Nothing Special   »   [go: up one dir, main page]

TWM491703U - Security system - Google Patents

Security system Download PDF

Info

Publication number
TWM491703U
TWM491703U TW103210495U TW103210495U TWM491703U TW M491703 U TWM491703 U TW M491703U TW 103210495 U TW103210495 U TW 103210495U TW 103210495 U TW103210495 U TW 103210495U TW M491703 U TWM491703 U TW M491703U
Authority
TW
Taiwan
Prior art keywords
security
host
password
state
identity verification
Prior art date
Application number
TW103210495U
Other languages
Chinese (zh)
Inventor
Chun-Yuan Chang
Rong-Guey Lee
yun-fu Yang
Chung-Yu Wang
jing-wen Shi
Original Assignee
Taiwan Secom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiwan Secom Co Ltd filed Critical Taiwan Secom Co Ltd
Priority to TW103210495U priority Critical patent/TWM491703U/en
Publication of TWM491703U publication Critical patent/TWM491703U/en
Priority to KR2020150000978U priority patent/KR20150004569U/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

A security system includes a combinational lock and a security host. The security host has a security state which includes a monitor state and a release state. The security host includes a wireless communication module and a control module. The combinational lock includes a plurality of security buttons. The combinational lock receives a personal identification signal in response to inputting password by the security buttons or reading an entrance-guard card. The combinational lock executes an identification verification and do an unlock action when the identification verification is passed. The wireless communication module connects to the combinational lock for receiving the personal identification signal and the result of the identification verification. The control module connects to the wireless communication module and changes the security state to the release state when passing the identification verification is passed with the security state being the monitor state. By one step, the security system changes the state of the security host to the release state and unlocks the door.

Description

具有密碼鎖的保全系統Security system with password lock

本創作係提供一種保全系統,尤指一種具有密碼鎖的保全系統。This creation provides a security system, especially a security system with a password lock.

坊間多數社區、辦公大樓及營業場所為了要保障其內部人員及財產的安全,多半會設置保全系統以及保全人員,藉以透過保全系統的偵測以及保全人員的監控,以保障社區、辦公大樓或營業場所的安危,以免宵小或強盜入侵等不法情形發生。In order to protect the safety of its internal staff and property, most communities, office buildings and business premises in the community will set up security systems and security personnel to protect the community, office buildings or business through the detection of security systems and the monitoring of security personnel. The safety of the place, so as not to cause small or robbery invasions and other illegal circumstances.

一般最常見的就是密碼鎖,其係與門鎖連動,一般門禁系統內存有允許進出的卡號、密碼等,因此當人員透過不被允許的卡號之感應卡或刷卡、或輸入錯誤密碼時,門禁系統會維持大門閉鎖,以避免此不被允許的人員進出大門;反之,若持有允許的卡號或輸入正確的密碼,則門禁系統會解除大門的閉鎖。Generally, the most common one is the password lock, which is linked with the door lock. Generally, the access control system has the card number and password that are allowed to enter and exit. Therefore, when the person passes the sensor card of the card number that is not allowed, or swipes the card, or enters the wrong password, the access control The system will maintain the door lock to prevent the unauthorised personnel from entering and exiting the gate; conversely, if the card number is allowed or the correct password is entered, the access control system will unlock the door.

再者,門禁系統另外會與保全系統連結,也就是說,於下班時間、夜深人靜時,透過設定保全系統後,即可啟動監控設備,以協助保全人員監控鮮少或無法到達的區域,以避免宵小由此進出。In addition, the access control system will be connected to the security system. In other words, during the off-hours and in the dead of night, after the security system is set up, the monitoring equipment can be activated to help the security personnel monitor the rarely or unreachable areas to avoid Xiao Jin came in and out.

因此,坊間門禁系統與設定保全系統多係分開設置,也就是說,通常於門邊的牆壁上設置門禁系統,藉以管控大門的進出,且保全系統會設置鄰近於門禁系統,藉以供最後離開的或第一個到達的使用者透過保全系統進行設定或解除,如解除保全系統後,欲進入大門時,再以開門禁系統解開大門的門鎖,方能進入大門,實為不便,且牆壁表面因設置設置門禁系統及保全系統等多個機盒,耗費成本過多且其構成不具有美感。因此,鑑於上述問題,實有必要提出有效的解決方案。Therefore, the access control system and the maintenance system are set separately. That is to say, the access control system is usually installed on the wall of the door to control the entrance and exit of the gate, and the security system is set adjacent to the access control system for the last departure. Or the first arriving user can be set or released through the security system. If the security system is to be unlocked, when the door is to be opened, the door lock of the door can be unlocked by opening the access control system, so that the door can be accessed, which is inconvenient and the wall The surface is provided with a plurality of boxes such as an access control system and a security system, which are costly and not aesthetically pleasing. Therefore, in view of the above problems, it is necessary to propose an effective solution.

鑑於上述問題,本創作係提供一種具有密碼鎖的保全系統,藉以整合密碼鎖及保全系統,以供保全人員方便使用。In view of the above problems, the present invention provides a security system with a password lock to integrate the password lock and security system for the convenience of the security personnel.

