TW513512B - Security lock system and the administration way thereof - Google Patents

Security lock system and the administration way thereof Download PDF

Info

Publication number
TW513512B
TW513512B TW91104365A TW91104365A TW513512B TW 513512 B TW513512 B TW 513512B TW 91104365 A TW91104365 A TW 91104365A TW 91104365 A TW91104365 A TW 91104365A TW 513512 B TW513512 B TW 513512B
Authority
TW
Taiwan
Prior art keywords
lock
key
chip processor
electronic
password
Prior art date
Application number
TW91104365A
Other languages
Chinese (zh)
Inventor
Li-Chiau Wu
Shau-Feng Chen
You-Rung Shen
Yi-Wei Liu
Original Assignee
Li-Chiau Wu
Shau-Feng Chen
You-Rung Shen
Yi-Wei Liu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Li-Chiau Wu, Shau-Feng Chen, You-Rung Shen, Yi-Wei Liu filed Critical Li-Chiau Wu
Priority to TW91104365A priority Critical patent/TW513512B/en
Application granted granted Critical
Publication of TW513512B publication Critical patent/TW513512B/en

Links

Abstract

This invention relates to a security lock system and the administration way thereof, which including the steps of: obtaining and identifying users' fingerprints from the keyway end, sending a basic code accordingly to the lock end for confirmation, resend a series of random code back to the keyway end for an operation to make a single-usage code to be sent again to the lock end for re-confirmation to decide whether to open the lock or to refuse the users. The mechanisms mentioned above will effectively solve the conventional security problems caused by losing key, illegal code copy of remote controllers.

Description

^13512 A7 B7 、發明說明( 本發明係關於一種安全鎖系統及其管理方法,尤指_ 種㈣確認使帛者身分、具?重保障功能且可有效解決侧 鋒讼用問題的安全鎖系統管理方法。 人一般人在日常生活中,幾乎每天都要通過各種不同安 全鎖具系統的驗證,由最傳統的鑰匙鎖、遙控汽車鎖、π =片鎖等’其使用方式各有不同,但目的一致,均基於保 全目的。事實上,鎖具的歷史極其悠久,可謂自古即有, 隨著科技的進步,鎖具的形式已有顯著變化,安全性方面 的提升亦在不斷力求精進》但所謂「道高一尺、魔高一丈 」’鎖具时全性在犯罪㈣日歸學化與智慧化的狀況 下不斷遭受挑戰,如遙控式鎖具可能遭宵小—旁側錄其密 碼’傳統鎖具的錄匙—經遺失即有遭f用的危險性,此種 狀況,即使號稱為高科技的IC卡片,因不具持有者身份 辨識功能,如不慎遺失,亦難逃遭人冒㈣厄運。凡此種 種’皆在說明既有鎖具保全系統儘管不斷創新,其安全性 上仍有精進之空間。 心因此,本發明主要目的在提供一種具多重安全防護功 ^且^卩時確認使用者身分以有效解決側錄盜用及冒用 問4的安全鎖系統管理方法。 為達成前述目的採取的主要技術手段係令前述管理方 法包括下列步驟: 麵匙端取得並賴持有者之缺特徵,經核符後送 出餘迷端之基本密碼至鎖具端,提出開鎖請求; ,· --------訂---------線· (請先閱讀背面之注意事項再填寫本頁) 由鎖具端確認餘匙端的基本密碼,核符後送出一隨機^ 13512 A7 B7 、 Explanation of the invention (The present invention relates to a safety lock system and its management method, especially _ a kind of safety lock system that confirms the identity of the messenger, has a security function, and can effectively solve the problem of side-line litigation. Management methods: In the daily life, people generally pass the verification of various safety lock systems almost every day. The most traditional key locks, remote-controlled car locks, π = chip locks, etc. have different usage methods, but the purpose is the same. In fact, the history of locks is extremely long and can be said to have existed since ancient times. With the advancement of science and technology, the form of locks has changed significantly, and the improvement of security is constantly striving for improvement. "But the so-called" Daogao "One foot, one high, one foot" "The lock is constantly challenged under the condition that the crime is returned to school and intelligent the next day. For example, a remote-controlled lock may be subjected to a small night—record its password side by side." There is a danger of being used if lost. In this situation, even if the IC card is called high-tech, it does not have the identification function of the holder. If it is lost, it is difficult Escape from misfortune. All of these 'explains that despite the continuous innovation of existing lock security systems, there is still room for improvement in security. Therefore, the main purpose of the present invention is to provide a multi-safety protection function ^ and ^ Confirm the identity of the user at the time to effectively solve the security lock system management method of profile theft and fraud 4. The main technical means adopted to achieve the foregoing purpose is to make the foregoing management method include the following steps: Obtain and rely on the key end Some of the characteristics are lacking. After verification, the basic password of Yu Mi Dian is sent to the lock end, and the lock request is made;, -------- Order --------- line · (Please first Read the notes on the back and fill in this page) Confirm the basic password of the key on the lock end, and send a random after verification

