KR20120045668A - Security reinforced door lock with external power connection or motion detection sensor - Google Patents
Security reinforced door lock with external power connection or motion detection sensor Download PDFInfo
- Publication number
- KR20120045668A KR20120045668A KR1020100107347A KR20100107347A KR20120045668A KR 20120045668 A KR20120045668 A KR 20120045668A KR 1020100107347 A KR1020100107347 A KR 1020100107347A KR 20100107347 A KR20100107347 A KR 20100107347A KR 20120045668 A KR20120045668 A KR 20120045668A
- Authority
- KR
- South Korea
- Prior art keywords
- door lock
- user
- password
- message
- input
- Prior art date
Links
- 230000033001 locomotion Effects 0.000 title claims abstract description 22
- 238000001514 detection method Methods 0.000 title claims description 5
- 238000000034 method Methods 0.000 claims description 73
- 238000004891 communication Methods 0.000 claims description 45
- 239000004973 liquid crystal related substance Substances 0.000 claims description 16
- 238000002834 transmittance Methods 0.000 abstract 1
- 230000006870 function Effects 0.000 description 32
- 238000005516 engineering process Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 239000000047 product Substances 0.000 description 7
- 238000009434 installation Methods 0.000 description 6
- 238000010295 mobile communication Methods 0.000 description 6
- 230000005856 abnormality Effects 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 238000003825 pressing Methods 0.000 description 4
- 238000001646 magnetic resonance method Methods 0.000 description 3
- XEEYBQQBJWHFJM-UHFFFAOYSA-N Iron Chemical compound [Fe] XEEYBQQBJWHFJM-UHFFFAOYSA-N 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000007795 chemical reaction product Substances 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000005674 electromagnetic induction Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 229910052742 iron Inorganic materials 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 235000012054 meals Nutrition 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B47/0001—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B51/00—Operating or controlling locks or other fastening devices by other non-mechanical means
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B53/00—Operation or control of locks by mechanical transmissions, e.g. from a distance
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B67/00—Padlocks; Details thereof
- E05B67/38—Auxiliary or protective devices
-
- E—FIXED CONSTRUCTIONS
- E06—DOORS, WINDOWS, SHUTTERS, OR ROLLER BLINDS IN GENERAL; LADDERS
- E06B—FIXED OR MOVABLE CLOSURES FOR OPENINGS IN BUILDINGS, VEHICLES, FENCES OR LIKE ENCLOSURES IN GENERAL, e.g. DOORS, WINDOWS, BLINDS, GATES
- E06B5/00—Doors, windows, or like closures for special purposes; Border constructions therefor
- E06B5/10—Doors, windows, or like closures for special purposes; Border constructions therefor for protection against air-raid or other war-like action; for other protective purposes
- E06B5/16—Fireproof doors or similar closures; Adaptations of fixed constructions therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0094—Mechanical aspects of remotely controlled locks
- E05B2047/0095—Mechanical aspects of locks controlled by telephone signals, e.g. by mobile phones
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Civil Engineering (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Structural Engineering (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
As the standard of living has improved, the need for security has increased, and the demand for digital door locks has increased due to the convenience of not having to carry a key.
The types of door locks currently used can be summarized as follows.
(A) Door lock with key and lock
(B) Door lock by password (password)
(C) Door lock by biometric technology such as fingerprint recognition
(D) Door lock by card recognition (mainly RF applied)
(E) Door lock by the combination application of said (A), (B), (C), (D)
The said (E) system is mainly comprised by the hybrid system including the said (B) system, and also including another system (namely, (A), (C), or (D) system).
In addition to improving living standards, there is an increasing need for additional functions beyond simple security through door locks.
By inputting and outputting the desired message in the door lock, a person or company can publicize themselves and leave a desired message to an authorized user of the door lock (eg, a family member or co-worker).
By adding communication functions to digital door locks and combining them with popular mobile phones, it is possible to solve the user's demand for increased security at a very low cost and to check the access of user members.
In addition to improving living standards, there is an increasing need for additional functions beyond simple security through door locks.
By inputting and outputting the desired message in the door lock, a person or company can publicize themselves and leave a desired message to an authorized user of the door lock (eg, a family member or co-worker).
Figure 1a. Door lock block diagram including message input and output unit
Figure 1b. Door lock configuration example including message input and output
Figure 2a. Door lock block diagram including message input / output unit and external interface module
Figure 2b. Door lock configuration example including message input / output unit and external interface module
Figure 3. Door lock block diagram including message input / output unit and communication module
[For public use message ]
Although not necessarily described in the present invention, the basic functions of the existing door lock (eg, automatic locking after the door is closed) may be included. The door lock for the present invention additionally has a display device (eg, liquid crystal), and outputs a message input by the user (public PR message or a private message provided to an authorized user) to the display device. "Message" includes "text message (visual message)" and "voice message (audio message)".
In the case of digital door locks, most of them have a basic method of authenticating by a password (password). This is because it is inexpensive compared to the biometric method and does not have a key. In the case of a password method, since a numeric keypad is usually provided, it can be used as a keypad for text input. In the present invention, the door lock may be additionally configured not only a password method but also a biometric method such as an RF card method and a fingerprint.
FIG. 1A is a conceptual block diagram of a case in which a message input / output function is additionally provided in a door lock having a numeric keypad, and FIG. 1B is a configuration diagram in this case. In FIG. 1B, the Korean keypad for Hangul character input technology presented by the applicant has been presented, but it is obvious that any character input technology can be applied. In Fig. 1B, the case of simply displaying a "public PR message" is given. Generating a message based on the input value is performed inside the door lock. In FIG. 1A, the “sound output unit” outputs a warning sound or a guide sound, and may or may not be depending on the product. In addition, the "
Also, due to the small size of the display device (eg liquid crystal), the message may not be displayed. To solve this, it is possible to make the message appear sliding. For example, if only one line is displayed, the message slides from right to left. Even if multiple lines are displayed, it is possible to make the entire message appear by sliding up and down.
In the past, when a general house was generalized, there was a nameplate, and in a hard age when only the number (apartment lake) remains as the residential environment is converted into an apartment, the message for the door lock disclosure of the present invention can be expected to provide softness. . You can put the phrase "This is a security company!"
[Private message ]
In some cases, it may not be just a public message that is open to everyone. For example, “My dear son, I am late today. Evening meals can't be made public so that everyone can see them. ” This is because the thieves advertise that the house is empty. It should only be visible to certain authorized users. Therefore, it should be stored as a "private message" and only authorized users can view the message.
A typical way of viewing a message would be to enter a user ID and a password that corresponds to that user ID. Recently, however, a door lock system has been introduced to designate a large number of passwords and to allow users to use their own passwords. In this case, since the specific password itself serves as an ID (identifier) for a specific person, when a specific password is input, a specific message designated to the user can be output.
There may be various methods of storing a private message, but an example is as follows. The user enters the administrator mode with his or her password, selects the user who will deliver the message from the user list, and writes the desired message after selecting the user. Similarly, the process of outputting a private message is possible by a procedure in which a user to receive the message is authorized (the corresponding password is input) and a process of outputting the message.
For example, the mother saves the private message (“Love Son, I'm late today. Dinner will be resolved…”) for the password (password) “1111” or “ㄱㄱㄱㄱ” that the son uses. After the procedure of saving as a message or storing as voice), when the son returns home and enters the promised password (“1111” or “ㄱㄱㄱㄱ”), the message is output in the promised manner (output in the display window of the door lock, text). To convert the voice to voice or output the stored voice) to process the private message. Preferably, after the message has been output, if the user takes some action (e.g., presses the "OK" button or the "Delete" button), the door lock opens or after a certain time (e.g. 3 seconds) after outputting the entire message. The door lock can also be opened.
In the keypad illustrated in Fig. 1A, “[1] button = [a] button”, and the scan code (the unique key value defined for each key) are the same. Therefore, regardless of whether the user is aware of or enters “1111” or “a ㄱㄱㄱ”, the door lock recognizes the same. Therefore, the password is expressed as “1111” or “ㄱㄱㄱㄱ”. This is the same as entering the Korean [ㅁ] key, entering the English [a] key or recognizing the same password when entering the password on the PC. [1] ~ [0] The numeric buttons are the same for all products, so in the following, the numeric values are mainly displayed as passwords.
[External Interface Module]
The present invention is not applicable only to a password-type door lock, and in the case of a door lock without a keypad as an input device, an
2A is a block diagram when an external input device is used. When using an external input device without using an internal input device (eg, a keypad of a door lock) provided in the door lock itself, only the scan code value (a unique key value defined for each key) required for character generation in the external input device is used. A message can be generated from the door lock, and a message generated from an external input device can be received and displayed. The former is a case where a message for the input value is generated in the door lock as shown in Figure 1b, the latter is a message generated by the external input device to deliver the message generated to the door lock.
The
In the case of applying a non-short-range wireless communication means such as infrared communication or Bluetooth (e.g., CDMA or GSM), there is an advantage in that the door lock can be controlled (eg, message registration) at a remote location. In this case, the control program operating on the mobile phone in conjunction with the door lock will be implemented as a program on the wireless Internet platform of the mobile phone in reality.
[Notified User]
In addition, the door lock may be provided with a wired or
When the door lock is opened when the private message is first displayed, a message (text message or voice message) is sent to the mobile phone of the promised user (for example, the user who entered the private message or the entire administrator), indicating that the message has been read. It is possible. For example, it informs the promised user that "the message was output to his son (user of" 1111 "password) at xx hour xx minute xx seconds xx date xx xx 2006". If in all cases a text message is sent to or from a particular user (a son using the password “1111” or “ㄱㄱㄱㄱ” in the case), if the son opens and closes the
In the case of private messages, when a specified number of users are specified, each user first reads the message (that is, the doorlock outputs the message for the first user for the first time). Can be.
That is, in addition to the above-described procedure, a procedure for confirming whether a private message is first outputted to a user to be viewed, and notifying a promised user of the fact (message output fact) if the private message is output for the first time. It includes additional procedures.
In addition, in the door lock in which the
Furthermore, even if there is no private message, the promised user (e.g. highest) only when the first user opens the door lock in a certain time zone (e.g. 0 to 24 o'clock, 13 o'clock or 24 o'clock, or 06 o'clock to 12 o'clock). It is possible to notify the administrator (text message or voice message). A family example can help mothers who are going out to know when they are home.
[User Management]
The management of the user can be made similar to the existing user management (user management in a device such as a PC). A simple example in connection with the present invention is as follows. In this case, the specific user is not recognized by the ID and password, but the password itself has a specific user authentication function.
