TWI606424B - System and method for detecting and deactivating illegal access cards - Google Patents

System and method for detecting and deactivating illegal access cards Download PDF

Info

Publication number
TWI606424B
TWI606424B TW105134495A TW105134495A TWI606424B TW I606424 B TWI606424 B TW I606424B TW 105134495 A TW105134495 A TW 105134495A TW 105134495 A TW105134495 A TW 105134495A TW I606424 B TWI606424 B TW I606424B
Authority
TW
Taiwan
Prior art keywords
card
blacklist
access
module
access control
Prior art date
Application number
TW105134495A
Other languages
Chinese (zh)
Other versions
TW201816729A (en
Inventor
Pei-Cheng Chen
Original Assignee
Chunghwa Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chunghwa Telecom Co Ltd filed Critical Chunghwa Telecom Co Ltd
Priority to TW105134495A priority Critical patent/TWI606424B/en
Application granted granted Critical
Publication of TWI606424B publication Critical patent/TWI606424B/en
Publication of TW201816729A publication Critical patent/TW201816729A/en

Links

Description

偵測及停用非法門禁卡片之系統與方法 System and method for detecting and disabling illegal access cards

本發明係為門禁卡片,特別為一種利用檢查該筆資料的刷卡次數欄位數值與前次刷卡資料的刷卡次數欄位數值之邏輯,以偵測及停用非法門禁卡片之系統與方法。 The invention relates to an access control card, in particular to a system and method for detecting and deactivating an illegal access card by using logic for checking the field value of the card number of the pen data and the value of the card number of the previous card data.

目前門禁卡片防偽技術多朝加解密讀取卡片內容、多重認證或門禁卡實體加上防偽材料的方向發展,但對於非法門禁卡並無防備機制。此外,利用歷史比對的方式針對物品識別碼的重複可能進行分析,但無法適用於門禁卡片於同一門禁點重複感應的情境。 At present, the anti-counterfeiting technology of access control cards is more than cryptographically read card content, multiple authentication or access control card entities plus anti-counterfeiting materials, but there is no defense mechanism for illegal access cards. In addition, the historical comparison method may be used to analyze the repetition of the item identification code, but it cannot be applied to the situation where the access card is repeatedly sensed at the same access point.

現有技術中,利用行為模型訓練及感應路徑分析偵測可疑偽造門禁卡片。但此方法還要再經使用者本人確認,才能判定有複製/偽造卡,對於經常要出入不同處所門禁管制點,軌跡不固定的使用者而言,顯然會造成困擾。 In the prior art, behavioral model training and inductive path analysis are used to detect suspicious forged access cards. However, this method can be determined by the user himself to determine whether there is a copy/falsification card. It is obviously troublesome for users who often have to enter and exit the control points of different places and the track is not fixed.

由此可見,上述習用方式仍有系統可用性差,實非一便捷而容易廣泛應用之設計,亟待加以改良。 It can be seen that the above-mentioned conventional methods still have poor system availability, which is not a convenient and widely applicable design and needs to be improved.

本案發明人鑑於上述習用方式所衍生的各項缺點,乃亟思加以改良創新,並經多年苦心孤詣潛心研究後,終於成功研發完成本件 偵測及停用非法門禁卡片之系統與方法。 In view of the shortcomings derived from the above-mentioned conventional methods, the inventor of the present invention has improved and innovated, and after years of painstaking research, he finally succeeded in researching and developing this article. System and method for detecting and disabling illegal access cards.

