五、新型說明: 【新型所屬之技術領域】 θ本創作為一種多重安全管制保全裝置與系統,特別 疋裝设於特定保全場所進出入口的保全裝置,並藉此建 立一具有多重安全認證技術的保全系統。 【先前技術】 為了確保特定場合的安全性,特別如銀行金庫 t門戶、,習知技術提出多樣的安全措施,包括派任保全人 貝、以複雜的認證機制管制這些場合的進入人員= 戶機構的強度等措施來確保安全性。 内 習知技術如應用於—般的保險箱或金庫,這方面 ,技,主要提供-個具有防正破壞輕射卜體與具有保密 直防盜功能的鎖,相關技術曾有習知技術如中華新^ ==,金庫密碼鎖防盜開機構與第聰4 =揭^金庫電子密碼叙配合結構,但這些主要是應用 傳統检碼鎖的技術與其中特殊結構的設計。 ^^箱或金庫的保全措施’則可能具有警 匕,當有不當人侵歧開啟的行為時,可以發”報,習 = 第MM45號揭露的具警戒系統之 發;合»疋在保險箱中設置有警報線路,經觸 “產生”,、線訊號’由警報器接收後產生尊報。 ^來’由於短距_無線通訊的發展 ^的通财式也可_於蚊場合的保 有^ 為一種主動式_門鎖保全控制結二 華民國專利第觀纖號,公告日:2〇i_i)jL中庫 4/23 M439229 用了 別_D)技術使用在門鎖保全中。 圖1中顯示之門鎖保全控制結 頻單元i。’其中元件主要有 片103中栽有識別石馬。當此主動式無線射頻單:10動= ,識=;路轉化成訊號’藉由第二二 、,.。構中具有—控制域12,其中元件主要有第二 :、第與處理器125,與主動式無線射頻單元ι〇V. New description: [New technical field] θ This creation is a multi-security control and maintenance device and system, especially for the security device installed in the entrance and exit of a specific security site, and thereby establishing a multi-security authentication technology. Security system. [Prior Art] In order to ensure the security of specific occasions, especially in the case of bank vaults, the prior art proposes various security measures, including the transfer of security personnel, and the entry of personnel in these occasions with complex authentication mechanisms. Measures such as strength to ensure safety. The internal know-how is applied to a general safe or a vault. In this respect, the technology mainly provides a lock with anti-corruption light body and a secret anti-theft function. The related technology has been known as Chinese new technology. ^ ==, the treasury password lock anti-theft mechanism and the Ding Cong 4 = Jie ^ treasury electronic password narration structure, but these are mainly the application of the traditional code lock technology and the design of the special structure. ^^Box or treasury's preservation measures' may be vigilant. When there is an act of infringement by the wrong person, you can send a newspaper, Xi = No. MM45 to expose the system with a warning system; There is an alarm line, which is “produced” by touch, and the line signal 'received by the alarmer. ^ Come to 'due to the development of short-distance _ wireless communication ^ can also be used in the mosquito case ^ An active _ door lock security control knot two Huamin patents view the number, announcement day: 2〇i_i) jL library 4/23 M439229 used _D) technology used in the door lock security. Figure 1 shows The door lock protects the control frequency unit i. 'The component mainly has a chip 103 in which the identification stone horse is planted. When the active radio frequency single: 10 moves =, the knowledge =; the road is converted into a signal' by the second two, The structure has a control domain 12, wherein the components mainly have a second:, the first processor 125, and the active radio frequency unit ι〇
以即料能1械訊賴應’控勤機12喊理器125 以訊唬線連接控制一警報器16之啟閉。 各^元件形成的系統亦包括有—設於保護對象外 側的"職置14,功能是感應人侵者進人裝置的感測範圍 〇 此技術的手段主要是應用主動式無線射鮮元1〇與控 制主機12 _無線射頻朗技術作為是否啟動或關閉保全 措施的認證方式。當感測裝置14感應到有人員進入範圍内 時,人員應該利用主動式無線射頻單元1〇將其中所載的識In the event that the device can be operated, the operator 12 is connected to the operator 12 to control the opening and closing of an alarm device 16 by means of a signal line connection. The system formed by each component also includes a "position 14 disposed outside the protection object, and the function is to sense the sensing range of the invader into the device. The means of this technology is mainly to apply the active wireless light element 1 〇 and control host 12 _ wireless radio technology as the authentication method to start or close the security measures. When the sensing device 14 senses that a person has entered the range, the person should use the active radio frequency unit 1 to identify the information contained therein.
別碼傳送至控制主機12,由其中接收器123接收後,判斷 出是否與已登記的識別碼相符,藉此判斷是否利用檠報器 16產生警報。 ° ° 【新型内容】 鑑於習知技術所提出的各種保全措施仍具備有系統本 身的缺陷,如容易被竄改、入侵’仍可能有安全上的缺失 與安全性不足的疑慮,因此本揭露書提出裝置在特定場合 (如金庫、進出入口)的一種多重安全管制保全裝置,能 夠透過裝置所提供的多種安全認證功能加強保全能力。 5/23 一本揭露書描述-種多重安全管制保全裝置與系統,根 據實施例,其中多重安全管制保全裝置連結於—被保護主 體上,並與其中的門鎖連接。 保全裝置主要包括有執行數據處理的微處理器、連接 於門鎖的門禁控制單TL、可以執行至少兩個認證功能的認 證介面單元,以及域至少_認證功能之程式碼的記憶 單元。 根據貫把例之-,上述保全裝置中的認證介面單元包 ,可以無線方式偵測與接收認證裝置訊號的無線訊號存取 單元,比如是應用射頻識別(RFID)技術,當 難置,綠赠存取單元將讀取其㈣㈣ 面單元包括有一輸入單元,供人員輸入認證資料,可為接 收字元輸人的鍵盤 '娜臉部特徵_影機或接收手勢指 令的觸控螢幕。 根據實施例之-,若保全裝置採用一種使用動態密碼 認證的,術,,上述織介面單元更包括產生動態密碼之密 碼產生器,當啟動相關認證程序時,裝置與人員手持之裝 置將會同步產生動態密碼,以核對認證資料。 多重安全管制保全裝置更包括一通訊單元,提供此保 全裝置連接i制中心,可以與管制中心、通訊或是傳遞訊 號。上述記憶單元可包括-記載認證資料的認證資料庫, 提供核對人員所輸入的各種認證資訊。保全裝置亦可包括 -用以偵測人員接近此保全裝置的一種接近感知單元比 如利用光線遮斷的方式。 創作更提供-設於金庫進出人。的保全純,特別是 應用上述多重安全管制保全裝置的保全系統。 6/23 1/ M439229 根據創作實施例’使用上述具有多重安全管制機制的 保全裝置可以提供至少兩種認證程序,比如第一道認證程 序於人員接近保全裝置時啟動’裝置將要求人員執行第一 次認證,比如利用一感應晶片卡接近此保全裝置的認證介 面,經認證成功後,啟動第二道認證程序,要求該人員執 行第二次認證。 此第二道認證程序比如由保全裝置運算後動態產生後 比對人員所輸入動態產生的密碼,經比對後,第二次認證 鲁 成功,也完成多重安全管制保全系統的認證程序,開啟被 保護主體之門鎖。 上述動態產生的動態密碼係為保全裝置根據第一次認 證程序中的資料產生,亦可包括系統的時間資訊,提示於 人員,由人員據以輸入完成認證。 【實施方式】 為了提供安全性更好的保全措施,本創作提出一種結The code is transmitted to the control host 12, and after being received by the receiver 123, it is judged whether or not it matches the registered identification code, thereby judging whether or not the alarm is generated by the reporter 16. ° ° [New content] Since the various protection measures proposed by the prior art still have the defects of the system itself, such as being easily falsified and invaded, there may still be concerns about lack of security and lack of security. Therefore, this disclosure proposes A multi-security security device that protects the device in specific situations (such as vaults, entrances and exits), and enhances security capabilities through a variety of security authentication features provided by the device. 5/23 A disclosure describes a multi-security control security device and system, according to an embodiment, wherein a multiple security control security device is coupled to a protected body and coupled to a door lock therein. The security device mainly includes a microprocessor for performing data processing, an access control control unit TL connected to the door lock, a certification interface unit capable of performing at least two authentication functions, and a memory unit of a domain at least _authentication function code. According to the example, the authentication interface unit package in the security device can wirelessly detect and receive the wireless signal access unit of the authentication device signal, for example, applying radio frequency identification (RFID) technology, when it is difficult to set up, the green gift The access unit will read its (4) (four) face unit including an input unit for the person to input the authentication data, which may be a keyboard for receiving the character input, a facial feature, or a touch screen for receiving gesture commands. According to the embodiment, if the security device adopts a dynamic password authentication, the above-mentioned weaving interface unit further includes a password generator for generating a dynamic password, and when the related authentication program is started, the device and the device held by the person are synchronized. Generate a dynamic password to verify the certification data. The multi-security security device further includes a communication unit that provides the security device to connect to the control center, communicate with the control center, or transmit signals. The above memory unit may include a certification database that records the authentication data, and provides various authentication information input by the verification personnel. The security device can also include - a proximity sensing unit for detecting a person approaching the security device, such as by means of light interruption. Creation is more available - set in the treasury. It is purely pure, especially the security system that uses the above multiple security control security devices. 6/23 1/ M439229 According to the authoring embodiment 'using the above-mentioned security device with multiple security control mechanisms, at least two authentication procedures can be provided, for example, the first authentication procedure is initiated when a person approaches the security device. The device will require the person to perform the first The secondary authentication, for example, uses an inductive chip card to access the authentication interface of the security device. After the authentication is successful, the second authentication procedure is initiated, and the personnel is required to perform the second authentication. The second authentication procedure is, for example, dynamically generated after the security device is calculated, and the password generated by the comparison personnel is dynamically generated. After the comparison, the second authentication succeeds, and the authentication procedure of the multiple security control security system is completed. Protect the door lock of the main body. The dynamically generated dynamic password is generated by the security device according to the data in the first authentication procedure, and may also include the time information of the system, prompting the personnel, and the personnel input to complete the authentication. [Embodiment] In order to provide better security measures, this creation proposes a knot.
合多種認證技術於-的多重安全管制保全裝置與系統,其 中保王裝置裝⑨於特定保全場所進出人口,藉此裝置建立 具有夕重安全認證技術的保全系統。應祕保全裝置所 揭=的多重安全管娜全彳、統實關可參考圖2所示的使 用貫施例示意圖。 圖令顯示在一個場所(如金庫2)中設有一保全裝置 〜人Ϊ特別魏安全性的場所引人本揭露書所揭示的多重 二二制保全緒,*其巾保全裝置2。連接於進出入此場 、人口 20 ’特別是連接門鎖,經過多重認證後才使得 進入。 7/23 此例中,設於金庫2出入口 2〇ι的保全裝置2〇提供至 少兩道認證程序,保全裴置20電性連結於控制出入口 2〇1 p雜或關閉的門鎖’外部元件包括有一無線感應器2〇3與 輸入介面204。 圖中有人員22手持-感應卡片2〇5’比如是使用射頻 識別技術(RFID)的1C卡,感應卡片2〇5載有識別碼,經 與保全裝置20上的無線感應器203感應,可以讀取其中識 別碼(需解密)’藉此識別持有人的身份,此為本創作的認 s登方式之一,並非用於限制本創作之實施。 另外,保全裝置20上的輸入介面2〇4可為一連結内部 电路的數子鍵盤或是具有特定字母與符號的鍵盤,人員 到現場除了利用感應卡片2G5認證外,更需輸入密碼,透 過至少兩道遇證程序完成更具安全性的認證。 ,在上述的認證方式中,人員22所持有的感應卡片2〇5 因為載有系統已㈣錄的識別碼,因此各人貴22所持為專 屬的卡片’在人員離職或異動時,應更新系統内認證資料 庫。 在本創作其他實施例中,並不排除利用生物辨識( b1〇metricrecogniti〇n)的技術(如臉部、指紋、靜脈圖像、 虹膜、聲紋等)進行認證。 在丨士在另—Λ施例中’保全I置2G可透過網路連線遠端管 =心’管制中心除了可以接收保全裳置2()發出的訊號( :報、電力狀態、錯誤貧訊等),可遠端存取連線的保全 變更内部設定(如密碼、進出入人員權限),並可遠 域置料作資訊(如财、故障、電力狀態),管制 心更能對保全裏置2G内的資料執行遠端更新 ,包括其中 8/23 資料庫、密碼與程式更新等。 上述保全裝置與進出入門與管制中心的關係可袁 3所示意顯示的實施態樣。 / ° 其中描述一多重安全管制保全裝置30中的各元件功能 二保:裝置30具有數據處理功能,其運算核心為一用於‘ 仃各電路元件訊號處理的微處理器3〇1,另有與此微處理器 3〇1電性連接的通訊模組3〇5,保全裝£ 3〇藉此通訊模电 3〇5以有線或無線手段連接外部管制+心3,比如透過網際 網路(Internet)連線管制中心3,並傳遞訊息。 丁、 —保全裝£30可以提供進入人員進行身份認證,包括圖 示中的 "面303,根據實施例之一,認證介面可提 供如RFID、NFC等近端通訊技術的功能,或可提供刷卡 接觸式認證方式’❹者可手持—域應晶片卡的認證裝 置33接近認證介面3〇3,相互感應而交換資訊。另外,切 證介面303亦可為一可輸入資料的介面,包括觸控與實體 的鍵盤,人員可輸入密碼34進行認證。 、 圖中標示32為-被保護主體,設有一進出人口,保全 裝置30裝設於進出人門上,特別是電性連接於圖中顯示的 門鎖309 ’ Η鎖3〇9的啟閉動作可根據保全裝置3〇所傳遞 的訊號。此例中,保全裝置3G包括有—電性連接 理器則的門禁控制單元3〇7,門禁控制單元撕連接於;; 鎖309,為被保護主體32與此保全裝置%間的介面,微處 理益3(Π將根據認證介面則所取得的認證資料進行判斷 ,進而產生控制訊號給門禁控制單元術,藉此控制門鎖 309的啟閉動作。 309 (electromagnetic lock) 9/23 ,因此將可根據控制訊號決定給予的電流訊號來控制開啟 或關閉;若為-般機械式門鎖,門禁控制單元3〇7將根據 控制訊號控制門鎖3〇9連接進出入門的門閃(b〇lt)機構, 控制開啟或關閉。其中可以因為認證成功而允許開啟門鎖 309 ’反之,門鎖3〇9是否關閉的訊 =傳遞給保全裝置30。保全裝置3〇中更可包 過證貝料、系統程式、密碼產生程式等内容的記憶體302 ,記憶體302電性連接於微處理器3〇1。 圖4接著顯示本創作保全裝置可執行至少兩組認證程 序的電路方塊實施態樣。 圖中顯示為一種多重安全管制保全裝置4,連結於一被 保護主體與魏護域之門鎖4G,在此裝置4的主要電路 特徵中,包财執行保全裝置4内各電路單元_數據處 理的微處理ϋ 41 ’電性連接微處理器41的元件還包括有 門禁控制單元43、認證介面單^ 47與記憶單元49。 、,根據實施例’門禁控制單元Μ連接於被保護主體之門 鎖40 ’用乂根據微處理器41產生的控制訊號來開啟或關閉 門鎖40’若此為一種以電流改變而控制啟閉的電磁門鎖, 可接收門$控制單^3產生之啟閉訊號,根據認證結果而 來開啟或關閉電磁門鎖。門鎖4G亦不排除可為一 構认片的Η鎖’因此門禁控制單元可以利用機構設計 直接控制門鎖40的機構而控制開啟或關閉。此例門鎖 之描述並不用於限制本創作之實施範圍。 :幻丨©單7C 47為提供人貝認證_操作與接觸介面 、中具有至少兩個認證雜,例來說裝置4提供一 個無線訊#。*的舰,如—_賴制(腦^技術 10/23 之。貝卡機,遇證介面單兀47包括一個無線訊號存取單元471 可以無線方式偵測與接收—認證裝置之訊號 ,認證裝置 载有賴貧料,可為人員所持有的任何無線裝置,如使用 射頻識別技術的感應晶片卡、無線收發器(d〇ngle)或是其 他類似可具有儲存與傳遞識別資料的無線裝置。 1認證介面單it 47可包括有輸入單元二提供人員輸 入w、5立貝料,其實施方式包括一接收字元輸入的鍵盤、擷 取臉特徵的攝影機或接收手勢指令的觸控螢幕。其中鍵 现可提供人員輸入遇證資料、密碼等;攝影機的設置可為 監視現場f況,亦可為一種接收人員肢體產生認證的工具 比如員可以做出一個動作確認事先擬好的認證根據; 此輪入單兀472可實現為一觸控面板,因此人員可以透過 手勢觸控的方式進行認證,或是輸入資訊。 如圖所心認證介面單元47可以具有—密碼產生單元 動態密碼的產生器,當裝置4提供動態密碼的認 a功月,人員將於認證過程中即時接獲—個動態密碼, • 炫時間内輸人,以取得認證,此處之動態密石馬產生 式f與保全裝置4簡碼產生單元473 -致,因此兩者 同條件下可以產生對應的密碼,透過核對來認證身份 上述§己憶單元4 9可記載至少兩個認證功能之程式碼, ^如圖中所示的第—認證程序區塊491與第二認證程序區 兩個記憶區塊’分職有裝置4執行的兩個不同認 碼。舉例來說,當裝置4啟動第-認證程序 :哎1处理态41將載入第一認證程序區塊491,執行第一 …且知序’如上例’裝置4將要求人員使用感應晶片卡進 11/23 M439229 仃身份識別的認證程序,相關軟體將讀取感應晶片卡中所 载的識別資料,並核對是否為安全名單内的人。當裝置4 啟動第二認證程序時’微處理器41將載入第二認證程序區 塊492 ’執行第二認證程序,如上例,裝置4的第二認證程 序將驅動也碼產生裔產生動態密碼,與人員所輸入的密碼 進行核對。 心It單το 49另可具備儲存人員認證資料的認證資料庫 93 ’用以核對一些認證資料。 圖5再顯示補作保全裝置的另—實施例示意圖,其 ^及剌本難多重安全管龍全裝置的保全系統,此 '。、王系統可設於-麵或是各種設有安全措施之進出入口 itb例中,多重安全f制保全系統中設有連結於被保護 =4的保全褒置50,保全裝置5〇中根據電路功能包括 $保全健50内各元件訊號處_微處理單元5〇1, 521置,括有通訊單元搬,藉此可連線於管制中心 、訊早το 502電性連接微處理單元%〗, 一 55201/1處理自通訊單元观產生的通訊訊號,二== 54如5〇2接收保全裝置5〇的訊號。被保護主體A multi-security control security device and system with a plurality of authentication technologies, wherein the device is installed in a specific security location, and the device establishes a security system with a security authentication technology. Refer to the schematic diagram of the application example shown in Figure 2 for the multi-safety management system and the system. The order shows that there is a security device in a place (such as the vault 2). The place where the person is particularly Wei Wei is introduced into the multiple disclosures disclosed in this book, and the device is fully protected. Connected to and from the field, the population 20 ', especially the connection of the door lock, after multiple certifications to enter. 7/23 In this example, the security device 2 located at the entrance and exit 2〇 of the vault 2 provides at least two certification procedures, and the security device 20 is electrically connected to the control door 2'1 or the closed door lock' external component. A wireless sensor 2〇3 and an input interface 204 are included. In the figure, there is a person 22 hand-sensing card 2〇5' such as a 1C card using radio frequency identification technology (RFID), and the sensor card 2〇5 carries an identification code, which is sensed by the wireless sensor 203 on the security device 20, Reading the identification code (requires decryption) 'by identifying the identity of the holder, this is one of the ways of recognition of the creation, and is not intended to limit the implementation of this creation. In addition, the input interface 2〇4 on the security device 20 can be a number sub-keyboard connected to the internal circuit or a keyboard with specific letters and symbols. In addition to using the sensor card 2G5 authentication, the person needs to input a password, at least through the password. Two verification procedures complete a more secure certification. In the above authentication method, the sensor card 2〇5 held by the person 22 is loaded with the identification code recorded by the system (4), so each person holds 22 exclusive cards, which should be updated when the personnel leave or change. In-system authentication database. In other embodiments of the present invention, the use of biometric (b1〇metricrecogniti〇n) techniques (such as faces, fingerprints, vein images, irises, voiceprints, etc.) for authentication is not excluded. In the gentleman's other embodiment, 'preservation I set 2G can be connected through the network to the remote tube = heart' control center in addition to receiving the signal sent by the preservation of the 2 () (: report, power status, error poor Information, etc., can be used to remotely access the security of the internal settings (such as passwords, access personnel permissions), and can be used for remote information (such as financial, fault, power status), the control can be more secure Remotely update the data in 2G, including 8/23 database, password and program update. The relationship between the above-mentioned security device and the entry and exit entry control center can be expressed in the manner indicated by Yuan 3 . / ° which describes the function of each component in a multiple security control security device 30: the device 30 has a data processing function, and its operation core is a microprocessor 3' for the processing of each circuit component signal, and the other There is a communication module 3〇5 electrically connected to the microprocessor 3〇1, and the security module 3〇5 is connected to the external control+heart 3 by wired or wireless means, such as through the Internet. (Internet) Connect to Control Center 3 and deliver the message. Ding, the full installation of £30 can provide access personnel for identity authentication, including the "face 303 in the figure, according to one of the embodiments, the authentication interface can provide functions such as RFID, NFC and other near-end communication technologies, or can provide The card contact authentication method is the same as that of the authentication device 33, which is close to the authentication interface 3〇3, and exchanges information with each other. In addition, the authentication interface 303 can also be an interface for inputting data, including a touch and physical keyboard, and the person can input the password 34 for authentication. In the figure, 32 is a protected body, and an inbound and outbound population is provided. The security device 30 is mounted on the entrance and exit door, and is particularly electrically connected to the door lock 309 ′ 显示 lock 3〇9 shown in the figure. The signal can be transmitted according to the security device. In this example, the security device 3G includes an access control unit 3〇7 having an electrical connection device, and the access control unit is tornly connected; the lock 309 is an interface between the protected main body 32 and the security device. Processing benefit 3 (Π will judge according to the authentication data obtained by the authentication interface, and then generate a control signal to the access control unit, thereby controlling the opening and closing action of the door lock 309. 309 (electromagnetic lock) 9/23, therefore The current signal can be controlled according to the control signal to control the opening or closing; if it is a mechanical door lock, the access control unit 3〇7 will connect the door lock 3〇9 according to the control signal to the door of the entry door (b〇lt The mechanism, the control is turned on or off. Among them, the door lock 309 can be opened because the authentication is successful. On the contrary, whether the door lock 3〇9 is turned off is transmitted to the security device 30. The security device can also be used to pass the certificate. The memory 302 of the system program, the password generating program, and the like, and the memory 302 are electrically connected to the microprocessor 3.1. Figure 4 then shows that the authoring security device can execute at least two sets of authentication programs. The block diagram shows a multi-security control and security device 4, which is connected to a protected body and a guardian door lock 4G. In the main circuit features of the device 4, each of the package execution security devices 4 The circuit unit _ data processing micro-processing ϋ 41 'electrically connected to the microprocessor 41 components further includes an access control unit 43, an authentication interface unit 47 and a memory unit 49. According to an embodiment, the access control unit is connected to The door lock 40' of the protected body is used to open or close the door lock 40' according to the control signal generated by the microprocessor 41. If this is an electromagnetic door lock that controls the opening and closing with a current change, the door can be received. 3 The opening and closing signal is generated, and the electromagnetic door lock is opened or closed according to the certification result. The door lock 4G does not exclude the shackle which can be a constituting piece. Therefore, the access control unit can utilize the mechanism design to directly control the mechanism of the door lock 40. The control is turned on or off. The description of the door lock is not used to limit the scope of the creation of this creation. : 丨 丨 © 7C 47 is for providing people's certification _ operation and contact interface, with at least two recognition Miscellaneous, for example, device 4 provides a wireless communication #.* ship, such as - _ system (brain ^ technology 10 / 23. Beka machine, the interface interface 47 includes a wireless signal access unit 471 can Wireless detection and reception—the signal of the authentication device, which is based on any wireless device, such as an inductive chip card using radio frequency identification technology, a wireless transceiver (d〇ngle), or Other similarly, there may be a wireless device for storing and transmitting identification data. 1 The authentication interface unit 47 may include an input unit 2 providing a person input w, 5 sheets of material, and an embodiment thereof includes a keyboard for receiving character input, capturing a face A feature camera or a touch screen that receives gesture commands. The button can now provide personnel to enter the witness data, password, etc.; the camera can be set to monitor the situation of the scene, or a tool for receiving the body member to generate certification, such as a member can make an action to confirm the prepared certification basis; The turn-in unit 472 can be implemented as a touch panel, so that the person can authenticate by gesture touch or input information. As shown in the figure, the authentication interface unit 47 can have a password generation unit dynamic password generator. When the device 4 provides the dynamic password recognition, the personnel will receive a dynamic password immediately during the authentication process. In order to obtain the certification, the dynamic boulder horse production type f and the security device 4 short code generation unit 473 are used here, so that the corresponding password can be generated under the same conditions, and the identity is verified by the verification. The unit 49 can record the code of at least two authentication functions, and the first authentication program block 491 and the second authentication program area shown in the figure are different from the two memory blocks. Identification code. For example, when device 4 initiates the first-authentication procedure: 哎1 processing state 41 will be loaded into first authentication program block 491, executing the first... and knowing the 'example above' device 4 will require personnel to use the induction wafer card 11/23 M439229 仃 Identification authentication procedure, the relevant software will read the identification data contained in the sensor chip card and check whether it is a person on the safety list. When the device 4 starts the second authentication process, the 'microprocessor 41 will load the second authentication program block 492' to execute the second authentication process. As in the above example, the second authentication program of the device 4 will drive the code generation to generate the dynamic password. , check with the password entered by the person. The heart It το 49 can also have a certification database for storing personnel certification data 93 ' to check some certification materials. FIG. 5 again shows a schematic diagram of another embodiment of the supplementary security device, which is a security system for the multiple safety device. The king system can be located in the - surface or in various examples of access and access itb with security measures. The multi-security f system has a security device 50 connected to the protected = 4, and the security device 5 The function includes the components of the signal protection unit _ micro processing unit 5〇1, 521, including the communication unit to move, which can be connected to the control center, the communication το 502 electrical connection micro-processing unit%〗, A 55201/1 processes the communication signal generated from the communication unit view, and the second == 54, such as 5〇2, receives the signal of the security device 5〇. Protected subject
人保全裳置50中更包括有接受人員執行身份㈣ "=綱,認證介面單元5〇4電性 I 把訊號,包括職的加職、識別、比 相關的認證程序。認證介面單元綱用=,啟動 之認證裝置產生的識別訊號(識別码)與動態密= 12/23 "面,比如是一個觸控面板、鍵盤、非接觸式(如使用虹① 等近場通訊技術)或接觸式(刷卡)的讀卡裝置等,此例 中可連接一设於外部的感應介面541,如一個觸控區域,或 是可以讀取晶片訊號的讀取器,另可連接輸入介面542,提 供人員輸入資料。 ,保全裝置50具有記憶單元5〇5,利用其中記憶體儲存 此也資料,包括靜態儲存的資料,如記載認證上述認證裝 置之識別碼的認證㈣庫;亦可包括運算動態㈣之程式 、,二啟動動態岔碼認證程序後,上述微處理單元5〇丨將載 入相關運算程式’動態產生密碼,可與外部認證裝置同步 〇 在本創作實施例中,多重安全管制保全系統特別是設 計用於保雜定場所的進出人口,保全裝置%將設置於被 保。蒦主體54上’並可連結於被保護主體%之門鎖上,裂 置50内設有門禁控制單元5〇6,門禁控制單元5〇6電性連 接微處理單元5(M ’連結於門鎖(如金庫之門鎖),為保全 裝置50控制門鎖啟閉之控制電路’將根據微處理單元划 於認證後產生的訊號驅動啟閉門鎖,Η鎖比如是-種根據 電§fL號啟閉的電磁門鎖。 多龍全纽為執行動態密碼認證,保全 密碼處理單元507,動態密碼處理單元 ^統將可透過此具有運算能力的動態二 全I統之態密碼程式,並可根據多重安全管制保 二能密以理《 °時間㈣)動態產生動態密碼。這些由 動W碼處理早元5G7所管理的認證資料多數為隨機變動 13/23 M439229 的密碼,將隨著時間變動㈣變,與相對的認證裝置進行 同步’因此進人此被輯主體54的人員需要 碼產生裝置找正销行織。 保全裝置50外不可連接與人員溝通的顯示器53卜内 部具有電性連接微處理單元5G1的顯示單元5〇3,用以處理 顯示訊號,顯示ϋ可用來顯示提示人M進行每—步動作, 或疋顯示s忍證結果,包括警告内容。 為確保多重安全管制保全系統的安全性,保全裝置5〇 的電力供應可以同時包括電力公司提供的交流電力(如電 源582)與内部電池581提供的直流電力。裝置5〇内具有 一電力管理單元508’用以管理裝置内的電力配置,包括監 控裝置運作電力的狀態,確保裴置50穩定運作。 保全裝置50提供感應接近物體的功能,如其中具有電 性連接微處理單元501的接近感知單元509,外部連接一感 應克591,利用光學、無線訊號感應、影像感測、溫度感測 、或其他可根據環境變化判斷是否有物體接近的感應方式 感測人員接近,使系統可進一步要求接近人員執行身份認 證。 應用本創作提供的保全裝置與其系統,實施例主要包 括利用兩道認證程序進行人員安全管制,由裝置所觸發的 認證流程在於人員接近此保全裝置時啟動第一道認證程序 ’要求人員執行第一次認證,第一次認證可以在眾多認證 方式中選擇其一,比如由人貝手中所持的感應卡片利用無 線通訊技術(如RFID,NFC)與保全裝置交換資訊,以此 認證人員身份。 本創作實施例流程之一: 14/23 此第一認證流程將判斷第一次認證是否成功?若失敗 ’可利用燈號、訊息、聲響等方式發出警示,接著可以重 新執行第一道認證程序,或是設定整個認證程序失敗而不 允進入。但若第一次認證成功,將接著啟動第二道認證程 序’要求人員執行第二次認證。 w且王 第二迢認證程序可為不同於第一道認證程序的步驟, 比如要求人員鍵入密碼’密石馬包括記憶的靜態密碼(可記 载於保全裝置内的認證資料庫)與透過手持裝置執行程式 動態產生或疋接收的動態岔碼,密碼確認的程序可為此第 二道認證程序◊其他亦不排除可以生物特徵、手 識方式取代第二道認證程序。 、、辨 若第二次認證失敗,保全裝置將發出第二次警示訊自 ,同樣可為燈號、訊息、聲響等方式,接著或可重新執二 此第二道認證程序,或著需要回到第一道認證程序,重新 認證;若第二次認證成功’即完❹重安全f制保全系統 的認證程序,裝置之微處理器將產生控制訊號,由門禁控 制單元接收’以開啟被保護主體之門鎖。 本創作實施例流程之二: 當有人員進入特定設有多重安全管制功能的保全裝置 的場合時,人員可以利用所持有的身份識別裝置進行第一 道認證,如使用晶片卡、無線電收發器(dongle)、或是透 過裝置上的識別裝置進行生物辨識。若以晶片卡為例,可 以使用刷卡或是無線讀卡的技術,保全裝置内設有讀卡器 與記憶體,利用記憶體内的識別資料進行認證。另不排除 在認證時連線到設於遠端的認證資料庫,進行遠端認證。 若識別失敗,依照設定的規則(比如允許失敗次數、 M439229 時間間隔等),保全裝置將可產生警報並可重新執行識別身 份的動作,若成功認證,即進入第二道認證程序可為保 全裝置透過語音、顯示器或是燈號等方式提醒人員鍵入密 碼。根據實施例,密碼可為由人員所記憶或是查表的一種 靜態設定(仍可能定時更新)的密碼,於現場透過保全裝 置提供的輸入介面(如鍵盤、觸控面板)鍵入當下應該輸 入密碼;另有實施例則不排除以另外—種不同於第一道認 證私序的方式進行認證,比如利用影像辨識技術判斷人員 身份、判斷手勢口令是否正確,或可使用其他生物識別方 式,更可以第二道密碼進行認證。 在此例中,第一道認證程序係為由人員利用特定載體 接收道一種動態產生的密碼,此動態密碼為根據實際狀態 提供給該人員’由人員依照指示的動態產生的動態密碼輸 入,經系統接收此動態密碼後,才得判斷是否通過第二道 認證程序。 上述動態密碼的認證方式主要是在人員配戴或手持的 裝置上顯示與系統一致的密碼,此類技術主要是以時間差 做為系統(可設有密碼產生功能的伺服器)與進出人員所 持裳置上的㈣產生ϋ的同步條件。在需要認證的時候, 就利用密碼產生器產生一動態密碼,應在所設定的時間限 制内於保全裝置輸入密碼,否則該組密碼即失效,下次認 證則須使賴產生的另-_態密碼,具有嚴密的安全性 〇 在此列舉一例,進入此特定場所的人員手中持有一種 載體,可為一種稱為Token的動態密碼產生器,上方具有 顯示器,當進入第二道認證程序後(不排除於第一道認證 16/23 M439229 程序即使用此任正方式),可由管制巾^,或是連線的任一 —丑中〜傳遞動以碼’並顯示於此抓⑽裝置上的顯示 器’再由人貞輸人至保全裝置;另可域全裝置根據内部 貧訊(如系統時間資訊、或是料產生H)或是人員第-次,證的#錢行㈣,進而透過人員手上的裝置顯示動 癌密碼’人S依此輸人執行認證;另有實施例可由遠端管 制中%利用簡訊方式(Slmple message serviee,SMS)傳遞 動態密碼至人員手中持有的手機,人M即可據此輸入,保 全裝置有同步此訊息的機制可以判斷出是否輸入正確。 在上述由特疋岔碼演算法所產生一組隨機而變動的密 馬的方式,主要可避免非原持有晶片卡的人擅自闖入,雖 可能通過第一道認證程序,但可能因為未持有另一如Token ,裝置,仍難以通過第二道認證程序。此類動態密碼由人 員手持裝置於完成第一道認證程序後自行產生,其中資訊 將與保全裝置同步,因此可以取得認證。 當第二道認證程序失敗,系統產生任何型式的警報或 要求重新輸入密碼,步驟仍可回到第一道認證步驟中,重 新執行認證;但若被要求重新輸入另一次密碼,同樣可如 上述密碼的產生方式產生一組新的動態密碼。 動恶密瑪的§忍證次數可依據系統設計而定,步驟可以 重新由弟一道認證程序繼續進行,或重新再次取得另一動 態密碼。經第二道認證成功後,保全系統將允許進入被保 °蒦主體’比如將驅動開啟門鎖。 在執行認證程序時,依照系統設計可以有不同啟動各 認證裎序的方式’根據實施例之一,當上述人員進入特定 設有多重安全管制功能的保全裝置的場合時,若該人員持 17/23 M439229 =是配戴著可感應多重安全管制保全系統啟動的物品, 如使用-感應晶片卡,感應晶片與保全褒 訊方法連線。當持有此感應晶“包括載有此: 置或紐)接近保全裝麟,可㈣啟動第一道認 °在此财’第-道認證程序包括保全裝置接收來 自感應晶片卡所傳遞的身份識別碼,用以比對保全裝置内 =或,外取得的繼㈣庫,以確認身份識㈣是ς為安 全名單。此時,若身份識別碼並非為安全名單,則如上述 =驟S503判斷為第―次認證失敗;若身份識別碼為安全名 早,則第一次認證成功。 裝置設計上,可參考圖6所示本創作裝置設置的 例示意圖。 、 圖中顯示設於進出入口 6的一個保全裝置64,保全裝 置料連接著門鎖60,利用電子式或是機械式的方式開啟^ 關閉門鎖60。 由於保全裝置64具有通訊功能,可以透過網路路由器 ,連結外部裝置’如管制中心的伺服主機,藉此可以與外 訊'傳遞訊號,包括管制中心人員可以取得現場晝面 ▲聲s或疋各種保全資訊,更或者,管制中心可以透過 這二通訊手丨又對保全裝置64進行維護、軟體更新、監控等 動作。 保全裝置64可具有一顯示螢幕642,用以顯示與人員 /冓通知訊息,按鍵組644則是提供人員輸入各種認證資料 保全裝置64更設有無線認證功能,人員可以使用感應卡 片66與保全裝置64交換資訊;保全裝置64可具備動態密 碼5忍證的功能,因此人員可以手持一密碼認證裝置08,上 18/23 M439229 方顯示即時動態產生的密碼,透過按鍵組糾將密 保全裝置64,以此確認人員是否為安全名單之一。·"、輸入 根據本創作實施例,連接於_進出入口門鎖的 全管制保全裝置主要是多重認證方式管制進出入, ’確保特定場所的安全性’於較佳實施㈣,順庠執〜員 少兩道認證程序,較佳為不同實施態樣的認證方式,:至 於第-道認證程序中要求人員執行—密碼辨識,再於^可 道認證程序巾细生_識方式(如語音、動作 〜 掌,、=、虹膜、視網膜、靜脈辨識、臉部辨識··日等、, 或疋動悲“等執行認證。t有錯誤認證的事件產生’ =通知管制k、顯示警告訊息,妓要求第二次身广 =。因此’本揭露書描朗多重安全 ^ ::不同態樣的二或多重的認證程序確保特定4 = 惟以上所述僅為本創作之較佳 即概本創作之專利範圍,故舉凡: 等效結構變化,均_包含二= 【圖式簡單說明】 ㈤圖1顯示為習知技術主動式咖門鎖保全控制結構示 :意圖;揭7^本創作夕重*全官制保全系統的使用實施例 ^之圖;3揭露本創作多重安全管制保全裝置的實施例示意 19/23 M439229 圖4揭露本創作多重安全管制保全裝置的實施例示意 圖之二; 圖5揭露本創作多重安全管制保全裝置的實施例示意 圖之三; 圖6顯示本創作裝置設置的實施例示意圖。 【主要元件符號說明】 主動式無線射頻單元10 第一天線101 晶片103 感測裝置14 控制主機12 接收器123 第二天線121 處理器125 警報器16 人員22 保全裝置20 無線感應器203 輸入介面204 金庫2 出入口 201 感應卡片205 保全裝置30 被保護主體32 門禁控制單元307 認證裝置33 密碼34 微處理器301 認證介面303 門鎖309 記憶體302 保全裝置4 門鎖40 微處理器41 門禁控制單元43 認證介面單元47 . 記憶單元49 無線訊號存取單元471 輸入單元472 密碼產生單元473 第一認證程序區塊491 第二認證程序區塊492 20/23 M439229In addition, there are people who perform the identity (4) "=, the authentication interface unit 5〇4 electrical I signal, including the job-added, identification, and related certification procedures. Authentication interface unit outline =, the identification signal (identification code) generated by the authentication device activated and the dynamic density = 12/23 " surface, such as a touch panel, keyboard, non-contact (such as the use of rainbow 1 and other near field A communication device or a contact (swipe) card reading device, etc., in this example, an external sensing interface 541, such as a touch area, or a reader that can read the chip signal, can be connected. Input interface 542 provides personnel input data. The security device 50 has a memory unit 5〇5, wherein the memory stores the data, including statically stored data, such as a certificate (4) library for identifying the identification code of the authentication device; and a program for calculating the dynamic (4), After the dynamic weight authentication program is started, the micro processing unit 5〇丨 loads the relevant computing program to dynamically generate a password, which can be synchronized with the external authentication device. In the present creative embodiment, the multiple security control security system is especially designed. For the inbound and outbound population of Yubao, the security device will be set to be insured. The main body 54 is 'connectable to the door lock of the protected body%, and the access control unit 5〇6 is disposed in the split 50, and the access control unit 5〇6 is electrically connected to the micro processing unit 5 (M' is connected to the door The lock (such as the door lock of the vault), the control circuit for controlling the opening and closing of the door lock for the security device 50 will drive the opening and closing door lock according to the signal generated by the micro-processing unit after being authenticated, and the shackle is, for example, a type §fL Open and close electromagnetic door locks. Multi-Dragon all-news to perform dynamic password authentication, security password processing unit 507, dynamic password processing unit will be able to pass this dynamic two-in-one cryptographic program with computing power, and according to Multiple security controls can be dynamically generated by the "° time (4)). Most of the authentication data managed by the W code processing early 5G7 is a random change of 13/23 M439229 password, which will change with time (four) and synchronize with the opposite authentication device. Personnel need code generation devices to find and sell. The display unit 53 having a non-connectable communication with the personnel outside the security device 50 has a display unit 5〇3 electrically connected to the micro processing unit 5G1 for processing the display signal, and the display unit can be used to display the prompter M for each step, or疋 Display s forbearance results, including warning content. To ensure the safety of the multiple safety control system, the power supply of the security device can include both the AC power provided by the power company (such as power source 582) and the DC power provided by the internal battery 581. The device 5 has a power management unit 508' for managing the power configuration within the device, including monitoring the state of operation of the device to ensure stable operation of the device 50. The security device 50 provides a function of sensing proximity to an object, such as a proximity sensing unit 509 having an electrical connection micro-processing unit 501 therein, externally connecting a sensor 591, utilizing optical, wireless signal sensing, image sensing, temperature sensing, or the like. The sensing method can be judged according to the environmental change to determine whether an object is approaching, so that the system can further require the approaching person to perform identity authentication. Applying the security device and its system provided by the present invention, the embodiment mainly includes using two authentication procedures for personnel security control, and the authentication process triggered by the device is that the first authentication procedure is initiated when the personnel approach the security device, and the personnel are required to perform the first process. Secondary certification, the first certification can choose one of the many authentication methods. For example, the sensor card held by the person in the hands of the person uses wireless communication technology (such as RFID, NFC) to exchange information with the security device to authenticate the identity of the person. One of the processes of this creative embodiment: 14/23 This first certification process will determine whether the first authentication is successful? If it fails, you can use the signal, message, sound, etc. to issue a warning, and then you can re-execute the first authentication procedure or set the entire authentication procedure to fail. However, if the first certification is successful, the second certification process will be initiated and the personnel will be required to perform the second certification. w and Wang's second authentication procedure may be a different step than the first authentication procedure, such as requiring the person to enter the password 'Miscellaneous Horse including the static password of the memory (which can be recorded in the authentication database in the security device) and through the handheld The device executes the dynamic weight generated by the program dynamically or 疋, and the password confirmation program can replace the second authentication program for the second authentication procedure, and does not exclude the biometric and hand recognition methods. If the second authentication fails, the security device will issue a second warning message, which can also be the signal, message, sound, etc., or may re-execute the second authentication procedure, or need to return To the first certification procedure, re-certification; if the second authentication succeeds, that is, the authentication procedure of the system is completed, the microprocessor of the device will generate a control signal, and the access control unit receives 'open to be protected. The door lock of the main body. Process 2 of the present embodiment: When a person enters a specific security device with multiple security control functions, the person can use the identity device held by the person to perform the first authentication, such as using a chip card, a radio transceiver. (dongle), or biometric identification through the identification device on the device. In the case of a wafer card, for example, a card swipe or a wireless card reading technology can be used, and a card reader and a memory are provided in the security device, and the identification data in the memory is used for authentication. It is not excluded to connect to the remotely located authentication database during authentication to perform remote authentication. If the identification fails, according to the set rules (such as the number of failures allowed, M439229 time interval, etc.), the security device will generate an alarm and re-execute the action of identifying the identity. If the authentication is successful, the second authentication procedure can be entered into the security device. Remind people to type their passwords by voice, monitor or light. According to an embodiment, the password may be a password that is memorized or checked by a person, and may still be periodically updated. The input interface (such as a keyboard and a touch panel) provided by the security device may be entered in the field. Other embodiments do not preclude authentication in a different way than the first authentication private order, such as using image recognition technology to determine the identity of the person, determining whether the gesture password is correct, or using other biometric methods. The second password is used for authentication. In this example, the first authentication procedure is for a person to receive a dynamically generated password by using a specific carrier. The dynamic password is a dynamic password input that is provided to the person according to the actual status and dynamically generated by the person according to the indication. After the system receives this dynamic password, it is necessary to determine whether or not to pass the second authentication procedure. The above-mentioned dynamic password authentication method mainly displays a password consistent with the system on a device worn or held by a person. Such a technology mainly uses a time difference as a system (a server capable of providing a password generating function) and a player who carries in and out of the player. The set (4) produces a synchronization condition of ϋ. When authentication is required, a password is generated by the password generator, and the password should be entered in the security device within the set time limit. Otherwise, the password will be invalid, and the next authentication must be caused by another state. Password, with strict security. Here is an example. A person entering this particular location holds a carrier, which can be a dynamic password generator called Token with a display on the top, after entering the second authentication procedure ( It is not excluded from the first certification 16/23 M439229 program that uses this positive mode), can be controlled by the control towel ^, or any of the connection - ugly ~ coded and displayed on this capture (10) device The display 'has been lost by people to the security device; the other device can be based on internal poor news (such as system time information, or material production H) or personnel first-time, the certificate of the money line (four), and then through the personnel The device on hand displays the cancer-free password 'person S' to perform authentication according to this input; another embodiment can transmit the dynamic password to the staff by the remote control using the Smmple message serviee (SMS) In the mobile phone held by the user, the person M can be input according to this, and the security device has a mechanism for synchronizing the message to determine whether the input is correct. In the above-mentioned method of generating a random and changing set of secret horses by the special code algorithm, the person who does not originally hold the chip card can be prevented from entering without authorization, although the first authentication procedure may be passed, but may be because There is another device such as Token, which is still difficult to pass the second certification process. Such dynamic passwords are generated by the person's handheld device after completing the first authentication procedure, and the information will be synchronized with the security device so that authentication can be obtained. When the second authentication procedure fails, the system generates any type of alarm or asks to re-enter the password. The steps can still be returned to the first authentication step to re-execute the authentication; but if it is required to re-enter another password, the same can be said. The way passwords are generated produces a new set of dynamic passwords. The number of § 忍 忍 可 可 可 可 可 可 可 可 可 可 可 可 可 可 可 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍 忍After the second pass is successful, the security system will allow access to the insured body, such as the drive to unlock the door. When performing the authentication procedure, according to the system design, there may be different ways of starting each authentication sequence. According to one of the embodiments, when the above-mentioned person enters a specific security device with multiple security control functions, if the person holds 17/ 23 M439229 = It is equipped with an inductive multi-security control system to activate the system, such as the use of - sensor chip card, sensor chip and security method. When holding this sensor crystal "includes this: set or button" close to the security pack, you can (4) start the first pass in this fiscal 'first-channel certification procedure including the security device to receive the identity passed from the sensor chip card The identification code is used to compare the successor (four) library obtained in the security device to confirm that the identity (4) is a safe list. At this time, if the identification code is not a security list, then the above judgment is determined by step S503. The first authentication fails; if the identification code is early, the first authentication is successful. For the device design, refer to the example of the setting of the authoring device shown in Fig. 6. The figure is shown at the entrance and exit 6 A security device 64, the security device is connected to the door lock 60, and is electronically or mechanically opened to close the door lock 60. Since the security device 64 has a communication function, the external device can be connected through a network router. The control center's servo host can use this to communicate with the foreign newsletter, including the control center personnel can obtain the scenes ▲ or 疋 various security information, or, the control center can After the two communication devices, the maintenance device 64 performs maintenance, software update, monitoring, etc. The security device 64 can have a display screen 642 for displaying the notification information with the personnel/冓, and the button group 644 is for providing various input to the personnel. The authentication data security device 64 is further provided with a wireless authentication function, and the person can use the proximity card 66 to exchange information with the security device 64. The security device 64 can be provided with the function of the dynamic password 5, so that the person can hold a password authentication device 08, on the upper 18 /23 M439229 The square displays the password generated by the instant dynamic, and the security device 64 is confirmed by the button group to confirm whether the person is one of the safe lists. ·", input according to the present creation embodiment, connected to the _ access door lock The full-control security device is mainly controlled by multiple authentication methods. The 'safety of a specific location' is better implemented (4), and the two certification procedures are better, preferably different implementation methods. : As for the first-channel certification procedure, the personnel are required to perform the password-identification, and then the method can be used to authenticate the program. Sound, action ~ palm, , =, iris, retina, vein recognition, face recognition · · day, etc., or sorrow "such as performing authentication. t event with false authentication" = notification control k, display warning message , 妓 requires a second body width =. Therefore, 'this disclosure describes multiple security ^ :: different aspects of the two or more certification procedures to ensure that specific 4 = only the above is only a better example of this creation The scope of the patents created, so the equivalent: the equivalent structural changes, both _ contains two = [simple description of the diagram] (5) Figure 1 shows the structure of the control structure of the active coffee door lock security of the prior art: intention; Figure 4 shows a schematic diagram of an embodiment of a multi-security security system; 3 discloses a schematic diagram of an embodiment of a multi-security security preserving device of the present invention. 19/23 M439229 FIG. 4 discloses a second schematic diagram of an embodiment of the multi-security security preserving device of the present invention; A third schematic diagram of an embodiment of the present invention is disclosed. FIG. 6 is a schematic diagram showing an embodiment of the setting of the authoring apparatus. [Main component symbol description] Active radio frequency unit 10 First antenna 101 Chip 103 Sensing device 14 Control host 12 Receiver 123 Second antenna 121 Processor 125 Alarm 16 Personnel 22 Security device 20 Wireless sensor 203 Input Interface 204 Treasury 2 Access Door 201 Induction Card 205 Security Device 30 Protected Body 32 Access Control Unit 307 Authentication Device 33 Password 34 Microprocessor 301 Authentication Interface 303 Door Lock 309 Memory 302 Security Device 4 Door Lock 40 Microprocessor 41 Access Control Unit 43 Authentication Interface Unit 47. Memory Unit 49 Wireless Signal Access Unit 471 Input Unit 472 Password Generation Unit 473 First Authentication Program Block 491 Second Authentication Program Block 492 20/23 M439229
認證資料庫493 管制中心52 微處理單元501 顯示單元503 記憶單元505 動態密碼處理單元507 接近感知單元509 顯示器531 輸入介面542 電池581 進出入口 6 網路路由器62 顯示螢幕642 感應卡片66 被保護主體54 通訊單元502 認證介面單元504 門禁控制單元506 電力管理單元508 保全裝置50 感應介面541 感應器591 電源582 門鎖60 保全裝置64 按鍵組644 密碼認證裝置68Authentication Database 493 Control Center 52 Micro Processing Unit 501 Display Unit 503 Memory Unit 505 Dynamic Password Processing Unit 507 Proximity Sensing Unit 509 Display 531 Input Interface 542 Battery 581 Access Ingress 6 Network Router 62 Display Screen 642 Induction Card 66 Protected Body 54 Communication unit 502 authentication interface unit 504 access control unit 506 power management unit 508 security device 50 sensing interface 541 sensor 591 power supply 582 door lock 60 security device 64 button group 644 password authentication device 68
21/2321/23