Abstract:
The present invention can prevent a malicious use of a terminal user or an internal attacker by dividing an encryption key of a user terminal into separate encryption key pieces and managing the separate encryption key pieces in order to provide a software based stable key management for an encryption key used in the user terminal in a platform operation environment such as a DRM, a game, Internet banking, and on-line shopping requiring reliability of a terminal by a server. Further, when a security key is upgraded due to a safety policy and other reasons, not in the case of exposing the security key, only a security key module can be separately updated without destroying a public key authentication.
Abstract:
PURPOSE: A runtime providing apparatus and a method for application service sealing execution provide a security virtualization interface layer for application service data requiring security consumption, and thereby maximize security of application service execution or application service data consumption. CONSTITUTION: A security virtualization interface layer (310) has an application service received through a user space (300) use hardware resources (450) and kernel services (432) of the lower part of a kernel space (340). A container parser (410) separates a virtualization security code and an application service from a service container received from a service providing server (100). A security virtualization interface generator (412) uses the virtualization security code and service policy to produce security virtualization interface. A virtualization service injector (414) stacks the application service in a VM (Virtual Machine) (420) through the security virtualization interface layer according to a policy in the security virtualization interface. [Reference numerals] (AA) Start; (BB) End; (S500) Receive a service container; (S502) Classification by Information in the service container; (S504) Deliver a virtualization security code and relevant information to an SVIF generator; (S506) Deliver a service(service data) to a VS injector; (S508) Generate a virtual interface after requesting and receiving a service policy; (S510) Separate application for the service required?; (S512) Request and receive the application; (S514) Inject the application service(application) to a virtual machine using a security virtualization interface; (S516) Is the security virtualization interface using code verification abnormal?; (S518) Request the implement or consumption of the application service(application); (S520) Stop the application service(application)
Abstract:
PURPOSE: An authentication method for blocking and detecting forgery packets and a device thereof are provided to fundamentally defend a source area from malicious attacks by forwarding normal packets from a router. CONSTITUTION: A packet reception unit(102) receives packets from a user host or a previous node. A self-guarantee ID(Identity) generation unit(112) generates a self-guarantee ID for a source area node of the received packet. A self-guarantee ID verification unit(104) determines the forgery state of a source area address by using the self-guarantee ID. A packet transmission unit(106) transmits a packet in which the source area is verified to a next network node. [Reference numerals] (102) Packet reception unit; (104) Self-guarantee ID verification unit; (106) Packet transmission unit; (108) White list storage unit; (110) Self-guarantee ID generation unit; (112) Blacklist storage unit; (AA) Origin non-verified packet; (BB) Origin verified packet
Abstract:
PURPOSE: An agent device for sharing security information based an anonymous identifier among security management domains and a method thereof are provided to share security information based on an identifier based on hash, thereby preventing leakage of personal information included in the security information. CONSTITUTION: An identifier conversion unit(220) converts a real name identifier included in security information into an anonymous identifier and converts security information based on the real name identifier into security information based on the anonymous identifier. A security information communication unit(240) transmits the security information based on the anonymous identifier to the outside of a security management domain in order that security management domains share the security information. The identifier conversion unit converts the real name identifier included in the security information into a hash identifier which is the anonymous identifier by using a one-way hash function. [Reference numerals] (210) Security information providing unit; (220) Identifier conversion unit; (230) Identifier mapping information storage unit; (242) Security information transmitting unit; (244) Security analyzing information receiving unit; (250) Security analyzing information processing unit; (312) Security information receiving unit; (314) Security analyzing information transmitting unit; (320) Identifier reference storage unit; (330) Security information analyzing unit; (340) Reception agent device determination unit; (AA) Anonymous based security information; (BB) Anonymous based security information analyzing result
Abstract:
PURPOSE: An apparatus and a method for quantitative security policy evaluation are provided to quantitatively evaluate a security polity on a heterogeneous network through a quantitative evaluation model. CONSTITUTION: A security policy analyzing unit(102) analyzes a security policy of a network. An estimation reference defining unit(104) defines an evaluation standard. An estimation result calculating unit(106) calculates an evaluation result of each security component. A weight calculating unit(108) groups the security components according to a security function. A quantitative estimating unit(110) estimates a security polity of each group.
Abstract:
PURPOSE: A method and apparatus for preventing leakage and misuse for the client's derivative personal information are provided to protect the client's derivative information from the leakage and misuse by the internal operator by automatically analyzing the work action of a service operator according to the security policy of the service provider and detecting the abnormal action of the service operator in real-time. CONSTITUTION: An method for preventing leakage and misuse for the client's derivative personal information includes the steps of: monitoring the Internet service operator's information search, the combination of the searched information with other information, and the usage of the derivative personal information derived from the searched information; and, if the matters on the violation of work by an operator is detected, executing handling of the violation of work for the individual Internet service operator(320). The range of using the client's information is different depending on the level of the client registered to the service and the level of the service operator.
Abstract:
PURPOSE: A method and apparatus for providing data freshness check of media data are provided to configure an SVC(Scalable Video Coding) and conversion information as a message digest with a feature and control information by layer. CONSTITUTION: A scalable media transmitter(100) transmits feature information and control information which are extracted from the encoded and converted scalable media data. A scalable media receiver(300) verifies the integrity of the scalable media. A secure directory(400) stores the characteristic information and control information. A scalable media reuse device(500) requests the retransmission of the scalable media to the scalable media receiver.
Abstract:
PURPOSE: A real time content service method and an apparatus for the same are provided to secure a safety for whole service section by regulating security intensity based on a single security mechanism. CONSTITUTION: A secure memory generator(114) creates security message which recognizes encryption information of a media content. The media content is extracted by layers through an SVC(Scalable Video Coding) content layer extracting unit(112). A bit stream transmitter(116) transmits the security message and a media content extracted by the layers into a bit stream type. An interconnector(400) changes the media content into a reusable content.
Abstract:
A device and a method for protecting credit information and IP of a user against information denial attack are provided to block intrusion of malicious information, prevent illegal information leakage, prevent illegal action of an authorized user, and prevent an unauthorized user from malicious using the information by monitoring inbound/outbound contents in a network level. An inbound processor(201) blocks a harmful traffic by determining whether the harmful traffic is included in the inbound contents by using a black list. An integrated IAM(ID and Access Management)/NAM(Network Access Management) solution part(203) detects/blocks an internal abnormal action or fraud attack for the credit information and the IP by controlling user and device access. An outbound manager(202) prevents leakage of the credit information and the IP in the outbound contents by using a white list. The inbound processor determines the attack by combining a rule-based using a rule database and action-based attack determination result using a traffic action pattern.