This patent application claims priority to and the benefit of Korean Patent Application No. 10-2022-0064557, filed on May 26, 2022, the disclosure of which is incorporated herein by reference in its entirety.
The present invention relates to a smart wall pad performing self-security monitoring.
With the improvement of network quality and the development of Internet of Things (IoT) technology, various network devices have been deployed in homes or offices, and each network device has been used for convenience of life by constructing a network capable of communicating with the outside. The IoT, which is one of the wireless Internet, refers to a technology for connecting various objects through wireless communication. The Internet of Things is at risk of being hacked by other devices if the Linux operating system, which is the basis of a number of IoT devices, does not have the right security on the device or does not update properly.
In particular, in Korea, where apartments are the main residential form, wall pads using the Internet of Things are located at each house. Although the wall pad is located inside a home where privacy is required, there is always a risk of hacking because there is no appropriate security monitoring means, and the need for wall pad security monitoring has emerged.
The present invention is to provide a smart wall pad performing self-security monitoring and operating method of the same.
A wall pad according to the technical concept of the present invention includes a storage configured to store system data about an internal file system, a monitoring module configured to perform security monitoring on the internal file system, and a notification module configured to transmit a result of the security monitoring, wherein the monitoring module accesses the storage to check a data size of the system data, and determines whether the internal file system is attacked based on whether the checked data size is a predetermined value.
In an embodiment, the monitoring module may include an application program inspector, and the application program inspector may extract a parity code for an application program stored in the storage, and may determine integrity of the application program based on the extracted parity code.
The application program inspector may determine whether a new application program is included in a verification program DB when the new application program is installed in the storage, and transmit information about the new application program to the notification module when the new application program is not included in the verification program DB.
In an embodiment, the application program inspector may receive a size of the full data of the application program when a new application program is installed in the storage, may determine whether the data size of the application program matches the full data size, and may transmit information about the application program to the notification module when the data size of the application program does not match the full data size.
In an embodiment, the monitoring module may include an operating system inspector, and the operating system inspector may receive the latest version information on the operating system, determine whether a version of the operating system installed in the storage matches the latest version information, and transmit information on the operating system to the notification module when the version of the operating system does not match the latest version information.
In an embodiment, the operating system may include a user data area, and the operating system inspector may determine whether there is unauthorized data in the user data area based on a permission data DB, and when the unauthorized data is included in the user data area, transmit information on the unauthorized data to the notification module.
The operating system may include bootloader data for booting the wall pad, and the operating system inspector may determine whether the bootloader data has a predetermined size, and when the bootloader data does not have the predetermined size, the operating system inspector may transmit information about the bootloader to the notification module.
In an embodiment, the monitoring module may include a system inspector, and the system inspector may determine whether the system is in a rooting state, and when the system is in the rooting state, the system inspector may transmit that the system is in the rooting state to the notification module.
In an embodiment, the monitoring module may include a vulnerability inspector, and the vulnerability inspector may check whether a vulnerability pattern included in a vulnerability DB is included in the output data of the wall pad, and when the vulnerability pattern is included, transmit information on the vulnerability pattern to the notification module.
In an embodiment, the monitoring module may include a wireless communication inspector, and the wireless communication inspector may check a peripheral access point, determine whether a pattern included in a threat DB is included in data received from the access point, and transmit information on the access point to the notification module when the pattern is included in the data received from the access point.
In an embodiment, the wall pad may further include a display, and the notification module may include an alarm data transmitter configured to transmit a security monitoring result to a manager terminal having a legitimate authority for the wall pad, and an alarm data display configured to display the security monitoring result on the display.
Hereinafter, exemplary embodiments of the present disclosure will be described in detail with reference to the accompanying drawings. Advantages and features of the present disclosure and methods of achieving them will become apparent with reference to embodiments described in detail below together with the accompanying drawings. However, the technical spirit of the present invention is not limited to the following embodiments, but may be implemented in various different forms, and the following embodiments are provided to complete the technical spirit of the present invention and to completely notify a person having ordinary skill in the art to which the present invention belongs of the scope of the present invention, and the technical spirit of the present invention is only defined by the scope of the claims.
In adding reference numerals to elements in each drawing, it should be noted that the same elements will be designated by the same reference numerals, if possible, even though they are shown in different drawings. In addition, in describing the present invention, when it is determined that a detailed description of related known configurations or functions may obscure the gist of the present invention, the detailed description thereof will be omitted.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the inventive concept belongs. In addition, terms defined in commonly used dictionaries are not interpreted ideally or excessively unless they are clearly specifically defined. The terminology used herein is for the purpose of describing embodiments and is not intended to be limiting of the present invention. In the specification, a singular form includes a plural form unless specifically mentioned in the text.
In addition, in describing components of the present disclosure, terms such as first, second, A, B, (a), (b), and the like may be used. The term is used only to distinguish a component from another component, and the nature, sequence, or order of the corresponding component is not limited by the term. When it is described that a component is “connected”, “coupled”, or “connected” to another component, the component may be directly connected or connected to the other component, but it should be understood that another component may be “connected”, “coupled”, or “connected” between the components.
It will be further understood that the terms “comprises” and/or “comprising” used in the present invention do not preclude the presence or addition of one or more other components, steps, operations and/or elements, as mentioned.
Components included in any one embodiment and components including a common function may be described using the same name in another embodiment. Unless stated otherwise, the description described in any one embodiment may be applied to other embodiments, and the detailed description may be omitted within a redundant range or a range that can be obviously understood by a person having ordinary skill in the art.
Hereinafter, some embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Hereinafter, the present invention will be described in detail with reference to preferred embodiments of the present invention and the accompanying drawings.
Referring to
The wall pad 100 may include a storage 110, a monitoring module 120, and a notification module 130. In the present specification, an operation performed by each component (for example, the monitoring module 120 or the notification module 130) included in the wall pad 100 may be an operation actually performed by the processor of the wall pad 100 using an application program embedded in the storage 110 of the wall pad 100. The storage 110 may include a non-volatile memory, a volatile memory, a flash memory, a hard disk drive (HDD), a solid state drive (SSD), or the like. The processor may include at least one of a Central Processing Unit (CPU), a Graphic Processing Unit (GPU), a Neural Processing Unit (NPU), a RAM, a ROM, a system bus, and an application processor.
The storage 110 may store various data DAT for operating the wall pad 100. In some example embodiments, the various data DAT may include system data for an Operating System (OS) of the wall pad 100, application program data for an application that manages various detailed functions of the wall pad 100, user data including unique information of a user, and bootloader data for booting the wall pad 100.
The monitoring module 120 may receive the data DAT from the storage 110, perform various security monitoring on the wall pad 100 based on the data DAT, and output a warning signal (Sig_WN) to the notification module 130 to notify the manager or the user that a security critical matter is detected as a result of the security monitoring. The monitoring module 120 may include an application program inspector 121, an operating system inspector 122, a system inspector 123, a vulnerability inspector 124, and a wireless communication inspector 125 according to a monitoring target, but the technical idea of the present disclosure is not limited thereto.
The application program inspector 121 may monitor the application programs, such as whether the application programs installed on the wall pad 100 are authorized or whether the application programs are attacked. In this specification, an application is a program created to provide a specific function to a user by using the wall pad 100, and may be referred to as an application, an app, or the like.
The operating system inspector 122 may control hardware of the wall pad 100 and monitor an operating system providing a base environment for an application program in order to operate the wall pad 100. Specifically, the operating system inspector 122 may monitor the necessity of updating the operating system, whether user data or bootloader data of the operating system has been attacked, and the like.
The system inspector 123 may monitor whether the system for operating the entire wall pad 100 has been attacked. In an embodiment, the system inspector 123 may determine whether an attack has occurred on the entire system based on the system data of the wall pad 100, and may determine whether the system is vulnerable based on whether the system is in a rooting state.
The vulnerability inspector 124 may inspect whether the wall pad 100 has a vulnerability that is easily attacked, based on the output data of the wall pad 100. The wireless communication inspector 125 may determine whether there is an intention of an attack from the access point located around the wall pad 100.
According to the technical spirit of the present disclosure, the monitoring module 120 may be positioned inside the wall pad 100 to perform various security checks on the wall pad 100, and thus, data transmission/reception to the outside is not required as compared with a case where a security inspection is performed outside the wall pad 100, and thus, the possibility of an attack due to data transmission/reception is blocked, thereby enabling efficient and safe security monitoring.
The notification module 130 may output alarm data (Dat_AL) to a user or an administrator having a proper authority for the wall pad 100 in response to the warning signal (Sig_WN). To this end, the notification module 130 may include an alarm data transmitter 131 and/or an alarm data display module 132. The alarm data transmitter 131 may transmit alarm data (Dat_AL) to a predetermined terminal (e.g., a cellular phone owned by the user) owned by the user in response to the warning signal (Sig_WN). In some example embodiments, the alarm data (Dat_AL) may include information about a security-critical area (e.g., a name of an application program, a SSID of a threatening AP, etc.), a coping method for improving a security state (e.g., operating system updater, rooting state release, etc.), and the like, among the configuration of the wall pad 100. According to an exemplary embodiment of the present disclosure, the wall pad 100 notifies the user that security is in a dangerous state through the user terminal or the like, so that the user may know that the wall pad 100 is not safe through the portable terminal and the security state of the wall pad 100 may be improved, despite the user's location.
The alarm data display module 132 may display the alarm data (Dat_AL) through a display (e.g., a liquid crystal display (LCD), a touch screen, etc.) included in the wall pad 100, thereby transmitting the alarm data (Dat_AL) to the user. According to an exemplary embodiment of the present disclosure, the wall pad 100 displays that security is in a dangerous state to the user through the display, so that the user may intuitively check the security state of the wall pad 100 by viewing the wall pad 100, and accordingly, the security state of the wall pad 100 may be improved.
Although not illustrated, the wall pad 100 may further include a security improvement module, and the security improvement module may perform various operations (e.g., a rooting state release, an operating system update, vulnerability security, and threatening access point blocking) for improving a security state in response to the warning signal (Sig_WN).
Referring to
The wall pad 100 may determine whether the data size of the system data (Ssys) is equal to the predetermined data size (Sdet) S130. In some example embodiments, the predetermined data size (Sdet) may be received from the outside (e.g., a management server or a user for the wall pad 100).
When the data size (Sys) of the system data is equal to the predetermined data size (Sdet), the wall pad 100 may confirm that the system is not attacked, and when the data size (Sys) of the system data is not equal to the predetermined data size (Sdet), the wall pad 100 may determine that the system is attacked and may notify a user or a manager that the internal file system is attacked S140.
Since the wall pad 100 is specialized for various controls for an apartment, system access by a user, such as update or installation of a new application program, may be relatively small, and a change in system data may be less than system data initially set. Accordingly, when there is a change in the system data, it may be suspected that the system has been attacked. According to an exemplary embodiment of the present disclosure, when the system data does not have a predetermined data size based on the data size, security monitoring may be enhanced by notifying a user or an administrator of the fact that the system data does not have the predetermined data size, and as a result, security for the wall pad 100 may be enhanced.
Referring to
The wall pad 100 may determine whether there is an error in the parity code S220. When there is an error in the parity code, the wall pad 100 may notify the user that the application program has been attacked S230, or may delete the application program by itself. When there is no error in the parity code, it may be determined that the application program is complete. In the present specification, integrity may mean that an application program or the like operates as intended by a user without being attacked.
According to an exemplary embodiment of the present disclosure, the wall pad 100 autonomously determines the integrity of the application, thereby performing efficient security monitoring without transmitting and receiving signals to and from the outside.
Referring to
The wall pad 100 may have a relatively small number of application programs used due to the property of performing various controls in the home. Accordingly, a program that does not adversely affect the wall pad 100 may be managed by the verification program DB (DB_AP), and the verification program DB (DB_AP) may be provided from an administrator or the like. According to an exemplary embodiment of the present disclosure, only the application program included in the verification program (DB_AP) is installed on the wall pad 100, thereby preventing the installation of the application program having a possibility of attack on the wall pad 100 and increasing the security of the wall pad 100.
Referring to
The wall pad 100 may obtain an official data size (Soff) for the installed application program S430. In one example, the wall pad 100 may download the official data size (Soff) for the application program from the management server.
The wall pad 100 determines whether the data size (Sapp) of the installed application program is equal to the official data size (Soff), and if the data size (Sapp) is equal to the official data size (Soff), the security monitoring for the installed application program may be terminated, and if the data size (Soff) is not equal to the official data size (Sapp), the user or the like may be informed that the installed application program has been attacked S450. In another example, the wall pad 100 may autonomously delete the installed application program.
According to an exemplary embodiment, the integrity of the application program may be determined based on the data size, and accordingly, the installation of the application program having the possibility of an attack on the wall pad 100 may be blocked.
Referring to
According to an exemplary embodiment of the present disclosure, the wall pad 100 may autonomously perform periodic version checking on the OS, and accordingly, may increase security by maintaining the OS as the latest version.
Referring to
Due to the nature of the wall pad 100, only limited data may be stored in a user data area of an operating system. According to the exemplary embodiment of the present disclosure, the permission data DB (DB_AD), which is the legally stored data, may be secured, and the wall pad 100 may prevent an attack on the user data and improve security by determining other data to be unjustifiable data.
Referring to
Referring to
According to an exemplary embodiment of the present disclosure, the wall pad 100 may determine whether it is in a rooting state vulnerable to attack by itself, and may release the rooting state from the rooting state vulnerable to attack by notifying a user of the rooting state, and accordingly, security for the wall pad 100 may be improved.
Referring to
The wall pad 100 may determine whether a vulnerability pattern is included in the output data S930, and when the vulnerability pattern is included in the output data, may notify a user or the like of information about the vulnerability S940, or may perform a task of solving the vulnerability.
According to an exemplary embodiment of the present disclosure, the wall pad 100 may identify and resolve a vulnerability by itself using the output data, thereby improving security for wireless communication without the help of an external device (for example, a management server).
Referring to
The wall pad 100 may determine whether a threat pattern is included in the received data S1030, and when the threat pattern is included in the received data, may notify a user or the like of information about AP S1040, or may perform a resolution operation for a threatening network device such as blocking the AP.
According to an exemplary embodiment of the present disclosure, the wall pad 100 may autonomously determine the threat level of the peripheral network device and take a measure, thereby improving the security of the wall pad 100.
Referring to
As described above, the processor 1100, the memory device 1200, the storage device 1300, the power supply 1400, and the display device 1500 included in the computing system 1000 may configure the wall pad 100 according to embodiments of the inventive concept to perform a security monitoring method. In detail, the processor 1100 may perform the method of operating the wall pad 100 described with reference to
The processor 1100 may perform specific calculations or tasks. The processor 1100 may be a micro-processor or a Central Processing Unit (CPU). The processor 1100 may communicate with the memory device 1200, the storage device 1300, and the display device 1500 through a bus 1600 such as an address bus, a control bus, or a data bus. According to an embodiment, the processor 1100 may also be connected to an expansion bus such as a Peripheral Component Interconnect (PCI) bus.
The memory device 1200 may store data necessary for an operation of the computing system 1000. For example, the memory device 1200 may be implemented as a DRAM, a mobile DRAM, an SRAM, a PRAM, an FRAM, an RRAM, and/or an MRAM. The storage device 1300 may include a solid state drive, a hard disk drive, a CD-ROM, etc. The storage device 1300 may store programs, application program data, system data, operating system data, etc., related to the security monitoring methods described above with reference to
The display device 1500 is an output means for performing a notification with respect to a user, and when a security problem occurs, may display information about the security problem to the user and notify the user of the information. The power supply 1400 may supply an operating voltage required for an operation of the computing system 1000.
According to the technical concept of the present invention, by providing a wall pad which performs security monitoring by itself and an operating method thereof, the wall pad can autonomously investigate whether there is a security problem without intervention of a server, etc., and perform various countermeasures therefor, thereby preventing privacy information from being leaked through the wall pad.
Exemplary embodiments have been invented in the drawings and specification as described above. Although embodiments have been described using specific terms in the present specification, they are used only for the purpose of describing the technical spirit of the present invention and are not used to limit the meaning or limit the scope of the present invention described in the claims. Therefore, it will be understood by those of ordinary skill in the art that various modifications and other equivalent embodiments are possible therefrom. Therefore, the true technical protection scope of the present invention should be determined by the technical spirit of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2022-0064557 | May 2022 | KR | national |