KR20170042188A - Security system and security settings cancel method using the reader box - Google Patents

Security system and security settings cancel method using the reader box Download PDF

Info

Publication number
KR20170042188A
KR20170042188A KR1020150141854A KR20150141854A KR20170042188A KR 20170042188 A KR20170042188 A KR 20170042188A KR 1020150141854 A KR1020150141854 A KR 1020150141854A KR 20150141854 A KR20150141854 A KR 20150141854A KR 20170042188 A KR20170042188 A KR 20170042188A
Authority
KR
South Korea
Prior art keywords
security
specific person
information
box
reader box
Prior art date
Application number
KR1020150141854A
Other languages
Korean (ko)
Other versions
KR101742204B1 (en
Inventor
강명수
박병주
Original Assignee
(주)아이준
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)아이준 filed Critical (주)아이준
Priority to KR1020150141854A priority Critical patent/KR101742204B1/en
Publication of KR20170042188A publication Critical patent/KR20170042188A/en
Application granted granted Critical
Publication of KR101742204B1 publication Critical patent/KR101742204B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10237Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the reader and the record carrier being capable of selectively switching between reader and record carrier appearance, e.g. in near field communication [NFC] devices where the NFC device may function as an RFID reader or as an RFID tag
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Alarm Systems (AREA)

Abstract

The security system using the reader box of the present invention receives security information of a specific person by using short-range communication, compares the security information with pre-stored secret key information to determine whether the security setting of the specific person is revoked or maintained ; Acquiring magnetic field information having an intrinsic characteristic value generated for identifying a specific person through short-range communication with the reader box, comparing whether the magnetic field information matches a previously provided magnetic force characteristic value, A mobile terminal for transmitting a signal requesting a change of a security setting mode to a server; And an authentication server for registering, storing and managing the security information of a specific person in advance, and transmitting the security information to the reader box upon request for security confirmation.

Description

TECHNICAL FIELD [0001] The present invention relates to a security system and a security setting method using a reader box,

The present invention relates to a security system using a reader box and a security setting canceling method, and more particularly, to a security system using a reader box, which receives security information of a specific person using Bluetooth communication, And acquires magnetic field information having an intrinsic characteristic value generated for identification of a specific person through the Bluetooth communication with the reader box, And transmits a signal for requesting the change of the security setting mode to the external authentication server when the match is found. Thus, the smartphone can be used by using the app of the smartphone or a separate card Bluetooth communication between reader box and smartphone and magnetic characteristic value Phosphorus can maintain or revoke the security settings mode, the present invention relates to a security system and security settings termination method using a reader box.

As the digital industry develops, smart products have been released in many fields, but locks are still being used in analogue systems.

In this way, the locking device is mainly unlocked by using the password and the key. However, if the user can not remember the password or if the key is lost, the lock device may have to be disconnected.

In this manner, there is a problem that the method of releasing the lock by using the password and the key is not ensured of inconvenience and safety.

On the other hand, smart door locks have been proposed in recent years, and systems and methods for remotely unlocking smart door locks have been proposed.

However, the control of this smart door lock is not only a remote control but also plays a role like a key. That is, when the smart door lock is remotely controlled and unlocked, if the mobile terminal is lost or a communication problem occurs, the smart door lock remains unlocked until the user arrives at home.

In recent years, as the spread of smartphone has been proceeding rapidly, there has been proposed a method of setting or canceling a security mode when a user accesses the smartphone using an application. In this case, changing the security mode through the application requires opening the app There is a problem that it is difficult to turn off the security in case of loss of the smartphone or battery discharge.

Korean Patent Publication No. 10-2014-0124606

SUMMARY OF THE INVENTION The present invention has been made in view of the above problems, and it is an object of the present invention to provide a method and apparatus for receiving security information of a particular person using Bluetooth communication, comparing whether the received security information matches previously stored secret key information, And acquires magnetic field information having an intrinsic characteristic value generated for identification of a specific person through the Bluetooth communication with the reader box and compares the acquired magnetic field information with the previously provided magnetic force characteristic value , And transmits a signal for requesting the change of the security setting mode to the external authentication server in case of a match, so that it is possible to perform a simple operation between the reader box and the smartphone without using a smartphone app or a separate card A reader capable of maintaining or revoking a security setting mode of a particular person using Bluetooth communication and magnetic force characteristic values Box security system and a security setting cancellation method.

According to an aspect of the present invention, there is provided a security system using a leader box, the security system comprising: receiving security information of a specific person using short range communication; comparing whether the security information matches previously stored secret key information; A reader box for instructing to cancel or maintain security settings; Acquiring magnetic field information having an intrinsic characteristic value generated for identifying a specific person through short-range communication with the reader box, comparing whether the magnetic field information matches a previously provided magnetic force characteristic value, A mobile terminal for transmitting a signal requesting a change of a security setting mode to a server; And an authentication server for registering, storing and managing security information of a specific person in advance, and transmitting the security information to the reader box upon request for security confirmation.

According to another aspect of the present invention, there is provided a method for canceling a security setting using a reader box, the method comprising: a first step of detecting whether or not a specific person having a mobile terminal has access to the mobile terminal using a short- A second step of transmitting a Bluetooth signal from the reader box to the mobile terminal through local area communication; A third step of receiving and reading magnetic field information having an intrinsic characteristic value generated for identification of a specific person and comparing whether the magnetic field information matches the previously provided magnetic force characteristic value; A fourth step of transmitting a security setting mode change request signal to an authentication server when it is determined that the magnetic field information read out in the third step is identical to a characteristic value given to a specific person in advance; A fifth step of transmitting, to the reader box, a security revocation signal instructing the authentication server to change the security state of the specific person from the security setting to the security disabling in accordance with the security setting mode change signal requested in the fourth step; And a sixth step of releasing the security setting of the specific person according to the security release signal.

There is a technical effect that a security setting mode of a specific person can be maintained or canceled by using a simple Bluetooth communication and a magnetic characteristic value between a reader box and a smart phone without using an app of a smart phone or having a separate card .

FIG. 1 shows a schematic configuration of a security system using a leader box according to the present invention.
FIG. 2 shows a detailed configuration of a leader box according to the present invention.
FIG. 3A is a flowchart illustrating a security disconnection procedure through a reader box when a specific person has a mobile terminal according to the first embodiment of the present invention.
FIG. 3B is a second embodiment according to the present invention. In FIG. 3B, when a specific person does not possess a mobile terminal, a procedure of security cancellation through a leader box is shown.

Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings.

FIG. 1 shows a schematic configuration of a security system using a leader box according to the present invention.

Referring to FIG. 1, a security system using a leader box according to the present invention includes a leader box 100, a mobile terminal 200, and an authentication server 300.

The reader box 100 receives a security information of a specific person via a Bluetooth communication, and when the received security information matches pre-stored secret key information, A detailed description thereof will be given later with reference to FIG.

The mobile terminal 200 incorporates a Bluetooth low energy (BLE) wireless module to read the magnetic field information transmitted from the reader box 100 through Bluetooth communication, and outputs the magnetic field value previously given to the specific person A signal requesting the change of the security setting mode is sent to the authentication server 300 so that the reader box 100 can cancel the security setting for a specific person. Will be described later.

In this case, the mobile terminal 200 possessed by a particular person may include, for example, a smart phone, a PDA, a notebook, and the like, but is not limited thereto.

The authentication server 300 registers, manages, and manages security information of a specific person in advance. For example, the authentication server 300 transmits security information of a specific person according to a request of the leader box 100 to the reader box 100 via bluetooth communication If there is a request to change the security setting mode of the specific person according to the matching magnetic force value from the mobile terminal 200, the security setting mode of the particular person is changed according to the request, and the changed security release signal is transmitted to the Bluetooth communication To the leader box 100 via the network.

FIG. 2 shows a detailed configuration of a leader box according to the present invention.

2, the reader box 100 according to the present invention includes a power source unit 110, a short range communication unit 120, a magnetic element unit 130, a storage unit 140, a security determination unit 150, A cancel unit 160, an alarm unit 170, a display unit 180, and a control unit 190.

The power supply unit 110 is used to supply power to each of the electric devices constituting the reader box 100, for example, a battery or the like.

The short-range communication unit 120 provides an interface for performing short-range wireless communication with the mobile terminal 200 or the authentication server 300. In the present invention, Bluetooth is used, but the present invention is not limited to this, Near Field Communication, Zigbee, RF, and Ultra-wideband (UWB).

Since the magnetic element unit 130 forms a variety of two- or three-dimensional shapes using a magnetic material having a low magnetic property, a unique identifier is provided using a characteristic response to a magnetic field, And termination.

In addition, it provides a unique characteristic value (such as a hysteresis loop, coercive force, etc.) that can be identified due to the type of magnetic material used, the two- or three-dimensional shape used, And the security setting and revocation of a specific person can be performed through comparison with stored characteristic values.

In this case, magnetic materials such as nickel, iron, cobalt, nickel-iron alloy, cobalt-iron alloy, iron-silicon alloy or cobalt-silicon alloy can be used.

Further, the two-dimensional or three-dimensional shape using magnetic materials may be in the form of a shape such as magnetic wire, flattened wire, bars, dots, random spots, random blobs, Can be used.

The storage unit 140 stores at least one secret key related to security and various data processed through the control unit 190. In this case, a nonvolatile memory such as a flash memory may be used as the storage medium. It is not.

The security determination unit 150 includes a first security determination unit 151 and a second security determination unit 152.

The first security deciding unit 151 executes a security deciding process for revoking a security setting of a specific person when a specific person has a mobile terminal 200 such as a smart phone, .

FIG. 3A is a flowchart illustrating a security disconnection procedure through a reader box when a specific person has a mobile terminal according to the first embodiment of the present invention.

Referring to FIG. 3A, the reader box 100 has a first process (a10) for detecting whether a specific person is approaching or not.

In this case, when a specific person who holds the mobile terminal 200 reaches a predetermined proximity distance from the leader box 100, the leader box 100 uses the Bluetooth low energy (BLE) ), And detects that a particular person is approaching.

Next, the reader box 100 has a second process (a20) for transmitting the Bluetooth signal to the mobile terminal 200 through Bluetooth communication.

Next, the mobile terminal 200 reads the magnetic field information included in the Bluetooth signal and having the unique characteristic value generated for the identification of the specific person in the magnetic element unit 130, (Step a30).

Next, when the mobile terminal 200 determines that the magnetic field information read out in the third process (a30) matches the property value previously given to the specific person, the mobile terminal 200 transmits a security setting mode change request signal to the authentication server 300 (A40).

Next, the authentication server 300 transmits a security revocation signal to the leader box 100, which instructs the authentication server 300 to change the security state of the specific person from security setting to security revocation in accordance with the security setting mode change signal requested in the fourth process (a40) (A50).

Finally, the leader box 100 has a sixth step (a60) of canceling the security setting of the specific person according to the security release signal transmitted in the fifth step (a50).

When the specific person does not possess the mobile terminal 200 such as a smart phone, the second security determination unit 152 executes the security determination process for revoking the security setting using the biometric information of the specific person. Will be described below with reference to FIG. 3B.

FIG. 3B is a second embodiment according to the present invention. In FIG. 3B, when a specific person does not possess a mobile terminal, a procedure of security cancellation through a leader box is shown.

Referring to FIG. 3B, the leader box 100 has a first step (b10) of checking security information inputted by a specific person.

Here, the security information of a particular person can be inputted with a temporary password given in advance through an input means such as a keypad (not shown) provided in the leader box 100, and can also be a biometric information provided by the leader box 100 The iris, the fingerprint, the face, and the like can be input through the means (not shown).

Next, the reader box 100 transmits a Bluetooth signal to a Bluetooth AP (not shown) installed in the vicinity, and the Bluetooth AP (Access Point) authenticates the security information of a specific person input via the Internet or the like And a second process (b20) for requesting the server 300 to transmit the request.

Next, the authentication server 300 has a third process (b30) for checking whether the security information of the specific person transmitted through the second process (b20) matches the previously registered security information.

Next, if it is determined in step b30 that the security information of the specific person matches the previously registered security information, the authentication server 300 transmits the secret key of the specific person to the Bluetooth AP (Access Point) via the Internet or the like , The Bluetooth AP (Access Point) has a fourth step (b40) of transmitting the secret key transmitted through the Bluetooth communication to the reader box 100 again.

Next, the reader box 100 has a fifth step (b50) of comparing security information such as a secret key of a specific person transmitted through the fourth process (b40) and a password input by a specific person.

Finally, the reader box 100 has a sixth step (b60) of canceling the security setting of the specific person when it is determined that the secret key of the specific person is identical to the inputted security information in the fifth step (b50).

Referring to FIG. 2 again, the security setting and revocation unit 160 may be configured to maintain the security settings of a specific person or to secure the security of the specific person according to the security information determination result for the specific person of the first security determination unit 151 or the second security determination unit 152 Execute whether or not to set.

The alarm unit 170 generates an alarm when the security setting is canceled through a different route from the security information stored in the storage unit 140 (for example, a trespasser is generated). In this case, Various means such as a hearing means (buzzer, voice warning, etc.), time (text message, etc.), tactile sense (vibration, etc.) can be used.

The display unit 180 displays a security information result input by a specific person and various results processed through the control unit 190 on the screen. In this case, the display unit 180 may be a display panel such as a LCD, an LED, Can be used.

The control unit 190 includes a power unit 110, a short range communication unit 120, a magnetic device unit 130, a storage unit 140, a security determination unit 150, a security setting and cancellation unit 160, And controls the display unit 180.

While the present invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not limited to the disclosed embodiments. It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit of the invention.

100: Reader Box
110:
120:
130: Magnetic element part
140:
150:
151: first security determination unit 152: second security determination unit
160: security setting and revocation unit
170:
180:
190:

Claims (5)

A reader box for receiving security information of a specific person using short range communication, comparing whether the security information matches pre-stored secret key information or not, or canceling or maintaining the security setting of a specific person;
Acquiring magnetic field information having an intrinsic characteristic value generated for identifying a specific person through short-range communication with the reader box, comparing whether the magnetic field information matches a previously provided magnetic force characteristic value, A mobile terminal for transmitting a signal requesting a change of a security setting mode to a server;
And an authentication server for registering, storing and managing security information of a specific person in advance, and transmitting the security information to the reader box upon request for security confirmation.
The information processing apparatus according to claim 1,
A short range communication unit for providing an interface for performing short range wireless communication with the mobile terminal or the authentication server;
A magnetic element unit which forms a two-dimensional or three-dimensional shape using a magnetic material and provides a unique identifier using a characteristic response to a magnetic field;
A storage unit for storing a secret key of a specific person and data processed;
A security judgment unit for checking the security information of a specific person possessing the mobile terminal and judging whether the security setting is maintained or terminated;
A security setting and canceling unit for executing a security setting of a specific person according to security information determination result of the security determination unit, And
And a controller for controlling the local communication unit, the magnetic element unit, the storage unit, the security determination unit, and the security setting and revocation unit.
2. The method according to claim 1,
A security system using a reader box, characterized by using Bluetooth.
A first step of detecting whether or not a specific person having a mobile terminal is approaching using a short distance communication in a leader box;
A second step of transmitting a Bluetooth signal from the reader box to the mobile terminal through local area communication;
A third step of receiving and reading magnetic field information having an intrinsic characteristic value generated for identification of a specific person and comparing whether the magnetic field information matches the previously provided magnetic force characteristic value;
A fourth step of transmitting a security setting mode change request signal to an authentication server when it is determined that the magnetic field information read out in the third step is identical to a characteristic value given to a specific person in advance;
A fifth step of transmitting, to the reader box, a security revocation signal instructing the authentication server to change the security state of the specific person from the security setting to the security disabling in accordance with the security setting mode change signal requested in the fourth step; And
And the reader box includes a sixth step of revoking a security setting of a specific person according to the security revocation signal.
5. The method according to claim 4,
A method of revoking a security setting using a reader box using a reader box characterized by using Bluetooth.
KR1020150141854A 2015-10-08 2015-10-08 Security system and security settings cancel method using the reader box KR101742204B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150141854A KR101742204B1 (en) 2015-10-08 2015-10-08 Security system and security settings cancel method using the reader box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150141854A KR101742204B1 (en) 2015-10-08 2015-10-08 Security system and security settings cancel method using the reader box

Publications (2)

Publication Number Publication Date
KR20170042188A true KR20170042188A (en) 2017-04-18
KR101742204B1 KR101742204B1 (en) 2017-05-31

Family

ID=58704115

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150141854A KR101742204B1 (en) 2015-10-08 2015-10-08 Security system and security settings cancel method using the reader box

Country Status (1)

Country Link
KR (1) KR101742204B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018199771A2 (en) 2017-04-26 2018-11-01 Jensen Joern System for identification
KR102331150B1 (en) * 2021-03-12 2021-12-01 주식회사 위즈브레인 complex command and control equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101118679B1 (en) * 2011-07-07 2012-03-06 현대통신 주식회사 Method for controlling access using near field communication

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018199771A2 (en) 2017-04-26 2018-11-01 Jensen Joern System for identification
NO343179B1 (en) * 2017-04-26 2018-11-26 Jensen Joern System for identification
KR102331150B1 (en) * 2021-03-12 2021-12-01 주식회사 위즈브레인 complex command and control equipment
KR102337151B1 (en) * 2021-03-12 2021-12-09 주식회사 위즈브레인 integrated server that performs complex command and control over external servers

Also Published As

Publication number Publication date
KR101742204B1 (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US11195392B2 (en) Gateway-based anti-theft security system and method
US9836899B2 (en) Systems and methods for programming a credential reader
CN106163887B (en) Electronic key device, the system and method for wireless control and control authority transmission can be carried out to locking system
JP5241062B2 (en) How to transfer information between two-way objects
EP2672655B1 (en) Electronic key registration system
US20190385392A1 (en) Digital door lock having unique master key and method of operating the digital door
JP7343740B2 (en) One-way key fob and vehicle pairing authentication, retention, and deactivation
WO2013114972A1 (en) Electronic-key registration method and electronic-key registration system
CN103580853A (en) Mobile electronic device
JP2011511350A (en) Access control management method and apparatus
CN103310518A (en) Method and system for opening vehicle door
JP2018010449A (en) Smart lock authentication system and method in smart lock
CN109410405A (en) Access control management method, gate inhibition's unlocking method and entrance guard management system for unlocking
KR101742204B1 (en) Security system and security settings cancel method using the reader box
KR101599055B1 (en) a locking control apparatus using a password
WO2015064431A1 (en) Control device and control method which use authentication device
KR101664888B1 (en) Method for Authentication between Controller and User Terminal through Near Field Communication
CN112041525A (en) Key information generation system and key information generation method
US10354463B2 (en) Systems and methods for secure authentication for access control, home control, and alarm systems
KR101502142B1 (en) Near field communication terminal and security method thereof
US20190171434A1 (en) Systems and methods for programming a credential reader
TW201623762A (en) Multiple regulation electronic lock control system and method of wirelessly transmitting keys
KR101450135B1 (en) System and method for releasing lock by mobile phone
JP6616179B2 (en) Electronic key system
KR101663903B1 (en) Enclosure Box

Legal Events

Date Code Title Description
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant