TWI283980B - Electronic door lock system and controlling, authorizing and copying methods thereof - Google Patents

Electronic door lock system and controlling, authorizing and copying methods thereof Download PDF

Info

Publication number
TWI283980B
TWI283980B TW94108506A TW94108506A TWI283980B TW I283980 B TWI283980 B TW I283980B TW 94108506 A TW94108506 A TW 94108506A TW 94108506 A TW94108506 A TW 94108506A TW I283980 B TWI283980 B TW I283980B
Authority
TW
Taiwan
Prior art keywords
key
electronic
lock
public
electronic lock
Prior art date
Application number
TW94108506A
Other languages
Chinese (zh)
Other versions
TW200635321A (en
Inventor
Chih-Chung Lu
Hsien-Wen Dai
Huan-Wen Wang
Original Assignee
Ind Tech Res Inst
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ind Tech Res Inst filed Critical Ind Tech Res Inst
Priority to TW94108506A priority Critical patent/TWI283980B/en
Publication of TW200635321A publication Critical patent/TW200635321A/en
Application granted granted Critical
Publication of TWI283980B publication Critical patent/TWI283980B/en

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

An electronic door lock system and controlling, authorizing and copying methods thereof are disclosed. By applying the public key infrastructure (PKI) to authorize between the electronic key and the electronic lock, the electronic key and the electronic lock generate a public key and a private key respective. The electronic key transmits its public key to the electronic lock. Then, the electronic key gets an access controlling right by receiving a certificate from the electronic lock. Thus, the electronic door lock system is secure, convenient to operate and easy to control with low cost.

Description

1283980 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種安全門鎖系統,特別是一種運用公開金鍮 機制(Public Key Infrastructure,PKI)來進行交互驗證之安全門鎖 系統及其管理、認證與複製方法。 ^ 、 【先前技術】 ^ 現代人不管走到哪裡總是隨身攜帶著一串餘匙,例如,踏出 豕門彳^,就得攜帶開啟家門的鑰匙,一般住公寓的人還可能得帶 上兩三把;交通上,可能得選擇汽機車的鑰匙要攜帶;公司大1283980 IX. Description of the Invention: [Technical Field] The present invention relates to a security door lock system, and more particularly to a security door lock system using interactive public key mechanism (PKI) for mutual authentication and management and authentication thereof. With the copy method. ^, [Prior Art] ^ Modern people always carry a string of spares wherever they go. For example, if you step out of the door, you have to carry the key to open the door. People who usually live in the apartment may also bring it. Two or three; in transportation, you may have to choose the key of the steam locomotive to carry;

門禁森嚴,要有身分辨識的物件或鑰匙才能通行;個人辦公桌的 抽屜鑰匙得保管;諸如此類,每個人身旁總不免圍繞著需要^ =物體,開啟與關閉時總要手忙腳亂一番,才能找到正確的 去開關。 來簡:行的數巧㈣===== t,合,使得使用者只需隨身攜帶一:5=十便以 機:PDA等系統’更增加其便利^因此,ίίΐ 便利3成本上,卻無__點與 由習知技術所提供之安全門鎖系統中,所強;工… ί,ίΐ^ίΓίΪίί,然、而卻對產生 系統及其管鎖 因此’為達上遠目的,本發明所揭露之安全門鎖系統,包括 ⑧ 1283980 ΐίί匙ίί子鎖,電子鑰匙具有第—亂數產生器、第-運算單 鑰孓ί用產气器是用於產生第-公開金 ί ϊίίί用以執行第—公開金鍮機制運 公開金鑰機制運算所需之亂數於電子鎖,第二運 工傳輸;元元與第 二私^金餘2^31^_第二公開金鑰機制運算,以第 別碼作為1並|4^再以加密後的第—公開金鑰與識 制權。 1職至電子鍮心使電子鍮匙取得對電子鎖的控 碼至證時,1子細傳輸亂數與識別 ί:私ί金鑰加密亂數,再傳輸憑證與加密 ίί^ίί^ϊί ; 行解密,廿芸再苐一公開金鑰對加密後之亂數進 ΐ戶後之亂數與電子鎖本身由第二亂數產生 °另外iiiiii打驗證’以控制電子鎖之開啟或關閉。 是用s進行資S傳2仃idi,機制運算,第三傳輸單元則 證與以第一ί密工;匙,以自電子鑰匙f收憑 鎖之控制權。 之第一>開金鑰,以供子鑰匙取付電子 有電;系統之管理方法,丨J;於具 先刀別產生弟公開金輸與第一私密金餘於電子雜以及第二 ⑧ 1283980 在2含?公J識ίϊ於鎖,然後’由電子鑰匙 密第一公iins ’由電子鎖以第二私密金鑰加 有電子ί匙鎖系統之認證方法’應用於具 鑰與第二温鎖1¾¾統;匙J有第-公開金 金鍮加穷之取得憑證,此憑證包括以第二私密 由電子▲匙向電別碼’此方法包含下列步驟:首先, ϊ ΙΐίϋΡίΐ^開金,憑證中之第一公開金鑰$解 密後之亂之il數進行解密’並藉由確認解 電子鎖ί&Ι以本身所傳輸之亂數娜進行驗證’以控制 有電t安全門·統之複製方法,應用於具 55ίτ:2ίϊ:气子鎖具有第二公開金鑰、第二:密:2ί ί ί第,辱與:私由密ί?鍮 三公,以i☆拿=得密後之第 解,兹為ίίϊί;ί細目說的明ί?。、特徵、及其功能有進—步的瞭 【實施方式】 雜1圖;!所示,為本發明之實施綱提供之安全門 的ίί圖,此女全門鎖系統10乃包含電子鑰匙2〇與電子 ,3〇,t子鍮匙2〇包含第一亂數產生器Number im,^?)23、ί 一,算單元21與第一傳輸單元22,第一亂 產生态23疋用於產生第一公開金鑰、第一私密金鑰以及用於進 ⑧ 7 1283980 mii餘機制運算所需之亂數’第—運算單元21可用以執 算,第一傳輸單元22則用以傳輪資料;而 ΪΪIs,鼻單元31、第二傳輸單元32與第二亂數產 #输進行第二公開金鑰機制運算所需之I數,第二運 行第二公開金鑰機制運算,第二傳輪單元32 ϊϊίίΐίίί4可配合電子鑰匙2〇之第一傳輸單元22作雙 向的ίί?ί,ϋ傳輸單元22與第二傳輸單元32必須為雙 能/、有單向,紋因為安全門齡統w需要 ίί ί裝線傳輸裝置可為無線電、紅外線或射頻感 應裝置接觸^傳輸裝置可為USB裝置。 有第1 情例ί:安全門鎖系統1〇,電子錄匙20更可包含 ίί第輸t單\25與顯示單元26,電子鎖更可包 元37 ;其中:第L己恃、顯不單兀36與鎖頭控制單 20盥電子鎖3ί德ίίί 與第二記憶單元34是供電子鑰匙 其他、5^資料金鑰f巧金输以及各種憑證或 23、第一運瞀置二枓外沒,而本實施例之第一亂數產生器 第二^ ϋ 4 一記憶單元24以及第二亂數產生器33、 上,另外,乾入显i、f 一記憶單元34乃分別整合於一個單晶片 的介面,方顯示單元26、36是與使用者溝通 可為鍵盤以及U,定和顯示目前的操作狀態,分別 增加度並可依照電子鎖30的安全度之設定的上升而 設定,讓\子全門鎖系統10如何透過初始化 如「第巧3,'電子鎖3〇的控制權。 統之管理方法程為巧明之實關所提供之安全門鎖系 公開金鑰與/私步驟二首先,分別產念第一 一公開金鑰至電子鎖;然後,由電子鍮匙傳輸第 丁貝、/鄉110);最後,由電子鎖以第二私密金 ⑧ i283980 至i t加密、後的第—公開金鑰與識別碼作為 &權得輸至電子鑰咕(步驟120),以供電子鑰%取得電子鎖之^ 器分另ί別透過第—亂f產生11與第二亂數產生 產生第二公弟—公開金鑰與第—私密金鍮’於電子鎖 驟no),输咕將第^開金鑰傳輸給電子鎖(步 的資料以ίίτ以電和其他來源 鑰匙便取得該電給電條(步驟120)’如此電子 ίϊ程為實施例所提供之安全門· Ιί證方法的〜 匙具為减職已授權後的雜,其電子鑰 :電Si|=i二私密以別 it,τ由紐之亂數至電子鎖(步驟22〇); 2;;後公, 驟叫電之瞻同來進行驗證(步 繼w 了包㊁不止一個的憑證’而憑證内容至少包含電子 2 ?S^ 電子物出動作i求,元電= ⑧ 9 1283980 第t亂數產生器產生—組亂數,再將電子鎖本身的識別碼 傳給電子鑰匙(步驟21〇),電子鍮匙則依照識別碼找到 應,芯證,再利用第二公開金鑰機制,將前述亂數用本身的第 二,岔金輪作簽章,最後將憑證和加密後的亂數一起回傳給電子 巧C步驟220),而電子鎖對兩筆簽章過的資料進行驗證的動作, ,別1本身的第二公開金鑰以及電子鑰匙的第一公開金鑰對憑證 和之前產生的亂數做比對,若比對結果正確,則電子鎖會產生回 應之於電子鑰匙的動作要求,以進而控制電子鎖之開啟或關閉(步 驟 230)〇 ) 在一般的安全等級下,我們可以限制電子鑰匙的授權與複 製’來達到普通家庭的需求,例如將電子鑰匙分類為母鑰匙 攀 (pother Key)和子鑰匙(Child Key),而子鑰匙可限制經由母鍮匙授 ,或複製才能產生,單獨子鑰匙則無法複製給其他鑰匙,可方便 家庭使用上的複製,只要將母鑰匙收藏好,使用子鑰匙則不怕被 複製偷去。 如「第4圖」所示,為本發明之實施例所提供之安全門鎖系 統之複製方法的主要流程,此安全門鎖具有電子鑰匙與電子鎖, 電子鑰匙具有第一公開金鑰與第一私密金鑰,電子鎖具有第二公 開金鑰、第二私密金鑰與識別碼,且電子鑰匙自該電子鎖取得一 憑證,此憑證包括以第二私密金鑰加密之第一公開金鑰與識別 碼,此方法包含下列步驟:首先,提供子鑰匙,此子鑰匙具有第 三公開金鑰與第三私密金鑰(步驟300);然後,由子鑰匙傳送第 • 三公開金鑰至電子鑰匙(步驟310);最後,由電子鑰匙以第一私 密金鑰加密第三公開金鑰,並傳輸憑證與加密後之第三公開金鑰 至子鑰匙(步驟320),以供子鑰匙取得電子鎖之控制權。 、 如「第5圖」所示,為本發明之實施例所提供之安全門鎖系 統的子鑰匙之示意圖。此子鑰匙40包含第三亂數產生器43、第 • 三運算單元41與第三傳輸單元42,第三亂數產生器43是用以產 生第三公開金鑰、第三私密金鑰以及用於進行第三公開金鑰機制 運算所需之亂數,第三運算單元41是用以執行第三公開金鑰機制 運算,而第三傳輸單元42是用以進行資料傳輸;請一併參見第1 圖,在此,將電子鑰匙20作為母鑰匙,而子錄匙40即為複製自 電子鍮匙20之鑰匙,由於電子鑰匙20已經有了電子鎖30的認證 !28398〇 i子鑰匙40只要透過第一傳輸單元22與第三傳輸單元42, 八的第三公開金錄給予電子鍮匙20 ’電子餘匙20將此第三 土 =金鑰用本身的第一私密金鑰加密後,將電子鎖30的憑證連^ ^加遂後的弟二公開金錄交給子錄匙40保管,如此便完成了产 作,而子鑰匙40因為沒有電子鍮匙20的第一私密金, 因此無法再授權給其他鑰匙。 、 鑰匙40亦可包含有第三記憶單元44、輸入單元45與顯 各種 ?、弟二亂數產生器43與第三運算單元41係整合於一個單晶 千s- X 各匀矛二§61思干 锎八早兀45與ί 二46,分別用以儲存本身之公開金鑰與私密金鑰以及各種碾 玄ίτ亡來源的資料以及作為使用者溝通的介面,而第三記憶ΐ 片上 ^「第6Α圖」與「第6Β圖」所示,分別為本發明之電子 I及八子鑰匙之記憶單元的示意圖。比較電子鑰匙2〇之 愔 J7G 3與子鍮匙40之第三記憶單元44,第一記憶單元24 ^ 一么開金鑰、第一私密金鑰與自各個電子鎖3〇取得的馮 ,苎^則包括電子鎖之識別碼與利用電子鎖3〇之第二“ 加岔後的第一公開金鑰,而第三記憶單元44則除了包含=八 鑰、第三私密金鑰與自電子鑰匙2〇取得之各個憑證,二 電子鑰匙20以其第一私密金鍮加密後的第三公開金输。 因此,子鑰匙40與電子鎖30的認證方式,情形大致 鑰匙、2〇巧電子鎖3〇的認證方式相同,但在電子鎖3〇方面 了一,驗證的^驟,必須先解出子鑰匙4〇的第三公開金德, 能將比對正確之後,電子鎖3〇才執行要求的動作。 因此,\應^本發明之安全門鎖系統時,可將電子 讲 定具有數個驗證等級,其係依照電子鎖3〇對與電子输匙 = 比對的次數岐並可以增 iifii助的憑證資料,而利用外在的 ί幕個人身分資料,也可限制憑證的使用ϊ 限’ ίΛ =的ί加安全性,並可有效控管出人時間 ,^艮據ί么明所提供之安全門鎖系統及其管理、切 f i,可達到—般家庭門禁的需求,可將ϊ 把售有鑰中在一把電子鑰匙之中,電子鎖也可發 11 1283980 可以利用鍵盤和螢幕和安全門鎖系統做進一步的溝通,於是密 的設定、憑證的限制、身分的認定、鑰匙的複製等等問題,都^ 以加以设定安裝在電子输匙與電子鎖上,於是,在拓展到汽機 鑰匙、公司大樓管理、抽屜、保險櫃等裝置時,不但能夠依照 種裝置之安全需求而作調整,並相當方便溝通,實作成本也不, 有助於推廣運用。 、 ° 雖然本發明以前述之實施例揭露如上,然盆並非用以限 發明。在不脫離本發明之精神和範圍内,所為^更動盥The door is very strict, and you must have the identity of the object or the key to pass; the drawer key of the personal desk must be kept; and so on, there is always a need to surround the object ^ ^ object, open and close always have to be busy to find Go right and switch. To Jane: The number of lines (four) ===== t, so that the user only needs to carry one: 5 = ten to the machine: PDA and other systems 'increasing its convenience ^ Therefore, ίίΐ convenience 3 cost, However, there is no __ point and the security door lock system provided by the prior art, which is strong; the work... ί, ίΐ^ίΓίΪίί, but the system and its tube locks are therefore made for the purpose of the present invention. The disclosed security door lock system includes 8 1283980 ΐίί key ίί sub-lock, the electronic key has a first-random number generator, and the first-calculation single key 孓 ί is used to generate the first-public gold ί ϊ ί The first-public open system mechanism operates the public key mechanism to calculate the random number required for the electronic lock, the second transport transmission; the yuan and the second private ^ Jin Yu 2^31^_ second public key mechanism operation, The first code is 1 and |4^ and then the encrypted first-public key and the right of knowledge. 1 job to the electronic heart to make the electronic key to obtain the control code of the electronic lock to the card, 1 sub-transport random number and identification ί: private key encryption random number, then transfer the voucher and encryption ίί^ίί^ϊί; Decryption, 廿芸 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开 公开It is used to carry out the transmission of S仃2仃idi, the mechanism operation, and the third transmission unit proves that it is controlled by the first key, and the key is used to control the lock from the electronic key f. The first key is to open the key for the sub-key to pay for the electronic electricity; the management method of the system, 丨J; in the first knife, the younger brother, the public gold and the first private gold, the electronic miscellaneous and the second 8 1283980 In 2, the public information is recognized by the lock, and then 'the electronic key is the first public iins 'the electronic private key with the second private key plus the electronic key lock system authentication method' applied to the key and the second temperature Lock 13⁄43⁄4 统; Key J has the first-public gold 鍮 鍮 之 取得 , , , , , , , , , , , , ' ' ' ' ' 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此 此In the first public key of the decrypted il number, the decrypted il number is decrypted 'and verified by the electronic lock ί & Ι Ι Ι 本身 本身 本身 本身 本身 本身 本身 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以 以, applied with 55ίτ: 2ίϊ: gas lock with second public key, second: secret: 2 ί ί ί, humiliation and: private secret ί 鍮 公 公 以 以 i i i i = = = = 得 得, here is ίίϊί; , features, and functions have advanced - [Embodiment] Miscellaneous 1 map; Shown is a diagram of a security door provided by an embodiment of the present invention. The female full door lock system 10 includes an electronic key 2〇 and an electronic unit. 3〇, t子鍮2〇 includes a first random number generator Number im , ^?) 23, ί, the calculation unit 21 and the first transmission unit 22, the first chaotic state 23疋 is used to generate the first public key, the first private key, and the mechanism for entering the 7 7 1283980 mii The random number required for the operation 'the first operation unit 21 can be used for calculation, the first transmission unit 22 is used to transmit the data; and the ΪΪIs, the nose unit 31, the second transmission unit 32 and the second random number production# are performed. The second public key mechanism operation requires the number of I, the second operation of the second public key mechanism operation, and the second transfer unit 32 ϊϊίίίί4 can cooperate with the first transmission unit 22 of the electronic key 2 to make a two-way ίίίί, The transmission unit 22 and the second transmission unit 32 must be dual-enable/one-way, because the security door age system needs to be ίίί, the line transmission device can be contacted by a radio, infrared or radio frequency sensing device. The transmission device can be a USB device. . There is a first case ί: the security door lock system 1 〇, the electronic key 20 can also contain ίί 输 单 t \25 and the display unit 26, the electronic lock can also be packaged by 37; wherein: the first L 恃, 显 兀36 and lock control unit 20 盥 electronic lock 3 德 ί ίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίίί In the first embodiment of the first random number generator, the second memory unit 24 and the second random number generator 33, and the memory unit 34 are integrated into a single chip. The interface display unit 26, 36 communicates with the user to set the current operating state for the keyboard and the U, and increases the degree respectively, and can be set according to the rise of the security setting of the electronic lock 30, let How does the full door lock system 10 initialize the control rights such as "Xi Qiao 3," Electronic Lock 3? The management method of the system is the security key provided by Qiao Mingzhi. The public key and private steps are first, respectively. Produce the first public key to the electronic lock; then, pass the electronic key In the first place, the electronic key is encrypted by the second private key 8 i283980 to it, and the subsequent first public key and the identification code are used as the & weights to be input to the electronic key (step 120). In order to obtain the electronic key % of the electronic key, the device is divided into the second - the second random number generated by the first - chaotic f - the public key and the first - private key "in the electronic lock" The transmission transmits the first key to the electronic lock (the data of the step is obtained by the electric and other source keys (step 120).] The electronic door is provided for the safety gate of the embodiment. The key method of the certificate is the miscellaneous after the deduction of the post, the electronic key: electric Si|=i two private to not it, τ from the chaos to the electronic lock (step 22〇); 2;; The sudden call of electricity is the same as verification (steps w have more than one voucher for the package) and the voucher content contains at least the electron 2?S^ electronic object action i, the yuan = 8 9 1283980 the t chaotic number is generated The device generates a set of random numbers, and then transmits the identification code of the electronic lock itself to the electronic key (step 21〇), and the electronic key is based on the knowledge. The code finds the core certificate, and then uses the second public key mechanism to sign the aforementioned random number with its second, gold-plated wheel, and finally returns the certificate and the encrypted random number to the electronic C step 220. ), and the electronic lock verifies the data of the two signatures, and the second public key of the 1st itself and the first public key of the electronic key compare the voucher with the previously generated random number, if If the comparison result is correct, the electronic lock will respond to the action request of the electronic key to control the opening or closing of the electronic lock (step 230).) Under normal security level, we can restrict the authorization and copying of the electronic key. 'To meet the needs of ordinary families, such as the classification of electronic keys as the pother key and child key, and the sub-key can be restricted by the parent key, or copy can be generated, the individual sub-key can not be copied For other keys, it is convenient for copying at home. As long as the parent key is collected, the sub-key is not afraid of being copied and stolen. As shown in FIG. 4, a main flow of a method for copying a security door lock system provided by an embodiment of the present invention, the security door lock has an electronic key and an electronic lock, and the electronic key has a first public key and a first private key. The key, the electronic lock has a second public key, a second private key and an identification code, and the electronic key obtains a certificate from the electronic lock, the certificate includes a first public key encrypted with a second private key and identification Code, the method includes the following steps: First, a sub-key is provided, the sub-key has a third public key and a third private key (step 300); then, the third public key is transmitted by the sub-key to the electronic key (step 310); Finally, the third public key is encrypted by the electronic key with the first private key, and the encrypted third key is transmitted to the sub-key (step 320) for the sub-key to obtain the electronic lock control. right. As shown in Fig. 5, it is a schematic diagram of a sub-key of the security door lock system provided by the embodiment of the present invention. The sub-key 40 includes a third random number generator 43, a third arithmetic unit 41 and a third transfer unit 42, and the third random number generator 43 is configured to generate a third public key, a third private key, and the like. For performing the third public key mechanism operation, the third operation unit 41 is configured to perform the third public key mechanism operation, and the third transmission unit 42 is configured to perform data transmission; 1 , here, the electronic key 20 is used as the parent key, and the sub-key 40 is the key copied from the electronic key 20, since the electronic key 20 already has the certification of the electronic lock 30! 28398〇i sub-key 40 Through the first transmission unit 22 and the third transmission unit 42, the third public record of the eight is given to the electronic key 20'. The electronic spare key 20 encrypts the third earth=key with its own first private key, and then The voucher of the electronic lock 30 is connected to the sub-key 40 for storage, and the sub-key 40 is unable to complete the production, and the sub-key 40 cannot be the first private gold of the electronic key 20, so Reauthorize other keys. The key 40 can also include a third memory unit 44, an input unit 45, and a display unit. The second and second arithmetic units 43 and the third operation unit 41 are integrated in a single crystal thousand s-X.思干锎八早兀45 and ί二46, respectively, are used to store their own public and private keys and various sources of information and the interface for user communication, and the third memory is on the film ^" Figure 6 and Figure 6 are schematic views of the memory unit of the electronic I and eight keys of the present invention, respectively. Comparing the electronic key 2 to the third memory unit 44 of the J7G 3 and the sub-key 40, the first memory unit 24 ^, the opening key, the first private key, and the von obtained from each electronic lock 3, ^ then includes the identification code of the electronic lock and the second "credited first public key" using the electronic lock, and the third memory unit 44 includes the = eight key, the third private key and the self-electronic key. 2) Each of the obtained voucher, the second electronic key 20 is encrypted with the third public key encrypted by the first private key. Therefore, the authentication mode of the sub-key 40 and the electronic lock 30, the situation is roughly the key, the 2 smart electronic lock 3 The authentication method is the same, but in the case of the electronic lock 3, the verification must be solved first, and the third public gold of the sub-key 4 must be solved first. After the comparison is correct, the electronic lock 3 is executed. Therefore, when the safety door lock system of the present invention is used, the electronic instruction can have a plurality of verification levels, which are in accordance with the number of times the electronic lock 3 pairs are compared with the electronic input key 岐 and can be increased by iiifi. Voucher information, and use the external personal information It can also limit the use of credentials to ' ί Λ 的 security, and can effectively control the time of the exit, ^ 艮 艮 所 所 所 所 所 所 所 安全 安全 安全 安全 安全 安全 安全 安全 安全 安全 安全 安全 安全 安全 安全 安全The need for access control can be used to store the key in an electronic key, and the electronic lock can also be sent 11 1283980. The keyboard and the screen and the security door lock system can be used for further communication, so the secret setting, the certificate limit, The identification of the identity, the copying of the keys, etc. are all installed on the electronic key and the electronic lock. Therefore, when expanding to the steam engine key, company building management, drawers, safes, etc., not only can The safety requirements of the device are adjusted, and it is quite convenient to communicate, and the cost of implementation is not good, which helps to promote the application. ° Although the present invention is disclosed above in the foregoing embodiments, the basin is not intended to limit the invention. Within the spirit and scope of the present invention,

【圖式簡單說明】 5 i ^,為A發,之實關所提供之安全卩,__示意圖; 、土、、ϋ,為本^明之實關所提供之安全門鎖祕之管理方 /ίτ之丨L私圖, ❹、·,為本發明之實細所提供之安全門齡統之認證方 /女之》;1L私圖, 、第4圖’為本發明之實施例所提供之安全門鎖系統之複製方 法之流程圖; 一第5圖’為本發明之實施例所提供之安全門鎖系統的子鍮匙 之示意圖;及 記憶單第元6=r圖’分別為本發明之電子鱗及其子麟之 【主要元件符號說明】 10 安全門鎖系統 20 電子鑰匙 21 第一運算單元 22 第一傳輸單元 23 第一亂數產生器 24 第一記憶單元 25、 35、45 輸入單元 26、 36、46 顯示單元 30 電子鎖 31 第二運算單元 ⑤ 1283980 32 第二傳輸單元 33 第二亂數產生器 34 第二記憶單元 37 鎖頭控制單元 40 子錄匙 41 第三運算單元 42 第三傳輸單元 43 第三亂數產生器 44 第三記憶單元[Simple description of the diagram] 5 i ^, for A, the security provided by the real customs, __ schematic;, soil, and ϋ, the management of the security door lock provided by the real customs of the ^^丨 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私 私A flowchart of a method for copying a system; a fifth diagram of a sub-key of a security door lock system provided by an embodiment of the present invention; and a memory sheet element 6=r map' are respectively an electronic scale of the present invention and [Main component symbol description] 10 security door lock system 20 electronic key 21 first operation unit 22 first transmission unit 23 first random number generator 24 first memory unit 25, 35, 45 input unit 26, 36, 46 Display unit 30 Electronic lock 31 Second arithmetic unit 5 1283980 32 Second transfer unit 33 Second random number generator 34 Second memory unit 37 Lock control unit 40 Sub-log 41 41 Third arithmetic unit 42 Third transfer unit 43 Third random number generator 44 third Unit

Claims (1)

1283980 十、申請專利範圍: •種安全門鎖系統,其包括有: 一電子鍮匙,包含: 1. 之亂數 算;及 第運开單元,用以執行該第一公開金餘機制運 -電;IS單元,用以進行資料傳輸;及 二私密金鑰f錄、一第 之亂數; 第一A開金鑰機制運算所需 算;^二運算單元’用以執行該第二公開金鍮機制運 其中τίίΐίϋ,以進行資料傳輸; 今士第一公開金鑰至j鑰 ,以該加密後的第-公開金^與該二=$, 鑰匙向該^子鎖請:欠認證時: 則傳輸该第一亂數產生器所產生之M數盥「 鎖 鑰匙’該電子鑰匙係根據該識別碼選取^ 子 HiS 行驗證,而控制該電子鎖之開啟或所生“亂數來邊 2.i m範ϊί»!項所f之安全門鎖系統,其令該電子鑰盎 ίκϋί仏早70,用以儲存該第一公開金餘、該第一户 3·如申請專利範圍第】項所叙安全門鎖系統,其中該電子鎖美 14 (β 128398° 包含一第二記憶單元,用以儲存 金鑰與該憑證。 乐—A開金鑰、該第二私密 4·妒申請專利範圍第1項所述之安全門 5 拳元與該第二傳輪單元係為無線傳輪^ Ύ :中該第一傳輪 1申請專利範圍第4項所述之安C 接觸式傳輸裝置。 6 裴置係選自無線電、紅外線與射頻威中該無線傳輪 如中請專利範圍第4項所述之安置的群組組合。 輸裝置係為USB裝置。 』貝糸統,其中該接觸式傳 7妒申清專利範圍弟1項所述之安全門魅,备 j該電子鎖更分別具有-輸人單元, g·妒申請專利範圍第1項所述之安全門鎖系 與該電子鎖更分別具有一顯示單元,用’—I中該電子鑰匙 9妒申請專利範圍第1項所述之J全門以车^不^呆f狀態。 9·開啟或_係透過-鎖頭控制單元其中該電子鎖之 10· 2申項所述之安全門鎖系統’更包含-子鑰 一第二亂數產生器,用以產生一第三公開金一 密金鑰以及用於進行一第三公開金鑰機制運算1 二穿 -第三傳輸單元,用以進行#料傳輸;賴㈣异,及 中,透過5亥弟一傳輸單元與該第三傳輸單元,該子鍮匙 傳送違弟二公開金鑰至该電子鍮匙,以自該電子鑰匙接收該憑 證與一以該第一私密金鑰加密之該第三公開金鑰,以供該子^ 匙取得該電子鎖之控制權。 u.f申請專利範圍第10項所述之安全門鎖系統,其中該電子鎖 係設定有複數個驗證等級,且該些驗證等級係根據對於該電子 输匙與該子输匙之認證資料所需比對的次數而定。 12· 一種安全門鎖系統之管理方法,該安全門鎖系統具有一電子鑰 匙與一電子鎖,該方法包含下列步驟: 分別產生一第一公開金錄與一第一私密金输於該電子錄 匙以及一第二公開金鑰、一第二私密金鑰與一識別碼於該電子 鎖; ⑧ 15 13 ======該電子鎖之控^ 金鑰,該電子鎖具有n開金金 ϊΐ ^ ί電子鎖取得—練,該憑證&括5 金鍮加⑨之轉—公開金鑰與該識別碼,該方法包1283980 X. Patent application scope: • A safety door lock system, which includes: an electronic key, comprising: 1. a random number calculation; and a first transport unit for performing the first public gold mechanism-electricity ;IS unit for data transmission; and two private key f records, a first random number; the first A open key mechanism operation requires calculation; ^ two arithmetic unit 'to perform the second disclosure The mechanism transports τ ί ί ΐ ϋ 以 以 以 以 以 以 ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ τ Transmitting the M number generated by the first random number generator 盥 "lock key", the electronic key is selected according to the identification code, and the HiS line is verified, and the electronic lock is controlled to open or generate a random number. Im Fanϊί»! The security door lock system of the item f, which makes the electronic key 70 ϋ 仏 , 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 70 Lock system, where the electronic lock is beautiful 14 (β 128398° contains one a memory unit for storing the key and the certificate. The Le-A key, the second private 4, the security door 5 of the patent application scope 1 and the second transmission unit are wireless transmission Wheel ^ Ύ : The first transmission wheel 1 is applied for the safety C contact transmission device described in item 4 of the patent scope. 6 The installation is selected from the group consisting of radio, infrared and radio frequency. The group combination of the four items mentioned above. The transmission device is a USB device. 』Bei Yu Tong, in which the contact type is 7 妒 专利 专利 专利 专利 专利 专利 专利 专利 专利 专利 专利 专利 专利 专利The safety door lock system described in item 1 of the patent application scope has a display unit, and the electronic key is used in the first item of the patent range J full door to the car ^ not ^ stay f state. 9 · open or _ through the - lock control unit where the electronic lock 10 · 2 application of the security door lock system 'more includes - sub-key a second a random number generator for generating a third public gold key and for performing The third public key mechanism operation 1 is a second-to-third transmission unit for performing #material transmission; Lai (four) different, and medium, through the 5 Haidi transmission unit and the third transmission unit, the subkey transmission is violated The second public key is sent to the electronic key to receive the voucher from the electronic key and the third public key encrypted by the first private key, so that the sub-key obtains control of the electronic lock The security door lock system of claim 10, wherein the electronic lock system is provided with a plurality of verification levels, and the verification levels are based on a ratio of the authentication data for the electronic key and the sub-key. It depends on the number of times. 12. A method of managing a security door lock system, the security door lock system having an electronic key and an electronic lock, the method comprising the steps of: generating a first public record and a first private money respectively to the electronic record and a second public key, a second private key and an identification code in the electronic lock; 8 15 13 ====== the electronic lock control key, the electronic lock has n open gold ϊΐ ^ ίElectronic lock acquisition-practice, the voucher&" 5 gold 鍮 plus 9 turn- public key and the identification code, the method package 由,電子鑰匙向該電子鎖請求認證; 由,電子鎖傳輸一亂數與該識別碼至該電子鑰匙; 由=電子鑰匙根據該識別碼選取該憑證,並以該第一公開 金鍮加密該IL數,再傳輸該憑證與該加密後之亂數至該電子 鎖;及 由該電子鎖先以該第二公開金鑰對該憑證中之該第一公 開^鑰進j亍解密,再以該第一公開金鑰對該加密後之亂數進行 ,密’並藉由確認該解密後之亂數係該電子鎖本身所傳輸之該 亂數來進行驗證,而控制該電子鎖之開啟或關閉。The electronic key requests authentication from the electronic lock; the electronic lock transmits a random number and the identification code to the electronic key; the electronic key is selected according to the identification code by the electronic key, and the first public key is used to encrypt the The number of ILs, the voucher and the encrypted hash are transmitted to the electronic lock; and the electronic lock first decrypts the first public key in the voucher with the second public key, and then The first public key performs the encrypted random number, and performs verification by confirming that the decrypted random number is the random number transmitted by the electronic lock itself, and controls the opening of the electronic lock or shut down. 鍮,再以 電 14· 了種安全門鎖系統之複製方法,該安全門鎖系統具有一電子鑰 匙、一電子鎖,該電子鑰匙具有一第一公開金鑰與一第一私密 金鑰,該電子鎖具有一第二公開金鑰、一第二私密金鑰與一識 ,且該電子鑰匙係自該電子鎖取得一憑證,該憑證包括以 該第二私密金鑰加密之該第一公開金鑰與該識別碼,該方法包 含下列步驟: 提供一子鑰匙,該子鑰匙具有一第三公開金鑰與一第三私 密金鑰; 由該子鑰匙傳送該第三公開金鑰至該電子鑰匙;及 由該電子鑰匙以該第一私密金鑰加密該第三公開金气,並 傳輸該憑證與該加密後之第三公開金鑰至該子鑰匙,以供該子 鑰匙取得該電子鎖之控制權。 16鍮 再 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Having a second public key, a second private key, and an identification, and the electronic key obtains a voucher from the electronic lock, the voucher including the first public key encrypted with the second private key The identification code, the method comprising the steps of: providing a child key having a third public key and a third private key; transmitting the third public key to the electronic key by the child key; Encrypting the third publicity by the first private key by the electronic key, and transmitting the certificate and the encrypted third public key to the sub-key, so that the sub-key obtains control of the electronic lock . 16
TW94108506A 2005-03-18 2005-03-18 Electronic door lock system and controlling, authorizing and copying methods thereof TWI283980B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94108506A TWI283980B (en) 2005-03-18 2005-03-18 Electronic door lock system and controlling, authorizing and copying methods thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94108506A TWI283980B (en) 2005-03-18 2005-03-18 Electronic door lock system and controlling, authorizing and copying methods thereof

Publications (2)

Publication Number Publication Date
TW200635321A TW200635321A (en) 2006-10-01
TWI283980B true TWI283980B (en) 2007-07-11

Family

ID=39430936

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94108506A TWI283980B (en) 2005-03-18 2005-03-18 Electronic door lock system and controlling, authorizing and copying methods thereof

Country Status (1)

Country Link
TW (1) TWI283980B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915344B (en) * 2016-04-15 2019-03-22 重庆金瓯科技发展有限责任公司 A kind of electron key shared service system for house lease

Also Published As

Publication number Publication date
TW200635321A (en) 2006-10-01

Similar Documents

Publication Publication Date Title
CN108234515B (en) Self-authentication digital identity management system and method based on intelligent contract
WO2020191928A1 (en) Digital identity authentication method, device, apparatus and system, and storage medium
US6230272B1 (en) System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
US7130998B2 (en) Using a portable security token to facilitate cross-certification between certification authorities
US8051469B2 (en) Securely roaming digital identities
CA2820986C (en) Methods for secure enrollment and backup of personal identity credentials into electronic devices
AU776552B2 (en) Security access and authentication token with private key transport functionality
CN101202762B (en) Methods and system for storing and retrieving identity mapping information
US20070204149A1 (en) Apparatus and methods for providing secured communication
US20050120205A1 (en) Certificate management system and method
JP4843320B2 (en) Method and system for securely authenticating a service user of a remote service interface to a storage medium
JPH0652518B2 (en) Security system and its management method
JP2000357156A (en) System and method for authentication sheet distribution
JP2006014325A (en) Method and apparatus for using portable security token to facilitate public key certification for device group in network
US20010054147A1 (en) Electronic identifier
CN101246607A (en) Digital authentication control method for access control system and access control system using the same
WO2005117336A1 (en) Parent-child card authentication system
JP6751545B1 (en) Electronic signature system and anti-tamper device
JP2011012511A (en) Electric lock control system
US20220400015A1 (en) Method and device for performing access control by using authentication certificate based on authority information
TW201223225A (en) Method for personal identity authentication utilizing a personal cryptographic device
US10148433B1 (en) Private key/public key resource protection scheme
KR101964757B1 (en) Certification system and method using OTP
JP2006099548A (en) Data sharing system, data sharing method, data holder device and data server
TWI283980B (en) Electronic door lock system and controlling, authorizing and copying methods thereof