WO2018235975A1 - Dispositif terminal et procédé de commande à distance pour celui-ci - Google Patents

Dispositif terminal et procédé de commande à distance pour celui-ci Download PDF

Info

Publication number
WO2018235975A1
WO2018235975A1 PCT/KR2017/006615 KR2017006615W WO2018235975A1 WO 2018235975 A1 WO2018235975 A1 WO 2018235975A1 KR 2017006615 W KR2017006615 W KR 2017006615W WO 2018235975 A1 WO2018235975 A1 WO 2018235975A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
image
received
authentication
string
Prior art date
Application number
PCT/KR2017/006615
Other languages
English (en)
Korean (ko)
Inventor
조민환
Original Assignee
조민환
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 조민환 filed Critical 조민환
Priority to PCT/KR2017/006615 priority Critical patent/WO2018235975A1/fr
Publication of WO2018235975A1 publication Critical patent/WO2018235975A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Definitions

  • the present invention relates to a terminal device for preventing the leakage of personal information and preventing the recovery of a lost terminal device by remotely controlling a lost terminal device such as a smart phone using a terminal device such as another smart phone And a remote control method thereof.
  • a terminal device called a smart phone is an integrated device of data communication function such as internet connection to a mobile phone function. Unlike a conventional mobile phone which was released as a finished product and used only predetermined functions, a terminal device It is a terminal device that has spread widely throughout the world because it can be installed, added or deleted as desired by users, which is a great advantage over existing mobile phones. These smartphones have greatly changed the paradigm of our everyday life by allowing us to work in the personal computer in the palm of my hand.
  • smart phone stores personal information such as phone book, official certificate, password, etc., so that if it is lost, it can cause financial damages as well as secondary damage caused by leakage of personal information. There is a problem.
  • an object of the present invention is to provide a terminal device and a remote control method thereof that can remotely control a smartphone or the like that has been lost or the like.
  • a terminal device and a remote control method thereof that can prevent personal information or privacy information from being exposed to the outside through such remote control are provided.
  • the present invention also provides a terminal device and a remote control method thereof that can block an unauthorized access of a third party while performing authentication of a person simply through transmission of a character string, face, or ear photo.
  • the present invention provides a method for a terminal device, comprising: receiving a string and an image from a second terminal device; Confirming whether the first terminal device has a portion of the received character string matching the first authentication string from the second terminal device; Confirming whether the image received from the second terminal device by the first terminal device matches the authentication image of the user; When the character string received from the second terminal device coincides with the identity verification string and the image received from the second terminal device matches the authentication image of the user, Confirming whether or not there is a portion of the received string that coincides with a predetermined command; And a step in which the first terminal device performs a function for the predetermined command if there is a portion of the character string received from the second terminal device that matches the predetermined command word,
  • the remote control method of the present invention comprising: receiving a string and an image from a second terminal device; Confirming whether the first terminal device has a portion of the received character string matching the first authentication string from the second terminal device; Confirming whether the image received from the second terminal device
  • the present invention also provides a method for a terminal device, comprising: receiving a character string and an image from a second terminal device; Confirming whether the first terminal device manipulates the image received from the second terminal device; When it is confirmed that the image received from the second terminal device is not operated, whether the first terminal device matches a portion of the character string received from the second terminal device matching the principal authentication string step; Confirming whether the image received from the second terminal device by the first terminal device matches the authentication image of the user when it is confirmed that the image received from the second terminal device is not operated; When the character string received from the second terminal device coincides with the identity verification string and the image received from the second terminal device matches the authentication image of the user, Confirming whether or not there is a portion of the received string that coincides with a predetermined command; And a step in which the first terminal device performs a function for the predetermined command if there is a portion of the character string received from the second terminal device that matches the predetermined command word,
  • the remote control method of the present invention comprising: receiving
  • the step of confirming whether or not the image of the image received by the first terminal device from the second terminal device is operated may include storing the time at which the first terminal device received the character string from the second terminal device as a first time ; Storing the time when the first terminal device received the image from the second terminal device as a second time; And when the time difference between the first time and the second time is equal to or greater than a predetermined time difference, the first terminal device determines that the image received from the second terminal device has been operated A remote control method of a terminal apparatus is provided.
  • the step of confirming whether or not the image of the image received from the second terminal device by the first terminal device is manipulated may include the step of capturing the image taken at the image capturing time, Acquiring the time of day; Confirming whether or not the first terminal device coincides with the shooting time, the generation time, and the modified time; Wherein the first terminal device determines that the image received from the second terminal device is operated when the shooting time, the generation time, and the modified time do not match with each other A remote control method of the terminal device is provided.
  • the step of confirming whether or not the image of the image received from the second terminal device by the first terminal device is operated may include the steps of: confirming the location information of the image received from the second terminal device by the first terminal device; And the first terminal device determines that the image received from the second terminal device has been operated when location information is not confirmed in the image received from the second terminal device A remote control method of the terminal device is provided.
  • the method may further include the step of the first terminal acquiring the identification information of the second terminal device before the first terminal device receives the character string and the image from the second terminal device. And provides a remote control method of the apparatus.
  • the step of the first terminal device performing the function for the pre-set command may include: if the first terminal device performs a function for the pre-set command, if the first character string received from the second terminal device matches a portion of the pre- And executes only when the second terminal device confirms the identification information of the second terminal device and the terminal device is authorized to perform the predetermined command.
  • the first terminal device If there is a portion of the character string received from the second terminal device that coincides with the predetermined command word, after the first terminal device executes the function for the predetermined command word, the first terminal device And transmitting an execution result of the function for the predetermined command to the second terminal device.