本創作一實施例提供一種保全系統,其包含:密碼鎖及保全主機。保全主機具有一保全狀態,保全狀態包括一監控狀態及一解除狀態,保全主機包含:無線通訊模組及控制模組。密碼鎖具有複數密碼鍵,密碼鎖響應複數密碼鍵之輸入而接收身分驗證訊息,且根據身分驗證訊息進行一身分驗證以於通過驗證時執行一解鎖動作。無線通訊模組連線密碼鎖,以接收該身分驗證訊息及該身分驗證之結果。控制模組電連接無線通訊模組,於身分驗證之結果為通過且保全狀態為監控狀態時,控制模組設定保全狀態為一解除狀態。An embodiment of the present invention provides a security system including: a password lock and a security host. The security host has a security state, the security state includes a monitoring state and a release state, and the security host includes: a wireless communication module and a control module. The password lock has a plurality of password keys, and the password lock receives the identity verification message in response to the input of the plurality of password keys, and performs an identity verification according to the identity verification message to perform an unlocking action when the verification is performed. The wireless communication module connects the password lock to receive the identity verification message and the result of the identity verification. The control module is electrically connected to the wireless communication module. When the result of the identity verification is passed and the security state is the monitoring state, the control module sets the security state to a release state.

藉此透過密碼鎖取得身分驗證訊息並且經過身分驗證通過後,而進一步執行解鎖動作同時將保全狀態由監控狀態設定為解除狀態,藉此可省略傳統的設定機,並且簡化傳統需先解除保全設定再解除門禁之流程。In this way, the identity verification message is obtained through the password lock and after the identity verification is passed, the unlocking action is further performed and the security state is set to the release state from the monitoring state, thereby omitting the conventional setting machine and simplifying the traditional need to first cancel the security setting. Then release the process of access control.

第1圖為本創作第一實施例之保全系統的一架構示意圖。請參閱第1圖所示,保全系統包含:管制中心主機30、密碼鎖20及保全主機10。保全主機10與密碼鎖20及管制中心主機30連接。保全主機10包含:無線通訊模組12、有線通訊模組13及控制模組11,控制模組11分別與無線通訊模組12及有線通訊模組13連接。FIG. 1 is a schematic diagram of an architecture of a security system according to a first embodiment of the present invention. Referring to FIG. 1 , the security system includes: a control center host 30, a password lock 20, and a security host 10. The security host 10 is connected to the combination lock 20 and the control center host 30. The security host 10 includes a wireless communication module 12, a wired communication module 13, and a control module 11, and the control module 11 is connected to the wireless communication module 12 and the wired communication module 13, respectively.

第2圖為本創作第一實施例之密碼鎖20的一外觀示意圖。請參閱第1-2圖所示,密碼鎖20具有複數密碼鍵21,且各密碼鍵21分別代表一輸入訊號,如第2圖左上方即為表示「1」的輸入訊號,本創作並非以此為限制,再者,輸入訊號並非一定要為數字組合,亦可為英文字母或其他符號替代。藉由一個或多個輸入訊號可構成一身分驗證訊息(即密碼)。密碼鎖20得設置於大門的門邊,藉以控制對應於大門的門鎖之啟閉,另於一些實施例中,密碼鎖20亦可設置於電梯內,以開啟或關閉電梯的樓層按鍵之輸入許可,本創作並非為限制。FIG. 2 is a schematic diagram showing the appearance of the combination lock 20 of the first embodiment of the present invention. Referring to FIG. 1-2, the combination lock 20 has a plurality of password keys 21, and each of the password keys 21 represents an input signal. The upper left side of FIG. 2 is an input signal indicating "1". This is a limitation. Furthermore, the input signal does not have to be a combination of numbers, and may be replaced by an English letter or other symbols. An identity verification message (ie, a password) can be formed by one or more input signals. The combination lock 20 is disposed at the door of the door to control the opening and closing of the door lock corresponding to the door. In some embodiments, the code lock 20 can also be disposed in the elevator to open or close the input of the floor button of the elevator. Licensing, this creation is not a limitation.

請參閱第1圖所示,保全主機10係透過無線通訊模組12與密碼鎖20連接,也就是說,密碼鎖20係經由無線傳輸協定以傳送身分驗證訊息及確認身分驗證訊息許可的資訊至無線通訊模組12,無線通訊模組12再轉傳送至控制模組11。其中,無線通訊模組12係可為射頻 ﹑無線網路、ZigBee﹑Zwave﹑藍牙、近場通訊(NFC)或其他等無線之通訊協定,本創作並非為限制。相應的,密碼鎖20也具有與保全主機10之無線通訊模組12相同通訊協定之無線通訊模組(圖未示)。藉此,密碼鎖20可將鎖的狀態、電池狀態等資訊上傳給保全主機10,保全主機10也可對密碼鎖20進行控制。再者,保全主機10的有線通訊模組13係與管制中心主機30連接,亦即保全主機10以有線傳輸協定與管制中心主機30連接,藉以與管制中心主機30收發訊號。其中,有線通訊模組13係可為乙太網路、電話線、保全專線或其他有線傳輸等,本創作並非為限制。Referring to FIG. 1 , the security host 10 is connected to the combination lock 20 via the wireless communication module 12 , that is, the password lock 20 transmits the identity verification message and confirms the identity verification message permission information via the wireless transmission protocol to The wireless communication module 12 and the wireless communication module 12 are further transmitted to the control module 11. The wireless communication module 12 can be a wireless communication protocol such as radio frequency, wireless network, ZigBee, Zwave, Bluetooth, Near Field Communication (NFC) or the like, and the creation is not limited. Correspondingly, the combination lock 20 also has a wireless communication module (not shown) that has the same communication protocol as the wireless communication module 12 of the security host 10. Thereby, the password lock 20 can upload information such as the state of the lock and the battery state to the security host 10, and the security host 10 can also control the password lock 20. Moreover, the wired communication module 13 of the security host 10 is connected to the control center host 30, that is, the security host 10 is connected to the control center host 30 by a wired transmission protocol, thereby transmitting and receiving signals with the control center host 30. The wired communication module 13 can be an Ethernet network, a telephone line, a security line or other wired transmission, and the creation is not a limitation.

於此,保全主機10的控制模組11經由無線通訊模組12取得身分驗證訊息及確認身分驗證訊息許可的資訊後,控制模組11得將對應之門禁記錄儲存於記憶模組(圖中未示)或上傳至管制中心主機30。也就是說,保全主機10接收身分驗證訊息及確認身分驗證訊息許可的資訊後,得將其各項現場環境資訊備份,以供日後查驗之用。其中現場環境資訊如時間、地點、卡號、員工編號或其他等環境資訊,本創作並非為限制。In this case, after the control module 11 of the security host 10 obtains the identity verification message and the information for confirming the identity verification message permission via the wireless communication module 12, the control module 11 may store the corresponding access control record in the memory module (not shown) Show) or upload to the control center host 30. That is to say, after the security host 10 receives the identity verification message and confirms the information of the identity verification message permission, it may back up its various on-site environmental information for later verification. This creation is not a limitation of environmental information such as time, place, card number, employee number or other environmental information.

第3圖為本創作第二實施例之保全系統之一架構示意圖。請參閱第3圖所示,保全系統更可包含無線感知器40,與無線通訊模組12無線通訊連接。在一些實施例中,保全主機10亦可透過有線通訊方式(如RS485、RS232、USB、乙太網路等)連接有線感知器。所述有線或無線感知器可為煙霧偵測器、火災偵測器、窗戶振動偵測器、一氧化碳偵測器、二氧化碳偵測器、紅外線偵測器、影像監視器、異物偵測器、監控攝影機、窗戶開啟監控器等。FIG. 3 is a schematic structural diagram of one of the security systems of the second embodiment of the present invention. Referring to FIG. 3, the security system may further include a wireless sensor 40 connected to the wireless communication module 12 in a wireless communication manner. In some embodiments, the security host 10 can also connect to the wired sensor through wired communication methods (such as RS485, RS232, USB, Ethernet, etc.). The wired or wireless sensor can be a smoke detector, a fire detector, a window vibration detector, a carbon monoxide detector, a carbon dioxide detector, an infrared detector, an image monitor, a foreign object detector, and a monitor. Camera, window open monitor, etc.

保全主機10具有監控狀態、解除狀態及巡迴狀態等多種保全狀態。保全主機10的監控狀態係指啟用(enable)前述之感知器,以進行保全監控,以協助保全人員監控人煙稀少或不易到達的區域。反之,將感知器禁能(disable),即為解除狀態,其係為解除各種保全監控設備的監控或偵測,避免不需監控時觸發感知器而使保全主機10發出警報。至於巡迴狀態,則是保全人員巡迴各用戶檢查設備時可使用的特殊狀態。在巡迴狀態下,感知器同樣會被禁能,以避免保全人員誤觸警報,進入巡迴狀態可讓監控中心知道有保全人員在用戶端,避免保全人員監守自盜之情事發生。以下將說明前述保全狀態如何進行設定。The security host 10 has various security states such as a monitoring state, a release state, and a tour state. Preserving the monitoring status of the host 10 means enabling the aforementioned sensor for security monitoring to assist the security personnel in monitoring areas that are sparsely populated or difficult to reach. On the other hand, disabling the sensor, that is, releasing the state, is to release the monitoring or detection of various security monitoring devices, and to prevent the alarm device from being triggered when the monitoring device is triggered without monitoring. As for the tour status, it is a special state that the security personnel can use when inspecting the user to check the equipment. In the patrolling state, the sensor will also be disabled to prevent the security personnel from accidentally touching the alarm. Entering the patrol state allows the monitoring center to know that the security personnel are at the user end, and avoid the security personnel from self-stealing. The following describes how the aforementioned security state is set.

在解除狀態下的門禁開鎖, 使用者可藉由各密碼鍵21輸入對應於身分的按鍵組合(即身分驗證訊息)後,密碼鎖20對身分驗證訊息進行驗證,以確認身分驗證訊息是否為許可,並將身分驗證訊息及驗證之結果傳送至保全主機10。於此,密碼鎖20具有儲存模組(如記憶體、記憶卡等)以儲存多組許可密碼,用來與前述身分驗證訊息比對,若其中有相符的許可密碼則為驗證成功,反之則為驗證失敗。密碼鎖20還具有驗證模組(圖未示),其可以微控制器實現,用來存取儲存模組中的許可密碼並自密碼鎖20的無線通訊模組取得使用者輸入的身分驗證訊息,並執行前述比對動作。After the access control is unlocked in the released state, the user can input the key combination corresponding to the identity (ie, the identity verification message) by using the password key 21, and the password lock 20 verifies the identity verification message to confirm whether the identity verification message is a license. And transmitting the identity verification message and the verification result to the security host 10. Here, the password lock 20 has a storage module (such as a memory, a memory card, etc.) to store a plurality of sets of license passwords for comparison with the foregoing identity verification messages, and if there is a matching license password, the verification is successful, and vice versa. Failed for verification. The combination lock 20 also has a verification module (not shown), which can be implemented by the microcontroller to access the license password in the storage module and obtain the user-entered identity verification message from the wireless communication module of the password lock 20 And perform the aforementioned comparison action.

而使用者欲將保全狀態從解除狀態設定至監控狀態時,可先按下密碼鍵21中的一設定鍵21’,再輸入身分驗證訊息。如第2圖所示,密碼鎖20的該些密碼鍵21的其中之一特殊功能之設定鍵21’,但本創作非以此為限。設定鍵亦可為其他數字/字符鍵。換言之,設定鍵若選定為數字/字符鍵,則該設定鍵即具有雙重功能,除了數字/字符輸入功能外,還可作為設定鍵21’之用,例如按鍵「*」。若密碼鎖20於設定鍵21’被按壓觸發後的第一時間內接收到該身分驗證訊息(即輸入完組合輸入),則密碼鎖20輸出模式設定命令、身分驗證訊息及身分驗證之結果至保全主機10,則控制模組11響應模式設定命令切換保全狀態為監控狀態。藉此由保全主機10的控制模組11確認無誤後得將保全主機10切換為監控狀態。於此,密碼鎖20還可包含喇叭、燈號等輸出模組。如果保全狀態設定成功,則保全主機10會發送訊號來控制密碼鎖20產生提示,例如燈號亮一下、聲音叫一聲。如果因有感知器不正常造成保全狀態設定不成功, 則密碼鎖20亦會有提示,例如燈號亮三下、聲音叫三聲等。若驗證失敗,則保全主機10不理會,依密碼鎖20自行處理。When the user wants to set the security status from the released state to the monitoring state, the user can press the setting button 21' of the password button 21 to input the identity verification message. As shown in Fig. 2, one of the cryptographic keys 20 of the cipher lock 20 has a special function setting key 21', but the present invention is not limited thereto. The setting button can also be other numeric/character keys. In other words, if the setting key is selected as a numeric/character key, the setting key has a dual function, and can be used as the setting key 21' in addition to the numeric/character input function, for example, the button "*". If the password lock 20 receives the identity verification message (ie, inputs the combined input) within the first time after the setting button 21' is triggered, the password lock 20 outputs the mode setting command, the identity verification message, and the identity verification result to When the host 10 is secured, the control module 11 switches the security state to the monitoring state in response to the mode setting command. Thereby, the security host 10 can be switched to the monitoring state after the control module 11 of the security host 10 confirms that it is correct. Here, the combination lock 20 can also include an output module such as a speaker or a light. If the security status setting is successful, the security host 10 will send a signal to control the password lock 20 to generate a prompt, for example, the light is illuminated and the sound is called. If the security status setting is unsuccessful due to the abnormality of the sensor, the password lock 20 will also prompt, for example, the light is turned on three times, and the sound is called three times. If the verification fails, the security host 10 ignores it and processes it according to the password lock 20.

當使用者欲將保全主機10的保全狀態從監控狀態設定為解除狀態時,若於密碼鎖20輸入正確的身分驗證訊息時,則密碼鎖20執行解鎖動作之外,保全主機10因接收到身分驗證訊息及驗證許可的訊息,則保全主機10切換保全狀態為解除狀態。同時,保全主機10亦會下命令給密碼鎖20,使密碼鎖20輸出提示,例如燈號亮二下、聲音叫二聲。如果解除不成功,則密碼鎖20亦會有提示,例如燈號亮三下、聲音叫三聲等。若身分驗證失敗,則保全主機10不理會,依密碼鎖20自行處理。When the user wants to set the security status of the security host 10 from the monitoring state to the release state, if the password lock 20 inputs the correct identity verification message, the password lock 20 performs the unlocking operation, and the security host 10 receives the identity. The verification message and the verification permission message save the host 10 to switch the security state to the release state. At the same time, the security host 10 will also issue a command to the password lock 20, so that the password lock 20 outputs a prompt, for example, the light is turned on twice and the sound is called twice. If the unsuccessful release is successful, the password lock 20 will also be prompted, for example, the light is turned on three times, the sound is called three times, and the like. If the identity verification fails, the security host 10 ignores it and processes it according to the password lock 20.

第4圖為本創作第三實施例之保全系統之一架構示意圖。請參閱第4圖所示,密碼鎖20更包括讀卡機22,密碼鎖20經由讀卡機22讀取一卡片而取得身分驗證訊息,藉此可方便使用者或保全人員輸入身分驗證訊息,以便能快速開啟大門的門鎖,或方便設定保全狀態。換言之,前述所指身分驗證訊息可經由輸入密碼的方式或刷卡的方式輸入至密碼鎖20。FIG. 4 is a schematic structural diagram of one of the security systems of the third embodiment of the present invention. Referring to FIG. 4, the combination lock 20 further includes a card reader 22, and the password lock 20 reads a card through the card reader 22 to obtain an identity verification message, thereby facilitating the user or the security personnel to input the identity verification message. In order to quickly open the door lock of the door, or to easily set the security state. In other words, the aforementioned identity verification message can be input to the combination lock 20 by way of entering a password or by swiping the card.

