Abstract:
PURPOSE: A multimedia content harmfulness determining method is provided to reduce determining error due to harmfulness determining restriction of mechanical learning. CONSTITUTION: A deciding result confirmation unit updates a continuous decision result value and a continuous decision result number by comparison of a stored local decision result(S205,S209). The deciding result confirmation unit confirms whether a temporary buffer unit is full with a local decision result(S211,S215). A global deciding unit stores the local decision result in a final result buffer unit(S221).
Abstract:
PURPOSE: According to the kind and category of a video, a harmful video blocking apparatus and method based on multimodal and multiscale features are provided to perform multi-stage harmfulness filtering suitable for each scale. CONSTITUTION: A multiscale feature analysis unit(110) creates multiscale features. A harmfulness classification model generator(120) creates multilevel harmfulness classification models. A harmfulness decision unit(130) decides the harmfulness of a video with comparison between at least one of the multiscale feature of the input video and at least one of the multilevel harmfulness classification model. In case the video is harmful, a harmful video blocking unit(140) secludes the input video.
Abstract:
PURPOSE: A device and method for analyzing obscene content based on audio data are provided to block the section of content in which obscene grade is marked while reproducing the content by marking the obscene grade on the obscene section. CONSTITUTION: A content input unit(110) inputs content. An input data buffering unit(121) stores the content corresponding to the analysis section longer than the preset analysis section. An obscenity analyzer and obscenity decider(133, 145) determine the obscenity of the analysis section for the audio data extracted from the content. If the content is obscene, the obscene grade is marked in the analysis section. A content player(140) blocks the analysis section in which obscene grade is marked and reproduces the content.
Abstract:
PURPOSE: A method of user information protect using an anonymous ID and a web service system having a protecting function are provided to protect the privacy of a user by classifying user information into multi-stages and restricting the range which can be retrieved through a real or anonymous ID. CONSTITUTION: An anonymous ID generator(21) generates an anonymous ID matched a real ID which passes through a real name authentication. A user information database(25) stores the user information and the right information into plural groups classified according to importance. The right information stores not only the retrieval allowance information using the real and anonymous IDs but also retrieval allowance information depending on the level of web service provider. An information management unit(24) controls the retrieval of the user information according to the agreement of the user and the right information.
Abstract:
본 발명은 클러스터 시스템에 관한 것으로, 특히 외부침입으로 변조된 운영체계나 프로그램의 운용을 방지할 수 있도록 한 클러스터 시스템 및 그의 프로그램 관리방법에 관한 것이다. 이를 위하여 본 발명은 유사성을 갖는 하나 이상의 노드의 프로그램을 통합 운영하는 클러스터 시스템에 있어서, 고유 ID를 할당받아 프로그램을 운용하는 하나 이상의 노드와; 상기 고유 ID를 할당하고, 상기 프로그램에 서명을 추가하여 상기 노드로 분배하는 보안관리 서버를 포함하는 클러스터 시스템 및 이를 통해 수행되는 클러스터의 프로그램을 관리하는 방법을 제공한다. 클러스터, OS프로그램, 운용 프로그램, 노드
Abstract:
An apparatus and a method for integratedly managing invasion detection rules in an IPv4 and IPv6 combined network are provided to easily re-use an already developed IPv4 and IPv6 intrusion detection system by using a framework of an invasion detection rule integrated management. A GUI(Graphic User Interface)(110) receives an intrusion detection rule from the exterior. A correlation analyzer(120) analyzes the correlation between an IPv4 and an IPv6 included in the received intrusion detection rule, and automatically converts the received intrusion detection rule by using the analyzed results. A storage unit(150) stores the correlation information between the converted intrusion detection rule and the IPv4 and the IPv6 in a corresponding database. An IPv4 intrusion detection rule manager(130) manages an intrusion detection rule of an IPv4 and transfers the intrusion detection rule of the IPv4 and the previously stored correlation information to an IPv4-based IDS(Intrusion Detection System)(20). An IPv6 intrusion detection rule manager(140) manages an intrusion detection rule of the IPv6, and transfers the intrusion detection rule of the IPv6 and the previously stored correlation information to an IPv6-based IDS(10).
Abstract:
A method of blocking network attacks using information included in a packet, and an apparatus thereof are provided. The method includes: receiving a packet containing information on the packet including at least information on a source from which the packet is sent, and information on a destination to which the packet is sent; and extracting the information on the packet included in the packet, comparing the information with a predetermined access control condition, and blocking or passing the packet. By doing so, a packet being transferred with a routing header capable of bypassing a security device as in an Internet Protocol version 6 (IPv6) network can be appropriately blocked or passed. Accordingly, security problems caused by the routing header can be overcome, and as a result, usage of the routing header can be promoted. Also, since a routing header can be used for transmitting a packet along a desired path, the routing header can be widely used without security problems, and can ease network security concerns relating to IPv6 networks that are expected to come into increasingly wide use.
Abstract:
An apparatus and a method for preventing conflict of addresses are provided to previously prevent possibility of the address conflict which can be generated when a stateful address autoconfiguration technique and a stateless address autoconfiguration technique are simultaneously provided in the IPv6(Internet Protocol version 6) network environment and when an arbitrary address is manually configured instead of the stateless address autoconfiguration technique, thereby preventing the conflict during network connection of various mobile terminals and home appliances through the stateless address autoconfiguration technique. An apparatus(100) for preventing conflict of addresses comprises the followings: a receiver(110) for receiving a packet if the packet includes an NS(Neighbor Solicitation) message for confirming whether the addresses is used or not on the basis of a header of the packet received by using a promiscuous mode; a uniqueness determiner(120) for determining whether an address, which is included within the received NS message and will be used, is consistent with N number of fixed addresses; and a conflict informer(130) which transmits an NA(Neighbor Advertisement) message showing that the address, which will be used, is redundant if the address which will be used is consistent with an address, which is not configured yet, among the N number of fixed addresses.
Abstract:
PURPOSE: An apparatus and a method for encrypting user authentication information and data using MAC(Mandatory Access Control) and RBAC(Role Based Access Control) are provided to perform an encrypting process corresponding to a grade of the user information by encrypting selectively a transmitting file according to an important grade of the transmitting file. CONSTITUTION: An apparatus for encrypting user authentication information and data using MAC and RBAC includes an FTP client program(10), a kernel layer(20), an FTP demon program(15), and a security database(30). The FTP client program(10) provides a user authentication information request and a server connection request. The kernel layer(20) is used for requesting the user authentication according to the server connection request of the FTP client program. In addition, the kernel layer is used for performing an encrypting/decrypting processing data of the FTP client program when being connected by a grade of MAC corresponding to the user authentication request. The FTP demon program(15) is used for analyzing the encrypted user authentication information and performing a user authentication process according to the grade of MAC. The security database(30) is used for storing the grade of MAC for the client and the grade of MAC for the data.
Abstract:
PURPOSE: An apparatus and a method for providing a reliable channel in a security OS(Operating System) to which MAC(Mandatory Access Control) is applied is provided to offer a new header for independently encoding a packet used in communication by a security level of the MAC and minimize network performance degradation using the security level of the MAC. CONSTITUTION: If data according to a communication request provided from a transmission-side user(S1) are for a packet transmission request, a reliable channel subsystem(12) judges whether a reliable channel is applied. If the reliable channel is applied, the reliable channel subsystem(12) composes a reliable channel header, encodes a specific portion of a packet, stores authentication information in the reliable channel header, and transmits the packet through a network(A). A MAC module(20) provides MAC information for indicating whether the reliable channel is applied. A kernel memory(30) provides an encryption key and an authentication key necessary for encoding a reliable channel application host address and the packet and generating authentication data. A reliable channel subsystem(12-1) retrieves the authentication data of the reliable channel header before decoding the packet received through the network(A). If the authentication data are valid, the reliable channel subsystem(12-1) decodes the encoded packet. If process for the reliable channel is ended, the reliable channel subsystem(12-1) transmits the packet to an upper level to transmit the packet to a reception-side user(S2). A kernel memory provides an authentication key and an encryption key necessary for checking authentication with respect to the packet encoded by the reliable channel subsystem(12) and decoding the packet.