• Title/Summary/Keyword: Unlocking

Search Result 43, Processing Time 0.041 seconds

A Study on Hard Disk Drive ATA Passwords (하드디스크 드라이브 ATA 패스워드에 관한 연구)

  • Lee, Ju-young;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1059-1065
    • /
    • 2015
  • Hard disk passwords are commonly not well known. If the passwords are set, forensic investigators are not allowed to access data on hard disks, so they can be used to obstruct investigations. Expensive tools such as PC-3000 are necessary for unlocking such hard disk passwords. But it would be a burden on both organizations that should pay for these tools and forensic investigators that are unfamiliar with these tools. This paper discusses knowledge required for unlocking hard disk passwords and proposes methods for unlocking the passwords without high-priced tools. And with a vendor-specific method, this paper provides procedures for acquiring passwords and unlocking hard disk drives.

Relative Position Pattern Unlocking Solution based on Blind Interaction on Touch Screen (터치스크린에서의 블라인드 인터랙션 기반의 상대적 위치 패턴 잠금 해제 솔루션)

  • Jin, Zhou-Xiong;Pan, Young-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.45-52
    • /
    • 2020
  • In this study, we propose a new Relative position pattern unlocking solution based on blind interaction, which is a new unlocking method, and compared it with existing unlocking methods to verify usability and security improvement. And verified the practical value of the proposed new unlocking solution. The relative position pattern unlock method is easily remembered than the numeric code method and is worth practical enough to show a degree of learning ease similar to the drawing pattern method. The new method is safer to steal than other two methods. It can be manufactured at a low cost and can also be used by special users such as blind people. Therefore, the practical value is relatively high.

Development of Inertial Locking Anti-G Buckle of A Seatbelt System With Pre-tensioner (프리텐셔너가 장착된 시트벨트 시스템의 관성잠김 안전버클 개발)

  • Tak, Tae-Oh;Kuk, Min-Gu;Kim, Dae-Hee;Park, Jae-Soon;Shin, Seung-Eon;Choi, Seok
    • Journal of Industrial Technology
    • /
    • v.26 no.A
    • /
    • pp.47-54
    • /
    • 2006
  • To improve passenger safety, seat belt systems with pre-tensioner that tightens seat belt webbing using explosive just before collision are widely used these days. Even though seatbelt must not unlatched without passengers' operation. explosive power of pre-tensioner can cause unlocking of a buckle. To prevent the unlocking, an anti-g mass that blocks displacement of the release button has been attached to the buckle. In this study, the dynamics and statics of locking mechanism associated with operation of anti-g buckle has been theoretically investigated, and important design variables that affect the operation of anti-g buckle have been identified. Through the total seat belt system's dynamic simulation using force and displacement inputs obtained from seat belt sled test, design of the proposed anti-g buckle has been validated.

  • PDF

A Preference of Smartphone Locking Algorithms Using Delphi and AHP (Aanalytic Hierarchy Process) (델파이와 계층분석기법을 이용한 스마트폰 잠금 알고리즘 선호도 분석)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1228-1233
    • /
    • 2019
  • Recently, a variety of algorithms using encryption technology have been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve the unlocking problem through human biometrics technology, which has already succeeded in commercializing. These include finger print recognition, face recognition, and iris recognition. In this study, the evaluation items are five algorithms, including finger print recognition, face recognition, iris recognition, pattern recognition, and password input method. Based on the algorithms adopted, the AHP (analytic hierarchy process) technique was used to calculate the preferred priorities for smartphone users. Finger print recognition ( .400) was the top priority for smartphone users. Next, pattern recognition ( .237) was placed in the second priority for smartphone users. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.

Dynamics Analysis and experiment verification of seatbelt system with pre-tensioner considering connection action of a human body (인체의 연계작용을 고려한 프리텐셔너를 가진 시트벨트 시스템의 동역학 해석 및 실험적 검증)

  • Kuk, Min-Gu;Tak, Tea-Oh;Park, Jae-Soon;Kim, Dae-Hee
    • Proceedings of the KSME Conference
    • /
    • 2007.05a
    • /
    • pp.1009-1014
    • /
    • 2007
  • To improve passenger safety, seatbelt systems with pre-tensioner that tightens seatbelt webbing using explosives just before collision are widely adopted. Even though seatbelt must not be unlatched without passenger's operation, release of a buckle due to explosion of pre-tensioner takes place in some situations resulting in serious injury to passengers. To prevent the unintended unlocking, a pendulum like part called anti-g mass is attached to the buckle to block displacement of release button. In this study, the unlocking conditions of anti-g buckle when pre-tensioner explodes has been theoretically investigated. Through multibody model of the seatbelt system incorporating every detailed part of the buckle, dynamic analysis of the seatbelt system with pre-tensioner has been performed including the driver's body model that interacts with seatbelt system. The simulations results has been validated through actual sled test with driver dummy and the seatbelt system.

  • PDF

Comparative Study of US and Korean Legal System on the Privilege against Self-Incrimination through Forced Unlocking in Digital Era (디지털시대 강제해독에 따른 자기부죄 거부 권리에 관한 미국과 한국의 제도 비교 연구)

  • Lee, Ook;Jee, Myung Keun;Lee, Dong Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.235-241
    • /
    • 2017
  • With the coming of the digital era, encryption has become common in everyday life. Almost anyone can easily acquire encryption software and use it to prevent unwanted third parties from accessing one's private information. However, the spread of encryption has also seriously hindered law enforcement during the investigation of cybercrimes, which hides incriminating digital evidence in encrypted hard drives and files. Therefore, many countries have attempted to compel criminals to decrypt encrypted evidence and it has been inevitable to examine privilege against self-incrimination as basic right on the side of constitution. This study analyzed the past court decisions on the issue of compelled decryption in the US and whether the Government can compel a defendant to disclose his password in Korean legal system on the constitutional side. Finally, this study suggests an approach to create a legal procedure to make it a crime for a suspect or defendant to refuse to disclose his password to law enforcement for criminal cases in Korea.

Protector Design and Shock Analysis for a Launch-Reconnaissance Robot (발사형 정찰로봇을 위한 보호체 설계 및 충격해석)

  • Kang, Bong-Soo;Park, Moon-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.8
    • /
    • pp.971-976
    • /
    • 2011
  • This paper presents the design concepts of a protector for a launch-reconnaissance robot that is to be deployed for data-collection in hazardous regions. The protector protects the reconnaissance robot inside from shock induced during the process of launch, flight, and landing. Since the outer shells of the protector are automatically opened wide by the unlocking mechanism during the landing stage, the reconnaissance robot can easily exit the protector and move around to carry out its mission. We carefully simulated a finite-element model of the protector with the robot and compared the results with the actual dynamic behavior of the system. Shock- response tests using a droptable showed that the proposed protector filled with silicon material successfully attenuated external shock.

Unlocking Shared Bike System by Exploiting an Application Log (애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법)

  • Cho, Junwan;Lee, Jeeun;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2019
  • Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.

Overview of Internet-based checking for machine tools with a variant CNC environment (서로 다른 CNC 환경을 갖는 공작기계의 인터넷 기반 점검)

  • 김동훈;김선호;김경돈;김찬봉;고광식
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2004.04a
    • /
    • pp.329-334
    • /
    • 2004
  • This paper proposes Internet-based checking scheme for machine-tools with a variant CNC. Checking points defined in this research are classified into two categories such as structured point and operational point. The formal includes the vibration of bearing, temperature of spindle unit and another periodical management. And the latter includes oil checking, clamp locking/unlocking and machining on/off status. Through this research, for the global management of variant CNC machines interspersed with CAC and OAC in manufacturing system, the suitable environment for Internet-based checking of variant CNC machines was designed and the checking methods for CAC and OAC machines were compared with each other.

  • PDF