TWM513256U - Operating control system using mobile device - Google Patents

Operating control system using mobile device Download PDF

Info

Publication number
TWM513256U
TWM513256U TW104214828U TW104214828U TWM513256U TW M513256 U TWM513256 U TW M513256U TW 104214828 U TW104214828 U TW 104214828U TW 104214828 U TW104214828 U TW 104214828U TW M513256 U TWM513256 U TW M513256U
Authority
TW
Taiwan
Prior art keywords
mobile device
wireless transmission
control
identification code
identification information
Prior art date
Application number
TW104214828U
Other languages
Chinese (zh)
Inventor
Yi-Ting Shen
Original Assignee
I Tek Metal Mfg Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by I Tek Metal Mfg Co Ltd filed Critical I Tek Metal Mfg Co Ltd
Priority to TW104214828U priority Critical patent/TWM513256U/en
Publication of TWM513256U publication Critical patent/TWM513256U/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

使用行動裝置操作的管制系統Control system operated by mobile devices

  本創作係關於一種使用行動裝置操作的管制系統,尤指一種透過網際網路/Internet、行動通訊網路/mobile communication network(例如3G或4G行動通訊網路)、者區域網路/ Local area network、藍芽/Bluetooth、無線射頻/RadioFrequencyIdentification或近場通訊Near Field Communication等技術允許例如手機、平板電腦等行動裝置與通行管制裝置溝通,進一步允許利用手機、平板電腦等行動裝置控制通行管制裝置解鎖的管制系統。This creation is about a control system that operates using mobile devices, especially through the Internet/Internet, mobile communication network/mobile communication network (eg 3G or 4G mobile communication network), regional network/local area network, blue Technologies such as Bluetooth/Radio Frequency/RadioFrequencyIdentification or Near Field Communication allow mobile devices such as mobile phones and tablets to communicate with traffic control devices, further allowing control systems that use mobile devices, tablet computers, and other mobile devices to control access control unlocking. .

  傳統的機械式鎖具發展已經相當成熟,然而,目前機械式鎖具的困境在於,大多的機械式鎖具都需要使用金屬製的鑰匙才能開啟,因而許多人的身上會配戴多把對應各種不同鎖具的鑰匙,並且要記住每一把鑰匙對應的鎖具,因而無論攜帶以及使用上都不便利。隨著科技的進步,傳統的機械式鎖具,逐漸發展成馬達或電磁驅動裝置連動鎖具內部構件運動,進一步配合電子執行身分識別的工作,用來控制鎖具上鎖或解鎖。The development of traditional mechanical locks is quite mature. However, the current predicament of mechanical locks is that most mechanical locks need to be opened with a metal key, so many people will wear a variety of different locks. The key, and remember the lock corresponding to each key, so it is not convenient to carry and use. With the advancement of technology, the traditional mechanical locks have gradually developed into the movement of the motor or the electromagnetic drive device to interlock the internal components of the lock, and further cooperate with the electronic execution of the identity recognition work to control the lock to lock or unlock.

  一種常見的電子式鎖具是利用無線射頻識別技術(RFID/RadioFrequencyIDentification)辨識使用者的身分,詳細地說,使用者手持一張感應卡靠近鎖具時,鎖具係讀取感應卡內的識別碼,並且鎖具識別感應卡之識別碼與內建的通行名單的任意一已授權的識別碼是否相符,若相符則鎖具解鎖,若不相符則鎖具保持在鎖定狀態,可想而知,在使用者沒有持感應卡的狀態下,鎖具仍然保持在鎖定狀態。這種使用無線射頻的電子鎖具使用上仍存在一些問題,詳細地說,鎖具無法識別感應卡的持有者,因此當感應卡遺失,拾取感應卡的人就能透過感應卡開啟通行管制裝置,但通行管制裝置無法辨識開啟通行管制裝置的人是否為真實的感應卡持有人。A common electronic lock uses RFID/Radio Frequency IDentification to identify the user's identity. In detail, when the user holds a proximity card near the lock, the lock reads the identification code in the proximity card, and The identification code of the lock recognition proximity card matches any authorized identification code of the built-in traffic list. If the lock is matched, the lock is unlocked. If it does not match, the lock remains locked. It is conceivable that the user does not hold In the state of the proximity card, the lock remains locked. There are still some problems in the use of such electronic locks using radio frequency. In detail, the lock does not recognize the holder of the proximity card. Therefore, when the proximity card is lost, the person picking up the proximity card can open the traffic control device through the proximity card. However, the traffic control device cannot identify whether the person who opened the traffic control device is a real proximity card holder.

  為解決此問題,本創作提供一種使用行動裝置操作的管制系統,包括:一管制裝置,可被控制為開啟狀態或閉鎖狀態,一控制模組與管制裝置電連接,而控制管制裝置為開啟狀態或閉鎖狀態,與控制模組電連接的一主記憶體,主記憶體儲存一解密鑰以及對應管制裝置的一管制裝置識別碼,一無線傳輸裝置,與控制模組電連接,安裝一通行程式的複數通行者行動裝置,包括一第一處理器,以及與第一處理器電連接的一第一記憶體與一第一無線傳輸模組,各通行者行動裝置進一步包括一第一輸入裝置,第一無線傳輸模組可與無線傳輸裝置連線,與管制控制器電連接的一重置觸發裝置,操作重置觸發裝置係將控制模組設定為重置狀態,安裝一管理程式的一管理者行動裝置,包括一第二處理器,以及與第二處理器電連接的一第二記憶體與一第二無線傳輸模組,第二記憶體儲存對應解密鑰的一加密鑰,第二無線傳輸模組可與無線傳輸裝置連線且可各別與各第一無線傳輸模組連線。To solve this problem, the present invention provides a control system that operates using a mobile device, including: a control device that can be controlled to be in an open state or a locked state, a control module electrically connected to the control device, and the control control device is turned on. Or a locked state, a main memory electrically connected to the control module, the main memory stores a decryption key and a control device identification code corresponding to the control device, and a wireless transmission device is electrically connected to the control module to install a pass-through type The plurality of passer mobile devices include a first processor and a first memory and a first wireless transmission module electrically connected to the first processor, each of the mobile device further comprising a first input device, The first wireless transmission module can be connected to the wireless transmission device, and a reset trigger device electrically connected to the control controller. The operation reset trigger device sets the control module to a reset state and installs a management program. The mobile device includes a second processor, and a second memory and a second wireless transmission electrically connected to the second processor Module, the second memory storing a decryption key corresponding to the encryption key, the second wireless transmission module can connect with the wireless transmission device and may connect with the respective first wireless transmission module.

  在各通行者行動裝置初次執行通行程式的狀態下,要求通行者使用第一輸入裝置輸入一初始第一識別資訊,且允許第一無線傳輸裝置與無線傳輸裝置連線,在各通行者行動裝置執行通行程式且第一無線傳輸裝置位於無線傳輸裝置的通訊範圍內,第一無線傳輸裝置與無線傳輸裝置連線,在各通行者行動裝置執行通行程式且第一無線傳輸裝置位於無線傳輸裝置的通訊範圍外,第一無線傳輸裝置不與無線傳輸裝置連線,在管理者行動裝置執行管理程式的狀態下,且管理者行動裝置位在無線傳輸裝置的通訊範圍內,第二無線傳輸模組與無線傳輸裝置連線,在管理者行動裝置執行管理程式的狀態下,且管理者行動裝置位在無線傳輸裝置的通訊範圍外,第二無線傳輸模組不與無線傳輸裝置連線,在管理者行動裝置執行管理程式且各通行者行動裝置的其中任意一者執行通行程式的狀態下,允許第一無線傳輸模組與第二無線傳輸模組連線,在管理者行動裝置執行管理程式且各通行者行動裝置的其中任意一者執行通行程式並位在管理者行動裝置的第二無線傳輸模組的通訊範圍外的狀態下,第一無線傳輸模組不與第二無線傳輸模組連線。In a state in which each of the passer-by mobile devices performs the first-pass type, the passer is required to input an initial first identification information using the first input device, and allows the first wireless transmission device to connect with the wireless transmission device, and the mobile device is used in each of the mobile devices. Executing the on-travel type and the first wireless transmission device is located in the communication range of the wireless transmission device, the first wireless transmission device is connected to the wireless transmission device, and the pedestrian mobile device performs the on-travel type and the first wireless transmission device is located in the wireless transmission device. Outside the communication range, the first wireless transmission device is not connected to the wireless transmission device, and the manager mobile device is in the state of executing the management program, and the manager mobile device is located within the communication range of the wireless transmission device, and the second wireless transmission module Connected with the wireless transmission device, in the state in which the manager mobile device executes the management program, and the manager mobile device is located outside the communication range of the wireless transmission device, and the second wireless transmission module is not connected to the wireless transmission device, and is managed Mobile device executive management program and each of the passer-by mobile devices In a state in which the one-way execution mode is performed, the first wireless transmission module is allowed to be connected to the second wireless transmission module, and the manager mobile device executes the management program and any one of the passer-by mobile devices performs the pass-through type The first wireless transmission module is not connected to the second wireless transmission module in a state outside the communication range of the second wireless transmission module of the manager mobile device.

  在控制模組設定為重置狀態且管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,允許管理者行動裝置取得儲存於主記憶體中的管置裝置識別碼並儲存於第二記憶體內,在控制模組為非重置狀態且管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,不允許管理者行動裝置取得儲存於主記憶體中的管置裝置識別碼並儲存於第二記憶體內,在任意一通行者行動裝置的第一無線傳輸模組與第二無線傳輸模組連線的狀態下,允許管理者行動裝置取得連線的通行者行動裝置的初始第一識別資訊並執行認證程序,產生認證初始第一識別資訊,進一步使用儲存於第二記憶體之加密鑰將認證初始第一識別資訊以及管制裝置識別碼一起加密成第一加密資訊,在管理者行動裝置產生第一加密資訊後,將第一加密資訊回傳給連線的通行者行動裝置的第一記憶體儲存,在各通行者行動裝置的第一無線傳輸模組與第二無線傳輸模組不連線的狀態下,不允許管理者行動裝置取得各通行者行動裝置初始第一識別資訊,每一次任意一通行者行動裝置的第一無線傳輸模組與無線傳輸裝置連線的狀態下,連線的通行者行動裝置的通行程式要求使用第一輸入裝置輸入一刻下第一識別資訊,控制模組取得連線的通行者行動裝置的第一加密資訊以及刻下第一識別資訊,在第一無線傳輸模組不與無線傳輸裝置連線的狀態下,不允許控制模組取得各通行者行動裝置的第一加密資訊與刻下第一識別資訊,控制模組使用解密鑰允許對所取得之第一加密資訊執行解密程序,取得第一加密資訊內含的認證初始第一識別資訊以及管制裝置識別碼,在控制模組比對連線的通行者行動裝置的認證初始第一識別資訊與連線的通行者行動裝置的刻下第一識別資料相同,而且第一加密資訊所含的管制裝置識別碼與主記憶體的管制裝置識別碼相同的狀態下,控制模組控制管制裝置設定為開啟狀態,在控制模組比對連線的通行者行動裝置的認證初始第一識別資訊與連線的通行者行動裝置之刻下第一識別資料不相同,或者第一加密資訊所含的管制裝置識別碼與主記憶體的管制裝置識別碼不相同的狀態下,控制模組控制管制裝置設定為閉鎖狀態。When the control module is set to the reset state and the second wireless transmission module of the administrator mobile device is connected to the wireless transmission device, the administrator mobile device is allowed to acquire the management device identification code stored in the main memory. Stored in the second memory, in a state where the control module is in a non-reset state and the second wireless transmission module of the manager mobile device is connected to the wireless transmission device, the manager mobile device is not allowed to be stored in the main memory. The device identification code is stored in the second memory, and the manager mobile device is allowed to connect in a state where the first wireless transmission module of any of the mobile device is connected to the second wireless transmission module. The first action information of the passer mobile device and the authentication process are executed, the initial identification information of the authentication is generated, and the authentication first initial identification information and the control device identification code are further encrypted together by using the encryption key stored in the second memory. The first encrypted information is sent back to the connected line after the first mobile device generates the first encrypted information. The first memory of the mobile device is stored, and the manager mobile device is not allowed to obtain the initial mobile device in the state that the first wireless transmission module and the second wireless transmission module of each of the mobile device are not connected. An identification information, in a state in which the first wireless transmission module of any of the pedestrian mobile devices is connected to the wireless transmission device, the through-travel type of the connected mobile mobile device is required to input the first input using the first input device. Identifying information, the control module obtains the first encrypted information of the connected mobile device and the first identification information, and does not allow the control module to obtain the first wireless transmission module without being connected to the wireless transmission device. The first encrypted information of each of the passer mobile devices and the first identification information is deleted, and the control module uses the decryption key to perform a decryption process on the obtained first encrypted information, and obtains the initial authentication information of the first encrypted information included in the first encrypted information. And the control device identification code, and the initial identification information of the authentication of the passer-by mobile device in the control module The control module controls the control device to be set to the on state when the first identification data of the passer mobile device is the same, and the control device identification code included in the first encrypted information is the same as the control device identification code of the main memory. The first identification data is different from the first identification information of the connected mobile device of the passer-by mobile device of the control module, or the control device identifier of the first encrypted information is In a state where the control device identification codes of the main memory are different, the control module control and control device is set to the locked state.

  本創作的管制系統透過各管制裝置儲存在管制控制器的主記憶體內的獨立管制裝置識別碼達到可以選擇授權一個或多個管制裝置的開啟權限,對於管理複數個管制裝置具有很好的便利性。The control system of the present invention achieves the right to selectively authorize one or more control devices through the independent control device identification code stored in the main memory of the control controller by each control device, and has good convenience for managing a plurality of control devices. .

  再者,透過取得各管制裝置管理權限的過程中需要取得管制裝置識別碼,如此允許設立多個管理者行動裝置管理不同或相同的管制裝置,藉此區隔出不同管理權限的管理者行動裝置,對於管制系統的管理操作更加簡便也更具靈活性。Furthermore, it is necessary to obtain the control device identification code in the process of obtaining the management authority of each control device, thus allowing a plurality of manager mobile devices to be set up to manage different or identical control devices, thereby separating the manager mobile devices with different management rights. It is easier and more flexible to manage the control system.

  使用行動裝置操作的管制系統,進一步包括在管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,允許管理者行動裝置將所選取的已授權的通行者行動裝置的第一硬體識別碼傳送至主記憶體儲存並建立為黑名單,在控制模組取得通行者行動裝置之第一加密資訊與刻下第一硬體識別碼的狀態下,控制模組係先比對刻下第一硬體識別碼與主記憶體儲存之黑名單中的第一硬體識別碼是否相同,在刻下第一硬體識別碼與黑名單的第一硬體識別碼相同的情況下,控制模組不使用解密鑰解密第一加密資訊,管制裝置設定為閉鎖狀態,在刻下第一硬體識別碼與黑名單的第一硬體識別碼不相同的情況下,控制模組使用解密鑰解密第一加密資訊。The control system operating using the mobile device further includes a state in which the manager mobile device selects the selected authorized passer mobile device in a state in which the second wireless transmission module of the manager mobile device is connected to the wireless transmission device A hardware identification code is transmitted to the main memory for storage and is established as a blacklist. When the control module obtains the first encrypted information of the passer mobile device and the first hardware identification code is inscribed, the control module first compares Whether the first hardware identification code is the same as the first hardware identification code in the blacklist stored in the main memory, and if the first hardware identification code is the same as the first hardware identification code of the blacklist, the control is performed. The module decrypts the first encrypted information without using the decryption key, and the control device is set to the locked state. When the first hardware identifier is different from the first hardware identifier of the blacklist, the control module decrypts using the decryption key. The first encrypted information.

  本創作的管制系統允許在各別的管制控制器中的主記憶體儲存所建立的黑名單,進一步用來取消已取得開啟權限的通行者行動裝置的開啟權限,如此管理者即使沒有與通行者行動裝置連線,也能取消該通行者行動裝置的開啟權限,對於管理者實際的管理有好的助益。The author's control system allows the main memory in the respective controllers to store the created blacklist, which is further used to cancel the access rights of the passer-by mobile device that has obtained the open permission, so that even if the administrator does not have a passer The connection of the mobile device can also cancel the opening permission of the mobile device, which is beneficial to the actual management of the manager.

10‧‧‧管制系統
20‧‧‧管制裝置
22‧‧‧解閂機構
24‧‧‧閂頭
26‧‧‧第一把手
28‧‧‧第二把手
30‧‧‧上鎖機構
32‧‧‧管制控制器
34‧‧‧控制模組
36‧‧‧供電單元
38‧‧‧主記憶體
40‧‧‧時間模組
41‧‧‧重置觸發裝置
42‧‧‧無線傳輸裝置
44‧‧‧通行者行動裝置
46‧‧‧第一處理器
48‧‧‧第一記憶體
50‧‧‧第一無線傳輸模組
52‧‧‧第一輸入裝置
54‧‧‧管理者行動裝置
56‧‧‧第二處理器
58‧‧‧第二記憶體
60‧‧‧第二無線傳輸模組
62‧‧‧第二輸入裝置
10‧‧‧Control system 20‧‧‧Control device 22‧‧‧Unlatch mechanism 24‧‧‧Latch head 26‧‧‧First handle 28‧‧‧Second handle 30‧‧‧Locking mechanism 32‧‧ Controller 34‧‧‧Control Module 36‧‧‧Power Supply Unit 38‧‧‧Main Memory 40‧‧‧Time Module 41‧‧‧Reset Trigger 42‧‧‧Wireless Transmission 44‧‧‧ Passers Mobile device 46‧‧‧First processor 48‧‧‧First memory 50‧‧‧First wireless transmission module 52‧‧‧First input device 54‧‧‧Management mobile device 56‧‧‧ second Processor 58‧‧‧second memory 60‧‧‧second wireless transmission module 62‧‧‧second input device


第1圖為本創作管制系統的第一實施例圖。

Figure 1 is a diagram of a first embodiment of the authoring control system.

  所有圖式係僅便於解釋基本教導而已,圖式中將對構成說明用實施例之元件的數目、位置、關係、及尺寸之延伸將有所說明或在閱讀及了解以下描述後屬於業界技能。另外,在閱讀及了解以下描述後,配合特定力量、重量、強度、及類似要求之精確尺寸及尺寸比例之改變亦屬業界技能。The drawings are merely for the purpose of explaining the basic teachings, and the description of the number, the position, the relationship, and the size of the components of the embodiments will be explained or the technical skills will be read after reading and understanding the following description. In addition, after reading and understanding the following descriptions, changes in the exact dimensions and size ratios associated with specific forces, weights, strengths, and similar requirements are also industry skills.

  在不同圖式中係以相同標號來標示相同或類似元件;另外請了解文中諸如“頂部”、“底部” 、“第一”、“第二”、“向前”、“向後”、“反向”、“前”、“後”、“高度”、“寛度”、“長度”、“端”、“側”、“水平”、“垂直”等等及類似用語係僅便於看圖者參考圖中構造以及僅用於幫助描述說明用實施例而已。In the different figures, the same reference numerals are used to designate the same or similar elements; in addition, please refer to the text such as "top", "bottom", "first", "second", "forward", "backward", "reverse" To "," "front", "back", "height", "twist", "length", "end", "side", "horizontal", "vertical", etc. and similar terms are only for the viewer The constructions in the figures are for reference only to aid in the description of the embodiments.

  本創作的管制系統10的應用範圍廣泛,例如各實施例管制系統10應用在門禁或通行管制時所述的管制裝置20可以是安裝於一門上的一門鎖,應用在門禁或通行管制時管制裝置20也可以是電動門及其驅動裝置(例如商場的玻璃電動門、電動式鐵捲門),或者用來管制通行的閘門(例如停車場的閘門、捷運或火車月台的閘門),各實施例的管制系統10應用在物品的防盜時,管制裝置20可以是附加在需要防盜之物品上的鎖具(例如保險箱鎖、腳踏車鎖、汽車鎖、摩托車鎖)。以下各實施例是假設本創作的各實施例管制系統10配合安裝於門之門鎖進行門禁管制的應用來說明本創作的技術特徵。The control system 10 of the present invention has a wide range of applications. For example, when the control system 10 of each embodiment is applied to an access control or a traffic control, the control device 20 may be a door lock installed on a door, and is applied to the control device during access control or traffic control. 20 may also be an electric door and its driving device (such as a glass electric door of an arcade, an electric iron roll door), or a gate for regulating traffic (such as a gate of a parking lot, a gate of a MRT or a train platform), and each implementation When the control system 10 of the example is applied to the theft prevention of the article, the control device 20 may be a lock attached to the item requiring theft prevention (for example, a safe lock, a bicycle lock, a car lock, a motorcycle lock). The following embodiments are illustrative of the technical features of the present invention, assuming that the control system 10 of the present embodiment of the present invention cooperates with the door lock of the door for access control.

  依據第1圖的圖式所示,本創作第一實施例的管制系統10包括一管制裝置20、安裝於管制裝置20中的一管制控制器32、可分別與管制控制器32連線的複數通行者行動裝置44以及可與管制控制器32連線的一管理者行動裝置54。According to the drawing of Fig. 1, the control system 10 of the first embodiment of the present invention includes a control device 20, a control controller 32 installed in the control device 20, and a plurality of controllable controllers 32, respectively. The passer mobile device 44 and a manager mobile device 54 connectable to the regulatory controller 32.

  在假設本創作第一實施例的管制系統10配合門與門鎖進行門禁管制的狀態下,管制裝置20是由一門與安裝於門上的一門鎖構成,管制裝置20包括一上鎖機構30、與上鎖機構30連動的結合的一解閂機構22、與解閂機構22連動的結合的一閂頭24,以及分別與解閂機構22連動的結合的一第一把手26與一第二把手28,上鎖機構30可被控制為鎖定狀態或解鎖狀態,而閂頭24可在伸出門外的一上閂位置以及內縮入門內的一解閂位置之間位移,當上鎖機構30被控制為鎖定狀態時,不允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為閉鎖狀態,當上鎖機構30被控制為解鎖狀態時,允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為開啟狀態。In the state in which the control system 10 of the first embodiment of the present invention cooperates with the door and the door lock to perform the access control, the control device 20 is composed of a door and a door lock mounted on the door, and the control device 20 includes a locking mechanism 30, a latching mechanism 22 coupled with the latching mechanism 30, a latching head 24 coupled to the latching mechanism 22, and a first handle 26 and a second handle 28 coupled to the latching mechanism 22, respectively The locking mechanism 30 can be controlled to be in a locked state or an unlocked state, and the latch head 24 can be displaced between an upper latching position outside the protruding door and an unlatching position within the retracting door, when the locking mechanism 30 is controlled In the locked state, the latch 24 is not allowed to be displaced from the upper latch position to the unlatching position, such that the control device 20 is set to the latched state, and when the latch mechanism 30 is controlled to the unlocked state, the latch 24 is allowed to be latched. The displacement to the unlatching position is such that the regulating device 20 is set to the on state.

  依據第1圖的圖式所示,管制控制器32包括與管制裝置20的上鎖機構30電連接的一控制模組34,一主記憶體38與控制模組36電連接,主記憶體38儲存一解密鑰以及對應管制裝置的一管制裝置識別碼,管制控制器32進一步包括與控制模組34電連接的一無線傳輸裝置42以及與控制模組34電連接的一時間模組40,無線傳輸裝置42可以使用藍芽(Bluetooth)、無線射頻(RadioFrequencyIdentification/RFID)或近場通訊(Near Field Communication/NFC)其中的任意一種,時間模組40被用來計時日期與時間,且時間模組40被設定成與所在地之時區相符的時間,如此控制模組34可由時間模組40讀取日期與時間,管制控制器32另包括與控制模組34電連接的一重置觸發裝置41,重置觸發裝置41係用來重置管制控制器32的控制模組34的相關設定並且清除主記憶體38內除了管制裝置識別碼以外的全部資訊,重置觸發裝置41較佳是不外露地內藏在管制控制器32的內部,防止重置觸發裝置41被隨意地操作造成管制控制器32被重置,實際上重置觸發裝置41可以是一個觸壓按鈕所構成,此外,一供電單元36與控制模組34電連接,供電單元36供應控制模組34運作所需的電力且透過控制模組34供應主記憶體38、時間模組40以及無線傳輸裝置42運作所需的電力。According to the diagram of FIG. 1, the control controller 32 includes a control module 34 electrically connected to the locking mechanism 30 of the control device 20. A main memory 38 is electrically connected to the control module 36, and the main memory 38 is connected. The control controller 32 further includes a wireless transmission device 42 electrically connected to the control module 34 and a time module 40 electrically connected to the control module 34, and wirelessly storing a decryption key and a control device identification code corresponding to the control device. The transmission device 42 can use any one of Bluetooth, Radio Frequency Identification (RFID) or Near Field Communication (NFC), and the time module 40 is used to time and time, and the time module 40 is set to match the time zone of the location, such that the control module 34 can read the date and time by the time module 40, and the control controller 32 further includes a reset trigger device 41 electrically connected to the control module 34, The triggering device 41 is used to reset the control module 34 of the control controller 32. The related setting and clearing all the information in the main memory 38 except the control device identification code, the reset triggering device 41 is preferably not hidden inside the control controller 32, preventing the reset triggering device 41 from being randomly The operation causes the controller 32 to be reset. In fact, the reset trigger 41 can be a touch button. In addition, a power supply unit 36 is electrically connected to the control module 34, and the power supply unit 36 supplies the control module 34. The required power is supplied to the main memory 38, the time module 40, and the power required to operate the wireless transmission device 42 through the control module 34.

  依據第1圖的圖式所示,各通行者行動裝置44可以是手機、穿戴式行動裝置(例如智慧眼鏡、智慧手錶)、平板電腦、筆記型電腦的其中任意一種,通行者行動裝置44包括一第一處理器46、與第一處理器46電連接的一第一記憶體48、與第一處理器46電連接的一第一無線傳輸模組50以及與第一處理器46電連接的一第一輸入裝置52,第一無線傳輸模組50可以使用藍芽(Bluetooth)、無線射頻(RadioFrequencyIdentification/RFID)或近場通訊(Near Field Communication/NFC)其中的任意一種,此外各通行者行動裝置44包括互不相同的一第一硬體識別碼(例如國際移動設備識別碼/International Mobile Equipment Identity/IMEI)。各通行者行動動裝置44各自下載並且安裝一通行程式,執行通行程式允許各通行者行動裝置44透過第一無線傳輸模組50與管制控制器32的無線傳輸裝置42相互連線。According to the diagram of FIG. 1, each of the passer mobile devices 44 may be any one of a mobile phone, a wearable mobile device (such as smart glasses, a smart watch), a tablet computer, and a notebook computer. The passer mobile device 44 includes a first processor 46, a first memory 48 electrically connected to the first processor 46, a first wireless transmission module 50 electrically connected to the first processor 46, and an electrical connection with the first processor 46. A first input device 52, the first wireless transmission module 50 can use any one of Bluetooth, Radio Frequency Identification/RFID or Near Field Communication (NFC), and each passer-by action The device 44 includes a first hardware identification code (e.g., International Mobile Equipment Identity/IMEI) that is different from each other. Each of the passer-by devices 44 downloads and installs a pass-through type that allows each of the passer-by devices to be interconnected with the wireless transmission device 42 of the policing controller 32 via the first wireless transmission module 50.

  此外,各通行者行動裝置44的第一輸入裝置52可以是攝像裝置、麥克風、指紋輸入裝置、指靜脈識別裝置、虹膜識別裝置或觸控螢幕的其中任意至少一種所構成,執行通行程式允許使用第一輸入裝置52輸入一第一識別資訊,若第一輸入裝置52為攝像裝置,則被要求透過攝像裝置擷取通行者行動裝置44之持有者的臉部圖像,並且將臉部圖像特徵加以編碼當作第一識別資訊,若第一輸入裝置52為麥克風,則被要求透過麥克風擷取通行者行動裝置44之持有者的聲音,並且將聲音編輯為聲紋當作第一識別資訊,若第一輸入裝置52為指紋輸入裝置,則被要求透過指紋輸入裝置擷取通行者行動裝置44之持有者的指紋,並且將指紋特徵編加以編碼當作第一識別資訊,若第一輸入裝置52為指靜脈識別裝置,則被要求透過指靜脈識別裝置擷取通行者行動裝置44之持有者的指靜脈圖像,並且將指靜脈圖像的特徵加以編碼當作第一識別資訊,若第一輸入裝置52為虹膜識別裝置,則被要求透過虹膜識別裝置擷取通行者行動裝置44之持有者的虹膜圖像,並且將虹膜圖像的特徵加以編碼當作第一識別資訊,若第一輸入裝置52為觸控螢幕,則被要求透過觸控螢幕輸入通行者行動裝置44之持有者的密碼、圖形的其中任意一種,並且將密碼、圖形的其中任意一種當作第一識別資訊。In addition, the first input device 52 of each of the passer mobile devices 44 may be any one of at least one of an imaging device, a microphone, a fingerprint input device, a finger vein recognition device, an iris recognition device, or a touch screen, and the pass-through type is allowed to be used. The first input device 52 inputs a first identification information. If the first input device 52 is an imaging device, it is required to capture a facial image of the holder of the pedestrian mobile device 44 through the imaging device, and the facial image is displayed. The feature is encoded as the first identification information. If the first input device 52 is a microphone, it is required to capture the voice of the holder of the passer mobile device 44 through the microphone, and edit the sound as a voiceprint as the first Identifying information, if the first input device 52 is a fingerprint input device, it is required to capture the fingerprint of the holder of the passer mobile device 44 through the fingerprint input device, and encode the fingerprint feature as the first identification information, if The first input device 52 is a finger vein recognition device, and is required to pass through the finger vein recognition device. The finger vein image of the holder of the passer mobile device 44, and encodes the feature of the finger vein image as the first identification information, and if the first input device 52 is an iris recognition device, it is required to pass through the iris recognition device The iris image of the holder of the passer mobile device 44 is captured, and the feature of the iris image is encoded as the first identification information. If the first input device 52 is a touch screen, the touch screen is required to be transmitted through the touch screen. Any one of the password and the graphic of the holder of the passer-by mobile device 44 is input, and any one of the password and the graphic is regarded as the first identification information.

  依據第1圖的圖式所示,管理者行動裝置54可以是手機、穿戴式行動裝置(例如智慧眼鏡、智慧手錶)、平板電腦、筆記型電腦的其中任意一種,管理者行動裝置54包括一第二處理器56、與第二處理器56電連接的一第二記憶體58、與第二處理器56電連接的一第二無線傳輸模組60以及與第二處理器56電連接的一第二輸入裝置62,第二無線傳輸模組60可以使用藍芽(Bluetooth)、無線射頻(RadioFrequencyIdentification/RFID)或近場通訊(Near Field Communication/NFC)其中的任意一種。管理者行動動裝置54各自下載並且安裝一管理程式,執行管理程式允許管理者行動裝置54透過第二無線傳輸模組60與管制控制器32的無線傳輸裝置42相互連線。此外管理者行動裝置54包括獨有的一第二硬體識別碼(例如國際移動設備識別碼/International Mobile Equipment Identity/IMEI)。According to the diagram of FIG. 1 , the administrator mobile device 54 may be any one of a mobile phone, a wearable mobile device (such as smart glasses, a smart watch), a tablet computer, and a notebook computer. The administrator mobile device 54 includes a a second processor 56, a second memory 58 electrically connected to the second processor 56, a second wireless transmission module 60 electrically connected to the second processor 56, and a second electrically coupled to the second processor 56. The second input device 62, the second wireless transmission module 60 can use any one of Bluetooth, Radio Frequency Identification (RFID) or Near Field Communication (NFC). The manager mobile devices 54 each download and install a management program that allows the manager mobile device 54 to interconnect with the wireless transmission device 42 of the regulatory controller 32 via the second wireless transmission module 60. In addition, the manager mobile device 54 includes a unique second hardware identification code (eg, International Mobile Equipment Identity/IMEI).

  此外,管理者行動裝置54的第二輸入裝置62可以是攝像裝置、麥克風、指紋輸入裝置、指靜脈識別裝置、虹膜識別裝置或觸控螢幕的其中任意至少一種所構成,執行通行程式允許使用第二輸入裝置62輸入一第二識別資訊,若第二輸入裝置62為攝像裝置,則被要求透過攝像裝置擷取管理者行動裝置54之持有者的臉部圖像,並且將臉部圖像特徵加以編碼當作第二識別資訊,若第二輸入裝置62為麥克風,則被要求透過麥克風擷取管理者行動裝置54之持有者的聲音,並且將聲音編輯為聲紋當作第二識別資訊,若第二輸入裝置62為指紋輸入裝置,則被要求透過指紋輸入裝置擷取管理者行動裝置54之持有者的指紋,並且將指紋特徵編加以編碼當作第二識別資訊,若第二輸入裝置62為指靜脈識別裝置,則被要求透過指靜脈識別裝置擷取管理者行動裝置54之持有者的指靜脈圖像,並且將指靜脈圖像的特徵加以編碼當作第二識別資訊,若第二輸入裝置62為虹膜識別裝置,則被要求透過虹膜識別裝置擷取管理者行動裝置54之持有者的虹膜圖像,並且將虹膜圖像的特徵加以編碼當作第二識別資訊,若第二輸入裝置62為觸控螢幕,則被要求透過觸控螢幕輸入管理者行動裝置54之持有者的密碼、圖形的其中任意一種,並且將密碼、圖形的其中任意一種當作第二識別資訊。In addition, the second input device 62 of the administrator mobile device 54 may be any one of at least one of an imaging device, a microphone, a fingerprint input device, a finger vein recognition device, an iris recognition device, or a touch screen, and the pass-through type is allowed to be used. The second input device 62 inputs a second identification information. If the second input device 62 is an imaging device, it is required to capture a facial image of the holder of the manager mobile device 54 through the imaging device, and the facial image is The feature is encoded as the second identification information. If the second input device 62 is a microphone, it is required to capture the voice of the holder of the manager mobile device 54 through the microphone, and edit the sound into a voiceprint as the second recognition. Information, if the second input device 62 is a fingerprint input device, it is required to capture the fingerprint of the holder of the manager mobile device 54 through the fingerprint input device, and encode the fingerprint feature as the second identification information. The two-input device 62 is a finger vein recognition device, and is required to be captured through the finger vein recognition device. The image of the finger vein of the holder of the mobile device 54 and the feature of the finger vein image is encoded as the second identification information. If the second input device 62 is an iris recognition device, the iris recognition device is required to pass through. The iris image of the holder of the manager mobile device 54 is captured, and the feature of the iris image is encoded as the second identification information. If the second input device 62 is a touch screen, the touch screen is required to be transmitted through the touch screen. Any one of the password and the graphic of the holder of the manager mobile device 54 is input, and any one of the password and the graphic is regarded as the second identification information.

  為了方便說明,係假設本創作第1圖所示之第一實施例的管制系統10初次使用,在這樣的狀態下,上鎖機構30預設為鎖定狀態,閂頭24位於上閂位置且無法由上閂位置往解閂位置位移,因而管制裝置20設定為閉鎖狀態。For convenience of explanation, it is assumed that the control system 10 of the first embodiment shown in Fig. 1 of the present invention is used for the first time. In this state, the locking mechanism 30 is preset to the locked state, and the latch 24 is in the upper latch position and cannot be used. The upper latch position is displaced toward the unlatching position, and thus the regulating device 20 is set to the locked state.

  初次使用時,各通行者行動裝置44初次執行通行程式,通行程式要求各通行者行動裝置44的持有者使用第一輸入裝置52擷取該通行者行動裝置44之持有者的臉部圖像,並且將取得的臉部圖像特徵加以編碼形成初始第一識別資訊。At the time of initial use, each of the walker mobile devices 44 performs an on-travel type for the first time. The pass-through type requires the holder of each of the passer-by mobile devices 44 to use the first input device 52 to retrieve the face map of the holder of the passer-by mobile device 44. Like, and the obtained facial image features are encoded to form initial first identification information.

  將管制控制器32具有的外殼打開使重置觸發裝置41外露,操作管制控制器32的重置觸發裝置41,造成管制控制器32被設定成重置狀態,進一步操作管理者行動裝置54初次執行管理程式,管理者行動裝置54的管理程式產生一加密鑰儲存於第二記憶體58中,且管理者行動裝置54利用管理程式透過第二無線傳輸模組60與無線傳輸裝置42連線管制控制器32,如此與正在重置狀態中的管制控制器32連線的管理者行動裝置54取得儲存在主記憶體38內的管制裝置識別碼,並且將管制裝置識別碼儲存於管理者行動裝置54的第二記憶體58,此外管理者行動裝置54將加密鑰傳送至管制控制器32與解密鑰進行配對並且儲存在主記憶體38中,以及管制控制器32的時間模組40與管理者行動裝置54的時間進行同步化,實際上,造成管理者行動裝置54的時間與日期和管制控制器32的時間及日期一致,如此管理者行動裝置54取得對應的管制控制器32的管理權限並且管制控制器32設定為非重置狀態此外初次執行管理程式時,管理程式係要求管理者行動裝置54的持有者使用第二輸入裝置62擷取該管理者行動裝置54之持有者的臉部圖像,並且將取得的臉部圖像特徵加以編碼形成初始第二識別資訊並儲存於第二記憶體58內。Opening the housing of the controller 32 causes the reset triggering device 41 to be exposed, operating the reset triggering device 41 of the controller 32, causing the controller 32 to be set to the reset state, and further operating the manager's mobile device 54 for the first time. The management program, the management program of the manager mobile device 54 generates an encryption key stored in the second memory 58, and the manager mobile device 54 uses the management program to connect to the wireless transmission device 42 through the second wireless transmission module 60. The controller 32 thus obtains the regulatory device identification code stored in the main memory 38 from the administrator mobile device 54 connected to the regulatory controller 32 in the reset state, and stores the regulatory device identification code in the administrator mobile device 54. The second memory 58, in addition, the manager mobile device 54 transmits the encryption key to the policing controller 32 to be paired with the decryption key and stored in the main memory 38, and the time module 40 of the policing controller 32 and the manager action The time of device 54 is synchronized, actually The time and date of the manager mobile device 54 are the same as the time and date of the policing controller 32, so that the manager mobile device 54 acquires the management authority of the corresponding policing controller 32 and the policing controller 32 is set to the non-reset state. When the management program is executed for the first time, the management program requests the holder of the manager mobile device 54 to capture the face image of the holder of the manager mobile device 54 using the second input device 62, and the acquired face map The image features are encoded to form initial second identification information and stored in the second memory 58.

  透過管理者行動裝置54能夠授權給各通行者行動裝置44開啟權限,詳細地說,在管理者行動裝置54執行管理程式且至少一通行者行動裝置44執行通行程式的狀態下,若該至少一通行者行動裝置44位於管理者行動裝置54的第二無線傳輸模組60的通訊範圍內,管理者行動裝置54與該通行者行動裝置44可以透過第一與第二無線傳輸模組50、60相互連線。The manager mobile device 54 can authorize each of the passer mobile devices 44 to open the authority. Specifically, in a state where the manager mobile device 54 executes the management program and at least one of the passer mobile devices 44 performs the on-travel type, if at least one The passer mobile device 44 is located within the communication range of the second wireless transmission module 60 of the manager mobile device 54, and the manager mobile device 54 and the passer mobile device 44 can pass through the first and second wireless transmission modules 50, 60. Phase interconnect.

  值得注意的是,通行者行動裝置44與管理者行動裝置54並非限制只能直接相互連線,也就是說若各通行者行動裝置44連上網際網路/Internet、行動通訊網路/mobile communication network(例如3G或4G行動通訊網路)或者區域網路/ Local area network,管理者行動裝置54也連上網際網路或行動通訊網路,即使通行者行動裝置44不在管理者行動裝置54的第二無線傳輸模組60的通訊範圍內,各通行者行動裝置44與管理者行動裝置54也能透過網際網路、行動通訊網路或區域網路的其中任意至少一者執行連線。若沒有任何通行者行動裝置44位於管理者行動裝置54之第二無線傳輸模組60的通訊範圍內,或者沒有任何通行者行動裝置44利用網際網路、行動通訊網路或區域網路連線,無論通行者行動裝置44是否執行通行程式且無論管理者行動裝置54是否執行管理程式,管理者行動裝置54無法與任意一通行者行動裝置44透過第一與第二無線傳輸模組50、60相互連線。It should be noted that the passer-by mobile device 44 and the manager mobile device 54 are not limited to being directly connected to each other, that is, if each of the passer-by mobile devices 44 is connected to the Internet/Internet, mobile communication network/mobile communication network (e.g., 3G or 4G mobile communication network) or regional network/local area network, the manager mobile device 54 is also connected to the internet or mobile communication network, even if the mobile device 44 is not in the second wireless of the manager mobile device 54. Within the communication range of the transmission module 60, each of the passer-by mobile devices 44 and the manager mobile device 54 can also perform connection through any one of the Internet, the mobile communication network, or the regional network. If no passer mobile device 44 is located within the communication range of the second wireless transmission module 60 of the manager mobile device 54, or no passer mobile device 44 utilizes the Internet, mobile communication network or regional network connection, Regardless of whether the passer-by mobile device 44 performs the on-travel type and whether the manager mobile device 54 executes the management program, the manager mobile device 54 cannot communicate with any of the passer-by mobile devices 44 through the first and second wireless transmission modules 50, 60. Connected.

  與管理者行動裝置54連線的一通行者行動裝置44允許將初始第一識別資訊、第一硬體識別碼一起傳送給管理者行動裝置54,需注意的是,當通行者行動裝置44將初始第一識別資訊傳送給管理者行動裝置54後,通行者行動裝置44就沒有初始第一識別資訊,也就是說通行者行動裝置44的第一記憶體48不會長期保存第一識別資訊,管理者行動裝置54將取得連線的通行者行動裝置44之初始第一識別資訊與第一硬體識別碼進行認證作業,產生認證初始第一識別碼與認證第一硬體識別碼,進一步管理程式使用儲存在第二記憶體58之加密鑰將管制裝置識別碼、認證初始第一識別資訊與認證第一硬體識別碼一起加密成一第一加密資訊,這樣的第一加密資訊並沒有使用的期限,如果需要限定第一加密資訊授權期限,則使用加密鑰進行加密時需要將管制裝置識別碼、認證第一識別資訊、認證第一硬體識別碼、通行起始時間以及通行結束時間一起加密成第一加密資訊,這樣的第一加密資訊的使用期限就會被限定帶通行起始時間與通行起始時間之內。管理者行動裝置54係將第一加密資訊回傳給該連線的通行者行動裝置44並儲存在第一記憶體48內,如此該連線的通行者行動裝置44就取得開啟權限。此外,所述的通行起始時間與通行結束時間各自包括日期與時刻(年、月、日、幾點、幾分)。反覆執行管理者行動裝置54授權給各通行者行動裝置44開啟權限,就能授權給複數個通行者行動裝置44開啟權限。A passer mobile device 44 connected to the manager mobile device 54 allows the initial first identification information and the first hardware identification code to be transmitted together to the manager mobile device 54. It should be noted that when the passer mobile device 44 will After the initial first identification information is transmitted to the manager mobile device 54, the passer mobile device 44 has no initial first identification information, that is, the first memory 48 of the passer mobile device 44 does not store the first identification information for a long time. The administrator action device 54 performs the authentication operation of the initial first identification information of the connected passer mobile device 44 and the first hardware identification code, and generates an authentication initial first identification code and an authentication first hardware identification code, and further manages The program encrypts the control device identification code, the authentication initial first identification information and the authentication first hardware identification code into a first encrypted information by using the encryption key stored in the second memory 58, such that the first encrypted information is not used. The time limit, if it is necessary to limit the first encrypted information authorization period, use the encryption key to encrypt The control device identification code, the authentication first identification information, the authentication first hardware identification code, the transit start time, and the traffic end time are encrypted together into the first encrypted information, and the use period of the first encrypted information is limited. Take the transit start time and the transit start time. The administrator mobile device 54 transmits the first encrypted information back to the connected mobile device 44 and stores it in the first memory 48, so that the connected mobile device 44 obtains the open authority. In addition, the transit start time and the transit end time respectively include a date and a time (year, month, day, time, minute). The repetitive execution manager mobile device 54 authorizes each of the passer mobile devices 44 to open the authority, and can authorize the plurality of passer mobile devices 44 to open the authority.

  管理者行動裝置54也能授權給自己開啟權限,詳細地說,管理者行動裝置54首次執行管理程式之後,允許管理程式使用第二輸入裝置62讓管理者輸入初始第二識別資訊(例如第一次輸入的管理者臉部圖像),並擷取管理者行動裝置(54)的一第二硬體識別碼並執行認證程序以產生認證初始第二識別資訊以及認證第二硬體識別碼,進一步使用加密鑰將認證第二硬體識別碼、管制裝置識別碼與認證初始第二識別資訊加密成第二加密資訊,並且將第二加密資訊儲存於第二記憶體58內,如此管理者行動裝置54被授予開啟權限。The manager mobile device 54 can also authorize the user to open the right. In detail, after the manager mobile device 54 executes the management program for the first time, the management program is allowed to use the second input device 62 to let the administrator input the initial second identification information (for example, the first a secondary input manager face image), and taking a second hardware identification code of the manager mobile device (54) and executing an authentication process to generate the initial authentication information and the second hardware identification code. Further, the authentication second hardware identification code, the control device identification code, and the authentication initial second identification information are encrypted into the second encrypted information by using the encryption key, and the second encrypted information is stored in the second memory 58, so that the manager acts Device 54 is granted open access.

  每一次要使用已取得開啟權限的各通行者行動裝置44開門,係先執行通行程式,且將執行通行程式的通行者行動裝置44置於管制控制器32之無線傳輸裝置42的通訊範圍內,該通行者行動裝置44與管制控制器32使用第一無線傳輸模組50與無線傳輸裝置42相互連線,如此通行程式會要求該通行者行動裝置44的持有者使用第一輸入裝置52再次擷取持有者的刻下臉部圖像用以產生一刻下第一識別資訊,隨後與管制控制器32連線的通行者行動裝置44將第一加密資訊、刻下第一識別資訊與刻下第一硬體識別碼一起傳送至管制控制器32,也就是說,各通行者行動裝置44每一次與管制控制器32連線時,與管制控制器32連線的各通行者行動裝置44都會要求持有者輸入在連線當時的持有者的臉部圖像,並且通行程式會自動擷取連線當時與管制控制器32連線的通行者行動裝置44當時的第一硬體識別碼。Each time the passer-by mobile device 44 that has obtained the open permission is opened, the pass-through type is executed first, and the pass-through type passer-by device 44 is placed in the communication range of the wireless transmission device 42 of the control controller 32. The passer-by mobile device 44 and the control controller 32 are interconnected with the wireless transmission device 42 using the first wireless transmission module 50. Such a pass-through may require the holder of the pedestrian mobile device 44 to use the first input device 52 again. Extracting the face image of the holder to generate a first identification information, and then the passer mobile device 44 connected to the control controller 32 will first encrypt the information, engrave the first identification information, and engrave the first The hardware identification code is transmitted to the control controller 32 together, that is, each passer mobile device 44 is required to be connected to the control controller 32 each time it is connected to the control controller 32. Someone enters the face image of the holder at the time of the connection, and the pass-through will automatically capture At that time the line connection with the control of the controller 32 by the passage 44 at the time of the first mobile device hardware identification code.

  管制控制器32接收到第一加密資訊、刻下第一識別資訊與刻下第一硬體識別碼之後使用與管理者行動裝置44之加密鑰配對的解密鑰將第一加密資訊解密,管制控制器32取得第一加密資訊內含的管制裝置識別碼、認證初始第一識別資訊、認證第一硬體識別碼(沒有限定授權期限),或者管制控制器32取得第一加密資訊內含的管制裝置識別碼、認證初始第一識別資訊、認證第一硬體識別碼、通行起始時間以及通行結束時間(有限定授權期限),進一步管制控制器32的控制模組34識別認證初始第一識別資訊與認證第一硬體識別碼,並且比較認證初始第一識別資訊與刻下第一識別資訊是否相同、比較認證第一硬體識別碼與刻下第一硬體識別碼是否相同、比較主記憶體38中之管制裝置識別碼與第一加密資訊內的管制裝置識別碼是否相同。The control controller 32 decrypts the first encrypted information using the decryption key paired with the encryption key of the manager mobile device 44 after receiving the first encrypted information, the first identification information, and the first hardware identification code, and the control controller 32 Obtaining the control device identification code included in the first encrypted information, authenticating the first identification information, authenticating the first hardware identification code (without a limited authorization period), or the control controller 32 obtaining the identification device identification included in the first encrypted information The code, the initial identification information of the authentication, the first hardware identification code, the transit start time, and the transit end time (with a limited authorization period), further controls the control module 34 of the controller 32 to identify the initial identification information of the authentication and And authenticating the first hardware identification code, and comparing whether the first initial identification information is the same as the first identification information, and comparing whether the first hardware identification code and the first hardware identification code are the same, and comparing the main memory 38. The control device identification code is the same as the control device identification code in the first encrypted information.

  在第一加密資訊沒有包含通行起始時間與通行結束時間的狀態下,若控制模組34比較認證初始第一識別資訊與刻下第一識別資訊或比較認證第一硬體識別碼與刻下第一硬體識別碼或比較主記憶體38中之管制裝置識別碼與第一加密資訊內的管制裝置識別碼的其中任意一者不相同,上鎖機構30保持在鎖定狀態,不允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為閉鎖狀態,門無法被開啟。If the first encrypted information does not include the transit start time and the transit end time, if the control module 34 compares and authenticates the initial first identification information with the first identification information or compares the first hardware identification code with the first one. The hardware identification code or the comparison control device identification code in the main memory 38 is different from any one of the control device identification codes in the first encrypted information, and the locking mechanism 30 is kept in the locked state, and the latch 24 is not allowed to be The upper latch position is displaced toward the unlatching position, so that the control device 20 is set to the locked state and the door cannot be opened.

  在第一加密資訊沒有包含通行起始時間與通行結束時間的狀態下,若控制模組34比較認證初始第一識別資訊與刻下第一識別資訊及比較認證第一硬體識別碼與刻下第一硬體識別碼及比較主記憶體38中之管制裝置識別碼與第一加密資訊內的管制裝置識別碼的全部皆相同,管制控制器32的控制模組34控制上鎖機構30為解鎖狀態,允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為開啟狀態,進一步可以轉動第一或第二把手26、28驅動解閂機構22連動閂頭24由上閂位置位移至解閂位置,如此門被開啟。If the first encrypted information does not include the transit start time and the transit end time, if the control module 34 compares and authenticates the initial first identification information with the first identification information and compares the first hardware identification code with the first one. The control unit 34 of the control unit 32 controls the lock mechanism 30 to be in an unlocked state, and the control device identification code in the comparison main memory 38 is the same as the control device identification code in the first encrypted information. The latch 24 is allowed to be displaced from the upper latch position to the unlatched position, such that the control device 20 is set to the open state, and the first or second handle 26, 28 can be further rotated to drive the unlatching mechanism 22 to interlock the latch 24 to be displaced by the upper latch position. To the unlatched position, the door is opened.

  在第一加密資訊包含通行起始時間與通行結束時間的狀態下,若控制模組34比較認證初始第一識別資訊與刻下第一識別資訊或比較認證第一硬體識別碼與刻下第一硬體識別碼或比較主記憶體38中之管制裝置識別碼與第一加密資訊內的管制裝置識別碼的其中任意一者不相同,上鎖機構30保持在鎖定狀態,不允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為閉鎖狀態,門無法被開啟。In the state that the first encrypted information includes the transit start time and the transit end time, if the control module 34 compares and authenticates the initial first identification information with the first identification information or compares the first hardware identification code with the first hard The body identification code or the comparison control device identification code in the main memory 38 is different from any one of the control device identification codes in the first encrypted information, and the locking mechanism 30 is kept in the locked state, and the latch 24 is not allowed to be in the upper state. The latch position is displaced toward the unlatching position such that the control device 20 is set to the locked state and the door cannot be opened.

  在第一加密資訊包含通行起始時間與通行結束時間的狀態下,若控制模組34比較認證初始第一識別資訊與刻下第一識別資訊及比較認證第一硬體識別碼與刻下第一硬體識別碼及比較主記憶體38中之管制裝置識別碼與第一加密資訊內的管制裝置識別碼的全部皆相同,且連線的通行者行動裝置44與管制控制器32連線的時間不介於通行起始時間與通行結束時間內,上鎖機構30保持在鎖定狀態,不允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為閉鎖狀態,門無法被開啟。In the state that the first encrypted information includes the transit start time and the transit end time, if the control module 34 compares and authenticates the initial first identification information with the first identification information and compares the first hardware identification code with the first hard copy The body identification code and the control device identification code in the comparison main memory 38 are all the same as the control device identification code in the first encrypted information, and the time when the connected pedestrian mobile device 44 is connected to the control controller 32 is not During the transit start time and the transit end time, the locking mechanism 30 remains in the locked state, and the latch 24 is not allowed to be displaced from the upper latch position to the unlatching position, so that the control device 20 is set to the locked state, and the door cannot be opened. .

  在第一加密資訊包含通行起始時間與通行結束時間的狀態下,若控制模組34比較認證初始第一識別資訊與刻下第一識別資訊及比較認證第一硬體識別碼與刻下第一硬體識別碼及比較主記憶體38中之管制裝置識別碼與第一加密資訊內的管制裝置識別碼的全部皆相同,且連線的通行者行動裝置44與管制控制器32連線的時間介於通行起始時間與通行結束時間內,管制控制器32的控制模組34控制上鎖機構30為解鎖狀態,允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為開啟狀態,進一步可以轉動第一或第二把手26、28驅動解閂機構22連動閂頭24由上閂位置位移至解閂位置,如此門被開啟。In the state that the first encrypted information includes the transit start time and the transit end time, if the control module 34 compares and authenticates the initial first identification information with the first identification information and compares the first hardware identification code with the first hard copy The body identification code and the control device identification code in the comparison main memory 38 are all the same as the control device identification code in the first encrypted information, and the time connecting the connected mobile device 44 to the control controller 32 is introduced. During the transit start time and the transit end time, the control module 34 of the control controller 32 controls the locking mechanism 30 to be in an unlocked state, allowing the latch 24 to be displaced from the upper latch position to the unlatching position, such that the control device 20 is set to In the open state, the first or second handle 26, 28 can be further rotated to drive the unlatching mechanism 22 to interlock the latch 24 from the upper latch position to the unlatched position such that the door is opened.

  每一次要使用管理者行動裝置54開門,係先執行管理程式,且將執行管理程式的管理者行動裝置54置於管制控制器32之無線傳輸裝置42的通訊範圍內,該管理者行動裝置54與管制控制器32使用第二無線傳輸模組60與無線傳輸裝置42相互連線,如此管理程式會要求該管理者行動裝置54的持有者使用第二輸入裝置62再次擷取持有者的刻下臉部圖像用以產生一刻下第二識別資訊,隨後與管制控制器32連線的管理者行動裝置54將第二加密資訊、刻下第二識別資訊與刻下第二硬體識別碼一起傳送至管制控制器32,也就是說,管理者行動裝置54每一次與管制控制器32連線時,與管制控制器32連線的管理者行動裝置54都會要求持有者輸入在連線當時的持有者的臉部圖像,並且管理程式會自動擷取連線當時與管制控制器32連線的管理者行動裝置54當時的第二硬體識別碼。Each time the manager mobile device 54 is used to open the door, the management program is executed first, and the manager mobile device 54 executing the management program is placed in the communication range of the wireless transmission device 42 of the control controller 32. The manager mobile device 54 And the control controller 32 uses the second wireless transmission module 60 and the wireless transmission device 42 to interconnect with each other, such that the management program requires the holder of the manager mobile device 54 to retrieve the holder again using the second input device 62. The face image is engraved to generate a second identification information, and then the manager mobile device 54 connected to the control controller 32 transmits the second encrypted information, the second identification information, and the second hardware identification code. To the regulatory controller 32, that is, each time the manager mobile device 54 is connected to the regulatory controller 32, the manager mobile device 54 connected to the regulatory controller 32 will require the holder to enter the connection at the time of the connection. The face image of the holder, and the management program will automatically capture the connection at that time with the controller 3 Connection manager 54 when the second mobile device hardware identification code.

  管制控制器32接收到第二加密資訊、刻下第二識別資訊與刻下第二硬體識別碼之後使用解密鑰將第二加密資訊解密,管制控制器32取得第二加密資訊內含的管制裝置識別碼、認證初始第二識別資訊、認證第二硬體識別碼,進一步管制控制器32的控制模組34識別認證初始第二識別資訊與認證第二硬體識別碼,並且比較認證初始第二識別資訊與刻下第二識別資訊是否相同、比較認證第二硬體識別碼與刻下第二硬體識別碼是否相同、比較主記憶體38中之管制裝置識別碼與第二加密資訊內的管制裝置識別碼是否相同。The control controller 32 receives the second encrypted information, marks the second identification information and deciphers the second hardware identification code, and decrypts the second encrypted information using the decryption key, and the control controller 32 obtains the control device identification included in the second encrypted information. The code, the initial identification information of the authentication, and the second hardware identification code are authenticated, and the control module 34 of the further control controller 32 identifies the initial identification information of the authentication and the second hardware identification code, and compares the initial identification of the second identification. Whether the information is the same as whether the second identification information is the same, whether the second hardware identification code is compared with the second hardware identification code, and the control device identification code in the main memory 38 and the control device identification in the second encrypted information are compared. Whether the codes are the same.

  若控制模組34比較認證初始第二識別資訊與刻下第二識別資訊或比較認證第二硬體識別碼與刻下第二硬體識別碼或比較主記憶體38中之管制裝置識別碼與第二加密資訊內的管制裝置識別碼的其中任意一者不相同,上鎖機構30保持在鎖定狀態,不允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為閉鎖狀態,門無法被開啟。If the control module 34 compares the authentication initial second identification information with the second identification information or compares the second hardware identification code with the second hardware identification code or compares the control device identification code and the second in the main memory 38. Any one of the control device identification codes in the encrypted information is different, the locking mechanism 30 is maintained in the locked state, and the latch 24 is not allowed to be displaced from the upper latch position to the unlatching position, so that the control device 20 is set to the locked state. The door could not be opened.

  若控制模組34比較認證初始第二識別資訊與刻下第二識別資訊及比較認證第二硬體識別碼與刻下第二硬體識別碼及比較主記憶體38中之管制裝置識別碼與第二加密資訊內的管制裝置識別碼的全部皆相同,管制控制器32的控制模組34控制上鎖機構30為解鎖狀態,允許閂頭24由上閂位置往解閂位置位移,如此管制裝置20被設定為開啟狀態,進一步可以轉動第一或第二把手26、28驅動解閂機構22連動閂頭24由上閂位置位移至解閂位置,如此門被開啟。If the control module 34 compares the authentication initial second identification information with the second identification information and the comparison authentication second hardware identification code and the second hardware identification code, and compares the control device identification code and the second in the main memory 38. The control device identification code in the encrypted information is all the same, and the control module 34 of the control controller 32 controls the locking mechanism 30 to be in an unlocked state, allowing the latch 24 to be displaced from the upper latch position to the unlatching position, so that the control device 20 is Set to the open state, the first or second handle 26, 28 can be further rotated to drive the unlatching mechanism 22 to interlock the latch 24 from the upper latch position to the unlatched position such that the door is opened.

  需特別注意的是,每一次通行者行動裝置44與管制控制器32連線時,若通行者行動裝置44的持有者不輸入刻下第一識別資訊,則不允許將第一加密資訊傳送至管制控制器32。每一次管理者行動裝置54與管制控制器32連線時,若管理者行動裝置54的持有者不輸入刻下第二識別資訊,則不允許將第二加密資訊傳送至管制控制器32。It should be noted that, when the passer-by mobile device 44 is connected to the control controller 32, if the holder of the passer-by mobile device 44 does not input the first identification information, the first encrypted information is not allowed to be transmitted to Control controller 32. Each time the manager mobile device 54 is connected to the control controller 32, if the holder of the manager mobile device 54 does not input the second identification information, the second encrypted information is not allowed to be transmitted to the regulation controller 32.

  如果已被授與開啟權限的任意一通行者行動裝置44遺失且被非原持有者拾取,非原持有者使用所拾取的通行者行動裝置44執行通行程式要開啟管制裝置20時,通行程式要求非原持有者使用第一輸入裝置52輸入刻下第一識別資訊,並且將第一加密資訊、刻下第一識別資訊以及刻下第一硬體識別碼傳送至管制控制器32,控制模組34使用解密鑰對第一加密資訊解密後,控制模組34比較認證初始第一識別資訊與刻下第一識別資訊不同,即使認證第一硬體識別碼與刻下第一硬體識別碼比較結果為相同,上鎖機構30仍然保持在鎖定狀態,不允許閂頭24由上閂位置往解閂位置位移,因而管制裝置20保持為閉鎖狀態,所以無法將門開啟。若行動裝置遺失的情況發生在管理者行動裝置54上,同樣會有認證初始第二識別資訊與刻下第二識別資訊不相符的問題,因而管制裝置20保持在閉鎖狀態,所以門無法被開啟。If any of the passer-by mobile devices 44 that have been granted the open authority are lost and picked up by the non-original holder, the non-original holder uses the picked-go passer-by mobile device 44 to execute the pass-through type to open the control device 20, The program requires the non-original holder to input the first identification information by using the first input device 52, and transmit the first encrypted information, the first identification information, and the first hardware identification code to the control controller 32, and the control module After decrypting the first encrypted information by using the decryption key, the control module 34 compares the authentication initial first identification information with the first identification information, even if the first hardware identification code is compared with the first hardware identification code. Similarly, the locking mechanism 30 remains in the locked state, and the latch 24 is not allowed to be displaced from the upper latching position to the unlatching position, so that the regulating device 20 remains in the locked state, so the door cannot be opened. If the lost state of the mobile device occurs on the manager mobile device 54, there is also a problem that the authentication initial second identification information does not match the second identification information, and thus the control device 20 remains in the locked state, so the door cannot be opened.

  如果有宵小使用工具以非法手段在任意一通行者行動裝置44與管制控制器32連線的傳輸第一加密資訊的狀態下竊取第一加密資訊,由於第一加密資訊需要使用對應的解密鑰才能解密,因此宵小無法得知第一加密資訊內含的內容,再者,即使宵小儲存第一加密資訊在自己的行動裝置中並且安裝通行程式,使得宵小自己的手機形成通行者行動裝置44,該宵小的通行者行動裝置44每一次與管制控制器32連線時,通行程式都會要求使用第一輸入裝置52輸入刻下第一識別資訊,並且會連同宵小的通行者行動裝置44的刻下第一硬體識別碼一起傳送至管制控制器32,如此管制控制器32的控制模組34進行比較時,就能識別宵小輸入的刻下第一識別資訊與認證初始第一識別資訊不相同,而且認證第一硬體識別碼也與刻下第一硬體識別碼不相同,如此管制裝置20保持在閉鎖狀態,所以門無法被開啟。若第二加密資訊發生被以不法手段竊取的情況發生在管理者行動裝置54上,同樣會有認證初始第二識別資訊與刻下第二識別資訊不相符以及認證第二硬體識別碼與刻下硬體識別碼不相符的問題,因而管制裝置20保持在閉鎖狀態,所以門無法被開啟。If there is a small use tool to illegally steal the first encrypted information in a state in which the first encrypted information is transmitted by any of the mobile device 44 and the control controller 32, since the first encrypted information needs to use the corresponding decryption key. Decryption, so the content contained in the first encrypted information cannot be known, and even if the first encrypted information is stored in the mobile device and installed in the mobile device, the mobile phone forming the passer mobile device 44 is reduced. Each time the small passer mobile device 44 is connected to the control controller 32, the pass-through type will require the first input device 52 to be used to input the first identification information, and the first hard device will be engraved together with the smaller passer mobile device 44. The body identification code is transmitted to the control controller 32 together, so that when the control module 34 of the control controller 32 compares, it can recognize that the first identification information of the small input is different from the initial identification information of the authentication, and the first authentication is performed. The hardware identification code is also incompatible with the first hardware identification code. So the control device 20 is held in the closed state, so the door can not be opened. If the second encrypted information occurrence occurs on the administrator mobile device 54 by illegal means, the authentication initial second identification information does not match the second identification information and the second hardware identification code is encrypted. The problem that the body identification code does not match, and thus the control device 20 remains in the locked state, so the door cannot be opened.

  本由於本創作管制系統10授權過程中一併將管制控制器32對應之管制裝置20的管制裝置識別碼一起加密成第一加密資訊,所以能夠使用管制裝置識別碼控制各通行者行動裝置44被授予那些管制裝置的開啟權限,舉例來說,在一個建築物中,可能會有複數個搭配成一組的管制控制器32以及與管制控制器32電連接的管制裝置20(例如門鎖),對應每一個管制裝置20的管制控制器32的主記憶體38都儲存有獨立且互不重複的管制裝置識別碼,任意的一通行者行動裝置44請求開啟權限的授權過程中,管理者行動裝置54可以選擇授予該通行者行動裝置44各管制裝置20的全部或其中任一至少一個的開啟權限,即管理者行動裝置54加密第一加密資訊時,能夠選擇要給與該通行者行動裝置44全部或其中任一至少一個管理裝置識別碼,如果該通行者行動裝置44取得之第一加密資訊內只含有其中任一至少一個管理裝置識別碼,那麼該通行者行動裝置44就只有被授予對應該管理裝置識別碼之管制裝置20的開啟權限,持該通行者行動裝置44將無法開啟其他的管理裝置20,如果該通行者行動裝置44取得之第一加密資訊內含有全部管制裝置識別碼,那麼該通行者行動裝置44就被授予全部管制裝置20的開啟權限。Since the authorization device identification code of the control device 20 corresponding to the control controller 32 is encrypted into the first encrypted information together in the authorization process of the creation control system 10, it is possible to control each of the passer mobile devices 44 using the control device identification code. The opening authority of those control devices is granted. For example, in a building, there may be a plurality of tactic controllers 32 collocated and a control device 20 (such as a door lock) electrically connected to the policing controller 32, corresponding to The main memory 38 of the control controller 32 of each of the control devices 20 stores independent and non-repeating regulatory device identification codes, and the administrator mobile device 54 requests the activation of the authority during the authorization process. The opening authority to grant all or at least one of the control devices 20 of the passer mobile device 44 may be selected, that is, when the manager mobile device 54 encrypts the first encrypted information, the driver mobile device 44 can be selected to be given all Or at least one of the management devices a code, if the first encrypted information obtained by the passer mobile device 44 contains only at least one of the management device identification codes, the passer mobile device 44 is only granted to the control device 20 corresponding to the management device identification code. When the authority is turned on, the other mobile device 20 cannot be turned on. If the first encrypted information obtained by the mobile device 44 contains all the control device identification codes, the mobile device 44 is granted. The opening authority of all the control devices 20.

  在授予各通行者行動裝置44開啟權限之後,也允許取消特定的通行者行動裝置44的開啟權限,詳細地說,管理者行動裝置54授予各通行者行動裝置44開啟權限後會在管理者行動裝置54的管理程式內建立授權名單並且保留各已授權的通行者行動裝置44的相關資訊,如此當要取消任意的一個通行者行動裝置44的開啟權限的狀態下,管理者行動裝置54執行管理程式並與要取消開啟權限的管制控制器32連線之後,管理者行動裝置54透過管理程式的介面選擇特定的通行者行動裝置44的資料傳送給管制控制器32的主記憶體38儲存並建立成黑名單,實際上,可以將以授權的通行者行動裝置44的第一硬體識別碼傳送給管制控制器32的主記憶體38儲存並建立成黑名單。在管制控制器32有建立黑名單的狀態下,每一個通行者行動裝置44執行開啟權限時,管制控制器32首先會比對每一筆刻下第一硬體識別碼(刻下第一硬體識別碼、刻下第一識別資訊以及第一加密資料一起被傳送到管制控制器32)是否與黑名單相符,如果該刻下第一硬體識別碼與黑名單內的第一硬體識別碼不相同之後,才進一步使用解密要解密第一加密資料,如果該刻下第一硬體識別碼與黑名單內的第一硬體識別碼相同,則管制控制器32不使用解密鑰解密第一加密資料,並且上鎖機構30保持在鎖定狀態,不允許閂頭24由上閂位置往解閂位置位移。After the permission of each of the passer mobile devices 44 is granted, the opening permission of the specific passer mobile device 44 is also allowed to be canceled. In detail, the manager mobile device 54 grants each of the passer mobile devices 44 the authority to act upon the manager. The authorization list is established in the management program of the device 54 and the related information of each authorized passer mobile device 44 is retained, so that the manager mobile device 54 performs management in a state where the permission of any one of the passer mobile devices 44 is to be canceled. After the program is connected to the policing controller 32 to cancel the privilege, the administrator mobile device 54 selects the data of the specific trajectory mobile device 44 through the interface of the management program to be transferred to the main memory 38 of the policing controller 32 for storage and establishment. Blacklisting, in fact, the first hardware identification code of the authorized passer mobile device 44 can be transmitted to the main memory 38 of the regulatory controller 32 for storage and blacklisting. In the state where the policing controller 32 has a blacklist, each of the passer mobile devices 44 performs the opening authority, and the policing controller 32 first compares each pen to the first hardware identification code (the first hardware identification code is engraved) And whether the first identification information and the first encrypted data are transmitted to the policing controller 32) are consistent with the blacklist, if the first hardware identifier is not the same as the first hardware identifier in the blacklist, Further decrypting to decrypt the first encrypted data, if the first hardware identification code is the same as the first hardware identification code in the blacklist, the policing controller 32 does not use the decryption key to decrypt the first encrypted data, and The lock mechanism 30 remains in the locked state, disallowing the latch 24 from being displaced from the upper latch position to the unlatched position.

  此外,由於管理者行動裝置54取得管理權限的過程中需要取得對應的管置裝置20的管置裝置識別碼,因而也允許設置複數個管理者行動裝置54,舉例來說,在一個建築物中,可能會有複數個搭配成一組的管制控制器32與管制裝置20(例如門鎖),第一個管理者行動裝置54與全部的管制控制器32連線取得對應的管制裝置的管制裝置識別碼與管理權限,第二個管理者行動裝置54與其中的至少一個管制控制器32及與該管制控制器32電連接的管制裝置20的管制裝置識別碼以及管理權限,如此第一個管理者行動裝置54能夠選擇授予通行者行動裝置44各管制裝置20的全部或其中任一至少一個的開啟權限,第二個管理者行動裝置54只能夠選擇有取得管理權限的至少一管制裝置20的開啟權限。In addition, since the manager mobile device 54 needs to obtain the management device identification code of the corresponding tube device 20 in the process of obtaining the management authority, it is also allowed to set a plurality of manager mobile devices 54, for example, in a building. There may be a plurality of tactic controllers 32 and a control device 20 (for example, a door lock) that are grouped together, and the first manager mobile device 54 and all the controllers 32 are connected to obtain the control device identification of the corresponding control device. Code and management authority, control device identification code and management authority of the second manager mobile device 54 and at least one of the control controller 32 and the control device 20 electrically connected to the control controller 32, such a first manager The mobile device 54 can select the opening authority to grant all or at least one of the control devices 20 of the passer mobile device 44, and the second manager mobile device 54 can only select the opening of at least one of the control devices 20 that have the management authority. Permissions.

  本創作的管制系統10利用受認證過的認證初始第一識別資訊配合每一次通行者行動裝置44與管制控制器32都需再輸入一次刻下第一識別資訊,達到即使各通行者行動裝置44遺失或者訊號被以不法手段擷取仍然無法操作管制裝置20為開啟狀態的功能,進一步達到良好的門禁管制效果。The control system 10 of the present creation uses the authenticated initial identification information to match each passer mobile device 44 and the control controller 32 to input the first identification information once again, even if each of the passer mobile devices 44 is lost. Alternatively, the signal is illegally retrieved and the control device 20 is still incapable of operating, thereby further achieving good access control effects.

  本創作的管制系統10利用受認證過的認證初始第二識別資訊配合每一次管理者行動裝置54與管制控制器32都需再輸入一次刻下第二識別資訊,達到即使管理者行動裝置54遺失或者訊號被以不法手段擷取仍然無法操作管制裝置20為開啟狀態的功能,進一步達到良好的門禁管制效果。The control system 10 of the present creation uses the authenticated initial identification information of the authentication to cooperate with each of the manager mobile device 54 and the control controller 32 to input the second identification information once again, even if the manager mobile device 54 is lost or The signal is illegally extracted and the function of the control device 20 is still inoperable, and the access control effect is further achieved.

  本創作利用管理者行動裝置54與各通行者行動裝置44透過網際網路、行動通訊網路或區域網路間接連線,如此管理者行動裝置54可以在遠端對各通行者行動裝置44進行授權,能夠有效提高管制系統10的管理效率。The author uses the manager mobile device 54 to indirectly connect to each of the passer mobile devices 44 via the Internet, a mobile communication network, or a regional network, such that the administrator mobile device 54 can authorize each of the passer mobile devices 44 remotely. The management efficiency of the control system 10 can be effectively improved.

  再者,由於各通行者行動裝置44每一次與管制控制器32連線都會被要求使用第一輸入裝置52輸入刻下第一識別資訊,管理者行動裝置54每一次與管制控制器32連線都會被要求使用第二輸入裝置62輸入刻下第二識別資訊,因而當第一與第二輸入裝置52、62是攝像裝置、指紋輸入裝置、麥克風、指靜脈識別裝置、虹膜識別裝置的其中任意一種時,若各通行者行動裝置44的任意一者遺失且被拾取者使用欲開啟管制裝置20或者管理者行動裝置54遺失且被拾取者使用欲開啟管制裝置20,傳送至管制控制器32的刻下第一識別資訊或刻下第二識別資訊有利於找到拾取者是何人。Moreover, each time the walker mobile device 44 is connected to the control controller 32, it is required to input the first identification information by using the first input device 52, and the manager mobile device 54 is connected to the control controller 32 each time. It is required to input the second identification information by using the second input device 62, and thus when the first and second input devices 52, 62 are any one of an imaging device, a fingerprint input device, a microphone, a finger vein recognition device, and an iris recognition device, If any one of the passer-by mobile devices 44 is lost and the pick-up person uses the control device 20 to be turned on or the manager mobile device 54 is lost and the pick-up person uses the control device 20 to be turned on, the transfer to the control controller 32 is performed. Identifying the information or engraving the second identification information is useful for finding who the picker is.

  此外,由於各通行者行動裝置44每一次與管制控制器32連線都會被要求使用第一輸入裝置52輸入刻下第一識別資訊,管理者行動裝置54每一次與管制控制器32連線都會被要求使用第二輸入裝置62輸入刻下第二識別資訊,因而當第一與第二輸入裝置52、62是攝像裝置、指紋輸入裝置、麥克風、指靜脈識別裝置、虹膜識別裝置的其中任意一種時,若有宵小以不法手段竊取第一或第二加密資訊,當宵小使用第一或第二加密資訊欲開啟管制裝置20時,傳送至管制控制器32的刻下第一識別資訊或刻下第二識別資訊有利於找到宵小是何人。另外傳送到管制控制器32的刻下第一硬體識別碼與刻下第二硬體識別碼也有助於找到宵小是何人。而且每一次各通行者行動裝置44與管理者行動裝置54與管制控制器32連線,都會被要求輸入刻下第一識別資訊或刻下第二識別資訊,因此能夠辨別與管制控制器32連線者的身分(例如由臉部圖像辨識身分),並且只有被授權的使用者才能使用自己所擁有的通行者行動裝置44或管理者行動裝置控制管制裝置20為開啟狀態。In addition, since each of the passer-by mobile devices 44 is required to be connected to the control controller 32 every time and is required to input the first identification information using the first input device 52, the manager mobile device 54 is connected to the control controller 32 each time. It is required to input the second identification information by using the second input device 62, and thus when the first and second input devices 52, 62 are any one of an imaging device, a fingerprint input device, a microphone, a finger vein recognition device, and an iris recognition device, If there is a small amount of illegally stealing the first or second encrypted information, when the first or second encrypted information is used to open the control device 20, the first identification information transmitted to the control controller 32 is engraved or the second identification information is inscribed. It is good for finding who is small. In addition, the first hardware identification code and the second hardware identification code transmitted to the control controller 32 also help to find out who is small. Moreover, each time the pedestrian mobile device 44 and the manager mobile device 54 are connected to the control controller 32, they are required to input the first identification information or the second identification information, thereby being able to identify the connection with the control controller 32. The identity (e.g., identity is recognized by the facial image), and only authorized users can use the passer-by device 44 or the manager's mobile device control device 20 that is owned by the user.

  本創作的管制系統10透過各管制裝置20儲存在管制控制器32的主記憶體38內的獨立管制裝置識別碼達到可以選擇授權一個或多個管制裝置的開啟權限,對於管理複數個管制裝置20具有很好的便利性。The control system 10 of the present creation, through the respective control device 20, stores the independent control device identification code stored in the main memory 38 of the control controller 32 to the open permission to selectively authorize one or more control devices, for managing a plurality of control devices 20 Has good convenience.

  再者,透過取得各管制裝置20管理權限的過程中需要取得管制裝置識別碼,如此允許設立多個管理者行動裝置54管理不同或相同的管制裝置20,藉此區隔出不同管理權限的管理者行動裝置54,對於管制系統10的管理操作更加簡便也更具靈活性。Furthermore, it is necessary to obtain the control device identification code in the process of obtaining the management authority of each of the control devices 20, thus allowing a plurality of manager mobile devices 54 to be set up to manage different or identical control devices 20, thereby separating management of different management rights. The mobile device 54 is simpler and more flexible for the management of the control system 10.

  本創作的管制系統10允許在各別的管制控制器32中的主記憶體38儲存所建立的黑名單,進一步用來取消已取得開啟權限的通行者行動裝置44的開啟權限,如此管理者即使沒有與通行者行動裝置44連線,也能取消該通行者行動裝置44的開啟權限,對於管理者實際的管理有好的助益。The authoring control system 10 allows the main memory 38 in the respective policing controllers 32 to store the established blacklist, further for canceling the opening authority of the passer mobile device 44 that has obtained the privilege, so even if the administrator Without being connected to the passer-by mobile device 44, the access rights of the passer-by mobile device 44 can be cancelled, which is beneficial to the actual management of the manager.

  由於說明書揭示的本創作可在未脫離本創作精神或大體特徵的其它特定形式來實施,且這些特定形式的一些形式已經被指出,所以,說明書揭示的實施例應視為舉例說明而非限制。本創作的範圍是由所附的申請專利範圍界定,而不是由上述說明所界定,對於落入申請專利範圍的均等意義與範圍的所有改變仍將包含在其範圍之內。The present invention disclosed in the specification is to be considered as illustrative and not restrictive. The scope of the present invention is defined by the scope of the appended claims, and is not intended to be limited by the scope of the invention.

10‧‧‧管制系統 10‧‧‧Control System

20‧‧‧管制裝置 20‧‧‧Control device

22‧‧‧解閂機構 22‧‧‧Unlatch mechanism

24‧‧‧閂頭 24‧‧‧Latch

26‧‧‧第一把手 26‧‧‧First handle

28‧‧‧第二把手 28‧‧‧ second handle

30‧‧‧上鎖機構 30‧‧‧Locking mechanism

32‧‧‧管制控制器 32‧‧‧Control controller

34‧‧‧控制模組 34‧‧‧Control Module

36‧‧‧供電單元 36‧‧‧Power supply unit

38‧‧‧記憶體 38‧‧‧ memory

40‧‧‧時間模組 40‧‧‧Time module

41‧‧‧重置觸發裝置 41‧‧‧Reset trigger

42‧‧‧無線傳輸模組 42‧‧‧Wireless Transmission Module

44‧‧‧通行者行動裝置 44‧‧‧passer mobile device

46‧‧‧第一處理器 46‧‧‧First processor

48‧‧‧第一記憶體 48‧‧‧First memory

50‧‧‧第一無線傳輸模組 50‧‧‧First wireless transmission module

52‧‧‧第一輸入裝置 52‧‧‧First input device

54‧‧‧管理者行動裝置 54‧‧‧Manager mobile device

56‧‧‧第二處理器 56‧‧‧second processor

58‧‧‧第二記憶體 58‧‧‧Second memory

60‧‧‧第二無線傳輸模組 60‧‧‧Second wireless transmission module

62‧‧‧第二輸入裝置 62‧‧‧second input device

Claims (12)

一種使用行動裝置操作的管制系統,包括:
一管制裝置,可被控制為開啟狀態或閉鎖狀態;
一控制模組與管制裝置電連接,而控制管制裝置為開啟狀態或閉鎖狀態;
一主記憶體,與控制模組電連接,主記憶體儲存一解密鑰以及對應管制裝置的一管制裝置識別碼;
一無線傳輸裝置,與控制模組電連接;
安裝一通行程式的複數通行者行動裝置,包括一第一處理器,以及與第一處理器電連接的一第一記憶體與一第一無線傳輸模組,各通行者行動裝置進一步包括一第一輸入裝置,第一無線傳輸模組可與無線傳輸裝置連線;
一重置觸發裝置,與管制控制器電連接,操作重置觸發裝置係將控制模組設定為重置狀態,
安裝一管理程式的一管理者行動裝置,包括一第二處理器,以及與第二處理器電連接的一第二記憶體與一第二無線傳輸模組,第二記憶體儲存對應解密鑰的一加密鑰,第二無線傳輸模組可與無線傳輸裝置連線且可各別與各第一無線傳輸模組連線;
在各通行者行動裝置初次執行通行程式的狀態下,要求通行者使用第一輸入裝置輸入一初始第一識別資訊,且允許第一無線傳輸裝置與無線傳輸裝置連線,
在各通行者行動裝置執行通行程式且第一無線傳輸裝置位於無線傳輸裝置的通訊範圍內,第一無線傳輸裝置與無線傳輸裝置連線,
在各通行者行動裝置執行通行程式且第一無線傳輸裝置位於無線傳輸裝置的通訊範圍外,第一無線傳輸裝置不與無線傳輸裝置連線,
在管理者行動裝置執行管理程式的狀態下,且管理者行動裝置位在無線傳輸裝置的通訊範圍內,第二無線傳輸模組與無線傳輸裝置連線,
在管理者行動裝置執行管理程式的狀態下,且管理者行動裝置位在無線傳輸裝置的通訊範圍外,第二無線傳輸模組不與無線傳輸裝置連線,
在管理者行動裝置執行管理程式且各通行者行動裝置的其中任意一者執行通行程式的狀態下,允許第一無線傳輸模組與第二無線傳輸模組連線,
在管理者行動裝置執行管理程式且各通行者行動裝置的其中任意一者執行通行程式並位在管理者行動裝置的第二無線傳輸模組的通訊範圍外的狀態下,第一無線傳輸模組不與第二無線傳輸模組連線,
在控制模組設定為重置狀態且管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,允許管理者行動裝置取得儲存於主記憶體中的管置裝置識別碼並儲存於第二記憶體內,
在控制模組為非重置狀態且管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,不允許管理者行動裝置取得儲存於主記憶體中的管置裝置識別碼並儲存於第二記憶體內,
在任意一通行者行動裝置的第一無線傳輸模組與第二無線傳輸模組連線的狀態下,允許管理者行動裝置取得連線的通行者行動裝置的初始第一識別資訊並執行認證程序,產生認證初始第一識別資訊,進一步使用儲存於第二記憶體之加密鑰將認證初始第一識別資訊以及管制裝置識別碼一起加密成第一加密資訊,
在管理者行動裝置產生第一加密資訊後,將第一加密資訊回傳給連線的通行者行動裝置的第一記憶體儲存,
在各通行者行動裝置的第一無線傳輸模組與第二無線傳輸模組不連線的狀態下,不允許管理者行動裝置取得各通行者行動裝置初始第一識別資訊,
每一次任意一通行者行動裝置的第一無線傳輸模組與無線傳輸裝置連線的狀態下,連線的通行者行動裝置的通行程式要求使用第一輸入裝置輸入一刻下第一識別資訊,控制模組取得連線的通行者行動裝置的第一加密資訊以及刻下第一識別資訊,
在第一無線傳輸模組不與無線傳輸裝置連線的狀態下,不允許控制模組取得各通行者行動裝置的第一加密資訊與刻下第一識別資訊,控制模組使用解密鑰允許對所取得之第一加密資訊執行解密程序,取得第一加密資訊內含的認證初始第一識別資訊以及管制裝置識別碼,
在控制模組比對連線的通行者行動裝置的認證初始第一識別資訊與連線的通行者行動裝置的刻下第一識別資料相同,而且第一加密資訊所含的管制裝置識別碼與主記憶體的管制裝置識別碼相同的狀態下,控制模組控制管制裝置設定為開啟狀態,
在控制模組比對連線的通行者行動裝置的認證初始第一識別資訊與連線的通行者行動裝置之刻下第一識別資料不相同,或者第一加密資訊所含的管制裝置識別碼與主記憶體的管制裝置識別碼不相同的狀態下,控制模組控制管制裝置設定為閉鎖狀態。
A control system that operates using a mobile device, including:
a control device that can be controlled to be in an open state or a locked state;
a control module is electrically connected to the control device, and the control control device is in an open state or a locked state;
a main memory, electrically connected to the control module, the main memory storing a decryption key and a control device identification code corresponding to the control device;
a wireless transmission device electrically connected to the control module;
a first pass processor and a first wireless transfer module electrically connected to the first processor, and each of the passer mobile devices further includes a first An input device, the first wireless transmission module can be connected to the wireless transmission device;
a reset trigger device is electrically connected to the control controller, and the operation reset trigger device sets the control module to a reset state.
A manager mobile device for installing a management program, comprising a second processor, and a second memory and a second wireless transmission module electrically connected to the second processor, wherein the second memory stores the corresponding decryption key The second wireless transmission module can be connected to the wireless transmission device and can be separately connected to each of the first wireless transmission modules;
In a state where each of the passer-by mobile devices performs the first-pass type, the passer is required to input an initial first identification information using the first input device, and allows the first wireless transmission device to connect with the wireless transmission device.
The first wireless transmission device is connected to the wireless transmission device, and the first wireless transmission device is located in the communication range of the wireless transmission device, and the first wireless transmission device is connected to the wireless transmission device.
The first wireless transmission device is not connected to the wireless transmission device, and the first wireless transmission device is outside the communication range of the wireless transmission device, and the first wireless transmission device is not connected to the wireless transmission device.
In a state in which the manager mobile device executes the management program, and the manager mobile device is located within the communication range of the wireless transmission device, the second wireless transmission module is connected to the wireless transmission device.
In a state in which the manager mobile device executes the management program, and the manager mobile device is located outside the communication range of the wireless transmission device, the second wireless transmission module is not connected to the wireless transmission device.
Allowing the first wireless transmission module to connect with the second wireless transmission module in a state in which the manager mobile device executes the management program and any one of the passer-by mobile devices performs the on-travel type.
The first wireless transmission module is in a state in which the manager mobile device executes the management program and any one of the passer-by mobile devices performs the communication type and is outside the communication range of the second wireless transmission module of the manager mobile device. Not connected to the second wireless transmission module,
When the control module is set to the reset state and the second wireless transmission module of the administrator mobile device is connected to the wireless transmission device, the administrator mobile device is allowed to acquire the management device identification code stored in the main memory. Stored in the second memory,
In a state where the control module is in a non-reset state and the second wireless transmission module of the administrator mobile device is connected to the wireless transmission device, the manager mobile device is not allowed to obtain the management device identification code stored in the main memory. And stored in the second memory,
Allowing the manager mobile device to obtain the initial first identification information of the connected passer mobile device and execute the authentication procedure in a state where the first wireless transmission module of any of the pedestrian mobile devices is connected to the second wireless transmission module Generating an initial identification information for authentication, and further encrypting the initial authentication information and the control device identification code into the first encrypted information together using the encryption key stored in the second memory.
After the manager mobile device generates the first encrypted information, the first encrypted information is returned to the first memory storage device of the connected mobile device.
In a state where the first wireless transmission module and the second wireless transmission module of each of the passer-by mobile devices are not connected, the manager mobile device is not allowed to obtain the initial first identification information of each of the pedestrian mobile devices.
In the state in which the first wireless transmission module of any of the pedestrian mobile devices is connected to the wireless transmission device, the through-travel type of the connected mobile device requires input of the first identification information by using the first input device, and controls The module obtains the first encrypted information of the connected passer mobile device and the first identification information is deleted.
In a state where the first wireless transmission module is not connected to the wireless transmission device, the control module is not allowed to obtain the first encrypted information of each of the pedestrian mobile devices and the first identification information is deleted, and the control module uses the decryption key to allow the opposite Acquiring the first encrypted information to perform a decryption process, and obtaining an initial authentication information and a control device identification code included in the first encrypted information,
The authentication initial first identification information of the passer-by mobile device of the control module is the same as the first identification data of the connected passer mobile device, and the control device identification code and the main information included in the first encrypted information When the control device identification code of the memory is the same, the control module controls the control device to be set to the on state.
The first identification data is different from the first identification information of the connected mobile device of the passer-by mobile device of the control module, or the control device identifier of the first encrypted information is In a state where the control device identification codes of the main memory are different, the control module control and control device is set to the locked state.
如申請專利範圍第1項所述之使用行動裝置操作的管制系統,進一步包括:
一時間模組,與控制模組電連接,時間模組係提供日期與時間資訊,
在控制模組設定為重置狀態且管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,管理者行動裝置與時間模組進行同步化,造成管理者行動裝置與時間模組的時間一致,
管理者行動裝置使用加密鑰將認證初始第一識別資訊、管制裝置識別碼與通行起始時間以及通行結束時間一起加密成第一加密資訊,
在控制模組取得連線的通行者行動裝置之第一加密資訊與刻下第一識別資料的狀態下,使用解密鑰解密第一加密資訊,取得第一加密資訊所內含之認證初始第一識別資訊、管制裝置識別碼、通行起始時間以及通行結束時間,
在控制模組比對認證初始第一識別資訊與連線的通行者行動裝置之刻下第一識別資料相同,比對第一加密資料所含的管制裝置識別碼與主記憶體內之管置裝置識別碼相同,而且比對時間模組的時間介於通行起始時間與通行結束時間之間的狀態下,控制模組控制管制裝置為開啟狀態,
在控制模組比對認證初始第一識別資訊與連線的通行者行動裝置之刻下第一識別資料不相同,或比對第一加密資料所含的管制裝置識別碼與主記憶體內之管置裝置識別碼不相同,或比對時間模組的時間不介於通行起始時間與通行結束時間之間的狀態下,控制模組控制管制裝置為閉鎖狀態。
The control system using the mobile device operation as described in claim 1 of the patent application further includes:
A time module is electrically connected to the control module, and the time module provides date and time information.
When the control module is set to the reset state and the second wireless transmission module of the administrator mobile device is connected to the wireless transmission device, the manager mobile device synchronizes with the time module, thereby causing the administrator to operate the device and the time. The time of the modules is the same,
The administrator mobile device encrypts the initial identification information and the control device identification code together with the traffic start time and the traffic end time into the first encrypted information by using the encryption key.
In the state that the control module obtains the first encrypted information of the connected passer mobile device and the first identification data, the first encrypted information is decrypted by using the decryption key, and the initial identification of the authentication included in the first encrypted information is obtained. Information, control device identification code, transit start time, and transit end time,
The control module compares the initial identification information of the authentication with the first identification data of the connected mobile device, and compares the control device identification code included in the first encrypted data with the management device in the main memory. When the codes are the same, and the time of the comparison time module is between the transit start time and the transit end time, the control module controls the control device to be in an open state.
When the control module compares the first identification information of the authentication with the connected mobile device of the connection, the first identification data is different, or the control device identification code included in the first encrypted data is compared with the main memory When the device identification code is different, or the time of the time module is not between the transit start time and the traffic end time, the control module controls the control device to be in a locked state.
如申請專利範圍第2項所述之使用行動裝置操作的管制系統,在管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,允許管理者行動裝置將所選取的已授權的通行者行動裝置的第一硬體識別碼傳送至主記憶體儲存並建立為黑名單;
在控制模組取得通行者行動裝置之第一加密資訊與刻下第一硬體識別碼的狀態下,控制模組係先比對刻下第一硬體識別碼與主記憶體儲存之黑名單中的第一硬體識別碼是否相同,
在刻下第一硬體識別碼與黑名單的第一硬體識別碼相同的情況下,控制模組不使用解密鑰解密第一加密資訊,管制裝置設定為閉鎖狀態,
在刻下第一硬體識別碼與黑名單的第一硬體識別碼不相同的情況下,控制模組使用解密鑰解密第一加密資訊。
The control system using the mobile device operation as described in claim 2, in the state in which the second wireless transmission module of the manager mobile device is connected to the wireless transmission device, allows the manager mobile device to select the selected The first hardware identifier of the authorized passer mobile device is transmitted to the main memory for storage and established as a blacklist;
When the control module obtains the first encrypted information of the passer-by mobile device and the first hardware identification code is inscribed, the control module first compares the first hardware identification code with the blacklist stored in the main memory. Whether the first hardware identifier is the same,
In the case that the first hardware identification code is the same as the first hardware identification code of the blacklist, the control module decrypts the first encrypted information without using the decryption key, and the control device is set to the locked state.
In the case that the first hardware identification code is different from the first hardware identification code of the blacklist, the control module decrypts the first encrypted information using the decryption key.
如申請專利範圍第1項所述之使用行動裝置操作的管制系統,其中各通行者行動裝置各自包括互不相同的一第一硬體識別碼;
在任意一通行者行動裝置的第一無線傳輸模組與第二無線傳輸模組連線的狀態下,允許管理者行動裝置取得連線的通行者行動裝置的第一硬體識別碼,以及連線的通行者行動裝置的初始第一識別資訊並執行認證程序產生認證第一硬體識別碼與認證初始第一識別資訊,進一步使用加密鑰將認證第一硬體識別碼、管制裝置識別碼與認證初始第一識別資訊一起加密成第一加密資訊,
每一次通行者行動裝置執行通行程式且與第一無線傳輸模組與無線傳輸裝置連線的狀態下,通行程式係擷取該通行者行動裝置的刻下第一硬體識別碼,
在各通行者行動裝置的第一無線傳輸模組與第二無線傳輸模組不連線的狀態下,不允許管理者行動裝置取得各通行者行動裝置初始第一識別資訊以及第一硬體識別碼,
在任意的一通行者行動裝置的第一無線傳輸模組與無線傳輸裝置連線的狀態下,允許控制模組取得連線的通行者行動裝置的刻下第一硬體識別碼,
在各通行者行動裝置的第一無線傳輸模組與無線傳輸裝置不連線的狀態下,不允許控制模組取得各通行者行動裝置的刻下第一硬體識別碼,
在控制模組比對認證初始第一識別資訊、認證第一硬體識別碼與連線的通行者行動裝置之刻下第一識別資料與刻下第一硬體識別碼,以及比對第一加密資料所含的管制裝置識別碼與主記憶體內之管置裝置識別碼相同均相同的狀態下,控制模組控制管制裝置為開啟狀態,
在控制模組比對連線的通行者行動裝置的認證初始第一識別資訊、認證第一硬體識別碼與連線的通行者行動裝置之刻下第一識別資料或刻下第一硬體識別碼、第一加密資料所含的管制裝置識別碼與主記憶體內之管置裝置識別碼的其中任意至少一者不相同的狀態下,控制模組控制管制裝置為閉鎖狀態。
A control system for operating a mobile device according to claim 1, wherein each of the passer mobile devices comprises a first hardware identification code different from each other;
Allowing the manager mobile device to obtain the first hardware identification code of the connected mobile device in a state in which the first wireless transmission module of any of the mobile device is connected to the second wireless transmission module, and The initial identification information of the line passer mobile device and the execution of the authentication program generate the first hardware identification code and the initial authentication information, and further use the encryption key to authenticate the first hardware identification code and the control device identification code. The initial identification information of the authentication is encrypted together into the first encrypted information,
Each time the passer-by mobile device performs a pass-through type and is connected to the first wireless transmission module and the wireless transmission device, the pass-through type retrieves the first hardware identification code of the passer-by mobile device.
In a state where the first wireless transmission module and the second wireless transmission module of each of the passer-by mobile devices are not connected, the manager mobile device is not allowed to obtain the initial first identification information and the first hardware identification of each of the pedestrian mobile devices. code,
In a state in which the first wireless transmission module of any of the pedestrian mobile devices is connected to the wireless transmission device, the control module is allowed to obtain the first hardware identification code of the connected mobile device.
In a state where the first wireless transmission module and the wireless transmission device of each of the passer-by mobile devices are not connected, the control module is not allowed to obtain the first hardware identification code of each of the pedestrian mobile devices.
The first identification data and the first hardware identification code are compared, and the first encrypted data is compared when the control module compares the initial identification information of the authentication, the first hardware identification code and the connected mobile phone mobile device The control module controls the control device to be in an open state in a state in which the control device identification code is the same as the management device identification code in the main memory.
The first identification data or the first hardware identification code is engraved at the moment when the control module compares the authenticated initial first identification information of the passer-by mobile device, the first hardware identification code and the connected passer mobile device The control module controls the control device to be in a locked state in a state in which the control device identification code included in the first encrypted data is different from any of the at least one of the management device identification codes in the main memory.
如申請專利範圍第1項所述之使用行動裝置操作的管制系統,管理者行動裝置具有一第二硬體識別碼,管理者行動裝置進一步包括:
一第二輸入裝置,與第二處理器電連接,
在管理者行動裝置初次執行管理程式的狀態下,要求管理者使用第二輸入裝置輸入一初始第二識別資訊並擷取管理者行動裝置的一第二硬體識別碼並執行認證程序以產生認證初始第二識別資訊以及認證第二硬體識別碼,進一步使用加密鑰將認證第二硬體識別碼、管制裝置識別碼與認證初始第二識別資訊加密成第二加密資訊,
每一次管理者行動裝置的第二無線傳輸模組與無線傳輸裝置連線的狀態下,連線的管理者行動裝置的管理程式要求輸入使用第二輸入裝置輸入一刻下第二識別資訊並擷取連線的管理者行動裝置的刻下第二硬體識別碼,並允許控制模組取得管理者行動裝置的第二加密資訊、刻下第二硬體識別碼以及刻下第二識別資訊,
在控制模組取得管理者行動裝置之第二加密資訊、第二硬體識別碼與第二識別資料的狀態下,控制模組使用解密鑰解密第二加密資訊,取得第二加密資訊所內含之認證第二硬體識別碼、管制裝置識別碼與認證初始第二識別資資訊,
在控制模組比對認證第二硬體識別碼與管理者行動裝置之刻下第二硬體識別碼相同、比對第二加密資訊內含的管制裝置識別碼與主記憶體的管制裝置識別碼相同,而且比對認證初始第二識別資資訊與管理者行動裝置之刻下第二識別資料相同的狀態下,控制模組控制管制裝置設定為開啟狀態,
在控制模組比對連線的管理者行動裝置的認證初始第二識別資訊、認證第二硬體識別碼與連線的管理者行動裝置之刻下第二識別資料或刻下第二硬體識別碼以及第二加密資訊內含的管制裝置識別碼與主記憶體的管制裝置識別碼的其中任意至少一者不相同的狀態下,控制模組控制管制裝置為閉鎖狀態。
The administrator mobile device has a second hardware identification code, and the administrator mobile device further includes:
a second input device electrically connected to the second processor,
In a state where the manager mobile device first executes the management program, the manager is required to input an initial second identification information using the second input device and retrieve a second hardware identification code of the manager mobile device and execute the authentication program to generate the authentication. Initializing the second identification information and authenticating the second hardware identification code, and further encrypting the authentication second hardware identification code, the regulatory device identification code, and the authentication initial second identification information into the second encrypted information by using the encryption key,
In a state in which the second wireless transmission module of the manager mobile device is connected to the wireless transmission device, the management program of the connected manager mobile device requests to input the second identification information and input the second identification information using the second input device. The connected manager mobile device engraves the second hardware identification code, and allows the control module to obtain the second encrypted information of the administrator mobile device, engraved the second hardware identification code, and engraves the second identification information.
When the control module obtains the second encrypted information, the second hardware identification code and the second identification data of the administrator mobile device, the control module decrypts the second encrypted information by using the decryption key, and obtains the second encrypted information. Authenticating the second hardware identification code, the control device identification code, and the authentication initial second identification information,
The control module compares the second hardware identification code with the second hardware identification code of the second mobile body identification code, and compares the control device identification code included in the second encrypted information with the control device identification code of the main memory. In the same state, and in the same state that the authentication initial second identification information is the same as the second identification data at the moment of the manager mobile device, the control module controls the control device to be set to the on state.
The second identification information or the second hardware identification code is engraved when the control module compares the initial identification information of the authentication of the manager mobile device of the connection, the authentication of the second hardware identification code and the connection manager mobile device And in a state in which the control device identification code included in the second encrypted information is different from any one of the control device identification codes of the main memory, the control module controls the control device to be in a locked state.
如申請專利範圍第5項所述之使用行動裝置操作的管制系統,其中第一輸入裝置為攝像裝置所構成,攝像裝置擷取臉部圖像並且把臉部圖像編碼作為初始第一識別資訊或刻下第一識別資訊,第二輸入裝置為攝像裝置所構成,攝像裝置擷取臉部圖像並且把臉部圖像編碼作為初始第二識別資訊或刻下第二識別資訊。The control system using the mobile device operation according to claim 5, wherein the first input device is constituted by an image capturing device, the camera device captures a face image and encodes the face image as an initial first identification information. Or the first identification information is engraved, and the second input device is composed of an imaging device, and the camera captures the facial image and encodes the facial image as the initial second identification information or the second identification information. 如申請專利範圍第5項所述之使用行動裝置操作的管制系統,其中第一輸入裝置為麥克風所構成,麥克風擷取聲音並編輯為聲紋作為初始第一識別資訊或刻下第一識別資訊,第二輸入裝置為麥克風所構成,麥克風擷取聲音並編輯為聲紋作為初始第二識別資訊或刻下第二識別資訊。The control system for operating a mobile device according to claim 5, wherein the first input device is a microphone, and the microphone captures the sound and edits the voiceprint as the initial first identification information or the first identification information. The second input device is composed of a microphone, and the microphone captures the sound and edits it into a voiceprint as the initial second identification information or engraves the second identification information. 如申請專利範圍第5項所述之使用行動裝置操作的管制系統,其中第一輸入裝置為指紋輸入裝置所構成,指紋輸入裝置擷取指紋圖像並且把指紋圖像編碼作為初始第一識別資訊或刻下第一識別資訊,第二輸入裝置為指紋輸入裝置所構成,指紋輸入裝置擷取指紋圖像並且把指紋圖像編碼作為初始第二識別資訊或刻下第二識別資訊。The control system using the mobile device operation according to claim 5, wherein the first input device is a fingerprint input device, the fingerprint input device captures the fingerprint image and encodes the fingerprint image as the initial first identification information. Or engraving the first identification information, the second input device is configured by a fingerprint input device, and the fingerprint input device captures the fingerprint image and encodes the fingerprint image as the initial second identification information or the second identification information. 如申請專利範圍第5項所述之使用行動裝置操作的管制系統,其中第一輸入裝置為指靜脈識別裝置所構成,指靜脈識別裝置擷取指靜脈紋路並且把指靜脈紋路編碼作為初始第一識別資訊或刻下第一識別資訊,第二輸入裝置為指靜脈識別裝置所構成,指靜脈識別裝置擷取指靜脈紋路並且把指靜脈紋路編碼作為初始第二識別資訊或刻下第二識別資訊。The control system using the mobile device operation according to claim 5, wherein the first input device is constituted by a finger vein recognition device, and the finger vein recognition device captures the finger vein pattern and encodes the finger vein code as the initial first. The second input device is composed of a finger vein recognition device, and the finger vein recognition device captures the finger vein pattern and encodes the finger vein pattern as the initial second identification information or the second identification information. 如申請專利範圍第5項所述之使用行動裝置操作的管制系統,其中第一輸入裝置為虹膜識別裝置所構成,虹膜識別裝置擷取虹膜圖像並且把虹膜圖像編碼作為初始第一識別資訊或刻下第一識別資訊,第二輸入裝置為虹膜識別裝置所構成,虹膜識別裝置擷取虹膜圖像並且把虹膜圖像編碼作為初始第二識別資訊或刻下第二識別資訊。A control system using a mobile device according to claim 5, wherein the first input device is an iris recognition device, the iris recognition device captures the iris image and encodes the iris image as the initial first identification information. Or engraving the first identification information, the second input device is composed of an iris recognition device, and the iris recognition device captures the iris image and encodes the iris image as the initial second identification information or the second identification information. 如申請專利範圍第5項所述之使用行動裝置操作的管制系統,其中第一輸入裝置為觸控螢幕所構成,觸控螢幕允許輸入密碼、圖形的其中任意一種作為第一識別資訊或刻下第一識別資訊,第二輸入裝置為觸控螢幕所構成,觸控螢幕允許輸入密碼、圖形的其中任意一種作為第二識別資訊儲貨刻下第二識別資訊。The control system using the mobile device as described in claim 5, wherein the first input device is a touch screen, and the touch screen allows any one of the password and the graphic to be input as the first identification information or the first The second input device is composed of a touch screen, and the touch screen allows any one of the input password and the graphic to be used as the second identification information to store the second identification information. 如申請專利範圍第1項所述之使用行動裝置操作的管制系統,管制裝置為安裝於一門上的一門鎖所構成,門鎖進一步包括:
一上鎖機構,與控制模組電連接,上鎖機構可被控制為鎖定狀態或解鎖狀態;
一閂頭,與上鎖機構連動地結合,閂頭可在上閂位置與解閂位置之間移動;
在控制模組比對連線的通行者行動裝置的認證初始第一識別資訊與連線的通行者行動裝置取得之刻下第一識別資料相同而且第一加密資訊內含的管置裝置識別碼與主記憶體內的管制裝置識別碼相同的狀態下,控制模組控制上鎖機構設定解鎖狀態,允許閂頭由上閂位置位移至解閂位置,造成門鎖被操作成開啟狀態,
在控制模組比對連線的通行者行動裝置的認證初始第一識別資訊與連線的通行者行動裝置取得之刻下第一識別資料不相同,或者第一加密資訊內含的管置裝置識別碼與主記憶體內的管制裝置識別碼不相同的狀態下,控制模組控制上鎖機構設定鎖定狀態,不允許閂頭由上閂位置位移至解閂位置,造成門鎖被操作成閉鎖狀態。
The control system for operating the mobile device according to claim 1, wherein the control device is formed by a door lock mounted on a door, the door lock further comprising:
a locking mechanism is electrically connected to the control module, and the locking mechanism can be controlled to be in a locked state or an unlocked state;
a latching head coupled in conjunction with the locking mechanism, the latching head being movable between an upper latching position and an unlatching position;
The first initial identification information of the passer-by mobile device of the control module is identical to the first identification data obtained by the connected mobile device, and the device identification code included in the first encrypted information is In a state in which the control device identification code in the main memory is the same, the control module controls the locking mechanism to set the unlock state, allowing the latch to be displaced from the upper latch position to the unlatching position, causing the door lock to be operated to be in an open state.
When the first initial identification information of the authenticated mobile device of the control module is not the same as the first identification data obtained by the connected mobile device, or the identification device included in the first encrypted information In a state where the code is different from the control device identification code in the main memory, the control module controls the locking mechanism to set the locked state, and does not allow the latch to be displaced from the upper latch position to the unlatching position, causing the door lock to be operated in the locked state.
TW104214828U 2015-09-11 2015-09-11 Operating control system using mobile device TWM513256U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW104214828U TWM513256U (en) 2015-09-11 2015-09-11 Operating control system using mobile device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW104214828U TWM513256U (en) 2015-09-11 2015-09-11 Operating control system using mobile device

Publications (1)

Publication Number Publication Date
TWM513256U true TWM513256U (en) 2015-12-01

Family

ID=55408275

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104214828U TWM513256U (en) 2015-09-11 2015-09-11 Operating control system using mobile device

Country Status (1)

Country Link
TW (1) TWM513256U (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108118971A (en) * 2016-11-30 2018-06-05 德金属工业股份有限公司 Using running gear as the door lock of input interface
TWI636316B (en) * 2017-05-05 2018-09-21 致伸科技股份有限公司 Communication device and optical device thereof
TWI644008B (en) * 2017-01-04 2018-12-11 林 招慶 Electronic lock system with remote transportation wireless key function
TWI662177B (en) * 2018-10-12 2019-06-11 一德金屬工業股份有限公司 Access control method with double unlock recognition pattern
CN111080844A (en) * 2018-10-19 2020-04-28 一德金属工业股份有限公司 Entrance guard control method with double unlocking recognition modes

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108118971A (en) * 2016-11-30 2018-06-05 德金属工业股份有限公司 Using running gear as the door lock of input interface
CN108118971B (en) * 2016-11-30 2020-04-03 一德金属工业股份有限公司 Door lock using mobile device as input interface
TWI644008B (en) * 2017-01-04 2018-12-11 林 招慶 Electronic lock system with remote transportation wireless key function
TWI636316B (en) * 2017-05-05 2018-09-21 致伸科技股份有限公司 Communication device and optical device thereof
TWI662177B (en) * 2018-10-12 2019-06-11 一德金屬工業股份有限公司 Access control method with double unlock recognition pattern
CN111080844A (en) * 2018-10-19 2020-04-28 一德金属工业股份有限公司 Entrance guard control method with double unlocking recognition modes

Similar Documents

Publication Publication Date Title
TWI550435B (en) Control system operated by mobile devices
TWI569230B (en) Control system with mobile devices
US9953151B2 (en) System and method identifying a user to an associated device
CN101796764B (en) Biometric authentication device, system and method of biometric authentication
US7664961B2 (en) Wireless handheld device with local biometric authentication
TWM513256U (en) Operating control system using mobile device
US20150075232A1 (en) Secure smartphone-operated locking device
WO2018040640A1 (en) Authorization method for virtual key, server, and authorization system
WO2014083335A4 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
JP2008250874A (en) Information processing device and method, program, and information processing system
JP2010049490A (en) Authentication system
JP6900643B2 (en) Electronic lock system
WO2019204954A1 (en) Smart lock system
WO2013123453A1 (en) Data storage devices, systems, and methods
KR102301742B1 (en) Method for registering and using non keypad smart door-lock key and access control system thereof
TWI662177B (en) Access control method with double unlock recognition pattern
JP5178249B2 (en) Key authentication system
CN110738764A (en) Security control system and method based on intelligent lock
JP4435062B2 (en) Key opening / closing system
JP2005290739A (en) Keyless lock system
CN106302973B (en) Take concerted action the control system of device
KR20170115770A (en) Door lock control system via PC and Smart Phone using coded serial number by EEDE system.
CN106530451B (en) The control system operated using running gear
Gudavalli et al. A Novel Door Lock Operation Using Two Staged Smart Security Verification
JP4940466B2 (en) Key system