當保全人員欲將保全主機由監控狀態或解除狀態改變為巡迴狀態時,可持其保全公司的員工卡對密碼鎖20刷卡,此時密碼鎖20會讀取到員工卡的卡號。由於員工卡非為正常可允許的卡,因此會驗證失敗,密碼鎖20會將驗證失敗之結果即員工卡卡號傳至保全主機10。在此之前,若監控中心預先將前往巡迴的員工之員工卡卡號(即新增密碼)經由監控中心主機30傳送至保全主機10。而保全主機10之控制模組11經由有線通訊模組13接收來自管制中心主機30的新增密碼,控制模組11於密碼鎖20的身分驗證未通過時,會進一步確認身分驗證訊息是否與新增密碼相符,若相符時,則設定為巡迴狀態。同時,保全主機10經由無線通訊模組12通知密碼鎖20執行解鎖動作,並使密碼鎖20產生提示,例如燈號亮二下、聲音叫二聲。反之,若不相符時,則保全主機10不理會,依密碼鎖20自行處理。When the security personnel wants to change the security host from the monitoring state or the release state to the tour state, the employee card of the security company can be swiped with the password lock 20, and the password lock 20 will read the card number of the employee card. Since the employee card is not a normal allowable card, the verification fails, and the password lock 20 transmits the employee card number to the security host 10 as a result of the verification failure. Prior to this, if the monitoring center pre-delivers the employee card number (ie, the newly added password) of the employee who is going to the tour to the security host 10 via the monitoring center host 30. The control module 11 of the security host 10 receives the new password from the control center host 30 via the wired communication module 13. When the identity verification of the password lock 20 is not passed, the control module 11 further confirms whether the identity verification message is new or not. The passwords are matched, and if they match, they are set to the tour state. At the same time, the security host 10 notifies the password lock 20 to perform the unlocking operation via the wireless communication module 12, and causes the password lock 20 to generate a prompt, for example, the light is turned on twice and the sound is called twice. On the other hand, if it does not match, the security host 10 ignores it and processes it according to the password lock 20.

綜上所述,當使用者位於門前時,以密碼鎖20的密碼鍵21輸入使用者才知道的輸入組合(如員工編號、員工卡號等),藉此密碼鎖20得以將輸入組合(即身分驗證訊息)進行驗證是否為密碼鎖20中所儲存的許可身分,當身分驗證許可時,則執行解鎖動作,並且將身分驗證訊息及其許可訊息傳送至保全主機10。反之,若身分驗證不許可時,控制模組11再判斷身分驗證訊息與新增密碼是否相符,當判斷為相符時,則控制模組11令密碼鎖20執行解鎖動作;若控制模組11判斷身分驗證訊息與新增密碼不相符時,則維持密碼鎖20狀態。藉此保全主機10得經由管制中心主機30下傳新增密碼,藉以供保全人員自管制中心主機30到達現場時而能臨時加入開啟門鎖的許可,方便保全系統的操控及設定。In summary, when the user is in front of the door, the input key combination (such as employee number, employee card number, etc.) that the user knows is input by the password key 21 of the combination lock 20, whereby the combination lock 20 can input the combination (ie, identity). Verification message) Whether the verification is the license identity stored in the password lock 20, when the identity verification permission is performed, the unlocking action is performed, and the identity verification message and its permission message are transmitted to the security host 10. On the other hand, if the identity verification is not permitted, the control module 11 determines whether the identity verification message matches the newly added password. When it is determined that the authentication is consistent, the control module 11 causes the password lock 20 to perform an unlocking operation; if the control module 11 determines When the identity verification message does not match the newly added password, the password lock 20 state is maintained. Therefore, the security host 10 can transmit the newly added password through the control center host 30, so that the security personnel can temporarily join the permission to open the door lock when the control center host 30 arrives at the site, thereby facilitating the operation and setting of the security system.

再者,於一些實施例中,可設定密碼鎖20的該些密碼鍵21的其中之一為反脅迫鍵(如設定按鍵「9」),若密碼鎖20於反脅迫鍵21觸發後的第二時間內接收到該身分驗證訊息,且驗證身分驗證訊息為正確時,則密碼鎖20發送反脅迫訊息以及身分驗證訊息至保全主機10,保全主機10的控制模組11根據反脅迫訊息發送一求救訊號至管制中心主機30,同時密碼鎖20執行解鎖動作。也就是說,當保全人員受到歹徒脅迫時,保全人員可透過密碼鎖20暗中先輸入按鍵9,以觸發密碼鎖20開始計算第二時間,只要保全人員於第二時間內輸入身分驗證訊息,則密碼鎖20經確認身分驗證訊息無誤後,隨即發送反脅迫訊息及身分驗證訊息至保全主機10,讓保全主機10知道有反脅迫情事,進而發送求救訊號至管制中心主機30,同時可通知密碼鎖20產生提示,例如燈號亮一下、聲音叫一聲。管制中心主機30的監控人員即可以進一步調派保全人員至現場或報警請求協助,於此同時,密碼鎖20執行解鎖命令以開啟大門的門鎖,藉以暫時欺騙歹徒所脅迫的保全人員是按照其意思行動,可暫時讓保全人員避免被危害,同時調派的保全人員或警察可迅速到達現場以提供支援。於此,設定鍵即反脅迫鍵為不同按鍵。Moreover, in some embodiments, one of the password keys 21 of the password lock 20 can be set as a reverse stress key (such as setting button "9"), and if the password lock 20 is triggered by the anti-stress button 21 After receiving the identity verification message within two time and verifying that the identity verification message is correct, the password lock 20 sends a counter-coercion message and an identity verification message to the security host 10, and the control module 11 of the security host 10 transmits a message according to the anti-coercion message. The help signal is sent to the control center host 30, and the password lock 20 performs the unlocking action. That is to say, when the security personnel are coerced by the gangsters, the security personnel can input the key 9 through the password lock 20 to trigger the password lock 20 to start calculating the second time, as long as the security personnel input the identity verification message in the second time, After confirming that the identity verification message is correct, the password lock 20 immediately sends the anti-coercive message and the identity verification message to the security host 10, so that the security host 10 knows that there is a counter-coercion, and then sends a distress signal to the control center host 30, and can notify the password lock. 20 generates a prompt, for example, the light is illuminated and the sound is called. The monitoring personnel of the control center host 30 can further dispatch the security personnel to the scene or the alarm request assistance. At the same time, the password lock 20 executes the unlocking command to open the door lock of the gate, so as to temporarily deceive the security personnel coerced by the gangster according to the meaning thereof. The action can temporarily prevent the security personnel from being harmed, and the deployed security personnel or police can quickly arrive at the scene to provide support. Here, the set button, that is, the anti-stress button is a different button.

第5圖為本創作第四實施例之保全系統之一架構示意圖。請參閱第5圖所示,保全主機10的無線通訊模組12進一步與使用者的手持電子裝置50連線,藉以使手持電子裝置50與保全主機10之間建立連線,手持電子裝置50自保全主機10取得密碼鎖20之開啟記錄或設定保全主機10為監控狀態或該解除狀態之現狀或歷程。於此,手持電子裝置50得為智慧型手機、平板電腦、筆記型電腦或PDA等手持電子裝置50。再者,於一些實施例中,保全主機10經由無線通訊模組12與電器設備60連線,藉此得經由控制模組11操控電器設備的啟閉,或透過手持電子裝置50以遠端操控電器設備60的啟閉。FIG. 5 is a schematic structural diagram of one of the security systems of the fourth embodiment of the present invention. Referring to FIG. 5, the wireless communication module 12 of the security host 10 is further connected to the handheld electronic device 50 of the user, so as to establish a connection between the handheld electronic device 50 and the security host 10, and the handheld electronic device 50 The security host 10 obtains the open record of the password lock 20 or sets the status or history of the security host 10 as the monitoring state or the released state. Here, the handheld electronic device 50 can be a handheld electronic device 50 such as a smart phone, a tablet computer, a notebook computer or a PDA. Moreover, in some embodiments, the security host 10 is connected to the electrical device 60 via the wireless communication module 12, thereby controlling the opening and closing of the electrical device via the control module 11 or remotely controlling through the handheld electronic device 50. The opening and closing of the electrical device 60.

第6圖為本創作第五實施例之保全系統之一架構示意圖。請參閱第6圖所示,管制中心主機30經由網際網路與手持電子裝置50連線,手持電子裝置50經由管制中心主機30自保全主機10取得密碼鎖20之開啟記錄或設定保全主機10為監控狀態或該解除狀態現狀或歷程。再者,於一些實施例中,手持電子裝置50以遠端操控電器設備60的啟閉。FIG. 6 is a schematic structural diagram of one of the security systems of the fifth embodiment of the present invention. Referring to FIG. 6 , the control center host 30 is connected to the handheld electronic device 50 via the Internet. The handheld electronic device 50 obtains the open record of the password lock 20 from the security host 10 via the control center host 30 or sets the security host 10 as Monitor the status or the status or history of the release status. Moreover, in some embodiments, the handheld electronic device 50 remotely controls the opening and closing of the electrical device 60.

於一實施例中,密碼鎖20除可接受密碼輸入、門禁刷卡之輸入方式外,使用者也可利用具近場通訊之手持電子裝置來感應讀卡。In an embodiment, in addition to accepting the password input and the access mode of the access control card, the user can also use the handheld electronic device with near field communication to sense the card reading.

藉由上述結構所構成的保全系統,經由密碼鎖20輸入身分驗證訊息並且驗證確認無誤之後,即可執行解鎖動作,以開啟大門供使用者進出;透過輸入設定鍵及正確的身分驗證訊息,即可令保全主機10進入監控狀態;保全主機10於監控狀態時,只要輸入正確的身分驗證訊息後,即可令保全主機10切換為解除狀態。當保全人員巡迴時,也不需額外攜帶各個巡迴用戶的卡片,可直接利用其員工卡進行設定。此外,因密碼鎖20之儲存密碼組數有限,新增密碼由保全主機10來驗證,可進行有效擴充。而透過密碼鎖20之按鍵還可提供不同模式(如反脅迫),可省去傳統的設定機,便於使用者使用,更能減少保全主機10裝設於牆壁面的機盒,節省成本之外,亦可以保持壁面的美感。With the security system formed by the above structure, after inputting the identity verification message via the password lock 20 and verifying that the verification is correct, the unlocking action can be performed to open the door for the user to enter and exit; through the input setting button and the correct identity verification message, The security host 10 can be brought into the monitoring state; when the host 10 is in the monitoring state, the security host 10 can be switched to the released state by inputting the correct identity verification message. When the security personnel tour, there is no need to carry additional cards of each tour user, and the employee card can be directly used for setting. In addition, since the number of stored password groups of the password lock 20 is limited, the newly added password is verified by the security host 10, and can be effectively expanded. The keys of the password lock 20 can also provide different modes (such as anti-coercion), which can save the traditional setting machine and be convenient for the user to use, and can further reduce the security of the main machine 10 installed on the wall surface, saving costs. It can also maintain the beauty of the wall.

10‧‧‧保全主機
11‧‧‧控制模組
12‧‧‧無線通訊模組
13‧‧‧有線通訊模組
20‧‧‧密碼鎖
21、21’‧‧‧密碼鍵
22‧‧‧讀卡機
30‧‧‧管制中心主機
40‧‧‧無線感知器
50‧‧‧手持電子裝置
60‧‧‧電器設備
10‧‧‧Security host
11‧‧‧Control module
12‧‧‧Wireless communication module
13‧‧‧Wired communication module
20‧‧‧ password lock
21, 21'‧‧‧ password key
22‧‧‧ card reader
30‧‧‧Control Center Host
40‧‧‧Wireless Sensor
50‧‧‧Handheld electronic devices
60‧‧‧Electrical equipment

[第1圖]係本創作第一實施例之保全系統的一架構示意圖。 [第2圖]係本創作第一實施例之密碼鎖的一外觀示意圖。 [第3圖]係本創作第二實施例之保全系統之一架構示意圖 。 [第4圖]係本創作第三實施例之保全系統的一架構示意圖。 [第5圖]係本創作第四實施例之保全系統之一架構示意圖。 [第6圖]係本創作第五實施例之保全系統之一架構示意圖。[Fig. 1] is a schematic diagram of an architecture of the security system of the first embodiment of the present invention. [Fig. 2] is a schematic view showing the appearance of the combination lock of the first embodiment of the present invention. [Fig. 3] is a schematic diagram of one of the security systems of the second embodiment of the present invention. [Fig. 4] is a schematic diagram of an architecture of the security system of the third embodiment of the present invention. [Fig. 5] is a schematic diagram showing one of the architectures of the security system of the fourth embodiment of the present invention. [Fig. 6] is a schematic diagram showing one of the architectures of the security system of the fifth embodiment of the present invention.

10‧‧‧保全主機10‧‧‧Security host

11‧‧‧控制模組11‧‧‧Control module

12‧‧‧無線通訊模組12‧‧‧Wireless communication module

13‧‧‧有線通訊模組13‧‧‧Wired communication module

20‧‧‧密碼鎖20‧‧‧ password lock

21‧‧‧密碼鍵21‧‧‧ password key

30‧‧‧管制中心主機30‧‧‧Control Center Host

Claims (10)

一種具有密碼鎖的保全系統,包括:一密碼鎖,具有複數密碼鍵,並響應該複數密碼鍵之輸入而接收一身分驗證訊息,且根據該身分驗證訊息進行一身分驗證以於通過驗證時執行一解鎖動作;及一保全主機,具有一保全狀態,該保全狀態包括一監控狀態及一解除狀態,該保全主機包括:一無線通訊模組,連線該密碼鎖,以接收該身分驗證訊息及該身分驗證之結果;及一控制模組,電連接該無線通訊模組,於該身分驗證之結果為通過且該保全狀態為該監控狀態時,該控制模組設定該保全狀態為一解除狀態。 A security system with a password lock, comprising: a password lock, having a plurality of password keys, and receiving an identity verification message in response to the input of the plurality of password keys, and performing an identity verification according to the identity verification message to perform execution when verifying An unlocking action; and a security host having a security state, the security state comprising a monitoring state and a release state, the security host comprising: a wireless communication module, connecting the password lock to receive the identity verification message and And the control module is electrically connected to the wireless communication module. When the result of the identity verification is passed and the security state is the monitoring state, the control module sets the security state to a release state. . 如請求項1所述之具有密碼鎖的保全系統,其中該複數密碼鍵的其中之一為一設定鍵,若該密碼鎖於該設定鍵觸發後一第一時間內完成該身分驗證,則輸出一模式設定命令、該身分驗證訊息及該身分驗證之結果至該保全主機,其中該保全主機之該控制模組響應該模式設定命令設定該保全狀態為該監控狀態。 The security system with a combination lock according to claim 1, wherein one of the plurality of password keys is a setting button, and if the password lock is completed in the first time after the setting button is triggered, the output is output. A mode setting command, the identity verification message, and the result of the identity verification are sent to the security host, wherein the control module of the security host sets the security state to the monitoring state in response to the mode setting command. 如請求項1所述之具有密碼鎖的保全系統,更包含一管制中心主機,該保全主機更包含電連接於該控制模組的一有線通訊模組,以連線該管制中心,該保全主機之該控制模組經由該有線通訊模組接收來自該管制中心主機之一新增密碼,該身分驗證訊息為一巡迴員之一員 工卡卡號,該密碼鎖讀取並驗證該員工卡卡號,該控制模組於該密碼鎖之該身分驗證未通過時,確認該員工卡卡號是否與該新增密碼相符,若相符則經由該無線通訊模組通知該密碼鎖執行該解鎖動作並設定該保全狀態為一巡迴模式。 The security system with a combination lock as claimed in claim 1, further comprising a control center host, the security host further comprising a wired communication module electrically connected to the control module, to connect the control center, the security host The control module receives a new password from one of the control center hosts via the wired communication module, and the identity verification message is a member of a tour operator. The card number, the password lock reads and verifies the employee card number, and when the identity verification of the password lock fails, the control module confirms whether the employee card number matches the new password, and if so, The wireless communication module notifies the password lock to perform the unlocking action and sets the security state to a tour mode. 如請求項1至3中任一項所述之具有密碼鎖的保全系統,其中該密碼鎖更包括一讀卡機,該密碼鎖經由該讀卡機讀取一卡片而取得該身分驗證訊息。 The security system with a combination lock according to any one of claims 1 to 3, wherein the password lock further comprises a card reader, and the password lock reads the card via the card reader to obtain the identity verification message. 如請求項3所述之具有密碼鎖的保全系統,其中該複數密碼鍵的其中之一為反脅迫鍵,若該密碼鎖於該反脅迫鍵觸發後一第二時間內接收到該身分驗證訊息,執行該解鎖動作,且發送一反脅迫訊息及該身分驗證訊息至該保全主機,該保全主機確認該身分驗證通過後,根據該反脅迫訊息發送一求救訊號至該管制中心主機。 The security system with a combination lock according to claim 3, wherein one of the plurality of cryptographic keys is an anti-stress button, and if the password is locked, the identity verification message is received within a second time after the anti-stress button is triggered. And performing the unlocking action, and sending a counter-coercion message and the identity verification message to the security host, the security host confirms that the identity verification is passed, and sends a distress signal to the control center host according to the counter-coercion message. 如請求項3所述之具有密碼鎖的保全系統,其中該管制中心主機經由一網際網路與一手持電子裝置連線,該手持電子裝置經由該管制中心主機自該保全主機取得該密碼鎖之開啟記錄或設定該保全主機為該監控狀態或該解除狀態。 The security system with a combination lock according to claim 3, wherein the control center host is connected to a handheld electronic device via an internet, and the handheld electronic device obtains the password lock from the security host via the control center host. Turn on the record or set the security host to the monitoring state or the release state. 如請求項1至3中任一項所述之具有密碼鎖的保全系統,其中該保全主機更包括一無線感知器,與該無線通訊模組連線。 The security system with a combination lock according to any one of claims 1 to 3, wherein the security host further comprises a wireless sensor connected to the wireless communication module. 如請求項1至3中任一項所述之具有密碼鎖的保全系統,其中該無線通訊模組支援射頻、無線網路、ZigBee、Zwave、藍牙或近場通訊之通訊協定。 The security system with a combination lock according to any one of claims 1 to 3, wherein the wireless communication module supports a communication protocol of radio frequency, wireless network, ZigBee, Zwave, Bluetooth or near field communication. 如請求項1至3中任一項所述之具有密碼鎖的保全系統,其中該無線通訊模組與一手持電子裝置連線,而建立該手持電子裝置與該保全主機之間的連線,該手持電子裝置自該保全主機取得該密碼鎖之開啟記錄或設定該保全主機為該監控狀態或該解除狀態。 The security system with a combination lock according to any one of claims 1 to 3, wherein the wireless communication module is connected to a handheld electronic device, and a connection between the handheld electronic device and the security host is established. The handheld electronic device obtains the opening record of the password lock from the security host or sets the security host to the monitoring state or the released state. 如請求項1至3中任一項所述之具有密碼鎖的保全系統,其中該保全主機連接至少一電器設備,一手持電子裝置經由與該保全主機間的連線而操作該至少一電器設備。The security system with a combination lock according to any one of claims 1 to 3, wherein the security host is connected to at least one electrical device, and the handheld electronic device operates the at least one electrical device via a connection with the security host. .
TW103210495U 2014-06-13 2014-06-13 Security system TWM491703U (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW103210495U TWM491703U (en) 2014-06-13 2014-06-13 Security system
KR2020150000978U KR20150004569U (en) 2014-06-13 2015-02-11 Security System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW103210495U TWM491703U (en) 2014-06-13 2014-06-13 Security system

Publications (1)

Publication Number Publication Date
TWM491703U true TWM491703U (en) 2014-12-11

Family

ID=52576707

Family Applications (1)

Application Number Title Priority Date Filing Date
TW103210495U TWM491703U (en) 2014-06-13 2014-06-13 Security system

Country Status (2)

Country Link
KR (1) KR20150004569U (en)
TW (1) TWM491703U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI706267B (en) * 2015-02-04 2020-10-01 美商艾瑞迪爾通信有限公司 Keyless access control with neuro and neuro-mechanical fingerprints
TWI807238B (en) * 2020-12-25 2023-07-01 中興保全科技股份有限公司 Access control system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI706267B (en) * 2015-02-04 2020-10-01 美商艾瑞迪爾通信有限公司 Keyless access control with neuro and neuro-mechanical fingerprints
TWI755093B (en) * 2015-02-04 2022-02-11 美商艾瑞迪爾通信有限公司 Keyless access control with neuro and neuro-mechanical fingerprints
TWI807238B (en) * 2020-12-25 2023-07-01 中興保全科技股份有限公司 Access control system

Also Published As

Publication number Publication date
KR20150004569U (en) 2015-12-23

Similar Documents

Publication Publication Date Title
TWI492191B (en) Security System
JP2019505058A (en) System and method for controlling access to physical space
KR102154405B1 (en) Smart door lock
KR102261462B1 (en) Security enhanced door lock and door security management system using that
KR101954449B1 (en) Smart door lock and its operating method
KR20140117264A (en) Entry management aparatus and method for controlling access using digital door lock and wireless telecommunication terminal
CN106150271A (en) A kind of anti-theft device, system and safety cabinet
KR101025830B1 (en) A crime prevention system using recognition of a fingerprint
TWM491703U (en) Security system
CN109636957A (en) Anti-theft safety door intelligence control system
TWM504297U (en) Multi-functional entry system
CN106327732A (en) Antitheft system with deterrent function
KR101055269B1 (en) Smart door lock system using smart key
JP2012237102A (en) Ic tag and entry/exiting management system
JP2007191915A (en) Electronic lock system and program therefor
TW201704610A (en) Intelligent entrance control device
KR100890283B1 (en) A Digital Door Lock and Station Control Unit of Using Wireless and Method Thereof
KR20170073109A (en) Doorlock System Using Mobile Communication Terminal
TW201800652A (en) Door access control system with automatic unlocking function and unlocking method thereof that comprises a door lock controller and an electronic device carried by a user such that when the electronic device is approaching the door lock controller, the door lock controller, upon identifying the user, automatically unlock the door lock
KR102239276B1 (en) Security enhanced door lock and door security management system using that
KR101505880B1 (en) Door Rock Control System in Home Network
KR20100032609A (en) Digital door lock having self-security function and digital door lock system having the same
JP2009035866A (en) Electric locking-unlocking system
CN206431714U (en) A kind of telephone encryption anti-theft door system of belt switch monitoring
CN106327764A (en) Anti-theft system having acousto-optic alarm device

Legal Events

Date Code Title Description
MM4K Annulment or lapse of a utility model due to non-payment of fees