[go: up one dir, main page]

TWI866705B - Button group set via nfc - Google Patents

Button group set via nfc Download PDF

Info

Publication number
TWI866705B
TWI866705B TW112149585A TW112149585A TWI866705B TW I866705 B TWI866705 B TW I866705B TW 112149585 A TW112149585 A TW 112149585A TW 112149585 A TW112149585 A TW 112149585A TW I866705 B TWI866705 B TW I866705B
Authority
TW
Taiwan
Prior art keywords
key
field communication
near field
nfc
processor
Prior art date
Application number
TW112149585A
Other languages
Chinese (zh)
Other versions
TW202526582A (en
Inventor
簡永杰
彭嘉軍
Original Assignee
簡永杰
彭嘉軍
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 簡永杰, 彭嘉軍 filed Critical 簡永杰
Priority to TW112149585A priority Critical patent/TWI866705B/en
Application granted granted Critical
Publication of TWI866705B publication Critical patent/TWI866705B/en
Publication of TW202526582A publication Critical patent/TW202526582A/en

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

A button group set via NFC is disclosed. It includes: a plurality of physical buttons; a near field communication antenna module that receives an authorization signal and an execution command from a near field communication reader, converts the electromagnetic energy emitted from the near field communication reader into electricity for its own operation, and performs an authentication operation on the authorization signal; and a processor, respectively signally connected with the physical buttons and the near field communication antenna module, executing the execution command after the authentication operation is successful. The execution command activates at least one of the physical buttons and sets an action corresponding to the activated physical button in the processor. When any activated physical button is pressed, the processor executes the corresponding action.

Description

透過NFC設定的按鍵組Keyboard set via NFC

本發明關於一種按鍵組,特別是一種可透過NFC設定功能及使用權限的按鍵組。 The present invention relates to a key set, in particular a key set that can set functions and usage permissions via NFC.

按鍵作為與硬體溝通的輸入裝置已行之有年,一個按鍵可以導通一組電路,從而執行或取消一個指令。如果機械設備操作所需要的按鍵過多,其內的微處理器就需要多個輸出入端子來接受按鍵的輸入,成本變高。如果該些按鍵可以使用一個硬體通訊IO協議,那麼就可取代所有的按鍵輸出及輸入的腳位,減少製造成本及印刷電路板的複雜度。目前家電、工具機、生產機器設備的控制面板,都使用傳統的按鍵或薄膜按鍵開關。這些開關本身並沒有權限管理的設計,頂多就是輸入PIN碼進行管控,或是提供機殼鎖、面板鎖、開關鎖這類傳統的機械鎖來允許特定人員操作按鍵,這樣產生了一些流弊。比如設備工程師在進行維修時作業員在旁邊觀看,記憶PIN碼後作業員便能私自進行維修;設備廠商進行維修時,客戶偷偷學習並記憶密碼,之後客戶會自行維修,或是請鎖匠開鎖,或是設備廠商離職員工私下接單,造成設備廠商重大保養維修訂單的損失。 Keys have been used as input devices for hardware communication for many years. A key can conduct a set of circuits to execute or cancel an instruction. If too many keys are required to operate a mechanical device, the microprocessor inside it will need multiple input and output terminals to accept the input of the keys, which will increase the cost. If these keys can use a hardware communication IO protocol, then all key output and input pins can be replaced, reducing manufacturing costs and the complexity of printed circuit boards. Currently, the control panels of home appliances, machine tools, and production machinery and equipment all use traditional keys or membrane key switches. These switches themselves are not designed with permission management. At most, they require inputting a PIN code for control, or provide traditional mechanical locks such as case locks, panel locks, and switch locks to allow specific personnel to operate buttons. This has led to some malpractices. For example, when an equipment engineer is performing maintenance, an operator is watching and memorizing the PIN code so that the operator can perform maintenance privately; when the equipment manufacturer is performing maintenance, the customer secretly learns and memorizes the password, and then the customer will perform maintenance on his own, or ask a locksmith to open the lock, or the equipment manufacturer's former employees will take orders privately, resulting in significant losses in maintenance orders for the equipment manufacturer.

更具體地說,工廠於生產、測試機台設備時,都需要嚴格管理開機、關機、待機、生產參數調整與設定等流程,可是機台的控制面板的按鍵都沒有權 限控管,最多就一個開關機械鎖,作業員常常會誤觸或進行無授權操作,造成工廠的損失。家電類產品通常沒有開關機的權限管理,造成社區公用的設備如吸塵器,會被住戶私下拿去使用,甚至容易失竊,如果有權限控制,住戶私下拿走也無法使用。有些連鎖超商的POS機中的錢櫃,改為電腦程式中的密碼開鎖,容易被同事或客人獲知,造成安全隱患,也無法獲知是誰開的鎖。 More specifically, when factories produce and test equipment, they need to strictly manage the processes of power on, power off, standby, production parameter adjustment and setting, etc. However, the buttons on the machine control panel are not authorized to be controlled. At most, there is a switch mechanical lock. Operators often touch it by mistake or perform unauthorized operations, causing losses to the factory. Home appliances usually do not have power on and off authority management, causing community public equipment such as vacuum cleaners to be taken privately by residents and even easily stolen. If there is authority control, residents cannot use it even if they take it privately. The cash box in some chain convenience stores' POS machines has been changed to a password unlocking in a computer program, which can be easily known by colleagues or guests, causing security risks, and it is impossible to know who opened the lock.

另一方面,很多的儀器、機器設備、家電等,由於功能受限或是場地受限而無法連線上網、無法設定訪問控制,往往都找不到最後的使用者、最後修改設定人員,或是很難找到相關人,往往要調監視器、生產日誌、機台記錄來回溯。同時,使用者也無法掌握機台或是設備是否準時開機、準時關機,只能通過現場巡視來處理。 On the other hand, many instruments, machines, and home appliances cannot be connected to the Internet or set up access control due to limited functions or limited locations. It is often difficult to find the last user or the last person to modify the settings, or it is difficult to find the relevant person. It is often necessary to check the monitor, production log, and machine records to trace back. At the same time, users cannot understand whether the machine or equipment is turned on or off on time, and can only handle it through on-site inspections.

為了解決目前按鍵使用上的問題,提供按鍵組使用權限甚至是功能設定的操作,因此有本發明的提出。 In order to solve the current problems in key usage, the present invention is proposed to provide key group usage permissions and even function setting operations.

本段文字提取和編譯本發明的某些特點。其它特點將被揭露於後續段落中。其目的在涵蓋附加的申請專利範圍之精神和範圍中,各式的修改和類似的排列。 This paragraph extracts and compiles certain features of the invention. Other features will be revealed in subsequent paragraphs. Its purpose is to cover various modifications and similar arrangements within the spirit and scope of the attached patent application.

本發明提出一種透過NFC設定的按鍵組,其包含:複數個實體按鍵;一近場通訊天線模組,接收來自一近場通訊讀取器的一授權訊號與一執行指令,並轉換來自該近場通訊讀取器發出的電磁能為電力以供本身之運作,並對該授權訊號執行一認證作業;及一處理器,分別與該些實體按鍵及該近場通訊天線模組訊號連接,且在該認證作業成功後,執行該執行指令。該執行指令啟動該些實 體按鍵中至少一者,並於該處理器中設定啟動的實體按鍵對應的一動作;當任一啟動的實體按鍵被按下時,該處理器執行對應的該動作。 The present invention proposes a key set configured via NFC, which comprises: a plurality of physical keys; a near field communication antenna module, which receives an authorization signal and an execution command from a near field communication reader, converts the electromagnetic energy from the near field communication reader into electricity for its own operation, and performs an authentication operation on the authorization signal; and a processor, which is respectively connected to the physical keys and the near field communication antenna module signal, and executes the execution command after the authentication operation is successful. The execution instruction activates at least one of the physical keys and sets an action corresponding to the activated physical key in the processor; when any activated physical key is pressed, the processor executes the corresponding action.

本發明還提出另一種透過NFC設定的按鍵組,其包含:複數個實體按鍵;一近場通訊天線模組,接收來自一近場通訊讀取器的一授權訊號與一執行指令,並轉換來自該近場通訊讀取器發出的電磁能為電力以供本身之運作,並對該授權訊號執行一認證作業;及一處理器,分別與該些實體按鍵及該近場通訊天線模組訊號連接,且在該認證作業成功後,執行該執行指令。每一實體按鍵預設一動作;該執行指令啟動該些實體按鍵中至少一者;當任一啟動的實體按鍵被按下時,該處理器執行對應的該動作。 The present invention also proposes another key set set through NFC, which includes: a plurality of physical keys; a near field communication antenna module, which receives an authorization signal and an execution command from a near field communication reader, converts the electromagnetic energy from the near field communication reader into electricity for its own operation, and performs an authentication operation on the authorization signal; and a processor, which is respectively connected to the physical keys and the near field communication antenna module signal, and executes the execution command after the authentication operation is successful. Each physical key is preset with an action; the execution command activates at least one of the physical keys; when any activated physical key is pressed, the processor executes the corresponding action.

依照本發明,該近場通訊天線模組可在該認證作業成功後通知該近場通訊讀取器,該近場通訊讀取器才發出該執行指令。 According to the present invention, the NFC antenna module can notify the NFC reader after the authentication operation is successful, and the NFC reader will issue the execution command.

最好,該近場通訊天線模組與該處理器間的訊號連接符合通用型之輸入輸出(General-purpose input/output GPIO)規範、通用非同步收發傳輸器(Universal Asynchronous Receiver/Transmitter,UART)規範、積體匯流排電路(Inter-Integrated Circuit,I2C)規範,或串行外設介面(Serial Peripheral Interface Bus,SPI)規範,該些實體按鍵與該處理器間的訊號連接也符合GPIO規範、UART規範、I2C規範,或SPI規範。 Preferably, the signal connection between the near field communication antenna module and the processor complies with the general-purpose input/output (GPIO) specification, the universal asynchronous receiver/transmitter (UART) specification, the integrated circuit bus (I 2 C) specification, or the serial peripheral interface (SPI) specification, and the signal connection between the physical keys and the processor also complies with the GPIO specification, the UART specification, the I 2 C specification, or the SPI specification.

最好,該實體按鍵為電容式薄膜按鍵、電阻式薄膜按鍵、機械式按鍵或前述按鍵之混合。 Preferably, the physical key is a capacitive film key, a resistive film key, a mechanical key, or a combination of the aforementioned keys.

依照本發明,該近場通訊讀取器安裝於一行動通訊裝置中,該行動通訊裝置中安裝一應用程式,該應用程式執行後於該行動通訊裝置的螢幕上顯示一控制介面,該控制介面用以設定該執行指令的內容。 According to the present invention, the near field communication reader is installed in a mobile communication device, and an application is installed in the mobile communication device. After the application is executed, a control interface is displayed on the screen of the mobile communication device, and the control interface is used to set the content of the execution command.

依照本發明,該控制介面上可進一步顯示複數個虛擬按鍵,每一虛擬按鍵對應一個啟動的實體按鍵,當任一虛擬按鍵被觸擊時,該近場通訊讀取器通 過該近場通訊天線模組向該處理器發出該觸擊的虛擬按鍵對應的啟動的實體按鍵被按下的訊號,從而該處理器執行對應的該動作。 According to the present invention, a plurality of virtual keys can be further displayed on the control interface, each virtual key corresponds to an activated physical key, and when any virtual key is touched, the near field communication reader sends a signal to the processor through the near field communication antenna module that the activated physical key corresponding to the touched virtual key has been pressed, so that the processor executes the corresponding action.

依照本發明,該處理器可將執行該動作的一反饋訊息,透過該近場通訊天線模組傳送至該近場通訊讀取器,並於該控制介面上顯示。 According to the present invention, the processor can transmit a feedback message of executing the action to the near-field communication reader through the near-field communication antenna module and display it on the control interface.

依照本發明,該應用程式在認證作業完成後,進一步將認證作業成功或失敗的結果以訊息方式,透過該行動通訊裝置發送至預設的特定IP位置。 According to the present invention, after the authentication process is completed, the application further sends the result of the success or failure of the authentication process in the form of a message to a preset specific IP location via the mobile communication device.

最好,該授權訊號與該執行指令符合ISO14443通訊協議。 Preferably, the authorization signal and the execution command comply with the ISO14443 communication protocol.

該近場通訊天線模組可進一步包含:一近場通訊天線單元,與該近場通訊讀取器進行訊號收發,並轉換來自該近場通訊讀取器發出的電磁能為電力;及一處理單元,與該近場通訊天線單元訊號連接,接收該近場通訊天線單元的電力以執行該認證作業,並與該處理器訊號連接以進行訊號收發。 The near-field communication antenna module may further include: a near-field communication antenna unit, which transmits and receives signals with the near-field communication reader and converts the electromagnetic energy emitted by the near-field communication reader into electricity; and a processing unit, which is signal-connected to the near-field communication antenna unit, receives the electricity of the near-field communication antenna unit to perform the authentication operation, and is signal-connected to the processor to transmit and receive signals.

最好,該處理器與該近場通訊讀取器間傳輸的資料由發出方利用資料加密標準(Data Encryption Standard,DES)、三重資料加密演算法(Triple Data Encryption Algorithm,3DES)或進階加密標準(Advanced Encryption Standard,AES)加密傳輸,並由接收方執行解密。 Preferably, the data transmitted between the processor and the NFC reader is encrypted by the sender using the Data Encryption Standard (DES), Triple Data Encryption Algorithm (3DES) or Advanced Encryption Standard (AES), and decrypted by the receiver.

所述的認證作業可以包含以下步驟:a)取出預存於該處理單元中的一驗證碼;及b)比對該解鎖碼與該驗證碼,若兩者相同則認證成功。所述的認證作業也可以包含以下步驟:c)若該解鎖碼為使用一對稱性密鑰對一第一明文進行加密後的一密文,取出預存於該處理單元中的一第二明文及該對稱性密鑰;及d)以該對稱性密鑰對該密文進行解密,若解密後結果為該第二明文與該第一明文相同則認證成功。認證作業更可以包含以下步驟:e)由該處理單元生成一第一亂數,並將該第一亂數及該處理單元的一近場通訊晶片序號傳給該近場通訊讀取器;f)由該近場通訊讀取器將該第一亂數及該近場通訊晶片序號傳給一公開金鑰基礎建設平台,該公開金鑰基礎建設平台使用以該近場通訊晶片序號生成的 一對密鑰中的一公鑰,對該第一亂數進行數位簽章,以獲得該解鎖碼;g)由該處理單元使用儲存的該對密鑰中的一私鑰,對該解鎖碼進行數位驗簽以獲得一第二亂數;及h)比對該第二亂數與該第一亂數,若兩者相同則認證成功。 The authentication operation may include the following steps: a) taking out a verification code pre-stored in the processing unit; and b) comparing the decryption code with the verification code, if the two are the same, the authentication is successful. The authentication operation may also include the following steps: c) if the decryption code is a ciphertext obtained by encrypting a first plaintext using a symmetric key, taking out a second plaintext and the symmetric key pre-stored in the processing unit; and d) decrypting the ciphertext with the symmetric key, if the decryption result is that the second plaintext is the same as the first plaintext, the authentication is successful. The authentication operation may further include the following steps: e) the processing unit generates a first random number, and transmits the first random number and a near field communication chip serial number of the processing unit to the near field communication reader; f) the near field communication reader transmits the first random number and the near field communication chip serial number to a public key infrastructure platform, and the public key infrastructure platform uses A public key in a pair of keys generated by the NFC chip serial number is used to digitally sign the first random number to obtain the unlocking code; g) the processing unit uses a private key in the pair of keys stored to digitally verify the unlocking code to obtain a second random number; and h) compares the second random number with the first random number. If the two are the same, the authentication is successful.

本發明的實體按鍵是在經過授權的認證作業成功後才啟動或賦能,這可以有效管理使用者,僅讓授權的使用者拿著他的近場通訊讀取器來解鎖實體按鍵與操作。由於設計與安裝方便,安裝本發明之透過NFC設定的按鍵組的設備可以有效解決上述習知技術面臨的問題。 The physical key of the present invention is activated or enabled only after the authorized authentication operation is successful, which can effectively manage users and only allow authorized users to unlock and operate the physical key with their NFC reader. Due to the convenient design and installation, the device equipped with the key set set by NFC of the present invention can effectively solve the problems faced by the above-mentioned known technology.

1:近場通訊讀取器 1: Near Field Communication Reader

2:行動通訊裝置 2: Mobile communication devices

3:螢幕 3: Screen

4:控制介面 4: Control interface

5:虛擬按鍵 5: Virtual keys

6:反饋訊息欄 6: Feedback message column

10:實體按鍵 10: Physical buttons

11:訊號匯流排線 11: Signal bus cable

20:近場通訊天線模組 20: Near field communication antenna module

21:近場通訊天線單元 21: Near field communication antenna unit

22:處理單元 22: Processing unit

22a:近場通訊晶片 22a: Near Field Communication Chip

22b:隨機存取記憶體 22b: Random Access Memory

22c:唯讀記憶體 22c: Read-only memory

22d:輸出輸入介面 22d: Input and output interface

30:處理器 30: Processor

圖1為依照本發明實施例的一種透過NFC設定的按鍵組的元件與操作環境示意圖。 Figure 1 is a schematic diagram of the components and operating environment of a key set set via NFC according to an embodiment of the present invention.

圖2為一近場通訊天線模組的元件示意圖。 Figure 2 is a schematic diagram of the components of a near field communication antenna module.

圖3繪示透過一行動通訊裝置的螢幕上顯示的一控制介面以啟動實體按鍵的態樣。 FIG3 shows how a physical button is activated via a control interface displayed on a screen of a mobile communication device.

圖4繪示該行動通訊裝置的控制介面顯示之虛擬按鍵被觸擊時的態樣。 FIG4 shows the virtual button displayed on the control interface of the mobile communication device when it is touched.

圖5繪示透過該行動通訊裝置的螢幕上顯示的該控制介面以設定實體按鍵的態樣。 FIG5 shows how to set the physical buttons through the control interface displayed on the screen of the mobile communication device.

本發明將藉由參照下列的實施方式而更具體地描述。 The present invention will be described in more detail with reference to the following embodiments.

請見圖1,該圖為依照本發明實施例的一種透過NFC設定的按鍵組的元件與操作環境示意圖。透過NFC設定的按鍵組包含了數個實體按鍵10、一近場通訊天線模組20與一處理器30,以下分別詳述之。 Please see Figure 1, which is a schematic diagram of the components and operating environment of a key set set via NFC according to an embodiment of the present invention. The key set set via NFC includes a plurality of physical keys 10, a near field communication antenna module 20 and a processor 30, which are described in detail below.

透過NFC設定的按鍵組是許多設備,比如儀器、生產機器、家電等的一部分,關於輸入控制的硬體。安裝在這些設備中,透過NFC設定的按鍵組可以是高度的客製化。實體按鍵10是供操作者進行控制的硬體。型態上,實體按鍵的狀態不限,可以是常用的電容式薄膜按鍵、電阻式薄膜按鍵、機械式按鍵或前述按鍵之混合,本實施例中以電容式薄膜按鍵為例來說明。每個實體按鍵10都具有獨立的功能,按下時會通過訊號匯流排線11送出一個按鍵訊號給藉由訊號匯流排線11訊號連接的處理器30。按鍵訊號可以代表輸入的文字、數字與符號,比如圖1中”7”、”+”與”A”的實體按鍵10按下時可分別對處理器30輸入”7”、”+”與”A”;按鍵訊號也可以代表啟動特定的功能,比如圖1中”重置”與”左向箭號”的實體按鍵10按下時可分別對處理器30下達”將系統重置”與”游標向左移動一格”的功能。依照本發明,訊號匯流排線11,也就是實體按鍵10與處理器30間的訊號連接的裝置,代表了兩者間的訊號連接,可以符合通用型之輸入輸出(General-purpose input/output GPIO)規範、通用非同步收發傳輸器(Universal Asynchronous Receiver/Transmitter,UART)規範、積體匯流排電路(Inter-Integrated Circuit,I2C)規範,或串行外設介面(Serial Peripheral Interface Bus,SPI)規範,該近場通訊天線模組與該處理器間的訊號匯流排線可將該近場通訊天線模組轉換的電力輸出。 The key set configured via NFC is a part of many devices, such as instruments, production machines, home appliances, etc., regarding the hardware for input control. Installed in these devices, the key set configured via NFC can be highly customized. The physical key 10 is hardware for the operator to control. In terms of form, the state of the physical key is not limited, and it can be a commonly used capacitive film key, a resistive film key, a mechanical key, or a mixture of the aforementioned keys. In this embodiment, a capacitive film key is used as an example to illustrate. Each physical key 10 has an independent function, and when pressed, a key signal is sent through the signal bus 11 to the processor 30 connected by the signal bus 11. The key signal can represent input text, numbers and symbols. For example, when the physical keys 10 of "7", "+" and "A" in FIG. 1 are pressed, "7", "+" and "A" can be input to the processor 30 respectively. The key signal can also represent the activation of a specific function. For example, when the physical keys 10 of "reset" and "left arrow" in FIG. 1 are pressed, the functions of "reset the system" and "move the cursor one grid to the left" can be respectively issued to the processor 30. According to the present invention, the signal bus 11, which is a device for signal connection between the physical key 10 and the processor 30, represents the signal connection between the two, and can comply with the general-purpose input/output (GPIO) specification, the universal asynchronous receiver/transmitter (UART) specification, the integrated circuit (I 2 C) specification, or the serial peripheral interface (SPI) specification. The signal bus between the near field communication antenna module and the processor can output the power converted by the near field communication antenna module.

近場通訊天線模組20是基於近場通訊技術可以與一近場通訊讀取器1無線通訊,近場通訊讀取器1可以主動發出訊號,尋求近場通訊天線模組20的回應,也包含了取得近場通訊天線模組20中儲存的資料。在本實施例中,近場通訊讀取器1安裝於一行動通訊裝置2。行動通訊裝置2可以是智慧型手機、平板電腦、筆記型電腦或智慧型穿戴裝置,近場通訊讀取器1作為獨立的模組而安裝於行動通訊裝置2中(因為無法由行動通訊裝置2看到,所以近場通訊讀取器1以點虛線標示)。在本實施例中,近場通訊天線模組20可以接收來自近場通訊讀取器1的 一授權訊號與一執行指令,並轉換來自近場通訊讀取器1發出的電磁能為電力以供本身之運作。此外,近場通訊天線模組20還可對該授權訊號執行一認證作業。執行指令可以透過將近場通訊讀取器1的輸出輸入端子電位調整而進行執行指令內容的設定,在本實施例中則可通過行動通訊裝置2來處理。為了達到這個目的,行動通訊裝置2中可以安裝一應用程式,該應用程式執行後可於行動通訊裝置2的螢幕3上顯示一控制介面,該控制介面可用以設定執行指令的內容。關於控制介面的態樣,將於後文中詳細說明。 The NFC antenna module 20 can communicate wirelessly with a NFC reader 1 based on NFC technology. The NFC reader 1 can actively send out signals to seek a response from the NFC antenna module 20, and also includes obtaining data stored in the NFC antenna module 20. In this embodiment, the NFC reader 1 is installed in a mobile communication device 2. The mobile communication device 2 can be a smart phone, a tablet computer, a notebook computer or a smart wearable device. The NFC reader 1 is installed in the mobile communication device 2 as an independent module (because it cannot be seen by the mobile communication device 2, the NFC reader 1 is marked with dotted lines). In this embodiment, the NFC antenna module 20 can receive an authorization signal and an execution command from the NFC reader 1, and convert the electromagnetic energy from the NFC reader 1 into electricity for its own operation. In addition, the NFC antenna module 20 can also perform an authentication operation on the authorization signal. The execution command can be set by adjusting the potential of the output and input terminals of the NFC reader 1, and in this embodiment, it can be processed by the mobile communication device 2. To achieve this purpose, an application can be installed in the mobile communication device 2. After the application is executed, a control interface can be displayed on the screen 3 of the mobile communication device 2, and the control interface can be used to set the content of the execution command. The control interface will be described in detail later.

請見圖2,該圖為近場通訊天線模組20的元件示意圖。近場通訊天線模組20包含了一近場通訊天線單元21與一處理單元22。近場通訊天線單元21與近場通訊讀取器1進行訊號收發,並轉換來自近場通訊讀取器1發出的電磁能為電力,供本身運作的同時也讓處理單元22運作。授權訊號與執行指令是一種電磁波訊號,可以連續傳輸或封包傳輸方式分別傳輸授權資訊與特定執行作業的內容。處理單元22與近場通訊天線單元21訊號連接,同時接收近場通訊天線單元21的電力以執行該認證作業,並與處理器30通過訊號匯流排線11訊號連接以進行訊號收發。處理單元22包含了一近場通訊晶片22a、一隨機存取記憶體22b、一唯讀記憶體22c與一輸出輸入介面22d。近場通訊晶片22a用來處理接收的訊號,特別是可以程式化來隨機生成一生成亂數與處理授權訊號內的解鎖碼,相關的程式碼儲存於唯讀記憶體22c中,而近場通訊晶片22a運作時產生的數據可暫存於隨機存取記憶體22b中。輸出輸入介面22d是處理單元30與近場通訊天線模組20通過訊號匯流排線11互通資訊的裝置。因此,近場通訊天線模組20與處理器20間的訊號連接也符合GPIO規範、UART規範、I2C規範,或SPI規範的要求。此外,近場通訊天線模組20與處理器30間的訊號匯流排線11也可將近場通訊天線模組20轉換的電力輸出。考量資安需求,處理器30與近場通訊讀取器20間傳輸的資料由發出方利用資料加密標準(Data Encryption Standard,DES)、三重資料加密演算 法(Triple Data Encryption Algorithm,3DES)或進階加密標準(Advanced Encryption Standard,AES)加密傳輸,並由接收方執行解密。同時,授權訊號與執行指令可以在符合特定通訊協議的情況下進行無線傳輸,比如符合ISO14443通訊協議。 Please see FIG. 2, which is a schematic diagram of the components of the NFC antenna module 20. The NFC antenna module 20 includes a NFC antenna unit 21 and a processing unit 22. The NFC antenna unit 21 transmits and receives signals with the NFC reader 1, and converts the electromagnetic energy from the NFC reader 1 into electricity, which is used for its own operation and also allows the processing unit 22 to operate. The authorization signal and the execution command are electromagnetic wave signals, which can transmit the authorization information and the content of the specific execution operation respectively by continuous transmission or packet transmission. The processing unit 22 is signal-connected to the NFC antenna unit 21, receives power from the NFC antenna unit 21 to perform the authentication operation, and is signal-connected to the processor 30 via the signal bus 11 to perform signal transmission and reception. The processing unit 22 includes a NFC chip 22a, a random access memory 22b, a read-only memory 22c, and an input/output interface 22d. The NFC chip 22a is used to process the received signal, and in particular, can be programmed to randomly generate a random number and process the unlock code in the authorization signal. The relevant program code is stored in the read-only memory 22c, and the data generated when the NFC chip 22a is in operation can be temporarily stored in the random access memory 22b. The input/output interface 22d is a device for the processing unit 30 and the NFC antenna module 20 to communicate information through the signal bus 11. Therefore, the signal connection between the NFC antenna module 20 and the processor 20 also meets the requirements of the GPIO specification, the UART specification, the I 2 C specification, or the SPI specification. In addition, the signal bus cable 11 between the NFC antenna module 20 and the processor 30 can also output the power converted by the NFC antenna module 20. Considering the information security requirements, the data transmitted between the processor 30 and the NFC reader 20 is encrypted by the sender using the Data Encryption Standard (DES), Triple Data Encryption Algorithm (3DES) or Advanced Encryption Standard (AES), and is decrypted by the receiver. At the same time, the authorization signal and the execution command can be wirelessly transmitted in accordance with a specific communication protocol, such as the ISO14443 communication protocol.

前述的認證作業屬於一種授權方案,在認證作業成功後由透過NFC設定的按鍵組的製造商或系統運營商,允許持有行動通訊裝置2(近場通訊讀取器1)的使用者操作該些實體按鍵10來控制處理器30,進而控制與處理器30連接並控制的設備。認證作業可以是很簡單地包含以下步驟。第一步驟:取出預存於處理單元22中的一驗證碼(S01)。接著,第二步驟為以處理單元22比對該解鎖碼與該驗證碼,若兩者相同則認證成功(S02)。驗證碼也可以是加過密的,認證作業就包含了以下步驟。第一步驟:若該解鎖碼為使用一對稱性密鑰對一第一明文進行加密後的一密文,取出預存於處理單元22中的一第二明文及該對稱性密鑰(S11)。其次,第二步驟:以該對稱性密鑰對該密文進行解密,若解密後結果為該第二明文與該第一明文相同則認證成功(S12)。以上的認證作業是單向的,也就是在處理單元22處執行後,認證成功與否便能確定。認證作業也可是雙向的,則認證作業就變為包含了以下步驟。第一步驟:由處理單元22生成一第一亂數,並將該第一亂數及處理單元22的一近場通訊晶片序號傳給近場通訊讀取器1(S21)。接著,第二步驟:由近場通訊讀取器1將該第一亂數及該近場通訊晶片序號傳給一公開金鑰基礎建設平台,該公開金鑰基礎建設平台使用以該近場通訊晶片序號生成的一對密鑰中的一公鑰,對該第一亂數進行數位簽章,以獲得該解鎖碼(S22)。公開金鑰基礎建設平台是一組由硬體、軟體、參與者、管理政策與流程組成的雲端基礎架構,其目的在於創造、管理、分配、使用、儲存以及復原數位憑證。公開金鑰基礎建設平台藉著數位憑證認證機構將使用者的個人身分跟公開金鑰鏈結在一起。在本發明的應用中,個人身分即是近場通訊晶 片序號,而這是唯一的。鏈結關係通過註冊和發佈過程建立,可由數位憑證認證機構的各種軟體或在人為監督下完成。生成該對密鑰的演算法為非對稱密鑰演算法,常用的有RSA演算法、數位簽章演算法及橢圓曲線密碼演算法,本發明未限定之。在步驟S22之後,解鎖碼才生成。接著,第三步驟:由處理單元22使用儲存的該對密鑰中的一私鑰,對該解鎖碼進行數位驗簽以獲得一第二亂數(S23)。最後,第四步驟:比對第二亂數與第一亂數,若兩者相同則認證成功(S24)。當近場通訊天線模組20通過了認證作業後,便可以將主導權交由處理器30來執行該執行指令。近場通訊天線模組20在認證作業成功後通知近場通訊讀取器1,近場通訊讀取器1才發出執行指令,交由處理器30來執行。 The aforementioned authentication operation belongs to an authorization scheme. After the authentication operation is successful, the manufacturer or system operator of the key set set through NFC allows the user holding the mobile communication device 2 (near field communication reader 1) to operate the physical keys 10 to control the processor 30, and then control the equipment connected to and controlled by the processor 30. The authentication operation can be very simple and include the following steps. The first step: take out a verification code pre-stored in the processing unit 22 (S01). Then, the second step is to compare the unlocking code and the verification code with the processing unit 22. If the two are the same, the authentication is successful (S02). The verification code can also be encrypted, and the authentication operation includes the following steps. Step 1: If the unlocking code is a ciphertext obtained by encrypting a first plaintext using a symmetric key, take out a second plaintext and the symmetric key pre-stored in the processing unit 22 (S11). Next, step 2: decrypt the ciphertext using the symmetric key. If the decrypted result is that the second plaintext is the same as the first plaintext, the authentication is successful (S12). The above authentication operation is one-way, that is, after being executed at the processing unit 22, whether the authentication is successful or not can be determined. The authentication operation can also be two-way, and the authentication operation then includes the following steps. Step 1: The processing unit 22 generates a first random number, and transmits the first random number and a near-field communication chip serial number of the processing unit 22 to the near-field communication reader 1 (S21). Then, the second step: the NFC reader 1 transmits the first random number and the NFC chip serial number to a public key infrastructure platform, and the public key infrastructure platform uses a public key in a pair of keys generated by the NFC chip serial number to digitally sign the first random number to obtain the unlock code (S22). The public key infrastructure platform is a cloud infrastructure composed of hardware, software, participants, management policies and processes, and its purpose is to create, manage, distribute, use, store and restore digital certificates. The public key infrastructure platform links the user's personal identity with the public key through a digital certificate authentication agency. In the application of the present invention, the personal identity is the NFC chip serial number, which is unique. The link relationship is established through the registration and publishing process, which can be completed by various software of the digital certificate authentication agency or under human supervision. The algorithm for generating the pair of keys is an asymmetric key algorithm, and the commonly used algorithms are RSA algorithm, digital signature algorithm and elliptical curve cryptographic algorithm, which are not limited by the present invention. After step S22, the unlocking code is generated. Then, the third step: the processing unit 22 uses a private key in the stored pair of keys to digitally verify the unlocking code to obtain a second random number (S23). Finally, the fourth step: compare the second random number with the first random number. If the two are the same, the authentication is successful (S24). When the NFC antenna module 20 passes the authentication operation, the processor 30 can take the initiative to execute the execution command. After the authentication operation is successful, the NFC antenna module 20 notifies the NFC reader 1, and the NFC reader 1 issues the execution command, which is then executed by the processor 30.

處理器30和前述的處理單元22不同,前者是受控制設備中的主控元件,而後者僅是近場通訊天線模組20中的控制晶片(組);前者除了執行來自近場通訊天線模組20的執行指令外,還負責安裝設備的整體運作,後者僅負責與近場通訊讀取器1收發訊息以及執行認證作業。因此,本發明需要依照不同設備不同型態的處理器30,進行客製化的處理。形態上,處理器30分別與該些實體按鍵10及近場通訊天線模組20通過訊號匯流排線11訊號連接,且在該認證作業成功後,執行該執行指令。在本實施例中,每一實體按鍵10都預設了一動作,前述的執行指令是啟動該些實體按鍵10中的至少一者。當任一啟動的實體按鍵10被按下時,處理器30執行對應的動作。請復見圖1,實體按鍵10可以粗略區分成左半部的數字符號區以及右半部的功能區。在本實施例中,數字符號區的實體按鍵10可以為任何人操作,其動作是輸出就是實體按鍵10上顯示的數字或符號。功能區的實體按鍵10在認證作業成功前沒有用途,在認證作業成功後才開啟鍵帽上顯示的功能。易言之,使用者拿的近場通訊讀取器1內的解鎖碼、密文或私鑰是代表了某個身分授權,可使用被「封禁」的功能區的實體按鍵10。不同的解鎖碼、密文或私鑰也可以進一步分批解鎖功能區內的實體按鍵10。 The processor 30 is different from the aforementioned processing unit 22. The former is the main control component in the controlled device, while the latter is only the control chip (group) in the near-field communication antenna module 20. In addition to executing the execution instructions from the near-field communication antenna module 20, the former is also responsible for the overall operation of the installed device, while the latter is only responsible for sending and receiving messages with the near-field communication reader 1 and performing authentication operations. Therefore, the present invention requires customized processing according to different types of processors 30 for different devices. In terms of form, the processor 30 is respectively connected to the physical keys 10 and the near-field communication antenna module 20 through the signal bus cable 11, and executes the execution instruction after the authentication operation is successful. In the present embodiment, each physical key 10 is preset with an action, and the aforementioned execution instruction is to activate at least one of the physical keys 10. When any activated physical key 10 is pressed, the processor 30 executes the corresponding action. Please refer to FIG. 1 again, the physical key 10 can be roughly divided into a number symbol area on the left half and a function area on the right half. In the present embodiment, the physical key 10 in the number symbol area can be operated by anyone, and its action is to output the number or symbol displayed on the physical key 10. The physical key 10 in the function area has no use before the authentication operation is successful, and the function displayed on the key cap is turned on only after the authentication operation is successful. In other words, the unlock code, ciphertext or private key in the NFC reader 1 held by the user represents a certain identity authorization, and can use the physical key 10 in the "banned" function area. Different unlock codes, ciphertexts or private keys can also further unlock the physical keys 10 in the function area in batches.

依照本發明,在通過了認證作業後,除了可以完整操作所有的實體按鍵10,也可以透過行動通訊裝置2來操作。請見圖3,該圖繪示透過行動通訊裝置2的螢幕3上顯示的一控制介面4以啟動實體按鍵10的態樣。控制介面4上顯示了上部的數個虛擬按鍵5以及下方的反饋訊息欄6。虛擬按鍵5與實體按鍵10的數量與佈局相同,每一虛擬按鍵5對應一個啟動的實體按鍵10(包含預設定可啟動的數字符號區的實體按鍵10,以及認證作業成功後啟動的功能區的實體按鍵10)。當任一虛擬按鍵5,比如圖3中的”插入”鍵被觸擊時,近場通訊讀取器1通過近場通訊天線模組20向處理器30發出被觸擊的虛擬按鍵5對應的啟動的實體按鍵10被按下的訊號,從而處理器執行對應的動作,比如命令設備將當下偵測到的數據”插入”執行序列中。如果操作授權操作功能區的實體按鍵10是需要列管並且通知權責方的,比如維修員被授權操作功能區的實體按鍵10來維修設備,那應用程式可在認證作業完成後,將認證作業成功或失敗的結果以訊息方式,透過行動通訊裝置2發送至預設的特定IP位置。這些IP位置鎖在硬體的擁有者可以立即知道功能區的實體按鍵10是否被解鎖了,並監督設備後續的運作。 According to the present invention, after the authentication operation is passed, in addition to being able to fully operate all physical keys 10, they can also be operated through the mobile communication device 2. Please see Figure 3, which shows the state of activating the physical keys 10 through a control interface 4 displayed on the screen 3 of the mobile communication device 2. The control interface 4 displays a plurality of virtual keys 5 at the top and a feedback message bar 6 at the bottom. The number and layout of the virtual keys 5 and the physical keys 10 are the same, and each virtual key 5 corresponds to an activated physical key 10 (including the physical keys 10 in the default activatable numeric symbol area and the physical keys 10 in the function area activated after the authentication operation is successful). When any virtual key 5, such as the "Insert" key in FIG. 3 , is touched, the NFC reader 1 sends a signal to the processor 30 through the NFC antenna module 20 that the activated physical key 10 corresponding to the touched virtual key 5 is pressed, so that the processor executes the corresponding action, such as commanding the device to "insert" the currently detected data into the execution sequence. If the physical key 10 in the operation authorization function area needs to be listed and notified to the responsible party, such as a maintenance worker is authorized to operate the physical key 10 in the function area to repair the device, then after the authentication operation is completed, the application can send the result of the success or failure of the authentication operation in the form of a message to a preset specific IP location through the mobile communication device 2. The owner of these IP location-locked hardware can immediately know whether the physical button 10 on the ribbon is unlocked and monitor the subsequent operation of the device.

處理器30在執行虛擬按鍵5對應的啟動的實體按鍵10的功能時,可以將執行動作的成果或是已執行該動作的通知,藉由一反饋訊息呈現在螢幕3上。意即處理器30將執行該動作的反饋訊息,透過近場通訊天線模組20傳送至近場通訊讀取器1,由近場通訊讀取器1傳給行動通訊裝置2的中央處理器,並於螢幕3的控制介面4上顯示。請見圖4,該圖繪示行動通訊裝置2的控制介面4顯示之虛擬按鍵5被觸擊時的態樣。由圖4反饋訊息欄6中的反饋訊息可以看出,使用者依序觸擊了虛擬按鍵5上的”0”、”0”、”抄錄”與”A”鍵,並由處理器30執行相關的觸發動作。 When the processor 30 executes the function of the activated physical key 10 corresponding to the virtual key 5, the result of the execution of the action or the notification of the execution of the action can be presented on the screen 3 through a feedback message. That is, the processor 30 transmits the feedback message of the execution of the action to the near field communication reader 1 through the near field communication antenna module 20, and the near field communication reader 1 transmits it to the central processor of the mobile communication device 2, and displays it on the control interface 4 of the screen 3. Please see Figure 4, which shows the state of the virtual key 5 displayed on the control interface 4 of the mobile communication device 2 when it is touched. It can be seen from the feedback message in the feedback message column 6 of FIG4 that the user touches the "0", "0", "Copy" and "A" keys on the virtual key 5 in sequence, and the processor 30 executes the relevant triggering actions.

在前一實施例中,每一個實體按鍵10都預設一動作,當任一啟動的實體按鍵10被按下時,處理器30執行對應的該動作。但依照本發明;實體按鍵10可 以具備預設動作,而依靠使用者指定每一個實體按鍵10實際的作用。請見圖5,該圖繪示透過行動通訊裝置2的螢幕3上顯示的控制介面4以設定實體按鍵10的態樣。執行指令可以啟動該些實體按鍵10中至少一者,並於處理器30中設定啟動的實體按鍵10對應的一動作。比如使用者觸擊了”刪除”虛擬按鍵5,控制介面4下方的功能設定欄7便會出現下拉式選單,讓使用者由眾多設定中選擇一個來設定”刪除”虛擬按鍵5的功能。 In the previous embodiment, each physical key 10 is preset with an action, and when any activated physical key 10 is pressed, the processor 30 executes the corresponding action. However, according to the present invention, the physical key 10 can have a preset action, and the actual function of each physical key 10 is specified by the user. See FIG5, which shows the state of setting the physical key 10 through the control interface 4 displayed on the screen 3 of the mobile communication device 2. The execution command can activate at least one of the physical keys 10 and set an action corresponding to the activated physical key 10 in the processor 30. For example, when the user touches the "Delete" virtual button 5, a drop-down menu will appear in the function setting bar 7 below the control interface 4, allowing the user to select one of the many settings to set the function of the "Delete" virtual button 5.

雖然本發明已以實施方式揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作些許之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。 Although the present invention has been disclosed in the form of implementation as above, it is not intended to limit the present invention. Anyone with ordinary knowledge in the relevant technical field can make some changes and modifications without departing from the spirit and scope of the present invention. Therefore, the scope of protection of the present invention shall be subject to the scope of the patent application attached hereto.

1:近場通訊讀取器 1: Near Field Communication Reader

2:行動通訊裝置 2: Mobile communication devices

3:螢幕 3: Screen

10:實體按鍵 10: Physical buttons

11:訊號匯流排線 11: Signal bus cable

20:近場通訊天線模組 20: Near field communication antenna module

30:處理器 30: Processor

Claims (16)

一種透過NFC設定的按鍵組,包含:複數個實體按鍵;一近場通訊天線模組,接收來自一近場通訊讀取器的一授權訊號與一執行指令,並轉換來自該近場通訊讀取器發出的電磁能為電力以供本身之運作,並對該授權訊號執行一認證作業;及一處理器,分別與該些實體按鍵及該近場通訊天線模組訊號連接,且在該認證作業成功後,執行該執行指令,其中該執行指令啟動該些實體按鍵中至少一者,並於該處理器中設定啟動的實體按鍵對應的一動作;當任一啟動的實體按鍵被按下時,該處理器執行對應的該動作。 A key set configured via NFC includes: a plurality of physical keys; a near field communication antenna module, receiving an authorization signal and an execution command from a near field communication reader, converting the electromagnetic energy from the near field communication reader into electricity for its own operation, and performing an authentication operation on the authorization signal; and a processor, respectively connected to the physical keys and the near field communication antenna module signal, and executing the execution command after the authentication operation is successful, wherein the execution command activates at least one of the physical keys, and sets an action corresponding to the activated physical key in the processor; when any activated physical key is pressed, the processor executes the corresponding action. 一種透過NFC設定的按鍵組,包含:複數個實體按鍵;一近場通訊天線模組,接收來自一近場通訊讀取器的一授權訊號與一執行指令,並轉換來自該近場通訊讀取器發出的電磁能為電力以供本身之運作,並對該授權訊號執行一認證作業;及一處理器,分別與該些實體按鍵及該近場通訊天線模組訊號連接,且在該認證作業成功後,執行該執行指令,其中每一實體按鍵預設一動作;該執行指令啟動該些實體按鍵中至少一者;當任一啟動的實體按鍵被按下時,該處理器執行對應的該動作。 A key set configured via NFC includes: a plurality of physical keys; a near field communication antenna module, receiving an authorization signal and an execution command from a near field communication reader, converting the electromagnetic energy from the near field communication reader into electricity for its own operation, and performing an authentication operation on the authorization signal; and a processor, respectively connected to the physical keys and the near field communication antenna module signal, and executing the execution command after the authentication operation is successful, wherein each physical key is preset with an action; the execution command activates at least one of the physical keys; when any activated physical key is pressed, the processor executes the corresponding action. 如請求項1或2所述的透過NFC設定的按鍵組,其中該近場通訊天線模組在該認證作業成功後通知該近場通訊讀取器,該近場通訊讀取器才發出該執行指令。 A key set configured via NFC as described in claim 1 or 2, wherein the NFC antenna module notifies the NFC reader after the authentication operation is successful, and the NFC reader issues the execution command. 如請求項1或2所述的透過NFC設定的按鍵組,其中該近場通訊天線模組與該處理器間的訊號連接符合通用型之輸入輸出(General-purpose input/output GPIO)規範、通用非同步收發傳輸器(Universal Asynchronous Receiver/Transmitter,UART)規範、積體匯流排電路(Inter-Integrated Circuit,I2C)規範,或串行外設介面(Serial Peripheral Interface Bus,SPI)規範,該近場通訊天線模組與該處理器間的訊號匯流排線可將該近場通訊天線模組轉換的電力輸出。 A key set configured via NFC as described in claim 1 or 2, wherein the signal connection between the near-field communication antenna module and the processor complies with the general-purpose input/output (GPIO) specification, the universal asynchronous receiver/transmitter (UART) specification, the integrated circuit bus (I 2 C) specification, or the serial peripheral interface (SPI) specification, and the signal bus line between the near-field communication antenna module and the processor can output the power converted by the near-field communication antenna module. 如請求項1或2所述的透過NFC設定的按鍵組,其中該些實體按鍵與該處理器間的訊號連接符合GPIO規範、UART規範、I2C規範,或SPI規範。 A key set configured via NFC as described in claim 1 or 2, wherein the signal connection between the physical keys and the processor complies with the GPIO specification, the UART specification, the I 2 C specification, or the SPI specification. 如請求項1或2所述的透過NFC設定的按鍵組,其中該實體按鍵為電容式薄膜按鍵、電阻式薄膜按鍵、機械式按鍵或前述按鍵之混合。 A key set configured via NFC as described in claim 1 or 2, wherein the physical key is a capacitive film key, a resistive film key, a mechanical key, or a combination of the aforementioned keys. 如請求項1或2所述的透過NFC設定的按鍵組,其中該近場通訊讀取器安裝於一行動通訊裝置中,該行動通訊裝置中安裝一應用程式,該應用程式執行後於該行動通訊裝置的螢幕上顯示一控制介面,該控制介面用以設定該執行指令的內容。 A key set configured via NFC as described in claim 1 or 2, wherein the near field communication reader is installed in a mobile communication device, an application is installed in the mobile communication device, and after the application is executed, a control interface is displayed on the screen of the mobile communication device, and the control interface is used to set the content of the execution command. 如請求項7所述的透過NFC設定的按鍵組,其中該控制介面上進一步顯示複數個虛擬按鍵,每一虛擬按鍵對應一個啟動的實體按鍵,當任一虛擬按鍵被觸擊時,該近場通訊讀取器通過該近場通訊天線模組向該處理器發出該 觸擊的虛擬按鍵對應的啟動的實體按鍵被按下的訊號,從而該處理器執行對應的該動作。 As described in claim 7, a key set set via NFC, wherein a plurality of virtual keys are further displayed on the control interface, each virtual key corresponds to an activated physical key, and when any virtual key is touched, the near field communication reader sends a signal to the processor via the near field communication antenna module indicating that the activated physical key corresponding to the touched virtual key has been pressed, so that the processor executes the corresponding action. 如請求項7所述的透過NFC設定的按鍵組,其中該處理器將執行該動作的一反饋訊息,透過該近場通訊天線模組傳送至該近場通訊讀取器,並於該控制介面上顯示。 A key set configured via NFC as described in claim 7, wherein the processor transmits a feedback message of executing the action to the NFC reader via the NFC antenna module and displays it on the control interface. 如請求項7所述的透過NFC設定的按鍵組,其中該應用程式在認證作業完成後,進一步將認證作業成功或失敗的結果以訊息方式,透過該行動通訊裝置發送至預設的特定IP位置。 A key set configured via NFC as described in claim 7, wherein after the authentication operation is completed, the application further sends the result of the success or failure of the authentication operation in the form of a message to a preset specific IP location via the mobile communication device. 如請求項1或2所述的透過NFC設定的按鍵組,其中該授權訊號與該執行指令符合ISO14443通訊協議。 A key set configured via NFC as described in claim 1 or 2, wherein the authorization signal and the execution command comply with the ISO14443 communication protocol. 如請求項1或2所述的透過NFC設定的按鍵組,其中該近場通訊天線模組進一步包含:一近場通訊天線單元,與該近場通訊讀取器進行訊號收發,並轉換來自該近場通訊讀取器發出的電磁能為電力;及一處理單元,與該近場通訊天線單元訊號連接,接收該近場通訊天線單元的電力以執行該認證作業,並與該處理器訊號連接以進行訊號收發。 A key set configured via NFC as described in claim 1 or 2, wherein the near-field communication antenna module further comprises: a near-field communication antenna unit, which transmits and receives signals with the near-field communication reader and converts electromagnetic energy emitted by the near-field communication reader into electricity; and a processing unit, which is signal-connected to the near-field communication antenna unit, receives the electricity of the near-field communication antenna unit to perform the authentication operation, and is signal-connected to the processor to transmit and receive signals. 如請求項1或2所述的透過NFC設定的按鍵組,其中該處理器與該近場通訊讀取器間傳輸的資料由發出方利用資料加密標準(Data Encryption Standard,DES)、三重資料加密演算法(Triple Data Encryption Algorithm,3DES)或進階加密標準(Advanced Encryption Standard,AES)加密傳輸,並由接收方執行解密。 A key set configured via NFC as described in claim 1 or 2, wherein the data transmitted between the processor and the near field communication reader is encrypted by the sender using the Data Encryption Standard (DES), Triple Data Encryption Algorithm (3DES) or Advanced Encryption Standard (AES), and is decrypted by the receiver. 如請求項12所述的透過NFC設定的按鍵組,其中該認證作業包含以下步驟:a)取出預存於該處理單元中的一驗證碼;及b)比對一解鎖碼與該驗證碼,若兩者相同則認證成功。 A key set configured via NFC as described in claim 12, wherein the authentication operation includes the following steps: a) retrieving a verification code pre-stored in the processing unit; and b) comparing a decryption code with the verification code, and if the two are the same, the authentication is successful. 如請求項14所述的透過NFC設定的按鍵組,其中該認證作業包含以下步驟:c)若該解鎖碼為使用一對稱性密鑰對一第一明文進行加密後的一密文,取出預存於該處理單元中的一第二明文及該對稱性密鑰;及d)以該對稱性密鑰對該密文進行解密,若解密後結果為該第二明文與該第一明文相同則認證成功。 As described in claim 14, the key set set via NFC, wherein the authentication operation includes the following steps: c) if the decryption code is a ciphertext obtained by encrypting a first plaintext using a symmetric key, taking out a second plaintext and the symmetric key pre-stored in the processing unit; and d) decrypting the ciphertext using the symmetric key, and if the decrypted result is that the second plaintext is the same as the first plaintext, then the authentication is successful. 如請求項14所述的透過NFC設定的按鍵組,其中該認證作業包含以下步驟:e)由該處理單元生成一第一亂數,並將該第一亂數及該處理單元的一近場通訊晶片序號傳給該近場通訊讀取器;f)由該近場通訊讀取器將該第一亂數及該近場通訊晶片序號傳給一公開金鑰基礎建設平台,該公開金鑰基礎建設平台使用以該近場通訊晶片序號生成的一對密鑰中的一公鑰,對該第一亂數進行數位簽章,以獲得該解鎖碼;g)由該處理單元使用儲存的該對密鑰中的一私鑰,對該解鎖碼進行數位驗簽以獲得一第二亂數;及h)比對該第二亂數與該第一亂數,若兩者相同則認證成功。 A key set configured via NFC as described in claim 14, wherein the authentication operation comprises the following steps: e) the processing unit generates a first random number, and transmits the first random number and a near field communication chip serial number of the processing unit to the near field communication reader; f) the near field communication reader transmits the first random number and the near field communication chip serial number to a public key infrastructure platform, the The public key infrastructure platform uses a public key in a pair of keys generated by the NFC chip serial number to digitally sign the first random number to obtain the unlocking code; g) the processing unit uses a private key in the stored pair of keys to digitally verify the unlocking code to obtain a second random number; and h) compares the second random number with the first random number. If the two are the same, the authentication is successful.
TW112149585A 2023-12-19 2023-12-19 Button group set via nfc TWI866705B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW112149585A TWI866705B (en) 2023-12-19 2023-12-19 Button group set via nfc

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW112149585A TWI866705B (en) 2023-12-19 2023-12-19 Button group set via nfc

Publications (2)

Publication Number Publication Date
TWI866705B true TWI866705B (en) 2024-12-11
TW202526582A TW202526582A (en) 2025-07-01

Family

ID=94769395

Family Applications (1)

Application Number Title Priority Date Filing Date
TW112149585A TWI866705B (en) 2023-12-19 2023-12-19 Button group set via nfc

Country Status (1)

Country Link
TW (1) TWI866705B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100216396A1 (en) * 2009-02-16 2010-08-26 Rocky Anthony Fernandez Integrated System and Method for Enabling Mobile Commerce Transactions using "Contactless Identity Modules in Mobile Handsets"
CN102460520A (en) * 2009-05-03 2012-05-16 洛格摩提公司 Payment terminal using a mobile communication device, such as a mobile phone; method for direct debit payment transactions
CN107360158A (en) * 2017-07-11 2017-11-17 冯贵良 A kind of medical client access authority control method and system
CN110517402A (en) * 2019-08-26 2019-11-29 拉卡拉支付股份有限公司 PIN pad and user terminal
TW202001744A (en) * 2018-06-25 2020-01-01 香港商阿里巴巴集團服務有限公司 Transaction card and information display method
CN115051733A (en) * 2022-06-02 2022-09-13 北京万家互联科技有限公司 Card reader based on Bluetooth communication
US20220342972A1 (en) * 2017-09-11 2022-10-27 Apple Inc. Implementation of biometric authentication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100216396A1 (en) * 2009-02-16 2010-08-26 Rocky Anthony Fernandez Integrated System and Method for Enabling Mobile Commerce Transactions using "Contactless Identity Modules in Mobile Handsets"
CN102460520A (en) * 2009-05-03 2012-05-16 洛格摩提公司 Payment terminal using a mobile communication device, such as a mobile phone; method for direct debit payment transactions
CN107360158A (en) * 2017-07-11 2017-11-17 冯贵良 A kind of medical client access authority control method and system
US20220342972A1 (en) * 2017-09-11 2022-10-27 Apple Inc. Implementation of biometric authentication
TW202001744A (en) * 2018-06-25 2020-01-01 香港商阿里巴巴集團服務有限公司 Transaction card and information display method
CN110517402A (en) * 2019-08-26 2019-11-29 拉卡拉支付股份有限公司 PIN pad and user terminal
CN115051733A (en) * 2022-06-02 2022-09-13 北京万家互联科技有限公司 Card reader based on Bluetooth communication

Similar Documents

Publication Publication Date Title
US11070364B2 (en) Secure communication method and smart lock system based thereof
EP2936369B1 (en) Verification of password using a keyboard with a secure password entry mode
CN103929307B (en) Cipher-code input method, intelligent cipher key equipment and client terminal device
CN103400434B (en) The control method of sound state coded lock and control device
US20210351920A1 (en) Secure communication method and smart lock system based thereof
CN103905188B (en) Utilize the method and intelligent cipher key equipment of intelligent cipher key equipment generation dynamic password
KR20100080031A (en) A method for firmware updating in remote
CN101102194B (en) An OTP device and a method for identity authentication using the device
CN104468113A (en) Distribution of user credentials
CN104464048B (en) A kind of electronic password lock method for unlocking and device
CN103973437B (en) The method, apparatus and system of RSA key mandate are obtained when a kind of terminal locking
US10735409B2 (en) Authenication stick
CN101819614A (en) System and method for enhancing network transaction safety by utilizing voice verification USBKey
CN104052817A (en) Intelligent door and intelligent door control method and system
CN104866129A (en) Computing device and password input method thereof
CN112530053B (en) Intelligent lock control method, system, lock device, server and storage medium
CN108848503A (en) A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis
TWI866705B (en) Button group set via nfc
JP2021111925A (en) Electronic signature system
CN108885657B (en) Access control
TW202526582A (en) Button group set via nfc
CN105468957B (en) A kind of safety keyboard for network trading
WO2016147568A1 (en) Communications device, partner communications device, and communications program
CN114338150A (en) Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock
JP6522838B1 (en) Cash dispenser