AUTHENTICATION METHOD AND SYSTEM OF ELECTRONIC LOCKING DEVICE BASED ON USAGE PATTERN

20210012595 ยท 2021-01-14

    Inventors

    Cpc classification

    International classification

    Abstract

    Provided is an authentication method of an electronic locking device. The authentication method of an electronic locking device according to an exemplary embodiment of the present invention includes: collecting a usage history of locking and unlocking an electronic locking device using an electronic key; generating a usage pattern by analyzing the usage history; and performing authentication by applying an authentication level selected based on the usage pattern when the electronic locking device is locked and unlocked using the electronic key.

    Claims

    1. An authentication method of an electronic locking device, comprising: collecting a usage history of locking and unlocking an electronic locking device using an electronic key; generating a usage pattern by analyzing the usage history; and performing authentication by applying an authentication level selected based on the usage pattern when the electronic locking device is locked and unlocked using the electronic key.

    2. The authentication method of an electronic locking device of claim 1, wherein the generating of a usage pattern includes: analyzing the usage pattern using one or more of a usage time and a usage location included in the usage history.

    3. The authentication method of an electronic locking device of claim 2, wherein the analyzing of a usage pattern includes: calculating a normal distribution of the number of usages at every usage time using the number of locks at every usage time; and selecting the authentication level in accordance with an average and a standard deviation of the normal distribution.

    4. The authentication method of an electronic locking device of claim 2, wherein the analyzing of a usage pattern includes: calculating a normal distribution of the number of usages at every usage location using the number of locks at every location; and selecting the authentication level in accordance with an average and a standard deviation of the normal distribution.

    5. The authentication method of an electronic locking device of claim 3, wherein the selecting of an authentication level includes: selecting a first authentication level when the number of usages is equal to or larger than an average of the normal distribution1*standard deviation; selecting a second authentication level which is higher than the first authentication level when the number of usages is equal to or larger than an average of the normal distribution2*standard deviation and smaller than an average of the normal distribution1*standard deviation; and selecting a third authentication level which is higher than the second authentication level when the number of usages is equal to or larger than an average of the normal distribution3*standard deviation and smaller than an average of the normal distribution2*standard deviation.

    6. The authentication method of an electronic locking device of claim 2, wherein the analyzing of a usage pattern includes: clustering a usage history according to the location and the time; and applying different authentication levels according to the location and the time in a clustered cluster.

    7. The authentication method of an electronic locking device of claim 6, wherein the clustering of a usage history according to the location and the time includes: performing K-means clustering in accordance with the number of authentication levels.

    8. The authentication method of an electronic locking device of claim 6, wherein the applying of different authentication levels includes: applying an authentication level having a high security to a location and a time in the cluster as the number of usage histories in the cluster is smaller.

    9. An authentication system of an electronic locking device, comprising: a usage pattern analyzing device which analyzes a usage history to lock and unlock an electronic locking device using an electronic key, generates a usage pattern as a result of the analysis, and transmits the generated usage pattern to the electronic key; and an electronic key which collects the usage history to transmit the usage history to the usage pattern analyzing device, receives the usage pattern, and applies an authentication level selected based on the usage pattern to perform authentication.

    10. The authentication system of an electronic locking device of claim 9, wherein the usage pattern analyzing device includes: an accommodating unit which accommodates the electronic key; a charging unit which charges the electronic key when the electronic key is accommodated; a communication unit which receives a usage history from the electronic key and transmits a usage pattern generated based on the received usage history to the electronic key; and a learning unit which learns the usage pattern based on the received usage history.

    11. The authentication method of an electronic locking device of claim 4, wherein the selecting of an authentication level includes: selecting a first authentication level when the number of usages is equal to or larger than an average of the normal distribution1*standard deviation; selecting a second authentication level which is higher than the first authentication level when the number of usages is equal to or larger than an average of the normal distribution2*standard deviation and smaller than an average of the normal distribution1*standard deviation; and selecting a third authentication level which is higher than the second authentication level when the number of usages is equal to or larger than an average of the normal distribution3*standard deviation and smaller than an average of the normal distribution2*standard deviation.

    Description

    DESCRIPTION OF DRAWINGS

    [0029] FIG. 1 is a view for explaining an electronic locking device and an electronic key used in an exemplary embodiment of the present invention.

    [0030] FIG. 2 is a diagram of an authentication system of an electronic locking device based on a usage pattern according to an exemplary embodiment of the present invention.

    [0031] FIG. 3 is a flowchart of a signal of an authentication system of an electronic locking device based on a usage pattern according to an exemplary embodiment of the present invention.

    [0032] FIGS. 4 to 8 are views explaining an authentication method according to an exemplary embodiment of the present invention.

    [0033] FIG. 9 is a flowchart of an authentication method of an electronic locking device based on a usage pattern according to an exemplary embodiment of the present invention.

    [0034] FIG. 10 is a view for explaining a usage pattern analyzing device according to an exemplary embodiment of the present invention.

    BEST MODE

    [0035] Those skilled in the art may make various modifications to the present invention and the present invention may have various embodiments thereof, and thus specific embodiments will be illustrated in the drawings and described in detail in detailed description. However, this does not limit the present invention within specific exemplary embodiments, and it should be understood that the present invention covers all the modifications, equivalents and replacements within the spirit and technical scope of the present invention. In the description of respective drawings, similar reference numerals designate similar elements.

    [0036] Terms such as first, second, A, or B may be used to describe various components but the components are not limited by the above terms. The above terms are used only to discriminate one component from the other component. For example, without departing from the scope of the present invention, a first component may be referred to as a second component, and similarly, a second component may be referred to as a first component. A term of and/or includes a combination of a plurality of related elements or any one of the plurality of related elements.

    [0037] It should be understood that, when it is described that an element is coupled or connected to another element, the element may be directly coupled or directly connected to the other element or coupled or connected to the other element through a third element. In contrast, when it is described that an element is directly coupled or directly connected to another element, it should be understood that no element is present therebetween.

    [0038] Terms used in the present application are used only to describe a specific exemplary embodiment, but are not intended to limit the present invention. A singular form may include a plural form if there is no clearly opposite meaning in the context. In the present application, it should be understood that term include or have indicates that a feature, a number, a step, an operation, a component, a part or the combination those of described in the specification is present, but do not exclude a possibility of presence or addition of one or more other features, numbers, steps, operations, components, parts or combinations, in advance.

    [0039] If it is not contrarily defined, all terms used herein including technological or scientific terms have the same meaning as those generally understood by a person with ordinary skill in the art. Terms defined in generally used dictionary shall be construed that they have meanings matching those in the context of a related art, and shall not be construed in ideal or excessively formal meanings unless they are clearly defined in the present application.

    [0040] Hereinafter, exemplary embodiments according to the present invention will be described in detail with reference to accompanying drawings.

    [0041] FIG. 1 is a view for explaining an electronic locking device and an electronic key used in an exemplary embodiment of the present invention.

    [0042] Referring to FIG. 1, an electronic locking device 100 is illustrated as a pad lock and the electronic key 200 includes a power button and four key pads 260.

    [0043] However, this is just an example for easy understanding of the present invention and as the electronic locking device 100 used in the present invention, in addition to the pad lock, all locking devices used for a drawer, a cabinet, or a storage box, such as an Europrofile double, a rim lock, a drawer lock, and a cam lock may be used as illustrated in a lower portion of FIG. 1.

    [0044] The electronic locking device 100 does not have a separate power source and is temporally supplied with the power from a connecting terminal 210 of the electronic key 200, thereby unlocking the electronic locking device 100. In this case, the connecting terminal 110 of the electronic locking device 100 and the connecting terminal 210 of the electronic key 200 not only supply the power by physically contacting with each other, but also perform the primary authentication by exchanging identifiers UIDs.

    [0045] By doing this, the plurality of electronic locking devices 100 may be locked and unlocked with one electronic key 200. That is, in an internal memory of the electronic locking device 100, a list of identifiers of the electronic key 200 which locks and unlocks the electronic locking device is stored. Further, in an internal memory of the electronic key 200, a list of identifiers of the electronic locking devices 100 to be locked and unlocked by the electronic key 200 is stored. Therefore, the primary authentication may be performed by contacting the connecting terminals 110 and 210 with each other.

    [0046] Since the possession of the electronic key 200 is one of authentication, the higher security than an existing electronic locking device such as a door lock which simply inputs a password may be maintained. Specifically, since such a small electronic locking device has a small volume and needs to be installed in a plurality of locations, it is very effective that no power source is provided in the electronic locking device 100 but the power is supplied from the electronic key 200 to unlock the electronic locking device 100.

    [0047] In this case, in order to enhance the security, a secondary authentication unit may be added to the electronic key 200. In FIG. 1, four key pads 260 are attached to the electronic key 200 and the secondary authentication is performed by the key pad 260. For example, numbers such as 1, 2, 3, and 4 are printed on the key pad 260 and the secondary authentication may be performed by the combination of the numbers.

    [0048] In order to unlock with the electronic key 200, the user presses the power button of the electronic key 200 to turn on the electronic key 200 and then inputs a predetermined password in the key pad 260. The dual authentication may be performed such that when the password input by the user is the same as the password stored in the internal memory of the electronic key 200, it is notified that the secondary authentication using the password is succeeded through a sound or a lamp and then the user contacts the electronic key 200 to the electronic locking device 100 to unlock the electronic locking device.

    [0049] Although in FIG. 1, the key pad 260 is illustrated to help the understanding of the present invention, a fingerprint sensor is added to the electronic key 200 and the authentication which utilizes biometric information may be performed using a fingerprint of the user. In addition, various sensors are added to the electronic key 200 and the dual authentication may be performed using the various sensors.

    [0050] However, due to the restriction of the volume of the electronic key 200, a computational capability is restricted and it is limited to add the sensor. Therefore, a communication module such as Bluetooth may be added to the electronic key 200. Further, the electronic key 200 may perform the dual authentication using an external device while communicating with the external device such as a smart phone.

    [0051] For example, the user is authenticated through face recognition using a camera or voice recognition using a microphone in a smart phone and only when the secondary authentication is succeeded, information notifying that the authentication is succeeded is transmitted from the smart phone to the electronic key 200. Next, the dual authentication may be performed by a method of performing the authentication by contacting the electronic key 200 to the electronic locking device 100.

    [0052] As compared with the electronic locking device such as a door lock which simply performs the authentication using a password, the dual authentication of the electronic locking device 100 using the electronic key 200 has an advantage in that the security is enhanced. However, there is a disadvantage in that uniform application of the dual authentication is inappropriate when it is desired to enhance the security or when it is desired to enhance the user's convenience even if the security is slightly reduced.

    [0053] In order to solve the disadvantage of the related art, the present invention proposes a method for dynamically applying an authentication level to lock/unlock the electronic locking device using a small electronic key 200. To this end, it is necessary to analyze a usage pattern of the electronic locking device 100 first.

    [0054] That is, a different authentication level is applied by automatically distinguishing whether it is desired to enhance the security or it is desired to enhance the convenience depending on a normal usage type, thereby proposing an authentication method which secures both the security and the convenience which are in a trade-off relationship.

    [0055] FIG. 2 is a diagram of an authentication system of an electronic locking device based on a usage pattern according to an exemplary embodiment of the present invention.

    [0056] The authentication system proposed by the present invention includes an electronic locking device 100, an electronic key 200, and a usage pattern analyzing device 300. Here, the usage pattern analyzing device 300 is a device which collects a usage history by wirely or wirelessly communicating with the electronic key 200 and transmits a pattern which is analyzed based on the collected usage history to the electronic key 200.

    [0057] For the purpose of easy understanding of the present invention, although it is described that the usage pattern analyzing device 300 is assumed to be one physical device, the present invention is not limited thereto and a plurality of devices may be combined to serve as a usage pattern analyzing device 300.

    [0058] For example, when a smart phone receives the usage history from the electronic key 200 through the Bluetooth and transmits the usage history to a remote server through WiFi or LTE, the server analyzes the usage history and generates a pattern to transmit the pattern to the electronic key 200 through the smart phone. In this case, the smart phone and the server are combined to serve as the usage pattern analyzing device 300.

    [0059] As described above, the electronic locking device 100 and the electronic key 200 exchange the power and the information through physical contact and the electronic key 200 and the usage pattern analyzing device 300 exchange the usage history and the pattern through the wired/wireless communication.

    [0060] Here, the usage history refers to a history that the electronic key 200 locks and unlocks the electronic locking device 100 and includes information such as a time and a location. A usage history collecting unit 230 of the electronic key 200 collects a usage history in an internal memory whenever the electronic locking device 100 is locked or unlocked.

    [0061] The usage history collected as described above is periodically or aperiodically transmitted to a communication unit 340 of the usage pattern analyzing device 300 through a communication unit 240 of the electronic key 200 and a usage history managing unit 330 of the usage pattern analyzing device 300 stores the usage history in an internal database.

    [0062] When a predetermined amount of usage histories is collected, the usage pattern analyzing device 300 analyzes the usage histories and extracts a pattern. During this process, an analyzing method such as machine learning may be applied. A pattern which is generated through learning by a pattern learning unit 320 of the usage pattern analyzing device 300 is transmitted to the electronic key 200 again.

    [0063] The pattern is stored in the internal memory of the electronic key 200 by a pattern storing unit 250 of the electronic key 200. An authentication managing unit 220 of the electronic key 200 dynamically applies an authentication level to be applied to lock/unlock the electronic locking device 100 in accordance with the pattern to perform the authentication at various levels.

    [0064] By doing, in some cases, the electronic locking device 100 is unlocked only by the authentication performed by contacting the electronic key 200 to the electronic locking device 100 and in another case, the authentication such as a password is further performed in addition to the physical contact. Further, in the other cases, all the physical contact, password authentication, and fingerprint authentication may be requested.

    [0065] Hereinafter, for the purpose of easy understanding of the present invention, it is assumed that the electronic key 200 includes a key pad and a fingerprint sensor. Further, authentication which is performed by the physical contact of the electronic key 200 and the electronic locking device 100 is referred to as one-step authentication, dual authentication which authenticates the physical contact and the password is referred to as two-step authentication, and triple authentication which authenticates physical contact, the password, and the fingerprint is referred to as three-step authentication.

    [0066] The electronic key 200 may further include various authentication units and the authentication level may be increased depending on how many authentication units are used. However, for the purpose of easy understanding of the present invention, it is assumed that there are only three levels of the authentication levels and the description will be continued. Generally, the one-step authentication has the highest convenience but the lowest security and the three-step authentication has the lowest convenience but the highest security. The two-step authentication has a medium level of convenience and security.

    [0067] FIG. 3 is a flowchart of a signal of an authentication system of an electronic locking device based on a usage pattern according to an exemplary embodiment of the present invention.

    [0068] Referring to FIG. 3, before collecting the usage history and analyzing the pattern, the electronic key 200 unlocks the electronic locking device 100 through the three-step authentication having the highest security. When the usage history is accumulated and collected through the three-step authentication, the electronic key 200 transmits the usage history to the usage pattern analyzing device 300.

    [0069] Thereafter, the usage pattern analyzing device 300 learns the usage pattern and transmits the analyzed usage pattern to the electronic key 200. By doing this, even though the same electronic locking device 100 is unlocked in accordance with individual situations, depending on the usage pattern, the electronic key 200 may apply various authentication levels.

    [0070] For example, various authentication levels such as the one-step authentication, two-step authentication, and three-step authentication are applied depending on the time or location for unlocking so that both the security and the convenience may be ensured. Specifically, the authentication level is not adjusted by the setting of a manager, but the authentication level is applied in accordance with the usage pattern, so that the security and the convenience may be more effectively ensured.

    [0071] FIGS. 4 to 8 are views explaining an authentication method according to an exemplary embodiment of the present invention.

    [0072] As described above, the usage history includes a usage time, a usage location, and an identifier of the electronic locking device 100 and an identifier of the electronic key 200 at that time. For example, it is assumed that when the number of locks is calculated at each time period over several days and the distribution is plotted, a normal distribution as illustrated in FIG. 4 is obtained.

    [0073] Referring to FIG. 4, it is understood that an average of the number of locks at each time period is 12 and a standard deviation () is 3. Therefore, in accordance with the characteristic of the normal distribution, in the range of an average +/1, approximately 68.26% of the entire samples is included, in the range of an average +/2, approximately 95.44% of the entire samples is included, and in the range of an average +/3, approximately 99.73% of the entire samples is included.

    [0074] By doing this, the authentication level may be automatically allocated based on the standard deviation. For example, when the number of locks at every time period is 0 to 6, the three-step authentication is required to ensure the high security and when the number of locks at every time period is 6 to 9, the two-step authentication is required so that as the number of locks is increased, the user's convenience may be enhanced. Finally, when the number of locks exceeds nine at every time period, the one-step authentication is required to ensure the user's convenience.

    [0075] As the number of locks is increased, the unlocking is performed with the lower authentication because most of the malicious attempts to unlock the physical locking device is tried at a time period when the usage is not frequent. The various authentication levels may be applied so as to ensure the high convenience when the usage of the user is frequent and ensure the high security when the usage of the user is infrequent.

    [0076] That is, since it is difficult to unlock maliciously by others while the user frequently tries to use the locking device, patterns may be learned to enhance user's convenience during this tip e period. To the contrary, at the time period when the usage of the user is infrequent, the security is enhanced to request a high level of authentication.

    [0077] Referring to FIG. 5, as a specific example, the number of locks at each time period from 00:00 to 24:00 on a specific date. By doing this, the three-step authentication may be performed from 00:00 to 09:00 when the number of locks is less than six, using the pattern learned in FIG. 4.

    [0078] As compared with this, the two-step authentication may be performed from 09:00 to 17:00 when the number of locks is six or more and less than nine. In contrast, the one-step authentication may be performed from 17:00 to 20:00 when the number of locks is nine or more.

    [0079] Further, the two-step authentication is performed from 20:00 to 21:00 when the usage of the user is reduced and the three-step authentication is performed after 21:00 to ensure the security. As described above, the pattern is generated by analyzing the usage history and various security levels are applied in accordance with the pattern so that not only the user's convenience is enhanced but also the security may be ensured.

    [0080] For now, an example that the number of locks at every time period is analyzed as a pattern has been described with reference to FIGS. 4 and 5. However, this example is provided for easy understanding of the present invention, but does not limit the invention so that a difference of the authentication level in accordance with the usage pattern of the user may be automatically set through various pattern analysis, in addition to the pattern analysis illustrated in FIGS. 4 and 5.

    [0081] Now, an example of analyzing the number of locks at every location as a pattern will be described with reference to FIG. 6. Referring to FIG. 6, the number of locks is illustrated at every location. For example, the electronic locking device 100 used in the present invention is a locking device for a storage box in a factory facility so that it is assumed that the locations of the locking devices vary depending on every area of the factory.

    [0082] It is assumed that a locking device in a section A is generally locked/unlocked eight times for one day, a locking device in a section B is generally locked/unlocked twelve times for one day, and a locking device in a section C is generally locked/unlocked four times for one day.

    [0083] Therefore, different authentication levels may be applied for every section. That is, two-step authentication is performed for the locking device in the section A, one-step authentication is performed for the locking device in the section B, and three-step authentication is performed for the locking device in the section C.

    [0084] As described above, similarly to the pattern at every time period, when the pattern is analyzed for every location to apply an authentication level, as illustrated in FIG. 7, even though a new locking device B-04 is added to the section B and there is no usage history for the locking device B-04, the electronic key 200 may automatically set to perform only the one-step authentication to lock or unlock the locking device B-40.

    [0085] Similarly to the application in FIG. 4, the average and the standard deviation are calculated using the statistics of the number of locks for every location and different authentication levels may be set and applied to individual locations based on the range of the number of locks in each section based on the average.

    [0086] Further, the times and locations described in FIGS. 4 to 7 are analyzed at one time to generate a usage pattern according to the time and the location. Therefore, different authentication levels may be applied even to the same location depending on the time and different authentication levels may be applied to the same time depending on the locations.

    [0087] During this process, the normal distributions for every location and every time are obtained and different authentication levels may be applied according to the normal distributions. Further, the machine learning may be used during this process. For example, the usage history is clustered with characteristics of the usage location and the usage time to configure a cluster and the authentication level may be applied in the descending order of cluster size.

    [0088] Referring to FIG. 8, the usage according to the location and the time is represented and a result of clustering the usage is illustrated. In this case, there are three authentication levels including one step, two steps, and three steps so that the clustering is performed by assuming that a value of K to perform K means clustering is 3.

    [0089] Therefore, one-step authentication is performed for the location and the time in the red cluster where the usage is concentrated, two-step authentication is performed for the location and the time in the blue cluster, and three-step authentication is performed for the location and the time in the green cluster. The setting to apply various authentication levels is applied using a model generated through machine learning so that an appropriate authentication level according to the location and the time may be set.

    [0090] FIG. 9 is a flowchart of an authentication method of an electronic locking device based on a usage pattern according to an exemplary embodiment of the present invention.

    [0091] Referring to FIG. 9, first, a usage history is received from an electronic key 200 in step S1100. Next, the usage history is analyzed to learn a pattern according to a time and a location in step S1200. In this case, various machine learning methods may be applied. More specifically, the pattern may be learned by applying unsupervised learning.

    [0092] Next, different authentication levels are applied in accordance with the learned pattern in step S1300. That is, various authentication levels are applied according to the location and the time so that the electronic key 200 and the electronic locking device 100 may be used to ensure the security and the convenience.

    [0093] In this case, the learned pattern may be updated using the usage histories which are consistently accumulated. By doing this, more appropriate authentication level according to the location and the time may be automatically set.

    [0094] FIG. 10 is a view for explaining a usage pattern analyzing device according to an exemplary embodiment of the present invention.

    [0095] The usage pattern analyzing device 300 described above may be a type of a server which collects the usage history by communicating with the electronic key, but may be a type of an electronic key storage box 400 as illustrated in FIG. 10.

    [0096] Referring to FIG. 10, the electronic key storage box 400 may include a door 410 to be opened/closed and an accommodating space 420 therein. In the accommodating space 420, there are key holes 430 for accommodating a plurality of electronic keys 100 so that the electronic keys 100 are inserted into individual holes, thereby storing the electronic keys 100.

    [0097] In this case, a state display unit 440 may be included at the circumference of the key hole 430. Therefore, when the electronic key 100 is being charged, is completely charged, and reads/writes data, the individual states may be notified to the user using colors.

    [0098] As described above, during the process of accommodating and storing the electronic key 100, the key storage box 400 not only provides a charging function, but also performs a function of collecting a usage history of the electronic key 100, learning models for applying various authentication levels by analyzing the usage history, and transmitting the learned model to the electronic key 100.

    [0099] By doing this, when it is necessary to store a plurality of keys, the electronic key storage box 400 is used to systematically manage the electronic keys 100 and charging and usage contents of the electronic key 100 may be easily collected during this process.

    [0100] The exemplary embodiments of the present disclosure have been described with reference to the accompanying drawings, but those skilled in the art will understand that the present disclosure may be implemented in another specific form without changing the technical spirit or an essential feature thereof. Thus, it is to be appreciated that embodiments described above are intended to be illustrative in every sense, and not restrictive.