[go: up one dir, main page]

TWM673943U - Access control management system - Google Patents

Access control management system

Info

Publication number
TWM673943U
TWM673943U TW114204517U TW114204517U TWM673943U TW M673943 U TWM673943 U TW M673943U TW 114204517 U TW114204517 U TW 114204517U TW 114204517 U TW114204517 U TW 114204517U TW M673943 U TWM673943 U TW M673943U
Authority
TW
Taiwan
Prior art keywords
access control
user
module
control management
identification code
Prior art date
Application number
TW114204517U
Other languages
Chinese (zh)
Inventor
黃榮彬
Original Assignee
臺灣土地銀行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 臺灣土地銀行股份有限公司 filed Critical 臺灣土地銀行股份有限公司
Priority to TW114204517U priority Critical patent/TWM673943U/en
Publication of TWM673943U publication Critical patent/TWM673943U/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

An access control management system is provided, utilizing a mobile phone and an access control management host to perform multi-layer identity verification to ensure the security of access control. The system comprises a mobile phone and an access control management host. The mobile phone is equipped with a biometric recognition module to identify the user's biometric features and transmits the encrypted user identification code and user identity data to the access control management host through an access control management module. After processing the received data, the access control management host compares the data with an access approval list. If approved, it further verifies the user identification code and user identity data with a telecommunications platform. Upon successful authentication, the access control management host issues an unlocking command to an access control device to grant access.

Description

門禁管理系統Access control management system

本新型是有關於一種身份驗證技術,且特別是有關於一種使用身份驗證技術的門禁管理系統及方法。 This invention relates to an identity verification technology, and more particularly to an access control management system and method using the identity verification technology.

目前的門禁管理系統普遍採用電子鎖作為主要的控制機制,並依賴不同的身份驗證方式來管理人員的進出。最常見的方式包括使用門禁卡、輸入密碼以及生物辨識技術。然而,這些方法在實際應用上仍存在許多問題,無法完全滿足現代門禁管理對於安全性、便利性與成本效益的需求。 Current access control systems generally use electronic locks as the primary control mechanism and rely on various authentication methods to manage access. The most common methods include access cards, passwords, and biometrics. However, these methods still face numerous practical challenges and cannot fully meet the security, convenience, and cost-effectiveness requirements of modern access control systems.

門禁卡系統是現今最為普及的門禁管理方式之一,透過無線射頻技術(RFID)或近場通訊技術(NFC),使用者只需攜帶門禁卡,靠近或接觸讀卡機,即可完成身份驗證。然而,這種方式存在一些明顯的缺點。首先,門禁卡容易遺失或被竊取,當他人獲得遺失的門禁卡後,便能輕易冒充持卡者進入受控區域。此外,門禁卡的管理亦是一大負擔,企業或組織需定期發放、回收與管理大量門禁卡,若要額外搭配進出紀錄追蹤,也需要更複雜的後端系統,進一步增加成本與管理難度。 Access card systems are one of the most popular access control methods today. Using radio frequency identification (RFID) or near-field communication (NFC) technology, users simply hold their access card near or in contact with a reader to complete identity verification. However, this method has some significant drawbacks. First, access cards are easily lost or stolen. Someone with a lost card can easily impersonate the cardholder and gain access to controlled areas. Furthermore, managing access cards is a significant burden. Businesses or organizations need to regularly issue, recycle, and manage a large number of access cards. Furthermore, maintaining access records and tracking requires a more complex back-end system, further increasing costs and management complexity.

除了門禁卡外,部分電子門鎖則採用密碼輸入的方式進行身份驗證。使用者在門鎖的鍵盤上輸入預先設定的密碼,即可開啟門禁。然而,密碼系統在安全性上也存在諸多問題。首先,使用者往往會選擇容易記住但不夠安全的簡單密碼,例如「123456」或「0000」,這些密碼極易被猜測或暴力破解。此外,密碼的輸入過程也可能被他人窺視或透過監視設備記錄,增加被竊取的風險。更嚴重的是,密碼容易被共享,某位使用者若將密碼告知他人,門禁系統便無法再有效識別進入者的真實身份,造成安全漏洞。此外,當密碼遭遺忘時,使用者可能需要管理單位重新設定,這在大型機構或需要頻繁變更密碼的環境中,將造成相當大的不便。 In addition to access cards, some electronic door locks use password input for identity verification. Users enter a pre-set password on the door lock's keyboard to open the door. However, password systems also have many security issues. First, users often choose simple passwords that are easy to remember but not secure enough, such as "123456" or "0000". These passwords are extremely easy to guess or brute force. In addition, the password input process may be observed by others or recorded by surveillance equipment, increasing the risk of theft. More seriously, passwords are easy to share. If a user tells his or her password to others, the access control system will no longer be able to effectively identify the true identity of the entrant, resulting in a security loophole. Furthermore, when a password is forgotten, the user may need to be reset by the administrator, which is quite inconvenient in large organizations or environments where passwords need to be changed frequently.

為了克服傳統門禁卡與密碼系統的不足,部分門禁設備開始導入生物辨識技術,如指紋辨識、臉部辨識與虹膜辨識等,以提升身份驗證的安全性。然而,這些技術雖然具有較高的防偽能力,仍然存在實際應用上的限制。例如,指紋辨識系統容易受到環境因素影響,若使用者的手指潮濕、污損或乾燥,辨識的準確度便會大幅下降。同樣地,臉部辨識技術雖然能提供較為便捷的驗證方式,但在光線不足的環境下,或者當使用者佩戴口罩、眼鏡等遮擋物時,辨識成功率也會受到影響。此外,生物辨識數據屬於高度敏感的個人資訊,一旦遭到竊取或濫用,將無法像密碼一樣輕易更改,進而引發更嚴重的隱私與安全風險。 To overcome the shortcomings of traditional access cards and password systems, some access control systems have begun to incorporate biometric technologies, such as fingerprint, facial, and iris recognition, to enhance identity verification security. However, while these technologies offer high anti-counterfeiting capabilities, they still face practical limitations. For example, fingerprint recognition systems are easily affected by environmental factors. If a user's finger is wet, dirty, or dry, recognition accuracy will be significantly reduced. Similarly, while facial recognition technology offers a more convenient verification method, its success rate is also affected in low-light environments or when the user is wearing an obstruction such as a mask or glasses. Furthermore, biometric data is highly sensitive personal information. Once stolen or misused, it cannot be easily changed like a password, posing even more serious privacy and security risks.

綜合來看,目前的門禁系統雖然已從傳統機械鎖發展到電子鎖,並採用了不同的身份驗證技術,但仍無法完全解決現代門禁管理所面臨的挑戰。門禁卡容易遺失與偽造,密碼系統存在共享與遺忘問題,而 生物辨識技術則因設備成本高昂與環境影響等因素,仍未能達到最佳的使用體驗。因此,現行門禁系統在安全性、便利性與管理成本等方面仍有諸多不足,迫切需要更先進且更具整合性的門禁管理方案來克服這些問題。 Overall, while current access control systems have evolved from traditional mechanical locks to electronic locks and incorporate various authentication technologies, they still cannot fully address the challenges facing modern access control management. Access cards are easily lost and forged, password systems face issues with sharing and forgetting, and biometric technology, due to factors such as high equipment costs and environmental impact, still lacks optimal user experience. Therefore, current access control systems still have many shortcomings in terms of security, convenience, and management costs. More advanced and integrated access control management solutions are urgently needed to overcome these issues.

因此,本新型之一方面是在提供一種門禁管理系統,包含一手機和一門禁管理主機。 Therefore, one aspect of the present invention is to provide an access control management system comprising a mobile phone and an access control management host.

該手機屬於一使用者,該手機包含生物辨識模組、SIM卡以及門禁管理模組。生物辨識模組係辨識待定生物特徵所產生之待定生物辨識碼係並驗證該待定生物辨識碼是否和該使用者之用戶生物辨識碼相符,得到生物驗證結果。SIM卡係儲存該使用者之用戶識別碼。門禁管理模組係具有門禁管理應用程式並與該SIM卡和該生物辨識模組電性相接,該門禁管理模組取得該SIM卡之該用戶識別碼和該使用者之用戶身份資料係並接收該生物辨識模組之該生物驗證結果。 The mobile phone belongs to a user and includes a biometric module, a SIM card, and an access control management module. The biometric module identifies the pending biometric feature, generates a pending biometric identification code, and verifies whether the pending biometric identification code matches the user's user biometric identification code, thereby obtaining a biometric verification result. The SIM card stores the user's user identification code. The access control management module includes an access control management application and is electrically connected to the SIM card and the biometric module. The access control management module obtains the user identification code from the SIM card and the user's user identity information, and receives the biometric verification result from the biometric module.

該門禁管理主機包含通訊模組、儲存模組以及運算模組。通訊模組係與該手機之該門禁管理模組通訊相接,還與電信平台和門禁設備通訊相接,該通訊模組自該門禁管理模組接收該用戶識別碼、該用戶身份資料以及該生物驗證結果,該電信平台具有該使用者之該用戶識別碼及該用戶身份資料。儲存模組係儲存該門禁設備之門禁核准清單。運算模組係與該通訊模組和該儲存模組電性連接,當該生物驗證結果為「成功」時,該門禁管理模組將該用戶識別碼和該用戶身份資料加密後再傳送給該運算模組,然後該運算模組對加密後之該用戶識別碼和該用戶身份資料進 行解密,並自該儲存模組接收該門禁核准清單,以驗證該用戶識別碼和該用戶身份資料是否列在該門禁核准清單上,得到核准驗證結果係當該核准驗證結果為「成功」時,該運算模組加密該用戶識別碼和該用戶身份資料,透過該通訊模組傳送給該電信平台,該電信平台對加密後之該用戶識別碼和該用戶身份資料進行解密,以驗證該用戶識別碼和該用戶身份資料,得到電信驗證結果並回傳給該運算模組,當該電信驗證結果為「成功」時,該運算模組發出開鎖指令給該門禁設備。 The access control management host includes a communication module, a storage module, and a computing module. The communication module communicates with the access control management module of the mobile phone, as well as with the telecommunications platform and the access control device. The communication module receives the user's user identification code, user identity information, and biometric verification results from the access control management module. The telecommunications platform has the user's user identification code and user identity information. The storage module stores the access control approval list of the access control device. The computing module is electrically connected to the communication module and the storage module. When the biometric verification result is "successful," the access control management module encrypts the user ID and user identity information and transmits them to the computing module. The computing module then decrypts the encrypted user ID and user identity information and receives the access control approval list from the storage module to verify whether the user ID and user identity information are listed on the access control approval list. Approval is granted. If the verification result is "successful," the computing module encrypts the user ID and user identity information and transmits them to the telecommunications platform via the communication module. The telecommunications platform decrypts the encrypted user ID and user identity information to verify them, obtains the telecommunications verification result, and transmits it back to the computing module. If the telecommunications verification result is "successful," the computing module issues an unlock command to the access control device.

依據本新型一實施例,該生物辨識模組包含指紋辨識模組、臉部辨識模組和虹膜辨識模組中至少之一。 According to one embodiment of the present invention, the biometric recognition module includes at least one of a fingerprint recognition module, a facial recognition module, and an iris recognition module.

依據本新型一實施例,該手機的該門禁管理模組請求該門禁管理主機的該運算模組提供系統公鑰與系統私鑰,讓該門禁管理模組使用該系統私鑰將該用戶識別碼和該用戶身份資料加密後再傳送給該運算模組,然後該運算模組使用該系統公鑰對加密後之該用戶識別碼和該用戶身份資料進行解密。 According to one embodiment of the present invention, the access control management module of the mobile phone requests the computing module of the access control management host to provide a system public key and a system private key. The access control management module uses the system private key to encrypt the user identification code and user identity information and then transmits the encrypted information to the computing module. The computing module then uses the system public key to decrypt the encrypted user identification code and user identity information.

依據本新型一實施例,該門禁管理主機的該運算模組透過該通訊模組向該電信平台請求提供電信公鑰和電信私鑰,讓該運算模組以該電信私鑰加密該用戶識別碼和該用戶身份資料後再傳送給該電信平台,然後該電信平台使用該電信公鑰對加密後之該用戶識別碼和該用戶身份資料進行解密。 According to one embodiment of the present invention, the computing module of the access control host requests the telecommunications platform for a telecommunications public key and a telecommunications private key through the communication module. The computing module encrypts the user identification code and user identity information with the telecommunications private key and transmits the encrypted information to the telecommunications platform. The telecommunications platform then decrypts the encrypted user identification code and user identity information using the telecommunications public key.

依據本新型一實施例,該門禁管理模組在傳送該用戶識別碼和該用戶身份資料前,進一步產生時間戳記,並將該時間戳記與該用戶識別碼和該用戶身份資料同加密後傳送至該門禁管理主機。 According to one embodiment of the present invention, the access control management module further generates a timestamp before transmitting the user identification code and the user identity information. The timestamp is encrypted together with the user identification code and the user identity information before being transmitted to the access control management host.

依據本新型一實施例,該門禁管理主機之該儲存模組還儲存該門禁設備之門禁權限設定,在該電信驗證結果為「成功」後,該運算模組接收並依據該門禁權限設定,限定該用戶識別碼和該用戶身份資料的門禁使用範圍與門禁時段,確認該使用者是否於該門禁使用範圍與該門禁時段內要求出入該門禁設備,當符合時,該運算模組才發出該開鎖指令給該門禁設備。 According to one embodiment of the present invention, the storage module of the access control management host also stores the access control permission settings for the access control device. After the telecommunications verification result is "successful," the computing module receives and, based on the access control permission settings, limits the access control scope and access control time period for the user identification code and user identity information. It then confirms whether the user's request to access the access control device falls within the access control scope and access control time period. Only when the request is met does the computing module issue the unlock command to the access control device.

本新型之另一方面是在提供一種門禁管理方法,適用於上述之門禁管理系統。該門禁管理方法包含該生物辨識模組辨識該待定生物特徵並驗證該待定生物辨識碼是否和該用戶生物辨識碼相符,得到該生物驗證結果。當該生物驗證結果為「成功」時,該門禁管理模組將該用戶識別碼和該用戶身份資料加密後再傳送給該運算模組,然後該運算模組對加密後之該用戶識別碼和該用戶身份資料進行解密,並自該儲存模組接收該門禁核准清單,以驗證該用戶識別碼和該用戶身份資料是否列在該門禁核准清單上,得到該核准驗證結果。當該核准驗證結果為「成功」時,該運算模組加密該用戶識別碼和該用戶身份資料,透過該通訊模組傳送給該電信平台,該電信平台對加密後之該用戶識別碼和該用戶身份資料進行解密,以驗證該用戶識別碼和該用戶身份資料,得到電信驗證結果並回傳給該運算模組。 Another aspect of the present invention is to provide an access control management method applicable to the aforementioned access control management system. The access control management method includes the biometric recognition module identifying the pending biometric feature and verifying whether the pending biometric identification code matches the user's biometric identification code, thereby obtaining a biometric verification result. When the biometric verification result is "successful," the access control management module encrypts the user identification code and user identity information and transmits them to the computing module. The computing module then decrypts the encrypted user identification code and user identity information and receives the access control approval list from the storage module to verify whether the user identification code and user identity information are listed on the access control approval list, thereby obtaining the approval verification result. If the verification result is "successful," the computing module encrypts the user ID and user identity information and transmits them to the telecommunications platform via the communication module. The telecommunications platform decrypts the encrypted user ID and user identity information to verify them, obtains the telecommunications verification result, and returns it to the computing module.

本新型透過生物辨識驗證、SIM卡識別碼驗證以及多層加密技術的整合,提供高安全性、低成本、高便利性的門禁管理方案。該門禁管理系統不僅能有效防止偽造身份、冒名進入、竄改驗證資訊,還能降 低門禁管理設備的建置與維護成本,適用於各種需要高安全門禁控制的環境。 This new access control system integrates biometric authentication, SIM card identification verification, and multi-layer encryption technology to provide a highly secure, cost-effective, and convenient access control solution. This access control system not only effectively prevents identity forgery, false entry, and tampering with authentication information, but also reduces the installation and maintenance costs of access control equipment, making it suitable for a variety of environments requiring high-security access control.

上述新型內容旨在提供本新型內容的簡化摘要,以使閱讀者對本新型內容具備基本的理解。此新型內容並非本新型內容的完整概述,且其用意並非在指出本新型實施例的重要/關鍵元件或界定本新型的範圍。在參閱下文實施方式後,本新型所屬技術領域中具有通常知識者當可輕易瞭解本新型之基本精神及其他新型目的,以及本新型所採用之技術手段與實施方面。 The above description is intended to provide a simplified summary of the present invention to provide readers with a basic understanding of the present invention. This description is not a complete overview of the present invention and is not intended to identify important or key elements of the present invention or to define the scope of the present invention. After reading the following detailed description, those skilled in the art will readily understand the fundamental spirit and other objectives of the present invention, as well as the technical means and implementation aspects employed by the present invention.

100:門禁管理系統 100: Access Control System

110:手機 110: Mobile phone

112:生物辨識模組 112: Biometric Module

114:SIM卡 114: SIM card

116:門禁管理模組 116: Access Control Management Module

120:門禁管理主機 120: Access control management host

122:通訊模組 122: Communication Module

124:儲存模組 124: Storage Module

126:運算模組 126: Computational Module

130:門禁設備 130: Access control equipment

140:電信平台 140: Telecommunications Platform

210-250:步驟 210-250: Steps

305-355:步驟 305-355: Steps

為讓本新型之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附附圖之說明如下。 To make the above and other purposes, features, advantages and embodiments of the present invention more clearly understood, the accompanying drawings are described as follows.

圖1為依據本新型一實施例之一種門禁管理系統的功能架構示意圖。 Figure 1 is a schematic diagram of the functional architecture of an access control management system according to an embodiment of the present invention.

圖2為依據本新型一實施例之一種門禁管理方法的前置作業之流程示意圖。 Figure 2 is a schematic diagram of the pre-processing steps of an access control management method according to an embodiment of the present invention.

圖3為依據本新型一實施例之一種門禁管理方法的流程示意圖。 Figure 3 is a schematic diagram of the process of an access control management method according to an embodiment of the present invention.

依據上述,提供一種門禁管理系統及方法。此門禁管理系統及方法能透過生物辨識驗證、SIM卡識別碼驗證以及多層加密技術的整 合,提供高安全性、低成本、高便利性的門禁管理方案。。在下面的敘述中,將會介紹上述之門禁管理系統及方法的例示結構與方法。 Based on the above, an access control management system and method are provided. This access control management system and method integrate biometric authentication, SIM card identification code authentication, and multi-layer encryption technology to provide a highly secure, low-cost, and convenient access control management solution. The following description will introduce an exemplary structure and method of the access control management system and method.

為了方便描述,裝置的功能被分為各種功能單元和/或功能模組來進行描述。在實施本新型時,這些功能單元或功能模組可以在同一或多個軟體和/或硬體中實現。本新型是根據實施例的方法、裝置和電腦程式產品的流程圖和/或方塊圖來描述的。輸入電腦程式指令到處理器中,透過執行指令產生用於實現所述功能的裝置。這些指令可在通用電腦、專用電腦、嵌入式處理機或其他可程式設計資料處理設備的處理器中執行。 For ease of description, the functions of the device are described as various functional units and/or functional modules. When implementing the present invention, these functional units or modules may be implemented in the same or multiple software and/or hardware components. The present invention is described with reference to flowcharts and/or block diagrams of methods, devices, and computer program products according to the embodiments. Computer program instructions are input into a processor, which executes the instructions to generate a device for implementing the described functions. These instructions may be executed in a processor of a general-purpose computer, a special-purpose computer, an embedded processor, or other programmable data processing device.

圖1為依據本新型一實施例之一種門禁管理系統的功能架構示意圖。 Figure 1 is a schematic diagram of the functional architecture of an access control management system according to an embodiment of the present invention.

在圖1中,門禁管理系統100包含一手機110和一門禁管理主機120。 In Figure 1, the access control management system 100 includes a mobile phone 110 and an access control management host 120.

該手機110屬於一使用者,該手機110包含生物辨識模組112、SIM卡114以及門禁管理模組116。 The mobile phone 110 belongs to a user and includes a biometric recognition module 112, a SIM card 114, and an access control management module 116.

生物辨識模組112辨識待定生物特徵所產生之待定生物辨識碼,並驗證該待定生物辨識碼是否和該使用者之用戶生物辨識碼相符,得到生物驗證結果。依據本新型一實施例,該生物辨識模組112包含指紋辨識模組、臉部辨識模組和虹膜辨識模組中至少之一。例如,當該生物辨識模組112為指紋辨識模組時,使用者將其手指放置於該手機110的指紋感測區域上,指紋辨識模組透過掃描感測使用者之指紋特徵,並將掃描之指紋特徵轉換為一待定生物辨識碼,進一步與儲存在該手機110內之該用 戶生物辨識碼進行比對,以確認該使用者的身份。若為臉部辨識模組時,則係利用手機110的相機拍攝使用者臉部影像,透過影像分析技術產生待定生物辨識碼並進行比對;若為虹膜辨識模組時,則係利用手機110的相機掃描使用者之虹膜影像,並藉由虹膜圖樣之特徵分析產生待定生物辨識碼,再與該用戶生物辨識碼進行比對。 The biometric module 112 identifies the pending biometric feature and generates a pending biometric code, and verifies whether the pending biometric code matches the user's user biometric code, thereby obtaining a biometric verification result. According to one embodiment of the present invention, the biometric module 112 includes at least one of a fingerprint recognition module, a facial recognition module, and an iris recognition module. For example, when the biometric recognition module 112 is a fingerprint recognition module, the user places their finger on the fingerprint sensing area of the mobile phone 110. The fingerprint recognition module scans and senses the user's fingerprint characteristics and converts the scanned fingerprint characteristics into a pending biometric identification code. This code is then compared with the user's biometric identification code stored in the mobile phone 110 to confirm the user's identity. In the case of a facial recognition module, the camera of the mobile phone 110 captures an image of the user's face, and image analysis technology is used to generate a pending biometric identification code for comparison. In the case of an iris recognition module, the camera of the mobile phone 110 scans an image of the user's iris, and the iris pattern is analyzed to generate a pending biometric identification code, which is then compared with the user's biometric identification code.

SIM卡114儲存該使用者之用戶識別碼。該用戶識別碼係由電信平台140所核發並管理,且該電信平台140亦儲存有與該SIM卡114中之用戶識別碼對應的該使用者之用戶身份資料,供後續進行身份驗證之用。依據本新型一實施例,該用戶識別碼可為該使用者之行動電話號碼或由電信平台所分配之其他唯一識別碼。 SIM card 114 stores the user's user identification code. This user identification code is issued and managed by telecommunications platform 140. Telecommunications platform 140 also stores the user's user identity information corresponding to the user identification code in SIM card 114 for subsequent identity verification. According to one embodiment of the present invention, the user identification code may be the user's mobile phone number or another unique identification code assigned by the telecommunications platform.

門禁管理模組116具有門禁管理應用程式並與該SIM卡114和該生物辨識模組112電性相接,用以進行門禁管理流程。該門禁管理模組116可透過手機110上所安裝之該門禁管理應用程式,於使用者首次註冊時,要求使用者輸入相關之用戶身份資料,例如姓名、聯絡方式或其他可識別之個人資訊,並將該用戶身份資料儲存於手機110之內部儲存單元中。於後續進行門禁驗證時,該門禁管理模組116自該SIM卡114取得由電信平台所核發之該用戶識別碼,並自該手機110之內部儲存單元取得前述註冊時由使用者輸入之該用戶身份資料,同時接收該生物辨識模組112所產生之該生物驗證結果。 Access management module 116 includes an access management application and is electrically connected to SIM card 114 and biometric module 112 to facilitate access management. Access management module 116 , through the access management application installed on mobile phone 110 , requires the user to enter relevant user identification information, such as name, contact information, or other identifiable personal information, upon initial registration. The user identification information is then stored in the internal storage unit of mobile phone 110 . During subsequent access control verification, the access control management module 116 obtains the user identification code issued by the telecommunications platform from the SIM card 114 and the user identity information entered by the user during registration from the internal storage unit of the mobile phone 110. It also receives the biometric verification result generated by the biometric recognition module 112.

該門禁管理主機120包含通訊模組122、儲存模組124以及運算模組126。 The access control management host 120 includes a communication module 122, a storage module 124, and a computing module 126.

通訊模組122與該手機110之該門禁管理模組116通訊相接,還與電信平台140和門禁設備130通訊相接,負責門禁管理主機120與各元件之間的數據傳輸。該通訊模組122自該門禁管理模組116接收該用戶識別碼與該用戶身份資料,並將其傳送至門禁管理主機120之運算模組126進行驗證。此外,通訊模組122亦可向電信平台140發送查詢請求,以比對該用戶識別碼及該用戶身份資料,確保該使用者的身份真實性。 The communication module 122 communicates with the access control management module 116 of the mobile phone 110, as well as with the telecommunications platform 140 and the access control device 130. It is responsible for data transmission between the access control management host 120 and various components. The communication module 122 receives the user identification code and user identity information from the access control management module 116 and transmits them to the computing module 126 of the access control management host 120 for verification. Furthermore, the communication module 122 can send query requests to the telecommunications platform 140 to compare the user identification code and user identity information to ensure the user's identity authenticity.

依據本新型一實施例,該通訊模組122可透過無線通訊技術(如Wi-Fi、行動網路或藍牙)與手機110進行資料交換,並透過區域網路或行動網路與電信平台140及門禁設備130建立安全連線,以確保資料傳輸的完整性與即時性。此外,該電信平台140有登錄該使用者之用戶識別碼及對應之用戶身份資料,當門禁管理主機120向電信平台140請求驗證時,該電信平台140可根據內部資料庫比對該用戶識別碼及該用戶身份資料,以提供相應的驗證結果給門禁管理主機120。 According to one embodiment of the present invention, the communication module 122 can exchange data with the mobile phone 110 via wireless communication technologies (such as Wi-Fi, mobile network, or Bluetooth). It also establishes a secure connection with the telecommunications platform 140 and the access control device 130 via a local area network or mobile network to ensure the integrity and immediacy of data transmission. Furthermore, the telecommunications platform 140 has the user ID and corresponding user identity information for logging in. When the access control management host 120 requests authentication from the telecommunications platform 140, the telecommunications platform 140 compares the user ID and user identity information against its internal database and provides the corresponding authentication result to the access control management host 120.

儲存模組124儲存該門禁設備130之門禁核准清單。該門禁核准清單記錄獲准進入該門禁設備130之使用者資訊,包括該用戶識別碼及對應之用戶身份資料,以供門禁管理主機120進行身份驗證時比對。當門禁管理主機120接收到來自門禁管理模組116之門禁驗證請求時,該儲存模組124提供門禁核准清單之相關資料,以確認該使用者是否具有進入門禁設備130之權限。 The storage module 124 stores the access control authorization list for the access control device 130. The authorization list records information about users permitted to access the access control device 130, including the user identification code and corresponding user identity information, for comparison by the access control management host 120 during identity verification. When the access control management host 120 receives an access verification request from the access control management module 116, the storage module 124 provides the relevant information from the authorization list to confirm whether the user has permission to access the access control device 130.

依據本新型一實施例,該門禁管理主機120之該儲存模組124還儲存該門禁設備130之一門禁權限設定,該門禁權限設定包含門禁 使用範圍與門禁時段。門禁使用範圍可定義特定門禁設備130之存取權限,例如限制某些使用者僅可進入特定區域或建築物內之特定樓層,而門禁時段則可設定該使用者可存取該門禁設備130之允許時間範圍,例如僅允許在工作日特定時段內進入。 According to one embodiment of the present invention, the storage module 124 of the access control management host 120 also stores access control permission settings for the access control device 130. The access control permission settings include access control ranges and access control time periods. Access control ranges can define access permissions for a specific access control device 130, for example, restricting certain users to specific areas or floors within a building. Access control time periods can set the time range during which a user can access the access control device 130, for example, allowing access only during specific hours on weekdays.

運算模組126與該通訊模組122和該儲存模組124電性連接,負責處理門禁管理主機120之各項運算與驗證作業。當該生物驗證結果為「成功」時,該門禁管理模組116將該用戶識別碼與該用戶身份資料加密後,透過該通訊模組122傳送至該運算模組126。該運算模組126接收加密之該用戶識別碼與該用戶身份資料後,執行解密以獲取該用戶識別碼與該用戶身份資料。接著,該運算模組126自該儲存模組124讀取該門禁設備130之門禁核准清單,並比對該用戶識別碼與該用戶身份資料是否列於該門禁核准清單內,以產生核准驗證結果。 The computing module 126 is electrically connected to the communication module 122 and the storage module 124 and is responsible for processing various calculations and verification operations for the access control management host 120. When the biometric verification result is "successful," the access control management module 116 encrypts the user identification code and user identity information and transmits them to the computing module 126 via the communication module 122. After receiving the encrypted user identification code and user identity information, the computing module 126 decrypts them to obtain the user identification code and user identity information. Next, the computing module 126 reads the access control authorization list of the access control device 130 from the storage module 124 and compares the user identification code with the user identity information to see if they are listed in the access control authorization list to generate an authorization verification result.

依據本新型一實施例,當該核准驗證結果為「成功」時,該運算模組126將該用戶識別碼與該用戶身份資料加密後,再次透過該通訊模組122傳送至該電信平台140,以請求進行進一步的身份驗證。該電信平台140接收到加密後之該用戶識別碼與該用戶身份資料後,執行解密並進行身份比對,以確認該用戶識別碼與該用戶身份資料是否與其內部儲存的數據相符,並產生電信驗證結果。 According to one embodiment of the present invention, when the verification result is "successful," the computing module 126 encrypts the user identification code and user identity information and transmits them again via the communication module 122 to the telecommunications platform 140 to request further identity verification. After receiving the encrypted user identification code and user identity information, the telecommunications platform 140 decrypts and performs an identity comparison to confirm whether the user identification code and user identity information match its internally stored data, and then generates a telecommunications verification result.

當該電信驗證結果為「成功」時,該運算模組126即確認該使用者身份無誤,並進一步檢查該儲存模組124內之門禁權限設定,以確認該使用者是否符合該門禁設備130之進入條件,例如是否於允許時段內或符合特定權限要求。當所有條件皆符合時,該運算模組126透過該通 訊模組122發送開鎖指令至該門禁設備130,使該門禁設備130解鎖,允許該使用者進入。 If the telecommunications verification result is "successful," the computing module 126 confirms the user's identity and further checks the access control permission settings in the storage module 124 to determine whether the user meets the access conditions of the access control device 130, such as whether the user is within the permitted time period or meets specific permission requirements. If all conditions are met, the computing module 126 sends an unlock command to the access control device 130 via the communication module 122, causing the access control device 130 to unlock and allow the user access.

依據本新型一實施例,該手機110與該門禁管理主機120之間的通訊涉及用戶身份驗證與門禁管理,需確保傳輸數據的完整性與安全性,以防止未經授權的存取或數據攔截。為此,該門禁管理模組116在與門禁管理主機120進行身份驗證資料傳輸前,會先建立安全加密機制,以確保用戶識別碼與用戶身份資料的傳輸安全性。為建立安全的加密通訊機制,該門禁管理模組116首先請求該門禁管理主機120之該運算模組126提供系統公鑰與系統私鑰。該運算模組126在接收到請求後,生成一組系統公鑰與對應之系統私鑰,並回應該門禁管理模組116。該門禁管理模組116接收該系統私鑰後,使用該系統私鑰對取得之該用戶識別碼與該使用者註冊時所輸入之該用戶身份資料進行加密,以防止該數據在傳輸過程中遭受未授權存取或篡改。接著,該門禁管理模組116透過該通訊模組122,將加密後之該用戶識別碼與該用戶身份資料安全地傳送至該門禁管理主機120之該運算模組126。該運算模組126接收到該加密資料後,利用該系統公鑰進行解密,以恢復該用戶識別碼與該用戶身份資料,並執行後續之門禁身份驗證作業。透過此公鑰與私鑰之加密機制,可確保敏感資料在傳輸過程中不會因未經授權存取或惡意攻擊而遭受洩露,進一步提升門禁管理系統100之安全性與可靠性。 According to one embodiment of the present invention, communication between the mobile phone 110 and the access control management host 120 involves user authentication and access control management, requiring the integrity and security of transmitted data to prevent unauthorized access or data interception. To this end, the access control management module 116 establishes a secure encryption mechanism before transmitting authentication data to the access control management host 120 to ensure the security of the transmission of user identification codes and user identity data. To establish a secure encrypted communication mechanism, the access control management module 116 first requests the computing module 126 of the access control management host 120 to provide a system public key and a system private key. Upon receiving the request, the computing module 126 generates a system public key and a corresponding system private key and responds to the access control management module 116. After receiving the system private key, the access control management module 116 uses it to encrypt the obtained user ID and the user identity information entered during user registration to prevent unauthorized access or tampering during transmission. The access control management module 116 then securely transmits the encrypted user ID and user identity information to the computing module 126 of the access control management host 120 via the communication module 122. After receiving the encrypted data, the computing module 126 decrypts it using the system public key to recover the user ID and user identity information and perform subsequent access control identity authentication operations. This public and private key encryption mechanism ensures that sensitive data will not be leaked during transmission due to unauthorized access or malicious attacks, further enhancing the security and reliability of the access control management system 100.

依據本新型一實施例,該門禁管理主機120與該電信平台140之間的通訊涉及用戶身份驗證,須確保傳輸數據的安全性與完整性,以防止未經授權的存取、篡改或攔截。為此,該運算模組126在將該用戶 識別碼與該用戶身份資料傳送至該電信平台140進行驗證前,需建立安全加密機制,以確保數據在傳輸過程中的保密性與抗竄改性。為實現安全通訊,該運算模組126透過該通訊模組122向該電信平台140發送請求,請求提供一組電信公鑰與電信私鑰。該電信平台140接收到請求後,生成一對電信公鑰與電信私鑰,並回應該運算模組126。該運算模組126接收該電信私鑰後,使用該電信私鑰對該用戶識別碼與該用戶身份資料進行加密,以確保該資料在傳輸過程中不會被未經授權的第三方存取或篡改。隨後,該運算模組126透過該通訊模組122,將經電信私鑰加密後之該用戶識別碼與該用戶身份資料安全地傳送至該電信平台140。該電信平台140接收到該加密數據後,使用該電信公鑰進行解密,以恢復該用戶識別碼與該用戶身份資料,並進行身份驗證。透過該電信公鑰與電信私鑰之加密機制,可確保該門禁管理主機120與該電信平台140之間的數據傳輸安全性,防止惡意攻擊、數據竊取或身份冒用,進一步提高門禁管理系統100的安全性與可靠性。 According to one embodiment of the present invention, communication between the access control host 120 and the telecommunications platform 140 involves user identity authentication, ensuring the security and integrity of the transmitted data to prevent unauthorized access, tampering, or interception. To this end, the computing module 126 establishes a secure encryption mechanism before transmitting the user identification code and user identity information to the telecommunications platform 140 for verification. This ensures the confidentiality and tamper resistance of the data during transmission. To achieve secure communication, the computing module 126 sends a request to the telecommunications platform 140 via the communication module 122, requesting a set of telecommunications public and private keys. Upon receiving the request, the telecommunications platform 140 generates a pair of telecommunications public and private keys and responds to the computing module 126. After receiving the telecommunications private key, the computing module 126 uses it to encrypt the user identification code and user identity information to ensure that the data cannot be accessed or tampered with by unauthorized third parties during transmission. The computing module 126 then securely transmits the user identification code and user identity information, encrypted with the telecommunications private key, to the telecommunications platform 140 via the communication module 122. After receiving the encrypted data, the telecommunications platform 140 decrypts it using the telecommunications public key to recover the user identification code and user identity information and perform identity verification. The encryption mechanism of the telecommunications public key and telecommunications private key ensures the security of data transmission between the access control management host 120 and the telecommunications platform 140, preventing malicious attacks, data theft, or identity theft, further enhancing the security and reliability of the access control management system 100.

依據本新型一實施例,該門禁管理模組116在傳送該用戶識別碼與該用戶身份資料前,進一步產生一時間戳記,以確保數據傳輸之即時性與有效性,並防止重播攻擊(Replay Attack)或未經授權的請求攔截與重複提交。該時間戳記可為當前系統時間或其他可驗證的時間標記,確保每一次門禁請求皆附帶唯一且有效的時間資訊。當該門禁管理模組116獲取該時間戳記後,將該時間戳記與該用戶識別碼及該用戶身份資料一同進行加密,以確保數據完整性及防止未經授權的篡改或偽造。隨後,該門禁管理模組116透過該通訊模組122,將加密後之該時間戳記、 該用戶識別碼與該用戶身份資料安全地傳送至該門禁管理主機120。該運算模組126接收到該加密數據後,解密並解析該時間戳記,以確認該請求是否於有效時間範圍內提交,進而驗證該請求之真實性與有效性。透過該時間戳記之機制,可有效防止惡意攻擊者重複使用舊請求數據進行未經授權的門禁存取,進一步提升門禁管理系統100之安全性與抗攻擊能力,確保門禁驗證過程之即時性與可靠性。 According to one embodiment of the present invention, the access control management module 116 further generates a timestamp before transmitting the user identification code and user identity information to ensure the timeliness and validity of data transmission and prevent replay attacks or unauthorized request interception and duplicate submission. The timestamp can be the current system time or other verifiable timestamp, ensuring that each access control request is accompanied by unique and valid time information. After the access control management module 116 obtains the timestamp, it encrypts it along with the user identification code and user identity information to ensure data integrity and prevent unauthorized tampering or forgery. The access control management module 116 then securely transmits the encrypted timestamp, user identification code, and user identity information to the access control management host 120 via the communication module 122. After receiving the encrypted data, the computing module 126 decrypts and analyzes the timestamp to confirm whether the request was submitted within the valid timeframe, thereby verifying the authenticity and validity of the request. This timestamp mechanism effectively prevents malicious attackers from reusing old request data for unauthorized access, further enhancing the security and anti-attack capabilities of the access control management system 100 and ensuring the immediacy and reliability of the access control verification process.

依據本新型一實施例,在該電信驗證結果為「成功」後,該運算模組126進一步執行該門禁權限設定之驗證,以確保該使用者的存取權限符合系統規範。因此,該運算模組126會自該儲存模組124中讀取門禁權限設定,並依據該門禁權限設定來限定該用戶識別碼與該用戶身份資料的門禁使用範圍與門禁時段。 According to one embodiment of the present invention, after the telecommunications verification result is "successful," the computing module 126 further verifies the access control permission settings to ensure that the user's access permissions comply with system specifications. Therefore, the computing module 126 reads the access control permission settings from the storage module 124 and, based on the access control permission settings, limits the access control scope and access time period for the user identification code and user identity information.

該門禁使用範圍可包含特定門禁設備130或特定區域,確保該使用者僅能於授權範圍內進行門禁存取。舉例而言,若該使用者僅獲授權進入特定樓層或建築內部某一區域,則該運算模組126將根據門禁權限設定,檢查該用戶識別碼與該用戶身份資料是否符合該特定門禁設備130的存取條件。此外,該門禁時段可用來限制該使用者能夠存取門禁設備130的時間範圍,例如僅允許於特定工作時段內進入,或對特定使用者(如訪客)設定一次性或限時存取權限。當該使用者發出門禁存取請求時,該運算模組126比對當前時間是否符合該使用者所授權的門禁時段,若該存取請求超出允許時段,則該門禁請求將被拒絕。當該運算模組126確認該用戶識別碼與該用戶身份資料符合門禁權限設定,包括門禁使用範圍與門禁時段,則該運算模組126才會透過該通訊模組122發送開鎖指令 至該門禁設備130,使其解鎖,允許該使用者通行。若不符合門禁權限設定,則該運算模組126將拒絕該門禁請求,並可選擇將該拒絕記錄存入儲存模組124,以供管理者進行後續分析與監控。透過門禁權限設定之驗證機制,可有效確保門禁管理系統100的安全性,避免未經授權之人員進入特定區域,並提升門禁存取管理的靈活性與精確度。 The access control scope can include specific access control devices 130 or specific areas, ensuring that the user can only access the access control within the authorized scope. For example, if the user is only authorized to enter a specific floor or area within the building, the computing module 126 will check whether the user identification code and user identity information meet the access conditions of the specific access control device 130 based on the access control permission settings. In addition, the access control time period can be used to limit the time range during which the user can access the access control device 130, for example, only allowing access during specific working hours, or setting one-time or time-limited access permissions for specific users (such as visitors). When a user issues an access control request, the computing module 126 compares the current time with the user's authorized access control time period. If the access request exceeds the permitted time period, the access control request is denied. Once the computing module 126 confirms that the user ID and identity information match the access control permission settings, including the access control range and access control time period, the computing module 126 sends an unlock command to the access control device 130 via the communication module 122, unlocking the device and allowing the user access. If the access control permission settings do not match, the computing module 126 denies the access control request and optionally stores the denial record in the storage module 124 for subsequent analysis and monitoring by the administrator. By implementing a verification mechanism for access control permissions, the security of the access control management system 100 can be effectively ensured, preventing unauthorized personnel from entering specific areas and improving the flexibility and accuracy of access control management.

下面則介紹上述門禁管理系統的執行方法。圖2為依據本新型一實施例之一種門禁管理方法的前置作業之流程示意圖。 The following describes the implementation method of the aforementioned access control management system. Figure 2 is a schematic diagram of the pre-processing steps of an access control management method according to one embodiment of this novel invention.

在圖2的步驟210中,使用者向電信平台的業者申請SIM卡114並登錄使用者的用戶身份資料。使用者需將SIM卡114插入手機110,確保手機110能夠與電信平台140正常通訊。啟動門禁管理應用程式時,門禁管理應用程式可讀取SIM卡114內儲存之用戶識別碼,並要求使用者輸入使用者的用戶身份資料(如姓名、聯絡方式等)。該用戶身份資料將用於門禁管理系統100的後續身份驗證與權限管理。 In step 210 of Figure 2 , the user applies for a SIM card 114 from the telecommunications platform operator and registers their user identity information. The user inserts SIM card 114 into mobile phone 110 to ensure proper communication between mobile phone 110 and telecommunications platform 140. When the access control management application is activated, it reads the user identification code stored on SIM card 114 and prompts the user to enter their user identity information (e.g., name, contact information, etc.). This user identity information will be used for subsequent identity authentication and access control management within access control management system 100.

在步驟220中,使用者在手機110上啟用生物辨識模組112的生物辨識功能。為確保門禁存取的安全性,使用者需啟用手機110的生物辨識模組112,該生物辨識模組112可包含指紋辨識模組、臉部辨識模組和虹膜辨識模組中至少之一。使用者需依照手機110之設定程序註冊其生物特徵(如錄入指紋、拍攝臉部影像或掃描虹膜),以便門禁管理系統100後續進行生物辨識驗證。 In step 220, the user activates the biometric recognition function of the biometric recognition module 112 on the mobile phone 110. To ensure access security, the user must activate the biometric recognition module 112 on the mobile phone 110. The biometric recognition module 112 may include at least one of a fingerprint recognition module, a facial recognition module, and an iris recognition module. The user must follow the setup process of the mobile phone 110 to register their biometric characteristics (such as recording fingerprints, taking a facial image, or scanning irises) to facilitate subsequent biometric verification by the access control management system 100.

在使用者執行步驟210和步驟220之後,在步驟230中,使用者在手機110上安裝門禁管理應用程式並在門禁管理應用程式上註冊以備後續執行登入程序。使用者需在手機110上安裝門禁管理應用程式,該門禁管理應用程式提供身份登錄、門禁請求、數據加密及安全通訊等功 能。使用者完成應用門禁管理程式的安裝後,需進行註冊並登入,確保門禁管理模組116能夠獲取該使用者的用戶身份資料,並建立與門禁管理主機120的安全連線。 After the user completes steps 210 and 220, in step 230, the user installs the access control management application on mobile phone 110 and registers with the access control management application for subsequent login. The user must install the access control management application on mobile phone 110, which provides features such as identity login, access control requests, data encryption, and secure communication. After installing the access control management application, the user must register and log in to ensure that the access control management module 116 can obtain the user's user identity information and establish a secure connection with the access control management host 120.

接著,在步驟240中,門禁管理應用程式向門禁管理主機120取得系統公鑰和系統私鑰,並登錄使用者的用戶身份資料和SIM卡的用戶識別碼。為確保手機110與門禁管理主機120之間的通訊安全,門禁管理應用程式會向門禁管理主機120的運算模組126發送安全通訊請求。該運算模組126回應請求,並提供系統公鑰與系統私鑰,建立加密通訊機制。接著,門禁管理應用程式使用系統私鑰對該使用者的身份資料與SIM卡114內之用戶識別碼進行加密,並透過該通訊模組122將加密後的數據傳送至門禁管理主機120,以確保數據傳輸的機密性與完整性。 Next, in step 240, the access management application obtains the system public key and system private key from the access management host 120 and registers the user's user identity information and SIM card user ID. To ensure secure communication between the mobile phone 110 and the access management host 120, the access management application sends a secure communication request to the computing module 126 of the access management host 120. The computing module 126 responds to the request and provides the system public key and system private key, establishing an encrypted communication mechanism. The access control management application then uses the system private key to encrypt the user's identity information and the user identification code in the SIM card 114. The encrypted data is then transmitted to the access control management host 120 via the communication module 122 to ensure the confidentiality and integrity of the data transmission.

透過上述前置作業,門禁管理系統100能夠建立完整的身份驗證機制,確保後續門禁操作的安全性與可靠性,並有效防止未經授權的存取。為確保門禁管理主機120與電信平台140之間的通訊安全,該運算模組126透過該通訊模組122向該電信平台140發送安全通訊請求,請求提供電信公鑰與電信私鑰。電信平台140收到請求後,生成一組專用的加密金鑰,並回應門禁管理主機120。門禁管理主機120獲取電信私鑰後,將使用該私鑰加密用戶識別碼與用戶身份資料,以確保與電信平台140之間的數據傳輸安全,並防止未經授權的存取或數據攔截。 Through the aforementioned pre-installation, the access control management system 100 is able to establish a complete identity authentication mechanism, ensuring the security and reliability of subsequent access control operations and effectively preventing unauthorized access. To ensure secure communication between the access control management host 120 and the telecommunications platform 140, the computing module 126 sends a secure communication request to the telecommunications platform 140 via the communication module 122, requesting the provision of a telecommunications public key and a telecommunications private key. Upon receiving the request, the telecommunications platform 140 generates a dedicated encryption key and responds to the access control management host 120. After obtaining the telecommunications private key, the access control management host 120 uses it to encrypt the user identification code and user identity information, ensuring secure data transmission with the telecommunications platform 140 and preventing unauthorized access or data interception.

透過上述前置作業,門禁管理系統100完成使用者註冊、身份綁定及加密通訊機制的建立,為後續的門禁驗證與存取控制提供安全可靠的基礎。 Through the above preparatory steps, the access control management system 100 completes user registration, identity binding, and the establishment of an encrypted communication mechanism, providing a secure and reliable foundation for subsequent access control authentication and access control.

接著,介紹門禁管理系統的門禁管理方法的流程。圖3為依據本新型一實施例之一種門禁管理方法的流程示意圖,該流程描述門禁 管理系統100如何透過多層身份驗證,確保使用者能夠安全且有效地存取門禁設備130。 Next, the access control management method of the access control management system is described. Figure 3 is a schematic diagram of the access control management method according to an embodiment of the present invention. This process describes how the access control management system 100 ensures secure and efficient user access to access control devices 130 through multi-layer identity authentication.

在步驟305中,手機110的生物辨識模組112對使用者進行生物辨識。該生物辨識模組112可包含指紋辨識模組、臉部辨識模組或虹膜辨識模組,透過掃描與比對使用者生物特徵,產生生物驗證結果。 In step 305, the biometric module 112 of the mobile phone 110 performs biometric identification on the user. The biometric module 112 may include a fingerprint recognition module, a facial recognition module, or an iris recognition module, which scans and compares the user's biometric features to generate a biometric verification result.

在步驟310中,檢查該生物驗證結果是否為成功。如果成功,則執行步驟315,進行下一階段的身份驗證;若失敗,則執行步驟355,終止整個門禁管理流程,確保未經授權的使用者無法進行門禁存取。 In step 310, the biometric verification result is checked to see if it is successful. If so, step 315 is executed to proceed to the next stage of identity verification. If not, step 355 is executed to terminate the entire access control management process, ensuring that unauthorized users cannot gain access to the access control system.

在步驟315中,手機110的門禁管理模組116使用系統私鑰對該用戶識別碼與該用戶身份資料進行加密,並透過手機110的通訊介面將加密數據傳送至門禁管理主機120的通訊模組122,確保數據在傳輸過程中免受未經授權的存取或攔截。 In step 315, the access control management module 116 of the mobile phone 110 uses the system private key to encrypt the user identification code and user identity information, and transmits the encrypted data to the communication module 122 of the access control management host 120 via the communication interface of the mobile phone 110, ensuring that the data is protected from unauthorized access or interception during transmission.

在步驟320中,門禁管理主機120的運算模組126使用系統公鑰對加密之用戶識別碼與用戶身份資料進行解密,以恢復該數據並準備進行門禁核准驗證。 In step 320, the computing module 126 of the access control management host 120 uses the system public key to decrypt the encrypted user identification code and user identity information to restore the data and prepare for access control verification.

在步驟325中,運算模組126自該儲存模組124接收門禁核准清單,並驗證該用戶識別碼與該用戶身份資料是否列在門禁核准清單上,以判斷該使用者是否具備進入門禁設備130的權限。 In step 325, the computing module 126 receives the access control authorization list from the storage module 124 and verifies whether the user identification code and the user identity information are listed on the access control authorization list to determine whether the user has permission to enter the access control device 130.

在步驟330中,檢查該核准驗證結果是否為成功。如果成功,則執行步驟335,進行下一階段的電信驗證;若失敗,則執行步驟 355,終止整個門禁管理流程,以確保未獲授權之使用者無法繼續門禁請求。 In step 330, the verification result is checked to see if it is successful. If so, step 335 is executed to proceed to the next stage of telecommunications verification. If not, step 355 is executed to terminate the entire access control management process to ensure that unauthorized users cannot continue access control requests.

在步驟335中,門禁管理主機120的運算模組126使用電信私鑰對該用戶識別碼與該用戶身份資料進行加密,並透過通訊模組122將加密後的數據安全地傳送至電信平台140,以進一步驗證該使用者的電信身份資訊。 In step 335, the computing module 126 of the access control management host 120 uses the telecommunications private key to encrypt the user identification code and the user identity data, and securely transmits the encrypted data to the telecommunications platform 140 via the communication module 122 for further verification of the user's telecommunications identity information.

在步驟340中,電信平台140根據接收到的加密數據進行解密,並驗證該SIM卡114的用戶識別碼與該用戶身份資料是否與其內部儲存的使用者資訊相符,以確認該使用者之電信身份。 In step 340, the telecommunications platform 140 decrypts the received encrypted data and verifies whether the user identification code and user identity information of the SIM card 114 match the user information stored therein, thereby confirming the telecommunications identity of the user.

在步驟345中,檢查該電信驗證結果是否為成功。如果成功,則執行步驟350,發送門禁開鎖指令;若失敗,則執行步驟355,終止整個門禁管理流程,防止未經授權的使用者進入門禁設備130。 In step 345, the telecommunications verification result is checked to see if it is successful. If so, step 350 is executed to send an access unlock command. If not, step 355 is executed to terminate the entire access control management process, preventing unauthorized users from accessing access control device 130.

在步驟350中,當門禁管理主機120接收到來自電信平台140的「成功」驗證結果後,運算模組126透過通訊模組122發送開鎖指令至門禁設備130,使門禁設備130解鎖,允許該使用者進入。此機制確保使用者經過多重身份驗證後,才能獲得授權存取門禁設備130,提高門禁管理系統100的安全性與可靠性。 In step 350, when the access control management host 120 receives the "successful" authentication result from the telecommunications platform 140, the computing module 126 sends an unlock command to the access control device 130 via the communication module 122, unlocking the access control device 130 and allowing the user access. This mechanism ensures that users are authorized to access the access control device 130 only after undergoing multiple identity verifications, thereby enhancing the security and reliability of the access control management system 100.

由上述可知,本新型提供一種基於手機SIM卡與生物辨識技術的門禁管理系統及方法,透過雙重驗證機制與加密技術,提高門禁管理的安全性、可靠性與便利性。具體而言,本新型具有以下技術優點:雙重身份驗證機制,提升門禁安全性:本新型結合生物辨識技術(如指紋、臉部或虹膜辨識)與SIM卡用戶識別碼驗證,確保進入 門禁的使用者為合法身份持有者。生物辨識驗證成功後,才允許使用者發送加密後的用戶識別碼與身份資料,進一步提升門禁系統的安全性,減少因卡片遺失或被盜用所造成的安全風險。 As can be seen from the above, this novel system provides an access control management system and method based on mobile phone SIM cards and biometric technology. This system enhances the security, reliability, and convenience of access control management through a dual authentication mechanism and encryption technology. Specifically, this system offers the following technical advantages: Dual authentication enhances access control security: This system combines biometric technology (such as fingerprint, facial, or iris recognition) with SIM card user identification code verification to ensure that users entering the access control area are legitimate. Only after successful biometric verification is the user allowed to send an encrypted user identification code and identity information, further enhancing the security of the access control system and reducing the risks associated with card loss or theft.

多層加密機制,確保數據傳輸安全:手機端加密讓門禁管理模組在傳輸用戶識別碼與身份資料時,使用系統私鑰加密,避免未經授權的攔截與竄改。門禁管理主機解密後,會再次使用電信私鑰加密,並傳送至電信平台進行最終驗證,確保數據完整性與安全性。電信平台透過電信公鑰進行解密,確保來自門禁管理主機的用戶識別碼與身份資料未被篡改,從而防止中間人攻擊(Man-in-the-Middle Attack,MITM Attack)。 Multi-layer encryption ensures data transmission security: Mobile-side encryption allows the access control module to encrypt user IDs and identity information using the system's private key, preventing unauthorized interception and modification. After decryption by the access control host, the data is re-encrypted using the carrier's private key and sent to the telecommunications platform for final verification, ensuring data integrity and security. The telecommunications platform decrypts the data using the carrier's public key, ensuring that the user ID and identity information from the access control host have not been tampered with, thereby preventing man-in-the-middle attacks (MITM attacks).

基於SIM卡的門禁管理,提高身份驗證準確性:與傳統卡片式門禁系統相比,本新型使用SIM卡內儲存的用戶識別碼進行身份驗證,確保每位使用者皆有唯一的識別碼,降低複製或偽造的風險。電信平台比對SIM卡識別碼與該識別碼對應的身份資料,進一步確認該手機是否屬於該使用者,防止冒名進入。 SIM card-based access control improves identity verification accuracy: Compared to traditional card-based access control systems, this new system uses the user identification code stored on the SIM card for identity verification, ensuring each user has a unique identification code and reducing the risk of duplication or forgery. The telecommunications platform compares the SIM card identification code with the corresponding identity data to further confirm that the phone belongs to the user, preventing unauthorized access.

門禁核准清單與時間戳記機制,增強門禁權限控管:門禁管理主機包含門禁核准清單,可根據事先授權的使用者名單進行身份驗證,確保只有特定人員能夠通過門禁。門禁管理模組在發送驗證資訊時,會產生時間戳記,防止惡意攻擊者重播先前的驗證資訊(防止重放攻擊)。 Access control authorization list and timestamp mechanism enhance access control: The access control management host includes an access authorization list that can perform identity verification based on a list of pre-authorized users, ensuring that only designated individuals can access the access control system. The access control management module generates a timestamp when sending verification information to prevent malicious attackers from replaying previous verification information (preventing replay attacks).

無需額外硬體裝置,降低設備成本與維護負擔:本新型不需要額外的實體門禁卡、讀卡機,僅需透過手機、門禁管理主機與電信平台進行身份驗證,降低門禁系統的建置與維護成本。使用者只需使用已綁 定SIM卡的手機即可完成門禁驗證,減少遺失實體門禁卡的風險,提高便利性。 No additional hardware required, reducing equipment costs and maintenance burdens: This new system eliminates the need for physical access cards or card readers. Identity verification is performed solely through a mobile phone, access control host, and telecommunications platform, reducing the cost of establishing and maintaining the access control system. Users simply use a mobile phone with a bound SIM card to complete access verification, reducing the risk of losing physical access cards and improving convenience.

靈活的門禁權限設定,適應不同應用場景:門禁管理主機可根據門禁權限設定,對使用者的門禁存取權限進行細緻管理,如特定區域的門禁授權或特定時間段內的進出限制,適用於企業、政府機構、學校與智慧建築等不同應用環境。透過電信平台進行身份比對,可進一步提供遠端管理功能,如即時撤銷門禁權限,提升門禁系統的靈活性。 Flexible access control settings adapt to different application scenarios: The access control management host can manage user access rights in detail based on access control settings, such as authorizing access to specific areas or restricting access during specific time periods. This is suitable for various application environments, including enterprises, government agencies, schools, and smart buildings. Identity matching through the telecommunications platform further provides remote management functions, such as the instant revocation of access control permissions, enhancing the flexibility of the access control system.

雖然本新型已以實施方式揭露如上,然其並非用以限定本新型,任何熟習此技藝者,在不脫離本新型之精神和範圍內,當可作各種之更動與潤飾,因此本新型之保護範圍當視後附之申請專利範圍所界定者為準。 Although the present invention has been disclosed above in terms of implementation, it is not intended to limit the present invention. Anyone skilled in the art may make various modifications and improvements without departing from the spirit and scope of the present invention. Therefore, the scope of protection of the present invention shall be determined by the scope of the attached patent application.

100:門禁管理系統 100: Access Control System

110:手機 110: Mobile phone

112:生物辨識模組 112: Biometric Module

114:SIM卡 114: SIM card

116:門禁管理模組 116: Access Control Management Module

120:門禁管理主機 120: Access control management host

122:通訊模組 122: Communication Module

124:儲存模組 124: Storage Module

126:運算模組 126: Computational Module

130:門禁設備 130: Access control equipment

140:電信平台 140: Telecommunications Platform

Claims (6)

一種門禁管理系統,包含:一手機,屬於一使用者,該手機包含:一生物辨識模組,辨識一待定生物特徵所產生之待定生物辨識碼,並驗證該待定生物辨識碼是否和該使用者之一用戶生物辨識碼相符,得到一生物驗證結果;一SIM卡,儲存該使用者之一用戶識別碼;以及一門禁管理模組,具有一門禁管理應用程式並與該SIM卡和該生物辨識模組電性相接,該門禁管理模組取得該SIM卡之該用戶識別碼和該使用者之用戶身份資料,並接收該生物辨識模組之該生物驗證結果;以及一門禁管理主機,包含:一通訊模組,與該手機之該門禁管理模組通訊相接,還與一電信平台和一門禁設備通訊相接,該通訊模組自該門禁管理模組接收該用戶識別碼以及該用戶身份資料,其中該電信平台具有該使用者之該用戶識別碼及該用戶身份資料;一儲存模組,儲存該門禁設備之一門禁核准清單;一運算模組,與該通訊模組和該儲存模組電性連接,當該生物驗證結果為「成功」時,該門禁管理模組將該用戶識別碼和該用戶身份資料加密後再傳送給該運算模組,然後該運算模組對加密後之該用戶識別碼和該用戶身份資料進行解密,並自該儲存模組接收該門禁核准清單,以驗證該用戶識別碼和該用戶身份資料是否列在該門禁核准清單上,得到一核准驗證結果,當該核准驗證結果為「成功」時,該運算模組加密該用戶識別碼和該用戶身份資料,透過該通訊模組傳送給該電信平台,該電信平台對加密後之該用戶識別碼和該用戶身份資料進行解密,以驗證該用戶識別碼和該用戶身份資料,得到一電信驗證結果並回傳給該運算模組,當該電信驗證結果為「成功」時,該運算模組發出開鎖指令給該門禁設備。An access control management system includes: a mobile phone belonging to a user, the mobile phone including: a biometric identification module, identifying a pending biometric identification code generated by a pending biometric feature, and verifying whether the pending biometric identification code matches a user biometric identification code of the user to obtain a biometric verification result; a SIM card, storing a user identification code of the user; and an access control management module having an access control management application and electrically connected to the SIM card and the biometric identification module. The present invention relates to a mobile phone access control host comprising: a mobile phone access control module, ... a computing module electrically connected to the communication module and the storage module; when the biometric verification result is "successful", the access control management module encrypts the user identification code and the user identity data and transmits them to the computing module; the computing module then decrypts the encrypted user identification code and the user identity data and receives the access control approval list from the storage module to verify whether the user identification code and the user identity data are listed in the access control approval list. The computing module obtains an approval verification result on the list. When the approval verification result is "successful", the computing module encrypts the user identification code and the user identity data and transmits them to the telecommunications platform through the communication module. The telecommunications platform decrypts the encrypted user identification code and the user identity data to verify the user identification code and the user identity data, obtains a telecommunications verification result and returns it to the computing module. When the telecommunications verification result is "successful", the computing module issues an unlocking command to the access control device. 如請求項1所述之門禁管理系統,其中該生物辨識模組包含指紋辨識模組、臉部辨識模組和虹膜辨識模組中至少之一。The access control management system as described in claim 1, wherein the biometric recognition module includes at least one of a fingerprint recognition module, a facial recognition module, and an iris recognition module. 如請求項1所述之門禁管理系統,其中該手機的該門禁管理模組請求該門禁管理主機的該運算模組提供系統公鑰與系統私鑰,讓該門禁管理模組使用該系統私鑰將該用戶識別碼和該用戶身份資料加密後再傳送給該運算模組,然後該運算模組使用該系統公鑰對加密後之該用戶識別碼和該用戶身份資料進行解密。The access control management system as described in claim 1, wherein the access control management module of the mobile phone requests the computing module of the access control management host to provide a system public key and a system private key, allowing the access control management module to use the system private key to encrypt the user identification code and the user identity data and then transmit them to the computing module, and then the computing module uses the system public key to decrypt the encrypted user identification code and the user identity data. 如請求項1所述之門禁管理系統,其中該門禁管理主機的該運算模組透過該通訊模組向該電信平台請求提供電信公鑰和電信私鑰,讓該運算模組以該電信私鑰加密該用戶識別碼和該用戶身份資料後再傳送給該電信平台,然後該電信平台使用該電信公鑰對加密後之該用戶識別碼和該用戶身份資料進行解密。The access control management system as described in claim 1, wherein the computing module of the access control management host requests the telecommunications platform to provide a telecommunications public key and a telecommunications private key through the communication module, allowing the computing module to encrypt the user identification code and the user identity information with the telecommunications private key and then transmit them to the telecommunications platform. The telecommunications platform then uses the telecommunications public key to decrypt the encrypted user identification code and the user identity information. 如請求項1所述之門禁管理系統,其中該門禁管理模組在傳送該用戶識別碼和該用戶身份資料前,進一步產生一時間戳記,並將該時間戳記與該用戶識別碼和該用戶身份資料一同加密後傳送至該門禁管理主機。The access control management system as described in claim 1, wherein the access control management module further generates a timestamp before transmitting the user identification code and the user identity data, and encrypts the timestamp together with the user identification code and the user identity data and transmits it to the access control management host. 如請求項1所述之門禁管理系統,其中該門禁管理主機之該儲存模組還儲存該門禁設備之一門禁權限設定,在該電信驗證結果為「成功」後,該運算模組接收並依據該門禁權限設定,限定該用戶識別碼和該用戶身份資料的門禁使用範圍與門禁時段,確認該使用者是否於該門禁使用範圍與該門禁時段內要求出入該門禁設備,當符合時,該運算模組才發出該開鎖指令給該門禁設備。The access control management system as described in claim 1, wherein the storage module of the access control management host also stores an access control permission setting of the access control device. After the telecommunications verification result is "successful", the computing module receives and, based on the access control permission setting, limits the access control usage range and access control time period of the user identification code and the user identity information, and confirms whether the user requests to enter or exit the access control device within the access control usage range and the access control time period. Only when the requirements are met, the computing module issues the unlocking command to the access control device.
TW114204517U 2025-05-06 2025-05-06 Access control management system TWM673943U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW114204517U TWM673943U (en) 2025-05-06 2025-05-06 Access control management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW114204517U TWM673943U (en) 2025-05-06 2025-05-06 Access control management system

Publications (1)

Publication Number Publication Date
TWM673943U true TWM673943U (en) 2025-08-21

Family

ID=97520736

Family Applications (1)

Application Number Title Priority Date Filing Date
TW114204517U TWM673943U (en) 2025-05-06 2025-05-06 Access control management system

Country Status (1)

Country Link
TW (1) TWM673943U (en)

Similar Documents

Publication Publication Date Title
CN112214745B (en) Authenticated external biometric reader and verification device
EP0924656B2 (en) Personal identification FOB
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US9953151B2 (en) System and method identifying a user to an associated device
US8070061B2 (en) Card credential method and system
US8689013B2 (en) Dual-interface key management
JP5538313B2 (en) Biometric key
EP0924657B2 (en) Remote idendity verification technique using a personal identification device
US20050240779A1 (en) Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
US20070271596A1 (en) Security, storage and communication system
JP2004518229A (en) Method and system for ensuring the security of a computer network and personal identification device used within the system to control access to network components
WO2007103298A2 (en) Security, storage and communication system
EP1603003A1 (en) Flexible method of user authentication
US20150143511A1 (en) System and method for high security biometric access control
US20060107064A1 (en) API for a system having a passcode authenticator
JP2009181561A (en) Security management system using biometric authentication
CN104135480A (en) Entrance guard authorization system and entrance guard authorization method
CN113421362A (en) CTID-based intelligent door lock real-name authentication method, device and system
US20030014642A1 (en) Security arrangement
WO2010048350A1 (en) Card credential method and system
CN110738764A (en) Security control system and method based on intelligent lock
TWM673943U (en) Access control management system
Bechelli et al. Biometrics authentication with smartcard
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices