Abstract
Information and communication technology, converged with application service industry has been expanding as a solution to national and social issues such as disasters and safety as well as education, medicine, and environment. In the finance sector, non-face-to-face financial service and the distributions of automated teller machine continue to increase for strengthening the competitiveness by reducing costs through computerization and streamlining the business process and advancing the financial service. In order to lead this trend, this paper proposes an approach to strengthen the security of the lock system on the administrative aspects, which is the server authentication method using a smart phone as a repeater for the lock system applied to the automated teller machine and a real time control based on WCDMA/LTE module for the communication with objects.
Similar content being viewed by others
References
http://www.kcc.go.kr/tsi/etc/search/search/ASC_integrationsearch.jsp?page=A1001000
Tankard, C.: Persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16–19 (2011)
Symantec, “Symantec Internet Security Threat Report,” Symantec, vol. 17 (2011)
Coviello, A.W.: Open letter to RSA customers, www.rsa.com/node.aspx?id=3872 (2011)
Han, S.B., Hong, S.K.: A study on responses against in the financial sector for APT attack. Korea Inst. Inf. Secur. Cryptol. 23(1), 44–53 (2013)
http://www.hauri.co.kr/customer/security/colum_view.html?intSeq=93&page=1
Sung, A., Zu, J., Chavez, P., Mukkamala, S.: Static Analyzer for Vicious Executavles (SAVE). In: 20th Annual Computer Security Applications Conference, pp. 326–334 (2004)
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static Detection of Malicious Code in Executable Programs, SREIS ’01 (2001)
Masood, S.G.: Malware analysis for administrators, http://www.securityfocus.com/infocus/1780 (2004)
Chaang, C.-W., Tsai, D.-R., Tsai, J.-M.: A cross-site patch management model and architecture design for large scale heterogeneous environment. In: Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology (CCST ’05), pp. 41–46. IEEE (2005)
Shon, T., Moon, J., Lee, C., Im, E.G., Seo, J.T.: Safe patch distribution architecture in intranet environments. In: Proceedings of the International Conference on Security and Management (SAM’03), pp. 455–460 (2003)
Tak, B.C., Chung, Y.D., Kim, M.H.: Improving fault tolerance for high-capacity shared distrbuted file systems using the rotational lease under network partitioning. Korea Inst. Inf. Sci. Eng. 32(6), 616–628 (2005)
Curtis, PW.: Using SANs and NAS. O’Reilly, Cambridge (2002)
Gibson, G.A., Meter, R.V.: Network attached storage architecture. Commun ACM 43(11), 37–45 (2000)
Lee, W.B., Park, J.W.: Application of group master Cachefor the integrated environment of SAN and NAS. Korea Soc. Simul. 16(2), 9–15 (2007)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jeong, Ji. A study on smart door lock control system. Cluster Comput 19, 1607–1617 (2016). https://doi.org/10.1007/s10586-016-0617-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-016-0617-2