Abstract:
A destination location alarm apparatus for providing in the use of public transportation and a method thereof for providing a destination alarm service are provided to notify a user of access of public transportation to a station. A transceiver(310) receives route information from an information guidance machine. A bus station information receiver(320) receives the station information from the inside-vehicle information guidance machine. An alarm processor(330) compares the destination information and the received station information which the user inputs. The destination location alarm service is processed according to the comparison result. The information guidance machine is mounted within the public transport vehicle.
Abstract:
A contents service providing method using the broadcast encryption and an authentication method between devices are provided to perform the authentication between the devices by decoding the encryption information using the confidential key set. The contents service offering method using the broadcast encryption is as follows. The small source device transmits its own ID to a playing component(S201). The playing component receives and stores the MKB(Media Key Block) and the revocation list from the server. The playing component extracts the encryption information from the MKB based on the ID and the revocation list and transmits to the small source device. The small source device receives the encryption information from the playing component(S202). The small source device decodes the encryption information by using the confidential key set(S203).
Abstract:
본 발명은 휴대단말 악성코드 처리 시스템에 관한 것으로, 휴대단말에 탑재되는 악성코드 처리장치와 중앙처리센터 간의 상호협력을 통한 악성코드 검출 시스템을 구성하는 것을 특징으로 한다. 특히 휴대단말에 해를 끼칠 악성코드로 의심되는 정보(프로그램 또는 데이터를 포함)를 검출하는 1차 검출 과정과, 1차 검출된 악성코드로 의심되는 정보가 실제로 악성코드인지를 확인하는 2차 검출 과정을 포함하는 2단계의 검출과정을 구현한 휴대단말 악성코드 처리 시스템이 제공된다. 이에 따라 검출 정확도를 높이면서 휴대단말의 CPU, 메모리, 배터리 오버헤드를 절감하고 통신 오버헤드를 줄일 수 있다. 악성코드, malware, 바이러스, 검출
Abstract:
A method and a system for performing a DRM(Digital Rights Management) function and an additional function by using a DRM device are provided to improve user convenience by enabling a second communication device to perform the DRM function and the additional function with the DRM device connected to a first communication device. A system comprises: a first communications device(120) requesting playback of contents; a DRM device(140) decoding encoded contents corresponding to the requested contents and transmitting the contents encoding the contents again with a preset session key to the first communication device; and a second communication device(130) transmitting data between the first communication device and the DRM device by connecting to the DRM device. The DRM device performs cross certification with the first communication device when session setting is requested. The DRM device generates the preset session key when the cross certification with the first communication device is successful.
Abstract:
A device and a method for detecting an intrusion code are provided to generate a customized immune database capable of determining the intrusion code, prevent damage caused by new or mutated malicious codes with the customized immune database, and obtain a diagnostic for the new or mutated malicious codes from a system having immunity to the new or mutated malicious codes. A setting value input unit(110) receives setting values customized to each group. An immune database generator(120) generates an immune database(140) based on the setting values. An intrusion code determiner(130) determines whether input data is an intrusion code based on the immune database. The setting value input unit receives a group feature key, a resident code list, and a random pool generation factor. The immune database generator includes a feature extractor extracting features of resident codes by using the group feature key, a pool feature generator generating random pool features based on the group feature key and the random pool generation factor, a similarity calculator calculating similarity between the features of the resident codes and the random pools, and an immune database generation manager generating the immune database from the features having the similarity under a threshold.
Abstract:
A method for protecting a broadcast frame, a terminal for authenticating the broadcast frame and an AP(Access Point) for broadcasting the broadcast frame are provided to check effectiveness of a key via a symmetric encryption scheme and to authenticate a BMF(Broadcast Management Frame) as soon as the BMF is received. A method for protecting a broadcast frame comprises the following two steps. An AP broadcasts a beacon and an MBF(Maintenance Beacon Frame) to plural terminals for an MBWP(Maintenance Beacon Waiting Period). The AP broadcasts at least BMF during a BMFWP(Broadcast Maintenance Beacon Waiting Period). The step S310 can be divided into two following sub-steps. The AP generates the MBF including a previous key for a previous beacon cycle, a beacon message integrity code, a BMF number transmitted to a current beacon cycle and a message integrity code(S311) and broadcasts the MBF to the plural terminals(S312).
Abstract:
A method for assigning conditional access system (CAS) keys to a terminal to thus reduce the number of entitlement management messages (EMMs) required to send contents to a digital broadcast subscriber. To this end, a broadcast center causes transmission of the CAS-related key to limit access to the digital content, over a mobile communication network used for a mobile communication, and causes transmission of the digital content over a digital broadcasting network used for digital broadcasts. Since the CAS-related key is transmitted to the digital broadcast subscriber's terminal over the mobile communication network, it is possible to effectively utilize the frequency bandwidth of the digital broadcasting network for the digital broadcasting. Furthermore, the security of the CAS-related key can be strengthened by sending the CAS-related key to the terminal over the mobile communication network.
Abstract:
본 발명은 테이블을 구성하고 있는 비밀키들을 효율적으로 사용함으로서 생성할 수 있는 디지털서명의 개수를 증가시킬 수 있는 방안을 제안한다. 이를 위해 본 발명은 그리스머 코드를 이용하여 디지털서명을 생성하는 방안을 제안한다. 즉, 그리스머 코드(Griesmer code)를 이용하여 전달할 메시지를 설정된 길이를 갖는 코드워드로 변환하고, 변환된 코드워드를 구성하고 있는 각 비트를 테이블을 구성하고 있는 복수 개의 비밀키들 중 하나의 비밀키에 대응시키고, 대응된 비밀키들을 조합하여 상기 디지털서명을 생성하는 디지털서명 생성 장치를 제안한다. 또한 그리스머 코드를 이용하여 수신한 메시지를 설정된 길이를 갖는 코드워드로 변환하고, 변환한 코드워드를 구성하고 있는 각 비트를 테이블을 구성하고 있는 복수 개의 공개키들 중 하나의 공개키에 대응시키고, 대응된 공개키를 조합한 값과 수신한 디지털서명을 해쉬한 값이 동일한 지 여부를 확인하는 디지털서명 수신 장치를 제안한다. 디지털 서명, 멀티 타임 서명, 해쉬 함수, 일방향 함수, 비밀키, 공개키
Abstract:
A method for assigning conditional access system (CAS) keys to a terminal to thus reduce the number of entitlement management messages (EMMs) required to send contents to a digital broadcast subscriber. To this end, a broadcast center causes transmission of the CAS-related key to limit access to the digital content, over a mobile communication network used for a mobile communication, and causes transmission of the digital content over a digital broadcasting network used for digital broadcasts. Since the CAS-related key is transmitted to the digital broadcast subscriber's terminal over the mobile communication network, it is possible to effectively utilize the frequency bandwidth of the digital broadcasting network for the digital broadcasting. Furthermore, the security of the CAS-related key can be strengthened by sending the CAS-related key to the terminal over the mobile communication network.
Abstract:
공개 키를 이용한 데이터 암호화 및 복호화 방법이 개시된다, 본 발명에 따른 데이터 암호화 방법은 데이터를 제1공개 키를 이용하여 제1코드로 부호화하는 단계; 소정 에러 벡터를 선택하고, 선택된 에러 벡터를 제2공개 키를 이용하여 제2코드로 부호화하는 단계; 및 상기 제1코드와 상기 제2코드를 합하여 암호문을 생성하는 단계를 포함함을 특징으로한다.