TW200926075A - Admitting method for access control, mobile electronic device and access control system using the same - Google Patents

Admitting method for access control, mobile electronic device and access control system using the same Download PDF

Info

Publication number
TW200926075A
TW200926075A TW96147766A TW96147766A TW200926075A TW 200926075 A TW200926075 A TW 200926075A TW 96147766 A TW96147766 A TW 96147766A TW 96147766 A TW96147766 A TW 96147766A TW 200926075 A TW200926075 A TW 200926075A
Authority
TW
Taiwan
Prior art keywords
access control
code
electronic device
time
user
Prior art date
Application number
TW96147766A
Other languages
Chinese (zh)
Other versions
TWI355624B (en
Inventor
Feng-Wei Hsu
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW96147766A priority Critical patent/TWI355624B/en
Publication of TW200926075A publication Critical patent/TW200926075A/en
Application granted granted Critical
Publication of TWI355624B publication Critical patent/TWI355624B/en

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An admitting method for access control, a mobile electronic device and an access control system using the same are provided. The admitting method includes the following steps. At a first time, an area code which indicates an access control system, a user password, an international mobile subscriber identify (IMSI) and the first time are encoded to a middle code by a mobile electronic device. Then, the middle code is converted to a two-dimension barcode. At a second time, the two-dimension barcode is received by an access control system. Next, the two-dimension barcode is converted to a middle code. Then, the middle code is decoded to the area code, the user password, the IMSI and the first time. Afterward, whether the area code, the user password and the IMSI are existed in a database of the access control system is determined. Furthermore, whether the second time is exceeded the first time from a set time is determined.

Description

53PA 200926075 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種門禁管制之認證方法及應用其 之行動電子裝置與門禁系統,且特別是有關於一種使用國 際移動用戶識別碼(International Mobile Subscriber Identify,IMSI)之門禁管制之認證方法及應用其之行動電 子裝置與門禁系統。 © 【先前技術】 傳統的門禁管理都是以磁卡作為識別身份的依據,然 門禁系統的安全管理一直存在著磁卡遭竊或遺失等風 險,如何降低門禁系統的風險是一個值得研究的課題。且 對於使用者而言,一天之中可能會使用到許多門禁系統, 因此,使用者必須帶有好幾張磁卡(比如社區大樓、辦公大 樓、辦公室、工廠、實驗室、以及停車場的門禁卡),如此 已經造成現代人出門的負擔。於是乎,目前實須要一種具 ❹ 低風險且便於使用的門禁系統及其認證方法。 【發明内容】 本發明係有關於一種門禁管制之認證方法及應用其 之行動電子裝置與門禁系統,利用各門禁系統之門禁區域 代號、使用者設定之密碼、國際移動用戶識別碼以及有效 認證的時間性,編製成為門禁密碼,並轉換為二維條碼以 掃描方式傳送至門禁系統,以進行身份認證。藉此,降低 653PA 200926075 IX. Description of the Invention: [Technical Field] The present invention relates to an authentication method for access control and a mobile electronic device and an access control system using the same, and in particular to an international mobile subscriber identity (International) Mobile Subscriber Identify (IMSI) is an authentication method for access control and its mobile electronic device and access control system. © [Prior Art] Traditional access control management uses magnetic cards as the basis for identification. However, the security management of access control systems has always been the risk of theft or loss of magnetic cards. How to reduce the risk of access control systems is a subject worth studying. And for the user, many access control systems may be used during the day. Therefore, the user must have several magnetic cards (such as community buildings, office buildings, offices, factories, laboratories, and access cards for parking lots). This has caused the burden of modern people going out. As a result, there is a need for a low-risk and easy-to-use access control system and its authentication method. SUMMARY OF THE INVENTION The present invention relates to an authentication method for access control and a mobile electronic device and an access control system using the same, using an access control area code of each access control system, a password set by a user, an international mobile subscriber identification code, and an effective authentication. Temporality, compiled into an access code, and converted to a two-dimensional bar code is scanned and transmitted to the access control system for identity authentication. By this, lowering 6

53PA 200926075 門禁密碼遭竊及盜用的風險,以大大地提高了門禁管制的 安全性。並且,藉由不同的門禁區域代號設定,且與行動 電話或個人行動助理整合,使用者將不再須要攜帶許多門 禁卡出門,以降低使用者負擔。 本發明提出一種門禁管制之認證方法,包括下列步 驟。在一第一時間,以一行動電子裝置編製一門禁區域代 號、一使用者密碼、一國際移動用戶識別碼及第一時間成 為一中間碼。以行動電子裝置轉換中間碼成為一二維條 ❹ 碼。在一第二時間,以一門禁系統取得二維條碼。以門禁 系統轉換二維條碼成為中間碼。以門禁系統解譯中間碼成 為門禁區域代號、使用者密碼、國際移動用戶識別碼及第 一時間。判斷門禁區域代號、使用者密碼及國際移動用戶 識別碼是否存在於一門禁系統資料庫中。判斷第一時間與 第二時間之差距是否超過一預定時間。當門禁區域代號、 使用者密碼及國際移動用戶識別碼不存在於門禁系統資 料庫中,或第一時間與第二時間之差距超過一預定時間 ® 時,則鎖住電子鎖,以禁止持有行動電子裝置之一使用者 通行。 本發明提出一種行動電子裝置,包括一編碼單元、一 轉碼單元及一螢幕。編碼單元用以在一第一時間編製一門 禁區域代號、一使用者密碼、一國際移動用戶識別碼及第 一時間成為一中間碼。轉碼单元用以轉換中間碼成為一二 維條碼。螢幕用以顯示二維條碼,以提供一門禁系統進行53PA 200926075 The risk of theft and misappropriation of access codes has greatly increased the security of access control. Moreover, by setting different access control area codes and integrating with mobile phones or personal mobile assistants, users no longer need to carry many access cards to go out to reduce the burden on users. The present invention proposes an authentication method for access control, including the following steps. At a first time, an access control area code, a user password, an international mobile subscriber identity code, and a first time are used as an intermediate code by a mobile electronic device. The mobile electronic device converts the intermediate code into a two-dimensional bar code. In a second time, a two-dimensional bar code is obtained with an access control system. The two-dimensional bar code is converted into an intermediate code by the access control system. The intermediate code is interpreted by the access control system as the access control area code, the user password, the international mobile subscriber identity code, and the first time. Determine whether the access control area code, user password, and international mobile user ID are stored in an access control database. It is judged whether the difference between the first time and the second time exceeds a predetermined time. When the access control area code, user password and international mobile subscriber ID do not exist in the access control database, or the difference between the first time and the second time exceeds a predetermined time®, the electronic lock is locked to prohibit holding One of the mobile electronic devices is accessible to the user. The invention provides a mobile electronic device comprising a coding unit, a transcoding unit and a screen. The coding unit is configured to generate a banned area code, a user password, an international mobile subscriber identity code, and the first time into an intermediate code at a first time. The transcoding unit is used to convert the intermediate code into a two-dimensional barcode. The screen is used to display 2D barcodes to provide an access control system.

53PA 200926075 本發明提出一種門禁系統,包括一電子鎖、一掃描模 組、一轉碼單元、一解碼單元、一門禁系統資料庫、一第 一判斷單元、一第二判斷單元及一控制單元。掃描模組用 以在一第二時間掃描一行動電子裝置所顯示之一二維條 碼。轉碼單元用以轉換二維條碼成為一中間碼。解碼单元 用以解譯中間碼成為一門禁區域代號、一使用者密碼、一 國際移動用戶識別碼及一第一時間。門禁系統資料庫用以 儲存一門禁區域代號及複數個使用者密碼及複數個國際 Ο 移動用戶識別碼。第一判斷單元用以判斷門禁區域代號、 使用者密碼及國際移動用戶識別碼是否存在於門禁系統 資料庫。第二判斷單元用以判斷第一時間與第二時間之差 距是否超過一預定時間。當第一判斷單元判斷門禁區域代 號、使用者密碼及國際移動用戶識別碼不存在於門禁系統 資料庫中,或第二判斷單元判斷第一時間與第二時間之差 距超過一預定時間時,控制單元鎖住電子鎖,以禁止持有 行動電子裝置之使用者通行。 β 為讓本發明之上述内容能更明顯易懂,下文特舉一較 佳實施例,並配合所附圖式,作詳細說明如下: 【實施方式】 本發明較佳之實施例係提出一種門禁管制之認證方 法與應用其之行動電子裝置與門禁系統。於此提出之門禁 管制之認證方法,係由一使用者持有一行動電子裝置與一 門禁系統進行身份認證。 853PA 200926075 The present invention provides an access control system comprising an electronic lock, a scan module, a transcoding unit, a decoding unit, an access control system database, a first determining unit, a second determining unit and a control unit. The scanning module is configured to scan a two-dimensional barcode displayed by a mobile electronic device at a second time. The transcoding unit is configured to convert the two-dimensional barcode into an intermediate code. The decoding unit is configured to interpret the intermediate code into an access area code, a user password, an international mobile subscriber identity code, and a first time. The access control system database is used to store an access area code and a plurality of user passwords and a plurality of international Ο mobile subscriber identifiers. The first determining unit is configured to determine whether the access control area code, the user password, and the international mobile subscriber identity code are present in the access control system database. The second determining unit is configured to determine whether the difference between the first time and the second time exceeds a predetermined time. When the first determining unit determines that the access control area code, the user password, and the international mobile subscriber identity code do not exist in the access control system database, or the second determining unit determines that the difference between the first time and the second time exceeds a predetermined time, the control The unit locks the electronic lock to prohibit access by the user holding the mobile electronic device. In order to make the above-mentioned contents of the present invention more comprehensible, a preferred embodiment will be described below in conjunction with the accompanying drawings, and the following detailed description is made as follows: [Embodiment] A preferred embodiment of the present invention provides a control of access control. The authentication method and the mobile electronic device and the access control system using the same. The authentication method for the access control proposed herein is that a user holds a mobile electronic device and an access control system for identity authentication. 8

200926075 3PA 請參照第i圖’其繪示依照本發明較佳實施例之行動 電子裝置與門禁系統的功能方塊圖。如第1圖所示,行動 電子裝置100包括一編輯單元110、一編碼單元12〇、— 轉碼單元130及一螢幕140。編輯單元11〇用以提供使用 者輸入門禁區域代说及使用者禮、碼。編石馬單元用以在 一第一時間編製一門禁區域代號、一使用者密碼、一國際 移動用戶識別碼及第一時間成為一中間碼C1。轉碼單二 I30用以轉換中間碼C1成為一二維條碼C2。螢幕14〇用 ® W顯示二維條碼C2’以提供—門禁系統2⑽進行掃描。 門7κ系統200包括一婦描模組21 〇、—轉碼單元220、 解碼早元23G、-第-判斷單元240、―門禁系統資料 242 一第二判斷單元250、一控制單元260及一電子 鎖27〇。掃描模組210用以在一第二時間掃描行動電子裝 ^丄00所顯示之二維條碼C2。轉碼單元220用以轉換二維 馬C2成為中間碼C1。解碼單元23〇用以解譯中間碼 . 及為門5^區域代號、使用者密碼、國際移動用戶識別碼 妒夕寺間。門禁系統資料庫242用以儲存一門禁區域代 斷^個使用者密瑪及多個國際移動用戶識別碼。第一判 單元=240用以判斷門禁區域代號、使用者密碼及國際移 m用戶識別碼是否存在於門禁系統資料庫242。第二判斷 單,^5〇用以判斷第一時間與第二時間之差距是否超過一 =定日守間。控制單元26〇用以鎖住或解開電子鎖270,以 布止或允許持有行動電子裝置100之使用者通行。 "月參照第2圖,其繪示依照本發明較佳實施例之門禁 9200926075 3PA Referring to Figure i, a functional block diagram of a mobile electronic device and an access control system in accordance with a preferred embodiment of the present invention is shown. As shown in FIG. 1, the mobile electronic device 100 includes an editing unit 110, an encoding unit 12A, a transcoding unit 130, and a screen 140. The editing unit 11 is configured to provide the user with the input access control area and the user's gift code. The stone unit is used to prepare an access area code, a user password, an international mobile subscriber identity code and a first time to become an intermediate code C1 at a first time. Transcoding single two I30 is used to convert the intermediate code C1 into a two-dimensional barcode C2. The screen 14 uses the ® W to display the 2D barcode C2' to provide the access control system 2 (10) for scanning. The door 7κ system 200 includes a gestation module 21 〇, a transcoding unit 220, a decoding early element 23G, a -th determination unit 240, an access control system data 242, a second determination unit 250, a control unit 260, and an electronic device. Lock 27〇. The scanning module 210 is configured to scan the two-dimensional barcode C2 displayed by the mobile electronic device 00 at a second time. The transcoding unit 220 is configured to convert the two-dimensional horse C2 into the intermediate code C1. The decoding unit 23 is used to interpret the intermediate code. The gate code is the area code, the user password, and the international mobile subscriber identity code. The access control system database 242 is used to store an access control area to generate a user MM and a plurality of international mobile subscriber identification codes. The first decision unit = 240 is used to determine whether the access control area code, the user password, and the international mobile user ID are present in the access control system database 242. The second judgment is single, ^5〇 is used to judge whether the difference between the first time and the second time exceeds one = fixed day. The control unit 26 is configured to lock or unlock the electronic lock 270 to circumvent or permit the user holding the mobile electronic device 100 to pass. "Monthly with reference to Figure 2, which shows an access control in accordance with a preferred embodiment of the present invention 9

200926075 53PA 管制之認證方法的流程圖。首先’如步驟si所示,透過 行動電子裝置100之編輯單元110輸入門禁區域代號及使 用者密碼。 然後,如步驟S2所示,在第一時間,以行動電子裝 置100之編碼單元120編製門禁區域代號、使用者密碼、 國際移動用戶識別碼及第一時間成為中間碼C1。 在步驟S2中,門禁區域代號係一門禁系統之特定的 代號。因此,不同的門禁系統係具有不同的門禁區域代200926075 53PA Flow chart of the authentication method for regulation. First, as shown in step si, the access area code and the user password are input through the editing unit 110 of the mobile electronic device 100. Then, as shown in step S2, at the first time, the coding unit 120 of the mobile electronic device 100 compiles the access control area code, the user password, the international mobile subscriber identity code, and the first time into the intermediate code C1. In step S2, the access control area code is a specific code of an access control system. Therefore, different access control systems have different access control areas.

號,例如社區大樓、辦公室或實驗室等門禁系統皆具有各 自的門禁區域代號。使用者密碼為使用者與某一門禁系統 之間所設定之密碼。國際移動用戶識別碼係儲存在行動電 子裝置之一用戶識別卡(Subscriber Identity Module,SIM) 中的個人識别碼,此國際移動用戶識別瑪具有唯一性。因 此,可藉由辨識此國際移動用戶識別碼來認證使用者的身 份。另外’於編製此中間碼時,因加入了第一時間(此第一 時間即為編製中間碼的現在時間,例如是某月某日某時某 分)’使中間碼具有時間性。因此,若於編製之後超過了一 預定時間,此中間碼就會失去認證效用,以防止 複製後被重覆地使用盜用。 ^ 接者,如步驟S3所示,由行動電子裝置1〇〇之 單元130轉換中_ C1成為二維—e2,並且顯示此二 維條碼C2於行動電子裝置100之螢幕140。 在乂驟S3中,二維條碼C2較佳地係選用快速反庫 ^MQuickResP〇nseC〇de,QRc〇de)〇^QRc〇d^^Access codes such as community buildings, offices, or laboratories all have their own access control area codes. The user password is the password set between the user and an access control system. The International Mobile Subscriber Identity is a personal identification number stored in a Subscriber Identity Module (SIM) of the mobile electronic device. This international mobile subscriber identity is unique. Therefore, the identity of the user can be authenticated by identifying the international mobile subscriber identity. In addition, when the intermediate code is compiled, the intermediate code is made temporal because the first time (this first time is the current time for compiling the intermediate code, for example, a certain point on a certain day of the month) is added. Therefore, if it exceeds a predetermined time after compilation, the intermediate code will lose its authentication effect to prevent repeated use of theft after copying. As shown in step S3, the unit 130 of the mobile electronic device 1 converts _C1 into two-dimensional-e2, and displays the two-dimensional barcode C2 on the screen 140 of the mobile electronic device 100. In step S3, the two-dimensional barcode C2 is preferably a fast anti-library ^MQuickResP〇nseC〇de, QRc〇de)〇^QRc〇d^^

;3PA 200926075 行動電話較廣為使用的一種二維條碼’且QR code可以容 納數千字元。因此,在轉換中間碼Cl成為二維條碼C2 時,亦可同時將文字訊息一起轉換成為二維條碼C2。當使 用者欲加入一文字訊息時,則轉碼單元130轉換中間碼C1 及此文字訊息成為二維條碼C2。 然後,如步驟S4所示,在第二時間,門禁系統200 之掃描模組210以掃描方式取得此二維條碼C2。 接著,如步驟S5所示,門禁系統200之轉碼單元220 _ 轉換二維條碼C2成為中間碼C1。 在步驟S5中,當此二維條碼C2更包含文字訊息時, 則轉碼單元220轉換二維條碼C2成為中間碼C1及文字訊 息,並傳送此文字訊息至一主機(未繪示),以儲存此文字 訊息。 然後,如步驟S6所示,門禁系統200之解碼單元230 解譯中間碼C1成為門禁區域代號、使用者密碼、國際移 動用戶識別碼及第一時間。 ❿ 接著,如步驟S7所示,第一判斷單元240判斷門禁 區域代號、使用者密碼及國際移動用戶識別碼是否存在於 門禁系統資料庫242中。 然後,如步驟S8所示,第二判斷單元250判斷第一 時間與第二時間之差距是否超過一預定時間。 在步驟S7及S8中,當第一判斷單元240判斷門禁區 域代號、使用者密碼及國際移動用戶識別碼不存在於門禁 系統資料庫242中,或第二判斷單元250判斷第一時間與3PA 200926075 A two-dimensional bar code that is widely used by mobile phones' and QR code can accommodate thousands of characters. Therefore, when the conversion intermediate code C1 becomes the two-dimensional barcode C2, the text message can be simultaneously converted into the two-dimensional barcode C2. When the user wants to add a text message, the transcoding unit 130 converts the intermediate code C1 and the text message into a two-dimensional bar code C2. Then, as shown in step S4, at a second time, the scanning module 210 of the access control system 200 acquires the two-dimensional barcode C2 in a scanning manner. Next, as shown in step S5, the transcoding unit 220_ of the access control system 200 converts the two-dimensional barcode C2 into the intermediate code C1. In step S5, when the two-dimensional barcode C2 further includes a text message, the transcoding unit 220 converts the two-dimensional barcode C2 into the intermediate code C1 and the text message, and transmits the text message to a host (not shown) to Save this text message. Then, as shown in step S6, the decoding unit 230 of the access control system 200 interprets the intermediate code C1 as the access control area code, the user password, the international mobile subscriber identification code, and the first time. Then, as shown in step S7, the first determining unit 240 determines whether the access control area code, the user password, and the international mobile subscriber identity code are present in the access control system database 242. Then, as shown in step S8, the second determining unit 250 determines whether the difference between the first time and the second time exceeds a predetermined time. In steps S7 and S8, when the first determining unit 240 determines that the access control area code, the user password, and the international mobile subscriber identity code are not present in the access control system database 242, or the second determining unit 250 determines the first time and

53PA 200926075 第二時間之差距超過一預定時間時,則進入步驟S9。 接著,如步驟S9所示,由控制單元260鎖住電子鎖 270,以禁止持有此行動電子裝置100之使用者通行。 在步驟S7及S8中,當第一判斷單元240判斷門禁區 域代號、使用者密碼及國際移動用戶識別碼存在於門禁系 統資料庫242中,且第二判斷單元250判斷第一時間與第 二時間之差距未超過一預定時間時,則進入步驟S10。 接著,如步驟S10所示,由控制單元260解開電子鎖 ❹ 270,以允許持有此行動電子裝置100之使用者通行。 此外,對於經常進出或是安全性要求不高的區域,比 如辦公室、停車場等等。在步驟S1中,使用者除了可以 透過編輯單元110輸入門禁區域代號及使用者密碼之外, 亦可以藉由選擇的方式選擇門禁區域代號,以取代手動輸 入的步驟,藉以節省大量的時間。請參照第3圖,其繪示 整合行動電子裝置資料庫之行動電子裝置的功能方塊 圖。以第3圖相較於第1圖之下,行動電子裝置300更包 ® 括一行動電子裝置資料庫112、一選擇單元114及一讀取 單元116。行動電子裝置資料庫112用以儲存多個門禁區 域代號及多個使用者密碼。選擇單元114用以提供使用者 選擇此些門禁區域代號其中之一。讀取單元116依據門禁 區域代號,從行動電子裝置資料庫112讀取對應之使用者 密碼。因此,在步驟S1中,使用者亦可以透過行動電子 裝置資料庫112所提供之門禁區域代號進行選擇。藉此, 編碼單元120就會透過選擇單元114取得使用者選擇之門 1253PA 200926075 When the difference between the second time exceeds a predetermined time, the process proceeds to step S9. Next, as shown in step S9, the electronic lock 270 is locked by the control unit 260 to prohibit the user holding the mobile electronic device 100 from passing. In steps S7 and S8, the first determining unit 240 determines that the access control area code, the user password, and the international mobile subscriber identity code are present in the access control system database 242, and the second determining unit 250 determines the first time and the second time. If the difference does not exceed a predetermined time, the process proceeds to step S10. Next, as shown in step S10, the electronic lock 270 is unlocked by the control unit 260 to allow the user holding the mobile electronic device 100 to pass. In addition, for areas that are frequently in and out or where security is not critical, such as offices, parking lots, etc. In step S1, in addition to the entry of the access area code and the user password through the editing unit 110, the user can also select the access area code by selecting a method instead of the manual input step, thereby saving a lot of time. Please refer to FIG. 3, which is a functional block diagram of the mobile electronic device integrated with the mobile electronic device database. In the third embodiment, the mobile electronic device 300 further includes a mobile electronic device database 112, a selection unit 114 and a reading unit 116. The mobile electronic device database 112 is used to store a plurality of access control area codes and a plurality of user passwords. The selecting unit 114 is configured to provide a user to select one of the access control area codes. The reading unit 116 reads the corresponding user password from the mobile electronic device database 112 according to the access control area code. Therefore, in step S1, the user can also select through the access control area code provided by the mobile electronic device database 112. Thereby, the encoding unit 120 obtains the user-selected door through the selection unit 114.

3PA 200926075 禁區域代號,並透過讀取單元116自動取得使用者密碼。 再者,若行動電子裝置更整合了全球定位系統,行動 電子裝置更可以透過全球定位系統定位其所在之地理位 置,藉以自動取得門禁區域代號。請參照第4圖,其繪示 整合全球定位系統之行動電子裝置的功能方塊圖。以第4 圖相較於第3圖之下,行動電子裝置400更包括一全球定 位系統118。全球定位系統118用以定位行動電子裝置400 所在之一地理位置,並依據此地理位置,從行動電子裝置 ❹ 資料庫112讀取對應之門禁區域代號。因此,在步驟S1 中,使用者亦可以設定行動電子裝置400透過全球定位系 統118定位其所在之地理位置,以讀取對應之門禁區域代 號。藉此,編碼單元120就會透過全球定位系統118自動 取得門禁區域代號,並透過讀取單元116自動取得使用者 密碼。 本發明上述實施例所揭露之門禁管制之認證方法與 應用其之行動電子裝置與門禁系統。利用每一門禁系統具 ® 有的特定代號(門禁區域代號)、使用者與各門禁系統之間 所設定之密碼(使用者密碼)、用戶識別卡中的個人識别碼 (國際移動用戶識別碼)具有的唯一性、以及有效認證的時 間性,編製成為門禁密碼(中間碼),並轉換為二維條碼以 掃描方式傳送至門禁系統,以進行身份認證。於是,藉由 使用者設定之密碼’可避免行動電子裝置遭竊後,造成安 全管理的風險。國際移動用戶識別碼,可以準確地識別使 用者的身份。認證效用的時間性,可避免門禁密碼遭盜用 133PA 200926075 disables the area code and automatically obtains the user password through the reading unit 116. Furthermore, if the mobile electronic device is more integrated with the global positioning system, the mobile electronic device can locate the geographical location of the mobile electronic device through the global positioning system, thereby automatically obtaining the access control area code. Please refer to FIG. 4, which is a functional block diagram of a mobile electronic device integrated with a global positioning system. In contrast to FIG. 4, in contrast to FIG. 3, the mobile electronic device 400 further includes a global positioning system 118. The global positioning system 118 is used to locate a geographic location of the mobile electronic device 400, and according to the geographic location, the corresponding access control area code is read from the mobile electronic device ❹ database 112. Therefore, in step S1, the user can also set the mobile electronic device 400 to locate the geographical location of the mobile electronic device 400 through the global positioning system 118 to read the corresponding access control area code. Thereby, the encoding unit 120 automatically acquires the access control area code through the global positioning system 118, and automatically obtains the user password through the reading unit 116. The authentication method for the access control disclosed in the above embodiments of the present invention and the mobile electronic device and the access control system using the same. Use the specific code (access area code) of each access control system, the password (user password) set between the user and each access control system, and the personal identification number (International Mobile Subscriber ID) in the user identification card. The uniqueness and timeliness of effective authentication are compiled into an access code (intermediate code) and converted into a two-dimensional bar code and transmitted to the access control system in a scanning manner for identity authentication. Therefore, the password set by the user can avoid the risk of security management after the mobile electronic device is stolen. The International Mobile Subscriber Identity identifies the identity of the user. Timeliness of authentication utility to avoid theft of access codes 13

200926075 53 PA 或複製的風險。藉此,以大大地提高了門禁管制的安全 性。並且,藉由不同的門禁區域代號設定,且與行動電話 或個人行動助理整合,使用者將不再須要攜帶許多門禁卡 出門,以降低使用者負擔。 綜上所述,雖然本發明已以一較佳實施例揭露如上, 然其並非用以限定本發明。本發明所屬技術領域中具有通 常知識者,在不脫離本發明之精神和範圍内,當可作各種 之更動與潤飾。因此,本發明之保護範圍當視後附之申請 φ 專利範圍所界定者為準。200926075 53 Risk of PA or copying. Thereby, the safety of access control is greatly improved. Moreover, by setting different access control area codes and integrating with mobile phones or personal mobile assistants, users no longer need to carry many access cards to go out to reduce the burden on users. In view of the above, the present invention has been disclosed in a preferred embodiment, and is not intended to limit the present invention. It will be apparent to those skilled in the art that various changes and modifications can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is defined by the scope of the appended claims.

1414

SPA 200926075 【圖式簡單說明】 第1圖繪示依照本發明較佳實施例之行動電子裝置 與門禁系統的功能方塊圖。 第2圖繪示依照本發明較佳實施例之門禁管制之認 證方法的流程圖。 第3圖繪示整合行動電子裝置資料庫之行動電子裝 置的功能方塊圖。 第4圖繪示整合全球定位系統之行動電子裝置的功 ❹ 能方塊圖。 【主要元件符號說明】 100、300、400 :行動電子裝置 110 :編輯單元 114 :選擇單元 112 :行動電子裝置資料庫 116 :讀取單元SPA 200926075 [Simplified Schematic] FIG. 1 is a functional block diagram of a mobile electronic device and an access control system in accordance with a preferred embodiment of the present invention. Figure 2 is a flow chart showing the authentication method of the access control according to the preferred embodiment of the present invention. Figure 3 is a functional block diagram of the mobile electronic device incorporating the mobile electronic device database. Figure 4 is a block diagram showing the power of the mobile electronic device integrated with the global positioning system. [Main component symbol description] 100, 300, 400: mobile electronic device 110: editing unit 114: selection unit 112: mobile electronic device database 116: reading unit

118 :全球定位系統 120 :編碼單元 130、220 :轉碼單元 140 :螢幕 200 :門禁系統 210 :掃描模組 230 :解碼單元 240 :第一判斷單元 15118: Global Positioning System 120: Coding unit 130, 220: Transcoding unit 140: Screen 200: Access control system 210: Scanning module 230: Decoding unit 240: First judging unit 15

53PA 200926075 242 :門禁系統資料庫 250 :第二判斷單元 260 :控制單元 270 :電子鎖 C1 :中間碼 C2 :二維條碼 ❹53PA 200926075 242 : Access Control System Library 250 : Second Judgment Unit 260 : Control Unit 270 : Electronic Lock C1 : Intermediate Code C2 : 2D Bar Code ❹

1616

Claims (1)

200926075 53PA 十、申請專利範圍: 1. 一種門禁管制之認證方法,包括: (a) 在一第一時間,以一行動電子裝置編製一門禁 區域代號、一使用者密碼、一國際移動用戶識Μ % (International Mobile Subscriber Identify » IMSI)及診 _ 一時間成為一中間碼; (b) 以該行動電子裝置轉換該中間碼成為一二維$ 碼(Two-dimension Barcode); ❿ (c)在一第二時間,以一門禁系統取得該二維條碼; (d)以該門禁系統轉換該二維條碼成為該中間碼; (e )以該門禁系統解譯該中間碼成為該門禁區域代 號、該使用者密碼、該國際移動用戶識別碼及該第一時間; (f) 判斷該門禁區域代號、該使用者密碼及該國際 移動用戶識別碼是否存在於一門禁系統資料庫中; (g) 判斷該第一時間與該第二時間之差距是否超過 一預定時間;以及 ❹ (h)當該門禁區域代號、該使用者密碼及該國際移 動用戶識別碼不存在於該門禁系統資料庫中,或該第一時 間與該第二時間之差距超過一預定時間時,則鎖住一電子 鎖,以禁止持有該行動電子裝好〆使用者通仃。. 2. 如申請專利範圍第1項所述之為也方法’更包括 ⑴當該門禁區域代號、该像用者密碼及該國際二 動用戶識別碼存在於該門禁系統資料庫中’且該第一時= 與該第二時間之差距未超過一預定時間時,則解開該電 17 53PA 200926075 鎖,以允許持有該行動電子裝置之該使用者通行。 3. 如申請專利範圍第1項所述之認證方法,其中在 該步驟(b)及該步驟(c)之間,該認證方法更包括: (j)該行動電子裝置顯示該二維條碼於一螢幕;且 在該步驟(c )中,該門禁系統以掃描方式取得該二維條 碼。 4. 如申請專利範圍第1項所述之認證方法,其中該 步驟(a)更包括: ⑩ (al)提供一編輯單元,以供該使用者輸入該門禁區 域代號及該使用者密碼。 5. 如申請專利範圍第1項所述之認證方法,其中該 步驟(a)更包括: (a2)提供複數個門禁區域代號,以供該使用者選 擇;以及 (a3)依據該門禁區域代號,自動讀取對應之該使用 者密碼。 ❿ 6.如申請專利範圍第1項所述之認證方法,其中該 步驟(a)更包括: (a4)以一全球定位系統,定位該行動電子裝置所在 之一地理位置; (a5)依據該地理位置,讀取對應之該門禁區域代 號;以及 (a6)依據該門禁區域代號,自動讀取對應之該使用 者密碼。 18 ;3PA 200926075 7. 如申請專利範圍第1項所述之認證方法,其中該 步驟(b)更包括: (Μ)轉換該中間碼及一文字訊息成為該二維條碼。 8. 如申請專利範圍第7項所述之認證方法,其中該 步驟(d)更包括: (dl)轉換該二維條碼成為該中間碼及該文字訊息; 以及 (d2)儲存該文字訊息。 ⑩ 9. 一種行動電子裝置,包括: 一編碼單元,用以在一第一時間編製一門禁區域代 號、一使用者密碼、一國際移動用戶識別碼及該第一時間 成為一中間碼; 一轉碼單元,用以轉換該中間碼成為一二維條碼;以 及 一螢幕,用以顯示該二維條碼,以提供一門禁系統進 行掃描。 © 10.如申請專利範圍第9項所述之行動電子裝置,更 包括: 一編輯單元,用以提供一使用者輸入該門禁區域代號 及該使用者密碼; 其中,該編碼單元透過該編輯單元取得該使用者輸入 之該門禁區域代號及該使用者密碼。 11.如申請專利範圍第9項所述之行動電子裝置,更 包括: 19 200926075 53PA ' 一行動電子裝置資料庫,用以儲存複數個門禁區域代 號及複數個使用者密碼; 一選擇單元,用以提供一使用者選擇該些門禁區域代 號其中之一;以及 一讀取單元,依據該門禁區域代號,從該行動電子裝 置資料庫讀取對應之該使用者密碼; 其中,該編碼單元透過選擇單元取得該使用者選擇之 該門禁區域代號,並透過該讀取單元自動取得該使用者密 ❹ 碼。 12. 如申請專利範圍第11項所述之行動電子裝置, 更包括: 一全球定位系統,用以定位該行動電子裝置所在之一 地理位置,並依據該地理位置,從該行動電子裝置資料庫 讀取對應之該門禁區域代號; 其中,當該行動電子裝置透過該全球定位系統定位其 所在之該地理位置時,該編碼單元透過該全球定位系統自 _ 動取得該門禁區域代號,並透過該讀取單元自動取得該使 用者密碼。 13. 如申請專利範圍第8項所述之行動電子裝置,其 中該轉碼單元更用以轉換該中間碼及一文字訊息成為該 二維條碼。 14. 一種門禁系統,包括: 一電子鎖; 一掃描模組,用以在一第二時間掃描一行動電子裝置 20 200926075 3pa 所顯示之一二維條碼; 一轉碼單元,用以轉換該二維條碼成為一中間碼; 一解碼單元,用以解譯該中間碼成為一門禁區域代 號、一使用者密碼、一國際移動用戶識別碼及一第一時間; 一門禁系統資料庫,用以儲存一門禁區域代號及複數 個使用者密碼及複數個國際移動用戶識別碼; 一第一判斷單元,用以判斷該門禁區域代號、該使用 者密碼及該國際移動用戶識別碼是否存在於該門禁系統 〇 資料庫; 一第二判斷單元,用以判斷該第一時間與該第二時間 之差距是否超過一預定時間;以及 一控制單元,當該第一判斷單元判斷該門禁區域代 號、該使用者密碼及該國際移動用戶識別碼不存在於該門 禁系統資料庫中,或該第二判斷單元判斷該第一時間與該 第二時間之差距超過一預定時間時,該控制單元鎖住該電 子鎖,以禁止持有該行動電子裝置之該使用者通行。 ❹ 15.如申請專利範圍第14項所述之門禁系統,其中 當該門禁區域代號、該使用者密碼及該國際移動用戶識別 碼存在於該門禁系統資料庫中,且該第一時間與該第二時 間之差距未超過一預定時間時,該控制單元解開該電子 鎖,以允許持有該行動電子裝置之該使用者通行。 16.如申請專利範圍第14項所述之門禁系統,其中 該轉碼單元更用以轉換該二維條碼成為該中間碼及一文 字訊息,並傳送該文字訊息至一主機。 21200926075 53PA X. Patent application scope: 1. An authentication method for access control, including: (a) Preparing an access control area code, a user password, and an international mobile user identification by a mobile electronic device at a first time. % (International Mobile Subscriber Identify » IMSI) and diagnosis _ one time becomes an intermediate code; (b) converts the intermediate code into a two-dimensional code (Two-dimension Barcode) by the mobile electronic device; ❿ (c) in one The second time, the two-dimensional barcode is obtained by an access control system; (d) converting the two-dimensional barcode into the intermediate code by using the access control system; (e) interpreting the intermediate code by the access control system to become the access control area code, User password, the international mobile subscriber identity code and the first time; (f) determining whether the access control area code, the user password and the international mobile subscriber identity code are present in an access control system database; (g) determining Whether the difference between the first time and the second time exceeds a predetermined time; and ❹ (h) when the access area code, the user password, and the international mobile user If the code does not exist in the access control database, or the difference between the first time and the second time exceeds a predetermined time, an electronic lock is locked to prohibit the electronic device from being held. Hey. 2. The method of claim 1 further includes (1) when the access control area code, the user password and the international second user identification code are present in the access control database database and the The first time = when the difference from the second time does not exceed a predetermined time, the power 17 53PA 200926075 lock is unlocked to allow the user holding the mobile electronic device to pass. 3. The authentication method of claim 1, wherein between the step (b) and the step (c), the authentication method further comprises: (j) the mobile electronic device displaying the two-dimensional barcode a screen; and in the step (c), the access control system acquires the two-dimensional barcode in a scanning manner. 4. The authentication method of claim 1, wherein the step (a) further comprises: 10 (al) providing an editing unit for the user to input the access area code and the user password. 