TW202125456A - Security system - Google Patents

Security system Download PDF

Info

Publication number
TW202125456A
TW202125456A TW108148414A TW108148414A TW202125456A TW 202125456 A TW202125456 A TW 202125456A TW 108148414 A TW108148414 A TW 108148414A TW 108148414 A TW108148414 A TW 108148414A TW 202125456 A TW202125456 A TW 202125456A
Authority
TW
Taiwan
Prior art keywords
verification
identity information
security
verified
host
Prior art date
Application number
TW108148414A
Other languages
Chinese (zh)
Other versions
TWI735121B (en
Inventor
鄭澤芳
廖松偉
Original Assignee
台灣新光保全股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 台灣新光保全股份有限公司 filed Critical 台灣新光保全股份有限公司
Priority to TW108148414A priority Critical patent/TWI735121B/en
Publication of TW202125456A publication Critical patent/TW202125456A/en
Application granted granted Critical
Publication of TWI735121B publication Critical patent/TWI735121B/en

Links

Images

Landscapes

  • Alarm Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A security system comprises a door locking device, a security host, a reminding device and a verification device, wherein the verification device is connected with the door locking device, the security host and the reminding device. The door locking device is configured to receive identity information to be verified and controlled to be unlocked. The security host has a security status indicating a complete monitoring status or a partial monitoring status. The reminding device is configured to be controlled to provide a reminder. The verification device is configured to obtain the security status and the identity information to be verified, to perform a verification procedure according to the identity information to be verified, and to control the reminding device to provide the reminder when the verification procedure is passed and the security status indicates the partial monitoring status.

Description

保全系統Security system

本發明係關於一種保全系統,尤其係關於一種具有門鎖的保全系統。The present invention relates to a security system, in particular to a security system with a door lock.

現今大多住宅、辦公大樓及營業場所皆會設置保全系統以及保全人員,藉由保全系統以及保全人員的監控以避免非法入侵或儘早發現並解除其他異常狀況。另,隨著無線通訊技術的進步,遠端監控之應用日漸廣泛,保全系統亦發展為具有遠端監控功能,可以將所安設之保全區域中的狀態及自身的保全狀態通知管制中心,亦可以發送訊息至保全區域之合法使用者的個人裝置,例如手機。Nowadays, most residences, office buildings and business premises are equipped with security systems and security personnel. The security systems and security personnel are monitored to avoid illegal intrusion or detect and remove other abnormal conditions as soon as possible. In addition, with the advancement of wireless communication technology, the application of remote monitoring has become increasingly widespread, and the security system has also developed a remote monitoring function, which can notify the control center of the status of the security area and its own security status. Messages can be sent to the personal devices of legal users in the security area, such as mobile phones.

然而,上述之發送至個人裝置的訊息未受使用者注意的機率相當地高,如此一來則容易發生使用者不得知室內狀態便直接進入室內而遭遇危險的情況。However, the probability that the above-mentioned message sent to the personal device is not noticed by the user is quite high. As a result, it is easy for the user to directly enter the room without knowing the indoor state and encounter danger.

鑒於上述問題,本發明提供一種保全系統。In view of the above problems, the present invention provides a security system.

依據本發明一實施例的保全系統,包含門鎖裝置、提示裝置、保全主機以及驗證裝置,其中驗證裝置連接於門鎖裝置、提示裝置及保全主機。門鎖裝置用於接收待驗證身分資訊,並受控以執行解鎖動作。提示裝置用於受控以發出提示。保全主機具有一保全狀態,所述保全狀態指示完全監控狀態或部分監控狀態。驗證裝置用於取得保全狀態及待驗證身分資訊,依據待驗證身分資訊執行驗證程序,且在驗證程序通過且保全狀態指示部分監控狀態時,控制提示裝置發出提示。A security system according to an embodiment of the present invention includes a door lock device, a prompt device, a security host, and a verification device, wherein the verification device is connected to the door lock device, the prompt device, and the security host. The door lock device is used for receiving the identity information to be verified and controlled to perform the unlocking action. The reminder device is used to be controlled to give out reminders. The security host has a security state, and the security state indicates a full monitoring state or a partial monitoring state. The verification device is used to obtain the security status and the identity information to be verified, execute the verification process based on the identity information to be verified, and control the prompt device to send out a prompt when the verification process is passed and the security status indicates the partial monitoring state.

藉由上述結構,本案所揭示的保全系統在使用者提供之身分資訊通過驗證時,依據保全狀態選擇性地提供提示,以在使用者進門前提供室內狀態,進而強化保全系統的警示功能。With the above structure, the security system disclosed in this case selectively provides prompts based on the security status when the identity information provided by the user passes the verification, so as to provide the indoor status before the user enters the door, thereby strengthening the security system's warning function.

以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the disclosure and the following description of the embodiments are used to demonstrate and explain the spirit and principle of the present invention, and to provide a further explanation of the scope of the patent application of the present invention.

以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The detailed features and advantages of the present invention will be described in detail in the following embodiments. The content is sufficient to enable anyone familiar with the relevant art to understand the technical content of the present invention and implement it accordingly, and according to the content disclosed in this specification, the scope of patent application and the drawings. Anyone who is familiar with relevant skills can easily understand the purpose and advantages of the present invention. The following examples further illustrate the viewpoints of the present invention in detail, but do not limit the scope of the present invention by any viewpoint.

本發明所提之保全系統結合保全與門禁的功能,可以適用於住宅、辦公大樓及商店等具有門的場所。請參考圖1,圖1為依據本發明一實施例所繪示的保全系統1的功能方塊圖。保全系統1包含門鎖裝置11、保全主機13、提示裝置15及驗證裝置17,其中驗證裝置17連接於門鎖裝置11、提示裝置15及保全主機13。進一步來說,驗證裝置17可以透過有線通訊方式(例如RS485、RS232、USB、乙太網路等)連接於門鎖裝置11/保全主機13/提示裝置15,亦可以透過無線通訊方式(例如射頻、Wi-Fi、ZigBee、Z-wave、藍牙、近場通訊等)連接門鎖裝置11/保全主機13/提示裝置15。也就是說,驗證裝置17、門鎖裝置11、保全主機13及提示裝置15各自包含有線通訊電路及無線通訊電路中的一或二者。保全系統1可以與管制中心主機2及外部裝置3連接。進一步來說,保全系統1的保全主機13可以連接於管制中心主機2及外部裝置3,且保全系統1的驗證裝置17亦可以連接於管制中心主機2及外部裝置3,其中,所用之連接方式可以係有線通訊方式或無線通訊方式,此二方式之舉例如前所列,於此不再贅述。The security system proposed by the present invention combines the functions of security and access control, and can be applied to places with doors such as residences, office buildings and shops. Please refer to FIG. 1, which is a functional block diagram of a security system 1 according to an embodiment of the present invention. The security system 1 includes a door lock device 11, a security host 13, a prompt device 15 and a verification device 17, wherein the verification device 17 is connected to the door lock device 11, the prompt device 15 and the security host 13. Furthermore, the verification device 17 can be connected to the door lock device 11/security host 13/reminder device 15 through wired communication (such as RS485, RS232, USB, Ethernet, etc.), or through wireless communication (such as radio frequency). , Wi-Fi, ZigBee, Z-wave, Bluetooth, Near Field Communication, etc.) connect door lock device 11/security host 13/reminder device 15. In other words, the verification device 17, the door lock device 11, the security host 13, and the prompt device 15 each include one or both of a wired communication circuit and a wireless communication circuit. The security system 1 can be connected to the control center host 2 and external devices 3. Furthermore, the security host 13 of the security system 1 can be connected to the control center host 2 and the external device 3, and the verification device 17 of the security system 1 can also be connected to the control center host 2 and the external device 3. The connection method used It can be a wired communication method or a wireless communication method. Examples of the two methods are listed above, and will not be repeated here.

管制中心主機2係設置於管制中心的電腦,除了與保全系統1更可以與更多台保全系統連接。舉例來說,一棟大樓中的每個住戶各可設置一保全系統,管制中心主機則可以設置於大樓管理室或保全公司,並連接於每個住戶的保全系統。外部裝置3可以係感知器,諸如煙霧偵測器、窗戶振動偵測器、窗戶開啟監控器、一氧化碳偵測器、二氧化碳偵測器、紅外線偵測器、影像監視器等,可以係個人裝置諸如智慧型手機、平板電腦、筆記型電腦等,亦可以係家電設備諸如電視、冷氣、洗衣機等。圖1示例性地繪示但非限制保全系統1連接於一外部裝置3,保全系統1亦可以連接於多個同類型或不同類型的外部裝置。於另一實施例中,管制中心主機2及外部裝置3中的一或二者係包含於保全系統內。另外,外部裝置3亦可連接於管制中心主機2,保全系統1可以透過管制中心主機2與外部裝置3相互通訊。The control center host 2 is a computer set up in the control center. In addition to the security system 1, it can also be connected to more security systems. For example, each resident in a building can be equipped with a security system, and the control center host can be set in the building management room or security company, and connected to the security system of each resident. The external device 3 can be a sensor, such as a smoke detector, a window vibration detector, a window opening monitor, a carbon monoxide detector, a carbon dioxide detector, an infrared detector, an image monitor, etc., and can be a personal device such as Smart phones, tablets, laptops, etc. can also be home appliances such as TVs, air conditioners, washing machines, etc. Fig. 1 exemplarily shows but not limited that the security system 1 is connected to an external device 3. The security system 1 can also be connected to multiple external devices of the same type or of different types. In another embodiment, one or both of the control center host 2 and the external device 3 are included in the security system. In addition, the external device 3 can also be connected to the control center host 2, and the security system 1 can communicate with the external device 3 through the control center host 2.

門鎖裝置11適用於第一空間與第二空間之間且可選擇性地分隔第一空間與第二空間的門,其中第一空間與第二空間即為門在關閉時所分隔的兩個空間。舉例來說,第一空間與第二空間可以為大樓內與大樓外、室內與室外(例如大樓中的一住戶內與該住戶外的走廊)等。門鎖裝置11用於接收待驗證身分資訊,並受控以執行解鎖動作。進一步來說,門鎖裝置11可以係密碼鎖、卡片鎖、生物特徵(臉型、指紋、聲紋、虹膜等)辨識鎖中的一者或多者之組合,其所接收的待驗證身分資訊可以係密碼、卡片中儲存的數位資料、欲通行者的生物特徵中的一或多者。門鎖裝置11可以設置於門邊的區域,當門鎖裝置11處於解鎖狀態時,門可受外力推動或拉動而連通原由門所分隔的第一空間與第二空間;反之,門則不可受外力推動或拉動。The door lock device 11 is suitable for doors that can selectively separate the first space and the second space between the first space and the second space, where the first space and the second space are the two separated by the door when the door is closed. space. For example, the first space and the second space may be inside and outside the building, indoor and outdoor (for example, a corridor between a residence in the building and the outdoor corridor), etc. The door lock device 11 is used for receiving the identity information to be verified and controlled to perform an unlocking action. Furthermore, the door lock device 11 can be a combination of one or more of a combination lock, a card lock, and a biometric (face shape, fingerprint, voiceprint, iris, etc.) identification lock, and the received identity information to be verified can be It is one or more of the password, the digital data stored in the card, and the biological characteristics of the person who wants to pass. The door lock device 11 can be arranged in the area beside the door. When the door lock device 11 is in the unlocked state, the door can be pushed or pulled by external force to connect the first space and the second space originally separated by the door; otherwise, the door is unacceptable. Push or pull by external force.

保全主機13設置於前述之第一空間。保全主機13可以包含一運算主機,具有保全狀態,其中保全狀態包含完全監控狀態及部分監控狀態。如前所述,保全主機13可以連接於一或多個感知器。當保全主機13的保全狀態指示完全監控狀態時,保全主機13可以啟用所連接之所有感知器,並判斷感知器所偵測到之訊號是否有所異常。當保全主機13判斷有異常狀態時,可以發出警示聲或警示光,亦可以產生警示訊號並傳送至管制中心主機2。藉此,管制中心便可以調派保全人員至現場或報警請求協助。當保全主機13的保全狀態指示部分監控狀態時,保全主機13可以停止判斷部分感知器(例如窗戶振動偵測器、窗戶開啟偵測器)所偵測到之訊號是否有所異常,或是直接禁能部分的感知器。一般而言,當室內無人時,保全主機13會被設定為完全監控狀態,而當室內有人時,保全主機13則會被設定為部分監控狀態。另外,保全主機13除了運算主機可以更包含操作介面或/及包含顯示介面,其中操作介面例如為多個按鍵,顯示介面例如為螢幕,操作介面與顯示介面亦可由一觸控螢幕實現。The security host 13 is set in the aforementioned first space. The security host 13 may include a computing host with a security state, where the security state includes a full monitoring state and a partial monitoring state. As mentioned above, the security host 13 can be connected to one or more sensors. When the security status of the security host 13 indicates the full monitoring status, the security host 13 can activate all connected sensors and determine whether the signals detected by the sensors are abnormal. When the security host 13 determines that there is an abnormal state, it can emit a warning sound or a warning light, or generate a warning signal and send it to the control center host 2. In this way, the control center can dispatch security personnel to the scene or call the police for assistance. When the security status of the security host 13 indicates part of the monitoring status, the security host 13 can stop judging whether the signals detected by some sensors (such as window vibration detectors, window opening detectors) are abnormal, or directly Disable some of the perceptrons. Generally speaking, when there is no one in the room, the security host 13 will be set to a fully monitored state, and when there are people in the room, the security host 13 will be set to a partial monitoring state. In addition, the security host 13 may further include an operating interface or/and a display interface in addition to the computing host. The operating interface is, for example, a plurality of keys, and the display interface is, for example, a screen. The operating interface and the display interface can also be implemented by a touch screen.

提示裝置15設置第二空間,即與保全主機13設置於不同空間。提示裝置15可以包含燈具或/及揚聲器等提示元件,用於受驗證裝置17控制以發出一或多種提示。The prompting device 15 is provided with a second space, that is, it is provided in a different space from the security host 13. The prompting device 15 may include prompting elements such as lamps or/and speakers, which are used to be controlled by the verification device 17 to issue one or more prompts.

驗證裝置17可以包含記憶體171、處理控制器173及計時器175。記憶體171例如為快閃記憶體、唯讀記憶體、磁性記憶體等,記憶體171可以與處理控制器173設置於相同機殼,亦可以係位於相對於處理控制器為遠端的記憶體(例如雲端硬碟)。記憶體171儲存有一或多個使用者(保全區域的合法使用者)的預存身分資訊,進一步地,更可以儲存有各使用者的預存適用時間。預存身分資訊可以代表允許通行的使用者身分,例如為密碼、卡片中儲存的數位資料、使用者之生物特徵中的一或多者。預存適用時間可以表示對應的使用者會提供身分資訊以解鎖的時間區段。處理控制器173例如為中央處理器、微控制器、可編程邏輯控制器等,可以執行驗證程序及對提示裝置15之控制,詳細之實施內容將於後描述。計時器175則為選擇性設置的元件,可以受處理控制器173控制而執行計時以產生計時值。The verification device 17 may include a memory 171, a processing controller 173, and a timer 175. The memory 171 is, for example, flash memory, read-only memory, magnetic memory, etc. The memory 171 can be installed in the same housing as the processing controller 173, or it can be a remote memory with respect to the processing controller. (E.g. Cloud Drive). The memory 171 stores the pre-stored identity information of one or more users (legal users in the security area), and further, can store the pre-stored applicable time of each user. The pre-stored identity information may represent the identity of the user allowed to pass, for example, one or more of the password, the digital data stored in the card, and the biological characteristics of the user. The pre-stored applicable time can indicate the period of time during which the corresponding user will provide identity information to unlock. The processing controller 173 is, for example, a central processing unit, a microcontroller, a programmable logic controller, etc., and can execute a verification program and control the prompting device 15. The detailed implementation content will be described later. The timer 175 is an optional component that can be controlled by the processing controller 173 to perform timing to generate a timing value.

圖1以功能方塊及線條示例性地繪示驗證裝置17與其他裝置的連接關係及其所包含的元件。除了上述元件,驗證裝置17更可以包含操作介面或/及包含顯示介面,其中操作介面例如為多個按鍵,顯示介面例如為螢幕,操作介面與顯示介面亦可由一觸控螢幕實現。另外,以實體來說,驗證裝置17可以獨立設置,或可以與保全主機13或門鎖裝置11裝設於同一機殼內。或者,驗證裝置17可以包含設置於不同區域的多個部分。舉例來說,驗證裝置17可以有一部分的元件及電路與保全主機13裝設於同一機殼內,而另一部分的元件及電路與門鎖裝置11裝設於另一機殼內。進一步來說,驗證裝置17的處理控制器173可以包含兩個處理控制單元,分別例如為中央處理器、微控制器、可編程邏輯控制器等,且其一與保全主機13裝設於同一機殼內,另一則與門鎖裝置11裝設於另一機殼內。FIG. 1 exemplarily illustrates the connection relationship between the verification device 17 and other devices and the components included in the verification device 17 with functional blocks and lines. In addition to the above components, the verification device 17 may further include an operation interface or/and a display interface, where the operation interface is, for example, a plurality of buttons, the display interface is, for example, a screen, and the operation interface and the display interface can also be implemented by a touch screen. In addition, in terms of entities, the verification device 17 can be installed independently, or can be installed in the same casing as the security host 13 or the door lock device 11. Alternatively, the verification device 17 may include a plurality of parts arranged in different areas. For example, the verification device 17 may have a part of the components and circuits installed in the same housing as the security host 13, and another part of the components and circuits and the door lock device 11 may be installed in another housing. Furthermore, the processing controller 173 of the verification device 17 may include two processing control units, such as a central processing unit, a microcontroller, a programmable logic controller, etc., respectively, and one of them is installed in the same machine as the security host 13 Inside the casing, the other and the door lock device 11 are installed in another casing.

驗證裝置17用於取得保全狀態及待驗證身分資訊,依據待驗證身分資訊執行驗證程序,且在驗證程序通過且保全狀態指示部分監控狀態時,控制提示裝置15發出提示。詳細來說,驗證裝置17可以從門鎖裝置11取得待驗證身分資訊且從保全主機13取得保全狀態。驗證裝置17對待驗證身分資訊執行驗證程序,且在驗證程序通過時,判斷保全狀態係指示完全監控狀態還是部分監控狀態,並於保全狀態指示部分監控狀態時,控制提示裝置15發出提示。以使用情境來說明,當保全狀態指示部分監控狀態時,表示室內為有人的狀態,因此藉由驗證裝置17判斷此狀態並控制提示裝置15發出提示,使用者便可得知此狀態。進一步來說,驗證裝置17在控制提示裝置15發出提示後,可以使用計時器175開始計時以產生計時值,並以處理控制器173判斷計時值是否達一預設時間值(可預存於記憶體171或處理控制器173的內部記憶體)。當計時值達預設時間值時,驗證裝置17便可以控制門鎖裝置11執行解鎖動作。藉此,可以提供使用者反應的緩衝時間,避免使用者不得知室內狀態即直接進入而遭遇危險的情況。The verification device 17 is used to obtain the security status and the identity information to be verified, execute a verification procedure based on the identity information to be verified, and control the prompt device 15 to issue a prompt when the verification procedure passes and the security state indicates a partial monitoring state. In detail, the verification device 17 can obtain the identity information to be verified from the door lock device 11 and obtain the security status from the security host 13. The verification device 17 performs a verification procedure for the identity information to be verified, and when the verification procedure passes, determines whether the security status indicates a full monitoring state or a partial monitoring state, and controls the prompting device 15 to issue a prompt when the security state indicates a partial monitoring state. Taking the usage context to illustrate, when the security status indicates the partial monitoring status, it means that the room is in a state of human beings. Therefore, the user can know this status by judging this status by the verification device 17 and controlling the prompting device 15 to issue a reminder. Furthermore, the verification device 17 can use the timer 175 to start timing to generate a timing value after controlling the reminding device 15 to issue a reminder, and the processing controller 173 determines whether the timing value reaches a preset time value (which can be pre-stored in the memory). 171 or the internal memory of the processing controller 173). When the timing value reaches the preset time value, the verification device 17 can control the door lock device 11 to perform an unlocking action. In this way, a buffer time for the user's reaction can be provided, and the situation where the user directly enters without knowing the indoor state and encounters danger can be avoided.

