Abstract:
PURPOSE: A message encoding-decoding device using a virtual keyboard and a recording medium recording a program for executing the method in a computer are provided to prevent privacy exposure by hiding a message of a user from other attackers in a corporation providing a service or in between by encoding message contents of users. CONSTITUTION: A message encoding-decoding device(120) using a virtual keyboard includes a virtual keyboard unit(130), a message encoding unit(140), a message copy unit(150), and a message decoding unit(160). The virtual keyboard unit inputs a message in a performed application in a user terminal. The message encoding unit encodes the inputted message in the virtual keyboard unit with a predetermined technique. If the message copy unit receives the encoded message transmitted from the opponent user terminal in the application performed in the user terminal, the message copy unit displays the received encoded message on the virtual keyboard after copying the message. The message decoding unit decodes the encoded message displayed on the virtual keyboard through the message copy unit with a predetermined technique. [Reference numerals] (110) Application unit; (125) Service layer; (130) Virtual keyboard unit; (140) Message encoding unit; (150) Message copy unit; (160) Message decoding unit; (170) Information notification unit; (AA) Application execution
Abstract:
본 발명은 보안 시스템에서 사용 가능한 아이디 생성 방법에 관한 것이다. 개시된 기술은, 보안 시스템에서 사용 가능한 아이디 생성 방법에 있어서,(a) 인증 서버가 인증 아이디를 생성하고 셋톱박스에 상기 인증 아이디를 전달하되, 상기 인증 아이디는 상기 셋톱박스의 아이디 및 초기 서비스 키를 이용하여 산출되는 값을 가지는 단계; (b) 이동 단말이 상기 셋톱박스에 상기 이동 단말의 아이디를 전달하는 단계; 및 (c) 상기 셋톱박스가 보안 아이디를 생성하고, 상기 인증 서버 및 상기 이동 단말에 상기 보안 아이디를 전달하되, 상기 보안 아이디는 상기 이동 단말의 아이디, 상기 인증 아이디를 이용하여 산출되는 값을 가지는 단계를 포함한다.
Abstract:
애드 혹 네트워크에서 우회경로를 고려한 다중경로 라우팅 장치 및 방법이 개시된다. 메시지 수신부는 복수의 노드로 이루어진 애드 혹 네트워크의 시작노드로부터 목적노드로 전송된 라우팅 요청 메시지에 대응하여 목적노드로부터 시작노드로 향하는 라우팅 응답 메시지를 목적노드와의 사이에 위치하는 중계노드인 이전노드로부터 수신한다. 안정도 산출부는 링크상태 정보 및 상기 라우팅 응답 메시지에 포함된 이전노드의 안정도 값을 기초로 우회경로의 설정 가능성을 나타내는 안정도 값을 산출한다. 메시지 전송부는 산출된 안정도를 라우팅 응답 메시지에 추가하여 시작노드를 향해 전달한다. 본 발명에 따르면, 우회경로를 고려하는 안정도를 기초로 라우팅 경로를 설정하여 경로가 충분히 확보된 밀집 지역을 통해 패킷을 전송할 수 있게 되어 패킷 재전송 확률이 줄어들고 보다 효율적인 라우팅이 가능하다.
Abstract:
PURPOSE: Public key based authentication apparatus and method are provided to improve the safety with respect to man-in-the-middle attach by authenticating public values which are used in a password algorithm. CONSTITUTION: An authentication value generating part(110) calculates an initial hash key and the first initial result value of a hash function. The authentication value generating part calculates a first authentication value based on the first initial result value. A transmission parameter calculating part(120) generates a first hash public value and a hash function input message. The transmission parameter calculating part calculates a first collision value. A communicating part(130) the first hash public value, the first collision value, first current time information, the first authentication value, and a first public key to a second communication node. A receiving parameter calculation part(140) calculates the hash function result value of the second communication node. A security key generating part(150) generates a security key for transmitting and receiving data with respect to the second communication node.
Abstract:
PURPOSE: An improved 3GPP-AKA method for an efficient management of an authentication procedure in a 3G network are provided to solve the asynchronous problem of the authentication vector by using a time stamp shared by an USIM(Universal Subscriber Identity Module) terminal and a service network. CONSTITUTION: In an improved 3GPP-aka method for an efficient management of an authentication procedure in a 3G network, a user registration and authentication vector distribution are performed in AKA(Authentication & Key Agreement) process(S110,S111,S112). A mutual certification between MS and SN and an encrypting key exchange are operated in the AKA process(S113,S114).
Abstract:
PURPOSE: By using the private key and the public key which directly becomes between two terminals the key exchange system and method are proceed the key exchange. CONSTITUTION: A key exchange system is composed of a client(101), and a server(102) and proxy server(103). The proxy server establishes the signaling pathway between server and client. Client is for its own created the RSA(Rivest Shamir Adleman) private key and RSA public key. Server is for its own created the RSA private key and RSA public key.
Abstract:
PURPOSE: A method for mutually authenticating between mobile nodes in an infrastructure based ad hoc network environment applying a hierarchical domain key and a method for distributing a secession key are provided to reduce a message overhead and a delay time due to authentication and a session key exchange by sharing the session key through the minimum message exchange. CONSTITUTION: An access router(101) generates a hierarchical local key and distributes the hierarchical local key to a corresponding wireless AP(111). A mobile node performs an initial authentication process for a network access. The mobile node receives key information which generates the hierarchical local key from the access router. The mobile node creates the key. The mutual authentication and session key are shared between the mobile nodes which belong to the same wireless AP domain.
Abstract:
PURPOSE: A method for authenticating EAP-AKA(Extensible Authentication Protocol - Authentication and Key Agreement) is provided to reduce an additional cost by maintaining high stability without an additional hardware in an EAP-AKA authentication process. CONSTITUTION: Non-UICC(Universal Integrated Circuit Card) terminals generate a short-term key of 128 bit by using Diffie-Hellman algorithm. The non-UICC terminals generate g^H and g^r value in order to authorize exponential calculation of Diffie-Hellman public key value to HSS/HLR(Home Subscriber Server/Home Location Registrar). The generated value is stored to UE(User Equipment). The non-UICC terminals receive M3, M4, and M5 value from the HSS/HLR(S421). The non-UICC terminals generate the public key value by using M3 value, g^H and g^r value(S422).