Abstract:
The present invention relates to a file server, a program file transmitting method using the same, and a program file falsification preventing system. According to the present invention, the file server includes: a file separating part separating a program file into a general file and a core file composed of a core code to be protected from falsification; an encoding part selectively obfuscating the general file and the core file or encoding the files using a secret key; a communication part transmitting the obfuscated or encoded general file to a user client; and a storage part storing the obfuscated or encoded core file. The communication part transmits the obfuscated or encoded core file to the user client in accordance to a request of the user client. According to the present invention, an obfuscating technique is distributed to a client and a server so that a reverse engineering level increases. Moreover, a falsification detection routine is inserted into a software program distributed from the server so that the reliability of the falsification detection routine increases; and a decoding secret key of the encoded core code is dynamically generated and transmitted to an extra channel such as an SMS so that a key is prevented from being exposed on a network.
Abstract:
The preset invention relates to an apparatus to authenticate a user and a method thereof. An apparatus to authenticate a user of the present invention includes: a user input/output unit to provide a plurality of cells having a grid cell structure on a touchscreen and to receive cell selection information of a user; a password setting unit to receive selection information about a plurality of password cells selected from the cells by the user in order to set a user password; and an authentication unit to provide an arbitrary starting cell selected from the cells, and sequentially comparing a selection direction of the adjacent cells selected by the user based on the starting cell with an arrow direction displayed on the password cells corresponding to the priority of the password cells to determine whether the selection direction is identical to the arrow direction, thereby approving user authority. According to the present invention, since a location of a real password cell cannot be recognized even though all the process of authenticating a user is recorded, it may be expected to prevent a user password from being easily seized. In addition, since the arrows are randomly output to the cells of each grid for every authentication, a very powerful security may be expected.
Abstract:
The present invention relates to a password authentication apparatus using sensing information and a method thereof. The password authentication apparatus using the sensing information according to an embodiment of the present invention comprises: a password input recognition unit which recognizes motion information, sensed from a user terminal, as at least one password input; a final password input determination unit which determines the recognized password input as a final password input by using proximity information sensed from the rear of the user terminal; and an authentication processing unit which authenticates the final password input by comparing the determined final password input with a preset password. Since a user does not directly touch or operate a screen of the user terminal when inputting a password of the user terminal, it is possible to prevent the password from being exposed or hacked by observation of a third party. [Reference numerals] (110) Password input recognition unit; (120) Final password input determination unit; (130) Authentication processing unit
Abstract:
The present invention relates to an apparatus for obfuscation of an application code and a method for the same. The apparatus according to the present invention comprises: an input unit for receiving codes used for application; a code division unit for analyzing the input code to divide the analyzed code into important codes, which need to be protected from application forgery or modulation attack, and general codes including calling codes for calling the important code; a code conversion unit for converting the important code into a native code form; an encryption unit for encrypting the important code and inserting the address information of an important code connector which stores each address information of the important code; a control unit for separating the calling code from the general code, registering the separated calling code in a management server, and adding a calling code loading routine for request of the calling code and a vector table loading routine for request of a vector table which includes the vector information of the called important code; and a code combination unit for combining the obfuscated general code and important code to generate application. According to the present invention, important codes among codes constituting the application are converted into native codes, and reverse engineering vulnerability existing in the managed code is complemented by applying the encryption by code protection techniques based on self conversion to the converted important code in order to improve the security against application forgery or modulation. Additionally, the control flow is converted by the dynamic vector, and calling codes for calling the important code, which is converted into the native code, and a vector table for connecting the calling code are separately managed to dynamically load the calling code and the vector table if the application is executed. Thus, the resistance to reverse engineering analysis can be enhanced. [Reference numerals] (AA) Start;(BB) End;(S210) Input the code of an application;(S220) Distinquish important codes from ordinary codes;(S230) Convert the important codes into native codes;(S235) Add a starting routine;(S240) Scramble the identifiers of the converted important codes and ordinary codes;(S245) Obfuscate the converted important codes;(S250) Create the address of a connection unit for important codes;(S255) Separate calling codes from the ordinary codes;(S260) Transmit and register the calling codes;(S270) Add a calling code loading routine and a vector table loading routine to the important codes;(S275) Compile and encode the converted important codes;(S280) Create executable files by compiling the ordinary codes;(S290) Create combined files by combining the executable files and the native codes
Abstract:
본 발명은 아이피티브이 서비스에 가입한 사용자가 댁내에서 이동 가능한 아이피티브이 서비스 가용 단말 즉, 스마트 폰, PDA, 노트북 등 소형 이동 단말을 통해 아이피티브이 서비스를 댁내 및 댁외로 이동할 경우에도 사용할 수 있도록 지원하는 인증 방법 및 장치에 관한 것이다.
Abstract:
PURPOSE: An authentication system for a mobile terminal in an IPTV environment is provided for an IPTV service subscriber to receive an IPTV service, which has been provided to the premises with the mobile terminal, outside the premises on the move. CONSTITUTION: TA(Trust Authority)(201) certifies and registers an STB(Set Top Box)(204) and creates a signature for entrusting a signature creation right with the STB. The STB verifies the signature. An MD1(206) creates a share key. The STB registers the MD1 and creates a signature. The STB transfers the signature to the MD1. The MD1 requests an IPTV service. The STB transfers an encoded service key to the MD1. The MD1 receives the IPTV service with the service key.