  • the step of confirming whether or not the image received from the first terminal device by the first terminal device matches the authentication image of the first terminal device may further include checking whether the image received from the second terminal device Performing image correction including the image correction; Extracting a feature point of the image received by the first terminal device from the second terminal device and calculating a correlation between the feature points; Confirming whether a correlation between minutiae points of the image received by the first terminal device from the second terminal device is matched with a correlation between minutiae points of the authentication image of the principal; When the correlation between the minutiae points of the image received from the second terminal device is matched with the correlation between the minutiae points of the first authentication image,
  • the remote control method comprising the steps of: receiving a remote control signal from the terminal device;
  • the remote control method comprising the steps of: receiving a remote control signal from the terminal device;
  • the present invention provides a remote control method of a terminal device, wherein the authentication image is a face photograph of the owner of the first terminal device or a photograph of the user's ear.
  • the authentication string may include at least one of a unique character and a number that can be known only to the owner, such as the name of the owner of the first terminal device, a date of birth, a day to memorize, a password, a memory location, a resident registration number,
  • a unique character such as the name of the owner of the first terminal device, a date of birth, a day to memorize, a password, a memory location, a resident registration number.
  • the predetermined command may be a command for performing a screen locking of the first terminal device, a personal information deletion execution, an application deletion execution, a device initialization execution, a character notification function execution, a voice notification function execution, a phone book e- a backup function, a camera photographing function, a light-emitting sound sending function, and a position information transmission function.
  • the present invention provides a remote control method for a terminal device, wherein the identification information is a telephone number.
  • the present invention provides a remote control method for a terminal device, wherein the first terminal device is a smartphone.
  • the present invention provides a remote control method for a terminal device, wherein the second terminal device is a smart phone.
  • the step of confirming whether or not the image of the image received from the second terminal device is manipulated by the first terminal device is confirmed by using an exchanged image file format (exif) of the received image And a remote control method of the terminal device.
  • the present invention provides a method of authenticating a user, comprising: a personal authentication string storing module for storing a personal authentication string; An authentication image storage module for storing the authentication image; A command storage module for storing a predetermined command; A receiving module that receives information including at least one of a character string, an image, identification information, a principal authentication string, and a principal authentication image; An authentication string verifying module for verifying whether or not there is a portion of the character string received by the receiving module that matches the user authentication string stored in the user authentication string storage module; An authentication image verification module for verifying whether the image received by the reception module matches the authentication image stored in the authentication image storage module; A command check module for checking whether or not a part of the string received by the receiving module matches a predetermined command stored in the command storage module when it is determined that the authentication string verifying module matches the authentication verification image verification module; And a command execution module that calls and executes a predetermined command from the command storage module when it is determined that the command check module matches.
  • the present invention further provides an image manipulation confirmation module for confirming whether or not an image received by the reception module has been manipulated.
  • the terminal device may further include a transmission module for transmitting the result of execution of the command by the command execution module to the outside.
  • the apparatus may further include an identification information acquisition module that stores identification information received by the reception module, and a permission setting storage module that stores predetermined command execution permission information according to the identification information acquired by the identification information acquisition module, And a terminal device.
  • the present invention provides a method comprising: confirming that a collection confirmation button is selected by a first terminal device; When the first confirmation button of the first terminal device is selected, the first terminal device confirms the identification information of the second terminal device that has executed the predetermined command, and the second terminal device can perform the predetermined command And removing the authority of the terminal device from the terminal device.
  • the step of extracting and storing the feature points in the binarization confirmation image by the first terminal device may include the steps of: the first terminal device performing image correction including illumination adjustment of the authentication image; And the first terminal extracts minutiae points of the authentication image of the user and calculates and stores a correlation between the minutiae points, thereby providing a remote control method of the terminal device.
  • a method of transmitting a character string comprising: transmitting a string and an image to a first terminal device; And receiving the execution result of the function for the predetermined command from the first terminal device by the second terminal device.
  • the present invention provides a remote control method for a terminal device, wherein the identification information is a telephone number.
  • the terminal device of the present invention and its remote control method have the following effects.
  • the terminal device of the lost smartphone is remotely controlled by using the terminal device of the smartphone of another person, thereby preventing leakage of personal information or privacy information.
  • a lost smartphone can be remotely controlled by simply transmitting a string and an image without installing a separate program or application on a phone owned by another person.
  • a separate program is not installed, it is possible to minimize a sense of rejection of a person who lends a terminal device such as a smart phone.
  • the remote control process can be easily performed without excessive effort for remembering the password have.
  • the terminal device can be remotely controlled without a procedure such as pre-registration, because the terminal device requiring remote control is controlled for a reason such as loss or the like directly from a third party terminal device without a separate application or server. Therefore, it is highly utilized in an emergency situation and the system is also designed to be simple.
  • the identification information of the terminal device transmitting the character string and the image can be grasped, and the function that can be performed for each terminal device can be differentiated, so that it is possible to effectively prevent remote control from being attempted unauthorized after the retrieval.
  • the remotely controlled result is transmitted to the terminal device that has transmitted the character string and the image again or the terminal device already set in the first terminal device by using e-mail or text, so that whether the remote control is normally performed can be confirmed in real time Can be confirmed.
  • the remote control of the terminal device is allowed only after the confirmation process of the authentication string of the user and the verification of the authentication image of the user is performed before the operation of checking the image is performed for the tenth time, But it can provide complete security functions.
  • FIG. 1 is a view showing a terminal device called a smart phone.
  • FIG. 2 is a diagram showing an example of a situation where a terminal device such as a smart phone is lost.
  • FIG. 3 is a view schematically showing a conventional technology for synchronizing and storing personal information such as a phone number or a photograph stored in a smart phone or the like.
  • FIG. 4 is a schematic view illustrating a process of controlling a user terminal device using a terminal device of a third party in a terminal device and a remote control method thereof according to the present invention.
  • FIG. 5 is a view showing a photograph of a face of a person himself / herself in order to perform authentication for remotely controlling a lost terminal or the like in the terminal device and the remote control method of the present invention.
  • FIG. 6 is a diagram showing a screen for remotely controlling a terminal device using a terminal device of a third party.
  • FIG. 7 is a diagram illustrating a process of confirming whether or not the user is using a face photograph in a terminal device and a remote control method thereof according to the present invention.
  • FIG. 8 is a diagram illustrating a process of extracting a feature point from a face photograph and checking whether the user is a person in the terminal device and the remote control method thereof according to the present invention.
  • FIG. 9 is a diagram showing a process of authenticating the user using his / her photograph as the authentication image of the user.
  • FIG. 10 is a view showing a process of extracting minutiae from the photograph of the user and authenticating the user as the authenticated image of the user.
  • FIG. 11 is a flowchart showing a remote control method of a terminal device according to the present invention in a flowchart.
  • FIG. 12 is a diagram illustrating a first example of confirming whether or not an image received is manipulated in a terminal device and a remote control method thereof according to the present invention.
  • FIG. 13 is a diagram illustrating a second example of confirming whether or not the received image is manipulated in the terminal device and the remote control method thereof according to the present invention.
  • FIG. 14 is a view showing a time tag table of metadata used for confirming whether or not the received image is manipulated by the terminal device and its remote control method according to the present invention.
  • FIG. 15 is a diagram illustrating a third example of confirming whether or not the received image is operated in the terminal device and the remote control method thereof according to the present invention.
  • FIG. 16 is a diagram showing metadata including location information used by a terminal apparatus and a remote control method of the present invention to confirm whether or not the received image is manipulated.
  • FIG. 17 is a flowchart showing a process of checking whether or not an image received in the terminal device and its control method according to the present invention matches the authentication image of the user.
  • FIG. 18 is a flowchart illustrating a process of controlling a remote control right of a terminal device that transmits a character string and an image when a lost terminal device is retrieved in the terminal device and the remote control method thereof according to the present invention.
  • FIG. 19 is a flowchart illustrating a process of a user inputting a user authentication string and a user authentication image in a terminal device of the present invention and a remote control method thereof.
  • FIG. 20 is a flowchart illustrating a process of receiving an execution result of a terminal device or a terminal device that has transmitted a character string and an image to a terminal device that has been lost in the terminal device or the remote control method of the present invention, Fig.
  • FIG. 21 is a block diagram showing an internal configuration of a terminal device according to the present invention.
  • FIG. 22 is a diagram showing an example of functions performed in accordance with a predetermined command when the authentication string of the user and the authentication image of the user are matched in the terminal device of the present invention and the first terminal device of the remote control method thereof.
  • FIG. 1 is a view showing a terminal device called a smart phone.
  • the smartphone 10 is an intelligent terminal that adds a computer support function such as internet communication and information search to a mobile phone, and can install and use an application desired by the user.
  • the number of users of the smartphone 10 has increased exponentially due to its high scalability and the work using the smartphone 10 is also limited to the initial text, fax, e-mail, Such as stock trading, money transfer, and bank account establishment, and the amount of personal information stored in the smartphone 10 is gradually increasing.
  • FIG. 2 is a view showing an example of a situation in which a terminal device such as a smart phone is lost.
  • FIG. 2 shows an example of such a lost situation.
  • the smart phone 10 is removed from a taxi, (10) flows out and is lost.
  • smartphones (10) are being lost in various situations such as places to shop and restrooms.
  • the loss is only 30 billion dollars It is reported to reach. This is also the case in Korea, and it is reported that about 2.5 million smartphones (10) are lost annually.
  • the number of thefts is increasing every year in order to sell smart phones 10 to overseas.
  • FIG. 3 is a view schematically showing a conventional technology for synchronizing and storing personal information such as a phone number or a photograph stored in a smart phone or the like.
  • the loss of the smartphone 10 causes a lot of stress to the lost person due to various information stored therein.
  • a synchronization technology for synchronously storing personal information such as a phone number or a photograph stored in a smart phone, a computer, or a tablet PC owned by an individual has been used.
  • FIG. 4 is a schematic view illustrating a process of controlling a user terminal device using a terminal device of a third party in a terminal device and a remote control method thereof according to the present invention.
  • the term terminal refers to a broad concept including a device such as a smart phone, a tablet PC, and the like.
  • the terminal includes a telephone number, It should be noted that any device can be included in the concept of the terminal device of the present invention regardless of the term.
  • a terminal device such as a smart phone to be remote controlled as a terminal device of the owner lost in the description of the present invention is referred to as a first terminal device 100
  • a terminal device such as a smart phone that plays a role of remotely controlling the first terminal device 100 by transmitting the principal authentication string and the principal authentication image in order to lock the screen of the terminal 100, 2 terminal apparatus 200 as shown in FIG.
  • the second terminal device 200 does not need to store the identification information in advance in the first terminal device 100, but in order to execute some functions such as deletion, As shown in FIG.
  • the owner of the first terminal device 100 to which the present invention is applied can borrow the second terminal device 200 from a third party .
  • the second terminal device 200 may be a smart phone, but it is not limited thereto, and it is not limited to a type of a feature phone, a tablet PC, or the like, provided that it is a device capable of transferring a character or a photograph.
  • the owner of the first terminal device 100 can transmit a character string and an image to the first terminal device 100 using the second terminal device 200 owned by a third party,
  • the first terminal device 100 analyzes the received character string and image and confirms that the character string is an image sent from the owner of the first terminal device 100
  • the first terminal device 100 can perform a function according to a predetermined command included in the character string .
  • a predetermined command included in the transmitted string is a location information transmission command of the first terminal device 100
  • GPS Global Positioning System
  • the terminal device and the remote control method thereof according to the present invention perform authentication of the first terminal device 100 by simply transmitting a character string and an image without installing any program or application in the second terminal device 200 owned by another person, It is possible to achieve the effect of maximizing the convenience in terms of controllability.
  • FIG. 5 is a view showing a photograph of a face of a person himself / herself in order to perform authentication for remotely controlling a lost terminal or the like in the terminal device and the remote control method of the present invention.
  • the owner of the first terminal device 100 uses the second terminal device 200 owned by the third person You can take pictures of your face.
  • the face photograph may be a photograph showing both ears like passport photographs.
  • the terminal device and the remote control method of the present invention have the effect of blocking the unauthorized access of the third party even more while allowing the remote access to the terminal device by utilizing the face photograph as the authentication image of the user.
  • FIG. 6 is a diagram showing a screen for remotely controlling a terminal device using a terminal device of a third party.
  • the second terminal device 200 owned by the third person is used So that an image such as a face photograph of the user can be transmitted along with a character string as shown in the drawing.
  • the transmitted string may include a predetermined command for performing a function of the first terminal device 100, together with a character string matching the authentication string set in the first terminal device 100.
  • a character string matching the authentication string set in the first terminal device 100 For example, " John Smith “, “ 010-9999-0000 " may be a part of a string for authentication, and " lock " may be a part of a command for performing functions of the first terminal device 100.
  • an image is shown as being transmitted after a character string is transmitted, but is not limited thereto, and may be transmitted before transmission of a character string.
  • the first terminal device 100 receiving the character string and the image from the second terminal device 200 performs the user authentication process using the received character string and the image, performs the requested function when it is determined that the user is the user, The result can be transmitted to the second terminal device 200 as " the lock function is set " as shown in the figure.
  • the terminal device and the remote control method of the present invention it is possible to easily and remotely control the terminal device by simply transferring characters and images, and to perform authentication of the terminal device by duplicating the identity of the terminal device It is possible to prevent the lost smartphone from being abnormally controlled by the third party who does not have the third party.
  • FIG. 7 and 8 are views showing a process of confirming whether or not the user is a person using a face photograph in a terminal device and a remote control method thereof according to the present invention.
  • a terminal device and a remote control method thereof according to the present invention can use a face photograph as an authenticated image of the user.
  • a face photograph may be a photograph of a face photographed by exposing the ears for recognition accuracy.
  • the method of recognizing received face photographs can be applied by using various techniques.
  • the terminal device and its remote control method of the present invention typically separates only the face region from the received image, , Jaw lines, and the like, and then the correlation between the extracted feature points is calculated and stored as numerical data, thereby recognizing the face. That is, the first terminal device 100 can acquire data on the minutiae from the received facial photograph, and compare the data with the data of the authentication image stored in the first terminal device 100, thereby confirming whether or not the user is authentic.
  • 9 and 10 illustrate a process of authenticating the user using his / her photograph as the authentication image of the user.
  • the terminal device and the remote control method of the present invention can confirm whether or not the user is using the ear photograph together with the face photograph in the process of confirming or authenticating the user.
  • Such ear photograph can be used alone or in combination with the face photograph.
  • the process of confirming the user's identity by using the user's area can be performed through a process similar to the face recognition process described above.
  • the first terminal device 100 may receive an image of the ear canal portion of the ear canal that collects sound waves and enters the ear canal, and extracts feature points in the ear canal from the image . Then, it is possible to acquire distances and angles between the minutiae points and confirm whether or not such data matches the authentication image stored in the first terminal device 100.
  • the terminal device and the remote control method according to the present invention can achieve a much stronger effect of the strong authentication process by utilizing such ear photographs.
  • FIG. 11 is a flowchart showing a remote control method of a terminal device according to the present invention in a flowchart.
  • the first terminal device 100 may receive a character string and an image from the second terminal device 200 (S11-2). At the same time or at the same time as this process, the first terminal device 100 It is possible to perform the process of acquiring the identification information including the telephone number of the second terminal device 200. (S11-1)
  • the first terminal device 100 can first confirm whether the received image has been operated (S11-3), and if the second terminal device 200 It is possible to check whether or not there is a portion of the next received character string that matches the personal identification string previously stored in the first terminal device 100. If the image received from the first terminal device 100 is not operated, -4)
  • the personal identification string used here can be stored as a personal identification string that is easy for the owner of the first terminal device 100 to memorize. Examples of the personal identification string include the owner's name, birth date, memorized day, Address, and so on.
  • the first terminal device 100 confirms whether the received image matches the photograph of the face, (S11-5). If the received image matches the authentication image of the user, it is determined whether or not there is a portion of the received string that matches the predetermined command for remotely controlling the first terminal device 100 (S11-6). When it is determined that there is a portion that matches the predetermined command in this process, the first terminal device 100 confirms the identification information of the second terminal device 200, (S11-7).
  • the second terminal device 200 is a terminal device capable of executing a command requested by the second terminal device 200, It is possible to execute the functions of the set command and performs a process for transmitting the execution result to the (S11-8), the second terminal device (200). (S11-9)
  • the first terminal device 100 acquires identification information such as the telephone number of the second terminal device 200 and confirms whether or not it is authorized to perform a predetermined command The reason is as follows.
  • the predefined commands to be executed by the first terminal device 100 include a screen locking operation, a personal information deletion operation, an application deletion execution, a device initialization operation, a character notification function execution, a voice notification function execution, Execution of a camera function, execution of a light emitting sound function, execution of a position information transmission function, and the like.
  • a screen locking operation a personal information deletion operation
  • an application deletion execution a device initialization operation
  • a character notification function execution e.g., a voice notification function execution
  • Execution of a camera function e.g., a light emitting sound function
  • execution of a position information transmission function e.g., a position information transmission function, and the like.
  • the terminal device and the remote control method thereof according to the present invention may allow a predetermined command to be executed by setting a difference in authority according to the identification information of the second terminal device 200.
  • functions such as device initialization and personal information deletion may be performed only by the second terminal device 200 belonging to the family, and the second terminal device 200 owned by the friend may be set to perform only the screen lock function .
  • the reason why the terminal apparatus and the remote control method according to the present invention grant execution authority to a predetermined command based on the identification information is as follows.
  • the owner of the first terminal device 100 borrows the second terminal device 200 from the third party and the first terminal device 100 can not access the first terminal device 100, A remote lock function, and a camera shooting function can be performed. Even after the first terminal devices 100 have been recovered by performing such a function, the owner of the second terminal device 200 can use the character string and the image stored in the second terminal device 200, There may occur a case where the device 100 is to be remotely controlled unauthorized.
  • the terminal device and its remote control method according to the present invention have a function of checking whether or not an image is manipulated to be examined to prevent such a case, and to prevent the image from being manipulated in detail. In order to further prevent such an approach, The authority of the second terminal device 200 may be lowered after the first terminal device 100 is recovered, thereby enhancing the blocking effect on illegal access and execution.
  • FIG. 12 is a diagram illustrating a first example of confirming whether or not an image received is manipulated in a terminal device and a remote control method thereof according to the present invention.
  • the first terminal device 100 stores the time at which the character string is received from the second terminal device 200 as a first time (S12-2), and stores a new image received from the second terminal device 200 (S12-2). Next, it can be checked whether or not the time difference between the first time and the second time stored is equal to or greater than a preset time difference (S12-3 If it is determined that the time difference between the first time and the second time is longer than the preset time difference, it is determined that the image received from the second terminal device 200 has been operated (S12-4) So that the first terminal device 100 does not perform its function.
  • the second terminal device 200 may refuse the authentication of the character string and the image transmitted by the second terminal device 200 and may not perform the function corresponding to the predetermined command.
  • FIG. 13 is a diagram illustrating a second example of confirming whether or not the received image is manipulated in the terminal device and the remote control method thereof according to the present invention.
  • the first terminal device 100 of the terminal device and the remote control method of the present invention can confirm whether the received image is manipulated by using the time information obtained from the meta data of the received image.
  • the first terminal device 100 may acquire the shooting time, the generation time, and the modified time of the received image (S13-1). Then, the acquired shooting time, the generation time, (S13-2). If the acquired photographing time, the generation time, and the corrected time do not coincide with each other, it can be determined that the image has been manipulated. (S13-3 )
  • the photographing time, creation time, and corrected time stored in the metadata of the photograph coincide with each other. , It is determined that the received image has been manipulated since the possibility that the received image has been manipulated is large.
  • FIG. 14 is a view showing a time tag table of metadata used for confirming whether or not the received image is manipulated by the terminal device and its remote control method according to the present invention.
  • Metadata refers to data describing other data as structured data about the data.
  • the metadata stored together with the photographs includes information such as the time, position, camera type, aperture speed, etc., Data provided.
  • the Exif metadata includes a thumbnail image, GPS information, photographing environment information, and time information as shown in the drawing.
  • the terminal device and the remote control method of the present invention can confirm whether or not the photograph is manipulated by checking such tags of Exif metadata. It should be noted, however, that this does not limit the use of other metadata.
  • FIG. 15 is a diagram illustrating a third example of confirming whether or not the received image is operated in the terminal device and the remote control method thereof according to the present invention.
  • the terminal device and its remote control method of the present invention can confirm whether or not the location information is present in the metadata by checking the metadata of the received image as another method of confirming whether the received image is operated (S15-1) (S15-2), it is judged that the image has been manipulated (S15-3). In other words, when copying or capturing is performed, The terminal device and the remote control method of the present invention do not check the value of the received image and judge that the image is an operated image. If the first terminal device 100 determines that the received character string To ignore the function of the pre-set command included in the command.
  • the method of confirming whether or not the image is manipulated as described above may be separately applied, but it may be applied in a cross check method in combination with other methods.
  • a cross check method By applying such a cross check method, the terminal device of the present invention and its remote control method can achieve the effect of confirming whether or not the user is authenticated easily and more reliably.
  • FIG. 16 is a diagram showing metadata including location information used by a terminal apparatus and a remote control method of the present invention to confirm whether or not the received image is manipulated.
  • the Exif metadata of the image normally photographed and transmitted through the second terminal device 200 contains a lot of location information as shown in the figure. However, the image captured or copied from the Internet stores no location information in the Exif metadata I do not. Accordingly, by confirming such information, the first terminal device 100 can confirm whether or not the image transmitted by the second terminal device 200 is manipulated.
  • FIG. 17 is a flowchart showing a process of checking whether or not an image received in the terminal device and its control method according to the present invention matches the authentication image of the user.
  • the first terminal device 100 When it is confirmed that the image received by the first terminal device 100 is not an operated image, the first terminal device 100 performs an image correction process including illumination adjustment for smooth analysis of the received image (S17-1). Then, the feature points of the received image are extracted, and the correlation between the feature points is computed (S17-2). Then, (S17-3). When the correlation between the minutiae points of the received image and the minutiae points of the authentication image of the user coincide with each other, The terminal device 100 determines that the received image matches the authentication image of the user (S17-4). Then, the first terminal device 100 performs the function according to the preset command You can go through the process.
  • the terminal device and the remote control method of the present invention permit the remote control of the terminal device after the duplicate verification procedure is performed after the verification of the authentication string of the user and the authentication image of the user even after the operation of the image is confirmed, It is possible to provide a simple remote control function and a perfect security function.
  • FIG. 18 is a flowchart illustrating a process of controlling a remote control right of a terminal device that transmits a character string and an image when a lost terminal device is retrieved in the terminal device and the remote control method thereof according to the present invention.
  • the owner may remotely control the first terminal device 100 for reasons such as a loss or the like by selecting the recovery confirmation button of the first terminal device 100 in step S18-1, The process of remotely controlling the first terminal device 100 can be terminated.