5. The authentication method of claim 1, wherein the step (a) further comprises: (a2) providing a plurality of access control area codes for selection by the user; and (a3) according to the access control area code , the corresponding user password is automatically read. ❿ 6. The authentication method of claim 1, wherein the step (a) further comprises: (a4) locating a geographic location of the mobile electronic device in a global positioning system; (a5) according to the The geographic location reads the corresponding access area code; and (a6) automatically reads the corresponding user password according to the access area code. 18; 3PA 200926075 7. The authentication method according to claim 1, wherein the step (b) further comprises: (Μ) converting the intermediate code and a text message into the two-dimensional barcode. 8. The authentication method of claim 7, wherein the step (d) further comprises: (dl) converting the two-dimensional barcode into the intermediate code and the text message; and (d2) storing the text message. 10 9. A mobile electronic device, comprising: a coding unit, configured to generate an access control area code, a user password, an international mobile subscriber identity code, and the first time into an intermediate code at a first time; a code unit for converting the intermediate code into a two-dimensional barcode; and a screen for displaying the two-dimensional barcode to provide an access control system for scanning. 10. The mobile electronic device of claim 9, further comprising: an editing unit for providing a user to input the access control area code and the user password; wherein the coding unit passes the editing unit Obtaining the access control area code entered by the user and the user password. 11. The mobile electronic device as claimed in claim 9, further comprising: 19 200926075 53PA 'a mobile electronic device database for storing a plurality of access control area codes and a plurality of user passwords; Providing a user to select one of the access control area codes; and a reading unit, according to the access control area code, reading the corresponding user password from the mobile electronic device database; wherein the coding unit selects The unit obtains the access control area code selected by the user, and automatically obtains the user password by using the reading unit. 12. The mobile electronic device of claim 11, further comprising: a global positioning system for locating a geographic location of the mobile electronic device, and according to the geographic location, the mobile electronic device database Reading the corresponding access control area code; wherein, when the mobile electronic device locates the geographical location where the mobile electronic device is located, the coding unit obtains the access control area code through the global positioning system, and transmits the access control area code through the global positioning system The reading unit automatically obtains the user password. 13. The mobile electronic device of claim 8, wherein the transcoding unit is further configured to convert the intermediate code and a text message into the two-dimensional barcode. An access control system, comprising: an electronic lock; a scanning module for scanning a two-dimensional barcode displayed by a mobile electronic device 20 200926075 3pa at a second time; a transcoding unit for converting the two The dimension bar code becomes an intermediate code; a decoding unit is configured to interpret the intermediate code into an access control area code, a user password, an international mobile subscriber identity code, and a first time; an access control system database for storing a access area code and a plurality of user passwords and a plurality of international mobile subscriber identifiers; a first determining unit, configured to determine whether the access area code, the user password and the international mobile subscriber identity are present in the access control system a second determining unit, configured to determine whether the difference between the first time and the second time exceeds a predetermined time; and a control unit, when the first determining unit determines the access area code, the user The password and the international mobile subscriber identity code are not present in the access control system database, or the second determining unit determines the For a time the gap between the second time exceeds a predetermined time, the control unit lock the electronic lock to disable the user holds the mobile electronic device access. ❹ 15. The access control system of claim 14, wherein the access control area code, the user password, and the international mobile subscriber identity code are present in the access control database, and the first time and the When the difference in the second time does not exceed a predetermined time, the control unit unlocks the electronic lock to allow the user holding the mobile electronic device to pass. 16. The access control system of claim 14, wherein the transcoding unit is further configured to convert the two-dimensional barcode into the intermediate code and a text message, and transmit the text message to a host. twenty one
TW96147766A 2007-12-13 2007-12-13 Admitting method for access control, mobile electr TWI355624B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96147766A TWI355624B (en) 2007-12-13 2007-12-13 Admitting method for access control, mobile electr

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96147766A TWI355624B (en) 2007-12-13 2007-12-13 Admitting method for access control, mobile electr

Publications (2)

Publication Number Publication Date
TW200926075A true TW200926075A (en) 2009-06-16
TWI355624B TWI355624B (en) 2012-01-01

Family

ID=44729598

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96147766A TWI355624B (en) 2007-12-13 2007-12-13 Admitting method for access control, mobile electr

Country Status (1)

Country Link
TW (1) TWI355624B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2674901A1 (en) * 2012-05-17 2013-12-18 Yankey Information Co., Ltd. Active barcode authentication system and authentication method thereof
CN103475623A (en) * 2012-06-06 2013-12-25 朱俊宇 Dynamic barcode certification system and its certification method
TWI462049B (en) * 2010-11-23 2014-11-21 Echostar Technologies Llc Facilitating user support of electronic devices using dynamic matrix code generation
US8931031B2 (en) 2011-02-24 2015-01-06 Echostar Technologies L.L.C. Matrix code-based accessibility
US9092830B2 (en) 2011-01-07 2015-07-28 Echostar Technologies L.L.C. Performing social networking functions using matrix codes
US9148686B2 (en) 2010-12-20 2015-09-29 Echostar Technologies, Llc Matrix code-based user interface
US9280515B2 (en) 2010-12-03 2016-03-08 Echostar Technologies L.L.C. Provision of alternate content in response to QR code
US9329966B2 (en) 2010-11-23 2016-05-03 Echostar Technologies L.L.C. Facilitating user support of electronic devices using matrix codes
US9367669B2 (en) 2011-02-25 2016-06-14 Echostar Technologies L.L.C. Content source identification using matrix barcode
US9571888B2 (en) 2011-02-15 2017-02-14 Echostar Technologies L.L.C. Selection graphics overlay of matrix code
US9596500B2 (en) 2010-12-17 2017-03-14 Echostar Technologies L.L.C. Accessing content via a matrix code
US9652108B2 (en) 2011-05-20 2017-05-16 Echostar Uk Holdings Limited Progress bar
US9686584B2 (en) 2011-02-28 2017-06-20 Echostar Technologies L.L.C. Facilitating placeshifting using matrix codes
US9736469B2 (en) 2011-02-28 2017-08-15 Echostar Technologies L.L.C. Set top box health and configuration
US9781465B2 (en) 2010-11-24 2017-10-03 Echostar Technologies L.L.C. Tracking user interaction from a receiving device

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI462049B (en) * 2010-11-23 2014-11-21 Echostar Technologies Llc Facilitating user support of electronic devices using dynamic matrix code generation
US9792612B2 (en) 2010-11-23 2017-10-17 Echostar Technologies L.L.C. Facilitating user support of electronic devices using dynamic matrix code generation
US9329966B2 (en) 2010-11-23 2016-05-03 Echostar Technologies L.L.C. Facilitating user support of electronic devices using matrix codes
US10382807B2 (en) 2010-11-24 2019-08-13 DISH Technologies L.L.C. Tracking user interaction from a receiving device
US9781465B2 (en) 2010-11-24 2017-10-03 Echostar Technologies L.L.C. Tracking user interaction from a receiving device
US9280515B2 (en) 2010-12-03 2016-03-08 Echostar Technologies L.L.C. Provision of alternate content in response to QR code
US9596500B2 (en) 2010-12-17 2017-03-14 Echostar Technologies L.L.C. Accessing content via a matrix code
US10015550B2 (en) 2010-12-20 2018-07-03 DISH Technologies L.L.C. Matrix code-based user interface
US9148686B2 (en) 2010-12-20 2015-09-29 Echostar Technologies, Llc Matrix code-based user interface
US9092830B2 (en) 2011-01-07 2015-07-28 Echostar Technologies L.L.C. Performing social networking functions using matrix codes
US9571888B2 (en) 2011-02-15 2017-02-14 Echostar Technologies L.L.C. Selection graphics overlay of matrix code
US8931031B2 (en) 2011-02-24 2015-01-06 Echostar Technologies L.L.C. Matrix code-based accessibility
US9367669B2 (en) 2011-02-25 2016-06-14 Echostar Technologies L.L.C. Content source identification using matrix barcode
US9686584B2 (en) 2011-02-28 2017-06-20 Echostar Technologies L.L.C. Facilitating placeshifting using matrix codes
US9736469B2 (en) 2011-02-28 2017-08-15 Echostar Technologies L.L.C. Set top box health and configuration
US10015483B2 (en) 2011-02-28 2018-07-03 DISH Technologies LLC. Set top box health and configuration
US10165321B2 (en) 2011-02-28 2018-12-25 DISH Technologies L.L.C. Facilitating placeshifting using matrix codes
US9652108B2 (en) 2011-05-20 2017-05-16 Echostar Uk Holdings Limited Progress bar
EP2674901A1 (en) * 2012-05-17 2013-12-18 Yankey Information Co., Ltd. Active barcode authentication system and authentication method thereof
TWI478075B (en) * 2012-05-17 2015-03-21
CN103475623B (en) * 2012-06-06 2018-03-20 旸碁资讯股份有限公司 Dynamic bar codes Verification System and its authentication method
CN103475623A (en) * 2012-06-06 2013-12-25 朱俊宇 Dynamic barcode certification system and its certification method

Also Published As

Publication number Publication date
TWI355624B (en) 2012-01-01

Similar Documents

Publication Publication Date Title
TW200926075A (en) Admitting method for access control, mobile electronic device and access control system using the same
KR101233527B1 (en) Entrance/exit management system and entrance/exit management method
CN103154958B (en) Key based on image exchanges
JP6789264B2 (en) Identity verification using barcodes
CA3194491A1 (en) Biometric-based identity authentication
JP6163239B1 (en) Authentication system
KR101514029B1 (en) Method and apparatus for entry authentication using user terminal
HUE025028T2 (en) Method and system for automatically logging in client
CN1802616A (en) Identification system and method
CN104966007A (en) Multi-user login method and apparatus
CN1382005A (en) Electronic control system, method identification authorized user and its program
CN1910531B (en) Method and system used for key control of data resource, related network
CN102113229A (en) Unlocking a locked user device using a computer generated unlock code provided by user
JP2020095393A (en) Service reservation provision system and reservation provision method
JP2007296661A (en) Image forming system and user authentication method in this system
JP2006287503A (en) Security enhancement system, security enhancement method, and its program
JP2010072688A (en) Personal identification system using optical reading code
KR101223576B1 (en) An off-line filling-form device based on the bar-code and the method thereof
US10922514B2 (en) Electronic apparatus
CN109165490A (en) A kind of data inputting method and device
JP2009152825A (en) Location stamp system
CN112528254A (en) Password security detection method
JP2009031918A (en) Apparatus management system
JP2009175859A (en) Authentication method and system using bar code, mobile terminal, and computer program executing the method
CN104732137A (en) Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees