KR101755564B1 - Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method - Google Patents

Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method Download PDF

Info

Publication number
KR101755564B1
KR101755564B1 KR1020160020488A KR20160020488A KR101755564B1 KR 101755564 B1 KR101755564 B1 KR 101755564B1 KR 1020160020488 A KR1020160020488 A KR 1020160020488A KR 20160020488 A KR20160020488 A KR 20160020488A KR 101755564 B1 KR101755564 B1 KR 101755564B1
Authority
KR
South Korea
Prior art keywords
door lock
character string
authentication
user
lock control
Prior art date
Application number
KR1020160020488A
Other languages
Korean (ko)
Inventor
하일규
도오성
Original Assignee
경일대학교산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 경일대학교산학협력단 filed Critical 경일대학교산학협력단
Priority to KR1020160020488A priority Critical patent/KR101755564B1/en
Application granted granted Critical
Publication of KR101755564B1 publication Critical patent/KR101755564B1/en

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B37/00Permutation or combination locks; Puzzle locks
    • E05B37/0048Permutation or combination locks; Puzzle locks with changeable combination
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/005Opening, closing of the circuit
    • E05B2047/0054Opening, closing of the circuit using microprocessor, printed circuits, or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/005Opening, closing of the circuit
    • E05B2047/0056Opening, closing of the circuit by sensing the presence of a person, e.g. body heat sensor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0067Monitoring
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0071Connecting lockparts by electronic communication means only, e.g. bus systems, time multiplexing
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to an apparatus for controlling a door lock based on authentication, a method for the same, and a computer-readable recording medium on which the method is recorded. And a control unit for controlling the ultrasonic sensor unit to detect the presence of a user of the user apparatus within a predetermined radius based on any one of the reference points of the door through the ultrasonic sensor unit, And a controller for authenticating whether the device is a pre-registered device, and releasing the lock of the door lock when the authentication is successful, a method therefor, and a computer readable recording medium on which the method is recorded.

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention [0001] The present invention relates to a device for controlling a door lock based on authentication, a method therefor, and a computer readable recording medium on which the method is recorded.

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a door lock control technique, and more particularly, to a door lock control device based on an object Internet and based on an authentication procedure, a method thereof, and a computer readable recording medium on which the method is recorded .

Internet of Things (IoT) is an intelligent service that combines people and objects (physical or virtual) on the network of intelligent objects connected to each other, and context awareness based on mutual communication between objects and objects Global infrastructure. " Machine to Machine (M2M) is different from things Internet because M2M (Machine To Machine) refers to a technology in which equipment, objects, or intelligent devices are in charge of both sides of a person instead of being directly controlled by a person. In recent years, a variety of information and communication technologies have converged, and solutions for providing and providing information of objects have been expanded. Object Internet technology is enabling various networking by convergence of home appliances and mobile devices. On the other hand, digital door locks have become commonplace in recent years, and they are widely used in homes and offices.

Korean Registered Patent No. 1296863 Published Aug. 08, 2013 (Name: Access authentication system using NFC door lock)

It is an object of the present invention to provide a door lock system in which a variety of security functions are enhanced in a digital door lock and a remote control and monitoring function are enhanced in order to reduce the damage of a digital door lock operation, .

According to another aspect of the present invention, there is provided an apparatus for controlling a door lock that locks or unlocks a door includes a communication unit for communication, an ultrasonic sensor unit for sensing an object approaching the door, When it is detected through the ultrasonic sensor unit that a user of the user apparatus exists within a predetermined radius based on any one reference point of the door, the communication apparatus communicates with the user apparatus via the communication unit to determine whether the user apparatus is a pre- And releases the lock of the door lock when the authentication is successful.

The control unit receives the authentication key from the user device through the communication unit and authenticates the user device that has transmitted the received authentication key if the received authentication key is the same as the authentication key of the user device registered in advance .

The control unit extracts a second character string encrypted with a user identifier from the first character string and transmits the extracted second character string to the user device when receiving the first character string from the user apparatus through the communication unit, Receiving the third character string extracted from the second character string from the user device and authenticating the user device that has transmitted the third character string if the third character string has the same value as the authentication key of the user device registered in advance .

The control unit generates a second character string by encrypting the first character string with an authentication key generated by generating an authentication key when the first character string is received from the administrator device, and transmits the second character string to the manager device via the communication unit And when the manager device derives a third character string encrypted with the user identifier from the second character string and transmits the third character string to the user device, the fourth character string extracted from the third character string is received And authenticates the user device that transmitted the fourth character string if the fourth character string has the same value as the generated authentication key.

According to another aspect of the present invention, there is provided a method for controlling a door lock that locks or unlocks a door, the method comprising: The method comprising the steps of: detecting whether the user device is a registered device through communication with the user device; and if the authentication is successful, unlocking the door lock .

The step of performing the authentication includes receiving an authentication key from the user device, authenticating the user device that has transmitted the received authentication key if the received authentication key is the same as the authentication key of the user device registered in advance .

Wherein the step of performing the authentication comprises the steps of: receiving a first character string from a user device; extracting a second character string encrypted with a user identifier from an authentication key from the first character string; Receiving a third character string extracted from the second character string from the user device; if the third character string has the same value as the authentication key of the user device registered in advance, And authenticating the user device that transmitted the message.

The step of performing the authentication includes receiving a first character string from a manager device, generating a second character string in which the first character string is encrypted with an authentication key generated by generating an authentication key, When the manager device derives a third character string encrypted with the user identifier from the second character string and transmits the third character string to the user device, extracting from the third character string from the user character device And authenticating the user device that transmitted the fourth character string if the fourth character string has the same value as the generated authentication key.

The present invention also provides a computer-readable recording medium on which a method for controlling a door lock according to the preferred embodiment of the present invention is recorded.

According to the present invention, the user can unlock the door lock without any input. Further, since a plurality of encrypted strings are exchanged between the user device and the door lock control device by using a cryptographic function or the like to perform authentication, a high level of security service can be provided.

1 is a block diagram illustrating a configuration of a door lock system using multiple keys according to an embodiment of the present invention.
2 is a block diagram illustrating a configuration of a door lock control apparatus according to an embodiment of the present invention.
3 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention.
4 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention.
5 and 6 are flowcharts for explaining a method for door lock control using multiple keys according to an embodiment of the present invention.
FIG. 7 is a diagram for explaining a method for object-internet-based door lock control according to an embodiment of the present invention.
8 and 9 are flowcharts for explaining the authentication process according to the first embodiment of the present invention.
10 and 11 are flowcharts for explaining the authentication process according to the second embodiment of the present invention.
12 is a flowchart for explaining an authentication process according to the third embodiment of the present invention.

Prior to the detailed description of the present invention, the terms or words used in the present specification and claims should not be construed as limited to ordinary or preliminary meaning, and the inventor may designate his own invention in the best way It should be construed in accordance with the technical idea of the present invention based on the principle that it can be appropriately defined as a concept of a term to describe it. Therefore, the embodiments described in the present specification and the configurations shown in the drawings are merely the most preferred embodiments of the present invention, and are not intended to represent all of the technical ideas of the present invention. Therefore, various equivalents It should be understood that water and variations may be present.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. Note that, in the drawings, the same components are denoted by the same reference symbols as possible. Further, the detailed description of known functions and configurations that may obscure the gist of the present invention will be omitted. For the same reason, some of the elements in the accompanying drawings are exaggerated, omitted, or schematically shown, and the size of each element does not entirely reflect the actual size.

First, a door lock system using a multiple key according to an embodiment of the present invention will be described. 1 is a block diagram illustrating a configuration of a door lock system using multiple keys according to an embodiment of the present invention. Referring to FIG. 1, a door lock system according to an embodiment of the present invention includes a door lock 100, a door lock control device 200, an administrator device 300, and a user device 400.

The administrator device 300 is a device used by a manager who manages a door lock system according to an embodiment of the present invention. The user device 400 is a device used by a user who wants to enter and exit a door to which a door lock system according to an embodiment of the present invention is applied. . The administrator device 300 and the user device 400 may be exemplified by a smart phone, a tablet PC, a tablet PC, and the like.

The door lock 100 according to the embodiment of the present invention is basically mounted on a door and includes a keypad for inputting numbers and an opening and closing device for locking or unlocking the door. Typically, the door lock 100 may be a so-called " digital door lock ". The door lock 100 may further include an interface for transmitting and receiving data, messages, control signals, sensing signals, and the like to and from the door lock control device 200 according to an embodiment of the present invention.

The door lock control device 200 is basically connected to the door lock 100 to control the door lock or unlock of the door lock 100 according to the embodiment of the present invention. In particular, when the user device 400 enters a predetermined area, the door lock control device 200 automatically performs a process of authenticating the user device 400 together with the administrator device 300, If it is authenticated that it has one authority, it can control to unlock the door lock 100. Therefore, the user can unlock the door lock 100 without any operation. When the door lock control apparatus 200 is installed in a general household, it can be implemented in a refrigerator, which is an appliance in which power is always supplied.

Hereinafter, the door lock control apparatus 200 according to the embodiment of the present invention will be described in more detail. 2 is a block diagram illustrating a configuration of a door lock control apparatus according to an embodiment of the present invention. 2, the door lock control apparatus 200 includes a communication unit 210, a camera unit 220, an impact sensor unit 230, an ultrasonic sensor unit 240, a storage unit 250, and a controller 260 ).

The communication unit 210 is for communication with the manager apparatus 300 or the user apparatus 400 and can communicate using a broadband mobile communication, a wireless local area communication and a peer-to-peer connection scheme. The communication unit 210 is implemented as a module in which both broadband mobile communication, wireless local area communication, and peer-to-peer connection communication functions are implemented, and at least one of the three functions described above Will be described as operating selectively. However, the communication unit 210 may be implemented by a plurality of modules separately performing communication functions of a broadband mobile communication, a wireless local area communication, and a peer-to-peer connection method. Here, broadband mobile communication can represent communication according to standards such as LTE and LTE-A. Wireless local area communication may also illustrate Wireless Local Area Network (WLAN) communication using Wi-Fi (wireless fidelity). And a peer-to-peer connection scheme may illustrate communication according to the Bluetooth standard. The communication unit 210 may include an RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and an RF receiver for low-noise amplifying a received signal and down-converting the frequency of the received signal. In addition, the communication unit 210 may receive a signal including data through a wireless channel, and may transmit the received signal to the control unit 260. The communication unit 210 may convert the data received from the control unit 260 into a wireless signal and transmit the wireless signal.

The camera unit 220 is for capturing an image, and includes an image sensor. The image sensor receives light reflected from a subject and converts the light into an electrical signal. The image sensor can be implemented based on a CCD (Charge Coupled Device) or a CMOS (Complementary Metal-Oxide Semiconductor). The camera unit 220 may further include an analog-to-digital converter. The camera unit 220 may convert an electric signal output from the image sensor into a digital sequence and output the digital sequence to the controller 260.

The impact sensor unit 230 is composed of a plurality of impact sensors capable of sensing an impact, and each of the plurality of impact sensors is mounted at a predetermined position of the door to sense the magnitude of an impact applied to the door. For example, the impact sensor unit 230 may use a vibration sensor that detects the magnitude of impact from the vibration generated in the door by the impact sensor. Other sensors may also be used to sense the magnitude of the impact applied to the door in various ways.

The ultrasonic sensor unit 240 is for discriminating whether or not an arbitrary user approaches the door using ultrasonic waves. To this end, the ultrasonic sensor unit 240 radiates an ultrasonic signal, and the radiated ultrasonic signal receives an echo signal reflected from a user outside the door and measures the distance to a user outside the door.

The storage unit 250 stores programs and data necessary for the operation of the door lock control apparatus 200, and can be divided into a program area and a data area. The program area may store a program for controlling the overall operation of the door lock control apparatus 200 and an operating system (OS) for booting the door lock control apparatus 200, applications, and the like. The data area is an area where user data generated according to use of the door lock control device 200 is stored. In addition, the storage unit 250 may store various kinds of data generated by using the door lock control device 200, such as images, access logs, and the like. Each kind of data stored in the storage unit 250 can be deleted, changed, or added according to a user's operation.

The control unit 260 may control the overall operation of the door lock control device 200 and the signal flow between the internal blocks of the door lock control device 200 and may perform a data processing function for processing data. The control unit 260 may be, for example, a central processing unit (CPU), an application processor (AP), a micro-controller, or the like. The control unit 260 loads an operating system (OS) stored in the storage unit 250, performs booting, loads and executes the application, and allocates buffers to the temporary storage space, if necessary. In particular, the control unit 260 controls the door lock 100 according to an embodiment of the present invention. The operation of this control unit 260 will be described in more detail below.

Next, the manager device 300 according to the embodiment of the present invention will be described. 3 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention. 3, the manager device 300 includes a communication module 310, an input module 320, a display module 330, a storage module 340, and a control module 350 do.

The communication module 310 is for communicating with the door lock control device 200 or the user device 400 and can communicate using a broadband mobile communication, a wireless local area communication, and a peer-to-peer connection method. have. The communication module 310 is implemented as a module in which both broadband mobile communication, wireless local area communication, and peer-to-peer connection communication functions are implemented, and at least one of the above three functions As shown in Fig. However, the communication module 310 may be implemented by a plurality of modules separately performing communication functions of a broadband mobile communication, a wireless local area communication, and a peer-to-peer connection method. As described above, the broadband mobile communication is based on LTE, communication according to the LTE-A standard, wireless local area communication is wireless local area network (WLAN) communication using Wi-Fi (wireless fidelity), and peer- Peer) connection scheme can illustrate communication according to the Bluetooth standard. The communication module 310 may include an RF transmitter for up-converting and amplifying the frequency of a transmitted signal, and an RF receiver for low-noise amplifying the received signal and down-converting the frequency of the received signal. In addition, the communication module 310 may receive a signal including data through a wireless channel, and may transmit the signal to the control module 350. In addition, the data received from the control module 350 may be converted into a wireless signal and transmitted through a wireless channel.

The input module 320 receives a user's key operation for controlling the manager device 300, generates an input signal, and transmits the input signal to the control module 350. The input module 320 may include any one of a power key, a numeric key, and a direction key for power on / off, and may be formed of a predetermined function key on one side of the manager device 300. When the display module 330 is a touch screen, the functions of the various keys of the input module 320 can be performed by the display module 330. When all functions can be performed only by the touch screen, ) May be omitted.

The display module 330 visually provides menus, input data, function setting information, and various other information of the manager device 300 to the user. The display module 330 functions to output various screens such as a boot screen, a standby screen, and a menu screen of the administrator device 300. The display unit 110 may be formed of a liquid crystal display (LCD), an organic light emitting diode (OLED), an active matrix organic light emitting diode (AMOLED), or the like. Meanwhile, the display module 330 may be implemented as a touch screen. In this case, the display module 330 includes a touch sensor, and the control module 350 can sense the touch input of the user through the touch sensor. The touch sensor may be constituted by a touch sensing sensor such as a capacitive overlay, a pressure type, a resistive overlay, or an infrared beam, or may be constituted by a pressure sensor . In addition to the above sensors, all kinds of sensor devices capable of sensing contact or pressure of an object can be used as the touch sensor of the present invention. The touch sensor senses the touch input of the user, generates a sensing signal, and transmits the sensing signal to the control module 350. The sensing signal may include coordinate data input by the user. When the user inputs the touch position movement operation, the touch sensor may generate a sensing signal including coordinate data of the touch position movement path and transmit the sensing signal to the control module 350. Particularly, when the display module 330 is a touch screen, some or all of the functions of the input module 320 may be performed through the display module 330.

The storage module 340 stores programs and data necessary for the operation of the administrator device 300, and can be divided into a program area and a data area. The program area may store a program for controlling the overall operation of the administrator device 300, an operating system (OS) for booting the administrator device 300, an application program, and the like. The data area is an area in which user data generated according to use of the manager device 300 is stored. In addition, the storage module 340 may store various kinds of data, for example, images, generated in accordance with the use of the user's manager device 300. Each kind of data stored in the storage module 340 can be deleted, changed, or added according to a user's operation.

The control module 350 may control the overall operation of the manager device 300 and the signal flow between the internal blocks of the manager device 300 and may perform a data processing function of processing the data. The control module 350 may be a central processing unit (CPU), an application processor, a graphic processing unit (GPU), or the like. The operation of this control module 350 will be described in more detail below.

Also, although not shown, the manager device 300 according to the embodiment of the present invention includes a storage medium inserting unit for inserting an external storage medium such as a memory card to store data, a connection terminal for exchanging data with an external digital device, , A terminal for power supply or charging, and the like. The administrator device 300 may further include units having an additional function such as an audio processing module for inputting or outputting an audio signal, a voice signal, or the like through a microphone and a speaker. Although the variations of the portable apparatuses vary greatly depending on the convergence trend of the digital apparatuses, they can not be all enumerated. However, the units equivalent to the above-mentioned units are further included in the manager apparatus 300 according to the present invention It will be understood by those skilled in the art that various changes and modifications may be made without departing from the scope of the present invention.

Next, a description will be given of a user apparatus 400 according to an embodiment of the present invention. 4 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention. 4, a user device 400 according to an embodiment of the present invention includes a communication unit 410, an input unit 420, a display unit 430, a storage unit 440, and a control unit 450 do. The administrator device 300 and the user device 400 according to the embodiment of the present invention may be the same type of device. Accordingly, each of the communication unit 410, the input unit 420, the display unit 430, the storage unit 440 and the control unit 450 of the user device 400 is connected to the communication module 310 of the manager device 300 The input module 320, the display module 330, the storage module 340, and the control module 350, and performs the same function. Accordingly, a detailed description thereof will be omitted.

Next, a method for door lock control using multiple keys according to an embodiment of the present invention will be described. FIG. 5 and FIG. 6 are flowcharts for explaining a method for door lock control using multiple keys according to an embodiment of the present invention. FIG. 7 is a flowchart illustrating a method for door lock control based on object Internet according to an embodiment of the present invention. Fig.

5 to 7, the controller 260 of the door lock control device 200 is in the observation mode at step S100. In the observation mode, the door lock control apparatus 200 operates as follows. In the observation mode, the control unit 260 turns the camera unit 220 on. The control unit 260 detects whether the object is approaching within a predetermined first radius R 1 based on any one reference point S of the door 10 through the ultrasonic sensor unit 240. Here, the object is a person, and the control unit 260 estimates the moving object as a person. When a person enters the first radius R1, the control unit 260 continuously captures an object through the camera unit 220, and stores the captured image in a buffer having a predetermined size of the storage unit 250. [ If the storage space of the buffer is insufficient, the newly captured image is continuously stored in the buffer through overwriting. This observation mode is continuously performed until the power of the door lock control device 200 is turned off. Therefore, the observation mode indicated by reference numeral S100 is performed only in the observation mode, and the other steps indicated through the other reference signs are performed simultaneously with the observation mode and other tasks .

In step S110, the controller 260 determines whether a user is detected within a predetermined second radius R2 through the ultrasonic sensor 240 for a predetermined period of time or longer. The second radius R2 may be interpreted to be a position immediately before the door 10 and to request the unlocking of the door lock 100 when the user is detected for a predetermined time or longer in front of the door 10. [

Accordingly, if the user is detected within the predetermined second radius R2 through the ultrasonic sensor unit 240 for a predetermined time or longer, the control unit 260 performs the authentication process according to the embodiment of the present invention in step S120. Here, the authentication through the device is performed by the user device 400 and the door lock control device 200 (not shown) to unlock the door lock without any other operation when a legitimate user who is permitted to enter and leave the user device 400 is standing in front of the door ) Or communication between the user device 400, the administrator device 300, and the door lock control device 200. This authentication process will be described in more detail below. That is, the control unit 260 authenticates whether or not the user device 400 is a legitimate user device permitted to enter and exit through the authentication process in step S120. In accordance with this authentication procedure, the controller 260 determines whether the authentication is successful in step S130. If the authentication is successful, the controller 206 proceeds to step S140. If the authentication is unsuccessful, the controller 260 proceeds to step S170.

If the authentication is successful, the controller 260 controls the opening / closing device 120 of the door lock 100 to release the lock in step S140. In step S150, the control unit 260 stores the access information including the authentication time, the identification information on the authenticated user device 400, the door open time, and the like in the storage unit 250. [ In the embodiment of the present invention, the controller 260 of the door lock control apparatus 200 may perform functions of an application server and a web server, and the storage unit 250 may serve as a database server. Accordingly, the location where access information is stored can be identified through the URL. Then, the controller 260 transmits the access information to the manager device 400 in step S160.

On the other hand, if the authentication fails, that is, if the authentication fails, the person who does not have the proper authority is standing in front of the door, and this situation is likely to cause a problem. Accordingly, in step S170, the control unit 260 generates a report image to report the situation to the administrator through the image, and stores the generated report image in the storage unit 250. [ In step S170, the control unit 260 extracts an image before and after a predetermined period of time at a time point when the authentication is unsuccessful from the image captured through the camera unit 220 in the observation mode. In addition, the control unit 260 identifies a face of a person in the extracted image through object recognition so as to easily identify a person standing in front of the door 10, and captures an image in which a face of the person is identified . Thereby, a report image is generated. That is, the report image includes the extracted image and the captured image. After generating the report image, the control unit 260 stores the report image in the storage unit 250. As described above, the control unit 260 of the door lock control device 200 may perform functions of an application server and a web server, and the storage unit 250 may perform a role of a database server. Accordingly, the location where the report image is stored can be identified through the URL. After generating and storing the report image as described above, the control unit 260 transmits the report image stored in the storage unit 250 to the manager apparatus 300 in step S180.

According to the embodiment of the present invention, in steps S160 and S180, the entrance information and the report image may be transmitted to the manager device 300 in a push service or a server push manner. That is, the controller 260 of the door lock control device 200 may perform functions of an application server and a web server for providing a push service. The push service may, for example, illustrate Apple's APNS (Apple Push Notification Service) and Google's GCM (Google Cloud Messaging). Accordingly, the control unit 260 transmits a message (e.g., notification) including a location (e.g., a URL) where access information and a report image are stored. This message is then forwarded to the administrator device 300 via a push server (e.g., a GCM server or an APNS server). Then, the control module 350 of the administrator device 300 receives the message through the communication module 310, accesses the door lock control device 200 by referring to the URL of the message, and then transmits the HTTP get method You will see and download the video through. Then, the control module 350 stores the entrance information and the report image in the storage module 340, and displays the information through the display module 330. FIG. Accordingly, the administrator can know which users have entered or exited through access information browsing. In addition, the manager can determine whether a problem has occurred through the report image, and can take an action if necessary. As described above, according to the embodiment of the present invention, since both the previous situation and the following situation when an event such as an authentication failure occurs are provided to the administrator as a report image, the administrator can take appropriate measures for such situation. If the manager thinks it is dangerous, he or she can report it to the police.

On the other hand, the authentication failure may be a case where the user has a legitimate access right but is caused by an error, or a visitor who does not have a proper access right waits in front of the door 10. [ In this case, when the administrator wishes to allow access to the person standing in front of the door 10 through the report image, the administrator can input an input requesting access through the input module 320 of the manager device 300. [ Accordingly, when the control module 350 of the manager device 300 receives the input of the manager through the input module 320, the door lock controller 200 issues an open command to allow access through the communication module 310, .

In step S190, the controller 260 of the door lock control device 200 determines whether an open command is received within a predetermined time period through the communication unit 210. [ If an open command is received, the controller 260 proceeds to step S140 and controls the opening / closing device 120 of the door lock 100 to release the lock of the door lock 100. Then, the control unit 260 stores the access information in the storage unit 250 in step S150, and transmits the access information to the administrator device 300 in step S160. At this time, it can be indicated that the access information is made according to the manager's 'opening order'. As such, according to an embodiment of the present invention, the administrator can provide a convenient user experience (UX) that can remotely view and grant access to such reporting images.

Hereinafter, the authentication process according to the embodiment of the present invention will be described in more detail. First, an authentication process according to the first embodiment of the present invention will be described. 8 and 9 are flowcharts for explaining the authentication process according to the first embodiment of the present invention.

9, the administrator may register the user device 400 of the user in the door lock control device 200 so that a legitimate user can unlock the door without performing any operation . It is assumed that the manager device 300 and the user device 400 are located within a distance that enables a peer-to-peer connection (e.g., Bluetooth pairing) with each other. Accordingly, the registration procedure shown in FIG. 8 can be a procedure for confirming that the administrator is the user by confronting the user, and granting authority to allow access to the user device 400, which is the portable device of the user. Referring to FIG. 8, in step S210, the controller 300 of the manager device 300 and the communication unit 410 of the user device 400 communicate with each other through the connection between the communication module 310 of the manager device 300 and the communication unit 410 of the user device 400 ) And the user device 400 are paired with each other.

After the pairing, the control unit 450 of the user device 400 transmits a user identifier (IDU) that can distinguish the user device 400 from other user devices uniquely through the communication unit 410 in step S220, To the device (300).

The control module 350 of the manager device 300 that has received the user identifier (IDU) generates the authentication key (KEY) in step S230. For example, the control module 350 generates a random number (random number) through a random function and uses it as an authentication key (KEY).

Next, the control module 350 of the administrator device 300 transmits the authentication key (KEY) to the user device 400 through the communication module 310 in step S240. Then, the control module 350 of the user device 400 stores the authentication key (KEY) in the storage module 340 in step S250. Meanwhile, the control module 350 of the manager device 300 transmits the user identifier (IDU) and the authentication key (KEY) to the door lock control device 200 through the communication module 310 in step S260. Then, the controller 260 of the door lock control device 200 maps the user identifier (IDU) and the authentication key (KEY) in step S270 and stores the mapping in the storage unit 250. Thereby, the user device 400 is registered in the door lock control device 200. [

As described above, when the registration procedure is completed, the user can unlock the door through the user device 400 without any input. This procedure will be described with reference to FIG. The embodiment of FIG. 9 may be a detailed description of step S120 of FIG. As described above, the controller 260 of the door lock control apparatus 200 performs the authentication procedure when the user detects the user within the predetermined second radius R2 through the ultrasonic sensor unit 240 for a predetermined time or longer. Here, it is assumed that the user is carrying the user device 400. Then, the controller 260 of the door lock control device 200 transmits an authentication start request message informing the user device 400 to start the authentication process through the communication unit 210 in step S310.

The user device 400 having received the authentication start request message transmits its user ID (IDU) and the authentication key KEY received from the administrator device 300 to the door lock control device 200 ). The control unit 260 of the door lock control apparatus 200 then maps the stored authentication key KEY mapped to the user identifier IDU to the storage unit 250 through the user identifier IDU received in step S330 ), Compares the retrieved authentication key (KEY) with the received authentication key (KEY), and performs authentication. 8, the received authentication key KEY and the stored authentication key KEY will have the same value, and when the authentication is performed by the authentication Will succeed. However, in the case of an unregistered user device, authentication can not be performed because the authentication key (KEY) assigned to the user device 400 can not be known.

Meanwhile, according to the embodiment of the present invention, the control module 350 of the administrator device 300 may periodically update the authentication key KEY. That is, steps S230 through S270 may be repeated periodically. More specifically, the control module 350 of the administrator device 300 may newly generate an authentication key (KEY) periodically different from the previously issued authentication key (KEY). The control module 350 then transmits the authentication key KEY to the user device 400 via the communication module 310 and transmits the user identifier IDU and the authentication key KEY to the door lock control device 200 Lt; / RTI > The control module 350 of the user device 400 newly receiving the authentication key KEY updates the previously received authentication key KEY with the newly received authentication key KEY. The control unit 260 of the door lock control device 200 newly receiving the authentication key KEY searches the previous authentication key KEY through the user identifier IDU and then transmits the newly received authentication key KEY And updates the previously received authentication key (KEY). In this way, the authentication key KEY can be updated periodically to maintain a high level of security. 8, if the authentication key KEY is transmitted through the peer-to-peer local area communication, the update procedure of the authentication key KEY is performed when the user device 400 is located in a range deviated from the local area communication , And an authentication key (KEY) may be transmitted through the network.

Next, an authentication process according to a second embodiment of the present invention will be described. 10 and 11 are flowcharts for explaining the authentication process according to the second embodiment of the present invention. Second Embodiment Similarly to the first embodiment, the user device 400 must be registered in the door lock control device 200 before the authentication procedure. However, since the first embodiment can be hacked in the course of transferring the authentication key KEY, etc. between the user device 400, the administrator device 300 and the door lock control device 200, (KEY).

The registration procedure according to the second embodiment is similar to the first embodiment except that the administrator confirms that the user faces the user and operates the administrator device 300 to connect the user device 400, (200). Accordingly, the manager device 300 and the user device 400 are located within a distance that enables a peer-to-peer connection (e.g., Bluetooth pairing) between each other. In step S410, the device ID (IDA) of the door lock control device 200 is stored in the storage module 340 of the administrator device 300. The device identifier (IDA) is an identifier that can uniquely identify the door lock control device 200 by distinguishing it from other door lock control devices. The device identifier (IDA) may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the device identifier (IDA) is equal to 'IDA = {0011}'.

If there is an input from the manager in step S420, the manager device 300 and the user device 400 are paired by the administrator device 300. [ After the pairing, the control unit 450 of the user device 400 transmits a user identifier (IDU), which can distinguish the user device 400 from other user devices uniquely through the communication unit 410 in step S430, To the device (300). Here, the user identifier (IDU) may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the user identifier (IDU) is equal to 'IDU = {1100}'.

The control module 350 of the manager device 300 receiving the user identifier (IDU) generates the authentication key (KEY) in step S440. Here, the authentication key KEY may be a random number (random number) generated through a random function. The authentication key KEY may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the authentication key KEY is equal to 'KEY = {1001}'.

Next, the control module 350 of the manager device 300 generates the first string STR1 through the first cryptographic function E1 () as a factor of the authentication key KEY and the user identifier IDU in step S450 . That is, the control module 350 generates the first string STR1 by encrypting the authentication key KEY with the user identifier (IDU) in step S450. For example, the first cryptographic function E1 () is given by Equation 1 below.

[Equation 1]

E1 (key, idu) = KEY

Figure 112016017143759-pat00001
IDU = STR1,
Figure 112016017143759-pat00002
Is an XOR (Exclusive OR) operator

According to the above assumption, when the authentication key KEY is 'KEY = {1001}' and the user identifier IDU is 'IDU = {1100}', according to the first cryptographic function E1 The first string STR1 becomes 'STR1 = {1010}'.

In step S460, the control module 350 of the administrator device 300 generates the second string STR2 through the second cryptographic function E2 () as a factor of the first string STR1 and the device identifier IDA . That is, in step S460, the control module 350 generates the second string STR2 by encrypting the first string STR1 encrypted with the user identifier (IDU) again with the device identifier (IDA) . For example, the second cryptographic function E2 () is represented by the following equation (2).

&Quot; (2) "

E2 (str1, ida) = STR1

Figure 112016017143759-pat00003
IDA = STR2,
Figure 112016017143759-pat00004
Is an XOR operator

The first string STR1 derived from Equation 1 is STR1 = {1010}, and when the device identifier IDA is 'IDA = {0011}' as previously assumed, The second string STR2 becomes 'STR2 = {0110}' according to the second encryption function E2 ().

Next, the control module 350 of the manager device 300 transmits the second string 'STR2 = {0110}' to the user device 400 through the communication module 310 in step S470. Then, the control unit 450 of the user device 400 stores the second string STR2 = {0110} in the storage unit 440 in step S480.

Meanwhile, the control module 350 of the manager device 300 transmits the authentication key (KEY) 'KEY = {1001}' to the door lock control device 200 through the communication module 310 in step S490. Then, the control unit 260 of the door lock control device 200 stores the authentication key KEY = KEY = {1001} in the storage unit 250 in step S500. Thereby, the user device 400 is registered in the door lock control device 200. [

As described above, when the registration procedure is completed, the user can unlock the door through the user device 400 without any input. This procedure will be described with reference to FIG. The embodiment of FIG. 11 is a detailed description of step S120 of FIG. 5, the control unit 260 of the door lock control device 200 performs an authentication procedure when the user is detected within a predetermined second radius R2 through the ultrasonic sensor unit 240 for a predetermined time or more . Here, it is assumed that the user is carrying the user device 400. Then, the controller 260 of the door lock control device 200 transmits an authentication start request message informing the user device 400 to start the authentication process through the communication unit 210 in step S510.

The control unit 450 of the user apparatus 400 having received the authentication initiation request message transmits the second string STR2 = {0110} stored in the storage module 340 via the communication unit 410 in step S520 To the door lock control device (200). In step S530, the controller 260 of the door lock control apparatus 200 generates the third string STR3 through the third cryptographic function E3 () using the second string STR2 and the device identifier IDA as a factor . As described above, the first string STR1 is obtained by encrypting the authentication key KEY with a user identifier (IDU), and the second string STR2 is obtained by encrypting the first string STR1 with the device identifier IDA will be. Here, the third cryptographic function E3 () is the inverse of the second cryptographic function E2 (). The controller 260 extracts the third character string STR3 encrypted with the user identifier (IDU) from the second character string STR2 via the device identifier IDA in step S530. Accordingly, the third character string STR3 has the same value as the first character string STR1. The third cryptographic function E3 () is, for example, the following Equation (3).

&Quot; (3) "

E2 (str2, ida) = STR2

Figure 112016017143759-pat00005
IDA = STR3,
Figure 112016017143759-pat00006
Is an XOR operator

The second string STR2 is STR2 = {0110}, and when the device identifier IDA is 'IDA = {0011}', the third string STR3 ) Becomes 'STR3 = {1010}'.

Then, the control unit 260 of the door lock control apparatus 200 transmits the third string STR3 = {1010} to the user device 400 through the communication unit 210 in step S540. In step S550, the control unit 450 of the user device 400 generates a fourth cryptographic function E4 () using the third string STR3 = {1010} and the user IDU IDU = {1100} The fourth string STR4 is generated. As described above, the first character string STR1 is obtained by encrypting the authentication key KEY with a user identifier (IDU). The third string STR3 is also obtained by encrypting the authentication key KEY with a user identifier (IDU), and the third string STR3 has the same value as the first string STR1. Here, the fourth cryptographic function E4 () is the inverse of the first cryptographic function E1 (). Therefore, the control unit 450 extracts the fourth character string STR4 from the third character string STR3 through the user identifier (IDU) in step S550, and the fourth character string STR4 has the same value as the authentication key KEY . The fourth cryptographic function E4 () is, for example, as shown in Equation (4).

&Quot; (4) "

E4 (str3, idu) = STR3

Figure 112016017143759-pat00007
IDU = STR4,
Figure 112016017143759-pat00008
Is an XOR operator

Here, the third string STR3 is 'STR3 = {1010}', and when the user identifier (IDU) is 'IDU = {1100}', (STR4) becomes 'STR4 = {1001}'.

Then, the control unit 450 of the user device 400 transmits the fourth string 'STR4 = {1001}' to the door lock control device 200 through the communication unit 410 in step S660. Then, the controller 260 of the door lock control device 200 compares the received fourth character string STR4 received in step S670 with the authentication key KEY stored in the registration procedure, and performs authentication. If the user device 400 is a device registered in accordance with the procedure shown in FIG. 10, the received fourth string STR4 = {1001} 'according to the procedure described in FIG. 11 and the authentication key (KEY) 'KEY = {1001}', and the authentication will succeed. However, in the case of an unregistered user device, since the first to fourth cryptographic functions, the authenticator, and the like can not be known, the authentication can not be successful.

Meanwhile, according to the embodiment of the present invention, the control module 350 of the administrator device 300 may periodically update the authentication key KEY. That is, steps S440 through S500 may be repeated periodically. More specifically, the control module 350 of the administrator device 300 may newly generate an authentication key (KEY) having a different value from the authentication key (KEY) issued periodically (S440). The control module 350 then generates the first string STR1 by encrypting the authentication key KEY with the user identifier IDU through the first encryption function E1 (STR2) by encrypting the first string STR1 with the device identifier (IDA). The control module 350 then transmits the second string STR2 to the user device 400 through the communication module 310 and may transmit the authentication key KEY to the door lock control device 200. [ The control unit 450 of the user apparatus 400 newly receiving the second string STR2 updates the second string STR2 previously received by the newly received second string STR2. The control unit 260 of the door lock control device 200 newly receiving the authentication key KEY updates the authentication key KEY previously received with the newly received authentication key KEY. In this way, the authentication key KEY can be updated periodically to maintain a high level of security. 10, in step S470, if the second string STR2 is transmitted through peer-to-peer local area communication, according to the update procedure of the authentication key KEY, The second string STR2 is transmitted via the network.

According to the present invention described above, the user can unlock the door lock without any input. Furthermore, since the authentication is performed by exchanging a plurality of strings between the administrator device 300, the user device 400, and the door lock control device 200 using a cryptographic function or the like, a high level of security service can be provided.

Next, an authentication process according to the third embodiment of the present invention will be described. 12 is a flowchart for explaining an authentication process according to the third embodiment of the present invention. In the embodiment of the present invention, the manager device 300 is a device that manages the door lock control device 200. The user device 400 can communicate with the door lock control device 200 only when there is a request from the door lock control device 200 while the administrator device 300 can communicate with the door lock control device 200 only at the request of the door lock control device 200 Only direct communication is possible via the channel. For this reason, the third embodiment does not register the user device 400 directly to the door lock control device 200, unlike the first and second embodiments. Instead, the user identifier (IDU) of the user device 400 is registered in the manager device 300. In accordance with this registration, the user identifier is stored in the storage module 340 of the manager device 300. The user identifier (IDU) is an identifier that can distinguish the user device 400 from other user devices. Here, the user identifier (IDU) may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the user identifier (IDU) is equal to 'IDU = {1100}'.

As described above, in the registered state, the user can unlock the door through the user device 400 without any input. This procedure will be described with reference to FIG. The third embodiment of FIG. 12 is a detailed description of step S120 of FIG. 5, the control unit 260 of the door lock control device 200 performs an authentication procedure when the user is detected within a predetermined second radius R2 through the ultrasonic sensor unit 240 for a predetermined time or more . Here, it is assumed that the user is carrying the user device 400. In step S610, the controller 260 of the door lock control device 200 transmits an authentication start request message informing the user device 400 to start the authentication process through the communication unit 210. [ Upon receiving the authentication start request message, the control unit 450 of the user device 400 transmits the user identifier (IDU) 'IDU = {1100}' to the manager device 300 through the communication unit 410 in step S620 do.

The control module 350 of the manager device 300 having received the user identifier IDU receives the user ID (IDU) and the administrator ID (IDM) as a factor in step S630 via the fifth cryptographic function E5 STR5). That is, in step S630, the control module 350 generates a fifth string STR5 in which the user identifier (IDU) is encrypted with the administrator ID (IDM). Here, the administrator ID (IDM) is an identifier that can uniquely identify the administrator device 300 by distinguishing it from other administrator devices. The manager identifier (IDM) may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the manager identifier (IDM) is equal to 'IDM = {1001}'. The fifth cryptographic function E5 () is expressed by the following equation (5).

&Quot; (5) "

E5 (idu, idm) = IDU

Figure 112016017143759-pat00009
IDM = STR1, where,
Figure 112016017143759-pat00010
Is an XOR operator

According to the above assumption, when the manager ID (IDM) is 'IDM = {1001}' and the user ID (IDU) is 'IDU = {1100}', according to the fifth cryptographic function E5 The fifth string STR5 becomes 'STR5 = {1010}'. After generating the fifth character string, the control module 350 of the manager device 300 transmits the fifth character string STR5 = {1010} 'to the door lock control device 200 in step S640.

After receiving the fifth character string, the controller 260 of the door lock control device 200 generates the authentication key KEY in step S650. For example, the controller 260 generates a random number (random number) through a random function and uses it as an authentication key (KEY). The authentication key KEY may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the authentication key KEY is equal to KEY = {0011}.

In step S660, the controller 260 generates the sixth character string STR6 through the sixth cryptographic function E6 () with the fifth character string STR5 and the authentication key KEY as a factor. As described above, the fifth character string STR5 is obtained by encrypting the user identifier IDU with the administrator identifier IDM, and the control unit 260 encrypts the fifth character string STR5 with the authentication key KEY in step S660. And generates a sixth string STR6. For example, the sixth cryptographic function E6 () is represented by the following equation (6).

&Quot; (6) "

E6 (str5, key) = STR5

Figure 112016017143759-pat00011
KEY = STR6 where,
Figure 112016017143759-pat00012
Is an XOR operator

The fifth string STR5 derived through Equation 5 is STR5 = {1010}, and when the generated authentication key KEY is KEY = {0011}, the sixth cryptographic function E6 The sixth string STR6 becomes 'STR6 = {0110}' according to ().

Next, the controller 260 of the door lock control device 200 transmits the sixth character string STR6 = {0110} to the manager device 300 through the communication unit 210 in step S670. Then, the control module 350 of the manager device 300 generates the seventh string STR7 through the seventh cryptographic function E7 () with the sixth string STR6 and the manager identifier IDM as arguments in step S680 . As described above, the fifth string STR5 is obtained by encrypting the user identifier (IDU) with the administrator ID (IDM), and the sixth string STR6 is obtained by encrypting the fifth string STR5 with the authentication key KEY will be. That is, the user identifier (IDU), the administrator identifier (IDM), and the authentication key (KEY) are contained in the sixth character string STR6. In step S680, the control module 350 generates a seventh character string STR7 obtained by encrypting the user identifier (IDU) with the authentication key KEY from the sixth character string STR6 using the administrator identifier IDM . The seventh cryptographic function E7 () is, for example, as shown in Equation (7).

&Quot; (7) "

E7 (str6, idm) = STR6

Figure 112016017143759-pat00013
IDM = STR7,
Figure 112016017143759-pat00014
Is an XOR operator

(STR7) according to the seventh cryptographic function E7 () in Equation (7) when the manager ID (IDM) is' IDM = {1001} Becomes 'STR7 = {0000}'.

Then, the control module 350 of the manager device 300 transmits the seventh character string STR7 = {0000} to the user device 400 through the communication module 310 in step S690. Then, in step S700, the control unit 450 of the user device 400 sets the seventh character string STR7 = {0000} 'and the user identifier IDU IDU = {1100} And generates an eighth character string STR8 through E8 ().

As described above, the seventh string STR7 is obtained by encrypting the user identifier (IDU) with the authentication key (KEY). Accordingly, the control unit 450 generates the eighth character string STR8 from the seventh character string STR7 through the user identifier IDU in step S700. This is because the authentication key KEY generated by the door lock control device 200, Lt; / RTI > The eighth cipher function E8 () is, for example, the following equation (8).

&Quot; (8) "

E8 (str7, idu) = STR7

Figure 112016017143759-pat00015
IDU = STR8,
Figure 112016017143759-pat00016
Is an XOR operator

Here, the seventh character string STR7 is 'STR7 = {0000}', and when the user identifier IDU is 'IDU = {1100}', the eighth character string E8 () (STR8) becomes 'STR8 = {0011}'.

Then, the control unit 450 of the user device 400 transmits the eighth character string 'STR8 = {0011}' to the door lock control device 200 through the communication unit 410 in step S710. The control unit 260 of the door lock control apparatus 200 receiving the eighth character string STR8 compares the eighth character string STR8 received in step S710 with the authentication key KEY stored in the registration procedure and performs authentication.

If the user device 400 is a device registered in the administrator device 300, the seventh character string STR7 containing the authentication key KEY issued by the door lock control device 200 is displayed on the administrator device 300 The seventh character string will be able to generate an eighth character string having the same value as the authentication key KEY through the eighth cryptographic function with the user identifier (IDU) as a factor, 8 character string. However, in the case of the user device not registered in the administrator device 300, authentication can not be received because the authentication key KEY generated by the door lock control device 200 can not receive the embedded seventh character string.

According to the third embodiment described above, since the manager device 300 is a device that can communicate only directly with the door lock control device 200 through the dedicated channel, the user device 400 is registered in the manager device 400, After the control device 200 receives the encrypted character string of the authentication key generated by the control device 200 through the administrator device, the character string is transmitted to the door lock control device 200 to perform authentication. Therefore, it is impossible to steal the authentication key for the negative purpose without obtaining all the character strings transmitted between the door lock control device 200, the administrator device 300 and the user device 400. Thus, a high level of security service can be provided.

Meanwhile, the method according to the embodiment of the present invention described above with reference to FIGS. 5 to 12 may be implemented in a form of a program readable by various computer means and recorded in a computer-readable recording medium. Here, the recording medium may include program commands, data files, data structures, and the like, alone or in combination. Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of computer software. For example, the recording medium may be a magnetic medium such as a hard disk, a floppy disk and a magnetic tape, an optical medium such as a CD-ROM or a DVD, a magneto-optical medium such as a floppy disk magneto-optical media, and hardware devices that are specially configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions may include machine language wires such as those produced by a compiler, as well as high-level language wires that may be executed by a computer using an interpreter or the like. Such a hardware device may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.

While the present invention has been described with reference to several preferred embodiments, these embodiments are illustrative and not restrictive. It will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.

100: Door lock 110: Keypad
120: switchgear 130: speaker
200: Door lock control device 210:
220: camera unit 230: shock sensor unit
240: ultrasonic sensor part 250:
260: controller 300: manager device
310: communication module 320: input module
330: Display module 340: Storage module
350: control module 400: user device
410: communication unit 420: input unit
430: display unit 440: storage unit
450: control unit

Claims (6)

An apparatus for controlling a door lock that locks or unlocks a door,
In a state where a device identifier of a door lock control device is stored and is located within a distance where a peer-to-peer connection can be established between the user device and the user device, Generating an authentication key by generating a first character string through a first cryptographic function using the authentication key and the user identifier as an argument and generating a second character string by using the first character string and the device identifier as an argument, And transmitting the second character string to the user device, and transmitting the authentication key to the door lock control device;
And transmits the second character string to the door lock control device upon receiving the authentication start request message informing the door lock control device to start the authentication process, and transmits the third character string from the door lock control device in response to the transmission of the second character string A user device for generating a fourth character string through a fourth cryptographic function, which is an inverse of the first cryptographic function, as the factor of the third character string and the user identifier, and for transmitting the fourth character string to the door lock control device; And
When the user device is detected within a predetermined radius based on any one reference point of the door, transmits an authentication start request message to the user device and receives the second character string from the user device in response to the authentication start request message A third character string is generated through a third cryptographic function that is the inverse of the second cryptographic function and the third character string is transmitted to the user device as a factor of the second character string and the device identifier, Upon receiving the fourth character string from the user device in response to the authentication, comparing the fourth character string with the authentication key to perform authentication, and when the authentication is successful, unlocking the door lock is performed, And a controller for controlling the door lock.
The method according to claim 1,
The manager device
Periodically updating the authentication key, periodically updating the second character string based on the updated authentication key, transmitting the updated second character string to the user device, and transmitting the updated authentication key to the door lock control To the device. ≪ Desc / Clms Page number 13 >
The method according to claim 1,
The door lock control apparatus includes a camera unit for photographing images and a storage unit for storing data,
If authentication is unsuccessful as a result of the authentication, an image before and after a predetermined period is extracted from the image captured through the camera unit after the authentication is unsuccessful, the face of the person is identified from the extracted image, And generating a report image including the extracted image and the captured image, and transmitting the generated report image to the manager device.
delete A method for controlling a door lock that locks or unlocks a door,
In a state where the manager device stores the device identifier of the door lock control device, the manager device is positioned within a distance where a peer-to-peer connection is possible between the user device and the user device and is paired with the user device, Receiving a user identifier from a device;
Wherein the manager device generates an authentication key upon receipt of the user identifier and generates a first character string through a first cryptographic function using the authentication key and the user identifier as arguments, Generating a second character string through a second cryptographic function with a device identifier as an argument, transmitting the second character string to the user device, and transmitting the authentication key to the door lock control device;
Transmitting an authentication start request message to the user device when the door lock control device senses the user device within a predetermined radius based on any one reference point of the door;
Transmitting the second character string to the door lock control device upon receiving an authentication start request message informing the user device to start the authentication process from the door lock control device;
When the door lock control device receives the second character string, generates a third character string through a third cryptographic function, which is an inverse of the second cryptographic function, as a factor of the second character string and the device identifier, Transmitting to the device;
The user device generating a fourth character string through a fourth cryptographic function that is the inverse of the first cryptographic function with the third character string and the user identifier as arguments, and transmitting the fourth character string to the door lock control device;
When the door lock control device performs authentication by comparing the fourth character string with the authentication key, and when authentication is successful as a result of the authentication, unlocking the door lock is performed. Way.
A computer-readable recording medium on which a method for controlling a door lock according to claim 5 is recorded.
KR1020160020488A 2016-02-22 2016-02-22 Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method KR101755564B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160020488A KR101755564B1 (en) 2016-02-22 2016-02-22 Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160020488A KR101755564B1 (en) 2016-02-22 2016-02-22 Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method

Publications (1)

Publication Number Publication Date
KR101755564B1 true KR101755564B1 (en) 2017-07-19

Family

ID=59427341

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160020488A KR101755564B1 (en) 2016-02-22 2016-02-22 Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method

Country Status (1)

Country Link
KR (1) KR101755564B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20230101344A (en) * 2021-12-29 2023-07-06 주식회사 코맥스 Method and apparatus for short-distance communication access authentication without using an authentication key

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101595897B1 (en) * 2014-12-09 2016-02-19 숭실대학교산학협력단 Digital doorlock and control method thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101595897B1 (en) * 2014-12-09 2016-02-19 숭실대학교산학협력단 Digital doorlock and control method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20230101344A (en) * 2021-12-29 2023-07-06 주식회사 코맥스 Method and apparatus for short-distance communication access authentication without using an authentication key
KR102659816B1 (en) 2021-12-29 2024-04-23 주식회사 코맥스 Method and apparatus for short-distance communication access authentication without using an authentication key

Similar Documents

Publication Publication Date Title
US11055392B2 (en) Proximity unlock and lock operations for electronic devices
EP3484196B1 (en) Method and apparatus for registering wireless device in wireless communication system
KR101769895B1 (en) User terminal device, Internet of Things control method, computer program and storage medium therefor
WO2017185711A1 (en) Method, apparatus and system for controlling smart device, and storage medium
CN104869612A (en) Method and device for accessing network
WO2015027712A1 (en) Network access method of mobile terminal, mobile terminal, and terminal device
EP3247143A1 (en) Registering a device capable of device-to-device communication in server
CN103634795B (en) Radio communication device and method
JP2005535199A (en) Security system for network devices
KR101755565B1 (en) Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method
US9503965B2 (en) Set-top box setup via near field communication
CN105246138A (en) Control method and device of Internet-of-things device
KR20170066987A (en) Method, Appratus and System of providing temporal account information
CN104794780A (en) Smart door, smart door control system and control method
EP3748588A1 (en) Access control device, access control system and access control method using the same
KR20120087635A (en) Method and apparatus for remotely controlling consumer electronics device using wireless personal area network proxy
US20220408263A1 (en) Access control system and method
KR20100104570A (en) Method and apparatus for controlling controlled device
CN104852800A (en) Data transmission method and device
KR102367696B1 (en) Door lock device and method of operating thereof
CN104869562A (en) Information transmission method, device and system
CN104980919A (en) Method for acquiring network service information and equipment
KR101595897B1 (en) Digital doorlock and control method thereof
KR101755564B1 (en) Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method
KR20180062692A (en) Method, user terminal, door lock device and entry security system for controlling of opening and closing door

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant