• Title/Summary/Keyword: Pattern Lock System

Search Result 18, Processing Time 0.026 seconds

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

Development of a Door System by Speaker Verification Using Weighted Cepstrum and Single Average Pattern

  • Kyung, Youn-Jeong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.2E
    • /
    • pp.60-68
    • /
    • 1996
  • In this paper, we implement the door lock system based on pattern matching technique for speaker recognition using DTW. In this study, major features of our system are summarized as follows:(1) Make the average reference pattern using DTW. This method keeps the high recognition rate compared with the other systems whose performances degrade rapidly as time goes on. (2) Use F-ratio values of the cepstral coefficients. We find that the weighted cepstral reveals an effect on intensifying the difference between th customer and the imposter. The system hardware is composed of two parts : the door lock part and the speaker recognition processing part. We use an 8051 microprocessor in the door lock park for serial communication with host processor to open or close the lock. Using our system, we obtain speaker recognition rate of about 99.5%.

  • PDF

Likelihood-based Directional Optimization for Development of Random Pattern Authentication System (랜덤 패턴 인증 방식의 개발을 위한 우도 기반 방향입력 최적화)

  • Choi, Yeonjae;Lee, Hyun-Gyu;Lee, Sang-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.71-80
    • /
    • 2015
  • Many researches have been studied to overcome the weak points in authentication schemes of mobile devices such as pattern-authentication that is vulnerable for smudge-attack. Since random-pattern-lock authenticates users by drawing figure of predefined-shape, it can be a method for robust security. However, the authentication performance of random-pattern-lock is influenced by input noise and individual characteristics sign pattern. We introduce an optimization method of user input direction to increase the authentication accuracy of random-pattern-lock. The method uses the likelihood of each direction given an data which is angles of line drawing by user. We adjusted recognition range for each direction and achieved the authentication rate of 95.60%.

Implement pattern lock security enhancement using thread to measure input time (입력시간을 측정하는 쓰레드를 활용한 패턴 잠금 보안 강화 구현)

  • An, Kyuhwang;Kwon, Hyeokdong;Kim, Kyungho;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.470-476
    • /
    • 2019
  • The pattern locking technique applied to smart phones is a locking technique that many people use conveniently. However, the safety of pattern locking techniques is very low compared with other techniques. The pattern locking technique is vulnerable to a shoulder surfing attack, which is based on the user's input and can be interpreted by looking at the movement of the shoulder, and the smudge attack is also vulnerable due to fingerprint drag marks remaining on the mobile phone pad. Therefore, in this paper, we want to add a new security method to check the pressed time by using a thread in the pattern locking scheme to secure the vulnerability. It is divided into short, middle, and long click according to the pressing time at each point. When dragging using the technique, security performance enhances $3^n$ tiems. Therefore, even if dragging in the same 'ㄱ' manner, it becomes a completely different pattern depending on the pressing time at each point.

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.

Design and development of non-contact locks including face recognition function based on machine learning (머신러닝 기반 안면인식 기능을 포함한 비접촉 잠금장치 설계 및 개발)

  • Yeo Hoon Yoon;Ki Chang Kim;Whi Jin Jo;Hongjun Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.29-38
    • /
    • 2022
  • The importance of prevention of epidemics is increasing due to the serious spread of infectious diseases. For prevention of epidemics, we need to focus on the non-contact industry. Therefore, in this paper, a face recognition door lock that controls access through non-contact is designed and developed. First very simple features are combined to find objects and face recognition is performed using Haar-based cascade algorithm. Then the texture of the image is binarized to find features using LBPH. An non-contact door lock system which composed of Raspberry PI 3B+ board, an ultrasonic sensor, a camera module, a motor, etc. are suggested. To verify actual performance and ascertain the impact of light sources, various experiment were conducted. As experimental results, the maximum value of the recognition rate was about 85.7%.

Conditions to avoid synchronization effects in lateral vibration of footbridges

  • Andrade, Alexandre R.;Pimentel, Roberto L.;Silva, Simplicio A. da;Souto, Cicero da R.
    • Structural Monitoring and Maintenance
    • /
    • v.9 no.2
    • /
    • pp.201-220
    • /
    • 2022
  • Lateral vibrations of footbridges may induce synchronization between pedestrians and structure itself, resulting in amplification of such vibrations, a phenomenon identified by lock-in. However, investigations about accelerations and frequencies of the structural movement that are related to the occurrence of synchronization are still incipient. The aim of this paper is to investigate conditions that could lead to avoidance of synchronization among pedestrians themselves and footbridge, expressed in terms of peak acceleration. The focus is on the low acceleration range, employed in some guidelines as a criterion to avoid synchronization. An experimental campaign was carried out, employing a prototype footbridge that was set into oscillatory motion through a pneumatic exciter controlled by a fuzzy system, with controlled frequency and amplitude. Test subjects were then asked to cross the oscillating structure, and accelerations were simultaneously recorded at the structure and at the subject's waist. Pattern and phase differences between these signals were analysed. The results showed that test subjects tended to keep their walking patterns without synchronization induced by the vibration of the structure, for structural peak acceleration values up to 0.18 m/s2, when frequencies of oscillation were around 0.8 to 0.9 Hz. On the other hand, for frequencies of oscillation below 0.7 Hz, structural peak accelerations up to 0.30 m/s2 did not induce synchronization.

Comparison and Analyzing System for Protein Tertiary Structure Database expands LOCK (LOCK을 확장한 3차원 단백질 구조비교 및 분석시스템의 설계 및 구현)

  • Jung Kwang Su;Han Yu;Park Sung Hee;Ryu Keun Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.247-258
    • /
    • 2005
  • Protein structure is highly related to its function and comparing protein structure is very important to identify structural motif, family and their function. In this paper, we construct an integrated database system which has all the protein structure data and their literature. The structure queries from the web interface are compared with the target structures in database, and the results are shown to the user for future analysis. To constructs this system, we analyze the Flat-File of Protein Data Bank. Then we select the necessary structure data and store as a new formatted data. The literature data related to these structures are stored in a relational database to query the my kinds of data easily In our structure comparison system, the structure of matched pattern and RMSD valure are calculated, then they are showed to the user with their relational documentation data. This system provides the more quick comparison and nice analyzing environment.

Recognition of Basic Motions for Snowboarding using AHRS

  • Kwon, Ki-Hyeon;Lee, Hyung-Bong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.3
    • /
    • pp.83-89
    • /
    • 2016
  • Internet of Things (IoT) is widely used for biomechanics in sports activities and AHRS(Attitude and Heading Reference System) is a more cost effective solution than conventional high-grade IMUs (Inertial Measurement Units) that only integrate gyroscopes. In this paper, we attach the AHRS to the snowboard to measure the motion data like Air To Fakie, Caballerial and Free Style. In order to reduce the measurement error, we have adopted the sensors equipped with Kalman filtering and also used Euler angle to quaternion conversion to reduce the Gimbal-lock effect. We have tested and evaluated the accuracy and execution time of the pattern recognition algorithms like PCA, ICA, LDA, SVM to show the recognition possibility of it on the basic motions of Snowboarding from the 9-axis trajectory information which is gathered from AHRS sensor. With the result, PCA, ICA have low accuracy, but SVM have good accuracy to use for recognition of basic motions of Snowboarding.

Data Transmission lSystem by Pattern Synchronization (패턴동기에 의한 디지탈데이타 통신방식)

  • 안수길
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.9 no.1
    • /
    • pp.25-30
    • /
    • 1972
  • Data Communication by sending pulse train and verifying the lock-in of a phase locked loop in receiving end is studied. The noise rejection property inherent to PLL is analysed. By using about six pulses in a train, data transimission rate of 20k bit/sec. in a telephone cable is achieved, thus permitting high speed data communication and an exellent immunity against noise.

  • PDF