• Title/Summary/Keyword: Pattern lock

Search Result 57, Processing Time 0.022 seconds

A proposal of Circular Lock Pattern Method on Smart phone (원형 스마트폰 잠금 패턴 방식 제안)

  • Im, Ji-woo;Lee, Seung-jay;Jang, Won-jun;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1471-1477
    • /
    • 2019
  • Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users' smart phones don't support biometric security. The most convenient security method for devices that don't support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It's expected to solve vulnerability.

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

Likelihood-based Directional Optimization for Development of Random Pattern Authentication System (랜덤 패턴 인증 방식의 개발을 위한 우도 기반 방향입력 최적화)

  • Choi, Yeonjae;Lee, Hyun-Gyu;Lee, Sang-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.71-80
    • /
    • 2015
  • Many researches have been studied to overcome the weak points in authentication schemes of mobile devices such as pattern-authentication that is vulnerable for smudge-attack. Since random-pattern-lock authenticates users by drawing figure of predefined-shape, it can be a method for robust security. However, the authentication performance of random-pattern-lock is influenced by input noise and individual characteristics sign pattern. We introduce an optimization method of user input direction to increase the authentication accuracy of random-pattern-lock. The method uses the likelihood of each direction given an data which is angles of line drawing by user. We adjusted recognition range for each direction and achieved the authentication rate of 95.60%.

Development of a Door System by Speaker Verification Using Weighted Cepstrum and Single Average Pattern

  • Kyung, Youn-Jeong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.2E
    • /
    • pp.60-68
    • /
    • 1996
  • In this paper, we implement the door lock system based on pattern matching technique for speaker recognition using DTW. In this study, major features of our system are summarized as follows:(1) Make the average reference pattern using DTW. This method keeps the high recognition rate compared with the other systems whose performances degrade rapidly as time goes on. (2) Use F-ratio values of the cepstral coefficients. We find that the weighted cepstral reveals an effect on intensifying the difference between th customer and the imposter. The system hardware is composed of two parts : the door lock part and the speaker recognition processing part. We use an 8051 microprocessor in the door lock park for serial communication with host processor to open or close the lock. Using our system, we obtain speaker recognition rate of about 99.5%.

  • PDF

Layered Pattern Authentication Scheme on Smartphone Resistant to Social Engineering Attacks (사회공학적 공격에 강인한 스마트폰 계층화 패턴 인증 기법)

  • Tak, Dongkil;Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.280-290
    • /
    • 2016
  • In this paper, we propose a layered pattern authentication scheme resistant to social engineering attacks. Existing android pattern lock scheme has some weak points for social engineering attacks. Thus, the proposed scheme improves the existing pattern lock scheme. In our scheme, pattern is recorded by touch screen, however, it is different with existing schemes because of the layered pattern. During the pattern registration process, users register their own pattern with many layers. Thus, registered pattern is 3D shape. When the smudge attack is occurring, the attacker can see the shape of user pattern through the smudge on smartphone screen. However, it is described on 2D surface, so acquired pattern is not fully determine to users original 3D shape. Therefore, our scheme is resistant to social engineering attack, especially smudge attack.

The Design of Microstrip Array Antenna with Phase Lock (위상 고정 마이크로스트립 어레이 안테나 설계)

  • 강희조;오양현;고영혁
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.28A no.10
    • /
    • pp.791-798
    • /
    • 1991
  • In this paper, microstrip array antenna with the phase lock are designed to consist of main lobe and sidelobe with difference 21.97dB for sharp beam pattern using Tchebyscheff polynominals. Microstrip array antenna with phase lock of 0$^{\circ}$, 45$^{\circ}$, 90$^{\circ}$ are designed, to scan beam for 0$^{\circ}$, 6$^{\circ}$, 12$^{\circ}$ to be 1:2:2:1 for the relative current distribution. The designed microstrip array antenna with phase lock is measured in terms of various characteristics such as return loss, resonant frequency, radiation pattern, bandwidth, beamwidth, and the measurement value and theoretical value agreed with each other. Also, the patch array antenna with the relative current distribution is presented phase shift for beam scanning.

  • PDF

Direct Numerical Simulation of the Flow Past an Oscillating Circular Cylinder (진동하는 원주주위 유동의 직접수치해석)

  • Kang S. J.;Tanahashi M.;Miyauchi T.;Lee Y. H.
    • Journal of computational fluids engineering
    • /
    • v.6 no.4
    • /
    • pp.26-34
    • /
    • 2001
  • The flow past a circular cylinder forced to vibrate transversely is numerically simulated by solving the two-dimensional Navier-Stokes equations modified by the vibration velocity of a circular cylinder at a Reynolds number of 164. The higher-order finite difference scheme is employed for the spatial discretization along with the second order Adams-Bashforth and the first order backward-Euler time integration. The calculated cylinder vibration frequency is between 0.60 and 1.30 times of the natural vortex-shedding frequency. The calculated oscillation amplitude extends to 25% of the cylinder diameter and in the case of the lock-in region it is 60%. It is made clear that the cylinder oscillation has influence on the wake pattern, the time histories of the drag and lift forces, power spectral density and phase diagrams, etc. It is found that these results include both the periodic (lock-in) and the quasi-periodic (non-lock-in) state. The vortex shedding frequency equals the driving frequency in the lock-in region but is independent in the non-lock-in region. The mean drag and the maximum lift coefficient increase with the increase of the forcing amplitude in the lock-in state. The lock-in boundaries are also established from the present direct numerical simulation.

  • PDF

Direct Numerical Simulation of the Flow Past an Oscillating Circular Cylinder (진동하는 원주주위 유동의 직접수치해석)

  • KANG Shin-Jeong;TANAHASHI Mamoru;MIYAUCHI Toshio;NAM Cheong-Do;LEE Young-Ho
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2001.05a
    • /
    • pp.181-188
    • /
    • 2001
  • The flow past a circular cylinder forced to vibrate transversely is numerically simulated by solving the two-dimensional Wavier-Stokes equations modified by the vibration velocity of a circular cylinder at a Reynolds number of 164. The higher-order finite difference scheme is employed for the spatial discretization along with the second order Adams-Bashforth and the first order backward-Euler time integration. The calculated cylinder vibration frequency is between 0.60 and 1.30 times of the natural vortex-shedding frequency. The calculated oscillation amplitude extends to $25\%$ of the cylinder diameter and in the case of the lock-in region it is $60\%$. It is made clear that the cylinder oscillation has influence on the wake pattern, the time histories of the drag and lift forces, power spectral density and phase diagrams, etc. It is found that these results include both the periodic (lock-in) and the quasi-periodic (non-lock-in) state. The vortex shedding frequency equals the driving frequency in the lock-in region but is independent in the non-lock-in region. The mean drag and the maximum lift coefficient increase with the increase of the forcing amplitude in the lock-in state. The lock-in boundaries are also established from the present direct numerical simulation.

  • PDF

Leakage and Rotordynamic Analysis of Damper Floating Ring Seal with Round­Hole Surfaces in the High Pressure Turbo Pump (원형 단면 구멍 표면을 갖는 댐퍼 후로팅 링 실의 누설량 및 회전체 동역학적 특성 해석)

  • 하태웅;이용복;김창호
    • Tribology and Lubricants
    • /
    • v.19 no.6
    • /
    • pp.349-356
    • /
    • 2003
  • A damper floating ring seal with round hole pattern surfaces is suggested for better leakage control. The flat plate test of the round hole pattern surfaces has been performed to yield an empirical friction factor model. The exact predictions of the lock­up position of the damper floating ring, the leakage performance, and the rotordynamic coefficients of the seal are necessary to evaluate the rotordynamic performance of the turbo pump unit. The governing equations including the empirical friction factor model for round hole pattern surfaces are solved by the Fast Fourier Transform method. The lock­up position, leakage flow rate, and rotordynamic coefficients are evaluated according to the geometric parameters of the damper floating ring seal. Theoretical results show that the damper floating ring seals yield less leakage and better rotordynamic stability than the floating ring seal with a smooth surface.

A Study on the Phoneme Segmentation of Handwritten Korean Characters by Local Graph Patterns on Contacting Points (접촉점에서의 국소 그래프 패턴에 의한 필기체 한글의 자소분리에 관한 연구)

  • 최필웅;이기영;구하성;고형화
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.4
    • /
    • pp.1-10
    • /
    • 1993
  • In this paper, a new method of phoneme segmentation of handwritten Korean characters using the local graph pattern is proposed. At first, thinning was performed before extracting features. End-point, inflexion-point, branch-point and cross-point were extracted as features. Using these features and the angular relations between these features, local graph pattern was made. When local graph pattern is made, the of strokes is investigated on contacting point. From this process, pattern is simplified as contacting pattern of the basic form and the contacting form we must take into account can be restricted within fixed region, 4therefore phoneme segmentation not influenced by characters form and any other contact in a single character is performed as matching this local graph pattern with base patterns searched ahead. This experiments with 540 characters have been conducted. From the result of this experiment, it is shown that phoneme segmentation is independent of characters form and other contact in a single character to obtain a correct segmentation rate of 95%, manages it efficiently to reduce the time spent in lock operation when the lock.

  • PDF