Abstract:
Disclosed are a method for provisioning a profile to an embedded universal integrated circuit card (UICC) using the capability information of the reliable embedded UICC and a mobile communication terminal therefor. The disclosed method comprises the steps of: allowing an embedded UICC mounted in a mobile terminal to transmit its own capability information to a registration management device; allowing the embedded UICC to form a security channel with the registration management device and perform authentication, according to a response message from the registration management device; allowing the embedded UICC to agree on an encryption key and an MAC key for profile provisioning with the registration management device, based on the capability information, after the step of performing authentication; allowing the embedded UICC to receive a profile and a MAC value, which are encrypted based on the agreed encryption key and MAC key, from the registration management device; and allowing the embedded UICC to verify the MAC value, based on the agreed encryption key and MAC key, decode the encrypted profile, and install the decoded profile therein.
Abstract:
PURPOSE: A system and a method for detecting intrusion using a hybrid neural network are provided to detect the intrusion including an unknown intrusion pattern and to process the intrusion in real-time. CONSTITUTION: A packet collector(110) collects a packet existed on the network. A packet preprocessor(120) patterns the collected packet through a preprocessing process in order to use the packet collected through the packet collector as an input value of the neural network. An intrusion detection pattern learning part(210) learns the patterned packet by receiving the patterned packet from the packet preprocessor and using the clustering neuron network, and clusters the intrusion detection pattern by using a data distribution and a frequency. An intrusion detection judging part(220) receives a clustering result value and the connection level information of the patterned packet, learns the intrusion detection judgment through the result value and the connection level information by using the learning neuron network, and detects the intrusion.
Abstract:
자료 유출 방지를 위한 이동 저장매체 제어 장치 및 방법이 개시된다. 본 발명에 따른 자료 유출 방지를 위한 이동 저장매체 제어 장치는, 연결된 저장매체가 이동 저장매체인지 판단하는 저장매체 확인부; 상기 저장매체가 상기 이동 저장매체인 경우, 상기 저장매체에 대한 계층적 구조의 계층 저장매체 정책을 획득하는 저장매체 정책 획득부; 및 획득된 상기 계층 저장매체 정책을 이용하여 저장매체 연결 상태 및 저장매체 사용 상태를 변경하여 상기 저장매체를 제어하는 저장매체 제어부를 포함한다.
Abstract:
가상 머신을 이용한 암호화 장치 및 방법이 개시된다. 본 발명에 따른 가상 머신을 이용한 암호화 장치는, 보조 매체로부터 암호화용 데이터를 획득하고, 응용프로그램의 암호화 요청에 따라 상기 암호화용 데이터를 이용하여 상기 응용프로그램의 보호 대상 데이터를 암호화하여 제공하는 하이퍼바이저부; 및 상기 응용프로그램 및 상기 하이퍼바이저부 간 가상화 인터페이스를 제공하는 하이퍼콜부를 포함한다.
Abstract:
Disclosed are an encryption apparatus in a virtual environment using an auxiliary medium and a method thereof. The encryption apparatus in the virtual environment using the auxiliary medium according to the present invention includes: a hypervisor unit which obtains encryption data from the auxiliary medium, encrypts the protection target data of an application program by using the encryption data according to the encryption request of the application program, and supplies the encrypted data; and a hyper call unit which supplies a virtualization interface between the application program and the hypervisor unit.
Abstract:
PURPOSE: A system and a method for detecting intrusion using a hybrid neural network are provided to detect the intrusion including an unknown intrusion pattern and to process the intrusion in real-time. CONSTITUTION: A packet collector(110) collects a packet existed on the network. A packet preprocessor(120) patterns the collected packet through a preprocessing process in order to use the packet collected through the packet collector as an input value of the neural network. An intrusion detection pattern learning part(210) learns the patterned packet by receiving the patterned packet from the packet preprocessor and using the clustering neuron network, and clusters the intrusion detection pattern by using a data distribution and a frequency. An intrusion detection judging part(220) receives a clustering result value and the connection level information of the patterned packet, learns the intrusion detection judgment through the result value and the connection level information by using the learning neuron network, and detects the intrusion.
Abstract:
PURPOSE: A device and method for chasing the root of an invader is provided to execute a reverse chase of the root of an invader sequentially without changing components of a network through all networks including the Internet. CONSTITUTION: A detection module(7) detects an invasion and analyzes an invasion-detected system. A reverse chase agent(2) obtains an IP address of a previous system based on traces created in the system caused by an invasion. A server(4) receives an IP address of the system analyzed from the detection module(7) and the reverse chase agent(2), and monitors/manages a chase state of the reverse chase agent(2). An agent installation module(5) installs the reverse chase agent(2) in the system of the IP address being supplied from the server(4). An analysis module(3) communicates the reverse chase agent(2) with the server(4) safely and analyzes the system based on the obtained IP address. A data managing module(6) stores a series of chase and analysis processes being supplied from the server(4) and supplies data necessary for a searching process to the server(4).