另外,如前所述,當保全主機13判斷有異常狀態時,可以產生警示訊號以指示該異常狀態。於一實施例中,驗證裝置17除了上述之判斷保全主機13的保全狀態之外,更可以判斷異常狀態是否已被排除,且在判斷未被排除時,控制提示裝置15發出提示。進一步來說,保全主機13在異常狀態尚未排除前,會持續產生警示訊號,驗證裝置17可以向保全主機13發出警示訊號是否存在的詢問,其中,驗證裝置17可以定期地向保全主機13發出上述詢問,或是在待驗證身分資訊的驗證程序通過時,才向保全主機13提出詢問。當保全主機13回覆警示訊號存在時,驗證裝置17判斷異常狀態未被排除,因而控制提示裝置15發出提示。一般而言,保全主機13在判斷有異常狀態時,會透過管制中心主機2通知保全區域之合法使用者的個人裝置(例如透過簡訊),然而使用者可能未注意到通知。藉此,保全系統1在使用者進入室內前提供異常狀態的提示,可以避免使用者不得知室內狀態即直接進入而遭遇危險的情況。In addition, as mentioned above, when the security host 13 determines that there is an abnormal state, it can generate a warning signal to indicate the abnormal state. In one embodiment, the verification device 17 can determine whether the abnormal state has been eliminated in addition to the above-mentioned determination of the security status of the security host 13, and control the prompting device 15 to issue a prompt when it is determined that it has not been eliminated. Furthermore, the security host 13 will continue to generate a warning signal before the abnormal state is eliminated, and the verification device 17 can send a query to the security host 13 whether the warning signal exists, wherein the verification device 17 can periodically send the above-mentioned warning signal to the security host 13 Inquiry, or only when the verification procedure for verifying the identity information is passed, the inquiry is made to the security host 13. When the security host 13 replies to the existence of the warning signal, the verification device 17 determines that the abnormal state has not been eliminated, and thus controls the prompt device 15 to issue a prompt. Generally speaking, when the security host 13 determines that there is an abnormal state, it will notify the legal user's personal device in the security area through the control center host 2 (for example, through a text message), but the user may not notice the notification. In this way, the security system 1 provides a reminder of the abnormal state before the user enters the room, which can prevent the user from directly entering the room without knowing the indoor state and encountering danger.

特別來說,驗證裝置17在判斷驗證程序通過且保全狀態指示部分監控狀態時,會產生第一控制訊號控制提示裝置15發出提示,而在判斷異常狀態未被排除時,會產生第二控制訊號控制提示裝置15發出提示,其中,第一及第二控制訊號可以分別指示不同種類的提示,例如控制提示裝置15發出不同顏色的光。另外,當驗證程序未通過時,驗證裝置17可以不作動,或可以產生警示訊號並傳送至保全主機13,保全主機13再據以於第一空間發出警示或/及將警示訊號傳送至管制中心主機2。In particular, when the verification device 17 judges that the verification process is passed and the security status indicates the partial monitoring state, it will generate a first control signal to control the prompting device 15 to issue a prompt, and when it is judged that the abnormal state is not eliminated, it will generate a second control signal. The prompting device 15 is controlled to emit a prompt, wherein the first and second control signals can respectively indicate different types of prompts, for example, the prompting device 15 is controlled to emit lights of different colors. In addition, when the verification procedure fails, the verification device 17 may not act, or may generate a warning signal and send it to the security host 13, and the security host 13 then issues a warning in the first space or/and sends the warning signal to the control center Host 2.

進一步說明驗證裝置17所執行之驗證程序,請參考圖1及圖2,其中圖2係依據本發明一實施例所繪示的保全系統1所執行之驗證程序的流程圖。於步驟S101中,驗證裝置17的處理控制器173從門鎖裝置11取得待驗證身分資訊。於步驟S103中,處理控制器173會判斷待驗證身分資訊是否符合記憶體171所存的多個預存身分資訊的其中一者。若否,則驗證程序未通過。若是,則於步驟S105中,驗證裝置17的處理控制器173會判斷接收待驗證身分資訊的時間是否符合對應於待驗證身分資訊的預存適用時間。若否,則驗證程序未通過。若是,則驗證程序通過。如前所述,當驗證程序通過時,驗證裝置17會判斷保全狀態為完全監控狀態或部分監控狀態,且在保全狀態指示部分監控狀態時控制提示裝置15發出提示。另外,當驗證程序未通過時,驗證裝置17可以不作動,或產生警示訊號並傳送至保全主機13。於此實施例中,驗證程序包含了多段式的驗證,除了驗證待驗證身分資訊的合法性,更驗證使用時間(即提供身分資訊的時間)的合法性,藉此可以降低待驗證身分資訊遭盜用的風險,提高系統辨識合法使用者的準確性,進而增進系統的安全性。For further description of the verification procedure executed by the verification device 17, please refer to FIG. 1 and FIG. 2. FIG. 2 is a flowchart of the verification procedure executed by the security system 1 according to an embodiment of the present invention. In step S101, the processing controller 173 of the verification device 17 obtains the identity information to be verified from the door lock device 11. In step S103, the processing controller 173 determines whether the identity information to be verified matches one of the plurality of pre-stored identity information stored in the memory 171. If not, the verification procedure has not passed. If so, in step S105, the processing controller 173 of the verification device 17 determines whether the time of receiving the identity information to be verified matches the pre-stored applicable time corresponding to the identity information to be verified. If not, the verification procedure has not passed. If yes, the verification procedure is passed. As mentioned above, when the verification procedure is passed, the verification device 17 will determine that the security state is a full monitoring state or a partial monitoring state, and control the prompting device 15 to issue a prompt when the security state indicates a partial monitoring state. In addition, when the verification procedure fails, the verification device 17 may not act, or generate a warning signal and send it to the security host 13. In this embodiment, the verification procedure includes a multi-stage verification. In addition to verifying the legitimacy of the identity information to be verified, it also verifies the legitimacy of the usage time (that is, the time for providing the identity information), thereby reducing the damage to the identity information to be verified. The risk of misappropriation improves the accuracy of the system in identifying legitimate users, thereby enhancing the security of the system.

更進一步來說,雖然透過上述身分資訊及使用時間的雙重驗證可以增加系統安全性。然而,對於某些使用者而言,其使用時間並無特定規律,或者對於一般使用者而言,偶有突發狀況而需臨時進入室內,此時便無法通過上述使用時間的驗證而被判定為欲非法入侵者。因此,本發明亦提出另一種驗證程序,包含上一實施例所述的步驟S101及步驟S103,而驗證裝置17在判斷接收待驗證身分資訊的時間不符合對應於待驗證身分資訊的預存適用時間時,會再特別執行生物特徵驗證。詳細來說,驗證裝置17會產生生物特徵輸入請求並透過門鎖裝置11輸出,以提示使用者輸入生物特徵資訊。當驗證裝置17從門鎖裝置11接收到生物特徵資訊時,會判斷其是否符合預存身分資訊中對應於先前判斷合法之待驗證身分資訊的使用者的生物特徵,若是,則驗證程序通過,若否,則驗證程序未通過。意即,當生物特徵驗證通過時,驗證程序通過。藉此,透過更多段的驗證,更可以提高系統辨識合法使用者的準確性。Furthermore, although the above-mentioned two-factor authentication of identity information and usage time can increase system security. However, for some users, there is no specific rule for their use time, or for general users, occasional emergencies and need to enter the room temporarily. At this time, they cannot be judged by the verification of the above use time. For illegal intruders. Therefore, the present invention also proposes another verification procedure, including steps S101 and S103 described in the previous embodiment, and the verification device 17 determines that the time of receiving the identity information to be verified does not match the pre-stored applicable time corresponding to the identity information to be verified. At that time, biometric verification will be carried out specially. Specifically, the verification device 17 generates a biometric input request and outputs it through the door lock device 11 to prompt the user to input biometric information. When the verification device 17 receives the biometric information from the door lock device 11, it will determine whether it matches the biometric characteristics of the user whose identity information has been previously determined to be legal to be verified in the pre-stored identity information. No, the verification procedure has not passed. This means that when the biometric verification is passed, the verification procedure is passed. In this way, through more verifications, the accuracy of the system in identifying legitimate users can be improved.

如前所述,驗證裝置17的記憶體171儲存有一或多個使用者的預存身分資訊及預存適用時間。使用者可以透過驗證裝置17的操作介面或作為外部裝置3的個人裝置來設定、變更或刪除其預存身分資訊及預存適用時間。驗證裝置17可以提供身分資訊的掛失機制。請一併參考圖1及圖3,圖3係依據本發明一實施例所繪示的保全系統1所執行之掛失機制的流程圖。進一步來說,掛失機制包含一驗證程序,有別於前列實施例所述之驗證程序。為了區隔二者,前列實施例所述之驗證程序可稱為第一驗證程序,而此實施例稱為第二驗證程序,前列實施例所述之待驗證身分資訊可稱為第一待驗證身分資訊,而此實施例稱為第二待驗證身分資訊。於此特別要說明的是,上述「第一」及「第二」無關於程序執行的順序或資訊產生的順序。As mentioned above, the memory 171 of the verification device 17 stores the pre-stored identity information and pre-stored applicable time of one or more users. The user can set, change or delete the pre-stored identity information and the pre-stored applicable time through the operation interface of the authentication device 17 or the personal device as the external device 3. The verification device 17 can provide a mechanism for reporting loss of identity information. Please refer to FIG. 1 and FIG. 3 together. FIG. 3 is a flowchart of a loss reporting mechanism executed by the security system 1 according to an embodiment of the present invention. Furthermore, the loss reporting mechanism includes a verification procedure, which is different from the verification procedure described in the previous embodiment. In order to distinguish the two, the verification procedure described in the previous embodiment can be called the first verification procedure, and this embodiment is called the second verification procedure, and the identity information to be verified in the previous embodiment can be called the first verification procedure. Identity information, and this embodiment is called the second identity information to be verified. It is particularly important to note that the above-mentioned "first" and "second" have nothing to do with the sequence of program execution or the sequence of information generation.

如圖3所示,掛失機制包含步驟S201~S207。於步驟S201中,驗證裝置17透過操作介面或外部裝置3接收一掛失請求,其中掛失請求包含代表申請者身分的第二待驗證身分資訊。於步驟S203中,驗證裝置17判斷第二待驗證身分資訊是否通過第二驗證程序。換句話說,驗證裝置17會依據第二待驗證身分資訊執行第二驗證程序,其中第二驗證程序的進一步執行內容將於後描述。當第二驗證程序通過時,於步驟S205中,驗證裝置17依據掛失請求使預存身分資訊中的至少一者失效。當第二驗證程序未通過時,於步驟S207中,驗證裝置17拒絕掛失請求,例如透過顯示介面或個人裝置顯示掛失失敗的畫面。As shown in Figure 3, the loss reporting mechanism includes steps S201 to S207. In step S201, the verification device 17 receives a loss report request through the operating interface or the external device 3, wherein the loss report request includes the second to-be-verified identity information representing the identity of the applicant. In step S203, the verification device 17 determines whether the second to-be-verified identity information passes the second verification procedure. In other words, the verification device 17 executes the second verification procedure based on the second to-be-verified identity information, wherein the further execution content of the second verification procedure will be described later. When the second verification procedure is passed, in step S205, the verification device 17 invalidates at least one of the pre-stored identity information according to the loss report request. When the second verification procedure fails, in step S207, the verification device 17 rejects the loss report request, for example, through a display interface or a personal device to display a loss report failure screen.

於具有掛失機制的實施例中,驗證裝置17中所儲存的預存身分資訊包含多個使用者各自的可變更身分資訊及固定身分資訊。其中,可變更身分資訊顧名思義係指可變更的身分資訊,例如密碼、卡片中儲存的數位資料等;固定身分資訊則係指使用者不可變更或難以變更的身分資訊,例如臉型、指紋、聲紋、虹膜等。進一步來說明第二驗證程序,其可以包含判斷第二待驗證身分資訊是否符合上述預存的固定身分資訊的其中一者。若是,則第二驗證程序通過,驗證裝置17據以使對應於第二驗證身分資訊的可變更身分資訊失效。更進一步來說,驗證裝置17可以藉由將可變更身分資訊刪除或是將其設為黑名單,以使可變更身分資訊失效。In an embodiment with a loss reporting mechanism, the pre-stored identity information stored in the verification device 17 includes the changeable identity information and fixed identity information of multiple users. Among them, the changeable identity information, as the name implies, refers to the changeable identity information, such as passwords, digital data stored in the card, etc.; the fixed identity information refers to the user’s unchangeable or difficult to change identity information, such as face shape, fingerprints, and voiceprints. , Iris, etc. To further illustrate the second verification procedure, it may include determining whether the second identity information to be verified conforms to one of the above-mentioned pre-stored fixed identity information. If so, the second verification procedure is passed, and the verification device 17 invalidates the changeable identity information corresponding to the second verification identity information. Furthermore, the verification device 17 can invalidate the changeable identity information by deleting the changeable identity information or setting it to a blacklist.

另外,驗證裝置17亦可以對預存身分資訊中的可變更身分資訊定期地進行主動變更,並將變更的預存身分資訊傳送至對應的使用者的個人裝置。藉由上述定期變更及掛失的機制,可以降低使用者的可變更身分資訊諸如密碼、卡片等遭盜用的風險。In addition, the verification device 17 can also actively change the changeable identity information in the pre-stored identity information on a regular basis, and send the changed pre-stored identity information to the corresponding user's personal device. Through the above-mentioned periodic change and loss reporting mechanism, the risk of the user's changeable identity information such as passwords and cards being stolen can be reduced.

本發明亦提出一種包含多組驗證裝置及提示裝置的保全系統。請參考圖4,圖4係依據本發明另一實施例所繪示的保全系統的功能方塊圖。如圖4所示,保全系統1’可以包含門鎖裝置11、保全主機13、第一提示裝置15a、第二提示裝置15b、第一驗證裝置17a、第二驗證裝置17b及管制中心主機19,其中,第一驗證裝置17a連接門鎖裝置11、保全主機13及第一提示裝置15a,管制中心主機19連接於保全主機13,且第二驗證裝置17b連接於管制中心主機19及第二提示裝置15b。上述各裝置之間的連接方式可以係有線通訊方式或無線通訊方式,此二方式之舉例如前所列,於此不再贅述。保全系統1’的門鎖裝置11、保全主機13、第一提示裝置15a及第一驗證裝置17a各自可實現的電路或裝置、功能以及彼此間的協同運作皆如同圖1實施例的保全系統1的門鎖裝置11、保全主機13、提示裝置15及驗證裝置17,於此不再贅述。The present invention also provides a security system including multiple sets of verification devices and prompt devices. Please refer to FIG. 4, which is a functional block diagram of a security system according to another embodiment of the present invention. As shown in FIG. 4, the security system 1'may include a door lock device 11, a security host 13, a first prompt device 15a, a second prompt device 15b, a first verification device 17a, a second verification device 17b, and a control center host 19, Among them, the first verification device 17a is connected to the door lock device 11, the security host 13 and the first prompt device 15a, the control center host 19 is connected to the security host 13, and the second verification device 17b is connected to the control center host 19 and the second prompt device 15b. The connection mode between the above-mentioned devices can be wired communication mode or wireless communication mode. Examples of these two modes are listed above and will not be repeated here. The door lock device 11, the security host 13, the first prompting device 15a, and the first verification device 17a of the security system 1'can implement circuits or devices, functions, and coordinated operations with each other are the same as those of the security system 1 in the embodiment of FIG. 1 The door lock device 11, the security host 13, the prompting device 15 and the verification device 17 of, will not be repeated here.

保全系統1’相較於保全系統1,更包含了管制中心主機19、第二提示裝置15b及第二驗證裝置17b。其中管制中心主機19同於圖1中與保全系統1連接的管制中心主機2,於此不再贅述。第二提示裝置15b用於受第二驗證裝置17b控制以發出提示。為了與第一驗證裝置17a所發出的提示區隔,第一驗證裝置17a發出的提示稱為第一提示,且第二提示裝置15b發出的提示稱為第二提示,上述「第一」及「第二」無關於提示發出的順序。第二驗證裝置17b類似於圖1的驗證裝置17,包含記憶體171及處理控制器173,其中這些元件各自的功能及運作皆同前列圖1實施例所述,於此不再贅述。此外,第二驗證裝置17b更包含一身分資訊接收器,例如為密碼鍵、讀卡機、攝像機、生物特徵感應器等,用於接收待驗證身分資訊,依據待驗證身分資訊執行驗證程序,其中驗證程序的詳細實施內容同於前列圖2的實施例所述,於此不再贅述。第二驗證裝置17b另可以透過管制中心主機19取得保全主機13的保全狀態,且在驗證程序通過且保全狀態指示部分監控狀態時,控制第二提示裝置15b發出第二提示。Compared with the security system 1, the security system 1'further includes a control center host 19, a second prompt device 15b, and a second verification device 17b. The control center host 19 is the same as the control center host 2 connected to the security system 1 in FIG. 1, and will not be repeated here. The second prompting device 15b is used to be controlled by the second verification device 17b to send out prompts. In order to distinguish from the prompt issued by the first verification device 17a, the prompt issued by the first verification device 17a is called the first prompt, and the prompt issued by the second prompt device 15b is called the second prompt. "Second" has nothing to do with the order in which the reminders are issued. The second verification device 17b is similar to the verification device 17 in FIG. 1 and includes a memory 171 and a processing controller 173. The functions and operations of these components are the same as those described in the previous embodiment in FIG. 1 and will not be repeated here. In addition, the second verification device 17b further includes an identity information receiver, such as a password key, a card reader, a camera, a biometric sensor, etc., for receiving identity information to be verified, and performing a verification process based on the identity information to be verified. The detailed implementation content of the verification procedure is the same as that described in the previous embodiment in FIG. 2, and will not be repeated here. The second verification device 17b can also obtain the security status of the security host 13 through the control center host 19, and when the verification procedure is passed and the security status indicates the partial monitoring status, the second notification device 15b is controlled to issue a second prompt.

除了上述之判斷保全主機13的保全狀態之外,第二驗證裝置17b另可以判斷異常狀態是否已被排除,且在判斷未被排除時,控制第二提示裝置15b發出提示。進一步來說,保全主機13在異常狀態尚未排除前,會持續產生警示訊號並傳送至管制中心主機19,第二驗證裝置17b可以向管制中心主機19發出警示訊號是否存在的詢問,其中,第二驗證裝置17b可以定期地向管制中心主機19發出上述詢問,或是在待驗證身分資訊的驗證程序通過時,才向管制中心主機19提出詢問。當管制中心主機19回覆警示訊號存在時,第二驗證裝置17b判斷異常狀態未被排除,因而控制第二提示裝置15b發出提示。特別來說,第二驗證裝置17b在判斷驗證程序通過且保全狀態指示部分監控狀態時控制第二提示裝置15b所發出的提示可以不同於在判斷異常狀態未被排除時控制第二提示裝置15b所發出提示,例如控制第二提示裝置15b發出不同顏色的光。另外,當驗證程序未通過時,第二驗證裝置17b可以不作動,或可以產生警示訊號並傳送至管制中心主機19。In addition to determining the security status of the security host 13 described above, the second verification device 17b can also determine whether the abnormal state has been eliminated, and when it is determined that the abnormal state has not been eliminated, it controls the second prompting device 15b to issue a prompt. Furthermore, the security host 13 will continue to generate a warning signal and send it to the control center host 19 before the abnormal state is eliminated. The second verification device 17b can send an inquiry to the control center host 19 whether the warning signal exists. Among them, the second The verification device 17b can periodically send the above-mentioned inquiry to the control center host 19, or only ask the control center host 19 when the verification procedure for verifying the identity information is passed. When the control center host 19 replies that the warning signal exists, the second verification device 17b judges that the abnormal state has not been eliminated, and thus controls the second notification device 15b to issue a reminder. In particular, the second verification device 17b controls the second prompting device 15b to issue a prompt when judging that the verification program is passed and the preservation status indicates the partial monitoring state may be different from the second prompting device 15b that controls the second prompting device 15b when judging that the abnormal state is not eliminated. A prompt is issued, for example, the second prompting device 15b is controlled to emit lights of different colors. In addition, when the verification procedure fails, the second verification device 17b may not be activated, or may generate a warning signal and send it to the control center host 19.

保全系統1’相較於保全系統1多了一組驗證裝置及提示裝置。進一步來說,在設置關係上,保全系統1’的第一驗證裝置17a的設置位置與保全主機13的設置位置之間的距離小於第二驗證裝置17b的設置位置與該保全主機13的設置位置之間的距離。以使用情境來說明,保全主機13可以設置於大樓中的住戶室內;門鎖裝置11及第一提示裝置15a可以設置於該住戶的家門;第一驗證裝置17a可以設置於住戶內或家門,特別係保全主機13與門鎖裝置11之間;第二提示裝置15b及第二驗證裝置17b則可以設置於大樓的大門鎖、電梯鎖或是其他比家門與保全主機13之間的距離更遠的地方。如此一來,保全系統1’可以在使用者抵達家門之前便提供室內狀態的提示,給予使用者更多的緩衝時間,避免使用者不得知室內狀態即直接進入而遭遇危險的情況。Compared with the security system 1, the security system 1'has an additional set of verification devices and prompt devices. Furthermore, in terms of the setting relationship, the distance between the setting position of the first verification device 17a of the security system 1'and the setting position of the security host 13 is smaller than the setting position of the second verification device 17b and the setting position of the security host 13 the distance between. In terms of usage scenarios, the security host 13 can be installed in a household in the building; the door lock device 11 and the first prompt device 15a can be installed in the household’s door; the first verification device 17a can be installed in the household or the door, especially It is between the security host 13 and the door lock device 11; the second prompting device 15b and the second verification device 17b can be set in the building’s door lock, elevator lock, or other devices that are farther than the distance between the home door and the security host 13 place. In this way, the security system 1'can provide a reminder of the indoor state before the user arrives at the home, giving the user more buffer time, and avoiding a situation where the user directly enters without knowing the indoor state and encounters danger.

藉由上述結構,本案所揭示的保全系統,在使用者提供之身分資訊通過驗證時,依據保全狀態選擇性地提供提示,以在使用者進門前提供室內狀態,進而強化保全系統的警示功能。另外,藉由多段式的身分驗證,本案所揭示的保全系統可以降低待驗證身分資訊遭盜用的風險,提高系統辨識合法使用者的準確性,進而增進系統的安全性。With the above structure, the security system disclosed in this case selectively provides prompts based on the security status when the identity information provided by the user passes the verification, so as to provide the indoor status before the user enters the door, thereby strengthening the alert function of the security system. In addition, with multi-stage identity verification, the security system disclosed in this case can reduce the risk of theft of identity information to be verified, improve the accuracy of the system in identifying legitimate users, and thereby enhance the security of the system.

雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed in the foregoing embodiments, it is not intended to limit the present invention. All changes and modifications made without departing from the spirit and scope of the present invention fall within the scope of the patent protection of the present invention. For the scope of protection defined by the present invention, please refer to the attached scope of patent application.

1、1’:保全系統 2、19:管制中心主機 3:外部裝置 11:門鎖裝置 13:保全主機 15:提示裝置 15a:第一提示裝置 15b:第二提示裝置 17:驗證裝置 17a:第一驗證裝置 17b:第二驗證裝置 171:記憶體 173:處理控制器 175:計時器1. 1’: Security system 2.19: Control center host 3: External device 11: Door lock device 13: Secure the host 15: Prompt device 15a: The first reminder device 15b: Second reminder device 17: Verification device 17a: The first verification device 17b: Second verification device 171: Memory 173: Processing Controller 175: Timer

圖1係依據本發明一實施例所繪示的保全系統的功能方塊圖。 圖2係依據本發明一實施例所繪示的保全系統所執行之驗證程序的流程圖。 圖3係依據本發明一實施例所繪示的保全系統所執行之掛失機制的流程圖。 圖4係依據本發明另一實施例所繪示的保全系統的功能方塊圖。FIG. 1 is a functional block diagram of a security system according to an embodiment of the present invention. 2 is a flowchart of a verification procedure executed by the security system according to an embodiment of the present invention. FIG. 3 is a flowchart of a loss reporting mechanism executed by the security system according to an embodiment of the present invention. FIG. 4 is a functional block diagram of a security system according to another embodiment of the present invention.

1:保全系統1: Security system

2:管制中心主機2: Control center host

3:外部裝置3: External device

11:門鎖裝置11: Door lock device

13:保全主機13: Secure the host

15:提示裝置15: Prompt device

17:驗證裝置17: Verification device

171:記憶體171: Memory

173:處理控制器173: Processing Controller

175:計時器175: Timer

Claims (10)

