470918 五、發明說明(1) 發明領域 t發明概言之係關於防止未經授 關於運用讀取器來防止此種;經授= 如ΐ ΐ ί ί智慧卡與智慧卡讀取器正與生物測定 m器,結合以驗證使用*。雖然該等系 疋盜用者可藉由使用所有者之手指以及 曰慧卡存取鑰來盜用此種系統。因此,兩 „權使用並很容易建構之系統及;::; 有成本效益且容易調整成為適用於現有架構。除 ni增加最少量之複雜度至總體智慧卡或讀 構。本發明滿足此種需求。 發明摘要 明係針對一種用以防止未經授權存取一環 1在第一方面,該系統包含一讀取裝置以 定資訊,與一生物測定裝置以提供 =之身伤之資訊至該讀取裝置。該系統最後包 裝置,以檢測使用者之健康並提供關於使用 訊至該讀取裝置。 ώ i第”面,該方法包含自使用者讀取生物測 自使用者項取健康資訊。如果生物測定資訊很準 育訊受到檢測,則該方法也包含允許使用者存取 一,此’本案提供一種系統及方&,以藉由使用 疋裝置與一可檢測使用者之健康之裝置,亦即醫 ,且更明 入° 裝置,例 統可有效 使用者之 可防止此 系統應具 此之外, 取器架 境之系統 自一使用 相關於使 含一檢測 健康之資 定資訊及 確且健康 該環境。 一生物測 用脈搏 470918 五、發明說明(2) 氧計,來防止未經授權之使用者存取一環境。本發明將允 許藉由該等組件之此種合作來防止未經授權存取一特定環 附圖簡單說明 圖1是一傳統讀取器與一生物測定裝置之方塊圖。 -圖2是根據本發明之一系統之第一實例的方塊圖。 丨圖3是根據本發明之一系統之第二實例的方塊圖。 圖4是展示根據本發明之系統及方法之運作的流程圖。 詳細說明 本發明概言之係關於防止未經授權進入一系統,且更明 確地說係關於運用讀取器來防止此種未經授權進入。下列 說明是用以使得普通熟悉本技術領域者可製造及使用本發 明’且是以一專利申請及其之需求之方式來提供。熟悉本 技術領域者應可輕易提出本文所述之較佳實例及通屬原理 及特點之各種修改。因此,本發明並未意謂受限於所展示 之實例’而是符合本文所述之原理及特點之最大範疇。 如前所提及,一典型讀取系統1〇展示於圖1。圖1展示一 通常為智慧卡讀取器1 2之讀取器。其接收來自生物測定裝 置14,例如指紋掃描器,之輸入。當指紋16施加於生物^ 定裝置14時,該身份資訊接著傳送至讀取器12以查看是否 存在一匹配。如果存在一匹配,則使用者對於讀取器丨2 連接f特定裝置具有經授權之進入權利。如前所提及,如 果該等手指被偷,則竊賊可未經授權存取讀取器丨2所 之環境。因此,本發明提供-種系統及方法以消除此種可 1^· 第7頁 470918 五、發明說明(3) 能。 現在請參看圖2,該圖是根據本發明之系統丨〇 〇及方法之 第一實例的方塊圖。如圖所示,存在一類似圖1之讀取器 12之項取器112。漬取器112麵接至生物測定裝置I"。^ 物測定裝置1 1 4也類似於圖1之生物測定裝置丨4。此環境之 生物測定裝置1 1 4也耦接至用以檢測使用者之健康之裝兄置 106。在一較佳實例中,裝置1〇6可為醫用脈搏血氧計。 、脈搏灰氧計是一種分光光度裝置,以檢測及計算氧合及 還原血紅素之差動光吸收來產生一稱為Sp〇2之量測,與 =:::。—光源及一光檢測器包含於一耳或手指探針 光[660奈米]與紅外線[94〇奈 f ,紅 血紅去曰;^ ., 疋用以5平估氧合及還原 、·素疋否存在於受到監測之毛細血管床 對於每一脈搏,該裝置解讀脈 (1内。 增加之紅外線吸收率的比值。此計匕:率與脈搏 曲線,且該等曲線使得經皮質雨決定之校準 輸入是提供至生物測定裝使置用ut之;分析,且此 身份及健康顯示給讀取器112此且3測=置m 手指未附著於一人,則將 五如果,例如,該 種障况’且因此未經授權 ,,月楚顯不 取之環境。 …、在存取頃取器1 1 2所存 在第一實例中,如圖3戶斤-, 裝置214皆直接提供輸 氧計2G6及生物測定 取器212,例如,脈搏灰氧計 470918 乓、發明說明(4) 讀取手指之指曱床之頂部,而生物測定裝置214讀取手 指底部之指紋。 心因此,藉由本發明,一系統及方法受到提供以防止未經 授權之使用者進入一環境。圖4是一展示根據本發明之系 =及方法之流程圖。在圖4中,使用者之身份受到讀取, 藉由步驟302。接著決定是否該使用者獲得授權,藉由步 04。如果該使用者未經授權,則禁止該使用者存取系 先。如果該使用者獲得授權,則健康受到量測,藉由步驟 。如果健康之證據不存在,藉由步驟3〇8,則該使用者 也無法存取。如果健康之證據存在,藉由步驟3丨〇,則存 取獲得授權,藉由步驟3 08。 在一使用指紋掃描器之較佳實例中,首先自底部讀取指 布以^得身份資訊,並提供身份資訊至讀取器。其後,自 孰^呀取指曱以循序方式來驗證使用者之健康。雖然普通 =了本技術領域者應可認知該二量測可以相同方式/同時 且該種使用屬於本發明之精神及範_。除此之外, 庫、胃發明一直使用一智慧卡讀取器來加以說明,本發明 部份戋草# t ^ ί貝 統,無論其是一計算系統之一 :ΐ 其他讀取系、統,本發明皆適用。 者存取一環产 f f統及方法以防止未經授權之使用 咏i兄,而此是耩由僅用一 檢測使用者之健康之_ w =用生物測定裝置以及一可 成。本發明允許藉由該等組件::::搏血氧計,來達 存取一特定環境。 5作來防止未經授權470918 V. Description of the invention (1) The field of invention t The general description of the invention relates to the prevention of unauthorized use of the reader to prevent this; Authorized = 如 ΐ ΐ ί ίSmart cards and smart card readers are in contact with biological Measure the device and combine to verify use *. Although these systems can be used by hackers by using the owner's fingers and smart card access keys. Therefore, two “right-to-use and easy-to-build systems and; ::; are cost-effective and easy to adapt to existing architectures. In addition to ni, the minimum amount of complexity is added to the overall smart card or reader structure. The present invention meets this The abstract of the invention is directed to a method for preventing unauthorized access to a ring. In the first aspect, the system includes a reading device to determine information and a biometric device to provide information about the injury to the reader. Take the device. The system finally includes a device to detect the user's health and provide information about the use of the device to the reading device. On the first side, the method includes reading biometrics from the user and taking health information from the user. If the biometric information is accurate, the method also includes allowing the user to access one. This case provides a system and method for using a device and a device that can detect the user's health. , That is, medical, and more clearly installed devices, such as effective users can prevent this system should be out of this, since the use of the system is related to the use of a set of information containing a health test information and Be sure and healthy for the environment. A biological test pulse 470918 V. Description of the invention (2) Oxygen meter to prevent unauthorized users from accessing an environment. The present invention will allow unauthorized access to a particular ring by such cooperation of these components. Brief Description of the Drawings Figure 1 is a block diagram of a conventional reader and a biometric device. -Figure 2 is a block diagram of a first example of a system according to the invention. 3 is a block diagram of a second example of a system according to the present invention. FIG. 4 is a flowchart showing the operation of the system and method according to the present invention. DETAILED DESCRIPTION The general description of the present invention relates to preventing unauthorized access to a system, and more specifically to using a reader to prevent such unauthorized access. The following description is provided to enable one of ordinary skill in the art to make and use the invention 'and is provided in the form of a patent application and its requirements. Those skilled in the art should be able to easily propose the preferred examples described herein and various modifications of the general principles and features. Accordingly, the invention is not intended to be limited to the examples shown, but is to be accorded the greatest scope of the principles and features described herein. As mentioned earlier, a typical reading system 10 is shown in FIG. Figure 1 shows a reader which is typically a smart card reader 12. It receives input from a biometric device 14, such as a fingerprint scanner. When the fingerprint 16 is applied to the biometric identification device 14, the identity information is then transmitted to the reader 12 to see if there is a match. If there is a match, the user has authorized access to the reader 2 connected to a particular device. As mentioned earlier, if such fingers are stolen, the thief can gain unauthorized access to the environment of the reader 2. Therefore, the present invention provides a system and method to eliminate such possible problems. 1 ^ Page 7 470918 V. Description of the Invention (3) Capability. Reference is now made to Fig. 2, which is a block diagram of a first example of a system and method according to the present invention. As shown, there is an item picker 112 similar to the reader 12 of FIG. The picker 112 is connected to the biometric device I ". ^ The physical measuring device 1 1 4 is also similar to the biological measuring device 4 of FIG. 1. The biometric device 1 1 4 of this environment is also coupled to the device 106 for detecting the health of the user. In a preferred embodiment, the device 106 can be a medical pulse oximeter. The pulse oximeter is a spectrophotometer device that detects and calculates the differential light absorption of oxygenation and reduced heme to produce a measurement called Sp02, and = :::. — The light source and a light detector are contained in one ear or finger probe light [660 nm] and infrared light [94 nm; f, red blood red; ^., 疋 is used to evaluate oxygenation and reduction by 5 levels,疋 Whether it exists in the capillary bed being monitored. For each pulse, the device interprets the pulse (within 1. The ratio of the increased infrared absorption rate. This is the rate and pulse curve, and these curves are determined by cortical rain. The calibration input is provided to the biometric device using the ut; analysis, and this identity and health are displayed to the reader 112, and 3 is measured = set m if the finger is not attached to a person, then five if, for example, the kind of obstacle What's more, because of this, the environment that Yue Chu showed no access to without authorization ... In the first example of the accessor 1 1 2 exists, as shown in Figure 3, the device 214 directly provides the oxygen meter 2G6 And biometric extractor 212, such as pulse oximeter 470918, description of the invention (4) read the top of the finger bed of the finger, and the biometric device 214 read the fingerprint of the bottom of the finger. A system and method are provided to prevent unauthorized The user enters an environment. Fig. 4 is a flowchart showing the system and method according to the present invention. In Fig. 4, the identity of the user is read through step 302. Then it is determined whether the user is authorized By step 04. If the user is unauthorized, prohibit the user from accessing it first. If the user is authorized, then health is measured by steps. If evidence of health does not exist, by Step 30, the user cannot access it. If evidence of health exists, access is authorized by step 3 丨 〇, and step 30 08. In a preferred example of using a fingerprint scanner First, read the finger cloth from the bottom to obtain the identity information, and provide the identity information to the reader. After that, you can take the fingers to verify the user's health in a sequential manner. One should be aware that the two measurements can be used in the same way / simultaneously and that such use belongs to the spirit and scope of the present invention. In addition, the library and stomach inventions have been described using a smart card reader.份 戋 草 # t ^ ί Regardless of whether it is one of a computing system: ΐ Other reading systems and systems, the present invention is applicable. Those who access a system and methods to prevent unauthorized use of the brother, and this is only by _ W = to detect the health of the user with a biometric device and an instrument. The present invention allows access to a specific environment by these components ::: oximeter. 5 actions to prevent undetected Authorized
第9頁 470918 五、發明說明(5) 雖然本發明一直根據所展示之實例來加以說明,普通熟 悉本技術領域者應可輕易認知該等實例存在許多變型,且 該等變型屬於本發明之精神及範疇以内。因此,在不脫離 附加之申請專利範圍之下,普通熟悉本技術領域者應可實 施許多修改。Page 470918 V. Description of the invention (5) Although the present invention has been explained based on the examples shown, those familiar with the technical field should easily recognize that there are many variations of these examples, and that these variations belong to the spirit of the present invention. And scope. Therefore, those skilled in the art should be able to implement many modifications without departing from the scope of the attached patent application.
第10頁Page 10