TW202125423A - Security system - Google Patents

Security system Download PDF

Info

Publication number
TW202125423A
TW202125423A TW108148361A TW108148361A TW202125423A TW 202125423 A TW202125423 A TW 202125423A TW 108148361 A TW108148361 A TW 108148361A TW 108148361 A TW108148361 A TW 108148361A TW 202125423 A TW202125423 A TW 202125423A
Authority
TW
Taiwan
Prior art keywords
identity information
verification
security
verified
door
Prior art date
Application number
TW108148361A
Other languages
Chinese (zh)
Other versions
TWI729657B (en
Inventor
鄭澤芳
廖松偉
Original Assignee
台灣新光保全股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 台灣新光保全股份有限公司 filed Critical 台灣新光保全股份有限公司
Priority to TW108148361A priority Critical patent/TWI729657B/en
Application granted granted Critical
Publication of TWI729657B publication Critical patent/TWI729657B/en
Publication of TW202125423A publication Critical patent/TW202125423A/en

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

A security system comprises a door locking device, a security host and a verification device, wherein the verification device is connected with the door locking device and the security host. The door locking device is applied to a door disposed between a first space and a second space and selectively separating the first space and the second space. The door locking device is configured to receive identity information to be verified, and controlled to be unlocked. The security host is disposed in the first space and has a security status indicating a complete monitoring status or a partial monitoring status. The verification device is configured to perform a verification procedure according to the identity information to be verified. When the verification procedure is not passed and the security status indicates the monitoring status, the verification device unlocks the door locking device and then locks the door locking device from outside as obtaining an action signal.

Description

保全系統Security system

本發明係關於一種保全系統,尤其係關於一種具有門鎖的保全系統。The present invention relates to a security system, in particular to a security system with a door lock.

現今大多住宅、辦公大樓及營業場所皆會設置保全系統以及保全人員,藉由保全系統以及保全人員的監控以避免非法入侵或儘早發現並解除其他異常狀況。保全系統涉及的管控種類各式各樣,其中尤為常見的係門禁的智能管控。一般智能門禁系統內會預存有代表允許進出之身分的密碼、卡片數位資料等資訊,因此當人員提供不被允許的卡號或密碼時,門禁系統會維持大門閉鎖;反之,當提供允許的密碼、卡片數位資料時,門禁系統便會解除門的閉鎖。Nowadays, most residences, office buildings and business premises are equipped with security systems and security personnel. The security systems and security personnel are monitored to avoid illegal intrusion or detect and remove other abnormal conditions as soon as possible. The security system involves various types of management and control, among which the most common one is the intelligent management and control of access control. Generally, the smart access control system will pre-store information such as passwords and card digital data that represent the identity allowed to enter and exit. Therefore, when a person provides an unauthorized card number or password, the access control system will keep the door locked; on the contrary, when the permitted password, When the card digital data, the access control system will unlock the door.

然而,對於使用上述資訊匹配驗證之解鎖機制的門禁系統而言,嘗試破解入侵者屢見不鮮。However, it is not uncommon for an access control system that uses the unlocking mechanism of the above-mentioned information matching verification to try to crack an intruder.

鑒於上述問題,本發明提供一種保全系統。In view of the above problems, the present invention provides a security system.

依據本發明一實施例的保全系統,包含門鎖裝置、保全主機及驗證裝置,其中驗證裝置連接於門鎖裝置及保全主機。門鎖裝置適用於第一空間與第二空間之間且可選擇性地分隔第一空間與第二空間的門,且用於接收待驗證身分資訊,並受控以執行解鎖動作。保全主機設置於第一空間,且具有一保全狀態,所述保全狀態包含完全監控狀態及部分監控狀態。驗證裝置用於依據待驗證身分資訊執行驗證程序,於驗證程序未通過且該保全狀態指示完全監控狀態時,控制門鎖裝置執行解鎖動作,並在取得作動訊號時控制門鎖裝置執行反鎖動作。A security system according to an embodiment of the present invention includes a door lock device, a security host, and a verification device, wherein the verification device is connected to the door lock device and the security host. The door lock device is suitable for the door between the first space and the second space and can selectively separate the first space and the second space, and is used for receiving identity information to be verified and controlled to perform an unlocking action. The security host is arranged in the first space and has a security state, and the security state includes a full monitoring state and a partial monitoring state. The verification device is used to perform a verification process based on the identity information to be verified. When the verification process fails and the security status indicates a fully monitored state, the door lock device is controlled to perform an unlocking action, and when an activation signal is obtained, the door lock device is controlled to perform an anti-lock action.

藉由上述架構,本案所揭示的保全系統不僅對來者之身分資訊進行驗證程序,更依據保全主機的保全狀態選擇性地控制門鎖裝置執行特殊的解鎖再反鎖之動作。如此一來,本案所揭示的保全系統,除了可以被動地杜絕欲非法入侵者,更可以主動地反制欲非法入侵者,進而提升保全系統的安全性。With the above-mentioned structure, the security system disclosed in this case not only verifies the identity information of the visitor, but also selectively controls the door lock device to perform special unlocking and then unlocking actions based on the security status of the security host. In this way, the security system disclosed in this case can not only passively eliminate illegal intruders, but also actively counteract illegal intruders, thereby enhancing the security of the security system.

以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the disclosure and the following description of the embodiments are used to demonstrate and explain the spirit and principle of the present invention, and to provide a further explanation of the scope of the patent application of the present invention.

以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The detailed features and advantages of the present invention will be described in detail in the following embodiments. The content is sufficient to enable anyone familiar with the relevant art to understand the technical content of the present invention and implement it accordingly, and according to the content disclosed in this specification, the scope of patent application and the drawings. Anyone who is familiar with relevant skills can easily understand the purpose and advantages of the present invention. The following examples further illustrate the viewpoints of the present invention in detail, but do not limit the scope of the present invention by any viewpoint.

本發明所提之保全系統結合保全與門禁的功能,可以適用於住宅、辦公大樓及商店等具有門的場所。請參考圖1,圖1為依據本發明一實施例所繪示的保全系統1的功能方塊圖。保全系統1包含門鎖裝置11、保全主機13及驗證裝置15,其中驗證裝置15連接於門鎖裝置11及保全主機13。進一步來說,驗證裝置15可以透過有線通訊方式(例如RS485、RS232、USB、乙太網路等)連接於門鎖裝置11/保全主機13,亦可以透過無線通訊方式(例如射頻、Wi-Fi、ZigBee、Z-wave、藍牙、近場通訊等)連接門鎖裝置11/保全主機13。也就是說,驗證裝置15、門鎖裝置11及保全主機13各自包含有線通訊電路及無線通訊電路中的一或二者。保全系統1可以與管制中心主機2及外部裝置3連接。進一步來說,保全系統1的保全主機13可以連接於管制中心主機2及外部裝置3,且保全系統1的驗證裝置15亦可以連接於管制中心主機2及外部裝置3,其中,所用之連接方式可以係有線通訊方式或無線通訊方式,此二方式之舉例如前所列,於此不再贅述。The security system proposed by the present invention combines the functions of security and access control, and can be applied to places with doors such as residences, office buildings and shops. Please refer to FIG. 1, which is a functional block diagram of a security system 1 according to an embodiment of the present invention. The security system 1 includes a door lock device 11, a security host 13 and a verification device 15, wherein the verification device 15 is connected to the door lock device 11 and the security host 13. Furthermore, the verification device 15 can be connected to the door lock device 11/security host 13 through wired communication (such as RS485, RS232, USB, Ethernet, etc.), or through wireless communication (such as radio frequency, Wi-Fi, etc.). , ZigBee, Z-wave, Bluetooth, near field communication, etc.) to connect the door lock device 11/security host 13. In other words, the verification device 15, the door lock device 11, and the security host 13 each include one or both of a wired communication circuit and a wireless communication circuit. The security system 1 can be connected to the control center host 2 and external devices 3. Furthermore, the security host 13 of the security system 1 can be connected to the control center host 2 and the external device 3, and the verification device 15 of the security system 1 can also be connected to the control center host 2 and the external device 3. The connection method used It can be a wired communication method or a wireless communication method. Examples of the two methods are listed above, and will not be repeated here.

管制中心主機2係設置於管制中心的電腦,除了與保全系統1更可以與更多台保全系統連接。舉例來說,一棟大樓中的每戶人家各可設置一保全系統,管制中心主機則可以設置於大樓管理室或保全公司,並連接於每戶人家的保全系統。外部裝置3可以係感知器,諸如煙霧偵測器、窗戶振動偵測器、窗戶開啟監控器、一氧化碳偵測器、二氧化碳偵測器、紅外線偵測器、影像監視器等,可以係個人裝置諸如智慧型手機、平板電腦、筆記型電腦等,亦可以係家電設備諸如電視、冷氣、洗衣機等。圖1示例性地繪示但非限制保全系統1連接於一外部裝置3,保全系統1亦可以連接於多個同類型或不同類型的外部裝置。於另一實施例中,管制中心主機2及外部裝置3中的一或二者係包含於保全系統內。另外,外部裝置3亦可連接於管制中心主機2,保全系統1可以透過管制中心主機2與外部裝置3相互通訊。The control center host 2 is a computer set up in the control center. In addition to the security system 1, it can also be connected to more security systems. For example, each household in a building can be equipped with a security system, and the control center host can be set up in the building management room or security company, and connected to the security system of each household. The external device 3 can be a sensor, such as a smoke detector, a window vibration detector, a window opening monitor, a carbon monoxide detector, a carbon dioxide detector, an infrared detector, an image monitor, etc., and can be a personal device such as Smart phones, tablets, laptops, etc. can also be home appliances such as TVs, air conditioners, washing machines, etc. Fig. 1 exemplarily shows but not limited that the security system 1 is connected to an external device 3. The security system 1 can also be connected to multiple external devices of the same type or of different types. In another embodiment, one or both of the control center host 2 and the external device 3 are included in the security system. In addition, the external device 3 can also be connected to the control center host 2, and the security system 1 can communicate with the external device 3 through the control center host 2.

門鎖裝置11適用於第一空間與第二空間之間且可選擇性地分隔第一空間與第二空間的門,其中第一空間與第二空間即為門在關閉時所分隔的兩個空間。舉例來說,第一空間與第二空間可以為大樓內與大樓外、室內與室外(例如大樓中的一住戶內與該住戶外的走廊)等。門鎖裝置11用於接收待驗證身分資訊,並受控以執行解鎖動作。進一步來說,門鎖裝置11可以係密碼鎖、卡片鎖、生物特徵(臉型、指紋、聲紋、虹膜等)辨識鎖中的一者或多者之組合,其所接收的待驗證身分資訊可以係密碼、卡片中儲存的數位資料、欲通行者的生物特徵中的一或多者。門鎖裝置11可以設置於門邊的區域,當門鎖裝置11處於解鎖狀態時,門可受外力推動或拉動而連通原由門所分隔的第一空間與第二空間;反之,門則不可受外力推動或拉動。如圖1所示,門鎖裝置11包含外鎖組件111及門狀態偵測器113。外鎖組件111用於使門從第二空間被上鎖,當外鎖組111件處於上鎖狀態時,門鎖裝置11無法從第一空間被解鎖。門狀態偵測器113例如使用霍爾感測器或限位開關偵測門的開闔狀態。於此特別要說明的是,外鎖組件111及門狀態偵測器113為選擇性設置的元件。The door lock device 11 is suitable for doors that can selectively separate the first space and the second space between the first space and the second space, where the first space and the second space are the two separated by the door when the door is closed. space. For example, the first space and the second space may be inside and outside the building, indoor and outdoor (for example, a corridor between a residence in the building and the outdoor corridor), etc. The door lock device 11 is used for receiving the identity information to be verified and controlled to perform an unlocking action. Furthermore, the door lock device 11 can be a combination of one or more of a combination lock, a card lock, and a biometric (face shape, fingerprint, voiceprint, iris, etc.) identification lock, and the received identity information to be verified can be It is one or more of the password, the digital data stored in the card, and the biological characteristics of the person who wants to pass. The door lock device 11 can be arranged in the area beside the door. When the door lock device 11 is in the unlocked state, the door can be pushed or pulled by external force to connect the first space and the second space originally separated by the door; otherwise, the door is unacceptable. Push or pull by external force. As shown in FIG. 1, the door lock device 11 includes an outer lock component 111 and a door state detector 113. The outer lock assembly 111 is used to lock the door from the second space. When the 111 pieces of the outer lock assembly are in the locked state, the door lock device 11 cannot be unlocked from the first space. The door status detector 113 uses a Hall sensor or a limit switch to detect the opening and closing status of the door, for example. It should be particularly noted here that the outer lock assembly 111 and the door status detector 113 are optional components.

保全主機13設置於前述之第一空間。保全主機13可以包含一運算主機,具有保全狀態,其中保全狀態包含完全監控狀態及部分監控狀態。如前所述,保全主機13可以連接於一或多個感知器。當保全主機13的保全狀態指示完全監控狀態時,保全主機13可以啟用所連接之所有感知器,並判斷感知器所偵測到之訊號是否有所異常。當保全主機13判斷有異常狀態時,可以發出警示聲或警示光,亦可以產生警示訊號並傳送至管制中心主機2。藉此,管制中心便可以調派保全人員至現場或報警請求協助。當保全主機13的保全狀態指示部分監控狀態時,保全主機13可以停止判斷部分感知器(例如窗戶振動偵測器、窗戶開啟偵測器)所偵測到之訊號是否有所異常,或是直接禁能部分的感知器。一般而言,當室內無人時,保全主機13會被設定為完全監控狀態,而當室內有人時,保全主機13則會被設定為部分監控狀態。另外,保全主機13除了運算主機可以更包含操作介面或/及包含顯示介面,其中操作介面例如為多個按鍵,顯示介面例如為螢幕,操作介面與顯示介面亦可由一觸控螢幕實現。The security host 13 is set in the aforementioned first space. The security host 13 may include a computing host with a security state, where the security state includes a full monitoring state and a partial monitoring state. As mentioned above, the security host 13 can be connected to one or more sensors. When the security status of the security host 13 indicates the full monitoring status, the security host 13 can activate all connected sensors and determine whether the signals detected by the sensors are abnormal. When the security host 13 determines that there is an abnormal state, it can emit a warning sound or a warning light, or generate a warning signal and send it to the control center host 2. In this way, the control center can dispatch security personnel to the scene or call the police for assistance. When the security status of the security host 13 indicates part of the monitoring status, the security host 13 can stop judging whether the signals detected by some sensors (such as window vibration detectors, window opening detectors) are abnormal, or directly Disable some of the perceptrons. Generally speaking, when there is no one in the room, the security host 13 will be set to a fully monitored state, and when there are people in the room, the security host 13 will be set to a partial monitoring state. In addition, the security host 13 may further include an operating interface or/and a display interface in addition to the computing host. The operating interface is, for example, a plurality of keys, and the display interface is, for example, a screen. The operating interface and the display interface can also be implemented by a touch screen.

驗證裝置15可以包含記憶體151、處理控制器153及計時器155。記憶體151例如為快閃記憶體、唯讀記憶體、磁性記憶體等,記憶體151可以與處理控制器153設置於相同機殼,亦可以係位於相對於處理控制器為遠端的記憶體(例如雲端硬碟)。記憶體151儲存有一或多個使用者的預存身分資訊,進一步地,更可以儲存有各使用者的預存適用時間。預存身分資訊可以代表允許通行的使用者身分,例如為密碼、卡片中儲存的數位資料、使用者之生物特徵中的一或多者。預存適用時間可以表示對應的使用者會提供身分資訊以解鎖的時間區段。處理控制器153例如為中央處理器、微控制器、可編程邏輯控制器等,可以執行驗證程序及對門鎖裝置11/外部裝置3的控制,詳細執行內容將於後描述。計時器155為選擇性設置的元件,可以受處理控制器153控制而執行計時以產生計時值。The verification device 15 may include a memory 151, a processing controller 153, and a timer 155. The memory 151 is, for example, a flash memory, a read-only memory, a magnetic memory, etc. The memory 151 and the processing controller 153 can be installed in the same housing, or it can be a remote memory with respect to the processing controller. (E.g. Cloud Drive). The memory 151 stores the pre-stored identity information of one or more users, and further, can store the pre-stored applicable time of each user. The pre-stored identity information may represent the identity of the user allowed to pass, for example, one or more of the password, the digital data stored in the card, and the biological characteristics of the user. The pre-stored applicable time can indicate the period of time during which the corresponding user will provide identity information to unlock. The processing controller 153 is, for example, a central processing unit, a microcontroller, a programmable logic controller, etc., and can execute a verification program and control the door lock device 11/external device 3. The detailed execution content will be described later. The timer 155 is an optional element, and can be controlled by the processing controller 153 to perform timing to generate a timing value.

圖1以功能方塊及線條示例性地繪示驗證裝置15與其他裝置的連接關係及其所包含的元件。除了上述元件,驗證裝置15更可以包含操作介面或/及包含顯示介面,其中操作介面例如為多個按鍵,顯示介面例如為螢幕,操作介面與顯示介面亦可由一觸控螢幕實現。另外,以實體來說,驗證裝置15可以獨立設置,或可以與保全主機13或門鎖裝置11裝設於同一機殼內。或者,驗證裝置15可以包含設置於不同區域的多個部分。舉例來說,驗證裝置15可以有一部分的元件及電路與保全主機13裝設於同一機殼內,而另一部分的元件及電路與門鎖裝置11裝設於另一機殼內。進一步來說,驗證裝置15的處理控制器153可以包含兩個處理控制單元,分別例如為中央處理器、微控制器、可編程邏輯控制器等,且其一與保全主機13裝設於同一機殼內,另一則與門鎖裝置11裝設於另一機殼內。FIG. 1 exemplarily shows the connection relationship between the verification device 15 and other devices and the components included in it with functional blocks and lines. In addition to the above components, the verification device 15 may further include an operation interface or/and a display interface, where the operation interface is, for example, a plurality of buttons, the display interface is, for example, a screen, and the operation interface and the display interface can also be implemented by a touch screen. In addition, in terms of entities, the verification device 15 can be installed independently, or can be installed in the same casing as the security host 13 or the door lock device 11. Alternatively, the verification device 15 may include a plurality of parts arranged in different areas. For example, the verification device 15 may have a part of the components and circuits installed in the same housing as the security host 13, and another part of the components and circuits and the door lock device 11 may be installed in another housing. Further, the processing controller 153 of the verification device 15 may include two processing control units, such as a central processing unit, a microcontroller, a programmable logic controller, etc., respectively, and one of them is installed in the same machine as the security host 13 Inside the casing, the other and the door lock device 11 are installed in another casing.

驗證裝置15用於依據待驗證身分資訊執行驗證程序,於驗證程序通過時控制門鎖裝置11執行解鎖動作,而於驗證程序未通過時,則依據保全狀態控制門鎖裝置11及外部裝置3中的至少一者。進一步來說,驗證裝置15可以從門鎖裝置11取得待驗證身分資訊且從保全主機13取得保全狀態,再對待驗證身分資訊執行驗證程序,並判斷保全狀態係指示完全監控狀態或部分監控狀態,再據以控制門鎖裝置11及外部裝置2中的至少一者。The verification device 15 is used to perform a verification procedure based on the identity information to be verified, and when the verification procedure passes, it controls the door lock device 11 to perform an unlocking action, and when the verification procedure fails, it controls the door lock device 11 and the external device 3 according to the security status. At least one of. Furthermore, the verification device 15 can obtain the identity information to be verified from the door lock device 11 and obtain the security status from the security host 13, and then perform the verification procedure on the identity information to be verified, and determine that the security status indicates a full monitoring state or a partial monitoring state. Then at least one of the door lock device 11 and the external device 2 is controlled accordingly.

進一步說明驗證裝置15所執行之驗證程序,請參考圖1及圖2,其中圖2係依據本發明一實施例所繪示的保全系統1所執行之驗證程序的流程圖。於步驟S101中,驗證裝置15的處理控制器153從門鎖裝置11取得待驗證身分資訊。於步驟S103中,處理控制器153會判斷待驗證身分資訊是否符合記憶體151所存的多個預存身分資訊的其中一者。若否,則驗證程序未通過。若是,則於步驟S105中,驗證裝置15的處理控制器153會判斷接收待驗證身分資訊的時間是否符合對應於待驗證身分資訊的預存適用時間。若否,則驗證程序未通過。若是,則驗證程序通過。如前所述,當驗證程序通過時,驗證裝置15會控制門鎖裝置11進行解鎖動作;而當驗證程序未通過時,驗證裝置15會依據保全狀態為完全監控狀態或部分監控狀態以產生特殊的控制訊號來控制門鎖裝置11或外部裝置2。於此實施例中,驗證程序包含了多段式的驗證,除了驗證待驗證身分資訊的合法性,更驗證使用時間(即提供身分資訊的時間)的合法性,藉此可以降低待驗證身分資訊遭盜用的風險,提高系統辨識合法使用者的準確性,進而增進系統的安全性。To further describe the verification procedure executed by the verification device 15, please refer to FIG. 1 and FIG. 2. FIG. 2 is a flowchart of the verification procedure executed by the security system 1 according to an embodiment of the present invention. In step S101, the processing controller 153 of the verification device 15 obtains the identity information to be verified from the door lock device 11. In step S103, the processing controller 153 determines whether the identity information to be verified matches one of the plurality of pre-stored identity information stored in the memory 151. If not, the verification procedure has not passed. If so, in step S105, the processing controller 153 of the verification device 15 determines whether the time of receiving the identity information to be verified matches the pre-stored applicable time corresponding to the identity information to be verified. If not, the verification procedure has not passed. If yes, the verification procedure is passed. As mentioned above, when the verification procedure is passed, the verification device 15 will control the door lock device 11 to unlock; and when the verification procedure is not passed, the verification device 15 will generate a special state according to whether the security state is a full monitoring state or a partial monitoring state. The control signal to control the door lock device 11 or the external device 2. In this embodiment, the verification procedure includes a multi-stage verification. In addition to verifying the legitimacy of the identity information to be verified, it also verifies the legitimacy of the usage time (that is, the time for providing the identity information), thereby reducing the damage to the identity information to be verified. The risk of misappropriation improves the accuracy of the system in identifying legitimate users, thereby enhancing the security of the system.

更進一步來說,雖然透過上述身分資訊及使用時間的雙重驗證可以增加系統安全性。然而,對於某些使用者而言,其使用時間並無特定規律,或者對於一般使用者而言,偶有突發狀況而需臨時進入室內,此時便無法通過上述使用時間的驗證而被判定為欲非法入侵者。因此,本發明亦提出另一種驗證程序,包含上一實施例所述的步驟S101及步驟S103,而驗證裝置15在判斷接收待驗證身分資訊的時間不符合對應於待驗證身分資訊的預存適用時間時,會再特別執行生物特徵驗證。詳細來說,驗證裝置15會產生生物特徵輸入請求並透過門鎖裝置11輸出,以提示使用者輸入生物特徵資訊。當驗證裝置15從門鎖裝置11接收到生物特徵資訊時,會判斷其是否符合預存身分資訊中對應於先前判斷合法之待驗證身分資訊的使用者的生物特徵,若是,則驗證程序通過,若否,則驗證程序未通過。意即,當生物特徵驗證通過時,驗證程序通過。藉此,透過更多段的驗證,更可以提高系統辨識合法使用者的準確性。Furthermore, although the above-mentioned two-factor authentication of identity information and usage time can increase system security. However, for some users, there is no specific rule for their use time, or for general users, occasional emergencies and need to enter the room temporarily. At this time, they cannot be judged by the verification of the above use time. For illegal intruders. Therefore, the present invention also proposes another verification procedure, including steps S101 and S103 described in the previous embodiment, and the verification device 15 determines that the time of receiving the identity information to be verified does not match the pre-stored applicable time corresponding to the identity information to be verified At that time, biometric verification will be carried out specially. Specifically, the verification device 15 generates a biometric input request and outputs it through the door lock device 11 to prompt the user to input biometric information. When the verification device 15 receives the biometric information from the door lock device 11, it will determine whether it matches the biometric characteristics of the user whose identity information has been previously judged to be legal to be verified in the pre-stored identity information. If so, the verification process passes. No, the verification procedure has not passed. This means that when the biometric verification is passed, the verification procedure is passed. In this way, through more verifications, the accuracy of the system in identifying legitimate users can be improved.

如前所述,當驗證程序未通過時,驗證裝置15會依據保全狀態為完全監控狀態或部分監控狀態以產生特殊的控制訊號來控制門鎖裝置11或外部裝置2。進一步來說,當驗證程序未通過且保全狀態指示部分監控狀態時,驗證裝置15可以控制所連之外部裝置3。舉例來說,外部裝置3可以係指設置於室外的至少一監視器,當驗證裝置15判斷驗證程序未通過且保全狀態指示部分監控狀態時,可以控制所述監視器朝向門口執行拍攝。具體而言,當保全狀態指示部分監控狀態時,表示是有人在的,因此此時驗證裝置15會維持門鎖裝置11的上鎖狀態,並控制監視器朝門口拍攝,以取得欲非法入侵者的影像。更進一步地,驗證裝置15亦可同時產生警示訊號並傳送至保全主機13,保全主機13再據以發出警示或/及通報管制中心主機2。As mentioned above, when the verification procedure fails, the verification device 15 will generate a special control signal to control the door lock device 11 or the external device 2 according to whether the security state is a full monitoring state or a partial monitoring state. Furthermore, when the verification procedure fails and the security status indicates a partial monitoring state, the verification device 15 can control the connected external device 3. For example, the external device 3 may refer to at least one monitor set outdoors. When the verification device 15 determines that the verification procedure has not passed and the preservation state indicates a partial monitoring state, it may control the monitor to perform shooting toward the door. Specifically, when the security status indicates the partial monitoring status, it indicates that someone is present. Therefore, the verification device 15 will maintain the locked state of the door lock device 11 and control the monitor to shoot toward the door to obtain the illegal intruder. Of the image. Furthermore, the verification device 15 can also generate a warning signal at the same time and send it to the security host 13, and the security host 13 then issues a warning or/and reports to the control center host 2 accordingly.

另外,當驗證程序未通過且保全狀態指示完全監控狀態時,驗證裝置15可以先控制門鎖裝置11執行解鎖動作,再於取得一作動訊號時控制門鎖裝置11執行反鎖動作。於一實施態樣中,驗證裝置15在門鎖裝置11執行解鎖動作後,會從門鎖裝置11的門狀態偵測器113取得門的開闔狀態。當門的開闔狀態由開啟變為關閉時,驗證裝置15便會產生作動訊號。於另一實施態樣中,驗證裝置15在門鎖裝置11執行解鎖動作後,會以計時器155開始計時以產生計時值,並以處理控制器153判斷計時值是否達一預設時間值(可預存於記憶體151或處理控制器153的內部記憶體)。當計時值達預設時間值時,驗證裝置15便會產生作動訊號。驗證裝置15因作動訊號的產生而控制門鎖裝置11執行反鎖動作。進一步來說,驗證裝置15可以控制外鎖組件111處於上鎖狀態,當外鎖組件111處於上鎖狀態時,門鎖裝置11將無法從室內側被解鎖。一般而言,當保全狀態指示完全監控狀態時,表示室內是無人的。藉由上述機制,驗證裝置15可以在確認室內無人時,解鎖以誘導欲非法入侵者進入室內,並在判定其進入或應該進入時將門從外反鎖。In addition, when the verification procedure fails and the security status indicates a fully monitored state, the verification device 15 may first control the door lock device 11 to perform an unlocking action, and then control the door lock device 11 to perform an anti-locking action when an actuation signal is obtained. In one embodiment, the verification device 15 obtains the open and closed state of the door from the door state detector 113 of the door lock device 11 after the door lock device 11 performs the unlocking action. When the opening and closing state of the door changes from open to closed, the verification device 15 generates an actuation signal. In another embodiment, after the door lock device 11 performs the unlocking action, the verification device 15 starts timing with the timer 155 to generate a timer value, and the processing controller 153 determines whether the timer value reaches a preset time value ( It can be pre-stored in the memory 151 or the internal memory of the processing controller 153). When the timing value reaches the preset time value, the verification device 15 will generate an actuation signal. The verification device 15 controls the door lock device 11 to perform an anti-lock action due to the generation of the actuation signal. Furthermore, the verification device 15 can control the outer lock assembly 111 to be in the locked state. When the outer lock assembly 111 is in the locked state, the door lock device 11 cannot be unlocked from the indoor side. Generally speaking, when the security status indicates the full monitoring status, it means that there is no one in the room. With the above mechanism, the verification device 15 can unlock when it is confirmed that there is no one in the room to induce an illegal intruder to enter the room, and lock the door from the outside when it is determined that the person has entered or should enter.

如前所述,驗證裝置15的記憶體151儲存有一或多個使用者的預存身分資訊及預存適用時間。使用者可以透過驗證裝置15的操作介面或作為外部裝置3的個人裝置來設定、變更或刪除其預存身分資訊及預存適用時間。驗證裝置15可以提供身分資訊的掛失機制。請一併參考圖1及圖3,圖3係依據本發明一實施例所繪示的保全系統1所執行之掛失機制的流程圖。進一步來說,掛失機制包含一驗證程序,有別於前列實施例所述之驗證程序。為了區隔二者,前列實施例所述之驗證程序可稱為第一驗證程序,而此實施例稱為第二驗證程序,前列實施例所述之待驗證身分資訊可稱為第一待驗證身分資訊,而此實施例稱為第二待驗證身分資訊。於此特別要說明的是,上述「第一」及「第二」無關於程序執行的順序或資訊產生的順序。As mentioned above, the memory 151 of the verification device 15 stores the pre-stored identity information and pre-stored applicable time of one or more users. The user can set, change or delete his pre-stored identity information and pre-stored applicable time through the operation interface of the authentication device 15 or a personal device as the external device 3. The verification device 15 can provide a mechanism for reporting loss of identity information. Please refer to FIG. 1 and FIG. 3 together. FIG. 3 is a flowchart of a loss reporting mechanism executed by the security system 1 according to an embodiment of the present invention. Furthermore, the loss reporting mechanism includes a verification procedure, which is different from the verification procedure described in the previous embodiment. In order to distinguish the two, the verification procedure described in the previous embodiment can be called the first verification procedure, and this embodiment is called the second verification procedure, and the identity information to be verified in the previous embodiment can be called the first verification procedure. Identity information, and this embodiment is called the second identity information to be verified. It is particularly important to note that the above-mentioned "first" and "second" have nothing to do with the sequence of program execution or the sequence of information generation.

如圖3所示,掛失機制包含步驟S201~S207。於步驟S201中,驗證裝置15透過操作介面或外部裝置3接收一掛失請求,其中掛失請求包含代表申請者身分的第二待驗證身分資訊。於步驟S203中,驗證裝置15判斷第二待驗證身分資訊是否通過第二驗證程序。換句話說,驗證裝置15會依據第二待驗證身分資訊執行第二驗證程序,其中第二驗證程序的進一步執行內容將於後描述。當第二驗證程序通過時,於步驟S205中,驗證裝置15依據掛失請求使預存身分資訊中的至少一者失效。當第二驗證程序未通過時,於步驟S207中,驗證裝置15拒絕掛失請求,例如透過顯示介面或個人裝置顯示掛失失敗的畫面。As shown in Figure 3, the loss reporting mechanism includes steps S201 to S207. In step S201, the verification device 15 receives a loss report request through the operating interface or the external device 3, wherein the loss report request includes the second to-be-verified identity information representing the identity of the applicant. In step S203, the verification device 15 determines whether the second to-be-verified identity information passes the second verification procedure. In other words, the verification device 15 executes the second verification procedure based on the second to-be-verified identity information, wherein the further execution content of the second verification procedure will be described later. When the second verification procedure is passed, in step S205, the verification device 15 invalidates at least one of the pre-stored identity information according to the loss report request. When the second verification procedure fails, in step S207, the verification device 15 rejects the loss reporting request, for example, displaying a failure reporting screen through a display interface or a personal device.

於具有掛失機制的實施例中,驗證裝置15中所儲存的預存身分資訊包含多個使用者各自的可變更身分資訊及固定身分資訊。其中,可變更身分資訊顧名思義係指可變更的身分資訊,例如密碼、卡片中儲存的數位資料等;固定身分資訊則係指使用者不可變更或難以變更的身分資訊,例如臉型、指紋、聲紋、虹膜等。進一步來說明第二驗證程序,其可以包含判斷第二待驗證身分資訊是否符合上述預存的固定身分資訊的其中一者。若是,則第二驗證程序通過,驗證裝置15據以使對應於第二驗證身分資訊的可變更身分資訊失效。更進一步來說,驗證裝置15可以藉由將可變更身分資訊刪除或是將其設為黑名單,以使可變更身分資訊失效。In an embodiment with a loss reporting mechanism, the pre-stored identity information stored in the verification device 15 includes the changeable identity information and fixed identity information of multiple users. Among them, the changeable identity information, as the name implies, refers to the changeable identity information, such as passwords, digital data stored in the card, etc.; the fixed identity information refers to the user’s unchangeable or difficult to change identity information, such as face shape, fingerprints, and voiceprints. , Iris, etc. To further illustrate the second verification procedure, it may include determining whether the second identity information to be verified conforms to one of the above-mentioned pre-stored fixed identity information. If so, the second verification procedure is passed, and the verification device 15 invalidates the changeable identity information corresponding to the second verification identity information. Furthermore, the verification device 15 can delete the changeable identity information or set it to a blacklist to invalidate the changeable identity information.

另外,驗證裝置15亦可以對預存身分資訊中的可變更身分資訊定期地進行主動變更,並將變更的預存身分資訊傳送至對應的使用者的個人裝置。藉由上述定期變更及掛失的機制,可以降低使用者的可變更身分資訊諸如密碼、卡片等遭盜用的風險。In addition, the verification device 15 can also actively change the changeable identity information in the pre-stored identity information on a regular basis, and send the changed pre-stored identity information to the corresponding user's personal device. Through the above-mentioned periodic change and loss reporting mechanism, the risk of the user's changeable identity information such as passwords and cards being stolen can be reduced.

藉由上述架構,本案所揭示的保全系統不僅對來者之身分資訊進行驗證程序,更依據保全主機的保全狀態選擇性地控制門鎖裝置執行特殊的解鎖再反鎖之動作。如此一來,本案所揭示的保全系統,除了可以被動地杜絕欲非法入侵者,更可以主動地反制欲非法入侵者,提升保全系統的安全性。另外,藉由多段式的身分驗證,本案所揭示的保全系統可以降低待驗證身分資訊遭盜用的風險,提高系統辨識合法使用者的準確性,進而增進系統的安全性。With the above-mentioned structure, the security system disclosed in this case not only verifies the identity information of the visitor, but also selectively controls the door lock device to perform special unlocking and then unlocking actions based on the security status of the security host. In this way, the security system disclosed in this case can not only passively eliminate illegal intruders, but also actively counteract illegal intruders and improve the security of the security system. In addition, with multi-stage identity verification, the security system disclosed in this case can reduce the risk of theft of identity information to be verified, improve the accuracy of the system in identifying legitimate users, and thereby enhance the security of the system.

雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed in the foregoing embodiments, it is not intended to limit the present invention. All changes and modifications made without departing from the spirit and scope of the present invention fall within the scope of the patent protection of the present invention. For the scope of protection defined by the present invention, please refer to the attached scope of patent application.

1:保全系統 2:管制中心主機 3:外部裝置 11:門鎖裝置 13:保全主機 15:驗證裝置 111:外鎖組件 113:門狀態偵測器 151:記憶體 153:處理控制器 155:計時器1: Security system 2: Control center host 3: External device 11: Door lock device 13: Secure the host 15: Verification device 111: Outer lock assembly 113: Door status detector 151: Memory 153: Processing Controller 155: Timer

圖1係依據本發明一實施例所繪示的保全系統的功能方塊圖。 圖2係依據本發明一實施例所繪示的保全系統所執行之驗證程序的流程圖。 圖3係依據本發明一實施例所繪示的保全系統所執行之掛失機制的流程圖。FIG. 1 is a functional block diagram of a security system according to an embodiment of the present invention. 2 is a flowchart of a verification procedure executed by the security system according to an embodiment of the present invention. FIG. 3 is a flowchart of a loss reporting mechanism executed by the security system according to an embodiment of the present invention.

1:保全系統1: Security system

2:管制中心主機2: Control center host

3:外部裝置3: External device

11:門鎖裝置11: Door lock device

13:保全主機13: Secure the host

15:驗證裝置15: Verification device

111:外鎖組件111: Outer lock assembly

113:門狀態偵測器113: Door status detector

151:記憶體151: Memory

153:處理控制器153: Processing Controller

155:計時器155: Timer

Claims (10)

一種保全系統,包含:一門鎖裝置,適用於設置於一第一空間與一第二空間之間且可選擇性地分隔該第一空間與該第二空間的一門,且用於接收一待驗證身分資訊,並受控以執行一解鎖動作;一保全主機,設置於該第一空間,具有一保全狀態,該保全狀態包含一完全監控狀態及一部分監控狀態;以及一驗證裝置,連接於該門鎖裝置及該保全主機,用於依據該待驗證身分資訊執行一驗證程序,於該驗證程序未通過且該保全狀態指示該完全監控狀態時,控制該門鎖裝置執行該解鎖動作,並在取得一作動訊號時控制該門鎖裝置執行一反鎖動作。A security system, comprising: a door lock device, suitable for a door arranged between a first space and a second space and capable of selectively separating the first space and the second space, and for receiving a to-be-verified door Identity information, and controlled to perform an unlocking action; a security host, set in the first space, has a security state, the security state includes a full monitoring state and a part of the monitoring state; and a verification device connected to the door The lock device and the security host are used to perform a verification procedure based on the identity information to be verified. When the verification procedure fails and the security status indicates the full monitoring state, the door lock device is controlled to perform the unlocking action, and when the An actuation signal controls the door lock device to perform an anti-lock action. 如請求項1所述的保全系統,其中該門鎖裝置包含一外鎖組件,當該外鎖組件處於一上鎖狀態時,該門鎖裝置無法從該保全主機所設置的該第一空間被解鎖,且該驗證裝置所執行之控制該門鎖裝置執行該反鎖動作包含控制該外鎖組件處於該上鎖狀態。The security system according to claim 1, wherein the door lock device includes an external lock component, and when the external lock component is in a locked state, the door lock device cannot be removed from the first space set by the security host Unlocking and controlling the door lock device to perform the anti-locking action performed by the verification device includes controlling the outer lock component to be in the locked state. 如請求項1所述的保全系統,其中該門鎖裝置包含一門狀態偵測器,該驗證裝置在該門鎖裝置執行該解鎖動作後,更從該門狀態偵測器取得該門的開闔狀態,當該門的該開闔狀態由開啟變為關閉時,該驗證裝置產生該作動訊號。The security system according to claim 1, wherein the door lock device includes a door state detector, and the verification device obtains the opening and closing of the door from the door state detector after the door lock device performs the unlocking action State, when the open and close state of the door changes from open to closed, the verification device generates the actuation signal. 如請求項1所述的保全系統,其中該驗證裝置包含一計時器,該驗證裝置在該門鎖裝置執行該解鎖動作後,更以該計時器產生一計時值,當該計時值達到一預設時間值時,該驗證裝置產生該作動訊號。The security system according to claim 1, wherein the verification device includes a timer, and after the door lock device performs the unlocking action, the verification device generates a timer value with the timer, and when the timer value reaches a preset When the time value is set, the verification device generates the actuation signal. 如請求項1所述的保全系統,其中該驗證裝置更於該驗證程序未通過且該保全狀態指示該部分監控狀態時,控制設置於該第二空間的至少一監視器朝向該門執行拍攝。The security system according to claim 1, wherein the verification device controls at least one monitor provided in the second space to perform shooting toward the door when the verification procedure fails and the security status indicates the partial monitoring status. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊及分別對應於該些預存身分資訊的多個預存適用時間,該驗證程序包含判斷該待驗證身分資訊是否符合該些預存身分資訊的其中一者,若否,則該驗證程序未通過,若是,則判斷接收該待驗證身分資訊的時間是否符合該些預存適用時間中對應於該待驗證身分資訊的一者,若否,則該驗證程序未通過,若是,則該驗證程序通過。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information and a plurality of pre-stored applicable times respectively corresponding to the pre-stored identity information, and the verification procedure includes determining the identity to be verified Whether the information conforms to one of the pre-stored identity information, if not, the verification process has not passed, if yes, judge whether the time of receiving the identity information to be verified meets the pre-stored applicable time corresponding to the identity information to be verified If it is not, the verification procedure is not passed, and if it is, the verification procedure is passed. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊及分別對應於該些預存身分資訊的多個預存適用時間,該驗證程序包含判斷該待驗證身分資訊是否符合該些預存身分資訊的其中一者,若否,則該驗證程序未通過,若是,則判斷接收該待驗證身分資訊的時間是否符合該些預存適用時間中對應於該待驗證身分資訊的一者,若是,則該驗證程序通過,若否,則執行一生物特徵驗證,且當該生物特徵驗證通過時,該驗證程序通過。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information and a plurality of pre-stored applicable times respectively corresponding to the pre-stored identity information, and the verification procedure includes determining the identity to be verified Whether the information conforms to one of the pre-stored identity information, if not, the verification process has not passed, if yes, judge whether the time of receiving the identity information to be verified meets the pre-stored applicable time corresponding to the identity information to be verified If it is, the verification procedure is passed, if not, a biometric verification is performed, and when the biometric verification is passed, the verification procedure is passed. 如請求項1所述的保全系統,其中該待驗證身分資訊為一第一待驗證身分資訊且該驗證程序為一第一驗證程序,該驗證裝置包含一記憶體儲存有多個預存身分資訊,該驗證裝置更用於接收包含一第二待驗證身分資訊的一掛失請求,依據該第二待驗證身分資訊執行一第二驗證程序,且於該第二驗證程序通過時,依據該掛失請求使該些預存身分資訊中的至少一者失效。The security system according to claim 1, wherein the identity information to be verified is a first identity information to be verified and the verification process is a first verification process, and the verification device includes a memory storing a plurality of pre-stored identity information, The verification device is further configured to receive a loss report request that includes a second identity information to be verified, execute a second verification procedure based on the second identity information to be verified, and when the second verification procedure passes, use the loss report request according to the second verification procedure. At least one of the stored identity information is invalid. 如請求項8所述的保全系統,其中該些預存身分資訊包含多個使用者各自的可變更身分資訊及固定身分資訊,該第二驗證程序包含判斷該第二待驗證身分資訊是否符合該些固定身分資訊的其中一者,若是,則該第二驗證程序通過,且該驗證裝置使該第二待驗證身分資訊所對應的該可變更身分資訊失效。For example, the security system according to claim 8, wherein the pre-stored identity information includes the changeable identity information and fixed identity information of a plurality of users, and the second verification procedure includes determining whether the second identity information to be verified conforms to the If one of the fixed identity information is yes, the second verification procedure is passed, and the verification device invalidates the changeable identity information corresponding to the second to-be-verified identity information. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊分別對應於多個使用者,且該驗證裝置更用於定期地變更該些預存身分資訊,並將變更的該些預存身分資訊分別傳送至該些使用者的個人裝置。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information corresponding to a plurality of users, and the verification device is further used to periodically change the pre-stored identity information, and Send the changed pre-stored identity information to the personal devices of the users.
TW108148361A 2019-12-30 2019-12-30 Security system TWI729657B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW108148361A TWI729657B (en) 2019-12-30 2019-12-30 Security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW108148361A TWI729657B (en) 2019-12-30 2019-12-30 Security system

Publications (2)

Publication Number Publication Date
TWI729657B TWI729657B (en) 2021-06-01
TW202125423A true TW202125423A (en) 2021-07-01

Family

ID=77517370

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108148361A TWI729657B (en) 2019-12-30 2019-12-30 Security system

Country Status (1)

Country Link
TW (1) TWI729657B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI767773B (en) * 2021-06-30 2022-06-11 緯穎科技服務股份有限公司 Intrusion detection apparatus and method thereof

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8648694B2 (en) * 2010-12-29 2014-02-11 Sasken Communication Technologies Ltd. Multiparty controlled remote security lock system
WO2014144628A2 (en) * 2013-03-15 2014-09-18 Master Lock Company Cameras and networked security systems and methods
TWI492191B (en) * 2014-06-13 2015-07-11 Taiwan Secom Co Ltd Security System
TWI609355B (en) * 2016-08-01 2017-12-21 中興保全股份有限公司 Identification Security System Applying Augmented Reality Techniques and Verification Method Using Thereof
CN207166645U (en) * 2017-09-14 2018-03-30 成都信息工程大学 Private building registers one's residence monitoring system
CN108222790A (en) * 2018-03-12 2018-06-29 贵州民族大学 A kind of antitheft door and its monitoring method with fingerprint and pupil identification monitoring
CN110363888B (en) * 2019-05-29 2022-01-14 深圳绿米联创科技有限公司 Door lock management method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
TWI729657B (en) 2021-06-01

Similar Documents

Publication Publication Date Title
US11282314B2 (en) Systems and methods for controlling access to physical space
US10706703B1 (en) Service entrance alarm system and methods of using the same
US9871399B2 (en) Door lock
US7856558B2 (en) Biometric verification and duress detection system and method
KR101676104B1 (en) Security System
EP3923252A1 (en) Biometric enabled access control
US11783655B1 (en) Biometric authentication for security sensor bypass
EP3188148B1 (en) Intrusinon alarm system with learned and dynamic entry delays
TWI729657B (en) Security system
KR100891010B1 (en) Smart digital doorlock system for home automation
US10956545B1 (en) Pin verification
KR102124164B1 (en) Inner door system with visitor monitoring function
TWI735121B (en) Security system
TWI715391B (en) Security system
JP7026321B2 (en) Warning systems, communication devices, and monitoring devices
JP7489641B2 (en) Control system and control method
CA2629271C (en) A biometric verification and duress detection system and method
JP6919763B2 (en) Wireless communication device and entry / exit management system
KR101081021B1 (en) Security system and the driving method
WO2024068032A1 (en) Security installations and methods
JP2015014128A (en) Guard signal output device
JP2009134437A (en) Suspicious person detection device, suspicious person detection method, and suspicious person detection program