513512 五、發明說明(上) 產生的亂數給输匙端; 鎖具^與輪匙端分別根據前述基本密碼及前述隨機亂 數進仃運算而產生一單次使用密碼; 餘4端送出單次使用密碼至鎖具端,與其本身產生的 密碼進行比對; 由鎖具端根據比對結果決定開鎖與否; ^别述的官理方法係利用指紋辨識技術確認鑰匙持有者 身^,並據以產生多重確認步驟的基本密碼,經與鑰匙端 作又叉驗€後始決定開鎖與否,藉此除可解決鑰匙遭冒用 同寺亦因夕重的交叉確認設計可確保鎖具使用的安全性 •則述鑰匙端的基本密碼包括持有者的指紋特徵值(Fp, FingerPrint)及一種子值(Seed)。 前述的運算步驟係㈣MD5演算法(Message—Dlgest513512 V. Description of the invention (above) The random number generated is given to the key input terminal; the lock ^ and the round key terminal respectively generate a single-use password based on the aforementioned basic password and the aforementioned random random number calculation; the remaining 4 terminals send out a single Use the password to the lock end to compare it with the password generated by itself; the lock end determines whether to unlock or not based on the comparison result; ^ The other official method is to use fingerprint recognition technology to confirm the key holder ^, and then The basic password that generates multiple confirmation steps is determined after re-checking with the key end. Whether to unlock the key or not can be used to solve the problem of fraudulent use of the key. The same cross-confirmation design can ensure the safety of the lock. • The basic password of the key end includes the fingerprint characteristic value (Fp, FingerPrint) of the holder and a seed value (Seed). The foregoing calculation steps are based on the MD5 algorithm (Message-Dlgest

Algorithm)。 /發明次—目的在提供-種具有❹功能的安全鎖系 統管理方法。 前述目的採取的技術手段係在錄匙端的功能模 ,、早立-借用模式,該借用模式包括下列步驟: 取得原持有者之指紋特徵,並完成_ ; 建立原持有者之基本密碼; 要求輸入借用者之指紋,並於取得 ,建立借用者之基本密碼; ^特徵後 經完成前述設定步驟後’無須更改鎖具端的任何設定 _ 4 ^張尺度適用(cns)A4^^ig χ挪公复) ---卜---:------# (請先閱讀背面之注意事項再填寫本頁) ----t--------- 513512 A7 五、發明說明( 二输端完成指紋特徵辨識,即可產生基本 山,,、,至鎖具鸲進行辨識,以完成開鎖作業。 結束前述鑰匙端之借用功能在以原持有者指紋啟動後即告 广用以達成前述目的之安全鎖系統係由至 鑰站與至少一電子鎖具所組成;其中, 該電子錄匙包括有: 一單晶>1處理H,係作為運算及控制中樞; :指、=識模組,係透過適當介面與前述單晶片處理 為、的輸入端連接; ;-記憶體’係與單晶片處理器連接,供儲存比對資料 一無線收發模組,係與前述單晶片處理器其中一組 =蟑連接,以供單晶片處理器與電子鎖具作雙向信號傳 線 —一顯示電路,係、設於單晶片處理器之輸出端上,以顯 示電子餘匙之功能狀態; 、 -電源電路,係供直紅作電料前述各主要元 又電子鎖具包括有: -單晶片處理器’係作為運算及控制中樞; -鎖具驅動電路,係受單晶片處理器㈣, 閉鎖狀態; 疋閉 -無線收發模組’係與前述單晶片處理器 W淳連接’以供單晶片處理器與電子鑰匙作雙向信號傳 本紙張尺度適用中國國家標準(CNS)A4規格(2ΐ〇Τ^^7^Ύ 資料 五、發明說明(y) 記憶體’係與單晶片處理器連接,供儲存比對 頌不電路’係設於單晶片處理器之輸 示電子鎖具之功能狀態; 乂”、、貝 -輸入電路’可由—鍵盤輯構成,其 理器之輸人端上,供使用者進行雜設枝操作 處 :電源電路’係供直流工作電源予前述各主要元件。 前述電子鑰匙的單晶片處理器可儲存及辨識持有者之 指紋=徵值及基本密碼,並運算產生單次使用密碼。 前述電子錄起的記憶體係供儲存借用者的指紋特徵值 及指紋驗證的錯誤次數。 前述電子鎖具的記憶體係供健存合法使用者的 限資料。 為使貴審查委員進-步瞭解前述目的及本發明之技 術特徵,茲附以圖式詳細說明如后: (一)圖式部分: 係本發明之系統示意圖。 係本發明之一工作流程圖。 係本發明又一工作流程圖。(借用模式) 係本發明電子錄匙之電路方塊圖。 係本發明電子输匙之詳細電路圖。 係本發明電子鎖具之電路方塊圖。 係本發明電子鎖具之詳細電路圖。 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 χ 297公釐Algorithm). / Invention time-The purpose is to provide a security lock system management method with a ❹ function. The technical means adopted for the aforementioned purpose is a functional model on the key-recording side, an early-lending-borrowing mode, which includes the following steps: obtaining the fingerprint characteristics of the original holder and completing _; establishing the basic password of the original holder; Requires the input of the borrower's fingerprint, and obtains the basic password of the borrower after obtaining it; ^ After completing the aforementioned setting steps after the feature 'no need to change any settings on the lock end _ 4 ^ Zhang scale applies (cns) A4 ^ ig (Repeat) --- Bu ---: ------ # (Please read the notes on the back before filling this page) ---- t --------- 513512 A7 V. Description of the invention (After the second input terminal completes the fingerprint feature identification, the basic mountain can be generated to identify the lock 鸲 to complete the unlocking operation. The borrowing function of the key end mentioned above will be widely used after the original holder's fingerprint is activated. The security lock system that achieves the aforementioned purpose is composed of a key station and at least one electronic lock; wherein, the electronic recording key includes: a single crystal > 1 processing H, which is used as an operation and control center;: means, = Modules are processed through the appropriate interface with the aforementioned single chip The input terminals of; are connected to a single-chip processor for storing comparison data. A wireless transceiver module is connected to one of the aforementioned single-chip processors = cockroach for single-chip processors. Two-way signal transmission line with electronic lock—a display circuit, which is set on the output end of the single-chip processor to display the functional status of the electronic spare key; and-the power supply circuit, which is used for direct red electricity Yuanyou electronic locks include: -Single-chip processor 'is used as the operation and control center; -Lock drive circuit, which is subject to the single-chip processor's locked state; The closed-wireless transceiver module' is processed with the aforementioned single-chip The device W is connected to 'for single-chip processor and electronic key for two-way signal transmission. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (2ΐ〇Τ ^^ 7 ^ Ύ Data 5. Invention description (y) Memory' It is connected with a single-chip processor for storing and comparing Songbu circuits. 'The function state of the input electronic lock set on the single-chip processor; 乂 ",,-input circuit' can be composed of-keyboard series, which On the input terminal of the device, the user can perform miscellaneous branches. The power circuit is used to supply DC working power to the aforementioned main components. The single-chip processor of the aforementioned electronic key can store and identify the fingerprint of the holder. Value and basic password, and calculation to generate a single-use password. The aforementioned electronic recording memory system is used to store the fingerprint characteristics of the borrower and the number of fingerprint verification errors. The aforementioned electronic lock memory system is used to store limited data of legal users. In order for your review committee to further understand the foregoing objects and the technical features of the present invention, detailed drawings are attached as follows: (1) Schematic part: is a schematic diagram of the system of the present invention. It is a workflow of the present invention. Fig. Is another working flowchart of the present invention. (Borrow mode) is a circuit block diagram of the electronic recording key of the present invention. It is a detailed circuit diagram of the electronic key of the present invention. It is a circuit block diagram of the electronic lock of the present invention. It is a detailed circuit diagram of the electronic lock of the present invention. This paper size is applicable to China National Standard (CNS) A4 (21 × 297 mm)

--------^---------^ (請先閱讀背面之注意事項再填寫本頁) 513512-------- ^ --------- ^ (Please read the notes on the back before filling this page) 513512

發明說明(γ) (二)圖號部分: (Γ10)電子输匙 (12)指紋辨識模組 (1 4)無線收發模組 (1 6 )電源電路 (2 1 )單晶片處理器 (2 3 )無線收發模組 (2 5 )顯示電路 (2 7)電源電路 、丄丄)單晶片處理器 (1 3 )記憶體 (15)顯示電路 (2 〇 )電子鎖具 (2 2 )鎖具驅動電路 (2 4)記憶體 (2 6 )輸入電路 士·日,丄々 (28)介面電路 有關本發明之安全鎖系統管 ,由至少-使用者合法持有—電子鑰二:弟一圖所不 成開鎖驗證程序後,使電子鎖 電子鎖具完 負八開鎖,其目的功效在於該 電子鑰廷必須由原使用者持有, ^ ^ # a ^ ^ W否則無法順利完成開鎖作 業,而其具體的官理方法,-一 、甶弟一圖所不的各項步驟完 成,其包括有: ^匙端取得朗識持有者之減特徵,經核符後送 出鍮匙端之基本密碼至鎖具端,提出開鎖請求; 由鎖具端確認鎗匙端的基本密碼,核符後送出一隨機 產生的亂數給鑰匙端; 鎖具端與输匙端分別根據前述基本密碼及前述隨機亂 數進行運异而產生一單次使用密碼; 鑰匙端送出單次使用密碼至鎖具端,與其本身產生的 密碼進行比對; 由鎖具端根據比對結果決定開鎖與否。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂---------線· A7 B7 、發明說明(“ 開鎖,j ^方去主。要在強調只有輸匙的合法持有者才能順利 和用單次使用密碼(〇ne-time password)的技術 沪㈣I側錄*用的危險性。其方法的具體内容係由输起 冻抑有者進行指紋比對後,若正確無誤,則配合鎖具 鳊產生早次使用密碼,並據以作為驗證之比對依據。 仏"首^鑰畦端會將儲存於内部的基本密碼(K eyID)傳送 、貞〃端,鎖具端收到基本密碼時,會利用基本密碼找出 使:者的指紋特徵㈣及鑰匙的種子值(Seed),並隨機產 生^亂數R回送給鑰匙端作為挑戰值(challenge value),當 錄匙端收到汉時,便利用MD5 Hash function計算出指: 特徵(FP)種子值(Seed)Seed及t數⑻的訊息摘要,此一 摘要即為只能使用-次的單次使用密碼 paSSW0rd),接著餘匙端便將此單次使用密碼傳送給鎖具端 鎖具‘收到鑰匙端計算出來的單次使用密碼後,便和本 身運异產生的密碼進行比較,若正確無誤即開鎖,否 會拒絕開鎖。 、’ 由上述可知,本發明主要目的在確保鑰匙合法持有者 的專用權,以避免遺失時遭人盜用。然而,絕對的專用權 部可能帶來使用上的不便,例如目前許多保全系統將指纹 辨識機制安裝在進行門禁管制的通道上,欲在通道出入者 必須通過指紋辨識。換言之,該保全系統係以“人,,作為 管制目標,此種方法固然有其安全上的考量,某些場合亦 確具功效,但對於許多可以授權的場合,力述保全系統限 制的絕對專用權,確實有其不便之處。 _ 8 本紙張尺度適用中國國家標準(CNS)A4規格(21Q χ 297公楚) (請先閱讀背面之注意事項再填寫本頁) -11----訂·--------.Description of the invention (γ) (II) Part number: (Γ10) Electronic key (12) Fingerprint identification module (1 4) Wireless transceiver module (1 6) Power circuit (2 1) Single chip processor (2 3 ) Wireless transceiver module (2 5) Display circuit (2 7) Power circuit, 丄 丄) Single-chip processor (1 3) Memory (15) Display circuit (2) Electronic lock (2 2) Lock drive circuit ( 2 4) Memory (2 6) input circuit, Japanese, 丄 々 (28) interface circuit related to the security lock system tube of the present invention, at least-legally held by the user-electronic key 2: the electronic lock can not be unlocked After verifying the program, the electronic lock of the electronic lock has been unlocked. The purpose and effect is that the electronic key must be held by the original user. ^ ^ # A ^ ^ W Otherwise, the unlocking operation cannot be successfully completed, and its specific official management Methods:-First, the steps that are not shown in the picture of the younger brother are completed, which include: ^ The key end obtains the minus characteristics of the consciousness holder. After verification, the basic key of the key end is sent to the lock end. Unlocking request; The basic password of the gun key end is confirmed by the lock end, and a randomly generated random number is sent after verification. The key end; the lock end and the key end respectively generate a single-use password based on the difference between the basic password and the random random number; the key end sends the single-use password to the lock end, and compares it with the password generated by itself; The lock end decides whether to unlock or not according to the comparison result. This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page) Order --------- line · A7 B7, invention description ( "Unlocking, let's go to the master. We must emphasize the danger of only using the legal holder of the key to successfully and use the single-use password (One-time password) technology. The specific content is that after the fingerprint comparison is performed by someone who has been frozen, if it is correct, an early-use password will be generated in conjunction with the lock and used as the basis for verification. 仏 " 首 ^ KEY 畦 端 will The stored basic password (K eyID) is transmitted to the chastity terminal. When the lock terminal receives the basic password, it will use the basic password to find the fingerprint characteristics of the messenger and the seed value of the key (Seed), and randomly generate it ^ The random number R is sent back to the key end as a challenge value. When the key is received by the recorder, it is convenient to use the MD5 Hash function to calculate the summary of the message: Seed (Fe), Seed, and t. , This summary is a one-time-use single-use password paSSW0rd) , And then the key side will send this single-use password to the lock side lock. 'After receiving the single-use password calculated by the key side, it will be compared with the password generated by its own transport. If it is correct, the lock will be unlocked. Refuse to unlock. From the above, it can be seen that the main purpose of the present invention is to ensure the exclusive right of the legal owner of the key to avoid misappropriation when lost. However, the absolute exclusive right department may cause inconvenience in use, such as many current The security system installs the fingerprint identification mechanism on the access control channel. Those who want to enter and exit the channel must pass fingerprint identification. In other words, the security system uses "people," as the control target, although this method has its security considerations. In some cases, it is effective, but for many occasions that can be authorized, it is true that there are inconveniences in stating the absolute exclusive right to limit the system. _ 8 This paper size applies to China National Standard (CNS) A4 (21Q χ 297). (Please read the precautions on the back before filling this page) -11 ---- Order · -------- .

---L-------------- (請先閒讀背面之注意事項再填寫本頁) 513512 A7--- L -------------- (Please read the precautions on the back before filling this page) 513512 A7

五、發明說明( 基於前述理由,本發明在不影響鑰匙持有者合法專用 的前提下,賦予可授權借用之彈性。意即,前述的電子錄 匙可以經由原持有者的授權而暫時借用錄匙,且透過精巧 的設計’使输匙再由原持有者指紋啟動後,即取消^用 功能:以確保該借用功能不致影響餘匙使用安全。其^體 方=係在前述錄匙端的功能選單下建立一借用模式了該借 用核式係由第三圖所示的各項步驟所達成,其包括有:曰 取得原持有者之指紋特徵,並完成辨識; 建立原持有者之基本密碼; 要求輸人借用者之指紋,並於取得借用者指紋特徵後 ,建立借用者之基本密碼; 由於鎖具端係根據餘匙端送出的基本密碼,由 出缺特徵與種子值,以配合隨機亂數產生單次使用戈 特:ΓΓΓ依據,故借用者只須在錄匙端完成二文 特徵辨識,即可順利送出基本密碼,因而並 端的任何設定,即可配合餘匙端完成驗證步驟與S3 可要二:::借*用者的身份辨識功能正常執行,餘匙端 了要求W者輸人數次频,叫 者指紋,,動-;二 ^未完成借用者指紋特徵設定之狀況。 内容,至=看;ί發明安全鎖系統管理方法之具體 電子餘匙及:;一執電:= (210 x 297 公釐) 訂· -線#----- j 丄 五、發明說明(《 該電子鑰匙(1〇)係如第四圖所示,其包括有: 一早晶片處理器(11),係作為運算及控制中樞; 曰一指j辨識模組(12),係透過適當介面與前述單 晶片處理器(1 1)的輸入端連接;於本實施例中,該介 面係指RS-232介面; ^ 一記憶體(1 3 ),係與單晶片處理器(丄1 )連接 ,供儲存比對資料; 一無線收發模組(14),係與前述單晶片處理器( 1 1 )其中一組I/O埠連接,以供單晶片處理器(丄工) $電子鎖具作雙向信號傳輸,如送出電子鑰匙本身的基本 始、碼、接收電子鎖具隨機產生的亂數等; 一顯示電路(1 5),係設於單晶片處理器(丄工) 之輸出端上,以顯示電子鑰匙之功能狀態; 一電源電路(16),係供直流工作電料前述各主 要元件;其中: 該單晶片處理器(1 1 )可由助8447單晶片構成, 其作為控制所有週邊模組的控制中心,又單晶片處理器( 11)本身亦可將電子餘匙合法持有者的指紋特徵、種子 值及據以組成的基本密碼記錄在程式之中。 該指紋辨識模組(1 2)可使用編號Fcpm的嵌入 式指紋辨識模組,FCP1G1是—個小型指紋辨識運算模组, 模組内的RISC微處理器和DSP晶片具有快速獨立運算功 能,f片即可處理並辨識指紋,無須再借助pc做指:辨 識運异’且FCPHH體積小,消耗功率低,可由電池供電 10 本紙張尺度適用中國國家標準(CNS^^1〇 χ的7公爱) (請先閱讀背面之注意事項再填寫本頁) --------^---------線- -I I I - )U512 A7 、發明說明(y) :維持運作。又FCP101提供多項操作指令(包括取像、建 檔、比對、個人資料存取)給外部使用,使用者 =〜and等通訊介面,將指令訊號傳送到咖 該記憶體(1 3 )係由EEPROM構成,主要在借用模 式下,用來儲存借用者的指紋特徵值及指紋驗證的錯誤次 數。 、有關前述電子鑰匙(10)其他主要元件與進一步的 連接關係,請參閱第五圖所示。 .又請參閱第六圖所示,該電子鎖具(2 〇 )係包括有 =單晶片處理H (2 1 係作為運算及控制中枢; —鎖具驅動電路(2 2 ),係受單晶片處理器(2工 )控制’以決定開閉鎖狀態; 一無線收發模組(2 3),係'與前述單晶片處理器( 2 1 ) /、中一組ί/〇埠連接,以供單晶片處理器(2 1 ) 时、(1〇)作雙向^號傳輸;如接收電子錄匙( )ϋ來的持有者基本密碼、送出本身隨機產生的亂數 、〆子料do) ’再接收電子料(1Q)送出的單 次使用密碼; 一記憶體(24),係與單晶片處理器(21)連接 ,供儲存比對資料; 一顯示電路(25),係設於單晶片處理器(21) 之輸出端上,以顯示電子鎖具之功能狀態; 11 本紙張尺度適财關⑽X挪 (請先閱讀背面之注意事項再填寫本頁) 訂---------線, 513512 五、發明說明(/ 〇 ) 一輸入電路( 於單晶片處理器( 設定及操作; 一電源電路( 要元件。 前述電路之具 前述單晶片處理器 其除執行各種運算 介面電路(2 8 ) 通,於本實施例中 A7 B7 Ο η \ ,其可由一鍵盤矩陣構成,係設 2 1 )之輸入端上,供使用者進行功能 27),係供直流工作電源予前述各主 體電路構造請參閱第七圖所示,其中, (2 1 )仍可由ΕΜ78447單晶片構成, 、比對工作外,其一 I/O埠上連接有一 ,以便與個人電腦連線,並進行程式溝 °亥面電路(2 8 )係由RS232構成 又單晶片處理器(21)透過無線收發模組(23) 接收電子錄匙(10)送出的單次使用密碼後,將與本身 運算產生的單次使㈣碼進行比對,如相符時,係透過鎖 具驅動電路(2 2 )執行開鎖動作,如比對不符,則鎖具 驅動電路(2 2 )不動作。 經上述說明可看出本發明之安全鎖系統及其管理方法 ’有關其功效與特點將分為以下數點加以分析: 一·安全性: 1·可同_觸匙的真偽及利用減辦識模組即時確 認電子餘匙持有者的身份。 2·不會有刷卡門禁系統中失卡冒用的危險性。 3·電子鑰匙具有鎖死功能,指紋連續多次驗證失敗即 鎖住鑰匙。 12 衣纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) -------訂—------線· A7 B7 、發明說明( 4. 5. 2. 3. 4. 電子输匙裡的資訊不易被複製,不需擔心使用者 的指紋影像被竊取。 利用單次使用密碼技術,使得外界無法竊取鑰匙 和門鎖的溝通訊號。 使用Hash function方法,驗證電子錄匙原持有 者或借用者的指紋特徵值,防止指紋特徵值由外 界被替換冒用的問題。 田已經被通報為遺失的電子瑜匙,被用來開鎖時 ’電子鎖具會發出警報。 •便利性: 結合刷卡和指紋辨識門禁系統的優點,只需一付 電子鑰匙,無需攜帶一大串傳統鑰匙,可謂電子 餘匙在手,方便又安全。 操作方法和一般鑰匙一樣,簡單且適合一般大眾 使用。 電子鑰廷可新增一位借用者的指紋,不必向電子鎖 具登記,使得你信任的人可借用你的電子鑰匙,並 可以保證其安全性。 電子鑰匙遺失時,不必更換新的電子鎖具,可直 接再申請-把新的電切匙,遺失的電子餘匙也 不怕被他人撿到而有冒用的危險。 解決在減㈣門鎖系統巾,目指㈣識器在管 制通道上,不能委託開鎖的問題。 •應用性: 13 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) -------訂---------線 A7 B7 發明說明(,上) 1_系統可做不同的應用,如門禁系统、汽機車鎖、 會員證、身份證明等等。 Λ 2.未來電子鑰匙可以跟電子商務結合,如儲 卡資訊、電子錢包,以用於儲值、消費等等。 综上所述,本發明確已具備前揭所述的各項優點 兼具產業上利用性、新穎性與進步性等專利要件, 提起申請。 在 14 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁} ,# -------^---------線.V. Description of the invention (Based on the foregoing reasons, the present invention provides the flexibility to authorize borrowing without affecting the legal and exclusive use of the key holder. This means that the aforementioned electronic recording key can be temporarily borrowed with the authorization of the original holder. Record key, and through the exquisite design, the key will be canceled after the key is activated by the original holder's fingerprint: to ensure that the borrowing function will not affect the security of the remaining keys. Its ^ body side = is in the aforementioned key record A borrowing mode is established under the function menu of the terminal. The borrowing core is achieved by the steps shown in the third figure, which include: obtaining the fingerprint characteristics of the original holder and completing the identification; establishing the original holder The basic password is required; the fingerprint of the borrower is required to be entered, and the borrower's basic password is established after obtaining the fingerprint characteristics of the borrower; since the lock end is based on the basic password sent by the remaining key end, the vacancy feature and the seed value are matched to Random random number generation for a single use of Gott: ΓΓΓ basis, so the borrower only needs to complete the two-text feature identification on the recording key end, and then the basic password can be successfully sent. Setting, you can complete the verification step with S3. You can use two ::: Borrower * The user's identity recognition function is performed normally. The Idle terminal requires W to input the number of times, caller's fingerprint, and move-; 2. The status of the fingerprint characteristics of the borrower that has not been completed. Contents: == See; 发明 The specific electronic key that invented the management method of the security lock system and :; 1) Power: = (210 x 297 mm) Order ·-线 # ----- j 丄 5. Description of the invention ("The electronic key (10) is shown in the fourth figure, which includes: an early chip processor (11), which acts as the computing and control center; The identification module (12) is connected to the input end of the single-chip processor (1 1) through an appropriate interface; in this embodiment, the interface refers to an RS-232 interface; ^ a memory (1 3) Is connected to a single-chip processor (丄 1) for storing comparison data; a wireless transceiver module (14) is connected to a set of I / O ports of the aforementioned single-chip processor (1 1) for Single chip processor (丄 工) $ Electronic locks are used for two-way signal transmission, such as sending the basic start, code, and reception of the electronic key itself Sub-locks randomly generated random numbers, etc .; a display circuit (1 5) is set on the output terminal of a single chip processor (masonry) to display the functional status of the electronic key; a power supply circuit (16) is provided for The DC working power supplies each of the aforementioned main components; of which: the single-chip processor (1 1) may be composed of 8447 single-chips, which serves as a control center for controlling all peripheral modules, and the single-chip processor (11) itself can also The fingerprint characteristics, seed value, and basic password of the legitimate holder of the electronic key are recorded in the program. The fingerprint identification module (1 2) can use the embedded fingerprint identification module numbered Fcpm, FCP1G1 is— A small fingerprint recognition computing module. The RISC microprocessor and DSP chip in the module have fast independent computing functions. The f-chip can process and recognize fingerprints, without the need of using a PC as a finger: identification of different operations and FCPHH's small size. Low power consumption, can be powered by battery 10 This paper size applies Chinese national standard (7 public love of CNS ^^ 1〇χ) (Please read the precautions on the back before filling this page) -------- ^- -------- line- -III-) U 512 A7, Invention Description (y): Maintain operation. FCP101 also provides a number of operation instructions (including image capture, file creation, comparison, and personal data access) for external use. User = ~ and and other communication interfaces to send instruction signals to the memory (1 3). The EEPROM structure is mainly used to store the fingerprint characteristic value of the borrower and the number of fingerprint verification errors in the borrow mode. For further connection relationship between the other main components of the electronic key (10) mentioned above, please refer to the fifth figure. Please also refer to the sixth figure, the electronic lock (20) includes = single-chip processing H (2 1 is used as the operation and control center;-lock drive circuit (2 2), which is received by the single-chip processor (2 workers) control 'to determine the open / closed state; a wireless transceiver module (2 3), which is' connected to the aforementioned single chip processor (2 1) /, one of the middle group ί / 〇 port for single chip processing (2 1), (10) for two-way ^ sign transmission; such as receiving the basic password of the holder from the electronic recording key (), sending out random numbers generated by itself, and sending do 子 料 do) 'receive the electronic Single-use password sent by the data (1Q); a memory (24) connected to the single-chip processor (21) for storing comparison data; a display circuit (25), which is provided in the single-chip processor ( 21) on the output terminal to display the functional status of the electronic lock; 11 this paper size is suitable for financial management X X (Please read the precautions on the back before filling this page) Order --------- line, 513512 5. Description of the invention (/ 〇) an input circuit (in a single chip processor (setting and operation); a power circuit (requires yuan In addition to the aforementioned single-chip processor of the aforementioned circuit, in addition to executing various operation interface circuits (2 8), in this embodiment, A7 B7 Ο η \, which may be composed of a keyboard matrix, is provided on the input end of 2 1). For users to perform functions 27), refer to the seventh figure for the direct current power supply to the main circuit structure, where (2 1) can still be composed of EM78447 single chip, except for comparison work, one of the I One port is connected to the / O port to connect with a personal computer and perform programming. The surface circuit (28) is composed of RS232 and a single-chip processor (21) receives the electronic recording key through the wireless transceiver module (23). (10) After the single-use password is sent, it will be compared with the single code generated by its own calculation. If they match, the unlocking operation is performed through the lock drive circuit (2 2). If the comparison does not match, the lock The driving circuit (2 2) does not operate. According to the above description, it can be seen that the safety lock system and the management method of the present invention are divided into the following points for analysis of their functions and characteristics: 1. Safety: 1 Authenticity and use of touch keys The identification module reduces the identity of the holder of the electronic key in real time. 2. There is no danger of losing or using the card in the card access control system. 3. The electronic key has a lock function, and the fingerprint will be locked if it fails multiple consecutive verifications. Hold the key. 12 The size of the paper is applicable to the Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) ------- Order ----- -Line · A7 B7, invention description (4. 5. 2. 3. 4. The information in the electronic key is not easy to copy, you don't need to worry about the fingerprint image of the user being stolen. The use of single-use password technology makes it impossible for the outside world to steal key and door lock groove communication numbers. Hash function method is used to verify the fingerprint characteristic value of the original holder or borrower of the electronic record key to prevent the problem that the fingerprint characteristic value is replaced by the outside world. Tian has been reported as a lost electronic key, and when used to unlock, the electronic lock will sound an alarm. • Convenience: Combining the advantages of credit card and fingerprint identification access control system, only one electronic key is needed, and there is no need to carry a large series of traditional keys. The operation method is the same as that of the general key, which is simple and suitable for the general public. The electronic key fob can add a borrower's fingerprint without having to register with the electronic lock, so that people you trust can borrow your electronic key and ensure its security. When the electronic key is lost, you do n’t need to replace it with a new electronic lock. You can directly apply again-a new electric key, and the lost electronic key is not afraid of being picked up by others and there is a danger of fraud. Solve the problem of reducing the door lock system towel, which means that the identifier is on the control channel and cannot be commissioned to unlock. • Applicability: 13 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) ------- Order ---- ----- line A7 B7 invention description (, up) 1_ The system can be used for different applications, such as access control systems, auto locks, membership cards, identity certificates, etc. Λ 2. Future electronic keys can be combined with e-commerce, such as storage card information, electronic wallets, for stored value, consumption and so on. In summary, the present invention does have all the advantages described in the previous disclosure, and has both the industrial availability, novelty, and advancement of patent requirements, and filed an application. In 14 paper sizes, the Chinese National Standard (CNS) A4 specification (210 X 297 mm) applies (please read the precautions on the back before filling this page), # ------- ^ ------ ---line.

Claims (1)

六、申請專利範圍 1 種女全鎖系統管理方法,係包括下列步驟: 在鑰匙端取得並辨識持有者之指紋特徵,經核符後送 出鑰匙端之基本密碼至鎖具端,提出開鎖請求,· 由鎖具端確認鑰匙端的基本密碼,核符後送出一隨機 產生的亂數給錄匙端; 、鎖具端與輸匙端分別根據前述基本密碼及前述隨機亂 數進行運异而產生一單次使用密碼; 鑰匙端送出單次使用密碼至鎖具端,與其本身產生的 密碼進行比對; 由鎖具端根據比對結果決定開鎖與否。 ^.如中請專利範圍第!項所述之安全鎖系統管理方 法’料鑰匙端的基本密碼包括持有者的餘值 種子值(Seed)。 ρ如申請專利範圍第工項所述之安全鎖系統管理; 法’ ^的運算步㈣採用,演算法(Me Algorithm) 〇 gS 4.如申請專利範圍第w所述之安全鎖系統管理方 =該餘匙端的功能模式選單下具有—借用模式 模式包括下列步驟: 彳曰用 取得原持有者之指紋特徵,並完成辨識; 建立原持有者之基本密碼; 要求輸入借用者之指紋, 建立借用者之基本密碼。 並於取得借用者指紋特徵後 如申請專利範圍第4項所述之安全鎖系統管理 513512 09888 ABCD 六、申請專利範園 法’該餘匙端之借用功能在以原持有者指紋啟動後即告结 束。 6 一種女全鎖系統,係由至少一電子鑰匙與至少一 電子鎖具所組成;其中, 該電子鑰匙包括有: 一單晶片處理器,係作為運算及控制中樞; 一指紋辨識模組,係透過適當介面與前述單晶片處理 器的輸入端連接; 一無線收發模組,係與前述單晶片處理器其中一組 I/O埠連接,以供單晶片處理器與電子鎖具作雙向信號傳 輸; 一顯示電路’係設於單晶片處理ϋ之輸出端上,以顯 示電子鑰匙之功能狀態; 一電源電路,係供直流工作電源予前述各主要元件; 又電子鎖具包括有: ^ 一單晶片處理器,係作為運算及控制中樞; 一鎖具驅動電路,係受單晶片處理器控制,以決定開 閉鎖狀態; 一無線收發模組,係與前述單晶片處理器其中一組 I/O埠連接,以供單晶片處理器與電子鑰匙作雙向信號 輸; 一顯示電路,係設於單晶片處理器之輸出端上,以顯 示電子鎖具之功能狀態; 一輸入電路,係设於單晶片處理器之輸入端上,供使 16 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公贊)' (請先閲讀背面之注意事項再填寫本頁) ·!裝 線 513512 0g88 8 ABCDSixth, the scope of applying for a patent A method for the management of a female full lock system, which includes the following steps: Obtain and identify the fingerprint characteristics of the holder on the key end, send the basic password of the key end to the lock end after verification, and submit a lock request. · The basic password of the key is confirmed by the lock end, and a random number randomly generated is sent to the key recorder after verification; the lock end and the key end are different according to the basic password and the random random number, respectively, to generate a single time. Use the password; The key end sends the single-use password to the lock end to compare with the password generated by itself; the lock end decides whether to unlock or not according to the comparison result. ^. If the patent scope please! The method of managing the security lock system described in the item 料 expects that the basic password of the key end includes the holder's residual value seed. ρ The management of the security lock system as described in the item of the scope of the patent application; the operation steps of the method ^ are adopted, the algorithm (Me Algorithm) 〇gS 4. The management system of the security lock as described in the scope of the patent application w = The function mode menu of this key has the following-borrowing mode mode including the following steps: 彳 use to obtain the fingerprint characteristics of the original holder and complete the identification; establish the basic password of the original holder; require the input of the borrower's fingerprint to establish Borrower's basic password. After obtaining the fingerprint characteristics of the borrower, the security lock system management as described in item 4 of the scope of patent application 513512 09888 ABCD VI. Patent Application Law “The borrowing function of the remaining key is activated after the fingerprint of the original holder is activated It's over. 6 A female total lock system, which is composed of at least one electronic key and at least one electronic lock; wherein the electronic key includes: a single-chip processor, which is used as a computing and control center; a fingerprint identification module, which is provided through A suitable interface is connected to the input end of the single-chip processor; a wireless transceiver module is connected to one of the I / O ports of the single-chip processor for two-way signal transmission between the single-chip processor and the electronic lock; The display circuit is set on the output terminal of the single-chip processing unit to display the functional status of the electronic key. A power circuit is used to supply DC working power to the aforementioned main components. The electronic lock includes: ^ a single-chip processor Is used as the operation and control center; a lock drive circuit is controlled by the single-chip processor to determine the opening and closing state; a wireless transceiver module is connected to a set of I / O ports of the single-chip processor, and Provides single-chip processor and electronic key for two-way signal input; a display circuit is set on the output terminal of the single-chip processor to Shows the functional status of the electronic lock; an input circuit is set on the input terminal of the single-chip processor for 16 paper sizes to apply the Chinese National Standard (CNS) A4 specification (210 X 297 praise) '(Please read first Note on the back, please fill out this page again) !! Installation line 513512 0g88 8 ABCD 用者進行功能設定及操作; ;電源電路,係供直紅作電料前述各主要 7. 如申請專利範圍第6項所述之 子餘匙與電子鎖具又分別包括有 Μ’該 處理器連接,供儲存比對資料。H其係與單晶 8. 如申請專利範圍第7項所述之 = 己憶體係供儲存借用者的指紋特徵值及指紋: 9. 如申請專利範圍第7項所述之 子鎖具的記憶體係供健存合法使用者的開鎖權限資料; 如申請專利範圍第6項所述之安全鎖系統,〗 處理器之1/〇璋上設有-介面電路,以便與電腦, 線作程式構通。 (請先閲讀背面之注意事項再塡寫本頁) 'Τ 如申請專利範圍第10項所述之安全鎖系統 該介面電路係一 RS232介面 線 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公箸)The user performs function setting and operation;; The power circuit is for the direct use of electrical materials as described above. 7. As described in the patent application scope item 6, the child key and the electronic lock each include a M ′ processor connection. For storing comparison data. H Its system and single crystal 8. As described in item 7 of the scope of the patent application = Jiyi system for storing the fingerprint characteristics and fingerprints of borrowers: 9. The memory system of the child lock as described in the scope of patent application item 7 Keep the unlocking authority information of legal users; for example, the security lock system described in item 6 of the scope of the patent application, there is an-interface circuit on 1/0 处理器 of the processor, so as to communicate with the computer and the line. (Please read the precautions on the back before writing this page) 'T The security lock system as described in item 10 of the patent application. The interface circuit is an RS232 interface cable. The paper size is applicable to Chinese National Standard (CNS) A4 specifications ( 210 χ 297 males)
TW91104365A 2002-03-08 2002-03-08 Security lock system and the administration way thereof TW513512B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW91104365A TW513512B (en) 2002-03-08 2002-03-08 Security lock system and the administration way thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW91104365A TW513512B (en) 2002-03-08 2002-03-08 Security lock system and the administration way thereof

