Abstract:
기존의 지능형 로봇 서비스 환경에서는, 콘텐츠를 생성하고 분배하는 콘텐츠 서버의 안전성을 보장할 수 없을 뿐 아니라, 전송 도중 비인가된 접근에 의해서 콘텐츠가 불법 수정될 수 있는 문제점이 있다. 이에 본 발명에서는, 키 관리 서버에서 콘텐츠 서버 및 로봇으로 키를 분배하고, 콘텐츠 서버에서 생성되는 콘텐츠에 대해 키를 이용한 서명값을 생성하여 로봇으로 분배하며, 로봇에서는 키 관리 서버의 키에 대한 서명값과 해당 콘텐츠에 포함된 서명값을 비교하여 서로 일치하는 경우에 해당 콘텐츠를 실행시킬 수 있도록 하였다. 본 발명에 의하면, 지능형 로봇 서비스 시스템에서의 콘텐츠 생성 과정 및 분배 과정의 안전성과 신뢰성을 확보할 수 있는 효과가 있다. 로봇 보안, 콘텐츠 보안, 지능형 로봇
Abstract:
PURPOSE: A flight plan state management apparatus for plan control and method thereof are provided to accurately manage a departure state and an arrival state of flight by using a departure/arrival-only state processor. CONSTITUTION: A flight plan management device(200) generates a flight plan list based on the inputted flight plan. The flight plan management device sets up the flight plan state of the flight plan included in the flight plan list. A departure/arrival management device(400) generates a departure/arrival flight list based on the set flight plan.
Abstract:
A method for managing a host in an active network node using active sensors and a system thereof are provided to execute host management at a small outlay and strengthen internal security by reflecting the virus and spam requirements of all hosts through an active network node, without the necessity of installing a dedicated anti-virus/anti-spam system, and executing a suitable patch through checking for weaknesses of an OS(Operating System). An active network node, connected to a host, collects information related to system security from active sensors which work in the host(S310). Based on the collected security-associated information, the active network node forwards a necessary patch file to the host and instructs the host to make up for weak points(S320). The active sensors download the patch file, drive it, and execute necessary updates.
Abstract:
PURPOSE: A system and a method for detecting/responding to a harmful traffic through linkage among multiple heterogeneous harmful traffic detecting/responding devices are provided to protect network by distributing a security policy to the harmful traffic detecting/responding devices with use of a programmable packet and detecting/responding to the harmful traffic through the linkage of the devices. CONSTITUTION: A programmable policy manager generates the security policy applied to the harmful traffic detecting/responding devices(14,22,24,32) by initial input of a user, stores the security policy to a policy repository, and reads/converts a profile of the harmful traffic detecting/responding device into the programmable security policy executable on each harmful traffic detecting/responding device. A programmable policy processor fills a payload part of an IP(Internet Protocol) packet with the programmable security policy. A programmable policy certifier attaches a certification header to the IP packet and encrypts the IP packet. A programmable packet manager converts the completed IP packet into the programmable packet and transfers the programmable packet to the harmful traffic detecting/responding device.
Abstract:
PURPOSE: A method of back-tracking an attacker by using log information of edge routers on the Internet is provided to record log information on all packets accessing to inside from edge routers of each network, thereby back-tracking the packets regardless of a changed IP address of the attacker. CONSTITUTION: When an attacker attacks an invasion host, an internal invasion detecting system senses the invasion(201). The system informs a managing server of an internal network of the invasion(202). The managing server inquires of all edge routers of the network to analyze an invasion-detected log corresponding to a trace of the attacker' packet(203), and decides whether the invasion trace is searched through an internal edge router(204). If so, the managing server requests a managing server of other network corresponding to the invasion trace to log-analyze self edge routers(205). If the invasion trace is not searched, the managing server decides that a hacker exists in the internal network(208).