TWI871022B - Information security management system for opening nfc locks with authorization - Google Patents
Information security management system for opening nfc locks with authorization Download PDFInfo
- Publication number
- TWI871022B TWI871022B TW112136612A TW112136612A TWI871022B TW I871022 B TWI871022 B TW I871022B TW 112136612 A TW112136612 A TW 112136612A TW 112136612 A TW112136612 A TW 112136612A TW I871022 B TWI871022 B TW I871022B
- Authority
- TW
- Taiwan
- Prior art keywords
- unlocking
- near field
- field communication
- lock
- module
- Prior art date
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
Description
本發明關於一種資安管理系統,特別是一種授權開啟近場通訊鎖的資安管理系統。 The present invention relates to an information security management system, in particular to an information security management system for authorizing the opening of a near field communication lock.
為了要保護企業內部可流通的機密資料,比如文件、報表、設計圖紙、樣品等,及生產設備如伺服器、機台設備,及收銀設備如POS機、錢櫃,一家企業需要擁有許多的永久或臨時性容器來安置這些現金、機密資料及相關資產;相應地,這些容器也需要使用一個或多個鎖來確保其不會被惡意或無心地開啟。每一個鎖除了在購置與安裝上是不小的成本,使用管理(授權開啟)上也是非常繁瑣的。舉例來說,員工個人配置一個上鎖辦公櫃與個人物品櫃,入職時發給員工鑰匙離職時回收,這可能是人事部門可以兼管的事項。每個部門有其專屬檔案櫃、文件櫃、展示櫃等,用來存放部門資產;特殊櫃子的鎖具,尤其是保管重要或機密資產,還必須制定鑰匙使用程序及流程等特別管理,甚至還有備用鑰匙的存放與管理的複雜工作,還要防備員工私自複製鑰匙,這需要部門主管親力處理。如果是公司高層或跨部門的重要機密資料,其保管與受權開啟保管櫃的程序,動輒需要最高階主管的核可才能進行。為了一個「開鎖」的動作而需要耗費許 多不必要的人時,實屬無奈,然而這些保密作法是多數企業為了要滿足ISO27001的安全需求的必行之道。 In order to protect confidential data that can be circulated within the enterprise, such as documents, reports, design drawings, samples, etc., as well as production equipment such as servers, machines, and cash registers such as POS machines and cash registers, a company needs to have many permanent or temporary containers to store these cash, confidential data and related assets; accordingly, these containers also need to use one or more locks to ensure that they will not be opened maliciously or accidentally. In addition to the high cost of purchasing and installing each lock, the management of its use (authorized opening) is also very cumbersome. For example, each employee is equipped with a locked office cabinet and a personal belongings cabinet, and the employee is given a key when he/she joins the company and the key is collected when he/she leaves the company. This may be something that the human resources department can take care of. Each department has its own file cabinets, document cabinets, display cabinets, etc., to store departmental assets; special cabinet locks, especially those that store important or confidential assets, must also be managed by key usage procedures and processes, and even the complicated work of storing and managing spare keys, and preventing employees from copying keys privately, which requires department heads to handle personally. If it is important confidential information for senior management or across departments, the procedures for its storage and authorization to open the safe deposit box often require the approval of the top management. It is helpless to consume many unnecessary people for the action of "unlocking", but these confidentiality practices are the only way for most companies to meet the security requirements of ISO27001.
除去傳統以實體鑰匙進行授權解鎖的方式,許多企業使用密碼鎖來替代機械鎖。這樣做的優點是省下交接以及保管鑰匙的風險勞務,但由於解鎖密碼鎖的密碼有可能被洩漏給無關的第三人,甚至被離職員工記憶,造成無謂的風險。晚近,企業界對於無鑰匙無密碼的工作環境有著急速增加的需求,指紋鎖或人臉辨識鎖具就成為了技術替代下的解決方案。然而,在實作上這不太適合企業使用,原因是這些鎖具要記錄個人生物特徵的程序架構非常繁瑣。此外,企業離職率平均約15%,不算更換工作岡位,管理量非常巨大。基於生物特徵的鎖具需要電池或外部接電,定期充電也是企業額外的管理成本。如果考量個人生物特徵洩漏風險太大,還有潛在的道德成本。因此,基於生物特徵的鎖具相比傳統鑰匙,對企業並不是一個更優的選擇。 In addition to the traditional method of authorizing and unlocking with physical keys, many companies use combination locks to replace mechanical locks. The advantage of doing so is that it saves the risk of handing over and keeping keys, but the password to unlock the combination lock may be leaked to an unrelated third party or even remembered by a former employee, causing unnecessary risks. Recently, the business community has a rapidly increasing demand for a keyless and passwordless work environment, and fingerprint locks or facial recognition locks have become a solution under technological substitution. However, in practice, this is not very suitable for corporate use because the program architecture for these locks to record personal biometrics is very cumbersome. In addition, the average turnover rate of enterprises is about 15%, not counting job changes, so the management workload is very huge. Biometric locks require batteries or external power, and regular charging is also an additional management cost for enterprises. If the risk of personal biometric leakage is considered too high, there is also a potential moral cost. Therefore, biometric locks are not a better choice for enterprises than traditional keys.
因此打造一個無鑰匙無密碼的工作環境,同時還要具備ISO27001所要求的安全,企業還在追求更好的解決方案。 Therefore, enterprises are still pursuing better solutions to create a keyless and passwordless working environment while also having the security required by ISO27001.
本段文字提取和編譯本發明的某些特點。其它特點將被揭露於後續段落中。其目的在涵蓋附加的申請專利範圍之精神和範圍中,各式的修改和類似的排列。 This paragraph extracts and compiles certain features of the invention. Other features will be revealed in subsequent paragraphs. Its purpose is to cover various modifications and similar arrangements within the spirit and scope of the attached patent application.
為了滿足前述需求,本發明揭露一種授權開啟近場通訊鎖的資安管理系統。該系統安裝於一伺服器叢集中,並與複數個行動通訊裝置資訊連接,包含:一資料庫模組,用以儲存複數個註冊帳號與對應於每一個註冊帳號的註冊密碼、 複數個註冊近場通訊晶片序號,以及每一註冊近場通訊晶片序號選自該複數個註冊帳號所設定的至少一註冊帳號;一身分確認模組,與該資料庫模組資訊連接,接收來自任一行動通訊裝置的一用戶帳號與一用戶密碼,若該用戶帳號與該用戶密碼與該資料庫模組中的一組註冊帳號與註冊密碼相同,則允許該行動通訊裝置進行一授權解鎖程序;一公開金鑰基礎架構模組,以該些註冊近場通訊晶片序號分別生成複數對密鑰組,儲存該些密鑰組中的公鑰與該些註冊近場通訊晶片序號,並可以任一對密鑰組中的公鑰對任一訊息進行數位簽章,以獲得一解鎖碼;及一解鎖處理模組,與該資料庫模組、該身分確認模組及該公開金鑰基礎架構模組資訊連接,執行該授權解鎖程序,該授權解鎖程序包含以下步驟:序號接收步驟:接收來自受允許執行該授權解鎖程序的一授權行動通訊裝置的一標的近場通訊晶片序號,該標的近場通訊晶片序號為該授權行動通訊裝置取自控制一近場通訊鎖開鎖機制的一近場通訊晶片,該近場通訊晶片具有以該標的近場通訊晶片序號生成的密鑰組中的一私鑰;第一判斷步驟:判斷該標的近場通訊晶片序號是否為該些註冊近場通訊晶片序號中之一,若否,停止該授權解鎖程序;第二判斷步驟:判斷該授權行動通訊裝置使用的用戶帳號是否為該標的近場通訊晶片序號對應的該註冊近場通訊晶片序號所設定的該註冊帳號,若否,停止該授權解鎖程序;亂數接收步驟:接收來自該授權行動通訊裝置的一生成亂數,該生成亂數為該近場通訊晶片隨機生成;解鎖碼生成步驟:將該標的近場通訊晶片序號與該生成亂數傳給該公開金鑰基礎架構模組,該公開金鑰基礎架構模組使用與該標的近場通訊晶片序號相同的註冊近場通訊晶片序號生成的密鑰組中的公鑰,對該生成亂數進行數位簽章以獲得對應的解鎖碼;及解鎖步驟:將該解鎖碼透過該授權行動通訊裝置回傳給該近場通訊晶片,該近場通訊晶片以該私鑰對該解鎖碼進行數位驗簽以獲得一驗證亂數,若該驗證亂數與該生成亂數相同,則該近場通訊晶片開鎖該近場通訊鎖。 In order to meet the above-mentioned needs, the present invention discloses an information security management system for authorizing the opening of a near-field communication lock. The system is installed in a server cluster and is connected to a plurality of mobile communication devices, including: a database module for storing a plurality of registered accounts and a registration password corresponding to each registered account, a plurality of registered near-field communication chip serial numbers, and each registered near-field communication chip serial number is selected from the plurality of registered accounts set an identity verification module, connected to the database module information, receiving a user account and a user password from any mobile communication device, and allowing the mobile communication device to perform an authorization unlocking procedure if the user account and the user password are the same as a set of registered account and registered password in the database module; an identity verification module, connected to the database module information, receiving a user account and a user password from any mobile communication device, and allowing the mobile communication device to perform an authorization unlocking procedure if the user account and the user password are the same as a set of registered account and registered password in the database module; A public key infrastructure module generates a plurality of key pairs using the registered near field communication chip serial numbers, stores the public keys in the key pairs and the registered near field communication chip serial numbers, and can digitally sign any message with any public key in any key pair to obtain a decryption code; and a decryption processing module, which is connected to the database module, The identity confirmation module and the public key infrastructure module are informationally connected to execute the authorization unlocking procedure, and the authorization unlocking procedure includes the following steps: a serial number receiving step: receiving a target near field communication chip serial number from an authorized mobile communication device that is allowed to execute the authorization unlocking procedure, and the target near field communication chip serial number is the serial number of the authorized mobile communication device. A near field communication chip for controlling a near field communication lock unlocking mechanism is obtained from a mobile communication device, and the near field communication chip has a private key in a key group generated by the near field communication chip serial number of the target; a first judgment step: judging whether the near field communication chip serial number of the target is one of the registered near field communication chip serial numbers, if not, stopping the authorization unlocking procedure; a second judgment step: judging whether the user account used by the authorized mobile communication device is the registered account set by the registered near field communication chip serial number corresponding to the near field communication chip serial number of the target, if not, stopping the authorization unlocking procedure; a random number receiving step: receiving a generated random number from the authorized mobile communication device, the generated random number The number is randomly generated by the near field communication chip; the unlocking code generation step: the target near field communication chip serial number and the generated random number are transmitted to the public key infrastructure module, and the public key infrastructure module uses the public key in the key group generated by the registered near field communication chip serial number that is the same as the target near field communication chip serial number to perform the unlocking code on the generated random number. Digital signature is performed to obtain the corresponding unlocking code; and unlocking step: the unlocking code is sent back to the near field communication chip through the authorized mobile communication device, and the near field communication chip digitally verifies the unlocking code with the private key to obtain a verification random number. If the verification random number is the same as the generated random number, the near field communication chip unlocks the near field communication lock.
依照本發明,該資料庫模組可進一步記錄該解鎖處理模組每次執行該授權解鎖程序所產生的資料,及每一註冊近場通訊晶片序號對應的近場通訊鎖的相關資料。 According to the present invention, the database module can further record the data generated by the unlocking processing module each time it executes the authorization unlocking procedure, and the relevant data of the NFC lock corresponding to each registered NFC chip serial number.
所述的授權開啟近場通訊鎖的資安管理系統可進一步包含一開鎖通知模組,該開鎖通知模組與該資料庫模組及該解鎖處理模組資訊連接,當具有一註冊近場通訊晶片序號被用於執行該授權解鎖程序時,該開鎖通知模組同步通知使用與該至少一註冊帳號相同的用戶帳號登錄的至少一行動通訊裝置。於該授權解鎖程序的第二判斷步驟中,若該授權解鎖程序因判斷結果為否而停止時,該開鎖通知模組進一步通知該授權行動通訊裝置操作者未被授權開鎖該近場通訊鎖。 The information security management system for authorizing the unlocking of the NFC lock may further include an unlock notification module, which is informationally connected to the database module and the unlock processing module. When a registered NFC chip serial number is used to execute the authorized unlocking procedure, the unlock notification module synchronously notifies at least one mobile communication device logged in with the same user account as the at least one registered account. In the second judgment step of the authorized unlocking procedure, if the authorized unlocking procedure stops due to a negative judgment result, the unlock notification module further notifies the authorized mobile communication device operator that he is not authorized to unlock the NFC lock.
依照本發明,該近場通訊鎖的相關資料包含該近場通訊鎖所保護的資訊或資產的分類的資訊標籤。該授權解鎖程序可進一步包含第一資訊標籤步驟:該解鎖處理模組發送該近場通訊鎖的資訊標籤至該授權行動通訊裝置並顯示於其上。 According to the present invention, the relevant data of the NFC lock includes information tags of the classification of the information or assets protected by the NFC lock. The authorization unlocking procedure may further include a first information tag step: the unlocking processing module sends the information tag of the NFC lock to the authorized mobile communication device and displays it on it.
依照本發明,每個近場通訊晶片亦可儲存一相關資料,該相關資料包含該近場通訊鎖所保護的資訊或資產的分類的資訊標籤。 According to the present invention, each NFC chip can also store relevant data, which includes information tags of the classification of information or assets protected by the NFC lock.
依照本發明,該授權解鎖程序可進一步包含第二資訊標籤步驟:該近場通訊鎖的該近場通訊晶片發送該近場通訊鎖的資訊標籤至該授權行動通訊裝置並顯示於其上。 According to the present invention, the authorization unlocking procedure may further include a second information tag step: the NFC chip of the NFC lock sends the information tag of the NFC lock to the authorized mobile communication device and displays it on it.
依照本發明,該授權解鎖程序還可進一步包含以下步驟:解鎖成功通知步驟:該近場通訊晶片透過該授權行動通訊裝置通知該解鎖處理模組開鎖成功;解鎖目的蒐集步驟:該解鎖處理模組於該授權行動通訊裝置上呈現一開鎖目的視窗,供開鎖者將該開鎖目的輸入該開鎖目的視窗或於該開鎖目的視窗中顯 示的選單中選擇開鎖原因,接收來自該授權行動通訊裝置傳送的該開鎖目的並儲存於該資料庫模組中。 According to the present invention, the authorized unlocking procedure may further include the following steps: Unlocking success notification step: the near field communication chip notifies the unlocking processing module of unlocking success through the authorized mobile communication device; Unlocking purpose collection step: the unlocking processing module presents an unlocking purpose window on the authorized mobile communication device, allowing the unlocker to input the unlocking purpose into the unlocking purpose window or select the unlocking reason in the menu displayed in the unlocking purpose window, receive the unlocking purpose sent from the authorized mobile communication device and store it in the database module.
所述的授權開啟近場通訊鎖的資安管理系統可進一步包含一資安通知模組,與該資料庫模組及該解鎖處理模組資訊連通,其中該資料庫模組進一步儲存每一開鎖目的對應的通知單位,當該解鎖處理模組將該近場通訊鎖解鎖後的開鎖目的儲存於該資料庫模組時,通知該對應的通知單位執行該次解鎖的用戶帳號。 The information security management system for authorizing the opening of the NFC lock may further include an information security notification module, which is in information communication with the database module and the unlocking processing module, wherein the database module further stores the notification unit corresponding to each unlocking purpose, and when the unlocking processing module stores the unlocking purpose of the NFC lock after unlocking in the database module, the corresponding notification unit is notified of the user account that performs the unlocking.
最好,該資料庫模組可進一步記錄每一註冊帳號綁定的一個人身份確認碼。因此,該授權解鎖程序可進一步包含以下步驟:個人身份確認碼獲取步驟:接收來該授權行動通訊裝置由開鎖者輸入的一個人身份確認碼;及個人身份確認碼確認步驟:判斷該個人身份確認碼是否為該些註冊帳號綁定的個人身份確認碼之一,若否,停止該授權解鎖程序。 Preferably, the database module can further record a personal identification code bound to each registered account. Therefore, the authorization unlocking procedure can further include the following steps: a personal identification code acquisition step: receiving a personal identification code input by the unlocker from the authorized mobile communication device; and a personal identification code confirmation step: determining whether the personal identification code is one of the personal identification codes bound to the registered accounts, and if not, stopping the authorization unlocking procedure.
本發明利用行動通訊裝置作為中繼器,本身不介入解鎖相關的運算。需要開鎖以取得受保護的資料或物品的人,身分確認模組與解鎖處理模組會先確認他的身分及管理權限,才會透過公開金鑰基礎架構模組對生成亂數進行數位簽章作業。在近場通訊晶片進行數位驗簽確認生成亂數無誤後,近場通訊鎖開啟。由此可以達成無鑰匙與密碼的工作環境,省去需要鑰匙與密碼授權開鎖的繁瑣。 The present invention uses a mobile communication device as a repeater and does not intervene in unlocking-related calculations. For a person who needs to unlock the lock to obtain protected data or items, the identity confirmation module and the unlocking processing module will first confirm his identity and management authority, and then digitally sign the generated random number through the public key infrastructure module. After the near-field communication chip performs digital signature verification to confirm that the generated random number is correct, the near-field communication lock is unlocked. This can achieve a keyless and password-free working environment, eliminating the cumbersomeness of requiring keys and passwords to authorize unlocking.
1:第一伺服器 1: First server
2:第二伺服器 2: Second server
3:第三伺服器 3: Third server
4:第一行動通訊裝置 4: First mobile communication device
4a:螢幕 4a: Screen
4b:開鎖目的視窗 4b: Unlock the destination window
5:第二行動通訊裝置 5: Second mobile communication device
5a:螢幕 5a: Screen
6:第三行動通訊裝置 6: Third mobile communication device
7:文件櫃 7: File Cabinet
8:文件夾 8: Folder
9:保險櫃 9: Safe
10:近場通訊鎖 10: Near Field Communication Lock
20:鎖具模組 20: Lock module
30:開鎖模組 30: Unlock module
31:近場通訊天線單元 31: Near field communication antenna unit
32:開鎖單元 32: Unlocking unit
33:處理單元 33: Processing unit
33a:近場通訊晶片 33a: Near field communication chip
33b:隨機存取記憶體 33b: Random Access Memory
33c:唯讀記憶體 33c: Read-only memory
33d:輸出輸入介面 33d: Input and output interface
100:資料庫模組 100: Database module
200:身分確認模組 200: Identity confirmation module
300:公開金鑰基礎架構模組 300: Public key infrastructure module
400:解鎖處理模組 400: Unlock processing module
500:開鎖通知模組 500: Unlock notification module
600:資安通知模組 600: Information security notification module
圖1為依照本發明實施方式的一種授權開啟近場通訊鎖的資安管理系統的元件與應用環境的示意圖。 Figure 1 is a schematic diagram of the components and application environment of an information security management system for authorizing the opening of a near field communication lock according to an embodiment of the present invention.
圖2為本發明應用的近場通訊鎖的元件方框圖。 Figure 2 is a block diagram of the components of the near field communication lock used in the present invention.
圖3表列每一個註冊近場通訊晶片序號所設定的資料。 Figure 3 lists the data set for each registered NFC chip serial number.
圖4為授權解鎖程序的流程圖。 Figure 4 is a flow chart of the authorization unlocking procedure.
圖5繪示一第二行動通訊裝置螢幕的顯示態樣。 Figure 5 shows the display of a second mobile communication device screen.
圖6為又一實施例中的授權解鎖程序的部分流程圖。 Figure 6 is a partial flow chart of the authorization unlocking procedure in another embodiment.
圖7繪示一第一行動通訊裝置螢幕的顯示態樣。 FIG7 shows the display of a first mobile communication device screen.
本發明將藉由參照下列的實施方式而更具體地描述。 The present invention will be described in more detail with reference to the following embodiments.
請見圖1,該圖為依照本發明實施方式的一種授權開啟近場通訊鎖的資安管理系統的元件與應用環境的示意圖。授權開啟近場通訊鎖的資安管理系統(以下簡稱本系統)安裝於一伺服器叢集中,藉由伺服器叢集的硬體架構而運作。伺服器叢集包含了一個以上的伺服器,彼此各司其職執行不同的任務,或是共同維持一個較大的工作負載服務而分工。依照本發明,伺服器叢集中的伺服器數量不受限制,本實施例中以3個伺服器為例來說明,分別是第一伺服器1、第二伺服器2與第三伺服器3。每個伺服器的硬體架構和一般伺服器架構無大差異,可包含中央處理器、記憶體、儲存裝置(比如硬碟)、輸出入單元等。這些硬體雖未繪示於圖1中,然其為伺服器領域的技術人員所應了解的架構。以下所介紹關於本發明的各個模組,為利用或配合上述現有的伺服器的設備而運行之本系統的技術要件。因此,它們可以是軟體,包含了特定的程式碼與資料,而在作業系統下運行於至少一部份的硬體架構中(比如程式碼與相關資料檔案儲存於儲存裝置中,在作業系統的運作下暫存於記憶體,而為中央處理器動態的調用執行)。另一方面,該些模組也可以是特製硬體,比如特殊應用積體電路(Application-Specific Integrated Circuit,ASIC)或外接卡,用以執行該些模組所賦予的作用。更有甚者,這些技術要件可以是部分是軟體、部分是硬體,依照產品設計人員的需求而有效整合,都在本專利所主張的技術範圍內。 Please see Figure 1, which is a schematic diagram of the components and application environment of an information security management system for authorizing the opening of a near-field communication lock according to an implementation method of the present invention. The information security management system for authorizing the opening of a near-field communication lock (hereinafter referred to as the system) is installed in a server cluster and operates through the hardware architecture of the server cluster. The server cluster includes more than one server, each of which performs different tasks or jointly maintains a larger workload service. According to the present invention, the number of servers in the server cluster is not limited. In this embodiment, three servers are used as an example, namely the first server 1, the second server 2 and the third server 3. The hardware architecture of each server is not much different from the general server architecture, and may include a central processing unit, memory, storage device (such as a hard disk), input and output units, etc. Although these hardware are not shown in Figure 1, they are architectures that technical personnel in the server field should understand. The following introduction to the various modules of the present invention is the technical requirements of the system that utilizes or cooperates with the above-mentioned existing server equipment. Therefore, they can be software, including specific program codes and data, and run in at least a part of the hardware architecture under the operating system (for example, program codes and related data files are stored in a storage device, temporarily stored in the memory under the operation of the operating system, and dynamically called and executed by the central processing unit). On the other hand, these modules can also be special hardware, such as application-specific integrated circuits (ASIC) or external cards, to perform the functions assigned to these modules. Moreover, these technical requirements can be partly software and partly hardware, and can be effectively integrated according to the needs of product designers, all within the technical scope advocated by this patent.
伺服器叢集通過網路N與數個行動通訊裝置資訊連接(圖1中以虛線箭號連接表示,可以是有線或無線連接的方式),行動通訊裝置可以是但不限於智慧型手機、平板電腦或智能穿戴裝置。然而,這些行動通訊裝置需要配置有近場通訊(Near-Field Communication,NFC)模組以形成近場通訊讀取器(NFC Reader),可以近場通訊方式與近場通訊標籤互通資訊(圖1中以點虛線箭號連接表示)。本實施例中以3個行動通訊裝置為例來說明,分別是第一行動通訊裝置4的智慧型手機、第二行動通訊裝置5的平板電腦與第三行動通訊裝置6的智能手錶。依照本發明,每一個行動通訊裝置的功能是用來當作資料傳輸的中繼器,提供本系統與多個以近場通訊鎖10管控開啟的設備或裝置通聯,以授權的解鎖碼來解鎖該些近場通訊鎖10,從而可以取得該設備或裝置內保護的資料或物品。在本實施例中,第一行動通訊裝置4要解鎖的是一個文件櫃7的底部滑櫃內側的近場通訊鎖10(因無法由外部看到,所以以虛線框表示),第二行動通訊裝置5要解鎖的是文件夾8上的一個近場通訊鎖10,第三行動通訊裝置6解鎖的是一個保險櫃9內部的近場通訊鎖10(因無法由外部看到,所以以虛線框表示)。 The server cluster is connected to several mobile communication devices through the network N (indicated by dotted arrow connections in Figure 1, which can be wired or wireless connections). The mobile communication devices can be but are not limited to smart phones, tablets or smart wearable devices. However, these mobile communication devices need to be equipped with a Near-Field Communication (NFC) module to form an NFC reader, which can exchange information with the NFC tag through near-field communication (indicated by the dotted-dashed arrow connection in Figure 1). In this embodiment, three mobile communication devices are used as an example for illustration, namely a smartphone of the first mobile communication device 4 , a tablet computer of the second mobile communication device 5 and a smart watch of the third mobile communication device 6 . According to the present invention, each mobile communication device functions as a data transmission repeater, providing the system with communication with multiple devices or apparatuses controlled by near-field communication locks 10, and unlocking the near-field communication locks 10 with authorized unlock codes, thereby obtaining the data or items protected in the devices or apparatuses. In this embodiment, the first mobile communication device 4 is to unlock a NFC lock 10 on the inner side of the bottom slide of a file cabinet 7 (it cannot be seen from the outside, so it is represented by a dotted frame), the second mobile communication device 5 is to unlock a NFC lock 10 on a folder 8, and the third mobile communication device 6 is to unlock a NFC lock 10 inside a safe 9 (it cannot be seen from the outside, so it is represented by a dotted frame).
近場通訊鎖10是個結合電子元件與實體鎖具的複合鎖。請見圖2,該圖為本發明應用的近場通訊鎖10的元件方框圖。近場通訊鎖10的結構包含了一鎖具模組20及一開鎖模組30。鎖具模組20通常包含兩個可以相互鎖制且分別安裝在要被鎖結物件上的鎖具鎖組合,一個鎖具具有配合另一鎖具的對應結構,開鎖者操作其中之一解鎖鎖具模組20。形態上,鎖具模組20可以是個不帶動力的機械鎖,也可以是需要電力或自帶電力的電子(磁)鎖,可依不同的保護對象而使用不同的鎖具模組20。 The NFC lock 10 is a composite lock that combines electronic components and physical locks. See FIG2, which is a block diagram of the components of the NFC lock 10 used in the present invention. The structure of the NFC lock 10 includes a lock module 20 and an unlocking module 30. The lock module 20 usually includes two lock assemblies that can be locked to each other and are respectively installed on the objects to be locked. One lock has a corresponding structure that matches the other lock. The unlocker operates one of them to unlock the lock module 20. In terms of form, the lock module 20 can be a mechanical lock without power, or an electronic (magnetic) lock that requires power or has its own power. Different lock modules 20 can be used according to different protection objects.
開鎖模組30是在滿足特定條件時,以機械驅動或電磁場改變的方式解鎖鎖具模組20的技術元件。通常來說,開鎖模組30包含了一近場通訊天線單元31、一開鎖單元32與一處理單元33。近場通訊天線單元31是用來接收近場通訊訊 號並由其中獲取電能的工具,該訊號中包含了來自本系統的解鎖訊號,並轉換來自行動通訊裝置發出的電磁能為電能。本實施例使用NFC 13.56MHz頻段傳輸解鎖訊號,以線圈感應給電的方式提供開鎖時所需要的電力給開鎖模組30。解鎖訊號是一種電磁波訊號,可以連續傳輸或封包傳輸方式傳輸一解鎖碼。開鎖單元32是開鎖模組30與鎖具模組20耦合,實際驅動鎖具模組20以機械或電磁方式解鎖的技術元件。舉例來說,如果鎖具模組20是個機械鎖,其需要受到外部的衝壓或轉動以解除複雜的機械鎖制,開鎖單元32可以是個以步進馬達、齒輪組與控制電路組合的模組(未繪示)。處理單元33與近場通訊天線單元31電訊號連接以接收來自近場通訊天線單元31的電力與解鎖訊號,同時也並與開鎖單元32耦接。處理單元33的功能是對該解鎖訊號內的解鎖碼執行認證,且當認證成功後,通知開鎖單元32執行開鎖動作。處理單元33包含了一近場通訊晶片33a、一隨機存取記憶體33b、一唯讀記憶體33c與一輸出輸入介面33d。近場通訊晶片33a用來處理接收的訊號,特別是可以程式化來隨機生成一生成亂數與處理解鎖訊號內的解鎖碼,相關的程式碼儲存於唯讀記憶體33c,而近場通訊晶片33a運作時產生的數據可暫存於隨機存取記憶體33b中,輸出輸入介面33d是處理單元33與近場通訊天線單元31及開鎖單元32互通資訊的裝置。 The unlocking module 30 is a technical component that unlocks the lock module 20 by mechanical drive or electromagnetic field change when specific conditions are met. Generally speaking, the unlocking module 30 includes a near field communication antenna unit 31, an unlocking unit 32 and a processing unit 33. The near field communication antenna unit 31 is a tool for receiving near field communication signals and obtaining electrical energy therefrom. The signal includes an unlocking signal from the system and converts the electromagnetic energy emitted by the automatic communication device into electrical energy. This embodiment uses the NFC 13.56MHz frequency band to transmit the unlocking signal, and provides the unlocking module 30 with the power required for unlocking by coil induction power supply. The unlocking signal is an electromagnetic wave signal that can transmit an unlocking code in a continuous transmission or packet transmission mode. The unlocking unit 32 is a technical component that couples the unlocking module 30 with the lock module 20 and actually drives the lock module 20 to unlock mechanically or electromagnetically. For example, if the lock module 20 is a mechanical lock that needs to be subjected to external impact or rotation to release the complex mechanical lock, the unlocking unit 32 can be a module (not shown) composed of a stepping motor, a gear set and a control circuit. The processing unit 33 is electrically connected to the NFC antenna unit 31 to receive power and unlocking signals from the NFC antenna unit 31, and is also coupled to the unlocking unit 32. The function of the processing unit 33 is to authenticate the unlocking code in the unlocking signal, and when the authentication is successful, notify the unlocking unit 32 to perform the unlocking action. The processing unit 33 includes a NFC chip 33a, a random access memory 33b, a read-only memory 33c, and an input/output interface 33d. The NFC chip 33a is used to process the received signal, and in particular, it can be programmed to randomly generate a random number and process the unlocking code in the unlocking signal. The relevant program code is stored in the read-only memory 33c, and the data generated when the NFC chip 33a is in operation can be temporarily stored in the random access memory 33b. The input and output interface 33d is a device for the processing unit 33 to communicate with the NFC antenna unit 31 and the unlocking unit 32.
本系統包含了一資料庫模組100、一身分確認模組200、一公開金鑰基礎架構模組300、一解鎖處理模組400、一開鎖通知模組500與一資安通知模組600。這些模組型態、功能與互動作用,將於下方配合對應的圖式詳細說明。要注意的是,各模組安裝的伺服器僅為示例,實際上可不依照該架構進行。 The system includes a database module 100, an identity verification module 200, a public key infrastructure module 300, an unlocking processing module 400, an unlocking notification module 500 and an information security notification module 600. The types, functions and interactions of these modules will be described in detail below with the corresponding diagrams. It should be noted that the servers where each module is installed are only examples and may not be based on the actual architecture.
資料庫模組100安裝於第一伺服器1中,其功能是用來儲存數組註冊帳號與註冊密碼、數個註冊近場通訊晶片序號,以及每一註冊近場通訊晶片序號所設定的至少一註冊帳號。本系統應用於一個對機密文件或物品有管控需求的公司,該公司除了每一個保護文件或物品的裝置,如前述的文件櫃7、文件夾8與保 險櫃9都要安裝近場通訊鎖10外,公司所有員工都要因能授權解鎖全部或部分該些近場通訊鎖10而以他們使用的行動通訊裝置向本系統進行註冊,註冊的過程即是在資料庫模組100留下專屬的一組註冊帳號與註冊密碼,登錄本系統時就依靠該組帳密。註冊近場通訊晶片序號是本系統能授權開鎖的近場通訊鎖10中,近場通訊晶片33a中儲存的近場通訊晶片序號。「註冊」二字表示資料庫模組100已具有且被授權使用對應的近場通訊晶片序號。關於每一註冊近場通訊晶片序號所設定的註冊帳號之態樣,請見圖3,該圖表列每一個註冊近場通訊晶片序號所設定的資料。圖3為本系統應用在一家小公司的例子。該公司有三個成員,分別是員工A、員工B與老闆。員工A以第一行動通訊裝置4註冊了註冊帳號N0001,員工B以第二行動通訊裝置5註冊了註冊帳號N0002,老闆以第三行動通訊裝置6註冊了註冊帳號N0003。該公司使用了10個近場通訊鎖,其註冊近場通訊晶片序號分別是NFC0001~NFC0010。以註冊近場通訊晶片序號NFC0001來說,其設定的註冊帳號為N0001,意味只有註冊帳號N0001才有管理權限來開啟具有註冊近場通訊晶片序號NFC0001的近場通訊鎖,該鎖通常是保護私人用品或高等級保密的資訊或資產。相對地,以註冊近場通訊晶片序號NFC0007來說,其設定的註冊帳號為N0001~N0003,意味所有註冊帳號都有管理權限來開啟具有註冊近場通訊晶片序號NFC0007的近場通訊鎖,該鎖通常是保護共用的資訊或資產。但是像註冊近場通訊晶片序號NFC0005,只有註冊帳號N0002與N0003才有管理權限來開啟對應的近場通訊鎖。在公司管理上來說是排除了員工A取得該鎖保護的資訊或資產的可能性。 The database module 100 is installed in the first server 1, and is used to store a set of registered accounts and registered passwords, a plurality of registered near field communication chip serial numbers, and at least one registered account set for each registered near field communication chip serial number. This system is applied to a company that has a need to control confidential documents or items. In addition to installing a NFC lock 10 on each device that protects documents or items, such as the aforementioned file cabinet 7, file folder 8, and safe 9, all employees of the company must register with the system with their mobile communication devices in order to be authorized to unlock all or part of these NFC locks 10. The registration process is to leave a unique set of registration accounts and registration passwords in the database module 100, and the set of accounts and passwords is used when logging into the system. The registered NFC chip serial number is the NFC chip serial number stored in the NFC chip 33a of the NFC lock 10 that the system can authorize to unlock. The word "registered" indicates that the database module 100 has and is authorized to use the corresponding near field communication chip serial number. For the state of the registered account set for each registered near field communication chip serial number, please see Figure 3, which lists the data set for each registered near field communication chip serial number. Figure 3 is an example of the application of this system in a small company. The company has three members, namely employee A, employee B and the boss. Employee A registered the registered account N0001 with the first mobile communication device 4, employee B registered the registered account N0002 with the second mobile communication device 5, and the boss registered the registered account N0003 with the third mobile communication device 6. The company uses 10 NFC locks, whose registered NFC chip serial numbers are NFC0001 to NFC0010. For the registered NFC chip serial number NFC0001, its set registration account is N0001, which means that only the registered account N0001 has the management authority to open the NFC lock with the registered NFC chip serial number NFC0001. The lock is usually used to protect personal belongings or highly confidential information or assets. In contrast, for the registered NFC chip serial number NFC0007, the registered accounts are set to N0001~N0003, which means that all registered accounts have the management authority to open the NFC lock with the registered NFC chip serial number NFC0007, which usually protects shared information or assets. However, for the registered NFC chip serial number NFC0005, only the registered accounts N0002 and N0003 have the management authority to open the corresponding NFC lock. From the perspective of company management, it excludes the possibility of employee A obtaining the information or assets protected by the lock.
身分確認模組200安裝於第二伺服器2中,與資料庫模組100資訊連接,其功能是接收來自任一行動通訊裝置的一用戶帳號與一用戶密碼。用戶帳號與用戶密碼指的是由行動通訊裝置輸入並傳向第二伺服器2的一組帳密,如果輸入錯誤便無法為本系統所接受,進而提供解鎖服務。反之,若前述的用戶帳號與用 戶密碼與資料庫模組中的一組註冊帳號與註冊密碼相同,則允許該行動通訊裝置進行一授權解鎖程序。後文會詳述該授權解鎖程序。 The identity confirmation module 200 is installed in the second server 2 and is informationally connected to the database module 100. Its function is to receive a user account and a user password from any mobile communication device. The user account and user password refer to a set of account and password input by the mobile communication device and transmitted to the second server 2. If the input is incorrect, it cannot be accepted by the system and the unlocking service is not provided. On the contrary, if the aforementioned user account and user password are the same as a set of registered account and registered password in the database module, the mobile communication device is allowed to perform an authorized unlocking procedure. The authorized unlocking procedure will be described in detail later.
公開金鑰基礎架構模組300安裝於第三伺服器3中,公開金鑰基礎架構(Public Key Infrastructure,PKI)是一組由硬體、軟體、參與者、管理政策與流程組成的基礎架構,其目的在於創造、管理、分配、使用、儲存以及復原數位憑證。公開金鑰基礎架構模組300便是完成公開金鑰基礎架構的目的,其使用的加密技術和其它公開金鑰基礎架構平台一樣。實作上,公開金鑰基礎架構模組300以前述該些註冊近場通訊晶片序號分別生成數對密鑰組,儲存該些密鑰組中的公鑰與該些註冊近場通訊晶片序號,並可以任一對密鑰組中的公鑰對任一訊息進行數位簽章,以獲得一解鎖碼,而解鎖碼包含於前述的解鎖訊號中,通過行動通訊裝置傳向對應的近場通訊鎖。 The public key infrastructure module 300 is installed in the third server 3. The public key infrastructure (PKI) is an infrastructure composed of hardware, software, participants, management policies and processes, and its purpose is to create, manage, distribute, use, store and recover digital certificates. The public key infrastructure module 300 is to complete the purpose of the public key infrastructure, and the encryption technology it uses is the same as other public key infrastructure platforms. In practice, the public key infrastructure module 300 generates several pairs of key sets using the aforementioned registered NFC chip serial numbers, stores the public keys in the key sets and the registered NFC chip serial numbers, and can digitally sign any message with the public key in any pair of key sets to obtain a decryption code, which is included in the aforementioned decryption signal and transmitted to the corresponding NFC lock through the mobile communication device.
解鎖處理模組400安裝於第二伺服器2中,與資料庫模組100、身分確認模組200及公開金鑰基礎架構模組300資訊連接。解鎖處理模組400是執行授權解鎖程序的主要技術元件。請見圖4,該圖為授權解鎖程序的流程圖,該授權解鎖程序包含以下步驟。 The unlocking processing module 400 is installed in the second server 2 and is informationally connected to the database module 100, the identity confirmation module 200 and the public key infrastructure module 300. The unlocking processing module 400 is the main technical component for executing the authorization unlocking procedure. See Figure 4, which is a flow chart of the authorization unlocking procedure, and the authorization unlocking procedure includes the following steps.
第一步驟:序號接收步驟(S01)。序號接收步驟的具體部內容為接收來自受允許執行該授權解鎖程序的一授權行動通訊裝置的一標的近場通訊晶片序號,該標的近場通訊晶片序號為該授權行動通訊裝置取自控制一近場通訊鎖開鎖機制的一近場通訊晶片,該近場通訊晶片具有以該標的近場通訊晶片序號生成的密鑰組中的一私鑰。舉例來說,授權行動通訊裝置是第一行動通訊裝置4,也就是員工A在使用他的註冊帳號N0001登錄本系統並獲得授權後,就可以接近任一個近場通訊鎖以取得其中近場通訊晶片內的近場通訊晶片序號。為了明確說明,被取得的近場通訊晶片序號稱為標的近場通訊晶片序號,有別於其它未被 取得的註冊近場通訊晶片序號以及其它不屬於本系統的近場通訊晶片的近場通訊晶片序號。 The first step: serial number receiving step (S01). The specific content of the serial number receiving step is to receive a target NFC chip serial number from an authorized mobile communication device that is allowed to execute the authorization unlocking procedure. The target NFC chip serial number is a NFC chip that controls a NFC lock unlocking mechanism obtained by the authorized mobile communication device. The NFC chip has a private key in the key set generated by the target NFC chip serial number. For example, the authorized mobile communication device is the first mobile communication device 4, that is, employee A can approach any NFC lock to obtain the NFC chip serial number in the NFC chip after logging into the system using his registered account N0001 and obtaining authorization. For the sake of clarity, the acquired NFC chip serial number is called the target NFC chip serial number, which is different from other registered NFC chip serial numbers that have not been acquired and other NFC chip serial numbers of NFC chips that do not belong to this system.
第二步驟:第一判斷步驟(S02)。第一判斷步驟為判斷該標的近場通訊晶片序號是否為該些註冊近場通訊晶片序號中之一,若否,停止該授權解鎖程序。本步驟的目的是要確定授權行動通訊裝置接近的近場通訊晶片是否是本系統註冊使用的。如果按照前述判斷的結果是”否”,那麼授權解鎖程序停止,解鎖處理模組400也可以向授權行動通訊裝置傳送類似「此鎖非本系統管制,請詢問管理人員」等訊息,讓授權行動通訊裝置的使用人能知道這個近場通訊鎖是不能被解開的。如果判斷的結果為”是”,那麼解鎖處理模組400進行下一步驟。 Step 2: The first judgment step (S02). The first judgment step is to judge whether the target near-field communication chip serial number is one of the registered near-field communication chip serial numbers. If not, the authorization unlocking procedure is stopped. The purpose of this step is to determine whether the near-field communication chip approached by the authorized mobile communication device is registered and used by this system. If the result of the above judgment is "no", then the authorization unlocking procedure is stopped, and the unlocking processing module 400 can also send a message such as "This lock is not controlled by this system, please ask the administrator" to the authorized mobile communication device, so that the user of the authorized mobile communication device can know that this near-field communication lock cannot be unlocked. If the result of the judgment is "yes", then the unlocking processing module 400 proceeds to the next step.
第三步驟:第二判斷步驟(S03)。第二判斷步驟為判斷該授權行動通訊裝置使用的用戶帳號是否為該標的近場通訊晶片序號對應的該註冊近場通訊晶片序號所設定的該註冊帳號,若否,停止該授權解鎖程序。第一判斷步驟是針對近場通訊鎖的開鎖管制,第二判斷步驟是針對使用人的權限管制。也就是只有在用戶帳號相同的註冊帳號設定在與標的近場通訊晶片序號對應的註冊近場通訊晶片上的情況下,解鎖處理模組400才會進行下一步驟。以圖3為例,員工B在使用他的註冊帳號N0002登錄本系統並獲得授權後,他可以開鎖的近場通訊鎖僅限於註冊近場通訊晶片序號為NFC0004~NFC0008,其它的近場通訊鎖在進行授權解鎖程序時到此步驟都會停止。 Step 3: Second judgment step (S03). The second judgment step is to judge whether the user account used by the authorized mobile communication device is the registered account set by the registered near-field communication chip serial number corresponding to the target near-field communication chip serial number. If not, the authorization unlocking procedure is stopped. The first judgment step is for the unlocking control of the near-field communication lock, and the second judgment step is for the authority control of the user. That is, only when the registered account with the same user account is set on the registered near-field communication chip corresponding to the target near-field communication chip serial number, the unlocking processing module 400 will proceed to the next step. Taking Figure 3 as an example, after employee B uses his registered account N0002 to log in to the system and obtains authorization, the NFC locks he can unlock are limited to those with registered NFC chip serial numbers NFC0004~NFC0008. Other NFC locks will stop at this step during the authorization unlocking process.
第四步驟:亂數接收步驟(S04)。亂數接收步驟為接收來自該授權行動通訊裝置的一生成亂數,該生成亂數為近場通訊晶片隨機生成。如前所述,生成亂數是與授權行動通訊裝置進行近場通訊的近場通訊鎖中的近場通訊晶片33a隨機生成的,其目的是供公開金鑰基礎架構模組300進行數位簽章之用。實作上,本步驟也可併入第一步驟,同步由解鎖處理模組400處理。 Step 4: random number receiving step (S04). The random number receiving step is to receive a generated random number from the authorized mobile communication device, and the generated random number is randomly generated by the near field communication chip. As mentioned above, the generated random number is randomly generated by the near field communication chip 33a in the near field communication lock that performs near field communication with the authorized mobile communication device, and its purpose is to be used for digital signature by the public key infrastructure module 300. In practice, this step can also be incorporated into the first step and processed synchronously by the unlocking processing module 400.
第五步驟:解鎖碼生成步驟(S05)。解鎖碼生成步驟為將該標的近場通訊晶片序號與該生成亂數傳給公開金鑰基礎架構模組300,公開金鑰基礎架構模組300使用與該標的近場通訊晶片序號相同的註冊近場通訊晶片序號生成的密鑰組中的公鑰,對該生成亂數進行數位簽章以獲得對應的解鎖碼。本步驟的目的是利用公開金鑰基礎架構技術,對近場通訊鎖產生的生成亂數進行數位簽章,用得到的一串解鎖碼供近場通訊鎖判斷是否進行解鎖。 Step 5: Unlock code generation step (S05). The unlock code generation step is to transmit the target NFC chip serial number and the generated random number to the public key infrastructure module 300. The public key infrastructure module 300 uses the public key in the key group generated by the registered NFC chip serial number that is the same as the target NFC chip serial number to digitally sign the generated random number to obtain the corresponding unlock code. The purpose of this step is to use the public key infrastructure technology to digitally sign the generated random number generated by the NFC lock, and use the obtained unlock code for the NFC lock to determine whether to unlock.
第六步驟:解鎖步驟(S06)。解鎖步驟為將該解鎖碼透過該授權行動通訊裝置回傳給該近場通訊晶片,該近場通訊晶片以該私鑰對該解鎖碼進行數位驗簽以獲得一驗證亂數,若該驗證亂數與該生成亂數相同,則近場通訊晶片開鎖該近場通訊鎖。解鎖碼在傳輸的過程中可能套用了傳輸協議的表頭與表尾,於數位驗簽時需要去除。本步驟使近場通訊晶片開鎖近場通訊鎖的要點是讓近場通訊晶片執行相對於數位簽章作業的數位驗簽作業,在確認結果與發出的生成亂數相同時才解鎖。由前述說明可知,在整個解鎖過程中,授權行動通訊裝置僅作為資訊傳輸的中繼器,本身不介入解鎖相關的運算。需要開鎖以取得受保護的資料或物品的人,本系統會先確認他的身分及管理權限才會執行後半部的步驟。操作上,本系統僅在註冊近場通訊晶片序號設定註冊帳號時要系統管理員介入,之後的開鎖作業都是自動化的。 Step 6: Unlocking step (S06). The unlocking step is to transmit the unlocking code back to the NFC chip through the authorized mobile communication device. The NFC chip uses the private key to digitally verify the unlocking code to obtain a verification random number. If the verification random number is the same as the generated random number, the NFC chip unlocks the NFC lock. The unlocking code may use the header and footer of the transmission protocol during the transmission process, which needs to be removed during the digital verification. The key point of this step to allow the NFC chip to unlock the NFC lock is to let the NFC chip perform a digital verification operation relative to the digital signature operation, and unlock it only when the confirmation result is the same as the generated random number issued. From the above explanation, it can be seen that in the entire unlocking process, the authorized mobile communication device only acts as a relay for information transmission and does not participate in the unlocking-related calculations. For those who need to unlock to obtain protected data or items, this system will first confirm his identity and management authority before executing the second half of the steps. In terms of operation, this system only requires the intervention of the system administrator when registering the near field communication chip serial number and setting the registration account, and the subsequent unlocking operations are all automated.
開鎖通知模組500安裝於第二伺服器2中,與資料庫模組100及解鎖處理模組資訊400連接。當具有一註冊近場通訊晶片序號被用於執行授權解鎖程序時,開鎖通知模組500可同步通知使用與該至少一註冊帳號相同的用戶帳號登錄的至少一行動通訊裝置。如圖3所示,當註冊近場通訊晶片序號NFC0006以註冊帳號N0002被用於執行授權解鎖程序時,由於該註冊近場通訊晶片序號所設定的註冊帳號還有N0003,也就是老闆的註冊帳號,如果該老闆使用他的註冊帳號作為用戶帳號登錄身分確認模組200,開鎖通知模組500會同步通知老闆使用的第 三行動通訊裝置6。開鎖通知模組500通知的具體內容是註冊近場通訊晶片序號NFC0006對應的近場通訊鎖正在被使用註冊帳號N0002的人開啟,同步讓相關當事人知道特定鎖的現況。當然,像具有註冊近場通訊晶片序號NFC0001的近場通訊鎖,由於它是供私人存放物品,開啟時可以不通知員工A。然而,考慮到也有可能有盜用註冊帳號的情況,本系統也可設定在當事人開啟自用近場通訊鎖時接收開鎖通知模組500回報的功能。在此情況下,於該授權解鎖程序的第二判斷步驟中,若授權解鎖程序因判斷結果為”否”而停止時,也就是雖能執行授權解鎖程序但解鎖到了沒有管理權限的近場通訊鎖時,開鎖通知模組500還會進一步通知授權行動通訊裝置操作者未被授權開鎖該近場通訊鎖。然而這種開錯鎖的情況可能是無意的,其過程僅會記錄於資料庫模組100中,開鎖通知模組500不會通報以該註冊近場通訊晶片序號設定的其它註冊帳號登錄的行動通訊裝置。 The unlock notification module 500 is installed in the second server 2 and connected to the database module 100 and the unlock processing module information 400. When a registered near field communication chip serial number is used to execute the authorization unlocking procedure, the unlock notification module 500 can synchronously notify at least one mobile communication device logged in with the same user account as the at least one registered account. As shown in FIG. 3 , when the registered NFC chip serial number NFC0006 is used to execute the authorization unlocking procedure with the registered account number N0002, since the registered account number set by the registered NFC chip serial number also has N0003, which is the registered account number of the boss, if the boss uses his registered account number as the user account to log in to the identity confirmation module 200, the unlocking notification module 500 will synchronously notify the third mobile communication device 6 used by the boss. The specific content of the notification of the unlocking notification module 500 is that the NFC lock corresponding to the registered NFC chip serial number NFC0006 is being opened by the person using the registered account N0002, and the relevant parties are informed of the current status of the specific lock. Of course, for the NFC lock with the registered NFC chip serial number NFC0001, since it is for private storage of items, it is not necessary to notify employee A when it is opened. However, considering that there may be the possibility of theft of the registered account, the system can also be set to receive the function of the unlocking notification module 500 report when the party opens the NFC lock for personal use. In this case, in the second judgment step of the authorization unlocking procedure, if the authorization unlocking procedure stops due to the judgment result of "no", that is, although the authorization unlocking procedure can be executed but the NFC lock without management authority is unlocked, the unlocking notification module 500 will further notify the authorized mobile communication device operator that he is not authorized to unlock the NFC lock. However, this kind of wrong unlocking may be unintentional, and the process will only be recorded in the database module 100. The unlocking notification module 500 will not notify the mobile communication device logged in with other registered accounts set by the registered NFC chip serial number.
對於某些內控較嚴的公司來說,開鎖過程的細節都需要被記錄,以防範資安事故的發生,或發生資安事故時的後續處理。為了達到此目的,資料庫模組100需要進一步記錄解鎖處理模組400每次執行授權解鎖程序所產生的資料,且不限於解鎖是成功或是失敗。舉例來說,執行授權解鎖程序所產生的資料可以包含了發生時間、操作解鎖的註冊帳號、標的近場通訊晶片序號、解鎖成功或失敗的原因等。此外,資料庫模組100也記錄了每一註冊近場通訊晶片序號對應的近場通訊鎖的相關資料。依照本發明,相關資料包含了近場通訊鎖所保護的資訊或資產的分類的資訊標籤。為了對此有較佳的理解,請復見圖3。以具有註冊近場通訊晶片序號NFC0002的近場通訊鎖為例來說明,該鎖應用於一個置物櫃,該置物櫃內存放了歷次出貨的貨品抽檢樣、出貨文件與一些參考書籍,那資訊標籤內容可以簡易地具有文字為大貨樣品、一般文件與書籍。資訊標籤的功用是讓開鎖者在未解鎖前可以知道該近場通訊鎖鎖住物件中保護的東西的類型。實作上,資訊標籤也可以是對應的圖像,不限於文字。 For some companies with strict internal control, the details of the unlocking process need to be recorded to prevent the occurrence of information security incidents or to handle the subsequent information security incidents. To achieve this goal, the database module 100 needs to further record the data generated by the unlocking processing module 400 each time it executes the authorization unlocking procedure, and is not limited to whether the unlocking is successful or failed. For example, the data generated by executing the authorization unlocking procedure can include the time of occurrence, the registered account of the unlocking operation, the target NFC chip serial number, the reason for the success or failure of the unlocking, etc. In addition, the database module 100 also records the relevant data of the NFC lock corresponding to each registered NFC chip serial number. According to the present invention, the relevant data includes information tags of the classification of information or assets protected by the NFC lock. For a better understanding of this, please refer to Figure 3. Take the NFC lock with the registered NFC chip serial number NFC0002 as an example. The lock is applied to a storage cabinet, which stores samples of goods shipped in the past, shipping documents and some reference books. The content of the information tag can simply have the text of bulk samples, general documents and books. The function of the information tag is to let the unlocker know the type of things protected in the object locked by the NFC lock before unlocking. In practice, the information tag can also be a corresponding image, not limited to text.
當資料庫模組100記錄了解鎖處理模組400每次執行授權解鎖程序所產生的資料及對應的近場通訊鎖的相關資料後,解鎖處理模組400可以在第一步驟後的任二步驟間,或是接在第六步驟後,於該授權解鎖程序進一步增加一第一資訊標籤步驟。第一資訊標籤步驟的具體內容為:發送該近場通訊鎖的資訊標籤至該授權行動通訊裝置並顯示於其上。以第二行動通訊裝置5作為授權行動通訊裝置解鎖具有註冊近場通訊晶片序號NFC0005的近場通訊鎖10為例來說明,請參見圖5,該圖繪示第二行動通訊裝置5的螢幕5a的顯示態樣。螢幕5a顯示的內容有包含該些資訊標籤的內含物分類,以及其它通知事項,比如告知在授權解鎖程序中的「開鎖中」文字及相關動畫。這些資訊可透過安裝於每一行動通訊裝置上的行動通訊軟體來動態顯示。 After the database module 100 records the data generated by the unlocking processing module 400 each time executing the authorization unlocking procedure and the corresponding NFC lock related data, the unlocking processing module 400 can further add a first information tag step to the authorization unlocking procedure between any two steps after the first step, or after the sixth step. The specific content of the first information tag step is: sending the information tag of the NFC lock to the authorized mobile communication device and displaying it on it. Take the second mobile communication device 5 as an authorized mobile communication device to unlock the NFC lock 10 with the registered NFC chip serial number NFC0005 as an example, please refer to Figure 5, which shows the display state of the screen 5a of the second mobile communication device 5. The content displayed on the screen 5a includes the content classification of the information tags, and other notification matters, such as the text "Unlocking" and related animations informing that the authorization unlocking process is in progress. This information can be dynamically displayed through the mobile communication software installed on each mobile communication device.
在前一實施例中,每一註冊近場通訊晶片序號對應的近場通訊鎖的相關資料是記錄在資料庫模組100,受解鎖處理模組400調用而呈現於授權行動通訊裝置的螢幕上。在另一實施例中,每個近場通訊晶片內也可儲存一相關資料,相關資料即包含前述的近場通訊鎖所保護的資訊或資產的分類的資訊標籤。易言之,資訊標籤來源變了。因此,本系統的解鎖處理模組400也可以在第一步驟後的任二步驟間,或是接在第六步驟後,於該授權解鎖程序進一步增加一第二資訊標籤步驟。第二資訊標籤步驟的具體內容為:近場通訊鎖的近場通訊晶片發送該近場通訊鎖的資訊標籤至授權行動通訊裝置並顯示於其上。顯示結果與圖5相同。第二資訊標籤步驟與第一資訊標籤步驟因為實施條件不同,必須擇一實施。 In the previous embodiment, the relevant data of the NFC lock corresponding to each registered NFC chip serial number is recorded in the database module 100, called by the unlocking processing module 400 and presented on the screen of the authorized mobile communication device. In another embodiment, each NFC chip can also store relevant data, and the relevant data includes the information label of the classification of the information or assets protected by the aforementioned NFC lock. In other words, the source of the information label has changed. Therefore, the unlocking processing module 400 of the present system can also further add a second information label step to the authorization unlocking procedure between any two steps after the first step, or after the sixth step. The specific content of the second information tag step is: the NFC chip of the NFC lock sends the information tag of the NFC lock to the authorized mobile communication device and displays it on it. The display result is the same as Figure 5. The second information tag step and the first information tag step have different implementation conditions, so you must choose one to implement.
如果考慮開鎖者使用的行動通訊裝置可能遺失或被有心人偷取,進而以之開啟特定的近場通訊鎖的情況發生,本發明也有對應的解決方式。為此,資料庫模組100可進一步記錄每一註冊帳號綁定的一個人身份確認碼(Personal Identification Number,PIN)。這是一個開鎖者額外設定、不同於登錄密碼的另一組密碼,其用途說明如下。授權解鎖程序可進一步於第一步驟後及第五步驟前 的任一時點包含以下步驟:A、個人身份確認碼獲取步驟:接收來該授權行動通訊裝置由開鎖者輸入的一個人身份確認碼;及B、個人身份確認碼確認步驟:判斷該個人身份確認碼是否為該些註冊帳號綁定的個人身份確認碼之一,若否,停止該授權解鎖程序。步驟A是在解鎖碼生成之前,動態地「考驗」開鎖者是否記得他曾經註冊登記的個人身份確認碼。如果開鎖者是註冊帳號所有人本人,那他不會忘記個人身份確認碼,輸入正確的個人身份確認碼才完成解鎖,等於為本系統操作再進行一次保障。輸入個人身份確認碼後如果是正確的情況就會續行後面的步驟,如果不正確才停止授權解鎖程序。 If the mobile communication device used by the unlocker may be lost or stolen by someone with bad intentions, and then used to unlock a specific NFC lock, the present invention also has a corresponding solution. To this end, the database module 100 can further record a personal identification number (PIN) bound to each registered account. This is another set of passwords set by the unlocker, which is different from the login password, and its use is explained as follows. The authorization unlocking procedure may further include the following steps at any time point after the first step and before the fifth step: A. Personal identity confirmation code acquisition step: receiving a personal identity confirmation code input by the unlocker from the authorized mobile communication device; and B. Personal identity confirmation code confirmation step: determining whether the personal identity confirmation code is one of the personal identity confirmation codes bound to the registered accounts, if not, stopping the authorization unlocking procedure. Step A is to dynamically "test" whether the unlocker remembers the personal identity confirmation code he has registered before the unlocking code is generated. If the unlocker is the registered account owner, he will not forget the personal identification code. He will enter the correct personal identification code to complete the unlocking, which is equivalent to another guarantee for the operation of this system. After entering the personal identification code, if it is correct, the subsequent steps will be continued. If it is incorrect, the authorization unlocking process will be stopped.
在通訊環境噪訊低的條件下,整個解鎖過程非常快,開鎖者不用等太久就可以解鎖取物。然而,如果通訊環境中噪訊高,近場通訊鎖與伺服器間的通訊鑰往來多次才能完成解鎖,那必須要告訴等待解鎖的開鎖者何時成功,免得他在無心的情況下認為解鎖成功,從而硬扯近場通訊鎖造成破壞,或是認為系統故障失靈。又,基於資安考慮,近場通訊鎖在開啟後最好開啟的開鎖者可以留下他本次開鎖的目的,以便未來有資安事故發生時可以循線追蹤。在以下的實施例中,解鎖處理模組400接續授權解鎖程序的第六步驟後有其它步驟,以完善整個程序。 In a low-noise communication environment, the entire unlocking process is very fast, and the unlocker does not have to wait too long to unlock and retrieve the item. However, if the noise in the communication environment is high, the communication key between the NFC lock and the server must be communicated multiple times to complete the unlocking. In this case, the unlocker waiting for the unlocking must be informed when the unlocking is successful, so that he will not accidentally think that the unlocking is successful, thereby forcibly pulling the NFC lock to cause damage, or thinking that the system is malfunctioning. In addition, based on information security considerations, it is best for the unlocker to leave a note of his purpose for unlocking the NFC lock after it is opened, so that it can be tracked in the event of an information security incident in the future. In the following embodiments, the unlocking processing module 400 continues the sixth step of the authorization unlocking procedure and then has other steps to complete the entire procedure.
請見圖6,該圖為又一實施例中的授權解鎖程序的部分流程圖。第七步驟:解鎖成功通知步驟(S07)。解鎖成功通知步驟近場通訊晶片透過授權行動通訊裝置通知解鎖處理模組400開鎖成功。第八步驟:解鎖目的蒐集步驟(S08)。解鎖目的蒐集步驟為解鎖處理模組400於該授權行動通訊裝置上呈現一開鎖目的視窗,供開鎖者將該開鎖目的輸入該開鎖目的視窗或於該開鎖目的視窗中顯示的選單中選擇開鎖原因,接收來自授權行動通訊裝置傳送的該開鎖目的並儲存於資料庫模組100中。為了對此有較佳的理解,請見圖7,該圖繪示第一行動通訊裝置4的螢幕4a的顯示態樣。以第一行動通訊裝置4作為授權行動通訊裝置來 說明。第一行動通訊裝置4的螢幕4a上呈現了開鎖目的視窗4b,開鎖目的視窗4b中顯示的選單中有多個開鎖原因供開鎖者點選,點選完後點擊「確認」鍵後將開鎖原因上傳伺服器,解鎖處理模組400接受後將之存於資料庫模組100中備用。 Please see FIG. 6, which is a partial flow chart of the authorization unlocking procedure in another embodiment. Step 7: Unlocking success notification step (S07). Unlocking success notification step The NFC chip notifies the unlocking processing module 400 of the unlocking success through the authorized mobile communication device. Step 8: Unlocking target collection step (S08). The unlocking purpose collection step is that the unlocking processing module 400 presents an unlocking purpose window on the authorized mobile communication device, so that the unlocker can input the unlocking purpose into the unlocking purpose window or select the unlocking reason from the menu displayed in the unlocking purpose window, and receives the unlocking purpose sent from the authorized mobile communication device and stores it in the database module 100. For a better understanding of this, please refer to FIG. 7, which shows the display state of the screen 4a of the first mobile communication device 4. The first mobile communication device 4 is used as the authorized mobile communication device for explanation. The screen 4a of the first mobile communication device 4 presents a window 4b for unlocking purpose. The menu displayed in the window 4b for unlocking purpose contains multiple reasons for unlocking for the unlocker to select. After selecting, the unlocker clicks the "Confirm" button to upload the unlocking reason to the server. After the unlocking processing module 400 receives it, it is stored in the database module 100 for standby use.
最後,本系統的資安通知模組600安裝於第二伺服器2中,與資料庫模組100及解鎖處理模組400資訊連通。在有了前述的開鎖目的記錄的服務後,本系統可利用資安通知模組600將開鎖者依其開鎖目的,通報不同的通知單位有某個特定的註冊帳號開了特定的近場通訊鎖。比如開鎖目的為設備故障,需要對伺服器進行維修,在ISO27001的定義下,此次事故會造成商業可持續運轉,就需要由接獲通知的資安小組判斷是否要通知到相關方,如客戶或消費者。比如開鎖目的為設備送修,接獲通知的資安小組,需要了解送修的設備或零組件有無包含存儲記憶體,如果有,要依照資料刪除的方法,刪除後才可進行送修,避免資訊外洩。這裡,通知單位不限於組織架構的上層管理者。對於公司的重要機密或資產,管理者可能將它們放置於特製的保管箱,其開鎖取物的動作,尤其是在非工作時段,需要通報到保全公司,甚至是警察局。在這種情況下,保全公司與警察局就是前述的通知單位。實作上,也可以找公司的特定人員,比如人事主管充當通知單位。依照本發明,資料庫模組100因應前述的需求,需要進一步儲存每一開鎖目的對應的通知單位。比如開鎖目的為授命令取件的通知單位是人事主管、開鎖目的為定期盤點內容物的通知單位是保全公司、開鎖目的為不小心開啟的通知單位是警察局等。要強調的是,這種通報因為事涉甚廣,其牽涉的近場通訊鎖所保護的資料或物品的商業價值非常高。資安通知模組600在當解鎖處理模組400將該近場通訊鎖解鎖後的開鎖目的儲存於資料庫模組100時,會通知對應的通知單位執行該次解鎖的用戶帳號。當事後有資安事故發生時,可以記錄中的用戶帳號找尋當事人,作為釐清權責的依據。 Finally, the information security notification module 600 of the present system is installed in the second server 2, and is connected to the database module 100 and the unlocking processing module 400. With the aforementioned unlocking purpose record service, the present system can use the information security notification module 600 to notify different notification units of the unlocker according to the unlocking purpose. A specific registered account has opened a specific near field communication lock. For example, if the unlocking purpose is a device failure and the server needs to be repaired, under the definition of ISO27001, this accident will cause business continuity, and the information security team that receives the notification needs to determine whether to notify the relevant parties, such as customers or consumers. For example, if the purpose of unlocking is to send the equipment for repair, the information security team that receives the notification needs to understand whether the equipment or components sent for repair contain storage memory. If so, they must follow the data deletion method and delete it before sending it for repair to avoid information leakage. Here, the notification unit is not limited to the upper-level managers of the organizational structure. For the company's important secrets or assets, managers may place them in special safe deposit boxes. Their actions of unlocking and taking items, especially during non-working hours, need to be reported to the security company or even the police station. In this case, the security company and the police station are the aforementioned notification units. In practice, a specific person in the company, such as a human resources manager, can also be found to act as the notification unit. According to the present invention, the database module 100 needs to further store the notification unit corresponding to each unlocking purpose in response to the aforementioned needs. For example, if the purpose of unlocking is to authorize the order to pick up the item, the notification unit is the human resources manager; if the purpose of unlocking is to regularly count the contents, the notification unit is the security company; if the purpose of unlocking is to accidentally open the item, the notification unit is the police station, etc. It should be emphasized that this kind of notification involves a wide range of matters, and the commercial value of the data or items protected by the NFC lock involved is very high. When the unlocking processing module 400 stores the unlocking purpose of the NFC lock in the database module 100, the information security notification module 600 will notify the corresponding notification unit of the user account that executed the unlocking. When an information security incident occurs later, the user account in the record can be used to find the person involved as a basis for clarifying rights and responsibilities.
雖然本發明已以實施方式揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作些許之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。 Although the present invention has been disclosed in the form of implementation as above, it is not intended to limit the present invention. Anyone with ordinary knowledge in the relevant technical field can make some changes and modifications without departing from the spirit and scope of the present invention. Therefore, the scope of protection of the present invention shall be subject to the scope of the patent application attached hereto.
1:第一伺服器 1: First server
2:第二伺服器 2: Second server
3:第三伺服器 3: Third server
4:第一行動通訊裝置 4: First mobile communication device
5:第二行動通訊裝置 5: Second mobile communication device
6:第三行動通訊裝置 6: Third mobile communication device
7:文件櫃 7: File Cabinet
8:文件夾 8: Folder
9:保險櫃 9: Safe
10:近場通訊鎖 10: Near Field Communication Lock
100:資料庫模組 100: Database module
200:身分確認模組 200: Identity confirmation module
300:公開金鑰基礎架構模組 300: Public key infrastructure module
400:解鎖處理模組 400: Unlock processing module
500:開鎖通知模組 500: Unlock notification module
600:資安通知模組 600: Information security notification module
Claims (12)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW112136612A TWI871022B (en) | 2023-09-25 | 2023-09-25 | Information security management system for opening nfc locks with authorization |
| CN202411073976.1A CN119694024A (en) | 2023-09-25 | 2024-08-07 | Information security management system for authorizing the opening of near field communication locks |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW112136612A TWI871022B (en) | 2023-09-25 | 2023-09-25 | Information security management system for opening nfc locks with authorization |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI871022B true TWI871022B (en) | 2025-01-21 |
| TW202515157A TW202515157A (en) | 2025-04-01 |
Family
ID=95026113
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW112136612A TWI871022B (en) | 2023-09-25 | 2023-09-25 | Information security management system for opening nfc locks with authorization |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN119694024A (en) |
| TW (1) | TWI871022B (en) |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2014022795A1 (en) * | 2012-08-02 | 2014-02-06 | Google Inc. | Accessing a secure locker via a mobile device |
| TWI573921B (en) * | 2015-07-06 | 2017-03-11 | 陳啟揚 | Method And System Of Unlocking Digital Lock |
| CN109905235A (en) * | 2017-12-08 | 2019-06-18 | 北京邮电大学 | A smart lock unlocking method, smart lock, terminal, server and system |
| US20200329136A1 (en) * | 2011-05-02 | 2020-10-15 | The Chamberlain Group, Inc. | Systems and Methods for Controlling a Locking Mechanism Using a Portable Electronic Device |
| CN113129525A (en) * | 2020-01-13 | 2021-07-16 | 德国邮政股份公司 | Method and apparatus for authenticating a user of a storage compartment device |
| CN115171245A (en) * | 2022-06-09 | 2022-10-11 | 郑州信大捷安信息技术股份有限公司 | HCE-based door lock security authentication method and system |
-
2023
- 2023-09-25 TW TW112136612A patent/TWI871022B/en active
-
2024
- 2024-08-07 CN CN202411073976.1A patent/CN119694024A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20200329136A1 (en) * | 2011-05-02 | 2020-10-15 | The Chamberlain Group, Inc. | Systems and Methods for Controlling a Locking Mechanism Using a Portable Electronic Device |
| WO2014022795A1 (en) * | 2012-08-02 | 2014-02-06 | Google Inc. | Accessing a secure locker via a mobile device |
| TWI573921B (en) * | 2015-07-06 | 2017-03-11 | 陳啟揚 | Method And System Of Unlocking Digital Lock |
| CN109905235A (en) * | 2017-12-08 | 2019-06-18 | 北京邮电大学 | A smart lock unlocking method, smart lock, terminal, server and system |
| CN113129525A (en) * | 2020-01-13 | 2021-07-16 | 德国邮政股份公司 | Method and apparatus for authenticating a user of a storage compartment device |
| CN115171245A (en) * | 2022-06-09 | 2022-10-11 | 郑州信大捷安信息技术股份有限公司 | HCE-based door lock security authentication method and system |
Also Published As
| Publication number | Publication date |
|---|---|
| TW202515157A (en) | 2025-04-01 |
| CN119694024A (en) | 2025-03-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11842341B2 (en) | Risk mitigation for a cryptoasset custodial system using a hardware security key | |
| US9916576B2 (en) | In-market personalization of payment devices | |
| CN105827576B (en) | Method for unlocking and system based on dynamic puzzle-lock | |
| US11232513B2 (en) | System and method for securing and removing over-locks | |
| US8922336B2 (en) | Entry/exit control system and method using shared codes combined with user personal information | |
| US10475115B2 (en) | System and method for managing distributed encrypted combination over-locks from a remote location | |
| US10964141B2 (en) | Internet-of-things (IoT) enabled lock with management platform processing | |
| TW201528028A (en) | Apparatus and methods for identity verification | |
| CN105608577A (en) | Method for performing non-repudiation, and payment managing server and user device therefor | |
| US11094152B2 (en) | System and method for applying over-locks without requiring unlock codes | |
| US20070189532A1 (en) | Mobile communication device, mobile communication device control program, and mobile communication device control method | |
| JP6829789B1 (en) | Management server, delivery management method, programs and recording media | |
| US12131373B2 (en) | System and method for facilitating access to self-storage units | |
| CN106233342A (en) | Automatic trading device and automatic trading system | |
| US12327451B2 (en) | System to enhance security of access and electronic key and combination distribution | |
| US12219059B2 (en) | Utilization management system, management device, utilization control device, user terminal, utilization management method, and program | |
| TWI871022B (en) | Information security management system for opening nfc locks with authorization | |
| WO2020039630A1 (en) | Receiving terminal device | |
| JP2014158222A (en) | Key distribution system | |
| US12406096B2 (en) | Utilization management device, utilization management method, and program | |
| Chen et al. | On enhancing biometric authentication with data protection | |
| JP2000268137A (en) | Recording medium backup method and device for implementing the method | |
| CN118249998B (en) | Key replacement, renting transaction and password modification method based on full-automatic safe deposit box system | |
| WO2020039629A1 (en) | Management system and data center | |
| US12452051B2 (en) | Systems and methods for hardware security module and physical safe integration |