Publications (1)

Publication Number Publication Date
TW513512B true TW513512B (en) 2002-12-11

Family

ID=27752485

Family Applications (1)

Application Number Title Priority Date Filing Date
TW91104365A TW513512B (en) 2002-03-08 2002-03-08 Security lock system and the administration way thereof

Country Status (1)

Country Link
TW (1) TW513512B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7669047B2 (en) 2005-06-22 2010-02-23 Egis Technology Inc. Biometrics signal input device and computer system having the biometrics signal input device
US7870111B2 (en) 2003-05-01 2011-01-11 International Business Machines Corporation Method, system, and program for lock and transaction management
US8161018B2 (en) 2003-05-01 2012-04-17 International Business Machines Corporation Managing locks and transactions
US8495131B2 (en) 2002-10-08 2013-07-23 International Business Machines Corporation Method, system, and program for managing locks enabling access to a shared resource
TWI410555B (en) * 2010-11-12 2013-10-01
TWI414669B (en) * 2008-07-25 2013-11-11 Azbil Corp Out of the room management system and out of the room management methods
TWI452204B (en) * 2012-04-25 2014-09-11 Shinsoft Co Ltd Security system with mulitple safety controls and method for processing the security signals

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8495131B2 (en) 2002-10-08 2013-07-23 International Business Machines Corporation Method, system, and program for managing locks enabling access to a shared resource
US7870111B2 (en) 2003-05-01 2011-01-11 International Business Machines Corporation Method, system, and program for lock and transaction management
US8161018B2 (en) 2003-05-01 2012-04-17 International Business Machines Corporation Managing locks and transactions
US8200643B2 (en) 2003-05-01 2012-06-12 International Business Machines Corporation Lock and transaction management
US8768905B2 (en) 2003-05-01 2014-07-01 International Business Machines Corporation Managing locks and transactions
US7669047B2 (en) 2005-06-22 2010-02-23 Egis Technology Inc. Biometrics signal input device and computer system having the biometrics signal input device
TWI414669B (en) * 2008-07-25 2013-11-11 Azbil Corp Out of the room management system and out of the room management methods
TWI410555B (en) * 2010-11-12 2013-10-01
TWI452204B (en) * 2012-04-25 2014-09-11 Shinsoft Co Ltd Security system with mulitple safety controls and method for processing the security signals

Similar Documents

Publication Publication Date Title
US7979716B2 (en) Method of generating access keys
JP3222111B2 (en) Remote identity verification method and apparatus using personal identification device
JP3222110B2 (en) Personal identification fob
EP2157552A1 (en) Electromechanical lock
EP0944011A1 (en) Fingerprint collation
US7813773B2 (en) Electronic key apparatus for vehicle
US20120166810A1 (en) Biometrically Securing and Transmitting Data
WO2017084250A1 (en) High security room door lockset and unlocking and counter locking method thereof
TWI311114B (en)
US9111082B2 (en) Secure electronic identification device
TW513512B (en) Security lock system and the administration way thereof
CN107804279A (en) A kind of control system based on iris recognition and intelligent key unlocking automobile
JP2010128600A (en) Fingerprint authentication function mounted mobile device
CN104392525A (en) Intelligent lock system
TWI424329B (en) Electronic reading apparatus and the data protection method thereof
US20040049460A1 (en) Method and device for providing secure of an electronic authorization/credit card
JP2007191993A (en) Unlocking condition setting type locking/unlocking system, and method for offering this system
CN106663216A (en) Document with sensor means
US20060088192A1 (en) Identification system
CN106408727A (en) Access control system based on voiceprints
CN100483443C (en) Biological key and biological lock
CN210377499U (en) Safety lock of type-C interface that charges based on biological feature recognition
CN210377589U (en) Intelligent lock capable of being unlocked through electronic key
CN2818698Y (en) Biological key and lock
JP2007217903A (en) Key, unlocking device, key device, program for key, and program for unlocking device

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees