• Title/Summary/Keyword: Door Lock

Search Result 98, Processing Time 0.026 seconds

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

An Input Method for Decimal Password Based on Eyeblink Patterns (눈깜빡임 패턴에 기반한 십진 패스워드 입력 방법)

  • Lee, Seung Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.656-661
    • /
    • 2022
  • Password with a combination of 4-digit numbers has been widely adopted for various authentication systems (such as credit card authentication, digital door lock systems and so on). However, this system could not be safe because the 4-digit password can easily be stolen by predicting it from the fingermarks on the keypad or display screen. Furthermore, due to the prolonged COVID-19 pandemic, contactless method has been preferred over contact method in authentication. This paper suggests a new password input method based on eyeblink pattern analysis in video sequence. In the proposed method, when someone stands in front of a camera, the sequence of eyeblink motions is captured (according to counting signal from 0 to 9 or 9 to 0), analyzed and encoded, producing the desired 4-digit decimal numbers. One does not need to touch something like keypad or perform an exaggerated action, which can become a very important clue for intruders to predict the password.

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.

ZigBee Authentication Protocol with Enhanced User Convenience and Safety (사용자 편의성 및 안전성이 강화된 ZigBee 인증 프로토콜)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.81-92
    • /
    • 2022
  • The rapidly growing IoT market is expanding not only in general households but also in smart homes and smart cities. Among the major protocols used in IoT, ZigBee accounts for more than 90% of the smart home's door lock market and is mainly used in miniaturized sensor devices, so the safety of the protocol is very important. However, the device using Zig Bee is not satisfied with the omnidirectional safety because it uses a fixed key during the authentication process that connects to the network, and it has not been resolved in the recently developed ZigBee 3.0. This paper proposes a design method that provides omnidirectional safety to the ZigBee authentication protocol and can be quickly applied to existing protocols. The proposed improved ZigBee authentication protocol analyzed and applied the recently developed OWE protocol to apply ECDH, which has low computational volume and provides omnidirectional safety in IoT. Based on this, it provides the safety of the ZigBee authentication protocol, and it is expected that it will be able to provide user convenience as it does not require a separate certificate or password input.

Actual Conditions of Burglaries and Analysis on Residential Invasion Burglaries in Daegu Area (강도 범죄의 실태 및 대구 지역 침입 강도 범죄 분석)

  • Lee, Sang-Ho;Kwak, Jyung-Sik
    • Journal of forensic and investigative science
    • /
    • v.2 no.2
    • /
    • pp.5-20
    • /
    • 2007
  • During the period from 2001 to 2005, 29,892 burglaries took place in Korea with the approximate average annual number - 5,978 cases. This study was conducted to analyze the reported burglaries and the result was summarized as follows. There were 8,605 residential invasion burglaries (28.8%) as the most frequent characteristic pattern. The exit was used as the most frequent invasion route for 4,031 invasion burglaries (64.3%), and an unlocked exit door or window was used as the most frequent invasion method for 2,462 invasion burglaries (28.6%). The hours just after midnight (between 00:00 and 04:00) were the most frequent time for invasion burglary to occur. Also, 5,652 burglaries occurred on Wednesday which was twice higher than on Sunday (2,988 burglaries). It was shown that the number of persons injured during burglaries were 260 deaths and 10,610 injuries. The places of the highest occurrence were the street with 10,183 burglaries (34%) and then residential place with 7,527 burglaries (approximately 25%). One-man burglary was the highest complicity: 15,012 offenders (56.1%). The knife was used as the most frequent instrument for 6,498 burglaries (24,3%) what is rare, while no criminal tool or instrument was used for 15,631 burglaries (58.4). During the period from 2001 to 2006, 1,506 burglaries occurred in Daegu and the average annual number was 251 burglaries. Among those,515 residential invasion burglaries (34.2%) took place and the average annual number was approximately 86 cases. The hours just after midnight (between 00:00 and 04:00) were the most frequent time for invasion burglary to occur (194 cases, 37.7%), the place of the highest invasion occurrence was the residential place (259 cases, 50.3%), and the exit was used as the most frequent invasion route (87 cases, 37.7%). An unlocked exit door or window was the most frequent invasion method (65 cases, 25.1%). In addition, pretending to be a delivery man, visitor or following the victim methods were used for 26 burglaries (10%). It is apparent that personal preventive measures against crimes, as well as governmental and social measures, play an important role in preventing burglaries. In particular, based on the analyzed result that an unlocked window or exit door was most frequently used for reported burglaries, it seems that there is a lack of understanding of crime prevention while little effort has been made to prevent crimes. Although everyone knows that locking a door is one of the basic measures to prevent crimes, many people tend to pay little attention to lock a door properly so burglary takes place. This study, therefore, is intended to encourage people to pay more careful attention to crime prevention, in order to help reduce the probability of burglary. With the recent improvement in social understanding of scientific crime investigation, a wide variety of police professions, including crime analysts, crime victim police counselors and coroners, have been prepared to develop the scientific crime investigation and crime analysis. In addition, it is hoped that further this study will contribute to encourage studies on crime prevention to be carried out in the future.

  • PDF

A Study on the Ancient Architecture in view of the Stone Remains (focused on the 3 Kingdom Period and Unificated Shilla Period) (석조유구(石造遺構)를 통한 한국(韓國) 고대건축(古代建築)에 관한 연구(硏究) -삼국시대와 통일신라시대를 중심으로-)

  • Cheon, Deuk-Youm;Park, Ji-Min
    • Journal of architectural history
    • /
    • v.8 no.3 s.20
    • /
    • pp.23-38
    • /
    • 1999
  • The purpose of this study is to analogize the appearance of Korean Ancient Architecture in view of the Stone Remains from 3 Kingdom Period to Unificated Shilla Period. But in these period, there is no building remains but some stupas and fine arts. Especially, there are many architectural appearance and revealing signature in these Historical Stone remains. Architectural elements which are analogized by stone remains what has value as historical materials by preservation of original form from 3 Kingdom Preiod to Unificated Shilla Period are as follows : 1) Platform, the representative characteristic of Korean traditional architecture, was frame structure and accumulate structure. And circular or square footing stood a same shape column on it is put on the platform. 2) In the case of column, there used entasis column and inclined column and circular chamfer technique was applied on the top side of it. Upper side of column, capital and head pentrating tie that small bearing block was put on the center of it was joined. And longitu야nal rest(長舌) supported a cross beam. Capital and small bearing block had no bottom heel, and heel side was curved and straight. Centered bracket structure was often used, and multi bracket structure is not used yet. Inward incline technique was used. 3) Inward opening pair door which had lintel, threshold, doorjamb was usually used, Fixing stone was used for structural safety, and circular handle and lock was used for decoration. Handrail was used on the edge of wooden floor for decorative effect and safety. 4) Square rafter and circular rafter were used in the same period and so did flying rafter. Double eaves and single eave were used in the same period but, single eave was usually used. In this period, square rafter was usually used. This would be studied more by comparing with Japanese wooden architecture. 5) Hipped roof was used and half-hipped roof was not used yet. In front of th hip, there are small sculpture called Jap-Sang(雜像), and windbell was hang on the end of the hip rafter. Concave roof tile, convex roof tile, round eaver tile, decorative tile at end of roof ridge were used. Lotus style was well used on the face of roof tile for decoration. From the results of this study, wooden architecture of Unificated Shilla period was simple compare to Koryo dynasty and Chosun dynasty but, it had some brilliant character. It was hard work that analogized the form of non-existent wood architecture of Ancient Korean period by restricted stone remains. But, in addition to the results of this study and research of old documentations, more study should be go on.

  • PDF

A Design and Implementation of NFC Bridge Chip (NFC 브릿지 칩 설계 및 구현)

  • Lee, Pyeong-Han;Ryu, Chang-Ho;Chun, Sung-Hun;Kim, Sung-Wan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.96-101
    • /
    • 2015
  • This paper describes a design and implementation of the NFC bridge chip which performs interface between kinds of devices and mobile phones including NFC controller through NFC communication. The NFC bridge chip consists of the digital part and the analog part which are based on NFC Forum standard. Therefore the chip treats RF signals and then transforms the signal to digital data, so it can interface kinds of devices with the digital data. Especially the chip is able to detect RF signals and then wake up the host processor of a device. The wakeup function dramatically decreases the power consumption of the device. The carrier frequency is 13.56MHz, and the data rate is up to 424kbps. The chip has been fabricated with SMIC 180nm mixed-mode technology. Additionally an NFC bridge chip application to the blood glucose measurement system is described for an application example.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.