TWM491703U - Security system - Google Patents
Security system Download PDFInfo
- Publication number
- TWM491703U TWM491703U TW103210495U TW103210495U TWM491703U TW M491703 U TWM491703 U TW M491703U TW 103210495 U TW103210495 U TW 103210495U TW 103210495 U TW103210495 U TW 103210495U TW M491703 U TWM491703 U TW M491703U
- Authority
- TW
- Taiwan
- Prior art keywords
- security
- host
- password
- state
- identity verification
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Alarm Systems (AREA)
Abstract
Description
本創作係提供一種保全系統,尤指一種具有密碼鎖的保全系統。This creation provides a security system, especially a security system with a password lock.
坊間多數社區、辦公大樓及營業場所為了要保障其內部人員及財產的安全,多半會設置保全系統以及保全人員,藉以透過保全系統的偵測以及保全人員的監控,以保障社區、辦公大樓或營業場所的安危,以免宵小或強盜入侵等不法情形發生。In order to protect the safety of its internal staff and property, most communities, office buildings and business premises in the community will set up security systems and security personnel to protect the community, office buildings or business through the detection of security systems and the monitoring of security personnel. The safety of the place, so as not to cause small or robbery invasions and other illegal circumstances.
一般最常見的就是密碼鎖,其係與門鎖連動,一般門禁系統內存有允許進出的卡號、密碼等,因此當人員透過不被允許的卡號之感應卡或刷卡、或輸入錯誤密碼時,門禁系統會維持大門閉鎖,以避免此不被允許的人員進出大門;反之,若持有允許的卡號或輸入正確的密碼,則門禁系統會解除大門的閉鎖。Generally, the most common one is the password lock, which is linked with the door lock. Generally, the access control system has the card number and password that are allowed to enter and exit. Therefore, when the person passes the sensor card of the card number that is not allowed, or swipes the card, or enters the wrong password, the access control The system will maintain the door lock to prevent the unauthorised personnel from entering and exiting the gate; conversely, if the card number is allowed or the correct password is entered, the access control system will unlock the door.
再者,門禁系統另外會與保全系統連結,也就是說,於下班時間、夜深人靜時,透過設定保全系統後,即可啟動監控設備,以協助保全人員監控鮮少或無法到達的區域,以避免宵小由此進出。In addition, the access control system will be connected to the security system. In other words, during the off-hours and in the dead of night, after the security system is set up, the monitoring equipment can be activated to help the security personnel monitor the rarely or unreachable areas to avoid Xiao Jin came in and out.
因此,坊間門禁系統與設定保全系統多係分開設置,也就是說,通常於門邊的牆壁上設置門禁系統,藉以管控大門的進出,且保全系統會設置鄰近於門禁系統,藉以供最後離開的或第一個到達的使用者透過保全系統進行設定或解除,如解除保全系統後,欲進入大門時,再以開門禁系統解開大門的門鎖,方能進入大門,實為不便,且牆壁表面因設置設置門禁系統及保全系統等多個機盒,耗費成本過多且其構成不具有美感。因此,鑑於上述問題,實有必要提出有效的解決方案。Therefore, the access control system and the maintenance system are set separately. That is to say, the access control system is usually installed on the wall of the door to control the entrance and exit of the gate, and the security system is set adjacent to the access control system for the last departure. Or the first arriving user can be set or released through the security system. If the security system is to be unlocked, when the door is to be opened, the door lock of the door can be unlocked by opening the access control system, so that the door can be accessed, which is inconvenient and the wall The surface is provided with a plurality of boxes such as an access control system and a security system, which are costly and not aesthetically pleasing. Therefore, in view of the above problems, it is necessary to propose an effective solution.
鑑於上述問題,本創作係提供一種具有密碼鎖的保全系統,藉以整合密碼鎖及保全系統,以供保全人員方便使用。In view of the above problems, the present invention provides a security system with a password lock to integrate the password lock and security system for the convenience of the security personnel.
本創作一實施例提供一種保全系統,其包含:密碼鎖及保全主機。保全主機具有一保全狀態,保全狀態包括一監控狀態及一解除狀態,保全主機包含:無線通訊模組及控制模組。密碼鎖具有複數密碼鍵,密碼鎖響應複數密碼鍵之輸入而接收身分驗證訊息,且根據身分驗證訊息進行一身分驗證以於通過驗證時執行一解鎖動作。無線通訊模組連線密碼鎖,以接收該身分驗證訊息及該身分驗證之結果。控制模組電連接無線通訊模組,於身分驗證之結果為通過且保全狀態為監控狀態時,控制模組設定保全狀態為一解除狀態。An embodiment of the present invention provides a security system including: a password lock and a security host. The security host has a security state, the security state includes a monitoring state and a release state, and the security host includes: a wireless communication module and a control module. The password lock has a plurality of password keys, and the password lock receives the identity verification message in response to the input of the plurality of password keys, and performs an identity verification according to the identity verification message to perform an unlocking action when the verification is performed. The wireless communication module connects the password lock to receive the identity verification message and the result of the identity verification. The control module is electrically connected to the wireless communication module. When the result of the identity verification is passed and the security state is the monitoring state, the control module sets the security state to a release state.
藉此透過密碼鎖取得身分驗證訊息並且經過身分驗證通過後,而進一步執行解鎖動作同時將保全狀態由監控狀態設定為解除狀態,藉此可省略傳統的設定機,並且簡化傳統需先解除保全設定再解除門禁之流程。In this way, the identity verification message is obtained through the password lock and after the identity verification is passed, the unlocking action is further performed and the security state is set to the release state from the monitoring state, thereby omitting the conventional setting machine and simplifying the traditional need to first cancel the security setting. Then release the process of access control.
第1圖為本創作第一實施例之保全系統的一架構示意圖。請參閱第1圖所示,保全系統包含:管制中心主機30、密碼鎖20及保全主機10。保全主機10與密碼鎖20及管制中心主機30連接。保全主機10包含:無線通訊模組12、有線通訊模組13及控制模組11,控制模組11分別與無線通訊模組12及有線通訊模組13連接。FIG. 1 is a schematic diagram of an architecture of a security system according to a first embodiment of the present invention. Referring to FIG. 1 , the security system includes: a control center host 30, a password lock 20, and a security host 10. The security host 10 is connected to the combination lock 20 and the control center host 30. The security host 10 includes a wireless communication module 12, a wired communication module 13, and a control module 11, and the control module 11 is connected to the wireless communication module 12 and the wired communication module 13, respectively.
第2圖為本創作第一實施例之密碼鎖20的一外觀示意圖。請參閱第1-2圖所示,密碼鎖20具有複數密碼鍵21,且各密碼鍵21分別代表一輸入訊號,如第2圖左上方即為表示「1」的輸入訊號,本創作並非以此為限制,再者,輸入訊號並非一定要為數字組合,亦可為英文字母或其他符號替代。藉由一個或多個輸入訊號可構成一身分驗證訊息(即密碼)。密碼鎖20得設置於大門的門邊,藉以控制對應於大門的門鎖之啟閉,另於一些實施例中,密碼鎖20亦可設置於電梯內,以開啟或關閉電梯的樓層按鍵之輸入許可,本創作並非為限制。FIG. 2 is a schematic diagram showing the appearance of the combination lock 20 of the first embodiment of the present invention. Referring to FIG. 1-2, the combination lock 20 has a plurality of password keys 21, and each of the password keys 21 represents an input signal. The upper left side of FIG. 2 is an input signal indicating "1". This is a limitation. Furthermore, the input signal does not have to be a combination of numbers, and may be replaced by an English letter or other symbols. An identity verification message (ie, a password) can be formed by one or more input signals. The combination lock 20 is disposed at the door of the door to control the opening and closing of the door lock corresponding to the door. In some embodiments, the code lock 20 can also be disposed in the elevator to open or close the input of the floor button of the elevator. Licensing, this creation is not a limitation.
請參閱第1圖所示,保全主機10係透過無線通訊模組12與密碼鎖20連接,也就是說,密碼鎖20係經由無線傳輸協定以傳送身分驗證訊息及確認身分驗證訊息許可的資訊至無線通訊模組12,無線通訊模組12再轉傳送至控制模組11。其中,無線通訊模組12係可為射頻 ﹑無線網路、ZigBee﹑Zwave﹑藍牙、近場通訊(NFC)或其他等無線之通訊協定,本創作並非為限制。相應的,密碼鎖20也具有與保全主機10之無線通訊模組12相同通訊協定之無線通訊模組(圖未示)。藉此,密碼鎖20可將鎖的狀態、電池狀態等資訊上傳給保全主機10,保全主機10也可對密碼鎖20進行控制。再者,保全主機10的有線通訊模組13係與管制中心主機30連接,亦即保全主機10以有線傳輸協定與管制中心主機30連接,藉以與管制中心主機30收發訊號。其中,有線通訊模組13係可為乙太網路、電話線、保全專線或其他有線傳輸等,本創作並非為限制。Referring to FIG. 1 , the security host 10 is connected to the combination lock 20 via the wireless communication module 12 , that is, the password lock 20 transmits the identity verification message and confirms the identity verification message permission information via the wireless transmission protocol to The wireless communication module 12 and the wireless communication module 12 are further transmitted to the control module 11. The wireless communication module 12 can be a wireless communication protocol such as radio frequency, wireless network, ZigBee, Zwave, Bluetooth, Near Field Communication (NFC) or the like, and the creation is not limited. Correspondingly, the combination lock 20 also has a wireless communication module (not shown) that has the same communication protocol as the wireless communication module 12 of the security host 10. Thereby, the password lock 20 can upload information such as the state of the lock and the battery state to the security host 10, and the security host 10 can also control the password lock 20. Moreover, the wired communication module 13 of the security host 10 is connected to the control center host 30, that is, the security host 10 is connected to the control center host 30 by a wired transmission protocol, thereby transmitting and receiving signals with the control center host 30. The wired communication module 13 can be an Ethernet network, a telephone line, a security line or other wired transmission, and the creation is not a limitation.
於此,保全主機10的控制模組11經由無線通訊模組12取得身分驗證訊息及確認身分驗證訊息許可的資訊後,控制模組11得將對應之門禁記錄儲存於記憶模組(圖中未示)或上傳至管制中心主機30。也就是說,保全主機10接收身分驗證訊息及確認身分驗證訊息許可的資訊後,得將其各項現場環境資訊備份,以供日後查驗之用。其中現場環境資訊如時間、地點、卡號、員工編號或其他等環境資訊,本創作並非為限制。In this case, after the control module 11 of the security host 10 obtains the identity verification message and the information for confirming the identity verification message permission via the wireless communication module 12, the control module 11 may store the corresponding access control record in the memory module (not shown) Show) or upload to the control center host 30. That is to say, after the security host 10 receives the identity verification message and confirms the information of the identity verification message permission, it may back up its various on-site environmental information for later verification. This creation is not a limitation of environmental information such as time, place, card number, employee number or other environmental information.
第3圖為本創作第二實施例之保全系統之一架構示意圖。請參閱第3圖所示,保全系統更可包含無線感知器40,與無線通訊模組12無線通訊連接。在一些實施例中,保全主機10亦可透過有線通訊方式(如RS485、RS232、USB、乙太網路等)連接有線感知器。所述有線或無線感知器可為煙霧偵測器、火災偵測器、窗戶振動偵測器、一氧化碳偵測器、二氧化碳偵測器、紅外線偵測器、影像監視器、異物偵測器、監控攝影機、窗戶開啟監控器等。FIG. 3 is a schematic structural diagram of one of the security systems of the second embodiment of the present invention. Referring to FIG. 3, the security system may further include a wireless sensor 40 connected to the wireless communication module 12 in a wireless communication manner. In some embodiments, the security host 10 can also connect to the wired sensor through wired communication methods (such as RS485, RS232, USB, Ethernet, etc.). The wired or wireless sensor can be a smoke detector, a fire detector, a window vibration detector, a carbon monoxide detector, a carbon dioxide detector, an infrared detector, an image monitor, a foreign object detector, and a monitor. Camera, window open monitor, etc.
保全主機10具有監控狀態、解除狀態及巡迴狀態等多種保全狀態。保全主機10的監控狀態係指啟用(enable)前述之感知器,以進行保全監控,以協助保全人員監控人煙稀少或不易到達的區域。反之,將感知器禁能(disable),即為解除狀態,其係為解除各種保全監控設備的監控或偵測,避免不需監控時觸發感知器而使保全主機10發出警報。至於巡迴狀態,則是保全人員巡迴各用戶檢查設備時可使用的特殊狀態。在巡迴狀態下,感知器同樣會被禁能,以避免保全人員誤觸警報,進入巡迴狀態可讓監控中心知道有保全人員在用戶端,避免保全人員監守自盜之情事發生。以下將說明前述保全狀態如何進行設定。The security host 10 has various security states such as a monitoring state, a release state, and a tour state. Preserving the monitoring status of the host 10 means enabling the aforementioned sensor for security monitoring to assist the security personnel in monitoring areas that are sparsely populated or difficult to reach. On the other hand, disabling the sensor, that is, releasing the state, is to release the monitoring or detection of various security monitoring devices, and to prevent the alarm device from being triggered when the monitoring device is triggered without monitoring. As for the tour status, it is a special state that the security personnel can use when inspecting the user to check the equipment. In the patrolling state, the sensor will also be disabled to prevent the security personnel from accidentally touching the alarm. Entering the patrol state allows the monitoring center to know that the security personnel are at the user end, and avoid the security personnel from self-stealing. The following describes how the aforementioned security state is set.
在解除狀態下的門禁開鎖, 使用者可藉由各密碼鍵21輸入對應於身分的按鍵組合(即身分驗證訊息)後,密碼鎖20對身分驗證訊息進行驗證,以確認身分驗證訊息是否為許可,並將身分驗證訊息及驗證之結果傳送至保全主機10。於此,密碼鎖20具有儲存模組(如記憶體、記憶卡等)以儲存多組許可密碼,用來與前述身分驗證訊息比對,若其中有相符的許可密碼則為驗證成功,反之則為驗證失敗。密碼鎖20還具有驗證模組(圖未示),其可以微控制器實現,用來存取儲存模組中的許可密碼並自密碼鎖20的無線通訊模組取得使用者輸入的身分驗證訊息,並執行前述比對動作。After the access control is unlocked in the released state, the user can input the key combination corresponding to the identity (ie, the identity verification message) by using the password key 21, and the password lock 20 verifies the identity verification message to confirm whether the identity verification message is a license. And transmitting the identity verification message and the verification result to the security host 10. Here, the password lock 20 has a storage module (such as a memory, a memory card, etc.) to store a plurality of sets of license passwords for comparison with the foregoing identity verification messages, and if there is a matching license password, the verification is successful, and vice versa. Failed for verification. The combination lock 20 also has a verification module (not shown), which can be implemented by the microcontroller to access the license password in the storage module and obtain the user-entered identity verification message from the wireless communication module of the password lock 20 And perform the aforementioned comparison action.
而使用者欲將保全狀態從解除狀態設定至監控狀態時,可先按下密碼鍵21中的一設定鍵21’,再輸入身分驗證訊息。如第2圖所示,密碼鎖20的該些密碼鍵21的其中之一特殊功能之設定鍵21’,但本創作非以此為限。設定鍵亦可為其他數字/字符鍵。換言之,設定鍵若選定為數字/字符鍵,則該設定鍵即具有雙重功能,除了數字/字符輸入功能外,還可作為設定鍵21’之用,例如按鍵「*」。若密碼鎖20於設定鍵21’被按壓觸發後的第一時間內接收到該身分驗證訊息(即輸入完組合輸入),則密碼鎖20輸出模式設定命令、身分驗證訊息及身分驗證之結果至保全主機10,則控制模組11響應模式設定命令切換保全狀態為監控狀態。藉此由保全主機10的控制模組11確認無誤後得將保全主機10切換為監控狀態。於此,密碼鎖20還可包含喇叭、燈號等輸出模組。如果保全狀態設定成功,則保全主機10會發送訊號來控制密碼鎖20產生提示,例如燈號亮一下、聲音叫一聲。如果因有感知器不正常造成保全狀態設定不成功, 則密碼鎖20亦會有提示,例如燈號亮三下、聲音叫三聲等。若驗證失敗,則保全主機10不理會,依密碼鎖20自行處理。When the user wants to set the security status from the released state to the monitoring state, the user can press the setting button 21' of the password button 21 to input the identity verification message. As shown in Fig. 2, one of the cryptographic keys 20 of the cipher lock 20 has a special function setting key 21', but the present invention is not limited thereto. The setting button can also be other numeric/character keys. In other words, if the setting key is selected as a numeric/character key, the setting key has a dual function, and can be used as the setting key 21' in addition to the numeric/character input function, for example, the button "*". If the password lock 20 receives the identity verification message (ie, inputs the combined input) within the first time after the setting button 21' is triggered, the password lock 20 outputs the mode setting command, the identity verification message, and the identity verification result to When the host 10 is secured, the control module 11 switches the security state to the monitoring state in response to the mode setting command. Thereby, the security host 10 can be switched to the monitoring state after the control module 11 of the security host 10 confirms that it is correct. Here, the combination lock 20 can also include an output module such as a speaker or a light. If the security status setting is successful, the security host 10 will send a signal to control the password lock 20 to generate a prompt, for example, the light is illuminated and the sound is called. If the security status setting is unsuccessful due to the abnormality of the sensor, the password lock 20 will also prompt, for example, the light is turned on three times, and the sound is called three times. If the verification fails, the security host 10 ignores it and processes it according to the password lock 20.
當使用者欲將保全主機10的保全狀態從監控狀態設定為解除狀態時,若於密碼鎖20輸入正確的身分驗證訊息時,則密碼鎖20執行解鎖動作之外,保全主機10因接收到身分驗證訊息及驗證許可的訊息,則保全主機10切換保全狀態為解除狀態。同時,保全主機10亦會下命令給密碼鎖20,使密碼鎖20輸出提示,例如燈號亮二下、聲音叫二聲。如果解除不成功,則密碼鎖20亦會有提示,例如燈號亮三下、聲音叫三聲等。若身分驗證失敗,則保全主機10不理會,依密碼鎖20自行處理。When the user wants to set the security status of the security host 10 from the monitoring state to the release state, if the password lock 20 inputs the correct identity verification message, the password lock 20 performs the unlocking operation, and the security host 10 receives the identity. The verification message and the verification permission message save the host 10 to switch the security state to the release state. At the same time, the security host 10 will also issue a command to the password lock 20, so that the password lock 20 outputs a prompt, for example, the light is turned on twice and the sound is called twice. If the unsuccessful release is successful, the password lock 20 will also be prompted, for example, the light is turned on three times, the sound is called three times, and the like. If the identity verification fails, the security host 10 ignores it and processes it according to the password lock 20.
第4圖為本創作第三實施例之保全系統之一架構示意圖。請參閱第4圖所示,密碼鎖20更包括讀卡機22,密碼鎖20經由讀卡機22讀取一卡片而取得身分驗證訊息,藉此可方便使用者或保全人員輸入身分驗證訊息,以便能快速開啟大門的門鎖,或方便設定保全狀態。換言之,前述所指身分驗證訊息可經由輸入密碼的方式或刷卡的方式輸入至密碼鎖20。FIG. 4 is a schematic structural diagram of one of the security systems of the third embodiment of the present invention. Referring to FIG. 4, the combination lock 20 further includes a card reader 22, and the password lock 20 reads a card through the card reader 22 to obtain an identity verification message, thereby facilitating the user or the security personnel to input the identity verification message. In order to quickly open the door lock of the door, or to easily set the security state. In other words, the aforementioned identity verification message can be input to the combination lock 20 by way of entering a password or by swiping the card.
當保全人員欲將保全主機由監控狀態或解除狀態改變為巡迴狀態時,可持其保全公司的員工卡對密碼鎖20刷卡,此時密碼鎖20會讀取到員工卡的卡號。由於員工卡非為正常可允許的卡,因此會驗證失敗,密碼鎖20會將驗證失敗之結果即員工卡卡號傳至保全主機10。在此之前,若監控中心預先將前往巡迴的員工之員工卡卡號(即新增密碼)經由監控中心主機30傳送至保全主機10。而保全主機10之控制模組11經由有線通訊模組13接收來自管制中心主機30的新增密碼,控制模組11於密碼鎖20的身分驗證未通過時,會進一步確認身分驗證訊息是否與新增密碼相符,若相符時,則設定為巡迴狀態。同時,保全主機10經由無線通訊模組12通知密碼鎖20執行解鎖動作,並使密碼鎖20產生提示,例如燈號亮二下、聲音叫二聲。反之,若不相符時,則保全主機10不理會,依密碼鎖20自行處理。When the security personnel wants to change the security host from the monitoring state or the release state to the tour state, the employee card of the security company can be swiped with the password lock 20, and the password lock 20 will read the card number of the employee card. Since the employee card is not a normal allowable card, the verification fails, and the password lock 20 transmits the employee card number to the security host 10 as a result of the verification failure. Prior to this, if the monitoring center pre-delivers the employee card number (ie, the newly added password) of the employee who is going to the tour to the security host 10 via the monitoring center host 30. The control module 11 of the security host 10 receives the new password from the control center host 30 via the wired communication module 13. When the identity verification of the password lock 20 is not passed, the control module 11 further confirms whether the identity verification message is new or not. The passwords are matched, and if they match, they are set to the tour state. At the same time, the security host 10 notifies the password lock 20 to perform the unlocking operation via the wireless communication module 12, and causes the password lock 20 to generate a prompt, for example, the light is turned on twice and the sound is called twice. On the other hand, if it does not match, the security host 10 ignores it and processes it according to the password lock 20.
綜上所述,當使用者位於門前時,以密碼鎖20的密碼鍵21輸入使用者才知道的輸入組合(如員工編號、員工卡號等),藉此密碼鎖20得以將輸入組合(即身分驗證訊息)進行驗證是否為密碼鎖20中所儲存的許可身分,當身分驗證許可時,則執行解鎖動作,並且將身分驗證訊息及其許可訊息傳送至保全主機10。反之,若身分驗證不許可時,控制模組11再判斷身分驗證訊息與新增密碼是否相符,當判斷為相符時,則控制模組11令密碼鎖20執行解鎖動作;若控制模組11判斷身分驗證訊息與新增密碼不相符時,則維持密碼鎖20狀態。藉此保全主機10得經由管制中心主機30下傳新增密碼,藉以供保全人員自管制中心主機30到達現場時而能臨時加入開啟門鎖的許可,方便保全系統的操控及設定。In summary, when the user is in front of the door, the input key combination (such as employee number, employee card number, etc.) that the user knows is input by the password key 21 of the combination lock 20, whereby the combination lock 20 can input the combination (ie, identity). Verification message) Whether the verification is the license identity stored in the password lock 20, when the identity verification permission is performed, the unlocking action is performed, and the identity verification message and its permission message are transmitted to the security host 10. On the other hand, if the identity verification is not permitted, the control module 11 determines whether the identity verification message matches the newly added password. When it is determined that the authentication is consistent, the control module 11 causes the password lock 20 to perform an unlocking operation; if the control module 11 determines When the identity verification message does not match the newly added password, the password lock 20 state is maintained. Therefore, the security host 10 can transmit the newly added password through the control center host 30, so that the security personnel can temporarily join the permission to open the door lock when the control center host 30 arrives at the site, thereby facilitating the operation and setting of the security system.
再者,於一些實施例中,可設定密碼鎖20的該些密碼鍵21的其中之一為反脅迫鍵(如設定按鍵「9」),若密碼鎖20於反脅迫鍵21觸發後的第二時間內接收到該身分驗證訊息,且驗證身分驗證訊息為正確時,則密碼鎖20發送反脅迫訊息以及身分驗證訊息至保全主機10,保全主機10的控制模組11根據反脅迫訊息發送一求救訊號至管制中心主機30,同時密碼鎖20執行解鎖動作。也就是說,當保全人員受到歹徒脅迫時,保全人員可透過密碼鎖20暗中先輸入按鍵9,以觸發密碼鎖20開始計算第二時間,只要保全人員於第二時間內輸入身分驗證訊息,則密碼鎖20經確認身分驗證訊息無誤後,隨即發送反脅迫訊息及身分驗證訊息至保全主機10,讓保全主機10知道有反脅迫情事,進而發送求救訊號至管制中心主機30,同時可通知密碼鎖20產生提示,例如燈號亮一下、聲音叫一聲。管制中心主機30的監控人員即可以進一步調派保全人員至現場或報警請求協助,於此同時,密碼鎖20執行解鎖命令以開啟大門的門鎖,藉以暫時欺騙歹徒所脅迫的保全人員是按照其意思行動,可暫時讓保全人員避免被危害,同時調派的保全人員或警察可迅速到達現場以提供支援。於此,設定鍵即反脅迫鍵為不同按鍵。Moreover, in some embodiments, one of the password keys 21 of the password lock 20 can be set as a reverse stress key (such as setting button "9"), and if the password lock 20 is triggered by the anti-stress button 21 After receiving the identity verification message within two time and verifying that the identity verification message is correct, the password lock 20 sends a counter-coercion message and an identity verification message to the security host 10, and the control module 11 of the security host 10 transmits a message according to the anti-coercion message. The help signal is sent to the control center host 30, and the password lock 20 performs the unlocking action. That is to say, when the security personnel are coerced by the gangsters, the security personnel can input the key 9 through the password lock 20 to trigger the password lock 20 to start calculating the second time, as long as the security personnel input the identity verification message in the second time, After confirming that the identity verification message is correct, the password lock 20 immediately sends the anti-coercive message and the identity verification message to the security host 10, so that the security host 10 knows that there is a counter-coercion, and then sends a distress signal to the control center host 30, and can notify the password lock. 20 generates a prompt, for example, the light is illuminated and the sound is called. The monitoring personnel of the control center host 30 can further dispatch the security personnel to the scene or the alarm request assistance. At the same time, the password lock 20 executes the unlocking command to open the door lock of the gate, so as to temporarily deceive the security personnel coerced by the gangster according to the meaning thereof. The action can temporarily prevent the security personnel from being harmed, and the deployed security personnel or police can quickly arrive at the scene to provide support. Here, the set button, that is, the anti-stress button is a different button.
第5圖為本創作第四實施例之保全系統之一架構示意圖。請參閱第5圖所示,保全主機10的無線通訊模組12進一步與使用者的手持電子裝置50連線,藉以使手持電子裝置50與保全主機10之間建立連線,手持電子裝置50自保全主機10取得密碼鎖20之開啟記錄或設定保全主機10為監控狀態或該解除狀態之現狀或歷程。於此,手持電子裝置50得為智慧型手機、平板電腦、筆記型電腦或PDA等手持電子裝置50。再者,於一些實施例中,保全主機10經由無線通訊模組12與電器設備60連線,藉此得經由控制模組11操控電器設備的啟閉,或透過手持電子裝置50以遠端操控電器設備60的啟閉。FIG. 5 is a schematic structural diagram of one of the security systems of the fourth embodiment of the present invention. Referring to FIG. 5, the wireless communication module 12 of the security host 10 is further connected to the handheld electronic device 50 of the user, so as to establish a connection between the handheld electronic device 50 and the security host 10, and the handheld electronic device 50 The security host 10 obtains the open record of the password lock 20 or sets the status or history of the security host 10 as the monitoring state or the released state. Here, the handheld electronic device 50 can be a handheld electronic device 50 such as a smart phone, a tablet computer, a notebook computer or a PDA. Moreover, in some embodiments, the security host 10 is connected to the electrical device 60 via the wireless communication module 12, thereby controlling the opening and closing of the electrical device via the control module 11 or remotely controlling through the handheld electronic device 50. The opening and closing of the electrical device 60.
第6圖為本創作第五實施例之保全系統之一架構示意圖。請參閱第6圖所示,管制中心主機30經由網際網路與手持電子裝置50連線,手持電子裝置50經由管制中心主機30自保全主機10取得密碼鎖20之開啟記錄或設定保全主機10為監控狀態或該解除狀態現狀或歷程。再者,於一些實施例中,手持電子裝置50以遠端操控電器設備60的啟閉。FIG. 6 is a schematic structural diagram of one of the security systems of the fifth embodiment of the present invention. Referring to FIG. 6 , the control center host 30 is connected to the handheld electronic device 50 via the Internet. The handheld electronic device 50 obtains the open record of the password lock 20 from the security host 10 via the control center host 30 or sets the security host 10 as Monitor the status or the status or history of the release status. Moreover, in some embodiments, the handheld electronic device 50 remotely controls the opening and closing of the electrical device 60.
於一實施例中,密碼鎖20除可接受密碼輸入、門禁刷卡之輸入方式外,使用者也可利用具近場通訊之手持電子裝置來感應讀卡。In an embodiment, in addition to accepting the password input and the access mode of the access control card, the user can also use the handheld electronic device with near field communication to sense the card reading.
藉由上述結構所構成的保全系統,經由密碼鎖20輸入身分驗證訊息並且驗證確認無誤之後,即可執行解鎖動作,以開啟大門供使用者進出;透過輸入設定鍵及正確的身分驗證訊息,即可令保全主機10進入監控狀態;保全主機10於監控狀態時,只要輸入正確的身分驗證訊息後,即可令保全主機10切換為解除狀態。當保全人員巡迴時,也不需額外攜帶各個巡迴用戶的卡片,可直接利用其員工卡進行設定。此外,因密碼鎖20之儲存密碼組數有限,新增密碼由保全主機10來驗證,可進行有效擴充。而透過密碼鎖20之按鍵還可提供不同模式(如反脅迫),可省去傳統的設定機,便於使用者使用,更能減少保全主機10裝設於牆壁面的機盒,節省成本之外,亦可以保持壁面的美感。With the security system formed by the above structure, after inputting the identity verification message via the password lock 20 and verifying that the verification is correct, the unlocking action can be performed to open the door for the user to enter and exit; through the input setting button and the correct identity verification message, The security host 10 can be brought into the monitoring state; when the host 10 is in the monitoring state, the security host 10 can be switched to the released state by inputting the correct identity verification message. When the security personnel tour, there is no need to carry additional cards of each tour user, and the employee card can be directly used for setting. In addition, since the number of stored password groups of the password lock 20 is limited, the newly added password is verified by the security host 10, and can be effectively expanded. The keys of the password lock 20 can also provide different modes (such as anti-coercion), which can save the traditional setting machine and be convenient for the user to use, and can further reduce the security of the main machine 10 installed on the wall surface, saving costs. It can also maintain the beauty of the wall.
10‧‧‧保全主機
11‧‧‧控制模組
12‧‧‧無線通訊模組
13‧‧‧有線通訊模組
20‧‧‧密碼鎖
21、21’‧‧‧密碼鍵
22‧‧‧讀卡機
30‧‧‧管制中心主機
40‧‧‧無線感知器
50‧‧‧手持電子裝置
60‧‧‧電器設備10‧‧‧Security host
11‧‧‧Control module
12‧‧‧Wireless communication module
13‧‧‧Wired communication module
20‧‧‧ password lock
21, 21'‧‧‧ password key
22‧‧‧ card reader
30‧‧‧Control Center Host
40‧‧‧Wireless Sensor
50‧‧‧Handheld electronic devices
60‧‧‧Electrical equipment
[第1圖]係本創作第一實施例之保全系統的一架構示意圖。 [第2圖]係本創作第一實施例之密碼鎖的一外觀示意圖。 [第3圖]係本創作第二實施例之保全系統之一架構示意圖 。 [第4圖]係本創作第三實施例之保全系統的一架構示意圖。 [第5圖]係本創作第四實施例之保全系統之一架構示意圖。 [第6圖]係本創作第五實施例之保全系統之一架構示意圖。[Fig. 1] is a schematic diagram of an architecture of the security system of the first embodiment of the present invention. [Fig. 2] is a schematic view showing the appearance of the combination lock of the first embodiment of the present invention. [Fig. 3] is a schematic diagram of one of the security systems of the second embodiment of the present invention. [Fig. 4] is a schematic diagram of an architecture of the security system of the third embodiment of the present invention. [Fig. 5] is a schematic diagram showing one of the architectures of the security system of the fourth embodiment of the present invention. [Fig. 6] is a schematic diagram showing one of the architectures of the security system of the fifth embodiment of the present invention.
10‧‧‧保全主機10‧‧‧Security host
11‧‧‧控制模組11‧‧‧Control module
12‧‧‧無線通訊模組12‧‧‧Wireless communication module
13‧‧‧有線通訊模組13‧‧‧Wired communication module
20‧‧‧密碼鎖20‧‧‧ password lock
21‧‧‧密碼鍵21‧‧‧ password key
30‧‧‧管制中心主機30‧‧‧Control Center Host
Claims (10)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103210495U TWM491703U (en) | 2014-06-13 | 2014-06-13 | Security system |
KR2020150000978U KR20150004569U (en) | 2014-06-13 | 2015-02-11 | Security System |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103210495U TWM491703U (en) | 2014-06-13 | 2014-06-13 | Security system |
Publications (1)
Publication Number | Publication Date |
---|---|
TWM491703U true TWM491703U (en) | 2014-12-11 |
Family
ID=52576707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW103210495U TWM491703U (en) | 2014-06-13 | 2014-06-13 | Security system |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20150004569U (en) |
TW (1) | TWM491703U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI706267B (en) * | 2015-02-04 | 2020-10-01 | 美商艾瑞迪爾通信有限公司 | Keyless access control with neuro and neuro-mechanical fingerprints |
TWI807238B (en) * | 2020-12-25 | 2023-07-01 | 中興保全科技股份有限公司 | Access control system |
-
2014
- 2014-06-13 TW TW103210495U patent/TWM491703U/en not_active IP Right Cessation
-
2015
- 2015-02-11 KR KR2020150000978U patent/KR20150004569U/en not_active Application Discontinuation
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI706267B (en) * | 2015-02-04 | 2020-10-01 | 美商艾瑞迪爾通信有限公司 | Keyless access control with neuro and neuro-mechanical fingerprints |
TWI755093B (en) * | 2015-02-04 | 2022-02-11 | 美商艾瑞迪爾通信有限公司 | Keyless access control with neuro and neuro-mechanical fingerprints |
TWI807238B (en) * | 2020-12-25 | 2023-07-01 | 中興保全科技股份有限公司 | Access control system |
Also Published As
Publication number | Publication date |
---|---|
KR20150004569U (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI492191B (en) | Security System | |
JP2019505058A (en) | System and method for controlling access to physical space | |
KR102154405B1 (en) | Smart door lock | |
KR102261462B1 (en) | Security enhanced door lock and door security management system using that | |
KR101954449B1 (en) | Smart door lock and its operating method | |
KR20140117264A (en) | Entry management aparatus and method for controlling access using digital door lock and wireless telecommunication terminal | |
CN106150271A (en) | A kind of anti-theft device, system and safety cabinet | |
KR101025830B1 (en) | A crime prevention system using recognition of a fingerprint | |
TWM491703U (en) | Security system | |
CN109636957A (en) | Anti-theft safety door intelligence control system | |
TWM504297U (en) | Multi-functional entry system | |
CN106327732A (en) | Antitheft system with deterrent function | |
KR101055269B1 (en) | Smart door lock system using smart key | |
JP2012237102A (en) | Ic tag and entry/exiting management system | |
JP2007191915A (en) | Electronic lock system and program therefor | |
TW201704610A (en) | Intelligent entrance control device | |
KR100890283B1 (en) | A Digital Door Lock and Station Control Unit of Using Wireless and Method Thereof | |
KR20170073109A (en) | Doorlock System Using Mobile Communication Terminal | |
TW201800652A (en) | Door access control system with automatic unlocking function and unlocking method thereof that comprises a door lock controller and an electronic device carried by a user such that when the electronic device is approaching the door lock controller, the door lock controller, upon identifying the user, automatically unlock the door lock | |
KR102239276B1 (en) | Security enhanced door lock and door security management system using that | |
KR101505880B1 (en) | Door Rock Control System in Home Network | |
KR20100032609A (en) | Digital door lock having self-security function and digital door lock system having the same | |
JP2009035866A (en) | Electric locking-unlocking system | |
CN206431714U (en) | A kind of telephone encryption anti-theft door system of belt switch monitoring | |
CN106327764A (en) | Anti-theft system having acousto-optic alarm device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4K | Annulment or lapse of a utility model due to non-payment of fees |