Abstract:
본 발명은 모바일 단말에 임베디드 하드웨어 보안 장치를 적용하고, 보안 장치를 포함하는 모바일 단말에 저장된 데이터를 안전하게 다른 모바일 단말로 이동 시키는 방법에 관한 것이다. 구체적으로, 제1 단말의 보안 장치 내 데이터를 제2 단말로 이동하는 방법은 서버가 제2 단말로부터 제2 백업용 비밀키와 제2 백업용 공개키로 구성된 키 쌍에 해당하는 데이터 백업용 정보 중 제2 백업용 공개키를 전달받는 단계, 제1 단말로부터 제1 백업용 비밀키와 제1 백업용 공개키로 구성된 키 쌍에 해당하는 데이터 백업용 정보 중 제1 백업용 공개키를 전달받는 단계, 제2 백업용 공개키를 제1 백업용 공개키로 암호화하고, 암호화된 제2 백업용 공개키를 제1 단말로 전달하는 단계, 제2 백업용 공개키를 이용하여 암호화한 데이터를 제1 단말로부터 전달받는 단계 및 암호화된 데이터를 제2 단말로 이동시키는 단계를 포함한다.
Abstract:
The present invention relates to a secure distributed file system for various devices. The secure distributed file system according to the present invention includes: a user unit which sets whether to protect data according to the importance of the data set by application program driven on a mobile device; and a kernel unit which provides a means for accessing a file generated by an application program belonging to the user unit or previously generated. The secure distributed file system exposes key pieces more than a threshold, and makes impossible the reconfiguration of original data unless all devices sharing corresponding file pieces are obtained, even when a situation capable of key restoration occurs. The present invention provides the merits of overcoming the inefficiency of an existing protection technique encrypting the entire file, the burden of a cost on the configuration of a distributed file system relying on a central server, and the security vulnerability to files stored in a single device.
Abstract:
The present invention is a mobile computing system for providing an execution environment with outstanding security. This mechanism separates the execution environment by using a virtualization technique within the same mobile terminal, and it facilitates the protection of individual privacy by managing the execution environment for each user through the same hardware security module. [Reference numerals] (110,120) Owner execution environment; (111,121,) Operating system; (112,122) Application; (113,123) Hardware security module device driver; (130) Hardware security module; (140) Virtual hardware security module device driver
Abstract:
PURPOSE: An apparatus and a method for providing near field communication for a mobile device is provided to minimize the power consumption of a mobile terminal for a non-contact service by providing the non-contact service only through one near field communication device of a chip or an IC card type. CONSTITUTION: A USB signal processing unit (100) converts signals of a mobile terminal into processible information in a central processing unit (108). The USB signal processing unit converts the value offered from the central processing unit into signals to be transmitted to a USB interface. An analog signal processing unit (102) converts analog signals from external devices into digital signals. The analog signal processing unit converts digital signals from the central processing unit into analog signals and transmits the signals to an antenna. A non-contact digital signal processing unit (104) converts the processed value in the central processing device unit into digital signals and transmits signals. A reset signal control unit (106) generates a system reset signal in response to a non-contact reset signal generated from the analog signal processing unit. [Reference numerals] (100) USB signal processing unit; (102) Analog signal processing unit; (104) Non-contact signal processing unit; (106) Reset signal control unit; (108) Central processing unit; (112) Password processing unit; (AA) Power (Vcc); (BB,CC) System reset; (DD) Non-contact state; (EE) Antenna +; (FF) Antenna -; (GG) Non-contact reset; (HH) Non-contact click; (II) Non-contact TX; (JJ) Non-contact RX; (K1,K2,K3,K4) Reset; (LL) Cluck; (MM) Memory control unit; (NN) Non-volatile memory / Safe storage space
Abstract:
PURPOSE: A long distance personal authentication system and method thereof are provided to offer a personal authentication service which privacy is reinforced by comparing biometric data acquired by a portable security token apparatus with standard biometric data. CONSTITUTION: A storage unit(120) stores the secret information and biometric information of a user An electronic signature processing unit(170) authenticates the electronic signature of the user by using the secret information. A communication unit(110) receives the biometric information of the user sensed by a long distance biometric data collection apparatus. A control unit(130) authenticates the user by comparing the received biometric data with the stored biometric data. The communication unit transmits the personal authentication result of the control unit to the biometric information collection apparatus. The storage unit stores the biometric information including face, iris, or voice information.
Abstract:
PURPOSE: A method for recognizing a fingerprint is provided to protect an original feature point from a fingerprint by adding a plurality of fake fingerprints. CONSTITUTION: A reference feature point(310) is selected from the extracted original feature point. A feature shape is formed based on the information of the selected reference feature point. A space between feature points(330) is calculated by determining the number of fake feature points to be added to the shape. A fingerprint template is generated by adding the fake feature points with the calculated space.
Abstract:
본 발명은 방범 시스템에 관한 것으로, 영상 촬영 장치를 통해 촬영된 촬영 영상이 현장 제어 장치에 입력되면 해당 촬영 영상에서 이벤트가 발생하는지를 체크하고, 이벤트가 발생하지 않은 경우 네트워크 전송 용량에 따라 축소 인코딩된 촬영 영상을 실시간으로 전송하여 출력하거나, 이벤트가 발생한 경우 해당 촬영 영상에 대한 이벤트 정보, 클리핑 영상 및 축소 인코딩된 촬영 영상을 전송하고, 이러한 이벤트 발생에 따른 이벤트 경보를 원격 관제 장치에서 출력하며, 해당 클리핑 영상 및 촬영 영상을 출력함으로써, 고해상도 영상을 출력할 수 있는 방범 시스템을 쉽게 구축할 수 있는 것이다.
Abstract:
PURPOSE: A user information management method of a user terminal and a user terminal are provided to reinforce self-determination right and a control power of a user about exposure and use of user information, thereby safely and efficiently managing the user information. CONSTITUTION: A user terminal requests issuance of authentication certificate(S200). A certification agency issues the certificate(S210). If the user terminal requests joining the member to a web service provider, the web service provider requests information necessary for joining the member(S220,S230). A certificate generation unit generates a certificate(S240). The web service provider certifies a user through the certificate in the certificate(S260). The web service provider transmits authentication result to the user terminal(S270).
Abstract:
PURPOSE: A method of user information protect using an anonymous ID and a web service system having a protecting function are provided to protect the privacy of a user by classifying user information into multi-stages and restricting the range which can be retrieved through a real or anonymous ID. CONSTITUTION: An anonymous ID generator(21) generates an anonymous ID matched a real ID which passes through a real name authentication. A user information database(25) stores the user information and the right information into plural groups classified according to importance. The right information stores not only the retrieval allowance information using the real and anonymous IDs but also retrieval allowance information depending on the level of web service provider. An information management unit(24) controls the retrieval of the user information according to the agreement of the user and the right information.