本發明提供一種偵測及停用非法門禁卡片之系統,主要包含門禁卡、門禁機、門禁管理模組,其中門禁卡更包含識別資訊欄及刷卡次數欄。門禁機更包含卡片資訊讀取模組係讀取門禁卡之識別資訊欄及刷卡次數欄,黑名單比對模組比對識別資訊欄是否符合卡片黑名單,欄位回寫模組係將刷卡次數寫入刷卡次數欄,以及上傳模組將識別資訊欄及刷卡次數欄。門禁管理模組更包含黑名單產生模組,係產生卡片黑名單,資料庫儲存卡片黑名單,並利用黑名單下載模組將卡片黑名單下載至黑名單比對模組,異常偵測模組係比對門禁卡之識別資訊欄及刷卡次數欄。 The invention provides a system for detecting and deactivating an illegal access card, which mainly comprises an access card, an access control device and an access control management module, wherein the access control card further comprises an identification information bar and a card number column. The access control machine further includes a card information reading module that reads the identification information bar of the access control card and a card number column. The blacklist comparison module compares whether the information bar matches the card blacklist, and the field writeback module will swipe the card. The number of times is written to the number of times the card is swiped, and the upload module will identify the information bar and the number of times the card is swiped. The access control module further includes a blacklist generation module, which generates a card blacklist, the database stores the card blacklist, and uses the blacklist download module to download the card blacklist to the blacklist comparison module, the abnormality detection module. Compare the identification information bar and the card number column of the access card.

本發明提供一種偵測及停用非法門禁卡片之方法,其步驟包含:門禁機係用卡片資訊讀取模組讀取門禁卡之識別資訊欄及刷卡次數欄;門禁機之黑名單比對模組係比對識別資訊欄及卡片黑名單,若識別資訊欄符合卡片黑名單,欄位回寫模組則刪除識別資訊欄之內容,若識別資訊欄不符合卡片黑名單,欄位回寫模組則將刷卡次數累加寫入刷卡次數欄並開門;以及門禁機之上傳模組將門禁卡之識別資訊欄、刷卡次數欄以及刷卡時間,上傳至門禁管理模組之資料庫儲存。 The invention provides a method for detecting and deactivating an illegal access card, the steps comprising: the access control system uses the card information reading module to read the identification information column and the card number column of the access card; the blacklist comparison mode of the access control machine The group comparison identifies the information column and the card blacklist. If the identification information column matches the card blacklist, the field writeback module deletes the content of the identification information column. If the identification information column does not match the card blacklist, the field returns to the write mode. The group adds the number of card swipes to the card number column and opens the door; and the uploading module of the access control device uploads the identification information bar, the card number column and the card swiping time of the access card to the database of the access control module for storage.

其中門禁管理模組,係讀取資料庫內具有相同識別資訊欄的對應刷卡次數欄之記錄,異常偵測模組依照刷卡時間之先後順序,比 對前後之刷卡次數欄之位數值;以及若前後之刷卡次數欄之位數值為規律累加,則判斷門禁卡為正常;若前後之刷卡次數欄之位數值為非規律累加,則判斷門禁卡為非法卡,一黑名單產生模組,係產生卡片黑名單,並由黑名單下載模組下載到門禁機。 The access control module is for reading the record of the corresponding number of times of the card in the same identification information column in the database, and the abnormality detecting module is in accordance with the order of the time of the card swiping. The value of the position of the number of times before and after the card is counted; and if the number of digits of the number of times before and after the card is regularly accumulated, the access card is judged to be normal; if the number of bits in the number of times before and after the card is irregularly accumulated, the access card is judged as An illegal card, a blacklist generating module, generates a card blacklist and is downloaded to the access control machine by the blacklist download module.

本發明相較於現有技術差異在於,本發明利用門禁機與門禁卡片的刷卡次數欄位之讀寫技術,由門禁管理模組檢查該筆刷卡次數欄位數值與前次刷卡資料的刷卡次數欄位數值是否為規律累加,進而精準判定有複製/偽造卡在使用,進而將其列入黑名單,當黑名單卡片再刷卡感應時,門禁機隨即將其識別欄位內容刪除,使其無法再使用而達停用之目的。 The difference between the present invention and the prior art is that the present invention utilizes the reading and writing technology of the access card field of the access control card and the access control card, and the access control management module checks the field value of the card card number and the card number of the previous card card column. Whether the bit value is regularly accumulated, and then accurately determines whether a copy/falsification card is in use, and then blacklists it. When the blacklist card is swiped, the access control device deletes the content of the identification field, so that it can no longer be Use for the purpose of decommissioning.

詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 DETAILED DESCRIPTION OF THE INVENTION The detailed description of the present invention is not intended to limit the scope of the invention, and the equivalents of the embodiments of the present invention should be included in the present invention. In the scope of patents.

綜上所述,本案不但在空間型態上確屬創新,並能較習用物品增進上述多項功效,應已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 In summary, this case is not only innovative in terms of space type, but also can enhance the above-mentioned multiple functions compared with the customary items. It should fully meet the statutory invention patent requirements of novelty and progressiveness, and apply for it according to law. This invention patent application, in order to invent invention, to the sense of virtue.

100‧‧‧門禁卡 100‧‧‧Access card

101‧‧‧識別資訊欄 101‧‧‧Identification information bar

102‧‧‧刷卡次數欄 102‧‧‧Swipe count column

200‧‧‧門禁機 200‧‧‧ access control machine

201‧‧‧卡片資訊讀取模組 201‧‧‧Card Information Reading Module

202‧‧‧黑名單比對模組 202‧‧‧Blacklist comparison module

203‧‧‧卡片黑名單 203‧‧‧ card blacklist

204‧‧‧欄位回寫模組 204‧‧‧Field writeback module

205‧‧‧上傳模組 205‧‧‧Uploading module

300‧‧‧門禁管理模組 300‧‧‧Access Control Module

301‧‧‧黑名單產生模組 301‧‧‧Blacklist generation module

302‧‧‧資料庫 302‧‧‧Database

303‧‧‧黑名單下載模組 303‧‧‧Blacklist download module

304‧‧‧異常偵測模組 304‧‧‧Anomaly Detection Module

S201~S209‧‧‧步驟流程 S201~S209‧‧‧Step procedure

圖1為本發明之偵測及停用非法門禁卡片之系統之模組示意圖。 1 is a schematic diagram of a module of a system for detecting and deactivating an illegal access card according to the present invention.

圖2為本發明之偵測及停用非法門禁卡片之方法之流程示意圖。 2 is a schematic flow chart of a method for detecting and deactivating an illegal access card according to the present invention.

為利 貴審查委員了解本發明之技術特徵、內容與優點及其所能達到之功效,茲將本發明配合附圖,並以實施例之表達形式詳細說明如下,而其中所使用之圖式,其主旨僅為示意及輔助說明書之用,未必為本發明實施後之真實比例與精準配置,故不應就所附之圖式的比例與配置關係解讀、侷限本發明於實際實施上的權利範圍,合先敘明。 The technical features, contents, and advantages of the present invention, as well as the advantages thereof, can be understood by the reviewing committee, and the present invention will be described in detail with reference to the accompanying drawings. The subject matter is only for the purpose of illustration and description. It is not intended to be a true proportion and precise configuration after the implementation of the present invention. Therefore, the scope and configuration relationship of the attached drawings should not be interpreted or limited. First described.

請參閱圖1,為本發明之偵測及停用非法門禁卡片之系統之系統示意圖,其中包含門禁卡100、門禁機200、門禁管理模組300,其中門禁卡100更包含識別資訊欄101及刷卡次數欄102。門禁機200更包含卡片資訊讀取模組201係讀取門禁卡100之識別資訊欄101及刷卡次數欄102,黑名單比對模組202比對識別資訊欄101是否符合卡片黑名單203,欄位回寫模組204係將刷卡次數寫入刷卡次數欄102,以及上傳模組205將識別資訊欄101及刷卡次數欄102。門禁管理模組300更包含黑名單產生模組301,係產生卡片黑名單203,資料庫302儲存卡片黑名單203,並利用黑名單下載模組303將卡片黑名單203下載至黑名單比對模組202,異常偵測模組304係比對門禁卡100之識別資訊欄101及刷卡次數欄102。 FIG. 1 is a schematic diagram of a system for detecting and disabling an illegal access control card according to the present invention, which includes an access card 100, an access control device 200, and an access control management module 300. The access control card 100 further includes an identification information column 101 and The number of times of card check 102. The access control device 200 further includes a card information reading module 201 for reading the identification information column 101 and the card number column 102 of the access card 100. The blacklist comparison module 202 compares whether the identification information column 101 conforms to the card blacklist 203. The bit writeback module 204 writes the number of card swipes to the swipe count field 102, and the upload module 205 identifies the information bar 101 and the card count field 102. The access management module 300 further includes a blacklist generation module 301, which generates a card blacklist 203, the database 302 stores the card blacklist 203, and uses the blacklist download module 303 to download the card blacklist 203 to the blacklist comparison mode. The group 202, the anomaly detection module 304 compares the identification information column 101 and the card number column 102 of the access card 100.

請參閱圖2,為本發明之偵測及停用非法門禁卡片之方 法之流程示意圖,其步驟如下:步驟S201:當門禁機感應到門禁卡刷卡;步驟S202:即門禁機讀取門禁卡之識別資訊欄的資訊,其包含門禁卡唯一序號、密鑰讀取識別資訊以及刷卡次數欄上之刷卡次數,先判斷格式與內容是否為正確的門禁卡;步驟S203:門禁機比對卡片黑名單,若為符合卡片黑名單之門禁卡,門禁機回寫刪除門禁卡的識別資訊欄的內容,使該門禁卡片無法使用;步驟S204:若為不符合卡片黑名單之門禁卡,門禁機將密鑰讀取識別資訊中並進行刷卡次數欄上的數值累加,再回寫至門禁卡的刷卡次數欄位,並開門;步驟S205:門禁機更新該筆刷卡資訊,含刷卡時間及門禁機編號,回傳至門禁管理模組之資料庫儲存;步驟S206:門禁管理模組執行異常偵測;步驟S207:讀取資料庫內具有相同識別碼的各筆刷卡資訊,依照刷卡時間先後順序,比對先後兩筆刷卡次數欄位數值,進行數值比對;步驟S208:若先後刷卡次數值呈現規律累加,代表為正常的門禁卡,若先後刷卡次數值呈現非規律累加,則判定為有非法的門禁卡;以及步驟S209:產生卡片黑名單,並下載到門禁機,當下次有識別資訊欄的黑名單卡片被門禁機讀取識別時,該列入卡片黑名單之門禁將被回寫刪除卡片識別欄位內容而使其無法使用。 Please refer to FIG. 2, which is a method for detecting and deactivating an illegal access card according to the present invention. The flow chart of the method has the following steps: Step S201: When the access control machine senses the access card, the step S202: the access control machine reads the information of the identification information column of the access card, which includes the unique serial number of the access card and the key reading and identification. The number of times of the information and the number of credits on the number of times of card swiping, first determine whether the format and content are correct access cards; step S203: the access control machine compares the card blacklist, if the card is blacklisted, the access control machine writes back the access card The content of the identification information bar is such that the access control card cannot be used; step S204: if the access control card does not conform to the blacklist of the card, the access control machine will read the key in the identification information and perform the value on the number of times of card swiping, and then return Write to the card number field of the access card, and open the door; Step S205: The access control device updates the card card information, including the card swipe time and the access control number, and returns to the database of the access control management module for storage; step S206: access control mode The group performs abnormality detection; step S207: reading each card information with the same identification code in the database, according to the order of the time of the card, the comparison first The value of the last two card number fields is compared. Step S208: If the value of the number of times of card swiping is regularly accumulated, it represents a normal access card. If the number of times of card swiping is irregularly accumulated, it is determined that there is illegal access control. Card; and step S209: generating a blacklist of cards and downloading them to the access control machine. When the blacklist card with the identification information bar is read and recognized by the access control machine next time, the access control list of the blacklist of the card will be written back to delete the card identification. The contents of the field make it unusable.

其中數值比對係依據邏輯如下:d=a(n)-a(n-1); 其中a(n)代表後一筆刷卡次數值,a(n-1)代表前一筆刷卡次數值,n=1,2,3,4...至最新一筆,a(0)為發卡時的初始值;當d=常數(>0),代表僅有一張卡片正常使用;以及當d=0或負數,代表有多張相同識別碼的卡片在使用,為一非法的門禁卡。 The numerical comparison is based on the following logic: d=a(n)-a(n-1); Where a(n) represents the value of the subsequent number of credits, a(n-1) represents the previous number of credits, n=1, 2, 3, 4... to the latest, a(0) is the initial at the time of card issuance Value; when d=constant (>0), it means that only one card is used normally; and when d=0 or negative number, it means that there are multiple cards with the same identification code in use, which is an illegal access card.

其中門禁卡被門禁機讀取的內容,包含卡片唯一序號及用密鑰讀取識別資訊;其中以密鑰讀取識別資訊區的某一欄位,被當作刷卡次數儲存欄位。 The content of the access card read by the access control machine includes the unique serial number of the card and the identification information read by the key; wherein a certain field of the identification information area is read by the key, and is used as a card storage time field.

綜上所述,本案不僅於技術思想上確屬創新,並具備習用之傳統方法所不及之上述多項功效,已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 To sum up, this case is not only innovative in terms of technical thinking, but also has many of the above-mentioned functions that are not in the traditional methods of the past. It has fully complied with the statutory invention patent requirements of novelty and progressiveness, and applied for it according to law. Approved this invention patent application, in order to invent invention, to the sense of virtue.

100‧‧‧門禁卡 100‧‧‧Access card

101‧‧‧識別資訊欄 101‧‧‧Identification information bar

102‧‧‧刷卡次數欄 102‧‧‧Swipe count column

200‧‧‧門禁機 200‧‧‧ access control machine

201‧‧‧卡片資訊讀取模組 201‧‧‧Card Information Reading Module

202‧‧‧黑名單比對模組 202‧‧‧Blacklist comparison module

203‧‧‧卡片黑名單 203‧‧‧ card blacklist

204‧‧‧欄位回寫模組 204‧‧‧Field writeback module

205‧‧‧上傳模組 205‧‧‧Uploading module

300‧‧‧門禁管理模組 300‧‧‧Access Control Module

301‧‧‧黑名單產生模組 301‧‧‧Blacklist generation module

302‧‧‧資料庫 302‧‧‧Database

303‧‧‧黑名單下載模組 303‧‧‧Blacklist download module

304‧‧‧異常偵測模組 304‧‧‧Anomaly Detection Module

Claims (2)

一種偵測及停用非法門禁卡片之系統,其包含:一門禁卡,其中該門禁卡更包含一識別資訊欄及一刷卡次數欄;一門禁機,其中該門禁機更包含一卡片資訊讀取模組係讀取該門禁卡之該識別資訊欄及該刷卡次數欄,一黑名單比對模組比對該識別資訊欄是否符合一卡片黑名單,一欄位回寫模組係將刷卡次數寫入該刷卡次數欄,以及一上傳模組將該識別資訊欄及該刷卡次數欄;一門禁管理模組,該門禁管理模組更包含一黑名單產生模組,係產生該卡片黑名單,一資料庫儲存該卡片黑名單,並利用一黑名單下載模組將該卡片黑名單下載至該黑名單比對模組,一異常偵測模組係比對該門禁卡之該識別資訊欄及該刷卡次數欄,當前後之該刷卡次數欄之位數值為規律累加,則判斷該門禁卡為正常,若前後之該刷卡次數欄之位數值為非規律累加,則判斷該門禁卡為非法卡,並令該黑名單產生模組產生該卡片黑名單;以及該黑名單比對模組比對該門禁卡,若該門禁卡符合該卡片黑名單,該門禁機回寫刪除該門禁卡的該識別資訊欄的內容,使該門禁卡片無法使用。 A system for detecting and disabling an illegal access card includes: an access card, wherein the access card further includes an identification information bar and a card number column; and an access control device, wherein the access control device further includes a card information reading The module reads the identification information column of the access card and the card number column, and a blacklist comparison module compares whether the identification information column conforms to a card blacklist, and a field writeback module is the number of times the card is swiped. Write the card number column, and an uploading module to identify the information column and the card number column; an access control module, the access control module further includes a blacklist generating module, which generates the card blacklist, a database stores the blacklist of the card, and downloads the blacklist of the card to the blacklist comparison module by using a blacklist download module, and the anomaly detection module is compared with the identification information column of the access control card and The number of times of the card is counted, and the number of digits of the current number of times of the card is regularly accumulated, and the access card is determined to be normal. If the number of digits in the number of times of the card is irregularly accumulated, the access card is judged. Illegal card, and the blacklist generation module generates the card blacklist; and the blacklist comparison module compares the access card, if the access card conforms to the card blacklist, the access control device writes back and deletes the access card The content of the identification information bar makes the access card unusable. 一種偵測及停用非法門禁卡片之方法,其步驟包含:一門禁機係用一卡片資訊讀取模組讀取一門禁卡之一識別資訊欄及一刷卡次數欄;該門禁機之一黑名單比對模組係比對該識別資訊欄及一卡片黑名單,若該識別資訊欄符合該卡片黑名單,一欄位回寫模組則刪除該識別資訊欄之內容,若該識別資訊欄不符合該卡片黑名單,該欄位回寫模組則將刷 卡次數累加寫入該刷卡次數欄並開門;該門禁機之一上傳模組將該門禁卡之該識別資訊欄、該刷卡次數欄以及一刷卡時間,上傳至一門禁管理模組之一資料庫儲存;其中該門禁管理模組,係讀取該資料庫內具有相同該識別資訊欄的對應該刷卡次數欄之記錄,一異常偵測模組依照該刷卡時間之先後順序,比對前後之該刷卡次數欄之位數值;以及若該前後之該刷卡次數欄之位數值為規律累加,則判斷該門禁卡為正常;若該前後之該刷卡次數欄之位數值為非規律累加,則判斷該門禁卡為非法卡,一黑名單產生模組,係產生該卡片黑名單,並由該黑名單下載模組下載到該門禁機,當該識別資訊欄符合該卡片黑名單之該門禁卡被該門禁機讀取識別時,該門禁卡將被回寫刪除該識別欄位內容而無法使用。 A method for detecting and disabling an illegal access control card comprises the following steps: an access control system uses a card information reading module to read one of the access card identification information column and a card number column; one of the access control machines is black The list comparison module compares the identification information column with a card blacklist. If the identification information column matches the card blacklist, the field writeback module deletes the content of the identification information column, if the identification information column Does not match the card blacklist, the field writeback module will brush The card number is accumulated and written into the card number column and the door is opened; the uploading module of one of the access control devices uploads the identification information bar, the card number column and the card swiping time of the access card to one of the access control management modules. The access control module reads the record of the corresponding number of times of the card in the database having the same identification information column, and an abnormality detecting module compares the order of the time of the card, The value of the card number column; and if the number of digits of the card number column before and after the value is regularly accumulated, it is determined that the access card is normal; if the number of digits of the card number column before and after is irregularly accumulated, it is determined The access card is an illegal card, and a blacklist generating module generates a blacklist of the card and is downloaded to the access control device by the blacklist downloading module. When the identification information bar matches the blacklist of the card, the access card is When the access control device reads and recognizes, the access control card will be written back to delete the content of the identification field and cannot be used.
TW105134495A 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards TWI606424B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105134495A TWI606424B (en) 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105134495A TWI606424B (en) 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards

Publications (2)

Publication Number Publication Date
TWI606424B true TWI606424B (en) 2017-11-21
TW201816729A TW201816729A (en) 2018-05-01

Family

ID=61023464

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105134495A TWI606424B (en) 2016-10-26 2016-10-26 System and method for detecting and deactivating illegal access cards

Country Status (1)

Country Link
TW (1) TWI606424B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111461275A (en) * 2020-04-26 2020-07-28 厦门浩邈科技有限公司 Method for detecting copy IC card

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003052544A2 (en) * 2001-12-19 2003-06-26 Harexinfotech Inc. System and method for issuing card and processing blacklist using wireless communications
TW200601163A (en) * 2004-06-30 2006-01-01 Hundure Technology Co Ltd Non-contact door access system architecture
CN201377223Y (en) * 2009-01-06 2010-01-06 深圳日海通讯技术股份有限公司 Intelligent electronic lock monitoring system applied to outdoor telecommunication rooms and cabinets
US20140028438A1 (en) * 2012-07-25 2014-01-30 Utc Fire & Security Corporation Systems and methods for locking device management
TW201636490A (en) * 2015-01-09 2016-10-16 鴻海精密工業股份有限公司 Device unlocking system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003052544A2 (en) * 2001-12-19 2003-06-26 Harexinfotech Inc. System and method for issuing card and processing blacklist using wireless communications
TW200601163A (en) * 2004-06-30 2006-01-01 Hundure Technology Co Ltd Non-contact door access system architecture
CN201377223Y (en) * 2009-01-06 2010-01-06 深圳日海通讯技术股份有限公司 Intelligent electronic lock monitoring system applied to outdoor telecommunication rooms and cabinets
US20140028438A1 (en) * 2012-07-25 2014-01-30 Utc Fire & Security Corporation Systems and methods for locking device management
TW201636490A (en) * 2015-01-09 2016-10-16 鴻海精密工業股份有限公司 Device unlocking system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SCG,"無線感應電子鎖-使用手冊/安裝指南(飯店版)",< http://www.scglock.com/big5/upload/downloads/20150925133238965.pdf >,上傳時間:2015年9月25日 "H-5飯店鎖系列軟體使用手冊(電子鎖管理系統使用手冊)",< http://www.chiyu-t.com.tw/tw/html/program/files/files/電子鎖軟體使用手冊.pdf >,上傳時間:2013年12月6日 *

Also Published As

Publication number Publication date
TW201816729A (en) 2018-05-01

Similar Documents

Publication Publication Date Title
WO2016065861A1 (en) System and method for real-time verification of clock synchronisation-based dynamic password anti-counterfeiting tag validity
CN104408341B (en) Smart phone user identity identifying method based on gyroscope behavioural characteristic
US9646178B2 (en) Secure data storage based on physically unclonable functions
CN110489415B (en) Data updating method and related equipment
EP2909790A2 (en) Detecting embossed characters on cards
WO2016065860A1 (en) Method and system for real-time verification of event-based dynamic password anti-counterfeiting tag validity
CN105320867B (en) Electronic device and fingerprinting method
AU2017200935A1 (en) Method for securing and verifying a document
CN105205674A (en) Product anti-counterfeiting method based on two-dimensional code
US20160103538A1 (en) Electronic device and access control method
DE60103044D1 (en) METHOD AND SYSTEM FOR THE ELECTRONIC RECORDING OF TRANSACTIONS AND FOR IMPLEMENTING SECURITY FUNCTIONS
CN113468520A (en) Data intrusion detection method applied to block chain service and big data server
US11295125B2 (en) Document fingerprint for fraud detection
TWI606424B (en) System and method for detecting and deactivating illegal access cards
CN111767537A (en) Tamper verification method of application program based on IOS (operating system) and related equipment
CN105335630B (en) Personal identification method and identity recognition device
CN103902866A (en) File protection system and method
CN104636059B (en) The searching method and its system of account project
US20190087824A1 (en) System and method for mitigating effects of identity theft
CN106355120B (en) A kind of method and apparatus for preventing card information to be replicated
US20230071377A1 (en) Methods for Signature Verification and Authentication
KR101862687B1 (en) Entry and exit record management system and method thereof
Mohamed et al. Blockchain for tracking serial numbers in money exchanges
JP2018041452A (en) Input collation method
Choudhary et al. Implementation of integrated security system by using biometric function in atm machine