」繪示為本發明透過生物特徵進行鎖定與解鎖系統的系統方塊圖;「第2A圖」以及「第2B圖」繪示為本發明透過生物特徵進行鎖定與解鎖方法的方法流程圖。The operation system and method of the present invention will be described below, and please refer to "Fig. 1", "2A" and "2B", and "Fig. 1" shows that the present invention is locked by biometrics. A system block diagram of the unlocking system; "2A" and "2B" illustrate a flow chart of a method for locking and unlocking biometrics according to the present invention.

本發明所揭露的透過生物特徵進行鎖定與解鎖系統,其包含:至少一受控端10以及第一控制裝置20,受控端10更包含:鎖端生成模組11、鎖端傳送模組12、鎖端接收模組13、鎖端儲存模組14、鎖定模組15、鎖端驗證模組16及解鎖模組17;第一控制裝置20更包含:生物特徵接收模組21、生成模組22、第一儲存模組23、第一接收模組24以及第一傳送模組25。The locking and unlocking system of the biometrics disclosed in the present invention comprises: at least one controlled end 10 and a first control device 20, the controlled end 10 further comprising: a lock end generating module 11 and a lock end transmitting module 12 The lock receiving module 13 , the lock end storage module 14 , the lock module 15 , the lock end verification module 16 and the unlocking module 17 ; the first control device 20 further includes: a biometric receiving module 21 and a generating module 22. The first storage module 23, the first receiving module 24, and the first transmitting module 25.

第一控制裝置20可以是穿戴式裝置或是可攜式裝置,上述的穿戴式裝置可以是電子手錶,在此僅為舉例說明之,並不以此侷限本發明的應用範疇,上述的可攜式裝置包含有智慧型手機、平板電腦…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The first control device 20 may be a wearable device or a portable device. The wearable device may be an electronic wristwatch, which is merely exemplified herein, and is not limited to the application scope of the present invention. The device includes a smart phone, a tablet, etc., which are merely illustrative and are not intended to limit the scope of application of the present invention.

第一控制裝置20的生物特徵接收模組21是用以接收使用者的生物特徵(步驟101),生物特徵包含有指紋、聲紋、虹膜以及視網膜…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The biometric receiving module 21 of the first control device 20 is configured to receive biometric features of the user (step 101), and the biometric features include a fingerprint, a voiceprint, an iris, a retina, etc., which are merely illustrated by way of example, and This does not limit the scope of application of the invention.

接著,透過第一控制裝置20的生成模組21將第一控制裝置20的生物特徵接收模組21所接收到的生物特徵進行數位轉換為數位金鑰(步驟101),由於每一個人的生物特徵是獨一無二的,故第一控制裝置20的生成模組21所生成即是唯一的數位金鑰。Then, the biometric feature received by the biometrics receiving module 21 of the first control device 20 is digitally converted into a digital key by the generating module 21 of the first control device 20 (step 101), due to the biometric characteristics of each individual. It is unique, so the generation module 21 of the first control device 20 generates a unique digital key.

接著,由第一控制裝置20的第一儲存模組23將第一控制裝置20的生成模組21所生成的數位金鑰加以儲存(步驟101)。Next, the digital key generated by the generation module 21 of the first control device 20 is stored by the first storage module 23 of the first control device 20 (step 101).

受控端10可以是硬體形式或是軟體形式,值得注意的是,若受控端10為軟體形式則必須要背景執行於安裝的裝置中,上述的硬體形式包含有電子門鎖、汽車門鎖、機車鎖、智慧型家電、桌上型電腦、筆記型電腦、平板電腦、智慧型手機…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇,上述的裝置包含有桌上型電腦、筆記型電腦、平板電腦、智慧型手機…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The controlled end 10 may be in the form of a hardware or a soft body. It is worth noting that if the controlled end 10 is in the form of a software, it must be implemented in the installation device. The above-mentioned hardware form includes an electronic door lock and a car. Door locks, locomotive locks, smart home appliances, desktop computers, notebook computers, tablet computers, smart phones, etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention. The inclusion of a desktop computer, a notebook computer, a tablet computer, a smart phone, etc., is merely illustrative, and is not intended to limit the scope of application of the present invention.

並當受控端10第一次執行時,受控端10的鎖端生成模組11生成金鑰載入指令,並透過受控端10的鎖端傳送模組12透過無線傳輸方式將金鑰載入指令傳送至第一控制裝置20(步驟102),上述的無線傳輸方式包含有Wi-Fi、藍芽(Bluetooth)、近場通訊(Near Field Communication,NFC)、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。And when the controlled terminal 10 is executed for the first time, the lock generating module 11 of the controlled terminal 10 generates a key loading command, and transmits the key through the wireless transmission mode through the lock transmitting module 12 of the controlled terminal 10. The load command is transmitted to the first control device 20 (step 102), and the wireless transmission method includes Wi-Fi, Bluetooth, Near Field Communication (NFC), 3G, 4G, etc. This is for illustrative purposes only and is not intended to limit the scope of application of the invention.

接著,第一控制裝置20的第一接收模組24即可自受控端10的鎖端傳送模組12接收金鑰載入指令,第一控制裝置20的第一傳送模組25即可將第一控制裝置20的第一儲存模組23所儲存的數位金鑰傳送至與金鑰載入指令對應的受控端10(步驟103)。Then, the first receiving module 24 of the first control device 20 can receive the key loading command from the lock transfer module 12 of the controlled terminal 10, and the first transmitting module 25 of the first control device 20 can The digital key stored by the first storage module 23 of the first control device 20 is transferred to the controlled terminal 10 corresponding to the key load instruction (step 103).

接著,受控端10的鎖端接收模組13即可自第一控制裝置20的第一傳送模組25接收數位金鑰,並由受控端10的鎖端儲存模組14儲存受控端10的鎖端接收模組13所接收到的數位金鑰(步驟104)。Then, the lock receiving module 13 of the controlled terminal 10 can receive the digital key from the first transmitting module 25 of the first control device 20, and the controlled storage terminal 14 of the controlled terminal 10 stores the controlled terminal. The lock of the 10 receives the digital key received by the module 13 (step 104).

當使用者需要對特定的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行鎖定,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的鎖定指令,鎖定指令即可與特定的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將鎖定指令傳送至對應的受控端10(步驟105)。When the user needs to lock a specified file or program in a specific controlled terminal 10 (here, a hardware form) or a controlled terminal 10 (in this case, a software form), the user can pass the first The combination of the selected mechanism, the button and the touch provided by the control device 20 selects the specific controlled terminal 10 to receive the generated lock command by the first receiving module 24 of the first control device 20, and the lock command can be specific to The controlled terminals 10 correspond to each other, and the lock command is transmitted to the corresponding controlled terminal 10 through the first transfer module 25 of the first control device 20 (step 105).

接著,受控端10的鎖端接收模組13即可自第一控制裝置20的第一傳送模組25接收鎖定指令,即可再由受控端10的鎖定模組15依據鎖定指令對受控端10或是受控端10中被指定的文件或程式進行鎖定程序(步驟106),藉此可以提供快速且便利受控端10或是受控端10中被指定的文件或程式的鎖定功能。Then, the lock receiving module 13 of the controlled terminal 10 can receive the locking command from the first transmitting module 25 of the first control device 20, and can be controlled by the locking module 15 of the controlled terminal 10 according to the locking command. The terminal 10 or the designated file or program in the controlled terminal 10 performs a locking process (step 106), thereby providing fast and convenient locking of the designated file or program in the controlled terminal 10 or the controlled terminal 10. Features.

當使用者需要對特定的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行解鎖,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的解鎖指令,解鎖指令即可與特定的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將數位金鑰以及解鎖指令傳送至與解鎖指令對應的受控端10(步驟107)。When the user needs to unlock the specified file or program in the specific controlled terminal 10 (here, the hardware form) or the controlled terminal 10 (in this case, the software form), the user can The combination of the selected mechanism, the button and the touch provided by the control device 20 selects the specific controlled terminal 10 to receive the generated unlocking command by the first receiving module 24 of the first control device 20, and the unlocking command can be associated with the specific The controlled terminals 10 correspond to each other, and the digital key and the unlocking command are transmitted to the controlled terminal 10 corresponding to the unlocking command through the first transmitting module 25 of the first control device 20 (step 107).

接著,受控端10的鎖端接收模組13即可自第一控制裝置20的第一傳送模組25接收數位金鑰以及解鎖指令,即可再由受控端10的鎖端驗證模組16依據受控端10的鎖端儲存模組14所儲存的數位金鑰對受控端10的鎖端接收模組13所接收到的數位金鑰進行驗證(步驟108)。Then, the lock receiving module 13 of the controlled terminal 10 can receive the digital key and the unlocking command from the first transmitting module 25 of the first control device 20, and then the locking end verification module of the controlled terminal 10 can be used. The digital key received by the lock receiving module 13 of the controlled terminal 10 is verified according to the digital key stored by the lock storage module 14 of the controlled terminal 10 (step 108).

當受控端10的鎖端接收模組13所接收到的數位金鑰通過受控端10的鎖端驗證模組16的驗證時,即可透過受控端10的解鎖模組17依據解鎖指令對受控端10或是受控端10中被指定的文件或程式進行解鎖程序(步驟109),藉此可以提供快速且便利受控端10或是受控端10中被指定的文件或程式的解鎖功能。When the digital key received by the lock receiving module 13 of the controlled terminal 10 is verified by the lock end verification module 16 of the controlled terminal 10, the unlocking module 17 of the controlled terminal 10 can be used according to the unlocking command. An unlocking process (step 109) is performed on the designated file or program in the controlled terminal 10 or the controlled terminal 10, thereby providing a fast and convenient controlled file or program in the controlled terminal 10 or the controlled terminal 10. Unlock feature.

值得注意的是,在受控端10的解鎖模組17依據解鎖指令對受控端10或是受控端10中被指定的文件或程式進行解鎖程序已達到預設時間時,受控端10的鎖定模組15將會對已被解鎖的受控端10或是受控端10中被指定的文件或程式再次進行鎖定程序(步驟110)。It should be noted that when the unlocking module 17 of the controlled terminal 10 unlocks the specified file or program in the controlled terminal 10 or the controlled terminal 10 according to the unlocking command, the controlled terminal 10 is reached. The locking module 15 will again perform a locking procedure on the controlled terminal 10 or the designated file or program in the controlled terminal 10 (step 110).

在透過生物特徵進行鎖定與解鎖系統中可進一步包含伺服端30,伺服端30是提供可以遠端對受控端10進行受控端10或是受控端10中被指定的文件或程式的鎖定與解鎖,透過第一控制裝置20的第一傳送模組25以無線傳輸方式將第一控制裝置20的生成模組21所生成的數位金鑰傳送至伺服端30,上述無線傳輸方式包含有Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The servo end 30 may be further included in the locking and unlocking system through the biometric feature, and the servo end 30 provides a remote lock on the controlled end 10 or the designated file or program in the controlled end 10 of the controlled end 10. And unlocking, the digital key generated by the generating module 21 of the first control device 20 is transmitted to the server 30 by the first transmission module 25 of the first control device 20 in a wireless transmission manner, and the wireless transmission method includes Wi. -Fi, 3G, 4G, etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention.

接著,伺服端30的伺服端接收模組31即可自第一控制裝置20的第一傳送模組25接收數位金鑰,並由伺服端30的伺服端儲存模組32儲存數位金鑰(步驟201)。Then, the server receiving module 31 of the server 30 can receive the digital key from the first transmitting module 25 of the first control device 20, and the server storage module 32 of the server 30 stores the digital key (step 201).

當受控端10第一次執行時,受控端10的鎖端生成模組11生成金鑰載入指令,並透過受控端10的鎖端傳送模組12透過無線傳輸方式將金鑰載入指令傳送至伺服端30,上述的無線傳輸方式包含有Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。When the controlled terminal 10 is executed for the first time, the lock generating module 11 of the controlled terminal 10 generates a key loading command, and transmits the key through the wireless transmission mode through the lock transmitting module 12 of the controlled terminal 10. The incoming command is transmitted to the server 30. The above wireless transmission method includes Wi-Fi, 3G, 4G, etc., which are merely illustrative, and are not intended to limit the scope of application of the present invention.

接著,伺服端30的伺服端接收模組31即可自受控端10的鎖端傳送模組12接收金鑰載入指令,再透過伺服端30的伺服端驗證模組33對金鑰載入指令進行驗證(步驟202),以確認受控端10是否為正確需要被鎖定或是解鎖的受控端10,當金鑰載入指令通過伺服端30的伺服端驗證模組33的驗證時,即可由伺服端30的伺服端傳送模組34將伺服端30的伺服端儲存模組32鎖儲存的數位金鑰傳送至與金鑰載入指令對應的受控端10(步驟203),在受控端10接收到數位金鑰後的執行過程可以參考上述說明內容,在此不再進行贅述。Then, the server receiving module 31 of the server 30 can receive the key loading command from the lock transfer module 12 of the controlled terminal 10, and then load the key through the server end verification module 33 of the server 30. The instruction is verified (step 202) to confirm whether the controlled terminal 10 is the controlled terminal 10 that needs to be locked or unlocked correctly. When the key loading instruction is verified by the server end verification module 33 of the server 30, The server-side transfer module 34 of the server 30 can transfer the digital key stored by the server storage module 32 of the server 30 to the controlled terminal 10 corresponding to the key-loading command (step 203). For the execution process after the terminal 10 receives the digital key, reference may be made to the above description, and details are not described herein.

當使用者需要對遠端的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行鎖定,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的鎖定指令,鎖定指令即可與遠端的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將鎖定指令傳送至伺服端30(步驟204)。When the user needs to lock the specified file or program in the remote controlled terminal 10 (here, the hardware form) or the controlled terminal 10 (in this case, the software form), the user can The combination of the selected mechanism, the button and the touch provided by the first control device 20 selects the specific controlled terminal 10 to receive the generated locking command by the first receiving module 24 of the first control device 20, and the locking command can be The remote controlled terminals 10 correspond to each other, and the lock command is transmitted to the servo terminal 30 through the first transfer module 25 of the first control device 20 (step 204).

伺服端30的伺服端接收模組31即可自第一控制裝置20的第一傳送模組25接收鎖定指令,即可再由伺服端30的伺服端傳送模組34傳送鎖定指令至與鎖定指令對應的受控端10,而受控端10的鎖定模組15依據鎖定指令對受控端10或是受控端10中被指定的文件或程式進行鎖定程序(步驟106)。The servo terminal receiving module 31 of the server 30 can receive the locking command from the first transmitting module 25 of the first control device 20, and then the servo terminal transmitting module 34 of the server 30 can transmit the locking command to the locking command. Corresponding controlled terminal 10, and the locking module 15 of the controlled terminal 10 performs a locking procedure on the controlled file 10 or the designated file or program in the controlled terminal 10 according to the locking instruction (step 106).

當使用者需要對遠端的受控端10(在此即為硬體形式)或是受控端10(在此即為軟體形式)中被指定的文件或程式進行解鎖,使用者即可透過第一控制裝置20所提供的選定機構、按鍵以及觸控的組合方式選定特定的受控端10以由第一控制裝置20的第一接收模組24接收生成的解鎖指令,解鎖指令即可與遠端的受控端10相互對應,再透過第一控制裝置20的第一傳送模組25將解鎖指令傳送至伺服端30。When the user needs to unlock the specified file or program in the remote controlled terminal 10 (here, the hardware form) or the controlled terminal 10 (in this case, the software form), the user can The combination of the selected mechanism, the button and the touch provided by the first control device 20 selects the specific controlled terminal 10 to receive the generated unlocking command by the first receiving module 24 of the first control device 20, and the unlocking command can be The remote controlled terminals 10 correspond to each other, and the unlocking command is transmitted to the servo terminal 30 through the first transmitting module 25 of the first control device 20.

伺服端30的伺服端接收模組31即可自第一控制裝置20的第一傳送模組25接收解鎖指令,即可再由伺服端30的伺服端傳送模組34傳送伺服端30的伺服端儲存模組32所儲存的數位金鑰以及解鎖指令至與解鎖指令對應的受控端10(步驟205),由受控端10的鎖端驗證模組16對受控端10的鎖端接收模組13所接收到的數位金鑰進行驗證(步驟108),而當受控端10的鎖端接收模組13所接收到的數位金鑰通過受控端10的鎖端驗證模組16的驗證時,即可透過受控端10的解鎖模組17依據解鎖指令對受控端10或是受控端10中被指定的文件或程式進行解鎖程序(步驟109)。The servo end receiving module 31 of the server 30 can receive the unlocking command from the first transmitting module 25 of the first control device 20, and then the servo end of the servo end 30 can be transmitted by the servo end transmitting module 34 of the server 30. The digital key stored in the storage module 32 and the unlocking command are sent to the controlled terminal 10 corresponding to the unlocking instruction (step 205), and the lock end receiving module of the controlled terminal 10 is received by the lock end verification module 16 of the controlled terminal 10. The digital key received by the group 13 is verified (step 108), and the digital key received by the lock receiving module 13 of the controlled terminal 10 is verified by the lock end verification module 16 of the controlled terminal 10. At this time, the unlocking module 17 of the controlled terminal 10 can perform an unlocking process on the controlled file 10 or the designated file or program in the controlled terminal 10 according to the unlocking command (step 109).

在透過生物特徵進行鎖定與解鎖系統中可進一步包含第二控制裝置40,第二控制裝置40是用以提供第一控制裝置20遺失或是主動進行複製使用,即第二控制裝置40可以包含第一控制裝置20所有的功能與模組,並請參考上述說明,在此不再進行贅述,在第二控制裝置40需要複製第一控制裝置20時,第二控制裝置40的第二傳送模組41會以無線傳輸方式傳送驗證資訊至伺服端30(步驟208),上述的無線傳輸方式包含有Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The second control device 40 is further included in the locking and unlocking system for the biometric feature. The second control device 40 is configured to provide the first control device 20 to be lost or actively used for copying, that is, the second control device 40 may include All the functions and modules of the control device 20, and please refer to the above description, and no further description is made here. When the second control device 40 needs to copy the first control device 20, the second transmission module of the second control device 40 41, the verification information is transmitted to the server 30 by wireless transmission (step 208), and the wireless transmission method includes Wi-Fi, 3G, 4G, etc., which are merely illustrative, and are not limited thereto. The scope of application.

接著,伺服端30的伺服端接收模組31即可自第二控制裝置40的第二傳送模組41接收驗證資訊,再透過伺服端30的伺服端驗證模組33對驗證資訊進行驗證(步驟206),並當驗證資訊通過伺服端30的伺服端驗證模組33的驗證時,即判斷出第二控制裝置40為合法可複製的裝置,伺服端30的伺服端傳送模組34即可將伺服端30的伺服端儲存模組32所儲存的數位金鑰傳送至第二控制裝置40(步驟207)。Then, the server receiving module 31 of the server 30 can receive the verification information from the second transmission module 41 of the second control device 40, and then verify the verification information through the server verification module 33 of the server 30 (steps) 206), and when the verification information is verified by the server verification module 33 of the server 30, it is determined that the second control device 40 is a legally replicable device, and the server transmitting module 34 of the server 30 can The digital key stored by the server storage module 32 of the server 30 is transmitted to the second control device 40 (step 207).

第二控制裝置40的第二接收模組42即可自伺服端30的伺服端傳送模組34接收數位金鑰,並透過第二控制裝置40的第二儲存模組43儲存第二控制裝置40的第二接收模組42所接收到的數位金鑰(步驟209),解以完成第一控制裝置20的複製。The second receiving module 42 of the second control device 40 can receive the digital key from the server transmitting module 34 of the server 30 and store the second controller 40 through the second storage module 43 of the second control device 40. The digital key received by the second receiving module 42 (step 209) is solved to complete the copying of the first control device 20.

綜上所述,可知本發明與先前技術之間的差異在於本發明透過由生物特徵轉換的數位金鑰提供多種受控端的鎖定與解鎖功能,可以有效的避免電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題。In summary, it can be seen that the difference between the present invention and the prior art is that the present invention provides a plurality of locked and unlocked functions of the controlled terminal through the biometrically converted digital key, which can effectively prevent the unlocking mode of the electronic device from being unlocked and Electronic access control requires the use of different wafer cards or wafer locks to cause inconvenience.

藉由此一技術手段可以來解決先前技術所存在電子裝置解鎖時解鎖方式外洩以及電子門禁需要使用不同晶片卡或晶片鎖造成使用不便的問題,進而達成提供便捷性且具隱密性解鎖與鎖定裝置的技術功效。The technical means can solve the problem that the unlocking mode of the electronic device in the prior art is unlocked when the electronic device is unlocked, and the use of different wafer cards or wafer locks is inconvenient, thereby achieving convenience and confidential unlocking. The technical effect of the locking device.

雖然本發明所揭露的實施方式如上,惟所述的內容並非用以直接限定本發明的專利保護範圍。任何本發明所屬技術領域中具有通常知識者,在不脫離本發明所揭露的精神和範圍的前提下,可以在實施的形式上及細節上作些許的更動。本發明的專利保護範圍,仍須以所附的申請專利範圍所界定者為準。While the embodiments of the present invention have been described above, the above description is not intended to limit the scope of the invention. Any changes in the form and details of the embodiments may be made without departing from the spirit and scope of the invention. The scope of the invention is to be determined by the scope of the appended claims.

10‧‧‧受控端
11‧‧‧鎖端生成模組
12‧‧‧鎖端傳送模組
13‧‧‧鎖端接收模組
14‧‧‧鎖端儲存模組
15‧‧‧鎖定模組
16‧‧‧鎖端驗證模組
17‧‧‧解鎖模組
20‧‧‧第一控制裝置
21‧‧‧生物特徵接收模組
22‧‧‧生成模組
23‧‧‧第一儲存模組
24‧‧‧第一接收模組
25‧‧‧第一傳送模組
30‧‧‧伺服端
31‧‧‧伺服端接收模組
32‧‧‧伺服端儲存模組
33‧‧‧伺服端驗證模組
34‧‧‧伺服端傳送模組
40‧‧‧第二控制裝置
41‧‧‧第二傳送模組
42‧‧‧第二接收模組
43‧‧‧第二儲存模組
步驟101‧‧‧第一控制裝置接收生物特徵並將生物特徵進行數位轉換為數位金鑰並儲存
步驟102‧‧‧提供至少一受控端,受控端第一次執行時,生成金鑰載入指令並傳送至第一控制裝置
步驟103‧‧‧第一控制裝置依據金鑰載入指令傳送數位金鑰至與金鑰載入指令對應的受控端
步驟104‧‧‧受控端儲存數位金鑰
步驟105‧‧‧第一控制裝置接收鎖定指令,並傳送鎖定指令至與鎖定指令對應的受控端
步驟106‧‧‧受控端依據鎖定指令對受控端或是受控端中被指定的文件或程式進行鎖定程序
步驟107‧‧‧第一控制裝置接收解鎖指令,並傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端
步驟108‧‧‧受控端依據受控端所儲存的數位金鑰對受控端所接收到的數位金鑰進行驗證
步驟109‧‧‧當受控端所接收到的數位金鑰通過驗證時,依據解鎖指令對受控端或是受控端中被指定的文件或程式進行解鎖程序
步驟110‧‧‧當受控端解鎖受控端或是受控端中被指定的文件或程式且解鎖時間已達到預設時間時,對受控端或是受控端中被指定的文件或程式進行鎖定程序
步驟201‧‧‧伺服端自第一控制裝置接收數位金鑰並加以儲存
步驟202‧‧‧伺服端自受控端接收金鑰載入指令以進行驗證
步驟203‧‧‧當金鑰載入指令通過伺服端的驗證時,傳送數位金鑰至與金鑰載入指令對應的受控端
步驟204‧‧‧伺服端自第一控制裝置接收鎖定指令時,傳送鎖定指令至與鎖定指令對應的受控端
步驟205‧‧‧伺服端自第一控制裝置接收解鎖指令時,傳送數位金鑰以及解鎖指令至與解鎖指令對應的受控端
步驟206‧‧‧伺服端接收驗證資訊以進行驗證
步驟207‧‧‧當驗證資訊通過伺服端的驗證時,傳送數位金鑰
步驟208‧‧‧第二控制裝置傳送驗證資訊至伺服端
步驟208‧‧‧第二控制裝置自伺服端接收數位金鑰並加以儲存
10‧‧‧ controlled end
11‧‧‧Lock-end generation module
12‧‧‧Lock Transfer Module
13‧‧‧Lock receiving module
14‧‧‧Lock storage module
15‧‧‧Locking module
16‧‧‧Lock end verification module
17‧‧‧Unlocking module
20‧‧‧First control unit
21‧‧‧Biometric Receiver Module
22‧‧‧Generation Module
23‧‧‧First storage module
24‧‧‧First Receiver Module
25‧‧‧First transmission module
30‧‧‧Server
31‧‧‧Server receiving module
32‧‧‧Server storage module
33‧‧‧Server Verification Module
34‧‧‧Servo transmission module
40‧‧‧Second control device
41‧‧‧Second transmission module
42‧‧‧second receiving module
43‧‧‧Second storage module step 101‧‧‧ First control device receives biometrics and digitally converts biometrics into digital keys and stores steps 102‧‧‧ provides at least one controlled end, controlled end At one execution, a key load instruction is generated and transmitted to the first control device. Step 103‧‧ The first control device transmits the digital key according to the key load command to the controlled end step corresponding to the key load command 104‧‧‧The controlled end stores the digital key. Step 105‧‧ The first control device receives the lock command and transmits the lock command to the controlled end corresponding to the lock command. Step 106‧‧‧ The controlled end is controlled according to the lock command The specified program or program in the console or the controlled terminal performs the locking procedure. Step 107‧ The first control device receives the unlocking command and transmits the digital key and the unlocking command to the controlled terminal corresponding to the unlocking command. ‧ The controlled terminal verifies the digital key received by the controlled terminal according to the digital key stored by the controlled terminal. 109‧‧‧ When the digital key received by the controlled terminal passes the verification, The unlocking command unlocks the specified file or program in the controlled or controlled terminal. Step 110‧‧‧ When the controlled terminal unlocks the specified file or program in the controlled or controlled terminal and the unlocking time has expired When the preset time is reached, the specified program or program in the controlled terminal or the controlled terminal is locked. Step 201‧‧ The server receives the digital key from the first control device and stores it. Step 202‧‧‧ Servo The terminal receives the key load instruction from the controlled end to perform the verification step 203.‧‧ When the key load instruction is verified by the server, the digital key is transferred to the controlled end corresponding to the key load instruction. Step 204‧ ‧ When the servo terminal receives the lock command from the first control device, the lock command is transmitted to the controlled end corresponding to the lock command. Step 205‧‧ When the servo terminal receives the unlock command from the first control device, the digital key and the unlock command are transmitted. To the controlled terminal corresponding to the unlocking command, step 206‧‧‧ The server receives the verification information for verification step 207‧‧‧ When the verification information is verified by the server, the digital key is transmitted 208‧‧‧ The second control device transmits the verification information to the servo terminal. Step 208‧‧ The second control device receives the digital key from the servo and stores it

第1圖繪示為本發明透過生物特徵進行鎖定與解鎖系統的系統方塊圖。 第2A圖以及第2B圖繪示為本發明透過生物特徵進行鎖定與解鎖方法的方法流程圖。FIG. 1 is a block diagram of a system for locking and unlocking a biometric feature according to the present invention. 2A and 2B are flowcharts showing a method for locking and unlocking a biometric according to the present invention.

10‧‧‧受控端 10‧‧‧ controlled end

11‧‧‧鎖端生成模組 11‧‧‧Lock-end generation module

12‧‧‧鎖端傳送模組 12‧‧‧Lock Transfer Module

13‧‧‧鎖端接收模組 13‧‧‧Lock receiving module

14‧‧‧鎖端儲存模組 14‧‧‧Lock storage module

15‧‧‧鎖定模組 15‧‧‧Locking module

16‧‧‧鎖端驗證模組 16‧‧‧Lock end verification module

17‧‧‧解鎖模組 17‧‧‧Unlocking module

20‧‧‧第一控制裝置 20‧‧‧First control unit

21‧‧‧生物特徵接收模組 21‧‧‧Biometric Receiver Module

22‧‧‧生成模組 22‧‧‧Generation Module

23‧‧‧第一儲存模組 23‧‧‧First storage module

24‧‧‧第一接收模組 24‧‧‧First Receiver Module

25‧‧‧第一傳送模組 25‧‧‧First transmission module

30‧‧‧伺服端 30‧‧‧Server

31‧‧‧伺服端接收模組 31‧‧‧Server receiving module

32‧‧‧伺服端儲存模組 32‧‧‧Server storage module

33‧‧‧伺服端驗證模組 33‧‧‧Server Verification Module

34‧‧‧伺服端傳送模組 34‧‧‧Servo transmission module

40‧‧‧第二控制裝置 40‧‧‧Second control device

41‧‧‧第二傳送模組 41‧‧‧Second transmission module

42‧‧‧第二接收模組 42‧‧‧second receiving module

43‧‧‧第二儲存模組 43‧‧‧Second storage module

Claims (10)

一種透過生物特徵進行鎖定與解鎖系統,其包含: 至少一受控端,所述受控端更包含: 一鎖端生成模組,當所述受控端第一次執行時,生成一金鑰載入指令; 一鎖端傳送模組,用以傳送所述金鑰載入指令; 一鎖端接收模組,用以接收一鎖定指令,或是接收一數位金鑰以及一解鎖指令; 一鎖端儲存模組,用以儲存所述數位金鑰; 一鎖定模組,用以依據所述鎖定指令對所述受控端或是所述受控端中被指定的文件或程式進行鎖定程序; 一鎖端驗證模組,用以依據所述鎖端儲存模組所儲存的所述數位金鑰對所述鎖端接收模組所接收到的所述數位金鑰進行驗證;及 一解鎖模組,用以當所述鎖端接收模組所接收到的所述數位金鑰通過所述驗證模組的驗證時,依據所述解鎖指令對所述受控端或是所述受控端中被指定的文件或程式進行解鎖程序;及 一第一控制裝置,所述第一控制裝置更包含: 一生物特徵接收模組,用以接收一生物特徵; 一生成模組,用以將所述生物特徵進行數位轉換為所述數位金鑰; 一第一儲存模組,用以儲存所述數位金鑰; 一第一接收模組,用以接收所述金鑰載入指令、所述鎖定指令或是所述解鎖指令;及 一第一傳送模組,用以當接收到所述金鑰載入指令時,傳送所述數位金鑰至與所述金鑰載入指令對應的所述受控端;當接收到所述鎖定指令時,傳送所述鎖定指令至與所述鎖定指令對應的所述受控端;當接收到所述解鎖指令時,傳送所述數位金鑰以及所述解鎖指令至與所述解鎖指令對應的所述受控端。A system for locking and unlocking through a biometric feature, comprising: at least one controlled end, the controlled end further comprising: a lock end generating module, generating a key when the controlled end is executed for the first time a lock instruction module, configured to transmit the key load instruction; a lock end receiving module, configured to receive a lock command, or receive a digital key and an unlock command; a storage module for storing the digital key; a locking module, configured to perform a locking procedure on the controlled terminal or the designated file or program in the controlled terminal according to the locking instruction; a lock end verification module, configured to verify the digital key received by the lock receiving module according to the digital key stored by the lock storage module; and an unlocking module And when the digital key received by the lock receiving module passes the verification by the verification module, according to the unlocking instruction, the controlled end or the controlled end is The specified file or program to unlock the program; and a first control The first control device further includes: a biometric receiving module configured to receive a biometric feature; a generating module configured to digitally convert the biometric feature into the digital key; a storage module for storing the digital key; a first receiving module, configured to receive the key loading instruction, the locking instruction or the unlocking instruction; and a first transmitting module, For transmitting the digital key to the controlled end corresponding to the key load instruction when receiving the key load instruction; transmitting the lock when receiving the lock instruction And the instruction is to the controlled end corresponding to the locking instruction; when receiving the unlocking instruction, transmitting the digital key and the unlocking instruction to the controlled end corresponding to the unlocking instruction. 如申請專利範圍第1項所述的透過生物特徵進行鎖定與解鎖系統,其中所述鎖定指令或是所述解鎖指令是依據所述電子裝置的選定機構、按鍵以及觸控的組合方式生成以對應需要鎖定或是解鎖的所述受控端。The locking and unlocking system for biometrics according to claim 1, wherein the locking command or the unlocking command is generated according to a combination of a selected mechanism, a button, and a touch of the electronic device. The controlled end that needs to be locked or unlocked. 如申請專利範圍第1項所述的透過生物特徵進行鎖定與解鎖系統,其中所述鎖定模組更包含當所述解鎖模組解鎖所述受控端或是所述受控端中被指定的文件或程式且解鎖時間已達到預設時間時,對所述受控端或是所述受控端中被指定的文件或程式進行鎖定程序。The locking and unlocking system for biometrics according to claim 1, wherein the locking module further comprises: when the unlocking module unlocks the controlled end or is designated in the controlled end; When the file or program has been unlocked for a preset time, the controlled program or the specified file or program in the controlled terminal is locked. 如申請專利範圍第1項所述的透過生物特徵進行鎖定與解鎖系統,其中透過生物特徵進行鎖定與解鎖系統更包含一伺服端,所述伺服端更包含: 一伺服端接收模組,用以自所述第一傳送模組接收所述數位金鑰,自所述鎖端傳送模組接收所述金鑰載入指令,自所述第一傳送模組接收所述鎖定指令或是所述解鎖指令,或是接收一驗證資訊; 一伺服端儲存模組,用以儲存所述數位金鑰; 一伺服端驗證模組,用以對所述金鑰載入指令進行驗證,或是對所述驗證資訊進行驗證; 一伺服端傳送模組,用以當所述金鑰載入指令通過所述伺服端驗證模組的驗證時,傳送所述數位金鑰至與所述金鑰載入指令對應的所述受控端;當接收到所述鎖定指令時,傳送所述鎖定指令至與所述鎖定指令對應的所述受控端;當接收到所述解鎖指令時,傳送所述數位金鑰以及所述解鎖指令至與所述解鎖指令對應的所述受控端;當所述驗證資訊通過所述伺服端驗證模組的驗證時,傳送所述數位金鑰。The locking and unlocking system for biometrics according to the first aspect of the invention, wherein the locking and unlocking system for biometrics further comprises a server, the server further comprising: a servo receiving module for Receiving the digital key from the first transmitting module, receiving the key loading instruction from the lock transfer module, receiving the lock command from the first transfer module, or unlocking Commanding, or receiving a verification information; a server storage module for storing the digital key; a server verification module for verifying the key loading instruction, or Verifying information for verification; a server transmitting module for transmitting the digital key to correspond to the key loading instruction when the key loading instruction is verified by the server verification module The controlled end; when the lock instruction is received, transmitting the lock instruction to the controlled end corresponding to the lock instruction; when receiving the unlock instruction, transmitting the digital key And the solution Unlocking instruction to the instruction corresponding to the controlled terminal; authentication information when the authentication by the authentication server end module, transmitting the digit keys. 如申請專利範圍第4項所述的透過生物特徵進行鎖定與解鎖系統,其中透過生物特徵進行鎖定與解鎖系統更包含一第二控制裝置,所述第二控制裝置更包含: 一第二傳送模組,用以傳送所述驗證資訊至所述伺服端接收模組; 一第二接收模組,用以自所述伺服端傳送模組接收所述數位金鑰;及 一第二儲存模組,用以儲存所述數位金鑰。The locking and unlocking system for biometrics according to claim 4, wherein the locking and unlocking system through the biometric further comprises a second control device, the second control device further comprising: a second transfer mode a group for transmitting the verification information to the server receiving module; a second receiving module for receiving the digital key from the server transmitting module; and a second storage module, Used to store the digital key. 一種透過生物特徵進行鎖定與解鎖方法,其包含: 一第一控制裝置接收一生物特徵並將所述生物特徵進行數位轉換為一數位金鑰並儲存; 提供至少一受控端,所述受控端第一次執行時,生成一金鑰載入指令並傳送至所述第一控制裝置; 所述第一控制裝置依據所述金鑰載入指令傳送所述數位金鑰至與所述金鑰載入指令對應的所述受控端; 所述受控端儲存所述數位金鑰; 所述第一控制裝置接收所述鎖定指令,並傳送所述鎖定指令至與所述鎖定指令對應的所述受控端; 所述受控端依據所述鎖定指令對所述受控端或是所述受控端中被指定的文件或程式進行鎖定程序; 所述第一控制裝置接收所述解鎖指令,並傳送所述數位金鑰以及所述解鎖指令至與所述解鎖指令對應的所述受控端; 所述受控端依據所述受控端所儲存的所述數位金鑰對所述受控端所接收到的所述數位金鑰進行驗證;及 當所述受控端所接收到的所述數位金鑰通過驗證時,依據所述解鎖指令對所述受控端或是所述受控端中被指定的文件或程式進行解鎖程序。A method for locking and unlocking through a biometric feature, comprising: a first control device receiving a biometric feature and digitally converting the biometric feature into a digital key and storing; providing at least one controlled end, the controlled When the terminal is executed for the first time, a key load instruction is generated and transmitted to the first control device; the first control device transmits the digital key to the key according to the key load instruction Loading the control end corresponding to the instruction; the controlled end stores the digital key; the first control device receives the lock instruction, and transmits the lock instruction to a location corresponding to the lock instruction a controlled end; the controlled end performs a locking procedure on the controlled end or the designated file or program in the controlled end according to the locking instruction; the first control device receives the unlocking instruction And transmitting the digital key and the unlocking instruction to the controlled end corresponding to the unlocking instruction; the controlled end is connected to the received digital key according to the digital key stored by the controlled end Received by the console The digital key is verified; and when the digital key received by the controlled terminal passes the verification, the controlled terminal or the controlled terminal is specified according to the unlocking instruction. The file or program to unlock the program. 如申請專利範圍第6項所述的透過生物特徵進行鎖定與解鎖方法,其中所述第一控制裝置接收所述鎖定指令以及所述第一控制裝置接收所述解鎖指令的步驟中,所述鎖定指令或是所述解鎖指令是依據所述電子裝置的選定機構、按鍵以及觸控的組合方式生成以對應需要鎖定或是解鎖的所述受控端。The method for locking and unlocking through a biometric according to claim 6, wherein the first control device receives the lock command and the step of the first control device receiving the unlock command, the locking The command or the unlocking command is generated according to a combination of a selected mechanism, a button, and a touch of the electronic device to correspond to the controlled end that needs to be locked or unlocked. 如申請專利範圍第6項所述的透過生物特徵進行鎖定與解鎖方法,其中所述透過生物特徵進行鎖定與解鎖方法更包含當所述受控端解鎖所述受控端或是所述受控端中被指定的文件或程式且解鎖時間已達到預設時間時,對所述受控端或是所述受控端中被指定的文件或程式進行鎖定程序的步驟。The method for locking and unlocking through a biometric according to claim 6, wherein the method of locking and unlocking through the biometric further comprises: when the controlled end unlocks the controlled end or the controlled The step of locking the specified file or program in the controlled terminal or the controlled terminal when the specified file or program in the terminal has reached the preset time. 如申請專利範圍第6項所述的透過生物特徵進行鎖定與解鎖方法,其中所述透過生物特徵進行鎖定與解鎖方法更包含下列步驟: 一伺服端自所述第一控制裝置接收所述數位金鑰並加以儲存; 所述伺服端自所述受控端接收所述金鑰載入指令以進行驗證; 當所述金鑰載入指令通過所述伺服端的驗證時,傳送所述數位金鑰至與所述金鑰載入指令對應的所述受控端; 所述伺服端自所述第一控制裝置接收所述鎖定指令時,傳送所述鎖定指令至與所述鎖定指令對應的所述受控端; 所述伺服端自所述第一控制裝置接收所述解鎖指令時,傳送所述數位金鑰以及所述解鎖指令至與所述解鎖指令對應的所述受控端; 所述伺服端接收一驗證資訊以進行驗證;及 當所述驗證資訊通過所述伺服端的驗證時,傳送所述數位金鑰。The method for locking and unlocking through biometrics according to claim 6, wherein the method for locking and unlocking through biometrics further comprises the following steps: a server receives the digital gold from the first control device Key is stored and stored; the server receives the key load instruction from the controlled terminal for verification; when the key load instruction passes the verification by the server, the digital key is transmitted to The controlled end corresponding to the key load instruction; when the servo end receives the lock instruction from the first control device, transmitting the lock command to the received corresponding to the lock command a control end, when the server receives the unlocking instruction from the first control device, transmitting the digital key and the unlocking instruction to the controlled end corresponding to the unlocking instruction; Receiving a verification message for verification; and transmitting the digital key when the verification information is verified by the server. 如申請專利範圍第9項所述的透過生物特徵進行鎖定與解鎖方法,其中所述透過生物特徵進行鎖定與解鎖方法更包含下列步驟: 一第二控制裝置傳送所述驗證資訊至所述伺服端;及 所述第二控制裝置自所述伺服端接收所述數位金鑰並加以儲存。The method for locking and unlocking through biometrics according to claim 9, wherein the method for locking and unlocking through biometrics further comprises the following steps: a second control device transmits the verification information to the server And the second control device receives the digital key from the server and stores it.
TW104141232A 2015-12-09 2015-12-09 Biometrics locking and unlocking system and method therefore TWI578185B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW104141232A TWI578185B (en) 2015-12-09 2015-12-09 Biometrics locking and unlocking system and method therefore

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW104141232A TWI578185B (en) 2015-12-09 2015-12-09 Biometrics locking and unlocking system and method therefore

Publications (2)

Publication Number Publication Date
TWI578185B TWI578185B (en) 2017-04-11
TW201721490A true TW201721490A (en) 2017-06-16

Family

ID=59241160

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104141232A TWI578185B (en) 2015-12-09 2015-12-09 Biometrics locking and unlocking system and method therefore

Country Status (1)

Country Link
TW (1) TWI578185B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWM329579U (en) * 2007-10-09 2008-04-01 Htc Corp Keyless identifier
TWM440296U (en) * 2012-04-26 2012-11-01 Kuen-Feng Cheng Smart mobile monitoring elevator system
TWI492190B (en) * 2013-04-08 2015-07-11 正崴精密工業股份有限公司 Access control system and control method thereof
TWI557004B (en) * 2014-01-10 2016-11-11 Utechzone Co Ltd Identity authentication system and its method
TWM508172U (en) * 2015-05-05 2015-09-01 Taiwan Secom Co Ltd Access authentication system

Also Published As

Publication number Publication date
TWI578185B (en) 2017-04-11

Similar Documents

Publication Publication Date Title
EP3657370B1 (en) Methods and devices for authenticating smart card
US20230231718A1 (en) Method of using one device to unlock another device
US7664961B2 (en) Wireless handheld device with local biometric authentication
CN107113315B (en) Identity authentication method, terminal and server
EP3748900A1 (en) System access using a mobile device
US20070223685A1 (en) Secure system and method of providing same
US10693641B2 (en) Secure container based protection of password accessible master encryption keys
WO2014083335A2 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
US11539524B1 (en) Software credential token process, software, and device
US8566579B2 (en) Obfuscated authentication systems, devices, and methods
KR102301742B1 (en) Method for registering and using non keypad smart door-lock key and access control system thereof
CN110738764A (en) Security control system and method based on intelligent lock
CN112425116B (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
JP2006060392A (en) Unauthorized-use preventive system and identification method for information terminal device
CN110113153B (en) NFC secret key updating method, terminal and system
TWI578185B (en) Biometrics locking and unlocking system and method therefore
CN107070663B (en) Mobile terminal-based field authentication method and field authentication system
KR102442149B1 (en) Electronic key based on user authentication using external device and operating method therof
JP7445528B2 (en) System, terminal device and control device
TWI826077B (en) Method of locking and unlocking a storage device and related system thereof
KR20190047557A (en) Earphone Device for Providing OTP by using Asynchronous Local Area Radio Communication
JP2005016126A (en) Floating password unlocking system, floating password unlocking method, and its program
KR101298216B1 (en) Authentication system and method using multiple category
KR101777042B1 (en) Card for Generating Electronic Signature based on Asynchronous Local Area Radio Communication
JP2023031673A (en) Storage device management system