一種保全系統,包含:一門鎖裝置,用於接收一待驗證身分資訊,並受控以執行一解鎖動作;一保全主機,具有一保全狀態,該保全狀態指示一完全監控狀態或一部分監控狀態;一提示裝置,用於受控以發出一提示;以及一驗證裝置,連接於該門鎖裝置、該保全主機及該提示裝置,用於取得該保全狀態及該待驗證身分資訊,依據該待驗證身分資訊執行一驗證程序,且在該驗證程序通過且該保全狀態指示該部分監控狀態時,控制該提示裝置發出該提示。A security system includes: a door lock device for receiving a piece of identity information to be verified and controlled to perform an unlocking action; a security host with a security state, the security state indicating a full monitoring state or a part of the monitoring state; A reminder device for controlling to issue a reminder; and a verification device, connected to the door lock device, the security host, and the reminder device, for obtaining the security status and the identity information to be verified, based on the pending verification The identity information performs a verification process, and when the verification process passes and the security status indicates the part of the monitoring status, the notification device is controlled to issue the notification. 如請求項1所述的保全系統,其中該提示裝置係一第一提示裝置,該提示係一第一提示,該驗證裝置係一第一驗證裝置,且該保全系統更包含:一管制中心主機,連接於該保全主機;一第二提示裝置,用於受控以發出一第二提示;以及一第二驗證裝置,連接於該管制中心主機及該第二提示裝置,該第二驗證裝置用於接收該待驗證身分資訊,透過該管制中心主機取得該保全主機的該保全狀態,依據該待驗證身分資訊執行該驗證程序,且在該驗證程序通過且該保全狀態指示該部分監控狀態時,控制該第二提示裝置發出該第二提示。The security system according to claim 1, wherein the prompt device is a first prompt device, the prompt is a first prompt, the verification device is a first verification device, and the security system further includes: a control center host , Connected to the security host; a second prompt device, used to control to issue a second prompt; and a second verification device, connected to the control center host and the second prompt device, the second verification device used After receiving the identity information to be verified, obtain the security status of the security host through the control center host, execute the verification process based on the identity information to be verified, and when the verification process passes and the security status indicates the monitoring status of the part, Controlling the second prompting device to issue the second prompt. 如請求項2所述的保全系統,其中該第一驗證裝置的設置位置與該保全主機的設置位置之間的距離小於該第二驗證裝置的設置位置與該保全主機的設置位置之間的距離。The security system according to claim 2, wherein the distance between the installation position of the first verification device and the installation position of the security host is smaller than the distance between the installation position of the second verification device and the installation location of the security host . 如請求項2所述的保全系統,其中該保全主機用於在判斷一異常狀態時產生一警示訊號,並將該警示訊號傳送至該管制中心主機,該第二驗證裝置更用於在該異常狀態未被排除時,控制該第二提示裝置發出該第二提示。The security system according to claim 2, wherein the security host is used to generate a warning signal when judging an abnormal state, and transmit the warning signal to the control center host, and the second verification device is further used to detect the abnormal state. When the state is not eliminated, the second prompting device is controlled to issue the second prompt. 如請求項1所述的保全系統,該保全主機用於判斷一異常狀態,該驗證裝置更用於在該異常狀態未被排除時,控制該提示裝置發出該提示。For the security system described in claim 1, the security host is used to determine an abnormal state, and the verification device is further used to control the prompt device to issue the prompt when the abnormal state is not eliminated. 如請求項1所述的保全系統,其中該驗證裝置包含一計時器,該驗證裝置在控制該提示裝置發出該提示後,更以該計時器產生一計時值,且當該計時值達到一預設時間值時,控制該門鎖裝置執行該解鎖動作。The security system according to claim 1, wherein the verification device includes a timer, and after the verification device controls the reminding device to send out the reminder, the timer generates a timing value, and when the timing value reaches a preset value When the time value is set, the door lock device is controlled to perform the unlocking action. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊及分別對應於該些預存身分資訊的多個預存適用時間,該驗證程序包含判斷該待驗證身分資訊是否符合該些預存身分資訊的其中一者,若否,則該驗證程序未通過,若是,則判斷接收該待驗證身分資訊的時間是否符合該些預存適用時間中對應於該待驗證身分資訊的一者,若否,則該驗證程序未通過,若是,則該驗證程序通過。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information and a plurality of pre-stored applicable times respectively corresponding to the pre-stored identity information, and the verification procedure includes determining the identity to be verified Whether the information conforms to one of the pre-stored identity information, if not, the verification process has not passed, if yes, judge whether the time of receiving the identity information to be verified meets the pre-stored applicable time corresponding to the identity information to be verified If it is not, the verification procedure is not passed, and if it is, the verification procedure is passed. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊及分別對應於該些預存身分資訊的多個預存適用時間,該驗證程序包含判斷該待驗證身分資訊是否符合該些預存身分資訊的其中一者,若否,則該驗證程序未通過,若是,則判斷接收該待驗證身分資訊的時間是否符合該些預存適用時間中對應於該待驗證身分資訊的一者,若是,則該驗證程序通過,若否,則執行一生物特徵驗證,且當該生物特徵驗證通過時,該驗證程序通過。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information and a plurality of pre-stored applicable times respectively corresponding to the pre-stored identity information, and the verification procedure includes determining the identity to be verified Whether the information conforms to one of the pre-stored identity information, if not, the verification process has not passed, if yes, judge whether the time of receiving the identity information to be verified meets the pre-stored applicable time corresponding to the identity information to be verified If it is, the verification procedure is passed, if not, a biometric verification is performed, and when the biometric verification is passed, the verification procedure is passed. 如請求項1所述的保全系統,其中該待驗證身分資訊為一第一待驗證身分資訊且該驗證程序為一第一驗證程序,該驗證裝置包含一記憶體儲存有多個預存身分資訊,該驗證裝置更用於接收包含一第二待驗證身分資訊的一掛失請求,依據該第二待驗證身分資訊執行一第二驗證程序,且於該第二驗證程序通過時,依據該掛失請求使該些預存身分資訊中的至少一者失效。The security system according to claim 1, wherein the identity information to be verified is a first identity information to be verified and the verification process is a first verification process, and the verification device includes a memory storing a plurality of pre-stored identity information, The verification device is further configured to receive a loss report request that includes a second identity information to be verified, execute a second verification procedure based on the second identity information to be verified, and when the second verification procedure passes, use the loss report request according to the second verification procedure. At least one of the stored identity information is invalid. 如請求項9所述的保全系統,其中該些預存身分資訊包含多個使用者各自的可變更身分資訊及固定身分資訊,該第二驗證程序包含判斷該第二待驗證身分資訊是否符合該些固定身分資訊的其中一者,若是,則該第二驗證程序成功,且該驗證裝置使該第二待驗證身分資訊所對應的該可變更身分資訊失效。For example, the security system according to claim 9, wherein the pre-stored identity information includes the changeable identity information and fixed identity information of a plurality of users, and the second verification procedure includes determining whether the second identity information to be verified conforms to the If one of the fixed identity information is yes, the second verification process is successful, and the verification device invalidates the changeable identity information corresponding to the second to-be-verified identity information.
TW108148414A 2019-12-30 2019-12-30 Security system TWI735121B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW108148414A TWI735121B (en) 2019-12-30 2019-12-30 Security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW108148414A TWI735121B (en) 2019-12-30 2019-12-30 Security system

Publications (2)

Publication Number Publication Date
TW202125456A true TW202125456A (en) 2021-07-01
TWI735121B TWI735121B (en) 2021-08-01

Family

ID=77908514

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108148414A TWI735121B (en) 2019-12-30 2019-12-30 Security system

Country Status (1)

Country Link
TW (1) TWI735121B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11203580A (en) * 1998-01-20 1999-07-30 Matsushita Electric Works Ltd Entrance/exit controller
TWI492191B (en) * 2014-06-13 2015-07-11 Taiwan Secom Co Ltd Security System
TWM501464U (en) * 2015-02-11 2015-05-21 Microprogram Information Co Ltd Access control system
TW201730849A (en) * 2016-02-19 2017-09-01 台灣福興工業股份有限公司 Door access management method and door access management system
EP3533036A4 (en) * 2016-10-28 2020-07-01 Schlage Lock Company LLC Access control system and method using ultrasonic technology

Also Published As

Publication number Publication date
TWI735121B (en) 2021-08-01

Similar Documents

Publication Publication Date Title
US11830306B2 (en) Systems and methods for controlling access to physical space
US10467887B2 (en) Systems and methods of integrating sensor output of a mobile device with a security system
US7856558B2 (en) Biometric verification and duress detection system and method
KR20170060555A (en) Method and system for managing a door entry using beacon signal
KR101765080B1 (en) smart door lock system based on iot and the method thereof
WO2005031672A1 (en) Security management device, security management method, security management program, and computer-readable recording medium
US11961349B1 (en) Biometric authentication for security sensor bypass
WO2020000346A1 (en) Intruder detection method and apparatus
TWI729657B (en) Security system
TWI735121B (en) Security system
JP2011209950A (en) Security gadget
KR101063751B1 (en) Biometrics-based Passenger Identification and Information Transmission System
TWI715391B (en) Security system
JP2019028580A (en) Monitoring system
JP6919763B2 (en) Wireless communication device and entry / exit management system
JP7489641B2 (en) Control system and control method
CA2629271C (en) A biometric verification and duress detection system and method
JP2001344676A (en) Security device and method for setting security mode
TWM520559U (en) Non-contact graphic door lock
KR101081021B1 (en) Security system and the driving method
JP2009271638A (en) Security system, and alarm device and user terminal therefor