Abstract:
PURPOSE: A content rights protecting method is provided to easily perform the access and use of a legitimate user about contents. CONSTITUTION: A digital rights management (DRM) agent determines whether a content which a user requests to a device has integrity or not (S110). The DRM agent collects a content identifier of a content which has integrity, a time at which the use of the content is requested, and content user location information of the time which is requested to use (S120). The DRM agent transmits the collected information to a server. The server determines whether 'a different content which has a content identifier which is same with the obtained content identifier' is used in a different place or not by using the transmitted time and location information (S130). [Reference numerals] (AA) Start; (BB) End; (S110) Determine whether there is integrity of contents or not; (S120) Collect the identifier, sight, and location information of contents; (S130) Determine whether the same content identifier is used or not
Abstract:
PURPOSE: A signal collection method for analyzing a sub-channel of USB(Universal Serial Bus) security token and a device thereof are provided to analyze the sub-channel of universal USB security token regardless of a protocol, thereby increasing the availability of the USB security token. CONSTITUTION: A power measurement unit(104) measures a power signal between a USB socket and a power terminal. A monitoring unit(106) monitors an I/O signal of a USB channel or generates a trigger signal corresponding to a monitoring signal. A memory unit(108) stores monitored data. A PC communication unit provides a communication environment with a PC. When an operation of USB security token which is connected through the USB socket is completed, a board control unit(110) transmits the data stored in the memory unit to the PC through the PC communication unit. A trigger signal measurement unit(114) measures a trigger signal generated through the monitoring unit and analyzes a sub-channel. [Reference numerals] (10) USB security token; (102/1) USB terminal 1; (102/2) USB terminal 2; (104) Power measurement unit; (106) Monitoring unit; (108) Memory unit; (110) Board control unit; (112) PC communication unit; (114) Trigger signal measurement unit; (116) Power supply unit; (AA) Power source
Abstract:
PURPOSE: A device for generating a power simulation waveform in encryption algorithm hardware and a method thereof are provided to easily implement sub channel analysis or safety evaluation. CONSTITUTION: An input part(100) receives an input text with a plurality of bits corresponding to the power state of encryption hardware. A separation part(200) separates the input text into a plurality of groups including at least one bit or into a plurality of groups according to time. A waveform application part(300) searches for waveforms, corresponding to each group separated from the separation part, in a waveform storage part(350) and applies the searched waveform to corresponding groups. An integration part(400) integrates all the waveforms for each group and finally generates a power simulation waveform in encryption algorithm hardware. [Reference numerals] (100) Input part; (200) Separation part; (300) Waveform application part; (350) Waveform storage part; (400) Integration part; (500) Display part
Abstract:
본 발명은 시선 트래킹을 위한 눈 검출 장치 및 그 방법에 관한 것으로서, 상세하게는 눈의 단순한 이미지 특성만을 고려한 눈 필터를 이용하는 것이 아니라, 복수의 학습 얼굴 이미지 내의 눈 이미지를 이용하여 다양한 눈의 이미지가 고려된 평균 눈 필터를 생성하고, 입력 얼굴 이미지에 그 생성된 평균 눈 필터를 적용하여 눈을 검출함으로써, 일반적인 눈 필터와 패턴 매칭을 통한 눈 검출에 비해 눈 검출의 성능 및 속도를 향상시킬 수 있다.
Abstract:
HTTP를 이용한 서버와 클라이언트 간의 통신에서, 클라이언트로부터 서버로 전송되는 불완전한 GET 요청 메시지에 의한 서비스 거부(DoS) 공격을 탐지하는 방법이 제공된다. 상기 클라이언트가 전송하는 하나의 GET 요청 메시지의 GET 요청 패킷 개수를 카운팅하는 과정을 포함한다. 만약 클라이언트가 전송하는 하나의 GET 요청 메시지가 TCP(Transmission Control Protocol)에서 설정된 MSS값(Maximum Segment Size)보다 클 경우 GET 요청 메시지를 MSS값에 따라 분할하여, 상기 서버로 전송하는 분할된 GET 요청 패킷 개수를 카운팅하는 과정 또한 포함하고, 상기 MSS값을 이용하여 상기 클라이언트가 상기 서버로 하나의 GET 요청 메시지를 분할하여 전송 할 수 있는 패킷의 최대 개수(이하 분할된 GET 요청 최대 패킷 개수)를 계산하는 과정 및 상기 분할된 GET 요청 패킷의 카운팅 된 개수와 상기 분할된 GET 요청 최대 패킷 개수를 비교하여 상기 GET 요청 메시지의 정상 여부를 판단하는 과정을 포함한다.
Abstract:
PURPOSE: A forensic index method using distribution processing and a device thereof are provided to increase or decrease used resources corresponding to the amount of analyzed data, thereby implementing performance adjustment. CONSTITUTION: A division object data management unit(100) generates division object data by dividing indexing object data corresponding to division setting. A division index data generation unit(200) assigns the division object data to data processing units corresponding to the division setting. The division index data generation unit extracts an index by filtering the division object data. The division index data generation unit generates division index data including the index. An index database management unit(300) generates index database by merging the division index data. [Reference numerals] (100) Division object data management unit; (200) Division index data generation unit; (210,CC) Distribution storage unit; (230,DD) Filtering unit; (250,EE) Index extraction unit; (270,FF) Division index data generation unit; (300) Index database management unit; (AA) First data processing unit; (BB) n-th data processing unit
Abstract:
The present invention relates to a method for data encryption and a method for data search using a conjunctive keyword and more particularly to, a method for searching data stored in a server by using a conjunctive keyword after storing an index table for the conjunctive keyword and encrypted data in the server. According to an embodiment of the present invention, since keywords and relevant data do not need to be searched one by one by performing a conjunctive keyword search by using a linked tree structure modifying a linked list, it is possible to perform a rapid and efficient conjunctive keyword search.
Abstract:
PURPOSE: A smart wallet service device and a hierarchy structure for the same are provided to perform a personal information protection function by supplying a security technique through a smart wallet service device for managing mobile identity. CONSTITUTION: A management module(412) inputs user setup and installation of a smart wallet service. A security module(414) supplies an authentication service through an authentication certificate or an electronic signature. A storage module(416) stores or manages data in database of a mobile device. A functional module(418) supplies a service for e-commerce.
Abstract:
PURPOSE: A sub-channel protection masking addition apparatus is provided to minimize increase of hardware area and to maximize the efficiency of operation without a conversion operation. CONSTITUTION: A random value generating unit(110) generates a sum random value and first/second random values. An operation unit(120) receives first/second random values and a random masking value. A carrier generating unit(130) generates carrier input by using an operation result. A sum bit generating unit(140) generates a sum bit by using the first/second masking values.
Abstract:
PURPOSE: A method for verifying key validity and a sever for performing the same are provided to reduce necessary operation times for verifying key validity in a signature process or a signature verification process by providing various services based on anonymous authentication. CONSTITUTION: An anonymous authentication server(110) revokes an anonymous secret key owned currently(S810). The anonymous authentication server is opened by generating a revocation list(S820). A service providing server(120) generates a LRL(Local Revocation List) by using a revocation list and its own LL secret key(S830). The service providing server calculates a virtual index of a service user through the signature of a service user(S840). The service providing server verifies the validity of a key of the service user based on the presence of the virtual index included in the local revocation list(S850).