TW202125424A - Security system - Google Patents

Security system Download PDF

Info

Publication number
TW202125424A
TW202125424A TW108148413A TW108148413A TW202125424A TW 202125424 A TW202125424 A TW 202125424A TW 108148413 A TW108148413 A TW 108148413A TW 108148413 A TW108148413 A TW 108148413A TW 202125424 A TW202125424 A TW 202125424A
Authority
TW
Taiwan
Prior art keywords
identity information
verification
security
verified
stored
Prior art date
Application number
TW108148413A
Other languages
Chinese (zh)
Other versions
TWI715391B (en
Inventor
鄭澤芳
廖松偉
Original Assignee
台灣新光保全股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 台灣新光保全股份有限公司 filed Critical 台灣新光保全股份有限公司
Priority to TW108148413A priority Critical patent/TWI715391B/en
Application granted granted Critical
Publication of TWI715391B publication Critical patent/TWI715391B/en
Publication of TW202125424A publication Critical patent/TW202125424A/en

Links

Images

Abstract

A security system comprises a door locking device, a security host, a verification device and an internet electronic device, wherein the verification device is connected with the door locking device, the security host and the internet electronic device, and the internet electronic device is also connected with the security host. The door locking device is configured to receive identity information to be verified, and controlled to be unlocked. The security host has a security status indicating a complete monitoring status or a partial monitoring status. The verification device is configured to perform a verification procedure according to the identity information to be verified. When the verification procedure is passed, the verification device unlocks the door locking device, and selectively generates a control signal corresponding to the identity information to be verified according to the security status. The internet electronic device is configured to operate according to the control signal.

Description

保全系統Security system

本發明係關於一種保全系統,尤其係關於一種具有門鎖的保全系統。The present invention relates to a security system, in particular to a security system with a door lock.

隨著無線通訊技術的進步,電子裝置之智能化控制的發展逐漸成熟。舉例來說,使用者可以透過手機或其他個人裝置來無線操控家中的電子裝置。然而,有些電子裝置之運作狀態為例行性的需求,使用者每日進入家門後皆需重複操控電子裝置來符合所述例行性需求,在使用便利性上仍有相當大的進步空間。With the advancement of wireless communication technology, the development of intelligent control of electronic devices has gradually matured. For example, users can wirelessly control electronic devices at home through mobile phones or other personal devices. However, the operation status of some electronic devices is a routine requirement, and users need to repeatedly control the electronic device every day after entering the house to meet the routine requirements, and there is still considerable room for improvement in the convenience of use.

鑒於上述問題,本發明提供一種保全系統,結合門禁與智能控制電子裝置的功能。In view of the above problems, the present invention provides a security system that combines the functions of access control and intelligent control electronic devices.

依據本發明一實施例的保全系統,包含門鎖裝置、保全主機、驗證裝置以及互聯網電子裝置,其中驗證裝置連接於門鎖裝置、保全主機及互聯網電子裝置,互聯網電子裝置亦連接保全主機。門鎖裝置用於接收待驗證身分資訊,並受控以執行解鎖動作。保全主機具有保全狀態,所述保全狀態指示完全監控狀態或部分監控狀態。驗證裝置用於依據該待驗證身分資訊執行驗證程序,且在驗證程序通過時,控制門鎖裝置執行解鎖動作,並依據保全狀態選擇性地產生對應於待驗證身分資訊的控制訊號。互聯網電子裝置用於依據控制訊號作動。A security system according to an embodiment of the present invention includes a door lock device, a security host, a verification device, and an Internet electronic device. The verification device is connected to the door lock device, the security host, and the Internet electronic device, and the Internet electronic device is also connected to the security host. The door lock device is used for receiving the identity information to be verified and controlled to perform the unlocking action. The security host has a security state, and the security state indicates a full monitoring state or a partial monitoring state. The verification device is used to perform a verification procedure based on the identity information to be verified, and when the verification procedure passes, control the door lock device to perform an unlocking action, and selectively generate a control signal corresponding to the identity information to be verified according to the security status. Internet electronic devices are used to act according to control signals.

藉由上述結構,本案所揭示的保全系統結合門禁與智能控制電子裝置的功能,可以在確認使用者之身分驗證通過時,依據保全狀態適應地控制互聯網中的電子裝置,藉此提升使用便利性。With the above structure, the security system disclosed in this case combines the functions of access control and intelligent control of electronic devices, which can adaptively control the electronic devices on the Internet according to the security status when confirming that the user's identity verification is passed, thereby improving the convenience of use .

以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the disclosure and the following description of the embodiments are used to demonstrate and explain the spirit and principle of the present invention, and to provide a further explanation of the scope of the patent application of the present invention.

以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The detailed features and advantages of the present invention will be described in detail in the following embodiments. The content is sufficient to enable anyone familiar with the relevant art to understand the technical content of the present invention and implement it accordingly, and according to the content disclosed in this specification, the scope of patent application and the drawings. Anyone who is familiar with relevant skills can easily understand the purpose and advantages of the present invention. The following examples further illustrate the viewpoints of the present invention in detail, but do not limit the scope of the present invention by any viewpoint.

本發明所提之保全系統結合門禁與智能控制電子裝置的功能,可以適用於住宅、辦公大樓及商店等具有門的場所。請參考圖1,圖1為依據本發明一實施例所繪示的保全系統1的功能方塊圖。保全系統1包含門鎖裝置11、保全主機13、互聯網電子裝置15及驗證裝置17,其中驗證裝置17連接於門鎖裝置11、保全主機13及互聯網電子裝置15,且互聯網電子裝置15亦連接於保全主機13。進一步來說,驗證裝置17可以透過有線通訊方式(例如RS485、RS232、USB、乙太網路等)連接於門鎖裝置11/保全主機13/互聯網電子裝置15,亦可以透過無線通訊方式(例如射頻、Wi-Fi、ZigBee、Z-wave、藍牙、近場通訊等)連接門鎖裝置11/保全主機13/互聯網電子裝置15,互聯網電子裝置15亦可透過上述有線或無線的通訊方式連接於保全主機13。也就是說,門鎖裝置11、保全主機13、互聯網電子裝置15及驗證裝置17各自包含有線通訊電路及無線通訊電路中的一或二者。The security system of the present invention combines the functions of access control and intelligent control electronic devices, and can be applied to places with doors such as residences, office buildings and shops. Please refer to FIG. 1, which is a functional block diagram of a security system 1 according to an embodiment of the present invention. The security system 1 includes a door lock device 11, a security host 13, an Internet electronic device 15 and a verification device 17. The verification device 17 is connected to the door lock device 11, the security host 13 and the Internet electronic device 15, and the Internet electronic device 15 is also connected to Security host 13. Furthermore, the verification device 17 can be connected to the door lock device 11/security host 13/Internet electronic device 15 through wired communication (such as RS485, RS232, USB, Ethernet, etc.), or through wireless communication (such as Radio frequency, Wi-Fi, ZigBee, Z-wave, Bluetooth, near field communication, etc.) are connected to the door lock device 11/security host 13/Internet electronic device 15. The Internet electronic device 15 can also be connected to through the above-mentioned wired or wireless communication methods Security host 13. In other words, the door lock device 11, the security host 13, the Internet electronic device 15, and the verification device 17 each include one or both of a wired communication circuit and a wireless communication circuit.

如圖1所示,保全系統1可以與管制中心主機2連接。進一步來說,保全系統1的保全主機13及驗證裝置17皆可以連接於管制中心主機2,其中之連接方式可以係有線通訊方式或無線通訊方式,此二方式之舉例如前所列,於此不再贅述。管制中心主機2係設置於管制中心的電腦,除了與保全系統1更可以與更多台保全系統連接。舉例來說,一棟大樓中的每個住戶各可設置一保全系統,管制中心主機則可以設置於大樓管理室或保全公司,並連接於每個住戶的保全系統。另外,使用者的個人裝置諸如智慧型手機、平板電腦、筆記型電腦等亦可與保全系統1或/及管制中心主機2透過無線通訊的方式連接。As shown in Figure 1, the security system 1 can be connected to the host 2 of the control center. Furthermore, both the security host 13 and the verification device 17 of the security system 1 can be connected to the control center host 2, and the connection method can be wired communication or wireless communication. Examples of these two methods are listed above, here No longer. The control center host 2 is a computer set up in the control center. In addition to the security system 1, it can also be connected to more security systems. For example, each resident in a building can be equipped with a security system, and the control center host can be set in the building management room or security company, and connected to the security system of each resident. In addition, the user's personal devices such as smart phones, tablet computers, notebook computers, etc. can also be connected to the security system 1 or/and the control center host 2 through wireless communication.

門鎖裝置11適用於第一空間與第二空間之間且可選擇性地分隔第一空間與第二空間的門,其中第一空間與第二空間即為門在關閉時所分隔的兩個空間。舉例來說,第一空間與第二空間可以為大樓內與大樓外、室內與室外(例如大樓中的一住戶內與該住戶外的走廊)等。門鎖裝置11用於接收待驗證身分資訊,並受控以執行解鎖動作。進一步來說,門鎖裝置11可以係密碼鎖、卡片鎖、生物特徵(臉型、指紋、聲紋、虹膜等)辨識鎖中的一者或多者之組合,其所接收的待驗證身分資訊可以係密碼、卡片中儲存的數位資料、欲通行者的生物特徵中的一或多者。門鎖裝置11可以設置於門邊的區域,當門鎖裝置11處於解鎖狀態時,門可受外力推動或拉動而連通原由門所分隔的第一空間與第二空間;反之,門則不可受外力推動或拉動。The door lock device 11 is suitable for doors that can selectively separate the first space and the second space between the first space and the second space, where the first space and the second space are the two separated by the door when the door is closed. space. For example, the first space and the second space may be inside and outside the building, indoor and outdoor (for example, a corridor between a residence in the building and the outdoor corridor), etc. The door lock device 11 is used for receiving the identity information to be verified and controlled to perform an unlocking action. Furthermore, the door lock device 11 can be a combination of one or more of a combination lock, a card lock, and a biometric (face shape, fingerprint, voiceprint, iris, etc.) identification lock, and the received identity information to be verified can be It is one or more of the password, the digital data stored in the card, and the biological characteristics of the person who wants to pass. The door lock device 11 can be arranged in the area beside the door. When the door lock device 11 is in the unlocked state, the door can be pushed or pulled by external force to connect the first space and the second space originally separated by the door; otherwise, the door is unacceptable. Push or pull by external force.

保全主機13設置於前述之第一空間。保全主機13可以包含一運算主機,具有保全狀態,其中保全狀態包含完全監控狀態及部分監控狀態。保全主機13可以連接於一或多個感知器(未繪示),諸如煙霧偵測器、窗戶振動偵測器、窗戶開啟監控器、一氧化碳偵測器、二氧化碳偵測器、紅外線偵測器、影像監視器等。當保全主機13的保全狀態指示完全監控狀態時,保全主機13可以啟用所連接之所有感知器,並判斷感知器所偵測到之訊號是否有所異常。當保全主機13判斷有異常狀態時,可以發出警示聲或警示光,亦可以產生警示訊號並傳送至管制中心主機2。藉此,管制中心便可以調派保全人員至現場或報警請求協助。當保全主機13的保全狀態指示部分監控狀態時,保全主機13可以停止判斷部分感知器(例如窗戶振動偵測器、窗戶開啟偵測器)所偵測到之訊號是否有所異常,或是直接禁能部分的感知器。一般而言,當室內無人時,保全主機13會被設定為完全監控狀態,而當室內有人時,保全主機13則會被設定為部分監控狀態。另外,保全主機13除了運算主機可以更包含操作介面或/及包含顯示介面,其中操作介面例如為多個按鍵,顯示介面例如為螢幕,操作介面與顯示介面亦可由一觸控螢幕實現。The security host 13 is set in the aforementioned first space. The security host 13 may include a computing host with a security state, where the security state includes a full monitoring state and a partial monitoring state. The security host 13 can be connected to one or more sensors (not shown), such as smoke detectors, window vibration detectors, window opening monitors, carbon monoxide detectors, carbon dioxide detectors, infrared detectors, Video monitor, etc. When the security status of the security host 13 indicates the full monitoring status, the security host 13 can activate all connected sensors and determine whether the signals detected by the sensors are abnormal. When the security host 13 determines that there is an abnormal state, it can emit a warning sound or a warning light, or generate a warning signal and send it to the control center host 2. In this way, the control center can dispatch security personnel to the scene or call the police for assistance. When the security status of the security host 13 indicates part of the monitoring status, the security host 13 can stop judging whether the signals detected by some sensors (such as window vibration detectors, window opening detectors) are abnormal, or directly Disable some of the perceptrons. Generally speaking, when there is no one in the room, the security host 13 will be set to a fully monitored state, and when there are people in the room, the security host 13 will be set to a partial monitoring state. In addition, the security host 13 may further include an operating interface or/and a display interface in addition to the computing host. The operating interface is, for example, a plurality of keys, and the display interface is, for example, a screen. The operating interface and the display interface can also be implemented by a touch screen.

互聯網電子裝置15可以係上述保全主機所連接之感知器,亦可以係家電設備諸如電燈、電視、電腦、冷氣、洗衣機、電熱水器、網路分享器、窗簾驅動器等。另外,互聯網電子裝置15亦可以代表上述多種感知器及家電設備中的多者的組合。互聯網電子裝置15可以受驗證裝置17控制以作動。進一步來說,互聯網電子裝置15可以依據驗證裝置17所產生的控制訊號來作動,特別是處於特定的運作狀態。The Internet electronic device 15 can be a sensor connected to the aforementioned security host, or can be a home appliance such as a lamp, a TV, a computer, an air conditioner, a washing machine, an electric water heater, a network sharing device, a curtain driver, etc. In addition, the Internet electronic device 15 may also represent a combination of many of the above-mentioned various sensors and household appliances. The Internet electronic device 15 can be controlled by the verification device 17 to act. Furthermore, the Internet electronic device 15 can be actuated according to the control signal generated by the verification device 17, especially in a specific operating state.

驗證裝置17可以包含記憶體171及處理控制器173。記憶體171例如為快閃記憶體、唯讀記憶體、磁性記憶體等,記憶體171可以與處理控制器173設置於相同機殼,亦可以係位於相對於處理控制器為遠端的記憶體(例如雲端硬碟)。記憶體171儲存有一或多個使用者(保全區域的合法使用者)的預存身分資訊,亦儲存有對應於各使用者的互聯網電子裝置15的預設狀態。換句話說,記憶體171可以儲存多個預存身分資訊及互聯網電子裝置15的多個預設狀態,所述多個預設狀態分別對應於所述多個預存身分資訊。進一步地,記憶體171更可以儲存有各使用者的預存適用時間。預存身分資訊可以代表允許通行的使用者身分,例如為密碼、卡片中儲存的數位資料、使用者之生物特徵中的一或多者。互聯網電子裝置15的預設狀態則可以表示所對應之使用者所偏好的互聯網電子裝置15的運作狀態,例如客廳電燈設定為開啟狀態、冷氣設定為26℃等。預存適用時間可以表示對應的使用者會提供身分資訊以解鎖的時間區段。處理控制器173例如為中央處理器、微控制器、可編程邏輯控制器等,可以執行驗證程序及對互聯網電子裝置15之控制,詳細之實施內容將於後描述。The verification device 17 may include a memory 171 and a processing controller 173. The memory 171 is, for example, flash memory, read-only memory, magnetic memory, etc. The memory 171 can be installed in the same housing as the processing controller 173, or it can be a remote memory with respect to the processing controller. (E.g. Cloud Drive). The memory 171 stores the pre-stored identity information of one or more users (legal users in the security area), and also stores the preset state of the Internet electronic device 15 corresponding to each user. In other words, the memory 171 can store a plurality of pre-stored identity information and a plurality of preset states of the Internet electronic device 15, and the plurality of preset states respectively correspond to the plurality of pre-stored identity information. Furthermore, the memory 171 can further store the pre-stored applicable time of each user. The pre-stored identity information may represent the identity of the user allowed to pass, for example, one or more of the password, the digital data stored in the card, and the biological characteristics of the user. The default state of the Internet electronic device 15 can indicate the operating state of the Internet electronic device 15 preferred by the corresponding user, for example, the living room light is set to the on state, the air conditioner is set to 26°C, and so on. The pre-stored applicable time can indicate the period of time during which the corresponding user will provide identity information to unlock. The processing controller 173 is, for example, a central processing unit, a microcontroller, a programmable logic controller, etc., and can execute a verification program and control the Internet electronic device 15. The detailed implementation content will be described later.

圖1以功能方塊及線條示例性地繪示驗證裝置17與其他裝置的連接關係及其所包含的元件。除了上述元件,驗證裝置17更可以包含操作介面或/及包含顯示介面,其中操作介面例如為多個按鍵,顯示介面例如為螢幕,操作介面與顯示介面亦可由一觸控螢幕實現。另外,以實體來說,驗證裝置17可以獨立設置,或可以與保全主機13或門鎖裝置11裝設於同一機殼內。或者,驗證裝置17可以包含設置於不同區域的多個部分。舉例來說,驗證裝置17可以有一部分的元件及電路與保全主機13裝設於同一機殼內,而另一部分的元件及電路與門鎖裝置11裝設於另一機殼內。進一步來說,驗證裝置17的處理控制器173可以包含兩個處理控制單元,分別例如為中央處理器、微控制器、可編程邏輯控制器等,且其一與保全主機13裝設於同一機殼內,另一則與門鎖裝置11裝設於另一機殼內。FIG. 1 exemplarily illustrates the connection relationship between the verification device 17 and other devices and the components included in the verification device 17 with functional blocks and lines. In addition to the above components, the verification device 17 may further include an operation interface or/and a display interface, where the operation interface is, for example, a plurality of buttons, the display interface is, for example, a screen, and the operation interface and the display interface can also be implemented by a touch screen. In addition, in terms of entities, the verification device 17 can be installed independently, or can be installed in the same casing as the security host 13 or the door lock device 11. Alternatively, the verification device 17 may include a plurality of parts arranged in different areas. For example, the verification device 17 may have a part of the components and circuits installed in the same housing as the security host 13, and another part of the components and circuits and the door lock device 11 may be installed in another housing. Furthermore, the processing controller 173 of the verification device 17 may include two processing control units, such as a central processing unit, a microcontroller, a programmable logic controller, etc., respectively, and one of them is installed in the same machine as the security host 13 Inside the casing, the other and the door lock device 11 are installed in another casing.

驗證裝置17用於取得待驗證身分資訊及保全狀態,依據待驗證身分資訊執行驗證程序,且在驗證程序通過時,控制門鎖裝置11執行解鎖動作,並依據保全狀態選擇性地產生對應於待驗證身分資訊的控制訊號,並傳送給互聯網電子裝置15。進一步來說,請參考圖1、圖2及圖3,其中圖2係依據本發明一實施例所繪示的保全系統1所執行之驗證程序的流程圖,圖3則係接續圖2之保全系統1在驗證程序通過時所執行的運作方法的流程圖。如圖2所示,於步驟S101中,驗證裝置17的處理控制器173從門鎖裝置11取得待驗證身分資訊。於步驟S103中,處理控制器173會判斷待驗證身分資訊是否符合記憶體171所存的多個預存身分資訊的其中一者。若否,則驗證程序未通過。若是,則於步驟S105中,驗證裝置17的處理控制器173會判斷接收待驗證身分資訊的時間是否符合對應於待驗證身分資訊的預存適用時間。若否,則驗證程序未通過;若是,則驗證程序通過。於此實施例中,驗證程序包含了多段式的驗證,除了驗證待驗證身分資訊的合法性,更驗證使用時間(即提供身分資訊的時間)的合法性,藉此可以降低待驗證身分資訊遭盜用的風險,提高系統辨識合法使用者的準確性,進而增進系統的安全性。The verification device 17 is used to obtain the identity information to be verified and the security status, perform a verification procedure based on the identity information to be verified, and when the verification procedure passes, control the door lock device 11 to perform an unlocking action, and selectively generate corresponding information corresponding to the security status according to the security status. The control signal for verifying the identity information is sent to the Internet electronic device 15. Further, please refer to FIGS. 1, 2 and 3, where FIG. 2 is a flowchart of the verification procedure executed by the security system 1 according to an embodiment of the present invention, and FIG. 3 is a continuation of the security of FIG. 2 A flowchart of the operation method executed by the system 1 when the verification procedure is passed. As shown in FIG. 2, in step S101, the processing controller 173 of the verification device 17 obtains the identity information to be verified from the door lock device 11. In step S103, the processing controller 173 determines whether the identity information to be verified matches one of the plurality of pre-stored identity information stored in the memory 171. If not, the verification procedure has not passed. If so, in step S105, the processing controller 173 of the verification device 17 determines whether the time of receiving the identity information to be verified matches the pre-stored applicable time corresponding to the identity information to be verified. If not, the verification procedure has not passed; if it is, the verification procedure has passed. In this embodiment, the verification procedure includes a multi-stage verification. In addition to verifying the legitimacy of the identity information to be verified, it also verifies the legitimacy of the usage time (that is, the time for providing the identity information), thereby reducing the damage to the identity information to be verified. The risk of misappropriation improves the accuracy of the system in identifying legitimate users, thereby enhancing the security of the system.

更進一步來說,雖然透過上述身分資訊及使用時間的雙重驗證可以增加系統安全性。然而,對於某些使用者而言,其使用時間並無特定規律,或者對於一般使用者而言,偶有突發狀況而需臨時進入室內,此時便無法通過上述使用時間的驗證而被判定為欲非法入侵者。因此,本發明亦提出另一種驗證程序,包含上一實施例所述的步驟S101及步驟S103,而驗證裝置17在判斷接收待驗證身分資訊的時間不符合對應於待驗證身分資訊的預存適用時間時,會再特別執行生物特徵驗證。詳細來說,驗證裝置17會產生生物特徵輸入請求並透過門鎖裝置11輸出,以提示使用者輸入生物特徵資訊。當驗證裝置17從門鎖裝置11接收到生物特徵資訊時,會判斷其是否符合預存身分資訊中對應於先前判斷合法之待驗證身分資訊的使用者的生物特徵,若是,則驗證程序通過,若否,則驗證程序未通過。意即,當生物特徵驗證通過時,驗證程序通過。藉此,透過更多段的驗證,更可以提高系統辨識合法使用者的準確性。Furthermore, although the above-mentioned two-factor authentication of identity information and usage time can increase system security. However, for some users, there is no specific rule for their use time, or for general users, occasional emergencies and need to enter the room temporarily. At this time, they cannot be judged by the verification of the above use time. For illegal intruders. Therefore, the present invention also proposes another verification procedure, including steps S101 and S103 described in the previous embodiment, and the verification device 17 determines that the time of receiving the identity information to be verified does not match the pre-stored applicable time corresponding to the identity information to be verified. At that time, biometric verification will be carried out specially. Specifically, the verification device 17 generates a biometric input request and outputs it through the door lock device 11 to prompt the user to input biometric information. When the verification device 17 receives the biometric information from the door lock device 11, it will determine whether it matches the biometric characteristics of the user whose identity information has been previously determined to be legal to be verified in the pre-stored identity information. No, the verification procedure has not passed. This means that when the biometric verification is passed, the verification procedure is passed. In this way, through more verifications, the accuracy of the system in identifying legitimate users can be improved.

接著如圖3所示,當驗證程序通過時,於步驟S107中,驗證裝置17會判斷保全狀態是否指示完全監控狀態。若是,即當保全狀態指示監視狀態時,驗證裝置17可以執行步驟S109:依據判定身分資訊所對應的預設狀態產生互聯網電子裝置15的控制訊號,並將控制訊號傳送給互聯網電子裝置15。其中,所謂判定身分資訊係指在前述驗證程序中判定待驗證身分資訊所符合的預存身分資訊。以另個角度來說,當驗證程序通過時,待驗證身分資訊符合驗證裝置17的記憶體171所存之多個預存身分資訊中的一者,該者稱為判定身分資訊。另,如前所述,驗證裝置17的記憶體171儲存有一或多個使用者的預存身分資訊及各使用者偏好之互聯網電子裝置15的預設狀態,其中預設狀態可以表示所對應之使用者所偏好的互聯網電子裝置15的運作狀態。因此,驗證裝置17藉由依據判定身分資訊所對應的預設狀態產生互聯網電子裝置15的控制訊號並將其傳送給互聯網電子裝置15,便可以控制互聯網電子裝置15處於提供待驗證身分資訊的使用者所偏好的運作狀態。Next, as shown in FIG. 3, when the verification procedure is passed, in step S107, the verification device 17 will determine whether the security state indicates a full monitoring state. If so, that is, when the security state indicates the monitoring state, the verification device 17 can perform step S109: generate a control signal for the Internet electronic device 15 according to the preset state corresponding to the determined identity information, and transmit the control signal to the Internet electronic device 15. Among them, the so-called determined identity information refers to the pre-stored identity information determined in the aforementioned verification procedure that the identity information to be verified conforms to. From another perspective, when the verification process is passed, the identity information to be verified matches one of the plurality of pre-stored identity information stored in the memory 171 of the verification device 17, which is called the determined identity information. In addition, as mentioned above, the memory 171 of the verification device 17 stores the pre-stored identity information of one or more users and the preset state of the Internet electronic device 15 that each user prefers, wherein the preset state can indicate the corresponding use The operating state of the Internet electronic device 15 preferred by the user. Therefore, the verification device 17 generates the control signal of the Internet electronic device 15 according to the preset state corresponding to the determined identity information and transmits it to the Internet electronic device 15, so as to control the Internet electronic device 15 to provide the identity information to be verified. Operator’s preferred operating state.

另一方面,當保全狀態並非指示完全監控狀態而指示部分監控狀態時,於步驟S111中,驗證裝置17會比較判定身分資訊所對應的預設狀態的序位是否優先互聯網電子裝置15之目前狀態的序位。以使用情境來說明,當保全狀態指示部分監控狀態時,表示室內是有人在的,此時互聯網電子裝置15之目前狀態應已設定為位於室內者所偏好的運作狀態,因此驗證裝置17可以比較當前使用者與室內者的優先序位再行控制,藉此避免反覆調整互聯網電子裝置15之運作狀態的情形。進一步來說,驗證裝置17 的記憶體171除了前述實施例所提及的各項資訊,更可以儲存互聯網電子裝置15的多個預設狀態的優先序。驗證裝置17可以在驗證程序通過且保全狀態指示部分監控狀態時,比較互聯網電子裝置15的目前狀態與判定身分資訊所對應的預設狀態在優先序中的序位。當判定身分資訊所對應的預設狀態的序位較優先時,驗證裝置17可以執行步驟S109:依據判定身分資訊所對應的預設狀態來產生控制訊號,並將控制訊號傳送給互聯網電子裝置15。反之,當互聯網電子裝置15的目前狀態的序位較優先時,驗證裝置17則可以執行步驟S113:不產生互聯網電子裝置15的控制訊號,或是依據互聯網電子裝置15的目前狀態產生控制訊號並傳送給互聯網電子裝置15。On the other hand, when the security state does not indicate the complete monitoring state but indicates the partial monitoring state, in step S111, the verification device 17 compares and determines whether the sequence of the preset state corresponding to the identity information has priority over the current state of the Internet electronic device 15 The order of the position. In terms of usage scenarios, when the security status indicates part of the monitoring status, it means that there are people in the room. At this time, the current status of the Internet electronic device 15 should have been set to the operating status preferred by the person in the room, so the verification device 17 can be compared The priority of the current user and the indoor person is again controlled, so as to avoid the situation of repeatedly adjusting the operating state of the Internet electronic device 15. Furthermore, the memory 171 of the verification device 17 can store the priority sequence of multiple preset states of the Internet electronic device 15 in addition to the various information mentioned in the foregoing embodiment. The verification device 17 can compare the current state of the Internet electronic device 15 with the preset state corresponding to the identity information in the priority sequence when the verification process is passed and the preservation state indicates the partial monitoring state. When it is determined that the sequence of the preset state corresponding to the identity information is higher, the verification device 17 may perform step S109: generate a control signal according to the preset state corresponding to the determined identity information, and transmit the control signal to the Internet electronic device 15 . Conversely, when the current state of the Internet electronic device 15 has a higher priority, the verification device 17 can perform step S113: not generating a control signal for the Internet electronic device 15, or generating a control signal based on the current state of the Internet electronic device 15 and Transmit to the Internet electronic device 15.

另外,使用者可以透過驗證裝置17的操作介面或個人裝置來設定、變更或刪除其預存身分資訊、預存適用時間以及關聯於互聯網電子裝置15的預設狀態。驗證裝置17可以提供身分資訊的掛失機制。請一併參考圖1及圖4,圖4係依據本發明一實施例所繪示的保全系統1所執行之掛失機制的流程圖。進一步來說,掛失機制包含一驗證程序,有別於前列實施例所述之驗證程序。為了區隔二者,前列實施例所述之驗證程序可稱為第一驗證程序,而此實施例稱為第二驗證程序,前列實施例所述之待驗證身分資訊可稱為第一待驗證身分資訊,而此實施例稱為第二待驗證身分資訊。於此特別要說明的是,上述「第一」及「第二」無關於程序執行的順序或資訊產生的順序。In addition, the user can set, change or delete the pre-stored identity information, the pre-stored applicable time, and the default state associated with the Internet electronic device 15 through the operating interface of the authentication device 17 or a personal device. The verification device 17 can provide a mechanism for reporting loss of identity information. Please refer to FIG. 1 and FIG. 4 together. FIG. 4 is a flowchart of a loss reporting mechanism executed by the security system 1 according to an embodiment of the present invention. Furthermore, the loss reporting mechanism includes a verification procedure, which is different from the verification procedure described in the previous embodiment. In order to distinguish the two, the verification procedure described in the previous embodiment can be called the first verification procedure, and this embodiment is called the second verification procedure, and the identity information to be verified in the previous embodiment can be called the first verification procedure. Identity information, and this embodiment is called the second identity information to be verified. It is particularly important to note that the above-mentioned "first" and "second" have nothing to do with the sequence of program execution or the sequence of information generation.

如圖4所示,掛失機制包含步驟S201~S207。於步驟S201中,驗證裝置17透過操作介面或個人裝置接收一掛失請求,其中掛失請求包含代表申請者身分的第二待驗證身分資訊。於步驟S203中,驗證裝置17判斷第二待驗證身分資訊是否通過第二驗證程序。換句話說,驗證裝置17會依據第二待驗證身分資訊執行第二驗證程序,其中第二驗證程序的進一步執行內容將於後描述。當第二驗證程序通過時,於步驟S205中,驗證裝置17依據掛失請求使預存身分資訊中的至少一者失效。當第二驗證程序未通過時,於步驟S207中,驗證裝置17拒絕掛失請求,例如透過顯示介面或個人裝置顯示掛失失敗的畫面。As shown in Figure 4, the loss reporting mechanism includes steps S201 to S207. In step S201, the verification device 17 receives a loss report request through the operating interface or the personal device, where the loss report request includes the second identity information to be verified representing the identity of the applicant. In step S203, the verification device 17 determines whether the second to-be-verified identity information passes the second verification procedure. In other words, the verification device 17 executes the second verification procedure based on the second to-be-verified identity information, wherein the further execution content of the second verification procedure will be described later. When the second verification procedure is passed, in step S205, the verification device 17 invalidates at least one of the pre-stored identity information according to the loss report request. When the second verification procedure fails, in step S207, the verification device 17 rejects the loss report request, for example, through a display interface or a personal device to display a loss report failure screen.

於具有掛失機制的實施例中,驗證裝置17中所儲存的預存身分資訊包含多個使用者各自的可變更身分資訊及固定身分資訊。其中,可變更身分資訊顧名思義係指可變更的身分資訊,例如密碼、卡片中儲存的數位資料等;固定身分資訊則係指使用者不可變更或難以變更的身分資訊,例如臉型、指紋、聲紋、虹膜等。進一步來說明第二驗證程序,其可以包含判斷第二待驗證身分資訊是否符合上述預存的固定身分資訊的其中一者。若是,則第二驗證程序通過,驗證裝置17據以使對應於第二驗證身分資訊的可變更身分資訊失效。更進一步來說,驗證裝置17可以藉由將可變更身分資訊刪除或是將其設為黑名單,以使可變更身分資訊失效。另外,驗證裝置17亦可以對預存身分資訊中的可變更身分資訊定期地進行主動變更,並將變更的預存身分資訊傳送至對應的使用者的個人裝置。藉由上述定期變更及掛失的機制,可以降低使用者的可變更身分資訊諸如密碼、卡片等遭盜用的風險。In an embodiment with a loss reporting mechanism, the pre-stored identity information stored in the verification device 17 includes the changeable identity information and fixed identity information of multiple users. Among them, the changeable identity information, as the name implies, refers to the changeable identity information, such as passwords, digital data stored in the card, etc.; the fixed identity information refers to the user’s unchangeable or difficult to change identity information, such as face shape, fingerprints, and voiceprints. , Iris, etc. To further illustrate the second verification procedure, it may include determining whether the second identity information to be verified conforms to one of the above-mentioned pre-stored fixed identity information. If so, the second verification procedure is passed, and the verification device 17 invalidates the changeable identity information corresponding to the second verification identity information. Furthermore, the verification device 17 can invalidate the changeable identity information by deleting the changeable identity information or setting it to a blacklist. In addition, the verification device 17 can also actively change the changeable identity information in the pre-stored identity information on a regular basis, and send the changed pre-stored identity information to the corresponding user's personal device. Through the above-mentioned periodic change and loss reporting mechanism, the risk of the user's changeable identity information such as passwords and cards being stolen can be reduced.

本發明亦提出一種包含多個驗證裝置的保全系統。請參考圖5,圖5係依據本發明另一實施例所繪示的保全系統的功能方塊圖。如圖5所示,保全系統1’可以包含門鎖裝置11、保全主機13、互聯網電子裝置15、第一驗證裝置17a、第二驗證裝置17b及管制中心主機19,其中,第一驗證裝置17a連接門鎖裝置11、保全主機13及互聯網電子裝置15,互聯網電子裝置15連接於保全主機13,且管制中心主機19連接於保全主機13及第二驗證裝置17b。上述各裝置之間的連接方式可以係有線通訊方式或無線通訊方式,此二方式之舉例如前所列,於此不再贅述。保全系統1’的門鎖裝置11、保全主機13、互聯網電子裝置15及第一驗證裝置17a各自可實現的電路或裝置、功能以及彼此間的協同運作皆如同圖1實施例的保全系統1的門鎖裝置11、保全主機13、互聯網電子裝置15及驗證裝置17,於此不再贅述。The present invention also provides a security system including multiple verification devices. Please refer to FIG. 5, which is a functional block diagram of a security system according to another embodiment of the present invention. As shown in FIG. 5, the security system 1'may include a door lock device 11, a security host 13, an Internet electronic device 15, a first verification device 17a, a second verification device 17b, and a control center host 19, wherein the first verification device 17a The door lock device 11, the security host 13 and the Internet electronic device 15 are connected. The Internet electronic device 15 is connected to the security host 13, and the control center host 19 is connected to the security host 13 and the second verification device 17b. The connection mode between the above-mentioned devices can be wired communication mode or wireless communication mode. Examples of these two modes are listed above and will not be repeated here. The door lock device 11, the security host 13, the Internet electronic device 15, and the first verification device 17a of the security system 1'can implement circuits or devices, functions, and coordination operations with each other are the same as those of the security system 1 in the embodiment of FIG. 1 The door lock device 11, the security host 13, the Internet electronic device 15 and the verification device 17 are not described here.

保全系統1’相較於保全系統1,更包含了管制中心主機19及第二驗證裝置17b,其中管制中心主機19同於圖1中與保全系統1連接的管制中心主機2,於此不再贅述。第二驗證裝置17b類似於圖1的驗證裝置17,包含記憶體171及處理控制器173,其中這些元件各自的功能及運作皆同前列圖1實施例所述,於此不再贅述。另外,第二驗證裝置17b更包含一身分資訊接收器,例如為密碼鍵、讀卡機、攝像機、生物特徵感應器等,用於接收待驗證身分資訊,依據待驗證身分資訊執行驗證程序,其中驗證程序的詳細實施內容同於前列圖2的實施例所述,於此不再贅述。第二驗證裝置17b另可以透過管制中心主機19取得保全主機13的保全狀態,且在驗證程序通過時,依據保全狀態選擇性地產生對應於待驗證身分資訊的控制訊號,並透過管制中心主機19將控制訊號傳送至該保全主機13,再由保全主機13傳送控制訊號給互聯網電子裝置15,以控制互聯網電子裝置15作動。其中,第二驗證裝置17b在驗證程序通過時所執行之依據保全狀態選擇性地產生對應於待驗證身分資訊的互聯網電子裝置15之控制訊號的詳細實施內容同於前列圖3的實施例所述,於此不再贅述。Compared with the security system 1, the security system 1'further includes a control center host 19 and a second verification device 17b. The control center host 19 is the same as the control center host 2 connected to the security system 1 in FIG. Go into details. The second verification device 17b is similar to the verification device 17 in FIG. 1 and includes a memory 171 and a processing controller 173. The functions and operations of these components are the same as those described in the previous embodiment in FIG. 1 and will not be repeated here. In addition, the second verification device 17b further includes an identity information receiver, such as a password key, a card reader, a camera, a biometric sensor, etc., for receiving identity information to be verified, and performing a verification process based on the identity information to be verified. The detailed implementation content of the verification procedure is the same as that described in the previous embodiment in FIG. 2, and will not be repeated here. The second verification device 17b can also obtain the security status of the security host 13 through the control center host 19, and when the verification process passes, it selectively generates a control signal corresponding to the identity information to be verified according to the security status, and passes the control center host 19 The control signal is sent to the security host 13, and then the security host 13 sends the control signal to the Internet electronic device 15 to control the action of the Internet electronic device 15. The detailed implementation content of the control signal of the Internet electronic device 15 corresponding to the identity information to be verified that is executed by the second verification device 17b when the verification procedure is passed is the same as that described in the previous embodiment of FIG. 3 according to the security status. , I won’t repeat it here.

保全系統1’相較於保全系統1至少多了一驗證裝置。進一步來說,在設置關係上,保全系統1’的第一驗證裝置17a的設置位置與保全主機13的設置位置之間的距離小於第二驗證裝置17b的設置位置與該保全主機13的設置位置之間的距離。以使用情境來說明,保全主機13可以設置於大樓中的住戶室內;門鎖裝置11可以設置於該住戶的家門;第一驗證裝置17a可以設置於室內或家門,特別係保全主機13與門鎖裝置11之間;第二驗證裝置17b則可以設置於大樓的大門鎖、電梯鎖或是其他比家門與保全主機13之間的距離更遠的地方。如此一來,保全系統1’可以在使用者抵達家門之前便依據使用者所設定的預設狀態控制互聯網電子裝置15,使得互聯網電子裝置15可以有更多的前置作業時間來達成預設狀態。Compared with the security system 1, the security system 1'has at least one more verification device. Furthermore, in terms of the setting relationship, the distance between the setting position of the first verification device 17a of the security system 1'and the setting position of the security host 13 is smaller than the setting position of the second verification device 17b and the setting position of the security host 13 the distance between. In terms of usage scenarios, the security host 13 can be installed in the residence of the building; the door lock device 11 can be installed in the door of the household; the first verification device 17a can be installed in the room or the door, especially the security host 13 and the door lock Between the device 11; the second verification device 17b can be set in the door lock of the building, elevator lock or other places farther than the distance between the door and the security host 13. In this way, the security system 1'can control the Internet electronic device 15 according to the preset state set by the user before the user arrives at the home, so that the Internet electronic device 15 can have more pre-work time to reach the preset state .

藉由上述結構,本案所揭示的保全系統結合門禁與智能控制電子裝置的功能,可以在確認使用者之身分驗證通過時,依據保全狀態適應地控制互聯網中的電子裝置,藉此提升使用便利性。另外,藉由多段式的身分驗證,本案所揭示的保全系統可以降低待驗證身分資訊遭盜用的風險,提高系統辨識合法使用者的準確性,進而增進系統的安全性。With the above structure, the security system disclosed in this case combines the functions of access control and intelligent control of electronic devices, which can adaptively control the electronic devices on the Internet according to the security status when confirming that the user's identity verification is passed, thereby improving the convenience of use . In addition, with multi-stage identity verification, the security system disclosed in this case can reduce the risk of theft of identity information to be verified, improve the accuracy of the system in identifying legitimate users, and thereby enhance the security of the system.

雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed in the foregoing embodiments, it is not intended to limit the present invention. All changes and modifications made without departing from the spirit and scope of the present invention fall within the scope of the patent protection of the present invention. For the scope of protection defined by the present invention, please refer to the attached scope of patent application.

1 、1’:保全系統 2、19:管制中心主機 11:門鎖裝置 13:保全主機 15:互聯網電子裝置 17:驗證裝置 17a:第一驗證裝置 17b:第二驗證裝置 171:記憶體 173:處理控制器1, 1’: Security system 2.19: Control center host 11: Door lock device 13: Secure the host 15: Internet electronic devices 17: Verification device 17a: The first verification device 17b: Second verification device 171: Memory 173: Processing Controller

圖1係依據本發明一實施例所繪示的保全系統的功能方塊圖。 圖2係依據本發明一實施例所繪示的保全系統所執行之驗證程序的流程圖。 圖3係依據本發明一實施例所繪示的保全系統在驗證程序通過時所執行的運作方法的流程圖。 圖4係依據本發明一實施例所繪示的保全系統所執行之掛失機制的流程圖。 圖5係依據本發明另一實施例所繪示的保全系統的功能方塊圖。FIG. 1 is a functional block diagram of a security system according to an embodiment of the present invention. 2 is a flowchart of a verification procedure executed by the security system according to an embodiment of the present invention. FIG. 3 is a flowchart of an operation method executed by the security system when the verification procedure is passed according to an embodiment of the present invention. 4 is a flowchart of a loss reporting mechanism executed by the security system according to an embodiment of the present invention. FIG. 5 is a functional block diagram of a security system according to another embodiment of the present invention.

1:保全系統1: Security system

2:管制中心主機2: Control center host

11:門鎖裝置11: Door lock device

13:保全主機13: Secure the host

15:互聯網電子裝置15: Internet electronic devices

17:驗證裝置17: Verification device

171:記憶體171: Memory

173:處理控制器173: Processing Controller

Claims (10)

一種保全系統,包含: 一門鎖裝置,用於接收一待驗證身分資訊,並受控以執行一解鎖動作; 一保全主機,具有一保全狀態,該保全狀態指示一完全監控狀態或一部分監控狀態; 一驗證裝置,連接於該門鎖裝置及該保全主機,用於依據該待驗證身分資訊執行一驗證程序,且在該驗證程序通過時,控制該門鎖裝置執行該解鎖動作,並依據該保全狀態選擇性地產生對應於該待驗證身分資訊的一控制訊號;以及 一互聯網電子裝置,連接於該驗證裝置及該保全主機,且用於依據該控制訊號作動。A security system includes: a door lock device for receiving a piece of identity information to be verified and controlled to perform an unlocking action; A security host has a security state, and the security state indicates a complete monitoring state or a part of the monitoring state; A verification device, connected to the door lock device and the security host, is used to execute a verification procedure based on the identity information to be verified, and when the verification procedure passes, control the door lock device to perform the unlocking action, and according to the security The state selectively generates a control signal corresponding to the identity information to be verified; and An Internet electronic device is connected to the verification device and the security host, and is used to act according to the control signal. 如請求項1所述的保全系統,其中該驗證裝置係一第一驗證裝置,且該保全系統更包含: 一管制中心主機,連接於該保全主機;以及 一第二驗證裝置,連接於該管制中心主機,用於接收該待驗證身分資訊,依據該待驗證身分資訊執行該驗證程序,且在該驗證程序通過時,依據該保全狀態選擇性地產生對應於該待驗證身分資訊的該控制訊號並透過該管制中心主機將該控制訊號傳送至該保全主機。The security system according to claim 1, wherein the verification device is a first verification device, and the security system further comprises: a control center host connected to the security host; and A second verification device, connected to the host of the control center, is used to receive the identity information to be verified, execute the verification procedure based on the identity information to be verified, and when the verification procedure passes, selectively generate corresponding corresponding information based on the security status The control signal of the identity information to be verified is transmitted to the security host through the host of the control center. 如請求項2所述的保全系統,其中該第一驗證裝置的設置位置與該保全主機的設置位置之間的距離小於該第二驗證裝置的設置位置與該保全主機的設置位置之間的距離。The security system according to claim 2, wherein the distance between the installation position of the first verification device and the installation position of the security host is smaller than the distance between the installation position of the second verification device and the installation location of the security host . 如請求項2所述的保全系統,其中該第二驗證裝置包含一記憶體儲存有多個預存身分資訊及該互聯網電子裝置的多個預設狀態,該些預設狀態分別對應於該些預存身分資訊,當該驗證程序通過時該待驗證身分資訊符合該些預存身分資訊中的一判定身分資訊,且該第二驗證裝置所執行之依據該保全狀態選擇性地產生對應於該待驗證身分資訊的該控制訊號包含當該保全狀態指示該完全監控狀態時,該第二驗證裝置依據該判定身分資訊所對應的該預設狀態產生該控制訊號。The security system according to claim 2, wherein the second verification device includes a memory storing a plurality of pre-stored identity information and a plurality of preset states of the Internet electronic device, the preset states respectively corresponding to the pre-stored Identity information, when the verification process passes, the identity information to be verified conforms to one of the pre-stored identity information, and the second verification device is executed to selectively generate the identity information corresponding to the identity to be verified based on the security status The control signal of the information includes when the security state indicates the full monitoring state, the second verification device generates the control signal according to the preset state corresponding to the determined identity information. 如請求項2所述的保全系統,其中該第二驗證裝置包含一記憶體儲存有多個預存身分資訊、該互聯網電子裝置的多個預設狀態及該些預設狀態的一優先序,該些預設狀態分別對應於該些預存身分資訊,當該驗證程序通過時該待驗證身分資訊符合該些預存身分資訊中的一判定身分資訊,且該第二驗證裝置所執行之依據該保全狀態選擇性地產生對應於該待驗證身分資訊的該控制訊號包含當該保全狀態指示該部分監控狀態時,該第二驗證裝置比較該互聯網電子裝置的一目前狀態與該判定身分資訊所對應的該預設狀態在該優先序中的序位,當該判定身分資訊所對應的該預設狀態的該序位較優先時,依據該判定身分資訊所對應的該預設狀態產生該控制訊號。The security system according to claim 2, wherein the second verification device includes a memory storing a plurality of pre-stored identity information, a plurality of preset states of the Internet electronic device, and a priority order of the preset states, the The preset states respectively correspond to the pre-stored identity information. When the verification process passes, the identity information to be verified matches a judged identity information in the pre-stored identity information, and the second verification device executes based on the preservation state Selectively generating the control signal corresponding to the identity information to be verified includes when the security state indicates the partial monitoring state, the second verification device compares a current state of the Internet electronic device with the determined identity information corresponding to the The sequence of the preset state in the priority sequence, and when the sequence of the preset state corresponding to the judgment identity information has a higher priority, the control signal is generated according to the preset state corresponding to the judgment identity information. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊及該互聯網電子裝置的多個預設狀態,該些預設狀態分別對應於該些預存身分資訊,當該驗證程序通過時該待驗證身分資訊符合該些預存身分資訊中的一判定身分資訊,且該驗證裝置所執行之依據該保全狀態選擇性地產生對應於該待驗證身分資訊的該控制訊號包含當該保全狀態指示該完全監控狀態時,該驗證裝置依據該判定身分資訊所對應的該預設狀態產生該控制訊號。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information and a plurality of preset states of the Internet electronic device, and the preset states respectively correspond to the pre-stored identity information , When the verification process is passed, the identity information to be verified matches one of the pre-stored identity information, and the verification device executes the control to selectively generate the identity information to be verified based on the security status The signal includes that when the security state indicates the full monitoring state, the verification device generates the control signal according to the preset state corresponding to the determined identity information. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊、該互聯網電子裝置的多個預設狀態及該些預設狀態的一優先序,該些預設狀態分別對應於該些預存身分資訊,當該驗證程序通過時該待驗證身分資訊符合該些預存身分資訊中的一判定身分資訊,且該驗證裝置所執行之依據該保全狀態選擇性地產生對應於該待驗證身分資訊的該控制訊號包含當該保全狀態指示該部分監控狀態時,該驗證裝置比較該互聯網電子裝置的一目前狀態與該判定身分資訊所對應的該預設狀態在該優先序中的序位,當該判定身分資訊所對應的該預設狀態的該序位較優先時,依據該判定身分資訊所對應的該預設狀態產生該控制訊號。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information, a plurality of preset states of the Internet electronic device, and a priority order of the preset states, and the preset states Suppose the statuses correspond to the pre-stored identity information. When the verification process passes, the identity information to be verified matches one of the pre-stored identity information, and the verification device executes selectively based on the preservation status. The control signal corresponding to the identity information to be verified includes that when the security state indicates the partial monitoring state, the verification device compares a current state of the Internet electronic device with the preset state corresponding to the determined identity information in the priority The sequence in the sequence, when the sequence of the preset state corresponding to the determination identity information has priority, the control signal is generated according to the default state corresponding to the determination identity information. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊及分別對應於該些預存身分資訊的多個預存適用時間,該驗證程序包含判斷該待驗證身分資訊是否符合該些預存身分資訊的其中一者,若否,則該驗證程序未通過,若是,則判斷接收該待驗證身分資訊的時間是否符合該些預存適用時間中對應於該待驗證身分資訊的一者,若否,則該驗證程序未通過,若是,則該驗證程序通過。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information and a plurality of pre-stored applicable times respectively corresponding to the pre-stored identity information, and the verification procedure includes determining the identity to be verified Whether the information conforms to one of the pre-stored identity information, if not, the verification process has not passed, if yes, judge whether the time of receiving the identity information to be verified meets the pre-stored applicable time corresponding to the identity information to be verified If it is not, the verification procedure is not passed, and if it is, the verification procedure is passed. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊及分別對應於該些預存身分資訊的多個預存適用時間,該驗證程序包含判斷該待驗證身分資訊是否符合該些預存身分資訊的其中一者,若否,則該驗證程序未通過,若是,則判斷接收該待驗證身分資訊的時間是否符合該些預存適用時間中對應於該待驗證身分資訊的一者,若是,則該驗證程序通過,若否,則執行一生物特徵驗證,且當該生物特徵驗證通過時,該驗證程序通過。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information and a plurality of pre-stored applicable times respectively corresponding to the pre-stored identity information, and the verification procedure includes determining the identity to be verified Whether the information conforms to one of the pre-stored identity information, if not, the verification process has not passed, if yes, judge whether the time of receiving the identity information to be verified meets the pre-stored applicable time corresponding to the identity information to be verified If it is, the verification procedure is passed, if not, a biometric verification is performed, and when the biometric verification is passed, the verification procedure is passed. 如請求項1所述的保全系統,其中該驗證裝置包含一記憶體儲存有多個預存身分資訊分別對應於多個使用者,且該驗證裝置更用於定期地變更該些預存身分資訊,並將變更的該些預存身分資訊分別傳送至該些使用者的個人裝置。The security system according to claim 1, wherein the verification device includes a memory storing a plurality of pre-stored identity information corresponding to a plurality of users, and the verification device is further used to periodically change the pre-stored identity information, and Send the changed pre-stored identity information to the personal devices of the users.
TW108148413A 2019-12-30 2019-12-30 Security system TWI715391B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW108148413A TWI715391B (en) 2019-12-30 2019-12-30 Security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW108148413A TWI715391B (en) 2019-12-30 2019-12-30 Security system

Publications (2)

Publication Number Publication Date
TWI715391B TWI715391B (en) 2021-01-01
TW202125424A true TW202125424A (en) 2021-07-01

Family

ID=75237171

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108148413A TWI715391B (en) 2019-12-30 2019-12-30 Security system

Country Status (1)

Country Link
TW (1) TWI715391B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1239800C (en) 1999-11-30 2006-02-01 博丁数字有限公司 Electronic key device, system and method of managing electronic key information
CN110246246A (en) * 2019-05-22 2019-09-17 河北简已网络信息技术有限公司 Access control management method and device
CN110533802A (en) * 2019-07-17 2019-12-03 浙江大华技术股份有限公司 Access control equipment control method, device, equipment, system and storage medium

Also Published As

Publication number Publication date
TWI715391B (en) 2021-01-01

Similar Documents

Publication Publication Date Title
US11282314B2 (en) Systems and methods for controlling access to physical space
KR20230078611A (en) Method and system for managing a door entry using beacon signal
KR101632944B1 (en) Access control method, apparatus and system using wireless signal detector
KR101570463B1 (en) Portable terminals and door locks are interlocked
KR102483794B1 (en) Entrance management system and method thereof
EP3923252A1 (en) Biometric enabled access control
KR102328402B1 (en) Smart door look control system and method
CA2956070C (en) Natural language user interface
KR101765080B1 (en) smart door lock system based on iot and the method thereof
WO2005031672A1 (en) Security management device, security management method, security management program, and computer-readable recording medium
US20210209211A1 (en) Pin verification
JP4402135B2 (en) Device control system, portable terminal and control device
JP6765070B2 (en) Electric lock system and electric lock device
TWI729657B (en) Security system
TWI715391B (en) Security system
TWI591246B (en) Access control system with automatic unlocking function and its unlocking method
US10303137B2 (en) Structure modes for controlling various systems in closed environments
TWI735121B (en) Security system
EP1732050A1 (en) Apparatus control system
JP7026321B2 (en) Warning systems, communication devices, and monitoring devices
KR20200140024A (en) Entrance management system and method thereof
JP2020125666A (en) Electronic unlocking management system and program
JP6919763B2 (en) Wireless communication device and entry / exit management system
KR20220064239A (en) Access Control Apparatus Capable of Control the Doorlock by Using Key provided through Bluetooth Broadcasting and Control Method thereof
KR20230161748A (en) System for configuring smart blockchain city