  • the first terminal device 100 transmits a character string and an image to remotely control the first terminal device 100, (Step S18-2). Then, by removing the execution authority for the predetermined command of the corresponding second terminal devices 200 (S18-3), the owner of the first terminal device 100 You can prevent unauthorized access by a third party other than yourself.
  • this function can be modified through the setting change of the first terminal device. In this case, the existing second terminal device 200 storing the identification information by performing the remote control of the first terminal device 100 is also continuously 1 terminal device 100 can be changed.
  • FIG. 19 is a flowchart illustrating a process of a user inputting a user authentication string and a user authentication image in a terminal device of the present invention and a remote control method thereof.
  • the personal identification string stored in the first terminal device 100 includes at least one of the name, date of birth, date of memorization, password, memory location, resident registration number, and address of the owner of the first terminal device 100
  • the terminal device of the present invention and its remote control method can prevent an excessive effort to think about a specific password to implement the function of the present invention.
  • FIG. 20 is a flowchart illustrating a process of receiving an execution result of a terminal device or a terminal device that has transmitted a character string and an image to a terminal device that has been lost in the terminal device or the remote control method of the present invention, Fig.
  • the second terminal device 200 transmits a character string and an image to remotely control the first terminal device 100 in step S20-1, If there is a part of the transmitted string that matches the authentication string of the user and the transmitted image matches the authentication image of the user, the function according to the previously set command contained in the received string is performed, To the terminal device that is preset in the first terminal device 100 to receive the execution result of the second terminal device 200 by a method such as a character. Then, the second terminal device 200 or the previously set terminal device can receive the execution result and display it through the display unit of the second terminal device 200.
  • the terminal device receiving the remote control result from the device 100 may be the same terminal device as the terminal device that transmitted the authentication string of the user and the authentication image for remote control, And may be a terminal device in which the first terminal device 100 stores the information.
  • the terminal device and the remote control method of the present invention can confirm in real time whether or not the first terminal device 100 using the second terminal device 200 is normally controlled.
  • FIG. 21 is a block diagram showing an internal configuration of a terminal device according to the present invention.
  • the first terminal device 100 of the terminal device and the remote control method of the present invention includes a receiving module 111, a user authentication string storage module 142, a user authentication image storage module 143, a command storage module 145, An authentication string verification module 121, a user authentication image verification module 122, an instruction verification module 131, and a command execution module 132. In addition, it may further include an image manipulation confirmation module 123, a transmission module 112, an identification information acquisition storage module 141, and a rights setting storage module 144.
  • the first terminal device 100 may be a physical device, or may be a program such as an application that is stored and operated on a physical device.
  • the module constituting the first terminal device 100 may be a physically realized component or the like, but is not limited thereto and may be a module functionally programmed.
  • the authentication authentication character string storage module 142 may be a part for storing a user authentication character string such as the name and the resident registration number of the owner of the first terminal device 100, It may be a module that numerically stores the correlation between the feature point extracted from the face of the owner of the terminal device 100 or the ear photograph and the feature point.
  • the command storage module 145 may store instructions for a function that can be performed remotely from the first terminal device 100.
  • the receiving module 111 of the first terminal device 100 may be a part for receiving and distributing the character string, the image, the identification information, the user authentication string, and the authentication image of the user.
  • the personal identification string confirmation module 121 of the first terminal device 100 determines whether or not there is a portion of the character string received from the second terminal device 200 that matches the personal identification string stored in the personal identification character string storage module 142 It can play a role of checking.
  • the authentication image verification module 122 analyzes the image received from the reception module 111 and matches the authentication image stored in the authentication image storage module 143 Whether or not it is possible to perform the role of checking.
  • the authentication image verification module 122 determines that the received authentication image matches the received authentication image and that there is a portion of the character string received by the authentication character string verification module 121 that matches the authentication character string, It checks whether or not there is a part of the string received through the reception module 111 that matches the previously set command stored in the command storage module 145.
  • the command execution module 132 executes a function according to a predetermined command from the command storage module 145 and transmits the result to the external device such as the second terminal device 200 through the transmission module 112. [ As shown in FIG.
  • the image operation confirmation module 123 can check whether or not the received image has been manipulated through an algorithm for checking whether or not the image manipulation has been performed, To the image confirmation module 122.
  • the identification information acquisition and storage module 141 of the first terminal device 100 stores the identification information received from the reception module 111, May be stored in the storage module 144.
  • the terminal device and its remote control method according to the present invention can perform a desired function such as screen locking and device initialization to a terminal device that has been lost or the like by simply receiving a character string and an image, And ensure that the equipment is recovered early.
  • FIG. 22 is a diagram showing an example of functions performed in accordance with a predetermined command when the authentication string of the user and the authentication image of the user are matched in the terminal device of the present invention and the first terminal device of the remote control method thereof.
  • the drawing shows a state in which a text notification is displayed on the screen by receiving a command for executing a text notification function from the second terminal device 200 among various functions that the first terminal device 100 can execute.
  • the character notification is displayed on the screen, the person who currently holds the lost first terminal device 100 can communicate with the displayed number in the text notification window and can securely transmit the first terminal device 100.
  • the first terminal device 100 executes a voice notification function, a vibration function, a photographing function, a light-emitting sound function, and the like, repeatedly indicating that the terminal device is lost,
  • the terminal device of the present invention and its remote control method are capable of detecting the recovery rate of the first terminal device 100 which has been lost due to loss or the like .
  • the location of the first terminal device 100, the built-in phone number, and the like are transmitted to the second terminal device 200 or the previously stored terminal device by e-mail or text, It is possible to prevent personal information from being leaked to the outside by performing the initialization function or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

La présente invention concerne un dispositif terminal et un procédé de commande pour celui-ci et, plus spécifiquement, est caractérisé en ce qu'une fonction, telle que le verrouillage d'écran, la suppression d'informations personnelles, l'initialisation ou l'assistance de collecte, d'un dispositif terminal perdu ou dans une situation similaire peut être commandé simplement en utilisant un dispositif terminal tel qu'un téléphone intelligent appartenant à un tiers pour transmettre une chaîne de caractères et une image lorsqu'il est nécessaire de commander à distance un dispositif terminal tel qu'un téléphone intelligent en raison de la perte ou d'une situation similaire.
PCT/KR2017/006615 2017-06-22 2017-06-22 Dispositif terminal et procédé de commande à distance pour celui-ci WO2018235975A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/KR2017/006615 WO2018235975A1 (fr) 2017-06-22 2017-06-22 Dispositif terminal et procédé de commande à distance pour celui-ci

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/KR2017/006615 WO2018235975A1 (fr) 2017-06-22 2017-06-22 Dispositif terminal et procédé de commande à distance pour celui-ci

Publications (1)

Publication Number Publication Date
WO2018235975A1 true WO2018235975A1 (fr) 2018-12-27

Family

ID=64737729

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2017/006615 WO2018235975A1 (fr) 2017-06-22 2017-06-22 Dispositif terminal et procédé de commande à distance pour celui-ci

Country Status (1)

Country Link
WO (1) WO2018235975A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004036802A1 (fr) * 2002-10-16 2004-04-29 Microsoft Corporation Identification de personne cryptographiquement sure
JP2006324800A (ja) * 2005-05-17 2006-11-30 Nec Corp 携帯端末の遠隔操作方法、遠隔制御方式及び携帯端末
KR20090123339A (ko) * 2008-05-27 2009-12-02 엘지전자 주식회사 휴대 단말기 및 그의 원격 제어 방법
KR20160026791A (ko) * 2014-08-28 2016-03-09 알란 터지 케빈 경로 파라미터들을 포함하는 안면 인식 인증 시스템
KR101713891B1 (ko) * 2016-01-08 2017-03-09 (주)모자이큐 부분 얼굴 인식을 이용한 사용자 인증 시스템 및 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004036802A1 (fr) * 2002-10-16 2004-04-29 Microsoft Corporation Identification de personne cryptographiquement sure
JP2006324800A (ja) * 2005-05-17 2006-11-30 Nec Corp 携帯端末の遠隔操作方法、遠隔制御方式及び携帯端末
KR20090123339A (ko) * 2008-05-27 2009-12-02 엘지전자 주식회사 휴대 단말기 및 그의 원격 제어 방법
KR20160026791A (ko) * 2014-08-28 2016-03-09 알란 터지 케빈 경로 파라미터들을 포함하는 안면 인식 인증 시스템
KR101713891B1 (ko) * 2016-01-08 2017-03-09 (주)모자이큐 부분 얼굴 인식을 이용한 사용자 인증 시스템 및 방법

Similar Documents

Publication Publication Date Title
WO2013069841A1 (fr) Appareil de verrouillage à sécurité renforcée utilisant une image de l'iris
WO2020036311A1 (fr) Procédé et dispositif destinés à la génération de contenu
WO2016129917A1 (fr) Terminal d'utilisateur et son procédé de production
WO2019182409A1 (fr) Dispositif électronique et son procédé d'authentification
EP1914961B1 (fr) Appareil de terminal mobile d informations
WO2015023109A1 (fr) Système de sécurité, appareil et procédé utilisant un code supplémentaire
WO2016006927A1 (fr) Dispositif corporel fixé à la main et à détection de port destiné à une reconnaissance de l'iris, ensemble de renforcement de sécurité l'utilisant, et son procédé de commande
WO2015199501A1 (fr) Procédé et système d'authentification d'utilisateur utilisant un clavier variable et une identification biométrique
WO2012118283A2 (fr) Système portable pour faire appliquer des règles en vigueur pour lutter contre des activités illégales et des violations de trafic
WO2015170797A1 (fr) Dispositif d'affichage et son procédé de commande
WO2015190796A1 (fr) Dispositif portatif s'attachant à la main, capable d'identification d'iris à l'intérieur et à l'extérieur
WO2018164363A1 (fr) Procédé de reconnaissance sans contact de parties du corps multiples et dispositif de reconnaissance de parties du corps multiples, utilisant des données biométriques multiples
WO2015056979A1 (fr) Carte de sécurité ayant une authentification d'empreinte digitale, système de traitement et procédé de traitement associés
WO2021040318A1 (fr) Procédé d'apprentissage distribué, serveur et application utilisant un modèle de reconnaissance de carte d'identification, et procédé de reconnaissance de carte d'identification mis en œuvre par ces derniers
WO2016006831A1 (fr) Serrure de porte mettant en oeuvre la reconnaissance de l'iris et système associé, terminal de communication mobile et passerelle de réseau mise en oeuvre dans ledit terminal, et procédé d'authentification d'utilisateur associé
WO2022098189A1 (fr) Système d'authentification d'identité utilisant des informations biométriques d'utilisateur
WO2020253131A1 (fr) Procédé, appareil et dispositif de paiement par carte bancaire, et support de stockage informatique
WO2020206899A1 (fr) Procédé, appareil et dispositif de vérification d'identité basée sur un horodatage, et support d'informations
WO2018076804A1 (fr) Procédé d'alarme de sécurité et système associé
WO2020222475A1 (fr) Procédé d'authentification de document et système d'authentification de document dans lequel une fonction d'authentification est améliorée par des informations d'historique d'interrogation et des informations d'authentification de document
WO2015152690A2 (fr) Appareil de contrôle d'accès et procédé utilisant la reconnaissance faciale
WO2017052240A1 (fr) Système de gestion de preuves par images dupliquées pour confirmation d'authenticité et d'intégrité
WO2022114290A1 (fr) Système d'authentification personnelle sans contact et procédé associé
EP3596645A1 (fr) Procédé et appareil permettant d'effectuer une authentification sur la base d'informations biométriques
WO2020222476A1 (fr) Système d'authentification de document et procédé d'authentification de document ayant une fonction d'authentification améliorée par notification d'historique d'interrogation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17914948

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17914948

Country of ref document: EP

Kind code of ref document: A1