First, it is assumed that the user of the registered password basically has the super administrator function. Super administrators can create multiple passwords (i.e. users) and grant privileges (e.g. administrator or general user rights). Each user can enter his or her password and enter management mode to change his or her password or to enter a public or private message.
Here, whether or not a user designated as an administrator by the super administrator has the same authority as the super administrator (eg, creation of a password, that is, creation of a user, etc.) is a matter of operation policy and thus will not be discussed further. In addition, whether to subdivide the user class or to make a public message with general user authority is a detail problem in the operation policy, so it is not mentioned anymore.
First, when the super administrator enters the super administrator password and enters the management mode to query the list of registered users, the following contents stored in the memory of the door lock will be displayed. Of course, the process of entering the management mode may be performed by an input device of the door lock itself, or may be performed in conjunction with an external input device (eg, a mobile phone or a PC).
If a user is added according to a predetermined procedure (e.g., pressing a menu button and selecting add password from a menu that is created), the user will be as follows. The following is an example of modifying super administrator information and adding users. The user name may be viewed as an alias registered to make it easy to identify who the user of a specific password is, and may register the user's name or position. In reality, the chief administrator will be the security officer of the organization (company or home) or a representative of a security guard company.
Conventionally, user-friendly interface implementation (eg user name input and display) would not be possible in a door lock without a display device (e.g. liquid crystal) and an input device. However, if liquid crystal is provided as in the present invention, the above management Interface configuration is possible. When performed by an external input / output device, the output of management details will also be displayed on the display device of the external input device (eg, the screen of a PC or the liquid crystal of a mobile phone), not the liquid crystal of the door lock. Of course, once the management details (e.g. the creation of a public message) are completed, the public message is displayed on the display device of the door lock, but the details of the management status should not be displayed on the display device of the door lock at the user and the remote site. In addition, a contact number such as a mobile phone is indicated in parentheses because it is not necessary when the
When creating a public message (eg, pressing the menu button and selecting Create a Public PR Message), you can enter the public message creation screen and save the message after creating it. If you want to modify the information of a specific user, select the specific user and enter the “edit information” to perform the information modification. Likewise, when creating a private message, select a target user (one or more) (eg select a check box for each user) and enter the “Private Message” menu (eg press the Menu button and select Create Private Message). Just do it.
It is important to note that if a general user (eg son) using the password “1111” or “ㄱㄱㄱㄱ” enters administrative mode, the user's list should not be visible to others. That is, it is preferable that a user (password) list is displayed as in the following example. Whether or not to allow cell phone numbers to be viewed under normal user rights is also a matter of operational policy.
In the case of a small company, the door lock opening log data may be used to manage employee time and attendance. Of course, this is possible by connecting a device such as a PC through an external interface module of the door lock and dumping the door lock opening log data.
In the example, the password is expressed as four digits for convenience, but security can be strengthened by specifying the minimum number of password digits according to the security policy.
[Emergency contact]
If a voice call function is added to the
[Security anomaly notice]
When the
Expressed as a procedure, a procedure for counting password inconsistencies, a procedure for checking occurrences of inconsistencies more than a predetermined number of times for a predetermined time, and a procedure for notifying the fact by the means promised to the promised contact. If a certain number of times is specified as "one time," each time an incorrect password is entered, the registered user (eg, supervisor: home = mother, company = security officer) will be notified of the fact.
[Security anomaly notification and camera linkage]
Currently, remote access or remote monitoring services that allow users to monitor the situation of a remote site by accessing a camera installed at a remote place through a mobile phone or a smart phone are common. When detecting a security abnormality sign that the wrong password is input, it is a matter of course that the user who is notified by the text message to the user can access and monitor the door lock or a camera installed around the door lock through the remote monitoring service.
It may be convenient to use the "callback URL" which is currently generalized. According to the glossary, "a short message service (SMS) leaves an Internet URL, and when a mobile phone user presses the call button, they are automatically connected to the wireless Internet site at that address. It's easy to access, so you can use download service or internet information service. " That is, the callback URL checks the text message notifying the security abnormality and presses the [call] button of the mobile phone. Of course, since the predetermined URL has a remote access address of the camera, remote monitoring through the camera is possible.
The camera module may be included in the door lock itself, but the production cost of the product is increased. Since the remote access and remote monitoring function can be an additional function, it is possible to use a separate camera by a necessary user without having a camera embedded in the door lock itself. In other words, by designating and sending a callback URL for accessing the separate camera from a text message notifying a security abnormality sign in the door lock, the user presses the [call] button after confirming the text message, thereby remotely (eg, home or company). Will be able to monitor the situation. In this case, the surveillance camera may be installed completely separate from the door lock, and only the door lock has a callback URL for accessing the camera (of course, the callback URL may be set as a door lock management function), and a security anomaly symbol may be used. The callback URL can be provided to the user when sending a message. For example, a text message such as "Incorrect password X times. Press [Call] to access the camera" is sent to the user. The advantage is that by not providing a camera to users who do not need a camera, the product cost can be kept low, and the installation position of the camera can be freely installed.
Of course, as mentioned, the product may include a camera module in the door lock, a camera may be installed separately from the door lock, and the camera module may be installed in conjunction with the door lock. In the third case, only the interface module for connecting the camera to the door lock needs to be provided. The connection between the door lock and the camera may use a recently generalized USB interface, and a wireless interface module that may be connected wirelessly may be applied to simplify installation. (26) of FIG. 2A and (36) of FIG. 3, which are "wired or air interface modules", can be utilized as an interface module for camera connection. See Figure 4.
[Dual security, secondary password]
When a wired or
In the application of a secondary password, the entry of the primary password serves to identify (not approve) the user, and this user identification can not only be achieved by entering the primary password, but also biometrics (eg fingerprint recognition). ), User identification may be performed by RF card recognition. The second password can be sent to the mobile phone registered with the user and the user can be entered to complete the double security. In the above example where only the primary password was applied, using the RF card as the user identification, the user database would be as follows.
In summary, the process of recognizing a user (by inputting a primary password, biometric or RF card), transmitting a secondary password to a mobile phone of a registered user, and receiving and confirming the transmitted secondary password It is possible.
In this case, the person who attempts to break into the system will not be able to open the door lock simply by obtaining the available password (primary password), and the security of the user will be required because the user's mobile phone must also be the password.
However, having to enter a secondary password all the time can be inconvenient, and according to security policy, for example, if a particular user successfully authenticates with the secondary password for the first time for a period of time (eg a day), During the day, you can operate without asking for the secondary password. This security policy profile can also be specified by the super administrator.
To reorganize the above cases, the process of recognizing the user (by inputting the primary password, biometrics or RF card), checking whether the secondary password was authenticated within a predetermined period of time, and if so, opens the door lock. Otherwise, the second password may be transmitted to the user's mobile phone, and the second password may be input again and confirmed.
Another example would be to send a prompt (voice and / or text) to enter a secondary password and send the secondary password to the user's cell phone if there is no input within a certain time (eg 5 seconds). According to the security policy, if the secondary password sent to the user is valid for a certain period of time (for example, one day or one week), the secondary password already known to the user can be reused during that period. It is explained that it is possible to reduce the operating cost of the door lock (eg text message transmission cost) while applying the second password.
To reorganize the above cases, the process of recognizing the user (by inputting the primary password, biometric or RF card), the process of requesting the input of the secondary password, and the registration of the second password if there is no input of the secondary password within a certain time The second password may be transmitted to the user's mobile phone, and the second password may be input again and confirmed.
The above application of double security (secondary password) may be particularly applicable to the point where security is required. It can also be implemented for security purposes in the event of signs of a security breach or in the case of a company.
[Dual security, Callback or To the callback server 2nd authentication]
Double security can also be cumbersome for the user to press the second password. Therefore, instead of inputting the secondary password indicated on the text message after checking the text message, the second authentication is made by pressing a [call] button, and the door lock can be opened. This can also be implemented via a callback URL. In this case, a text message saying "Please press the [Call] button to open the door through the second authentication" is sent to the user.
The callback server for secondary authentication will be referred to as "secondary authentication server" for convenience. The server sends a "open" order (command) to the door lock when the user confirms the text message and the callback is confirmed by pressing the [call] button within a predetermined time (
To do this, the following process is required.
The door lock notifies the " secondary authentication server " that the user's callback will be within the predetermined time, and sends a message capable of callback to the secondary authentication server to the user's mobile phone. Of course, the door lock has a unique ID (e.g., a physical network ID, an IP address, or other identifier that uniquely identifies the door lock). Upon receiving the callback of the user, the secondary authentication server drops an open order to the corresponding door lock, and the door lock is opened. This is illustrated in Figure 5a.
One similar thing is as follows. Rather than transmitting a message from the door lock to the user's mobile phone, the door lock notifies the secondary authentication server to request the second authentication, and sends the message for the second authentication from the second authentication server to the mobile phone. When a callback enters the secondary authentication server from the user's mobile phone, the secondary authentication server places an order to open the door in the door lock. See Figure 5b.
The method by the secondary authentication server is complicated to the system as to operate the server for the secondary authentication, and there is a difficult problem of ensuring the reliability of the system.
A second authentication method by easier callback is possible as follows. As a communication module, if a mobile communication module (eg CDMA), a wired LAN or a Wi-Fi module is built in, the door lock itself has a mobile communication number (eg 010-xxxx-xxxx) or an Internet phone number (eg 070-xxxx-xxxx). Can be given. In this case, a message (voice or text message) requesting the second authentication is transmitted to the user's mobile phone that is the first authentication (eg password, RF card, fingerprint recognition, iris recognition, ...), and the user within a predetermined time. When the callback to the caller's number (eg 010-xxxx-xxxx or 070-xxxx-xxxx) of the text message (eg press the [call] button after checking the text message), the door lock system detects this and opens the door. . See Figure 6.
Considering the cost-effectiveness, the second authentication method using the second password seems to be realistic.
[External power and power operation to increase battery duration]
Wired / wireless communication module (eg CDMA, landline, WiBro, Wi-Fi, ...) provided in the door lock of the present invention can be added to one or a plurality of communication modules, of course. The most concern when adding a communication module to the door lock is a problem of battery consumption of the door lock due to the operation of the communication module. Since the development of rechargeable batteries (hereinafter referred to as "batteries" for convenience) to the extent that electric vehicles are commercialized, there is a possibility that it will be solved in a short time. However, at the current low cost level of technology, when a mobile communication (eg CDMA) module is installed as a communication module, even if a high capacity battery having twice the capacity of the mobile phone is installed in the door lock, it is twice the standby time of the mobile phone. You can guess the battery life. If the Wi-Fi module is installed as a communication module, a shorter battery life can be predicted. Therefore, an external power connection (eg, an external power connection using an AC-DC adapter, etc.) is required. The fatal disadvantage of this case is that the installation is cumbersome.
External Power Source-Wireless Charging Method
One of the technologies currently available is wireless charging technology, which was used in high-end electric shavers and notebook PCs. Wireless charging technology is said to be "magnetic induction method" and "magnetic resonance method". The magnetic resonance method is said to have a wider charging range (charging distance) than the electromagnetic induction method. Currently, the magnetic resonance method is mostly used. The disadvantage of wireless charging technology is that the current technology does not have a wide range of charging, and the power efficiency of charging against the supply is low. In addition, it has not yet been popularized in terms of price as it is used only for expensive high-end products.
External Power Source-POE Method
If the wireless charging technology is used, the ease of installation is solved, but there is a concern that the cost of the product may be increased. One method of using wired charging, but relatively simple to install, is POE (Power Over Ethernet), which is an existing technology. This is a communication module that is equipped with a wired LAN module, and the DC power supply for supplying the external power of the door lock to two of the four strands except the four strands used for data among the eight strands of the LAN cable (UTP cable). It is used for supply. In other words, if only a LAN line is connected, power can be supplied together through two of the eight strands of the LAN line. This is provided with a wired LAN module as a communication module in the door lock, and supplies power together with a wired LAN cable (UTP cable) connected to the wired LAN module. To supply power to the door lock using the POE method, a LAN cable is connected to the door lock via a POE hub (or a router or a hub that supports the POE method). That is, the door lock supporting the POE method and the POE hub are used in pairs. The POE hub is usually provided with at least one LAN port for plugging in a LAN line. If a port supporting POE is provided in only one LAN port among the plurality of LAN ports, the door lock is transferred to the LAN line from the POE support port. Just plug it in. As explained, POE hub is an Internet hub that can supply the DC voltage of the promised voltage to the promised 2 wires among the 8 wires of the LAN line.
The advantage of the above method is that by using a low-cost wired LAN module (ie wired LAN card for wired internet) as a communication module and providing only one additional POE hub, there is no need to replace the battery periodically (even in existing digital door locks). The battery had to be replaced). For example, in apartments and homes, wired internet is most often introduced into the living room. Since there are almost no obstacles from the living room to the front door, it is easy to wire the LAN (UTP line). Do not. FIG. 7A is a case of wiring to the ceiling, and FIG. 7B is a case of wiring to the floor. The horizontal distance "L" from the power outlet to the door lock shown in FIGS. 7a and 7b may vary according to the environment of each home or office. When the power adapter is connected, the length of the power line can not be arbitrarily cut and adjusted. In this case, the length of the lan line can be freely adjusted to fit.
In case of connecting power from outside through POE method or AC-DC adapter, it is desirable to have a rechargeable battery in the door lock in case of power failure. Fortunately, the current state of power in Korea has almost no power outage, and even if the power outage is restored in a very short time, it will be enough to have a small capacity rechargeable battery in the door lock.
External Power-Large Capacity Battery for External Power
Power supply by the POE method is stable, but as the LAN line must be physically connected to the door lock, there can be installation trouble. While complementing the shortcomings of physically connecting the wires, the following shows a realistic way to reduce the cost burden when the wireless charging method is applied.
First, a small capacity battery (rechargeable battery, which is referred to as a "battery" for convenience) is built in the door lock to start the door lock for a predetermined time (eg, 10 hours, 20 hours, ..). In order to operate the communication module at all times, an external power source must be connected as described, and a large capacity external battery is provided to supply direct current (DC) current. This high capacity battery acts like an AC-DC adapter.
If you connect the AC-DC adapter, which acts as an external power source from the notebook PC, you can see that the adapter's DC power is used to charge the built-in battery while also supplying the power required to operate the notebook PC. We also know that when the adapter is unplugged, the notebook PC recognizes that the external power supply is cut off and is powered by the built-in battery. When the power of a large capacity battery that acts as an external power source (hereinafter referred to as "large capacity battery") is exhausted, the door lock is recognized as a cut-off of the external power and a sound (voice / sound) or a message (to the administrator on the mobile phone text message or door lock Indicate to charge the large capacity battery that is operated by the external power source.
The user removes the external large capacity battery that needs to be charged from the door lock, places it on the charging cradle, and charges the battery. The small capacity battery built in the door lock performs its function during charging (eg, 2 hours). When the charged large capacity battery is connected to the door lock again, the large capacity battery acts like an AC-DC adapter, thereby charging the small capacity battery inside the door lock and supplying power for operating the door lock. Connecting / disconnecting the door lock and the external large capacity battery may apply an interface similar to that of a conventional jack connecting a AC-DC adapter and a device (eg, a notebook PC, a door lock, etc.).
The circuit configuration described above is similar to the existing AC-DC adapter operation method and will not be described in detail. However, when the power of a large capacity battery acting as an external power source instead of an AC-DC adapter is consumed and falls below a certain level, the door lock should detect that the external power supply is cut off. This is an electronic device that operates only with an external power source. If a voltage below a certain level is connected, it detects that the external power source is not connected. Therefore, the existing technology can be processed. For example, connecting a 1 volt adapter to a device that requires 10 volts will not work.
Of course, the connection (eg large capacity battery connection, LAN connection of the POE method), as well as the inside of the door (that is described as an example of the apartment, not in the corridor side of the house, but of course the home). For the connection of the large capacity battery may be equipped with a cradle (such as a basket or pocket) that can be fixed to the large capacity battery of the door lock which is located inside the house. See Figure 8.
The above method has been sold separately a large capacity battery that can be connected to the external power source instead of the AC-DC adapter to extend the use time of the notebook PC, and has already been proven. In other words, if only a jack for connecting an external AC-DC adapter is provided and only the external large capacity battery is additionally provided. The advantage of the above-described method is that there is no hassle of installing a physical wire to the door lock, and only a large capacity battery and a charging cradle of the large capacity battery need to be provided. However, there is still the inconvenience of periodically recharging the large capacity battery and mounting it back to the door lock.
The POE method and the external power battery method may coexist in one door lock, and thus, both interfaces may be provided in the door lock. In this case, according to the user's choice, it is possible to connect the LAN line using the POE method, or to connect a large capacity battery for external power supply. The DC power supplied by POE and the DC power supplied by the large capacity battery for external power will operate normally even if the user supplies power in two ways at the same time.
Liquid crystal by motion sensor ( LCD Operation control
One of the characteristic features of the present invention is to add a liquid crystal (LCD) to the door lock so that it can display a message to PR itself (with or without a built-in communication module), or by password authentication or RF card authentication, etc. When a person opened the door, there was a message to the person.
Liquid crystals emit light on their own, which consumes more battery capacity than other components. We know that power consumption is much higher when the LCD is kept on even in notebook PCs and smartphones. Therefore, the motion detection sensor is added to the door lock, and only when it is detected that someone approaches (eg, within 1 m) from the outside of the door, the liquid crystal is activated and the PR message can be displayed. Motion sensor is expected to consume much less power than liquid crystal. In the reality that life patterns are becoming personalized, since there is not much time for someone to stay at the door of a home (eg an apartment), the liquid crystal operation by such a motion sensor will be meaningful.
A simpler method than the motion sensor is to detect the user touching the door lock (eg keypad key contact, opening the door in the case of a door lock with a slide cover, etc.), the door lock starts to operate, and the liquid crystal also starts to operate. It is. The motion sensor has an advantage that the liquid crystal can start to operate when someone approaches a certain distance (eg 2m) from the door lock, the contact sensor is only consumed when someone (including the user) touches the door lock power consumption Although it can be minimized, there is a disadvantage in that the user does not touch the door lock but does not show the message of the liquid crystal.
When the motion sensor module or the contact sensor module is mounted and the camera (including the recording function) is embedded in the door lock itself or interlocked with the camera through an external interface module, there is another advantage that can be applied. Cameras and expensive recording equipment are very expensive and costly to install. Recently, however, many low-cost products that have a built-in memory and have a recording function have been released. When recording using the camera's own built-in memory, the memory is so small that only a short period of time (eg a few days) of recording is possible. However, when motion or contact is detected in conjunction with a motion sensor or a touch sensor, the signal is received from the control unit of the door lock, and a recording start order is issued to a camera linked to the built-in camera or an external interface module, thereby preventing any movement. Alternatively, the recording is not performed in the absence of a contact, and only when a motion or a contact is detected, thereby recording the long-term situation with less memory. Also, when you check the recording later, it is not recorded when there is no motion or contact, so you can easily search only meaningful scenes. Even if the recording is started when the motion or contact is detected, it is natural that the recording is stopped to stop the recording if the motion or contact is not detected for a predetermined time (
9 is a representation of the addition of a motion sensor module or a touch sensor module.
[ Wi-Fi Function or Wi-Fi bridge Addition of function
Hereinafter, "Wi-Fi", "Wireless LAN", "Wi-Fi Wireless LAN," and the like are all used as terms of the same meaning. However, the same may be applied to existing wireless services (e.g., CDMA wireless communication, WiBro, ..) or other wireless services that will emerge in the future.
Today, operators are competitively deploying their Wi-Fi networks for load balancing of mobile networks. One example is the introduction of Wi-Fi-style home Internet phones, while the company's wireless routers (or Wi-Fi APs) are being deployed in the home. The AP allows other Wi-Fi users to use wireless Wi-Fi.
The dissemination of AP through home internet telephones has a disadvantage in that signals are weakly caught outside the home. By adding a Wi-Fi AP function to the door lock of the present invention, a road to smoothly provide Wi-Fi to users outside the home is opened. If you connect a wired LAN (wired internet) to a door lock using a POE hub, etc., and the door lock performs its own function of the Wi-Fi AP, you can use Wi-Fi at a longer distance outside the house through the door lock (ie Wi-Fi AP). have.
If Wi-Fi wireless LAN function is added as a communication module to the door lock and the door lock is connected to the AP installed in the home (or office), the door lock has a Wi-Fi bridge function, so the wireless LAN can be smoothly outside the home. Can be provided. Wireless signals from APs installed in homes weaken rapidly after passing through the main front door (usually a thick iron door). However, a wireless LAN antenna (internal or external) is added to the part exposed outside the door of the digital door lock (e.g., the numeric keypad is mounted for password input), and the door lock itself performs an AP function so that the home (or office) ) Wi-Fi signal can be delivered farther away. Recently, many wireless routers (APs) in which antennas are not exposed to the outside have been released. Therefore, it is better to apply the antenna built-in in terms of the design of the door lock.
The Wi-Fi bridge function connects two APs wirelessly. The wired internet line is connected only to the first AP, and the remaining second APs are not connected to the wired Internet, and are wirelessly bridged between the two APs. The second AP that is not connected to the wired internet works in the same way as the first AP that is connected to the wired internet, thereby extending the reach of Wi-Fi radio waves without making a wired connection. This function is also included in a commercially available universal router (AP).
For example, the wired Internet is connected to the first AP installed in the living room, and the door lock, which is the second AP, has the effect of extending the distance of the AP from the living room to the outside of the front door without being connected to the wired Internet. . Taking the case of an apartment in connection with the present invention as follows. In the state where the present invention is not applied, the Wi-Fi signal may be weakly detected in the hallway near the room 101 in which the AP is installed in the house. However, if you move away from room 101 and go to room 108, which does not have an AP installed in your house, you won't be able to catch the Wi-Fi signal. However, if the door lock proposed in the present invention is installed in the room 101 and the door lock AP function (wired Internet direct connection or WiFi bridge method) is provided, the Wi-Fi WLAN can be used smoothly in the entire hallway of the apartment. will be. For convenience, the apartment is taken as an example, but it is obvious that the same can be applied to an office environment.
The view from the outside of the house or office is as shown in Figure 10 *. Figure 10b shows when the camera or camera module is installed together. When the wired LAN is connected to the door lock as shown in FIG. 7 *, since the door lock itself has an AP function, the outdoor side portion of the door lock of FIG. 10 * serves as an AP. Even in the case of being bridged wirelessly (for example, Wi-Fi) in the form similar to that of FIG. 8, the door lock exposed to the outdoor side serves as an AP in FIG. Do. Electrically / circuitly connecting the indoor and outdoor sides of the door lock enables electrical / circuit connection between the inside of the door lock and the outside of the door lock through the perforated part of the door for installation of the door lock, as in the existing door lock. Do.
The service provider (e.g., telecommunications company) provides the Wi-Fi wireless LAN service to its other subscribers by using the customer's resources (front door, digital door lock, electricity) while providing the door lock service of the present invention to its customers. There is an advantage to this.
By adding communication functions to digital door locks and combining them with popular mobile phones, it is possible to solve the user's demand for increased security at a very low cost and to check the access of user members.
** Brief description of the main parts of the drawing **
10, 20, 30: door lock
11, 21, 31: control unit to control the overall function of the door lock
12, 22, 32: memory unit for storing various procedures and data for performing the function of the door lock
13, 23, 33: input unit accepting input for user authentication
14, 24, 34: input unit for entering messages and various data
15, 25, 35: message output unit for outputting text messages
26, 36: external interface module connected to the external input and output device by wire or wireless
27, 37: external input and output device connected to the door lock by wire or wireless
38: Communication module that can communicate with external device by wired or wireless connection
Claims (22)
A door lock further comprising a display device for message output
A door lock further comprising a keypad device for inputting a message
Door lock, characterized in that it further has an interface module (wired or wireless) interlocked with the external input and output device
Door lock, characterized in that it further has a communication module with the outside
A door lock, characterized in that the user is authenticated as an authorized user, the user registers a message for publication, and a message for publication is registered, and the message is displayed on the display device of the door lock.
The private message is registered by authenticating whether the user is an authorized user and registering a private message for a specific user. Door lock, characterized in that the private message is output
Door lock, characterized in that notified to the promised user (eg registrant) that the private message has been delivered
When registering the private message, the door lock characterized in that for transmitting the private message to the registered mobile phone of the user who is the target of viewing the private message
Door locks characterized in that the specific user notices the promised user to open the door lock for the first time
Identify the user through the input of the primary password, the input of biometric information or the input of the RF card,
Send the secondary password to the registered user's mobile phone,
Enter the secondary password within a predetermined time,
Door lock characterized in that it is determined whether the door lock is opened by checking the input second password
Identify the user through the input of the primary password, the input of biometric information or the input of the RF card,
If the secondary password is input within a predetermined time and the secondary password is not input, the secondary password is transmitted to the registered user's mobile phone.
Re-enter the second password within a predetermined time
Door lock characterized in that it is determined whether the door lock is opened by checking the input second password
(a) user identification (by checking primary password input, biometric information input or RF card input);
(b) transmitting a secondary password to a mobile phone of a registered user;
(b) receiving a second password within a predetermined time;
(c) determining whether a door lock is opened by examining the input second password;
Door lock security method characterized in that consisting of
(a) user identification (by checking primary password input, biometric information input or RF card input);
(b) receiving a second password within a predetermined time;
(c) proceeding to (e) if the secondary password is input within the predetermined time, and if not, transmitting the secondary password to the mobile phone of the registered user;
(d) waiting for input of the secondary password again within a predetermined time;
(e) determining whether a door lock is opened by examining the input second password;
Door lock security method characterized in that consisting of
A door lock, characterized by counting password mismatches, checking for occurrences of mismatches more than a predetermined number of times, and notifying the user of the facts (mismatch facts) by the means promised.
Door lock security method comprising the steps of counting password inconsistency, checking for inconsistency more than a predetermined number of times, and notifying the fact (inconsistency occurrence) to the promised user by the means promised.
The door lock includes a camera module or is connected to an external camera by an interface means of the door lock,
The promise notification means is a text message of the mobile phone, the text message includes a callback URL for accessing the camera,
Remote access to the camera via the callback URL
Door lock characterized in that
The door lock includes a camera module or is connected to an external camera by an interface means of the door lock,
The promise notification means is a text message of the mobile phone, the text message includes a callback URL for accessing the camera,
Door lock security method comprising the step of remote access to the camera through the callback URL included in the text message
The method according to any one of claims 1 to 17,
The door lock is additionally provided with a motion sensor module or a contact sensor module,
When an operation or a touch is detected by the motion detection sensor module or the contact detection sensor module, the liquid crystal provided in the door lock operates.
Door lock characterized in that
A camera module including a recording function or a camera module through an external interface is additionally provided.
The camera module is controlled to start recording when motion or contact is detected in the motion sensor module or the contact sensor module.
Door lock characterized in that
The wired internet module provided in the door lock is configured by POE (Power Over Ethernet) method
Door lock characterized in that
Wireless charging module is further provided in the door lock
Door lock characterized in that
The door lock is further provided with a wireless AP function
Door lock characterized in that
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100107347A KR20120045668A (en) | 2010-10-29 | 2010-10-29 | Security reinforced door lock with external power connection or motion detection sensor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100107347A KR20120045668A (en) | 2010-10-29 | 2010-10-29 | Security reinforced door lock with external power connection or motion detection sensor |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020170014148A Division KR20170015955A (en) | 2017-01-31 | 2017-01-31 | A digital doorlock which performs additional authentication by user's callback |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20120045668A true KR20120045668A (en) | 2012-05-09 |
Family
ID=46265093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020100107347A KR20120045668A (en) | 2010-10-29 | 2010-10-29 | Security reinforced door lock with external power connection or motion detection sensor |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20120045668A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101490583B1 (en) * | 2013-03-06 | 2015-02-05 | 주식회사 스마트시스템즈 | Smart digital door lock system with a black-box functionality |
KR101517832B1 (en) * | 2014-07-09 | 2015-05-06 | (주)에스엔아이 | smart door rock using magvetic resonance wireless charge method |
KR101674053B1 (en) | 2016-06-27 | 2016-11-08 | 주식회사 에버정보기술 | Apparatus and method for security entrance |
KR20170047797A (en) * | 2015-10-23 | 2017-05-08 | 엘지전자 주식회사 | Door lock device and method of operating thereof |
KR20180063585A (en) | 2016-12-02 | 2018-06-12 | 국민대학교산학협력단 | Smart door lock device and control method |
-
2010
- 2010-10-29 KR KR1020100107347A patent/KR20120045668A/en not_active Application Discontinuation
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101490583B1 (en) * | 2013-03-06 | 2015-02-05 | 주식회사 스마트시스템즈 | Smart digital door lock system with a black-box functionality |
KR101517832B1 (en) * | 2014-07-09 | 2015-05-06 | (주)에스엔아이 | smart door rock using magvetic resonance wireless charge method |
KR20170047797A (en) * | 2015-10-23 | 2017-05-08 | 엘지전자 주식회사 | Door lock device and method of operating thereof |
KR101674053B1 (en) | 2016-06-27 | 2016-11-08 | 주식회사 에버정보기술 | Apparatus and method for security entrance |
KR20180063585A (en) | 2016-12-02 | 2018-06-12 | 국민대학교산학협력단 | Smart door lock device and control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104134253B (en) | A kind of gate control system and gate inhibition's deployment method | |
US9437063B2 (en) | Methods and systems for multi-unit real estate management | |
US8138886B1 (en) | Communication enabled active lock system | |
CN103280009B (en) | A kind of Multifunctional access device | |
CN205670315U (en) | Fingerprint lock and fingerprint lock system | |
US20040057567A1 (en) | Entrance intercom system | |
US20130169815A1 (en) | Equipment enclosures with remote logging, authorization and monitoring | |
CN101770659A (en) | Remote messaging and security system | |
KR100576797B1 (en) | Digital door-lock system for home-automation | |
CN205354152U (en) | Intelligent gate inhibition system | |
KR20120045668A (en) | Security reinforced door lock with external power connection or motion detection sensor | |
CN104891283B (en) | Elevator control system combined with card password | |
CN206922934U (en) | A kind of cloud talkback door lock system based on SIP | |
JP2008067310A (en) | Security system for multiple dwelling building | |
KR20180109781A (en) | A digital doorlock which performs WiFi Access Point | |
CN213365596U (en) | Building intercom host | |
KR20170015955A (en) | A digital doorlock which performs additional authentication by user's callback | |
CN105678869A (en) | Entrance guard intelligent controller, entrance guard intelligent control system and entrance guard opening method thereof | |
CN210895580U (en) | Mobile terminal dynamic modification intelligent door lock password | |
CN211294016U (en) | Wireless access control system of intelligent community | |
CN209659462U (en) | A kind of recognition of face cloud intercom system based on artificial intelligence and Internet of Things | |
CN110728782A (en) | Management system suitable for place entrance guard and power | |
TW201331885A (en) | Method for intelligent door access and community service | |
CN205788384U (en) | The access control equipment of a kind of long-range control and access control system thereof | |
CN201865445U (en) | Electric door lock with built-in mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |