• 제목/요약/키워드: Pattern-lock

검색결과 57건 처리시간 0.025초

원형 스마트폰 잠금 패턴 방식 제안 (A proposal of Circular Lock Pattern Method on Smart phone)

  • 임지우;이승재;장원준;권혁동;서화정
    • 한국정보통신학회논문지
    • /
    • 제23권11호
    • /
    • pp.1471-1477
    • /
    • 2019
  • 스마트폰에는 현재 다양한 보안 방식이 사용되고 있다. 그중에서도 핀 번호와 패턴 잠금 방식은 초기 스마트폰부터 사용되었을 정도로 오래 사용되었다. 하지만 패턴 잠금 방식은 오래 사용된 만큼 보안이 취약하다. 핀 번호 방식의 보안 강도가 약간 높은 정도라면 패턴 잠금 방식은 중간 정도에 그친다. 그럼에도 많은 스마트폰 사용자들은 패턴 잠금 방식을 이용하고 있는데 아직 생체보안을 지원하지 않는 기종을 사용하는 사용자가 있기 때문이다. 생체보안을 지원하지 않는 기종에서 제일 편리한 보안 방식은 패턴 잠금 방식이다. 그러나 기존의 패턴 잠금 방식은 Shoulder surfing attack과 Smudge attack에 취약하다. 따라서 패턴 잠금 방식의 편리성을 유지하면서 동시에 기존 방식의 취약점을 해결하는 방식을 제안하고자 한다. 제안하는 방식은 화면에 배치되는 각각의 점을 원형으로 배치한 뒤 무작위로 숫자를 부여하는 잠금 방식이다. 본 방식을 도입하게 된다면 기존의 취약점을 상당히 해결할 수 있다. 즉, 기존의 패턴 잠금 방식에 비해 보안성을 높일 수 있다.

기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석 (Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems)

  • 정성미;권태경
    • 정보보호학회논문지
    • /
    • 제26권4호
    • /
    • pp.903-910
    • /
    • 2016
  • 터치스크린 기반 스마트 기기가 널리 보급 되면서 모바일 환경을 위한 주요 인증 메커니즘으로 그래픽 패스워드 기법 중 하나인 패턴 락 시스템이 등장했다. 사용자가 잠금 해제를 위하여 패턴 락을 사용한 후의 남아있는 패턴 모양의 흔적은 스머지 공격에 취약하다. 이러한 스머지 공격에 대응하기 위하여 TinyLock을 포함한 다양한 패턴 락이 제안되었다. 본 논문에서는 스머지 공격이 발생할 수 있는 환경에서 획득한 스머지 패턴 이미지를 이용하여 기계 학습을 통한 자동화된 스머지 공격의 유효성에 대하여 실험하고 안드로이드 패턴 락과 TinyLock의 안전성에 대하여 비교 분석하였다. 자동화된 스머지 공격에서 높은 공격 성공률을 보였으며 기존에 많이 사용되고 있는 안드로이드 패턴 락이 TinyLock보다 더 안전하지 않음을 검증하였다.

랜덤 패턴 인증 방식의 개발을 위한 우도 기반 방향입력 최적화 (Likelihood-based Directional Optimization for Development of Random Pattern Authentication System)

  • 최연재;이현규;이상철
    • 한국멀티미디어학회논문지
    • /
    • 제18권1호
    • /
    • pp.71-80
    • /
    • 2015
  • Many researches have been studied to overcome the weak points in authentication schemes of mobile devices such as pattern-authentication that is vulnerable for smudge-attack. Since random-pattern-lock authenticates users by drawing figure of predefined-shape, it can be a method for robust security. However, the authentication performance of random-pattern-lock is influenced by input noise and individual characteristics sign pattern. We introduce an optimization method of user input direction to increase the authentication accuracy of random-pattern-lock. The method uses the likelihood of each direction given an data which is angles of line drawing by user. We adjusted recognition range for each direction and achieved the authentication rate of 95.60%.

Development of a Door System by Speaker Verification Using Weighted Cepstrum and Single Average Pattern

  • Kyung, Youn-Jeong
    • The Journal of the Acoustical Society of Korea
    • /
    • 제15권2E호
    • /
    • pp.60-68
    • /
    • 1996
  • In this paper, we implement the door lock system based on pattern matching technique for speaker recognition using DTW. In this study, major features of our system are summarized as follows:(1) Make the average reference pattern using DTW. This method keeps the high recognition rate compared with the other systems whose performances degrade rapidly as time goes on. (2) Use F-ratio values of the cepstral coefficients. We find that the weighted cepstral reveals an effect on intensifying the difference between th customer and the imposter. The system hardware is composed of two parts : the door lock part and the speaker recognition processing part. We use an 8051 microprocessor in the door lock park for serial communication with host processor to open or close the lock. Using our system, we obtain speaker recognition rate of about 99.5%.

  • PDF

사회공학적 공격에 강인한 스마트폰 계층화 패턴 인증 기법 (Layered Pattern Authentication Scheme on Smartphone Resistant to Social Engineering Attacks)

  • 탁동길;최동민
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.280-290
    • /
    • 2016
  • In this paper, we propose a layered pattern authentication scheme resistant to social engineering attacks. Existing android pattern lock scheme has some weak points for social engineering attacks. Thus, the proposed scheme improves the existing pattern lock scheme. In our scheme, pattern is recorded by touch screen, however, it is different with existing schemes because of the layered pattern. During the pattern registration process, users register their own pattern with many layers. Thus, registered pattern is 3D shape. When the smudge attack is occurring, the attacker can see the shape of user pattern through the smudge on smartphone screen. However, it is described on 2D surface, so acquired pattern is not fully determine to users original 3D shape. Therefore, our scheme is resistant to social engineering attack, especially smudge attack.

위상 고정 마이크로스트립 어레이 안테나 설계 (The Design of Microstrip Array Antenna with Phase Lock)

  • 강희조;오양현;고영혁
    • 전자공학회논문지A
    • /
    • 제28A권10호
    • /
    • pp.791-798
    • /
    • 1991
  • In this paper, microstrip array antenna with the phase lock are designed to consist of main lobe and sidelobe with difference 21.97dB for sharp beam pattern using Tchebyscheff polynominals. Microstrip array antenna with phase lock of 0$^{\circ}$, 45$^{\circ}$, 90$^{\circ}$ are designed, to scan beam for 0$^{\circ}$, 6$^{\circ}$, 12$^{\circ}$ to be 1:2:2:1 for the relative current distribution. The designed microstrip array antenna with phase lock is measured in terms of various characteristics such as return loss, resonant frequency, radiation pattern, bandwidth, beamwidth, and the measurement value and theoretical value agreed with each other. Also, the patch array antenna with the relative current distribution is presented phase shift for beam scanning.

  • PDF

진동하는 원주주위 유동의 직접수치해석 (Direct Numerical Simulation of the Flow Past an Oscillating Circular Cylinder)

  • 강신정;타나하시 마모루;미야우치 토시오;이영호
    • 한국전산유체공학회지
    • /
    • 제6권4호
    • /
    • pp.26-34
    • /
    • 2001
  • The flow past a circular cylinder forced to vibrate transversely is numerically simulated by solving the two-dimensional Navier-Stokes equations modified by the vibration velocity of a circular cylinder at a Reynolds number of 164. The higher-order finite difference scheme is employed for the spatial discretization along with the second order Adams-Bashforth and the first order backward-Euler time integration. The calculated cylinder vibration frequency is between 0.60 and 1.30 times of the natural vortex-shedding frequency. The calculated oscillation amplitude extends to 25% of the cylinder diameter and in the case of the lock-in region it is 60%. It is made clear that the cylinder oscillation has influence on the wake pattern, the time histories of the drag and lift forces, power spectral density and phase diagrams, etc. It is found that these results include both the periodic (lock-in) and the quasi-periodic (non-lock-in) state. The vortex shedding frequency equals the driving frequency in the lock-in region but is independent in the non-lock-in region. The mean drag and the maximum lift coefficient increase with the increase of the forcing amplitude in the lock-in state. The lock-in boundaries are also established from the present direct numerical simulation.

  • PDF

진동하는 원주주위 유동의 직접수치해석 (Direct Numerical Simulation of the Flow Past an Oscillating Circular Cylinder)

  • 강신정;;;남청도;이영호
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 2001년도 춘계 학술대회논문집
    • /
    • pp.181-188
    • /
    • 2001
  • The flow past a circular cylinder forced to vibrate transversely is numerically simulated by solving the two-dimensional Wavier-Stokes equations modified by the vibration velocity of a circular cylinder at a Reynolds number of 164. The higher-order finite difference scheme is employed for the spatial discretization along with the second order Adams-Bashforth and the first order backward-Euler time integration. The calculated cylinder vibration frequency is between 0.60 and 1.30 times of the natural vortex-shedding frequency. The calculated oscillation amplitude extends to $25\%$ of the cylinder diameter and in the case of the lock-in region it is $60\%$. It is made clear that the cylinder oscillation has influence on the wake pattern, the time histories of the drag and lift forces, power spectral density and phase diagrams, etc. It is found that these results include both the periodic (lock-in) and the quasi-periodic (non-lock-in) state. The vortex shedding frequency equals the driving frequency in the lock-in region but is independent in the non-lock-in region. The mean drag and the maximum lift coefficient increase with the increase of the forcing amplitude in the lock-in state. The lock-in boundaries are also established from the present direct numerical simulation.

  • PDF

원형 단면 구멍 표면을 갖는 댐퍼 후로팅 링 실의 누설량 및 회전체 동역학적 특성 해석 (Leakage and Rotordynamic Analysis of Damper Floating Ring Seal with Round­Hole Surfaces in the High Pressure Turbo Pump)

  • 하태웅;이용복;김창호
    • Tribology and Lubricants
    • /
    • 제19권6호
    • /
    • pp.349-356
    • /
    • 2003
  • A damper floating ring seal with round hole pattern surfaces is suggested for better leakage control. The flat plate test of the round hole pattern surfaces has been performed to yield an empirical friction factor model. The exact predictions of the lock­up position of the damper floating ring, the leakage performance, and the rotordynamic coefficients of the seal are necessary to evaluate the rotordynamic performance of the turbo pump unit. The governing equations including the empirical friction factor model for round hole pattern surfaces are solved by the Fast Fourier Transform method. The lock­up position, leakage flow rate, and rotordynamic coefficients are evaluated according to the geometric parameters of the damper floating ring seal. Theoretical results show that the damper floating ring seals yield less leakage and better rotordynamic stability than the floating ring seal with a smooth surface.

접촉점에서의 국소 그래프 패턴에 의한 필기체 한글의 자소분리에 관한 연구 (A Study on the Phoneme Segmentation of Handwritten Korean Characters by Local Graph Patterns on Contacting Points)

  • 최필웅;이기영;구하성;고형화
    • 전자공학회논문지B
    • /
    • 제30B권4호
    • /
    • pp.1-10
    • /
    • 1993
  • In this paper, a new method of phoneme segmentation of handwritten Korean characters using the local graph pattern is proposed. At first, thinning was performed before extracting features. End-point, inflexion-point, branch-point and cross-point were extracted as features. Using these features and the angular relations between these features, local graph pattern was made. When local graph pattern is made, the of strokes is investigated on contacting point. From this process, pattern is simplified as contacting pattern of the basic form and the contacting form we must take into account can be restricted within fixed region, 4therefore phoneme segmentation not influenced by characters form and any other contact in a single character is performed as matching this local graph pattern with base patterns searched ahead. This experiments with 540 characters have been conducted. From the result of this experiment, it is shown that phoneme segmentation is independent of characters form and other contact in a single character to obtain a correct segmentation rate of 95%, manages it efficiently to reduce the time spent in lock operation when the lock.

  • PDF