KR101755565B1 - Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method - Google Patents

Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method Download PDF

Info

Publication number
KR101755565B1
KR101755565B1 KR1020160020492A KR20160020492A KR101755565B1 KR 101755565 B1 KR101755565 B1 KR 101755565B1 KR 1020160020492 A KR1020160020492 A KR 1020160020492A KR 20160020492 A KR20160020492 A KR 20160020492A KR 101755565 B1 KR101755565 B1 KR 101755565B1
Authority
KR
South Korea
Prior art keywords
door lock
user device
door
user
cipher text
Prior art date
Application number
KR1020160020492A
Other languages
Korean (ko)
Inventor
하일규
도오성
Original Assignee
경일대학교산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 경일대학교산학협력단 filed Critical 경일대학교산학협력단
Priority to KR1020160020492A priority Critical patent/KR101755565B1/en
Application granted granted Critical
Publication of KR101755565B1 publication Critical patent/KR101755565B1/en

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B17/00Accessories in connection with locks
    • E05B17/20Means independent of the locking mechanism for preventing unauthorised opening, e.g. for securing the bolt in the fastening position
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V8/00Prospecting or detecting by optical means
    • G01V8/10Detecting, e.g. by using light barriers
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/005Opening, closing of the circuit
    • E05B2047/0053Opening, closing of the circuit by operating the handle
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/005Opening, closing of the circuit
    • E05B2047/0054Opening, closing of the circuit using microprocessor, printed circuits, or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/005Opening, closing of the circuit
    • E05B2047/0056Opening, closing of the circuit by sensing the presence of a person, e.g. body heat sensor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0067Monitoring
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0071Connecting lockparts by electronic communication means only, e.g. bus systems, time multiplexing
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0093Operating or controlling locks or other fastening devices by electric or magnetic means including means for preventing manipulation by external shocks, blows or the like

Landscapes

  • Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Geophysics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to an Internet-based door lock control apparatus, a method therefor, and a computer-readable recording medium on which the method is recorded. The present invention relates to a door-lock control apparatus for communication between a communication unit for communication, An ultrasonic sensor unit for sensing an object approaching the door, and an object approaching within a predetermined radius based on any one reference point of the door through the ultrasonic sensor unit is detected And generating an observation image by photographing the outside of the door through the camera unit and generating a report image in which a situation where the event has occurred is recorded from the observation image when it is detected that a report event has occurred, To the user device of the manager, and a control unit And a computer-readable recording medium on which such a method is recorded.

Description

BACKGROUND OF THE INVENTION Field of the Invention The present invention relates to an Internet-based door lock control apparatus, a method thereof, and a computer readable recording medium on which the method is recorded.

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a door lock control technique, and more particularly, to a door lock control device based on the object Internet, a method therefor, and a computer readable recording medium on which the method is recorded.

Internet of Things (IoT) is an intelligent service that combines people and objects (physical or virtual) on the network of intelligent objects connected to each other, and context awareness based on mutual communication between objects and objects Global infrastructure. " Machine to Machine (M2M) is different from things Internet because M2M (Machine To Machine) refers to a technology in which equipment, objects, or intelligent devices are in charge of both sides of a person instead of being directly controlled by a person. In recent years, a variety of information and communication technologies have converged, and solutions for providing and providing information of objects have been expanded. Object Internet technology is enabling various networking by convergence of home appliances and mobile devices. On the other hand, digital door locks have become commonplace in recent years, and they are widely used in homes and offices.

Korean Registered Patent No. 1296863 Published Aug. 08, 2013 (Name: Access authentication system using NFC door lock)

An object of the present invention is to provide a door lock system in which a variety of security functions are enhanced in a digital door lock and a remote control and monitoring function are enhanced in order to reduce the damage of a digital door lock operation based on the Internet of things, And a computer readable recording medium.

According to an aspect of the present invention, there is provided an apparatus for controlling a door lock comprising a communication unit for communication, a camera unit for photographing the outside of the door, an impact sensor for detecting an impact applied to the door, An ultrasonic sensor unit for sensing an object approaching the door; and a control unit for controlling the ultrasonic sensor unit to detect an object approaching within a predetermined radius based on any one reference point of the door through the ultrasonic sensor unit, Generates an observation image and generates a report image in which a situation where the event occurs from the observation image is generated when the observation event is detected and transmits the report image to the user device of the administrator through the communication unit And a control unit.

The event may include an event that an impact of a predetermined threshold value or more is applied to the door through the impact sensor unit, an event in which the number input through the keypad of the door lock is inconsistent with the access number for a predetermined number of times or more, And an event in which a request number is input.

Wherein the report image includes at least one of an image from a time point at which the event is generated to a predetermined period of time after a predetermined period of time at the time of the event occurrence and an image in which a face of the person captured in the extracted image is identified, .

Wherein the control unit releases the lock of the door so as to open the door when the entrance / exit event is detected, and transmits the access record including the time when the access event occurred through the communication unit to the user device of the manager do.

Wherein the access event includes at least one of an event in which the number input through the keypad of the door lock is equal to an access number and an event in which an open command for opening the door through the communication unit from the user device of the manager is received.

According to another aspect of the present invention, there is provided a method for controlling a door lock, the method comprising: sensing an object approaching within a predetermined radius based on a reference point of a door; Generating a report image in which a situation where the event occurs from the observation image is recorded when the occurrence of a predetermined event is detected; and transmitting the report image to a user apparatus of the administrator .

Wherein the event is an event in which an impact greater than or equal to a threshold value is applied to the door, an event in which a number input through the keypad of the door lock is inconsistent with a predetermined number of times or more and an access number, and an event in which a request number is input through the keypad of the door lock .

Wherein the report image includes at least one of an image from a time point at which the event is generated to a predetermined period of time after a predetermined period of time at the time of the event occurrence and an image in which a face of the person captured in the extracted image is identified, .

A method for controlling a door lock according to an exemplary embodiment of the present invention includes the steps of unlocking the door lock to open a door when a door event is detected, To a user device of the device.

Wherein the access event includes at least one of an event in which the number input through the keypad of the door lock is equal to an access number and an event in which an open command for opening the door through the communication unit from the user device of the manager is received.

The present invention also provides a computer-readable recording medium on which a method for controlling a door lock according to the preferred embodiment of the present invention is recorded.

According to the present invention, when an impact is generated in the door, both the state prior to the occurrence of the impact and the subsequent situation are transmitted to the manager as a report, so that a high level of security service can be provided.

In addition, a user who does not know or can not remember the access number requests the access through the image, and the administrator can provide a convenient user experience (UX) to view and remotely access such images.

Moreover, the user can unlock the door lock without any input. Furthermore, since a plurality of ciphertexts are exchanged between the user apparatus and the door lock control apparatus by using a cryptographic function or the like to perform authentication, a high level of security service can be provided.

FIG. 1 is a block diagram illustrating a configuration of a thing Internet-based door lock system according to an embodiment of the present invention.
2 is a block diagram illustrating a configuration of a door lock control apparatus according to an embodiment of the present invention.
3 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention.
4 is a diagram for explaining an observation mode according to an embodiment of the present invention.
FIG. 5 is a flowchart illustrating a method for object-internet-based door lock control according to an embodiment of the present invention.
6 and 7 are flowcharts for explaining a method for object-internet-based door lock control according to another embodiment of the present invention.
FIG. 8 is a flowchart illustrating a method for object-internet-based door lock control according to another embodiment of the present invention.
9 is a flowchart illustrating a method for registering a device for door lock control based on the object Internet according to another embodiment of the present invention.
FIG. 10 is a flowchart illustrating an authentication method for object-based Internet-based door lock control according to another embodiment of the present invention.

Prior to the detailed description of the present invention, the terms or words used in the present specification and claims should not be construed as limited to ordinary or preliminary meaning, and the inventor may designate his own invention in the best way It should be construed in accordance with the technical idea of the present invention based on the principle that it can be appropriately defined as a concept of a term to describe it. Therefore, the embodiments described in the present specification and the configurations shown in the drawings are merely the most preferred embodiments of the present invention, and are not intended to represent all of the technical ideas of the present invention. Therefore, various equivalents It should be understood that water and variations may be present.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. Note that, in the drawings, the same components are denoted by the same reference symbols as possible. Further, the detailed description of known functions and configurations that may obscure the gist of the present invention will be omitted. For the same reason, some of the elements in the accompanying drawings are exaggerated, omitted, or schematically shown, and the size of each element does not entirely reflect the actual size.

First, the object-based Internet-based door lock system according to the embodiment of the present invention will be described. FIG. 1 is a block diagram illustrating a configuration of a thing Internet-based door lock system according to an embodiment of the present invention. Referring to FIG. 1, a door lock system according to an embodiment of the present invention includes a door lock 100, a door lock control device 200, and a user device 300.

The user device 300 may be a device used by the manager of the door lock system for managing the door lock system or a device used by other users other than the manager. If the user device 300 is a device used by an administrator of the door lock system, it is called a first user device 301. If the user device 300 is a device used by a user other than the administrator, Quot; The user device 300 may, for exemplary purposes, illustrate a smart phone.

The door lock 100 according to the embodiment of the present invention is basically mounted on a door and includes a keypad for inputting numbers and an opening and closing device for locking or unlocking the door. Typically, the door lock 100 may be a so-called " digital door lock ". The door lock 100 may further include an interface for transmitting and receiving data, messages, control signals, sensing signals, and the like to and from the door lock control device 200 according to an embodiment of the present invention.

The door lock control device 200 is basically connected to the door lock 100 to control the door lock or unlock of the door lock 100 according to the embodiment of the present invention. In particular, the door lock control device 200 may control the door lock 100 to open the door by obtaining the authentication of the first user device 301 at the request of the second user device 302. When the door lock control apparatus 200 is installed in a general household, it can be implemented in a refrigerator, which is an appliance in which power is always supplied.

Hereinafter, the door lock control apparatus 200 according to the embodiment of the present invention will be described in more detail. 2 is a block diagram illustrating a configuration of a door lock control apparatus according to an embodiment of the present invention. 2, the door lock control apparatus 200 includes a communication unit 210, a camera unit 220, an impact sensor unit 230, an ultrasonic sensor unit 240, a storage unit 250, and a controller 260 ).

The communication unit 210 is for communication with the user device 300 and can communicate using a broadband mobile communication, a wireless local area communication, and a peer-to-peer connection scheme. The communication unit 210 is implemented as a module in which both broadband mobile communication, wireless local area communication, and peer-to-peer connection communication functions are implemented, and at least one of the three functions described above Will be described as operating selectively. However, the communication unit 210 may be implemented by a plurality of modules separately performing communication functions of a broadband mobile communication, a wireless local area communication, and a peer-to-peer connection method. Here, broadband mobile communication can represent communication according to standards such as LTE and LTE-A. Wireless local area communication may also illustrate Wireless Local Area Network (WLAN) communication using Wi-Fi (wireless fidelity). And a peer-to-peer connection scheme may illustrate communication according to the Bluetooth standard. The communication unit 210 may include an RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and an RF receiver for low-noise amplifying a received signal and down-converting the frequency of the received signal. In addition, the communication unit 210 may receive a signal including data through a wireless channel, and may transmit the received signal to the control unit 260. The communication unit 210 may convert the data received from the control unit 260 into a wireless signal and transmit the wireless signal.

The camera unit 220 is for capturing an image, and includes an image sensor. The image sensor receives light reflected from a subject and converts the light into an electrical signal. The image sensor can be implemented based on a CCD (Charge Coupled Device) or a CMOS (Complementary Metal-Oxide Semiconductor). The camera unit 220 may further include an analog-to-digital converter. The camera unit 220 may convert an electric signal output from the image sensor into a digital sequence and output the digital sequence to the controller 260.

The impact sensor unit 230 is composed of a plurality of impact sensors capable of sensing an impact, and each of the plurality of impact sensors is mounted at a predetermined position of the door to sense the magnitude of an impact applied to the door. For example, the impact sensor unit 230 may use a vibration sensor that detects the magnitude of impact from the vibration generated in the door by the impact sensor. Other sensors may also be used to sense the magnitude of the impact applied to the door in various ways.

The ultrasonic sensor unit 240 is for discriminating whether or not an arbitrary user approaches the door using ultrasonic waves. To this end, the ultrasonic sensor unit 240 radiates an ultrasonic signal, and the radiated ultrasonic signal receives an echo signal reflected from a user outside the door and measures the distance to a user outside the door.

The storage unit 250 stores programs and data necessary for the operation of the door lock control apparatus 200, and can be divided into a program area and a data area. The program area may store a program for controlling the overall operation of the door lock control apparatus 200 and an operating system (OS) for booting the door lock control apparatus 200, applications, and the like. The data area is an area where user data generated according to use of the door lock control device 200 is stored. In addition, the storage unit 250 may store various kinds of data generated by using the door lock control device 200, such as images, access logs, and the like. Each kind of data stored in the storage unit 250 can be deleted, changed, or added according to a user's operation.

The control unit 260 may control the overall operation of the door lock control device 200 and the signal flow between the internal blocks of the door lock control device 200 and may perform a data processing function for processing data. The control unit 260 may be, for example, a central processing unit (CPU), an application processor (AP), a micro-controller, or the like. The control unit 260 loads an operating system (OS) stored in the storage unit 250, performs booting, loads and executes the application, and allocates buffers to the temporary storage space, if necessary. In particular, the control unit 260 controls the door lock 100 according to an embodiment of the present invention. The operation of this control unit 260 will be described in more detail below.

Next, a description will be given of a user device 300 according to an embodiment of the present invention. 3 is a block diagram illustrating a configuration of a user apparatus according to an embodiment of the present invention. 3, a user device 300 according to an exemplary embodiment of the present invention includes a communication module 310, an input module 320, a display module 330, a storage module 340, and a control module 350 do.

The communication module 310 is for communication with the door lock control device 200 and can communicate using a broadband mobile communication, a wireless local area communication, and a peer-to-peer connection method. The communication module 310 is implemented as a module in which both broadband mobile communication, wireless local area communication, and peer-to-peer connection communication functions are implemented, and at least one of the above three functions As shown in Fig. However, the communication module 310 may be implemented by a plurality of modules separately performing communication functions of a broadband mobile communication, a wireless local area communication, and a peer-to-peer connection method. As described above, the broadband mobile communication is based on LTE, communication according to the LTE-A standard, wireless local area communication is wireless local area network (WLAN) communication using Wi-Fi (wireless fidelity), and peer- Peer) connection scheme can illustrate communication according to the Bluetooth standard. The communication module 310 may include an RF transmitter for up-converting and amplifying the frequency of a transmitted signal, and an RF receiver for low-noise amplifying the received signal and down-converting the frequency of the received signal. In addition, the communication module 310 may receive a signal including data through a wireless channel, and may transmit the signal to the control module 350. In addition, the data received from the control module 350 may be converted into a wireless signal and transmitted through a wireless channel.

The input module 320 receives a user's key operation for controlling the user device 300, generates an input signal, and transmits the input signal to the control module 350. The input module 320 may include any one of a power key, a numeric key, and a direction key for power on / off, and may be formed of a predetermined function key on one side of the user device 300. When the display module 330 is a touch screen, the functions of the various keys of the input module 320 can be performed by the display module 330. When all functions can be performed only by the touch screen, ) May be omitted.

The display module 330 visually provides menus, input data, function setting information, and various other information of the user device 300 to the user. The display module 330 functions to output various screens such as a boot screen, a standby screen, and a menu screen of the user device 300. The display unit 110 may be formed of a liquid crystal display (LCD), an organic light emitting diode (OLED), an active matrix organic light emitting diode (AMOLED), or the like. Meanwhile, the display module 330 may be implemented as a touch screen. In this case, the display module 330 includes a touch sensor, and the control module 350 can sense the touch input of the user through the touch sensor. The touch sensor may be constituted by a touch sensing sensor such as a capacitive overlay, a pressure type, a resistive overlay, or an infrared beam, or may be constituted by a pressure sensor . In addition to the above sensors, all kinds of sensor devices capable of sensing contact or pressure of an object can be used as the touch sensor of the present invention. The touch sensor senses the touch input of the user, generates a sensing signal, and transmits the sensing signal to the control module 350. The sensing signal may include coordinate data input by the user. When the user inputs the touch position movement operation, the touch sensor may generate a sensing signal including coordinate data of the touch position movement path and transmit the sensing signal to the control module 350. Particularly, when the display module 330 is a touch screen, some or all of the functions of the input module 320 may be performed through the display module 330.

The storage module 340 stores programs and data necessary for the operation of the user device 300, and can be divided into a program area and a data area. The program area may store a program for controlling the overall operation of the user device 300, an operating system (OS) for booting the user device 300, an application program, and the like. The data area is an area where user data generated according to use of the user device 300 is stored. In addition, the storage module 340 may store various kinds of data, for example, images, generated in accordance with the use of the user device 300 of the user. Each kind of data stored in the storage module 340 can be deleted, changed, or added according to a user's operation.

The control module 350 may perform data processing functions to control the overall operation of the user device 300 and the signal flow between the internal blocks of the user device 300 and process the data. The control module 350 may be a central processing unit (CPU), an application processor, a graphic processing unit (GPU), or the like. The operation of this control module 350 will be described in more detail below.

Although not shown, the user device 300 according to an embodiment of the present invention includes a storage medium inserting unit for inserting an external storage medium such as a memory card to store data, a connection terminal for exchanging data with an external digital device, , A terminal for power supply or charging, and the like. In addition, the user device 300 may further include units having an additional function such as an audio processing module for inputting or outputting an audio signal, a voice signal, etc. through a microphone and a speaker. Although the variations of the portable apparatuses vary widely depending on the convergence trend of the digital apparatuses, they can not be all enumerated. However, the units equivalent to the above-mentioned units are further included in the user apparatus 300 according to the present invention It will be understood by those skilled in the art that various changes and modifications may be made without departing from the scope of the present invention.

Next, a method for object-internet-based door lock control according to an embodiment of the present invention will be described. 4 is a diagram for explaining an observation mode according to an embodiment of the present invention. And FIG. 5 is a flowchart for explaining a method for controlling the object Internet-based door lock according to an embodiment of the present invention.

4 and 5, the controller 260 of the door lock control apparatus 200 is in the observation mode at step S100. In the observation mode, the control unit 260 turns the camera unit 220 on. The control unit 260 detects whether the object is approaching within a predetermined radius R based on any one reference point S of the door 10 through the ultrasonic sensor unit 240. Here, the object is a person, and the control unit 260 estimates the moving object as a person.

When a person enters the predetermined radius R, the control unit 260 continuously captures an object through the camera unit 220, and stores the captured image in a buffer having a predetermined size of the storage unit 250. If the storage space of the buffer is insufficient, the newly captured image is continuously stored in the buffer through overwriting. This observation mode is continuously performed until the power of the door lock control device 200 is turned off. Therefore, the observation mode indicated by reference numeral S100 is performed only in the observation mode, and the other steps indicated through the other reference signs are performed simultaneously with the observation mode and other tasks .

During the observation mode, the control unit 260 can sense an impact applied to the door through the impact sensor unit 230 in step S110. If an impact is detected, the controller 260 determines in step S120 whether the impact detected earlier is equal to or greater than a predetermined threshold value. If it is determined in step S120 that the detected impact is less than the predetermined threshold value, the controller 260 proceeds to step S100 and switches to the observation mode. On the other hand, if it is determined in step S120 that the sensed impact is equal to or greater than the preset threshold value, the controller 260 proceeds to step S130.

The control unit 260 performs a reporting process in order to report such a situation to the manager through the image according to the embodiment of the present invention because the possibility of a trespassing or the like is high. In particular, an event that triggers the reporting process is referred to as a reporting event. In this embodiment, it is a reporting event to sense an impact above a threshold value.

For the reporting process, the controller 260 edits the image to generate a report image, and stores the generated report image in the storage unit 250 in order to inform the manager of the image including the situation that the impact is applied to the door in step S130 . That is, the report image can be an image of a situation where an impact is applied to the door. In step S130, the control unit 260 extracts an image before and after a predetermined period of time at a time point when an impact is detected among the images captured through the camera unit 220 in the observation mode and stored. That is, the control unit 260 extracts an image before and after a predetermined period of time at which a shock is detected, which is a reporting event occurrence time that triggers the reporting process. In addition, the control unit 260 identifies a face of a person in the extracted image through object recognition so as to easily identify the person who applied the shock, and captures an image in which a face of the person is identified. Thereby, a report image is generated. That is, the report image includes the extracted image and the captured image. After generating the report image, the control unit 260 stores the report image in the storage unit 250. In the embodiment of the present invention, the controller 260 of the door lock control apparatus 200 may perform functions of an application server and a web server, and the storage unit 250 may serve as a database server. Accordingly, the location where the report image is stored can be identified through the URL.

Then, the control unit 260 transmits the report image stored in the storage unit 250 to the first user device 301 in step S140. Here, the report image may be transmitted to the first user device 301 in a push service or a server push manner. That is, the controller 260 of the door lock control device 200 may perform functions of an application server and a web server for providing a push service. The push service may, for example, illustrate Apple's APNS (Apple Push Notification Service) and Google's GCM (Google Cloud Messaging). Accordingly, the control unit 260 transmits a message (e.g., notification) including a location (e.g., URL) where the report image is stored. This message is then forwarded to the first user device 301 via a push server (e.g., a GCM server or an APNS server). Then, the control module 350 of the first user device 301 receives the message through the communication module 310, accesses the door lock control device 200 by referring to the URL of the message, method will be downloaded. The control module 350 may then store the report image in the storage module 340 and display it via the display module 330. [ The user can view the report image and take necessary actions. As described above, according to the embodiment of the present invention, when a shock occurs in the door, since the state before and after the occurrence of the shock is transmitted to the manager as a report image, a high level of security service can be provided .

Next, a method for object-internet-based door lock control according to another embodiment of the present invention will be described. 6 and 7 are flowcharts for explaining a method for object-internet-based door lock control according to another embodiment of the present invention.

Referring to FIGS. 6 and 7, the controller 260 of the door lock control device 200 is in the observation mode at step S100. This observation mode is as described above with reference to FIGS. 4 and 5.

During the observation mode, the controller 260 checks whether a number is inputted through the keypad 110 of the door lock 100 in step S210. If it is determined that the number is input, the controller 260 determines whether the number matches the preset number in step S220. Here, the request number is a preset number for requesting the manager to request to open the door. The request number may use a special key. In this case, the keypad 110 may have a special key.

If it is determined in step S220 that the inputted number is a special number (a special key is input if there is another special key), the controller 260 proceeds to step S310. On the other hand, if it is determined in step S220 that the inputted number is not the request number (if there is a special key, the special key is input), the controller 260 proceeds to step S230.

In step S230, the controller 260 determines whether or not the entered number matches the access number (S210). As a result of the determination in step S230, if the input number does not match the access number, the controller 260 proceeds to step S240. If the input number matches the access number, the controller 260 proceeds to step S280.

In step S240, the control unit 260 increases the number of inconsistencies because the input number does not match the access number. In step S250, the controller 260 determines whether the number of mismatches is equal to or greater than a predetermined number. If the result of the determination is less than the preset number of times (for example, three times), the control unit 260 returns to step S100. On the other hand, if it is determined that the number of inconsistencies is greater than or equal to the predetermined number, the control unit 260 performs steps S260 and S270 in the reporting process to report the situation to the administrator . Steps S260 and S270 are performed as described above in steps S130 and S140.

That is, in step S260, the control unit 260 edits the image to generate a report image to report to the administrator an image containing the situation when the inconsistency of the access number occurs more than a predetermined number of times, and transmits the generated report image to the storage unit 250. [ . Here, the report image is a picture of a situation where an impact is applied to the door. More specifically, the control unit 260 controls the control unit 260 to perform a predetermined period of time at a point in time at which the access number mismatch occurs more than a predetermined number of times, that is, at the time of occurrence of the reporting event triggering the reporting process, And extracts the before and after images. In addition, the controller 260 identifies the face of the person in the extracted image through object recognition so as to easily identify the person who entered the number, and captures an image in which the face of the person is identified. Thereby, a report image is generated. That is, the report image is the extracted image and the captured image. Then, the control unit 260 stores the report image in the storage unit 250. As described above, the location of the stored report image can be identified through the URL.

Next, the controller 260 transmits the report image stored in the storage unit 250 to the first user device 301 in step S270. Here, the report image may be transmitted to the first user device 301 in a push service or a server push manner. The description thereof is as described in step S140. In addition, as described above, the first user device 301 can also download the report image according to the push service method and display the report image. Thus, the user can view the report image and take necessary actions. As described above, according to the embodiment of the present invention, when the access number mismatch occurs more than a predetermined number of times, all of the before and after the situation are transmitted to the manager as a report image, so that a high level of security service can be provided.

On the other hand, if it is determined in step S230 that the input number matches the access number, the controller 260 controls the opening / closing device 120 of the door lock 100 to unlock the door lock in step S280. Thereby, the door is opened. In the embodiment of the present invention, an event triggering to release the lock of the door lock will be referred to as an access event. In this embodiment, the access event is an event in which it is determined that a number matching the access number is input.

In step S290, the control unit 260 stores the access information including at least one of the time at which the door is opened, the time at which the access event occurred, and the access event type in the storage unit 250. The control unit 260 transmits the access information to the first user device 301 in step S300.

The transmission of access information can also be carried out in a push service manner like a report image. The first user device 301 can also download access information according to the push service method. The control module 350 of the first user device 301 accumulates access information in the storage module 340 and stores it. When the administrator requests the input through the input module 320, the control module 350 loads the cumulatively stored access information from the storage module 340 and displays it through the display module 330.

On the other hand, if it is determined in step S220 that the inputted number is a request number (a special key is input in the case of a special key), the control unit 260 transmits a report number S310 and S320 are performed. That is, in step S310, the control unit 260 edits the image to generate a report image, and stores the generated report image in the storage unit 250 in order to deliver the image containing the figure of the person who has inputted the request number to the manager. Here, the report image is an image containing the image of the person who has input the request number. More specifically, the control unit 260 extracts an image before and after a predetermined period at a point in time when a request number is input, that is, at the time of generating a reporting event triggered by the reporting process, among the images captured and stored through the camera unit 220 . In addition, the controller 260 identifies the face of the person in the extracted image through object recognition so as to easily identify the person who entered the number, and captures an image in which the face of the person is identified. Thereby, a report image is generated. That is, the report image is the extracted image and the captured image. Then, the control unit 260 stores the report image in the storage unit 250. As described above, the location of the stored report image can be identified through the URL.

In step S320, the control unit 260 transmits the report image stored in the storage unit 250 to the first user device 301. In step S320, Here, the report image may be transmitted to the first user device 301 in a push service or a server push manner. The description thereof is as described in step S140. In addition, as described above, the first user device 301 can also download the report image according to the push service method and display the report image. Accordingly, the manager can view the report image and take necessary actions. At this time, when the manager wants to allow the person who inputted the request number through the reporting image, the manager inputs the request to allow the access. Then, when the control module 350 of the first user device 301 receives the input of the manager through the input module 320, the door lock controller 200 ).

In step S330, the controller 260 of the door lock control device 200 determines whether an open command is received within a predetermined period of time through the communication unit 210. [ The controller 260 controls the opening and closing device 120 of the door lock 100 to open the door and the controller 260 controls the opening / Stores the access information including the time when the door is opened in the storage unit 250 in step S290, and transmits the access information to the first user device 301 in step S300. As described above, according to the embodiment of the present invention, a user who does not know or can not access the access number requests access through the video, and the manager provides a convenient user experience (UX) for viewing and remotely viewing such images .

On the other hand, if the open command is not received within a predetermined time, the controller 260 may output a message indicating that the request is not accepted through the speaker 130 of the door lock 100 in step S340. Then, the control unit 260 returns to step S100.

Next, a method for object-internet-based door lock control according to another embodiment of the present invention will be described. FIG. 8 is a flowchart illustrating a method for object-internet-based door lock control according to another embodiment of the present invention.

4 and 8, the controller 260 of the door lock control device 200 is in the observation mode at step S100. This observation mode is as described above with reference to FIGS. 4 and 5.

During the observation mode, the control unit 260 determines whether the user is detected within a predetermined area A for a predetermined time or longer through the ultrasonic sensor unit 240 in step S410. As shown in Fig. 4, the predetermined area A is right in front of the door 10. As shown in Fig. That is, in step S410, the controller 260 determines whether the user stands in front of the door 10 for a predetermined time or longer.

Then, the controller 260 performs authentication through the device in step S420. Here, the authentication through the device is performed by the second user device 302 and the door lock control device 302 in order to open the door without any additional operation when a legitimate user who is allowed to enter and leave the second user device 302 is standing in front of the door. (200). ≪ / RTI > This procedure will be described in more detail below. That is, the control unit 260 authenticates whether or not the second user device 302 is a legitimate user device permitted to enter and exit in step S420. In accordance with this authentication procedure, the controller 260 determines whether the authentication is successful in step S430. If it is determined that the authentication is not successful, the control unit 206 returns to step S100.

On the other hand, if the authentication is successful (i.e., when an access event occurs), the controller 206 controls the opening / closing device 120 of the door lock 100 to open the door in step S440, similar to steps S280 through S300. Then, the control unit 260 stores the access information including the time when the door is opened in the storage unit 250 in step S450. The controller 260 transmits the access information to the first user device 301 in step S460.

Hereinafter, an authentication method using a device according to an embodiment of the present invention will be described in more detail. Before performing the authentication procedure, the administrator registers the user's second user device 302 in the door lock control device 200 so that a legitimate user can unlock the door without any operation.

First, the registration procedure will be described. 9 is a flowchart illustrating a method for registering a device for door lock control based on the object Internet according to another embodiment of the present invention. In Fig. 9, the first user device 301 of the administrator describes a procedure of registering the user's second user device 302 in the door lock control device 200. Fig. It is assumed in FIG. 9 that the first user device 301 and the second user device 302 are located within a distance that enables a peer-to-peer connection (for example, Bluetooth pairing) between each other. Accordingly, the registration procedure shown in FIG. 9 can be a procedure for allowing the administrator to confidently identify himself / herself and granting authority to allow access to the second user device 302, which is the portable device of the user.

In step S510 of FIG. 9, the device ID (IDA) of the door lock control device 200 is stored in the storage module 340 of the first user device 301. FIG. The device identifier (IDA) is an identifier that can uniquely identify the door lock control device 200 by distinguishing it from other door lock control devices. The device identifier (IDA) may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the device identifier (IDA) is equal to 'IDA = {0011}'.

If there is an input from an administrator in step S520, the first user device 301 is paired between the first user device 301 and the second user device 302. After the pairing, the control module 350 of the second user device 302, in step S530, identifies the second user device 302 through the communication module 310 by using a user identifier IDU) to the first user device (301). Here, the user identifier (IDU) may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, it is assumed that the user identifier (IDU) is equal to 'IDU = {1100}'.

The control module 350 of the first user device 301 receiving the user identifier (IDU) generates an authenticator (CER) in step S540. Here, the authenticator (CER) may be a random number (random number) generated through a random function. The authenticator (CER) may be a bit string of a predetermined length having the same number of bits 0 and 1 in a bit string. For example, assume that the authenticator (CER) is equal to 'CER = {1001}'.

Next, the control module 350 of the first user device 301 receives the first cipher text COD1 through the first cryptographic function E1 () as a factor of the authenticator (CER) and the user identifier (IDU) in step S550 . That is, the control module 350 of the first user device 301 generates the first cipher text COD1 by encrypting the authenticator (CER) with the user identifier (IDU) in step S550. For example, the first cryptographic function E1 () is given by Equation 1 below.

[Equation 1]

E1 (seed, idu) = CER

Figure 112016017145616-pat00001
IDU = COD1,
Figure 112016017145616-pat00002
Is an XOR operator

According to the above assumption, when the authenticator (CER) is 'CER = {1001}' and the user identifier (IDU) is 'IDU = {1100}', according to the first cryptographic function E1 The first cipher text (COD1) becomes 'COD1 = {1010}'.

The control module 350 of the first user device 301 then transmits the second cipher text COD2 through the second cryptographic function E2 () as a factor of the first cipher text COD1 and the device identifier IDA in step S560 . For example, the second cryptographic function E2 () is represented by the following equation (2). That is, the control module 350 of the first user device 301 encrypts the first cipher text COD1 encrypted with the user identifier (IDU) again with the device identifier (IDA) in step S560, 2 cipher text (COD2). For example, the second cryptographic function E2 () is represented by the following equation (2).

&Quot; (2) "

E2 (cod1, ida) = COD1

Figure 112016017145616-pat00003
IDA = COD2,
Figure 112016017145616-pat00004
Is an XOR operator

The first cipher text COD1 derived through Equation 1 is 'COD1 = {1010}', and when the device identifier IDA is 'IDA = {0011}' as previously assumed, The second cipher text (COD2) becomes 'COD2 = {0110}' according to the second cryptographic function E2 ().

Next, the control module 350 of the first user device 301 transmits the second cipher text 'COD2 = {0110}' to the second user device 302 through the communication module 310 in step S570. Then, the control module 350 of the second user device 302 stores the second cipher text COD2 'COD2 = {0110}' in the storage module 340 in step S580.

Meanwhile, the control module 350 of the first user device 301 transmits the authenticator (CER) 'CER = {1001}' to the door lock control device 200 through the communication module 310 in step S590. Then, the controller 260 of the door lock control device 200 stores the authenticator (CER) 'CER = {1001}' in the storage unit 250 in step S600. As a result, the second user device 302 is registered in the door lock control device 200.

When the registration procedure described in FIG. 9 is completed, the user can unlock the door through the second user device 302 without any input. This procedure will be described. FIG. 10 is a flowchart illustrating an authentication method for object-based Internet-based door lock control according to another embodiment of the present invention. The embodiment of FIG. 10 is a detailed description of step S420 of FIG.

8, the control unit 260 of the door lock control device 200 performs an authentication process when the user detects a predetermined time or more in the predetermined area A through the ultrasonic sensor unit 240 in step S410 . Here, it is assumed that the user is carrying the second user device 302. In step S610, the controller 260 of the door lock control device 200 transmits an authentication start message to the second user device 302 through the communication module 210 to notify the second user device 302 to start the authentication process.

The second user equipment 302 having received the authentication start message transmits the second cipher text 'COD2 = {0110}' stored in the storage module 340 to the door lock control device 200 in step S620. The controller 260 of the door lock control device 200 generates a third cipher text COD3 through the third cryptographic function E3 () with the second cipher text COD2 and the device identifier IDA as factors in step S630 . As described above, the first cipher text COD1 is obtained by encrypting the authenticator (CER) with the user identifier (IDU), and the second cipher text COD2 is obtained by encrypting the first cipher text COD1 with the device identifier (IDA) will be. Here, the third cryptographic function E3 () is the inverse of the second cryptographic function E2 (). In step S630, the controller 260 extracts a third cipher text (COD3) obtained by encrypting the authenticator (CER) with the user identifier (IDU) from the second cipher text (COD2) through the device identifier (IDA). Accordingly, the third cipher text COD3 has the same value as the first cipher text COD1. The third cryptographic function E3 () is, for example, the following Equation (3).

&Quot; (3) "

E2 (cod2, ida) = COD2

Figure 112016017145616-pat00005
IDA = COD3,
Figure 112016017145616-pat00006
Is an XOR operator

The second cipher text COD2 is 'COD2 = {0110}' and the third cipher text COD3 (COD2) is '0110' according to the third cryptographic function E3 () in Equation 3 when the device identifier (IDA) ) Becomes 'COD3 = {1010}'.

Then, the controller 260 of the door lock control device 200 transmits the third cipher text 'COD3 = {1010}' to the second user device 302 through the communication module 310 in step S640. Then, in step S650, the control module 350 of the second user device 302 uses the third cipher text 'COD3 = {1010}' and the user identifier (IDU) 'IDU = {1100} (COD4) through the first cipher text (). Here, the fourth cryptographic function E4 () is the inverse of the first cryptographic function E1 (). As described above, the first cipher text COD1 is obtained by encrypting the authenticator (CER) with a user identifier (IDU). The third cipher text (COD3) is also the one obtained by encrypting the authenticator (CER) with the user identifier (IDU), and the third cipher text (COD3) has the same value as the first cipher text (COD1). Here, the fourth cryptographic function E4 () is the inverse of the first cryptographic function E1 (). Therefore, the control unit 450 extracts the fourth cipher text COD4 from the third cipher text COD3 through the user identifier (IDU) in step S650, and the fourth cipher text COD4 has the same value as the authenticator CER . The fourth cryptographic function E4 () is, for example, as shown in Equation (4).

&Quot; (4) "

E4 (cod3, idu) = COD3

Figure 112016017145616-pat00007
IDU = COD4,
Figure 112016017145616-pat00008
Is an XOR operator

Here, the third cipher text COD3 is 'COD3 = {1010}', and when the user IDU is 'IDU = {1100}', according to the fourth cryptographic function E4 () (COD4) becomes 'COD4 = {1001}'.

Then, the control module 350 of the second user device 302 transmits the fourth cipher text 'COD4 = {1001}' to the door lock control device 200 through the communication module 310 in step S660. Then, the controller 260 of the door lock control device 200 compares the fourth cipher text (COD4) received in step S670 with the authenticator (CER) stored in the registration procedure (S600) to perform authentication. If the second user equipment 302 is a device registered according to the procedure shown in FIG. 9, the received fourth cipher text (COD4) 'COD4 = {1001}' is stored in the registration procedure according to the procedure described in FIG. It will have the same value as the authenticator (CER) 'CER = {1001}', and the authentication will succeed. However, in the case of an unregistered user device, since the first to fourth cryptographic functions, the authenticator, and the like can not be known, the authentication can not be successful.

Meanwhile, according to an embodiment of the present invention, the control module 350 of the first user device 301 may periodically update the authenticator (CER). That is, steps S540 to S600 may be repeated periodically. More specifically, the control module 350 of the first user device 300 may newly generate an authenticator (CER) having a different value from the authenticator (CER) periodically issued in step S540. The control module 350 of the first user device 301 then generates the first cipher text COD1 by encrypting the authenticator (CER) with the user identifier (IDU) through the first cryptographic function E1 , And generates a second cipher text (COD2) by encrypting the first cipher text (COD1) with the device identifier (IDA) through the second cryptographic function E1 (). The control module 350 of the first user device 301 then transmits the second cipher text COD2 to the second user device 302 via the communication module 310 and transmits the authenticator CER to the door lock control (200). The control module 350 of the second user device 302 newly receiving the second cipher text COD2 updates the second cipher text COD2 previously received with the newly received second cipher text COD2. In addition, the controller 260 of the door lock control device 200 newly receiving the authenticator (CER) updates the authenticator (CER) previously received with the newly received authenticator (CER). In this manner, the authenticator (CER) can be updated periodically to maintain a high level of security. 10, if the second cipher text (COD2) is transmitted through the peer-to-peer local area communication between the first user device 301 and the second user device 302, According to the update procedure, if the second user device 302 is located in a range outside of the short-range communication, the second cipher text COD2 may be transmitted over the network.

According to the present invention, the user can unlock the door lock without any input. Furthermore, since the authentication is performed by exchanging a plurality of ciphertexts between the first user device 301, the second user device 302 and the door lock control device 200 by using the cryptographic function or the like, a high level of security service is provided can do.

Meanwhile, the method according to the embodiment of the present invention described above with reference to FIGS. 4 to 10 may be implemented in a form of a program readable by various computer means and recorded in a computer-readable recording medium. Here, the recording medium may include program commands, data files, data structures, and the like, alone or in combination. Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of computer software. For example, the recording medium may be a magnetic medium such as a hard disk, a floppy disk and a magnetic tape, an optical medium such as a CD-ROM or a DVD, a magneto-optical medium such as a floppy disk magneto-optical media, and hardware devices that are specially configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions may include machine language wires such as those produced by a compiler, as well as high-level language wires that may be executed by a computer using an interpreter or the like. Such a hardware device may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.

While the present invention has been described with reference to several preferred embodiments, these embodiments are illustrative and not restrictive. It will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.

100: Door lock 110: Keypad
120: switchgear 130: speaker
200: Door lock control device 210:
220: camera unit 230: shock sensor unit
240: ultrasonic sensor part 250:
260: control unit 300: user equipment
301: first user device 302: second user device
310: communication module 320: input module
330: Display module 340: Storage module
350: control module

Claims (7)

An apparatus for controlling a door lock that locks or unlocks a door,
Pairing with the second user device when the device identifier of the door lock control device is stored within a distance that enables a peer-to-peer connection with the second user device, Generating a first ciphertext through a first cryptographic function with the authentication key and the user identifier as arguments, receiving the first ciphertext and the device identifier as arguments A first user device for generating a second cipher text through a second cryptographic function and transmitting the second cipher text to the second user device, and transmitting the authentication key to the door lock control device;
Wherein the first user device is paired with the first user device when the first user device is located within a distance that enables peer-to-peer connection between the first user device and the first user device, The second user device receiving the second cipher text from the first user device according to the transmission of the user identifier and performing authentication to the door lock control device based on the received second cipher text; And
And the door lock control device performing authentication of the second user device based on the authentication key.
The method according to claim 1,
The second user device
When receiving the authentication initiation request message informing the door lock control device to start the authentication process, transmits the second cipher text to the door lock control device, and transmits the third cipher text from the door lock control device in response to the transmission of the second cipher text And transmits the fourth cipher text to the door lock control apparatus by generating the fourth cipher text through a fourth cryptographic function which is a function of the first cryptographic function and taking the third cipher text and the user identifier as factors, Device for controlling door lock.
3. The method of claim 2,
The door lock control device
When the second user device detects the second user device within a predetermined radius based on any one of the reference points of the door, transmits an authentication start request message to the second user device, and responds to the authentication start request message from the second user device Generating a third ciphertext through a third cryptographic function that is a function of the second cryptographic function and factoring the second ciphertext and the device identifier, and transmitting the third ciphertext to the second user device When receiving the fourth cipher text from the second user device in response to the transmission of the third cipher text, compares the fourth cipher text with the authentication key to perform authentication, and if the authentication result is successful, And releasing the lock of the door lock.
The method according to claim 1,
The door lock control device
A communication unit for communication;
A camera unit for photographing the outside of the door;
An impact sensor unit for sensing an impact applied to the door;
An ultrasonic sensor unit for sensing an object approaching the door; And
When an object approaching within a predetermined radius is detected with reference to any one reference point of the door through the ultrasonic sensor unit, an outside of the door is photographed through the camera unit to generate an observation image, And a control unit for generating a report image in which a situation where the report event occurs is recorded from an observation image and transmitting the report image to the second user apparatus of the administrator through the communication unit,
The event may include an event that an impact of a predetermined threshold value or more is applied to the door through the impact sensor unit, an event in which a number input through a keypad of the door lock is inconsistent with an access number of a predetermined number or more, Wherein at least one event of the numbered event is included,
Wherein the report image includes at least one of an image from a predetermined period before the occurrence of the event and a predetermined period after the occurrence of the event extracted from the observed image and an image in which a face of a person captured in the extracted image is identified Image,
Wherein the control unit releases the lock of the door so as to open the door when the entrance / exit event occurs, transmits the access record including the time when the access event occurred through the communication unit to the user device of the manager,
Wherein the access event includes at least one of an event in which the number input through the keypad of the door lock matches an access number and an event in which an open command for opening the door through the communication unit is received from the user device of the manager Wherein the door lock control device is configured to control the door lock.
A method for controlling a door lock that locks or unlocks a door,
The first user equipment is located within a distance where a peer-to-peer connection is possible between the second user equipment and the second user equipment in a state where the device identifier of the door lock control device is stored, receiving a user identifier from the second user device by pairing the first user device;
The first user equipment generating an authentication key upon receipt of the user identifier;
Wherein the first user equipment generates a first ciphertext through a first cryptographic function with the authentication key and the user identifier as arguments, and the first user equipment uses a second cryptographic function Generating a second cipher text through the second cipher text;
Transmitting the second cipher text to the second user device, and transmitting the authentication key to the door lock control device; And
The second user device requests authentication to the door lock control device based on the second cipher text and the door lock control device performs authentication for the second user device based on the authentication key Wherein the door lock is controlled by the control means.
6. The method of claim 5,
The step of performing the authentication
Transmitting an authentication start request message to the second user device when the door lock control device senses the second user device within a predetermined radius based on any one reference point of the door;
Transmitting the second ciphertext to the door lock control device upon receiving an authentication start request message informing the second user device to start the authentication process from the door lock control device;
When the door lock control device receives the second cipher text, generates a third cipher text through a third cipher function, which is a function of the second cipher function, as a factor of the second cipher text and the device identifier, 2 transmitting to the user device;
The second user device generates the fourth cipher text through a fourth cryptographic function that is a function of the third cipher text and the user identifier and is inverse to the first cryptographic function and transmits the fourth cipher text to the door lock control device ; And
And the door lock control device compares the fourth cipher text with the authentication key to perform authentication, and when authentication is successful as a result of the authentication, releasing the lock of the door lock is performed Way.
A method for controlling a door lock according to any one of claims 5 and 6.
KR1020160020492A 2016-02-22 2016-02-22 Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method KR101755565B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160020492A KR101755565B1 (en) 2016-02-22 2016-02-22 Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160020492A KR101755565B1 (en) 2016-02-22 2016-02-22 Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method

Publications (1)

Publication Number Publication Date
KR101755565B1 true KR101755565B1 (en) 2017-07-07

Family

ID=59353684

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160020492A KR101755565B1 (en) 2016-02-22 2016-02-22 Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method

Country Status (1)

Country Link
KR (1) KR101755565B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101935547B1 (en) * 2018-03-06 2019-01-04 주식회사 태양자동문 Door lock and recoding device using bluetooth
KR20190055520A (en) * 2017-11-15 2019-05-23 주식회사 아이앤나 Sound Device for Entry Recognition
KR20210103251A (en) * 2020-02-13 2021-08-23 한남대학교 산학협력단 Intrusion prevention system using door strike device
KR20220040596A (en) 2020-09-24 2022-03-31 (주)위키박스 Multifunction smart door
KR102716046B1 (en) * 2023-09-26 2024-10-11 (주)한빛엔지니어링건축사사무소 Door security system for apartment complex

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101030518B1 (en) * 2010-10-06 2011-04-25 주식회사 아리스에프알 Face recognition digital door lock
KR101242122B1 (en) * 2012-02-07 2013-03-11 한국기술교육대학교 산학협력단 Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus
KR101533814B1 (en) * 2014-03-13 2015-07-03 주식회사 유라코퍼레이션 Apparatus and Method of recording event based image data
KR101595897B1 (en) * 2014-12-09 2016-02-19 숭실대학교산학협력단 Digital doorlock and control method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101030518B1 (en) * 2010-10-06 2011-04-25 주식회사 아리스에프알 Face recognition digital door lock
KR101242122B1 (en) * 2012-02-07 2013-03-11 한국기술교육대학교 산학협력단 Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus
KR101533814B1 (en) * 2014-03-13 2015-07-03 주식회사 유라코퍼레이션 Apparatus and Method of recording event based image data
KR101595897B1 (en) * 2014-12-09 2016-02-19 숭실대학교산학협력단 Digital doorlock and control method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190055520A (en) * 2017-11-15 2019-05-23 주식회사 아이앤나 Sound Device for Entry Recognition
KR102645469B1 (en) * 2017-11-15 2024-03-12 주식회사 아이앤나 Sound Device for Entry Recognition
KR101935547B1 (en) * 2018-03-06 2019-01-04 주식회사 태양자동문 Door lock and recoding device using bluetooth
KR20210103251A (en) * 2020-02-13 2021-08-23 한남대학교 산학협력단 Intrusion prevention system using door strike device
KR102469066B1 (en) * 2020-02-13 2022-11-18 한남대학교 산학협력단 Intrusion prevention system using door strike device
KR20220040596A (en) 2020-09-24 2022-03-31 (주)위키박스 Multifunction smart door
KR102716046B1 (en) * 2023-09-26 2024-10-11 (주)한빛엔지니어링건축사사무소 Door security system for apartment complex

Similar Documents

Publication Publication Date Title
KR101755565B1 (en) Apparatus for controlling door lock based on Internet of Things, method thereof and computer recordable medium storing the method
EP3657370B1 (en) Methods and devices for authenticating smart card
JP7123540B2 (en) Information processing terminal that accepts input by voice information, method, and system including information processing terminal
CN105118127B (en) A kind of guest system and control method thereof
KR102137673B1 (en) Application connection method and system using same method
KR101242122B1 (en) Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus
CN103634795B (en) Radio communication device and method
US20070162762A1 (en) Ownership sharing method and apparatus using secret key in home network remote controller
CN105243318A (en) User equipment control right determining method and apparatus and terminal device
CN102461128A (en) Method and apparatus for proximity based pairing of mobile devices
KR20140109683A (en) Smart digital door lock system with a black-box functionality
CN105246138A (en) Control method and device of Internet-of-things device
EP3501195B1 (en) Secure authentication of devices without server assistance or pre-shared credentials
CN105471814A (en) Account number management method and account number management device
CN105574966A (en) Intelligent mobile phone door lock
CN110738778B (en) Access control method and device, equipment and storage medium
CN107733872B (en) Information printing method and device
CN108650219B (en) User identity identification method, related device, equipment and system
CN112115464A (en) Unlocking processing method and device, electronic equipment and storage medium
KR102459799B1 (en) System and method for managing entrance and exit of common entrance door
CN104852800A (en) Data transmission method and device
KR20180062692A (en) Method, user terminal, door lock device and entry security system for controlling of opening and closing door
CN104980919A (en) Method for acquiring network service information and equipment
KR101595897B1 (en) Digital doorlock and control method thereof
WO2019218328A1 (en) Smart door lock wireless communication method, smart door lock, gateway, and communication device

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant