KR101755564B1 - Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method - Google Patents
Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method Download PDFInfo
- Publication number
- KR101755564B1 KR101755564B1 KR1020160020488A KR20160020488A KR101755564B1 KR 101755564 B1 KR101755564 B1 KR 101755564B1 KR 1020160020488 A KR1020160020488 A KR 1020160020488A KR 20160020488 A KR20160020488 A KR 20160020488A KR 101755564 B1 KR101755564 B1 KR 101755564B1
- Authority
- KR
- South Korea
- Prior art keywords
- door lock
- character string
- authentication
- user
- lock control
- Prior art date
Links
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B47/0001—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B37/00—Permutation or combination locks; Puzzle locks
- E05B37/0048—Permutation or combination locks; Puzzle locks with changeable combination
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0048—Circuits, feeding, monitoring
- E05B2047/005—Opening, closing of the circuit
- E05B2047/0054—Opening, closing of the circuit using microprocessor, printed circuits, or the like
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0048—Circuits, feeding, monitoring
- E05B2047/005—Opening, closing of the circuit
- E05B2047/0056—Opening, closing of the circuit by sensing the presence of a person, e.g. body heat sensor
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0048—Circuits, feeding, monitoring
- E05B2047/0067—Monitoring
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0048—Circuits, feeding, monitoring
- E05B2047/0071—Connecting lockparts by electronic communication means only, e.g. bus systems, time multiplexing
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0094—Mechanical aspects of remotely controlled locks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention relates to an apparatus for controlling a door lock based on authentication, a method for the same, and a computer-readable recording medium on which the method is recorded. And a control unit for controlling the ultrasonic sensor unit to detect the presence of a user of the user apparatus within a predetermined radius based on any one of the reference points of the door through the ultrasonic sensor unit, And a controller for authenticating whether the device is a pre-registered device, and releasing the lock of the door lock when the authentication is successful, a method therefor, and a computer readable recording medium on which the method is recorded.
Description
BACKGROUND OF THE
Internet of Things (IoT) is an intelligent service that combines people and objects (physical or virtual) on the network of intelligent objects connected to each other, and context awareness based on mutual communication between objects and objects Global infrastructure. " Machine to Machine (M2M) is different from things Internet because M2M (Machine To Machine) refers to a technology in which equipment, objects, or intelligent devices are in charge of both sides of a person instead of being directly controlled by a person. In recent years, a variety of information and communication technologies have converged, and solutions for providing and providing information of objects have been expanded. Object Internet technology is enabling various networking by convergence of home appliances and mobile devices. On the other hand, digital door locks have become commonplace in recent years, and they are widely used in homes and offices.
It is an object of the present invention to provide a door lock system in which a variety of security functions are enhanced in a digital door lock and a remote control and monitoring function are enhanced in order to reduce the damage of a digital door lock operation, .
According to another aspect of the present invention, there is provided an apparatus for controlling a door lock that locks or unlocks a door includes a communication unit for communication, an ultrasonic sensor unit for sensing an object approaching the door, When it is detected through the ultrasonic sensor unit that a user of the user apparatus exists within a predetermined radius based on any one reference point of the door, the communication apparatus communicates with the user apparatus via the communication unit to determine whether the user apparatus is a pre- And releases the lock of the door lock when the authentication is successful.
The control unit receives the authentication key from the user device through the communication unit and authenticates the user device that has transmitted the received authentication key if the received authentication key is the same as the authentication key of the user device registered in advance .
The control unit extracts a second character string encrypted with a user identifier from the first character string and transmits the extracted second character string to the user device when receiving the first character string from the user apparatus through the communication unit, Receiving the third character string extracted from the second character string from the user device and authenticating the user device that has transmitted the third character string if the third character string has the same value as the authentication key of the user device registered in advance .
The control unit generates a second character string by encrypting the first character string with an authentication key generated by generating an authentication key when the first character string is received from the administrator device, and transmits the second character string to the manager device via the communication unit And when the manager device derives a third character string encrypted with the user identifier from the second character string and transmits the third character string to the user device, the fourth character string extracted from the third character string is received And authenticates the user device that transmitted the fourth character string if the fourth character string has the same value as the generated authentication key.
According to another aspect of the present invention, there is provided a method for controlling a door lock that locks or unlocks a door, the method comprising: The method comprising the steps of: detecting whether the user device is a registered device through communication with the user device; and if the authentication is successful, unlocking the door lock .
The step of performing the authentication includes receiving an authentication key from the user device, authenticating the user device that has transmitted the received authentication key if the received authentication key is the same as the authentication key of the user device registered in advance .
Wherein the step of performing the authentication comprises the steps of: receiving a first character string from a user device; extracting a second character string encrypted with a user identifier from an authentication key from the first character string; Receiving a third character string extracted from the second character string from the user device; if the third character string has the same value as the authentication key of the user device registered in advance, And authenticating the user device that transmitted the message.
The step of performing the authentication includes receiving a first character string from a manager device, generating a second character string in which the first character string is encrypted with an authentication key generated by generating an authentication key, When the manager device derives a third character string encrypted with the user identifier from the second character string and transmits the third character string to the user device, extracting from the third character string from the user character device And authenticating the user device that transmitted the fourth character string if the fourth character string has the same value as the generated authentication key.
The present invention also provides a computer-readable recording medium on which a method for controlling a door lock according to the preferred embodiment of the present invention is recorded.
According to the present invention, the user can unlock the door lock without any input. Further, since a plurality of encrypted strings are exchanged between the user device and the door lock control device by using a cryptographic function or the like to perform authentication, a high level of security service can be provided.
1 is a block diagram illustrating a configuration of a door lock system using multiple keys according to an embodiment of the present invention.
2 is a block diagram illustrating a configuration of a door lock control apparatus according to an embodiment of the present invention.
3 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention.
4 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention.
5 and 6 are flowcharts for explaining a method for door lock control using multiple keys according to an embodiment of the present invention.
FIG. 7 is a diagram for explaining a method for object-internet-based door lock control according to an embodiment of the present invention.
8 and 9 are flowcharts for explaining the authentication process according to the first embodiment of the present invention.
10 and 11 are flowcharts for explaining the authentication process according to the second embodiment of the present invention.
12 is a flowchart for explaining an authentication process according to the third embodiment of the present invention.
Prior to the detailed description of the present invention, the terms or words used in the present specification and claims should not be construed as limited to ordinary or preliminary meaning, and the inventor may designate his own invention in the best way It should be construed in accordance with the technical idea of the present invention based on the principle that it can be appropriately defined as a concept of a term to describe it. Therefore, the embodiments described in the present specification and the configurations shown in the drawings are merely the most preferred embodiments of the present invention, and are not intended to represent all of the technical ideas of the present invention. Therefore, various equivalents It should be understood that water and variations may be present.
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. Note that, in the drawings, the same components are denoted by the same reference symbols as possible. Further, the detailed description of known functions and configurations that may obscure the gist of the present invention will be omitted. For the same reason, some of the elements in the accompanying drawings are exaggerated, omitted, or schematically shown, and the size of each element does not entirely reflect the actual size.
First, a door lock system using a multiple key according to an embodiment of the present invention will be described. 1 is a block diagram illustrating a configuration of a door lock system using multiple keys according to an embodiment of the present invention. Referring to FIG. 1, a door lock system according to an embodiment of the present invention includes a
The
The
The door
Hereinafter, the door
The
The
The
The
The
The
Next, the
The
The
The
The
The
Also, although not shown, the
Next, a description will be given of a
Next, a method for door lock control using multiple keys according to an embodiment of the present invention will be described. FIG. 5 and FIG. 6 are flowcharts for explaining a method for door lock control using multiple keys according to an embodiment of the present invention. FIG. 7 is a flowchart illustrating a method for door lock control based on object Internet according to an embodiment of the present invention. Fig.
5 to 7, the
In step S110, the
Accordingly, if the user is detected within the predetermined second radius R2 through the
If the authentication is successful, the
On the other hand, if the authentication fails, that is, if the authentication fails, the person who does not have the proper authority is standing in front of the door, and this situation is likely to cause a problem. Accordingly, in step S170, the
According to the embodiment of the present invention, in steps S160 and S180, the entrance information and the report image may be transmitted to the
On the other hand, the authentication failure may be a case where the user has a legitimate access right but is caused by an error, or a visitor who does not have a proper access right waits in front of the
In step S190, the
Hereinafter, the authentication process according to the embodiment of the present invention will be described in more detail. First, an authentication process according to the first embodiment of the present invention will be described. 8 and 9 are flowcharts for explaining the authentication process according to the first embodiment of the present invention.
9, the administrator may register the
After the pairing, the
The
Next, the
As described above, when the registration procedure is completed, the user can unlock the door through the
The
Meanwhile, according to the embodiment of the present invention, the
Next, an authentication process according to a second embodiment of the present invention will be described. 10 and 11 are flowcharts for explaining the authentication process according to the second embodiment of the present invention. Second Embodiment Similarly to the first embodiment, the
The registration procedure according to the second embodiment is similar to the first embodiment except that the administrator confirms that the user faces the user and operates the
If there is an input from the manager in step S420, the
The
Next, the
[Equation 1]
E1 (key, idu) = KEY
IDU = STR1, Is an XOR (Exclusive OR) operatorAccording to the above assumption, when the authentication key KEY is 'KEY = {1001}' and the user identifier IDU is 'IDU = {1100}', according to the first cryptographic function E1 The first string STR1 becomes 'STR1 = {1010}'.
In step S460, the
&Quot; (2) "
E2 (str1, ida) = STR1
IDA = STR2, Is an XOR operatorThe first string STR1 derived from
Next, the
Meanwhile, the
As described above, when the registration procedure is completed, the user can unlock the door through the
The
&Quot; (3) "
E2 (str2, ida) = STR2
IDA = STR3, Is an XOR operatorThe second string STR2 is STR2 = {0110}, and when the device identifier IDA is 'IDA = {0011}', the third string STR3 ) Becomes 'STR3 = {1010}'.
Then, the
&Quot; (4) "
E4 (str3, idu) = STR3
IDU = STR4, Is an XOR operatorHere, the third string STR3 is 'STR3 = {1010}', and when the user identifier (IDU) is 'IDU = {1100}', (STR4) becomes 'STR4 = {1001}'.
Then, the
Meanwhile, according to the embodiment of the present invention, the
According to the present invention described above, the user can unlock the door lock without any input. Furthermore, since the authentication is performed by exchanging a plurality of strings between the
Next, an authentication process according to the third embodiment of the present invention will be described. 12 is a flowchart for explaining an authentication process according to the third embodiment of the present invention. In the embodiment of the present invention, the
As described above, in the registered state, the user can unlock the door through the
The
&Quot; (5) "
E5 (idu, idm) = IDU
IDM = STR1, where, Is an XOR operatorAccording to the above assumption, when the manager ID (IDM) is 'IDM = {1001}' and the user ID (IDU) is 'IDU = {1100}', according to the fifth cryptographic function E5 The fifth string STR5 becomes 'STR5 = {1010}'. After generating the fifth character string, the
After receiving the fifth character string, the
In step S660, the
&Quot; (6) "
E6 (str5, key) = STR5
KEY = STR6 where, Is an XOR operatorThe fifth string STR5 derived through Equation 5 is STR5 = {1010}, and when the generated authentication key KEY is KEY = {0011}, the sixth cryptographic function E6 The sixth string STR6 becomes 'STR6 = {0110}' according to ().
Next, the
&Quot; (7) "
E7 (str6, idm) = STR6
IDM = STR7, Is an XOR operator(STR7) according to the seventh cryptographic function E7 () in Equation (7) when the manager ID (IDM) is' IDM = {1001} Becomes 'STR7 = {0000}'.
Then, the
As described above, the seventh string STR7 is obtained by encrypting the user identifier (IDU) with the authentication key (KEY). Accordingly, the
&Quot; (8) "
E8 (str7, idu) = STR7
IDU = STR8, Is an XOR operatorHere, the seventh character string STR7 is 'STR7 = {0000}', and when the user identifier IDU is 'IDU = {1100}', the eighth character string E8 () (STR8) becomes 'STR8 = {0011}'.
Then, the
If the
According to the third embodiment described above, since the
Meanwhile, the method according to the embodiment of the present invention described above with reference to FIGS. 5 to 12 may be implemented in a form of a program readable by various computer means and recorded in a computer-readable recording medium. Here, the recording medium may include program commands, data files, data structures, and the like, alone or in combination. Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of computer software. For example, the recording medium may be a magnetic medium such as a hard disk, a floppy disk and a magnetic tape, an optical medium such as a CD-ROM or a DVD, a magneto-optical medium such as a floppy disk magneto-optical media, and hardware devices that are specially configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions may include machine language wires such as those produced by a compiler, as well as high-level language wires that may be executed by a computer using an interpreter or the like. Such a hardware device may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
While the present invention has been described with reference to several preferred embodiments, these embodiments are illustrative and not restrictive. It will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
100: Door lock 110: Keypad
120: switchgear 130: speaker
200: Door lock control device 210:
220: camera unit 230: shock sensor unit
240: ultrasonic sensor part 250:
260: controller 300: manager device
310: communication module 320: input module
330: Display module 340: Storage module
350: control module 400: user device
410: communication unit 420: input unit
430: display unit 440: storage unit
450: control unit
Claims (6)
In a state where a device identifier of a door lock control device is stored and is located within a distance where a peer-to-peer connection can be established between the user device and the user device, Generating an authentication key by generating a first character string through a first cryptographic function using the authentication key and the user identifier as an argument and generating a second character string by using the first character string and the device identifier as an argument, And transmitting the second character string to the user device, and transmitting the authentication key to the door lock control device;
And transmits the second character string to the door lock control device upon receiving the authentication start request message informing the door lock control device to start the authentication process, and transmits the third character string from the door lock control device in response to the transmission of the second character string A user device for generating a fourth character string through a fourth cryptographic function, which is an inverse of the first cryptographic function, as the factor of the third character string and the user identifier, and for transmitting the fourth character string to the door lock control device; And
When the user device is detected within a predetermined radius based on any one reference point of the door, transmits an authentication start request message to the user device and receives the second character string from the user device in response to the authentication start request message A third character string is generated through a third cryptographic function that is the inverse of the second cryptographic function and the third character string is transmitted to the user device as a factor of the second character string and the device identifier, Upon receiving the fourth character string from the user device in response to the authentication, comparing the fourth character string with the authentication key to perform authentication, and when the authentication is successful, unlocking the door lock is performed, And a controller for controlling the door lock.
The manager device
Periodically updating the authentication key, periodically updating the second character string based on the updated authentication key, transmitting the updated second character string to the user device, and transmitting the updated authentication key to the door lock control To the device. ≪ Desc / Clms Page number 13 >
The door lock control apparatus includes a camera unit for photographing images and a storage unit for storing data,
If authentication is unsuccessful as a result of the authentication, an image before and after a predetermined period is extracted from the image captured through the camera unit after the authentication is unsuccessful, the face of the person is identified from the extracted image, And generating a report image including the extracted image and the captured image, and transmitting the generated report image to the manager device.
In a state where the manager device stores the device identifier of the door lock control device, the manager device is positioned within a distance where a peer-to-peer connection is possible between the user device and the user device and is paired with the user device, Receiving a user identifier from a device;
Wherein the manager device generates an authentication key upon receipt of the user identifier and generates a first character string through a first cryptographic function using the authentication key and the user identifier as arguments, Generating a second character string through a second cryptographic function with a device identifier as an argument, transmitting the second character string to the user device, and transmitting the authentication key to the door lock control device;
Transmitting an authentication start request message to the user device when the door lock control device senses the user device within a predetermined radius based on any one reference point of the door;
Transmitting the second character string to the door lock control device upon receiving an authentication start request message informing the user device to start the authentication process from the door lock control device;
When the door lock control device receives the second character string, generates a third character string through a third cryptographic function, which is an inverse of the second cryptographic function, as a factor of the second character string and the device identifier, Transmitting to the device;
The user device generating a fourth character string through a fourth cryptographic function that is the inverse of the first cryptographic function with the third character string and the user identifier as arguments, and transmitting the fourth character string to the door lock control device;
When the door lock control device performs authentication by comparing the fourth character string with the authentication key, and when authentication is successful as a result of the authentication, unlocking the door lock is performed. Way.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160020488A KR101755564B1 (en) | 2016-02-22 | 2016-02-22 | Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160020488A KR101755564B1 (en) | 2016-02-22 | 2016-02-22 | Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101755564B1 true KR101755564B1 (en) | 2017-07-19 |
Family
ID=59427341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160020488A KR101755564B1 (en) | 2016-02-22 | 2016-02-22 | Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101755564B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20230101344A (en) * | 2021-12-29 | 2023-07-06 | 주식회사 코맥스 | Method and apparatus for short-distance communication access authentication without using an authentication key |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101595897B1 (en) * | 2014-12-09 | 2016-02-19 | 숭실대학교산학협력단 | Digital doorlock and control method thereof |
-
2016
- 2016-02-22 KR KR1020160020488A patent/KR101755564B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101595897B1 (en) * | 2014-12-09 | 2016-02-19 | 숭실대학교산학협력단 | Digital doorlock and control method thereof |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20230101344A (en) * | 2021-12-29 | 2023-07-06 | 주식회사 코맥스 | Method and apparatus for short-distance communication access authentication without using an authentication key |
KR102659816B1 (en) | 2021-12-29 | 2024-04-23 | 주식회사 코맥스 | Method and apparatus for short-distance communication access authentication without using an authentication key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11055392B2 (en) | Proximity unlock and lock operations for electronic devices | |
EP3484196B1 (en) | Method and apparatus for registering wireless device in wireless communication system | |
KR101769895B1 (en) | User terminal device, Internet of Things control method, computer program and storage medium therefor | |
WO2017185711A1 (en) | Method, apparatus and system for controlling smart device, and storage medium | |
CN104869612A (en) | Method and device for accessing network | |
WO2015027712A1 (en) | Network access method of mobile terminal, mobile terminal, and terminal device | |
EP3247143A1 (en) | Registering a device capable of device-to-device communication in server | |
CN103634795B (en) | Radio communication device and method | |
JP2005535199A (en) | Security system for network devices | |
KR101755565B1 (en) | Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method | |
US9503965B2 (en) | Set-top box setup via near field communication | |
CN105246138A (en) | Control method and device of Internet-of-things device | |
KR20170066987A (en) | Method, Appratus and System of providing temporal account information | |
CN104794780A (en) | Smart door, smart door control system and control method | |
EP3748588A1 (en) | Access control device, access control system and access control method using the same | |
KR20120087635A (en) | Method and apparatus for remotely controlling consumer electronics device using wireless personal area network proxy | |
US20220408263A1 (en) | Access control system and method | |
KR20100104570A (en) | Method and apparatus for controlling controlled device | |
CN104852800A (en) | Data transmission method and device | |
KR102367696B1 (en) | Door lock device and method of operating thereof | |
CN104869562A (en) | Information transmission method, device and system | |
CN104980919A (en) | Method for acquiring network service information and equipment | |
KR101595897B1 (en) | Digital doorlock and control method thereof | |
KR101755564B1 (en) | Apparatus for controlling door lock based on authentication procedure, method thereof and computer recordable medium storing the method | |
KR20180062692A (en) | Method, user terminal, door lock device and entry security system for controlling of opening and closing door |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |