Abstract:
PURPOSE: An intranet security managing system is provided to use a web browser by a management interface for performing every system as well as intranet security management, and to access a managing system regardless of distance and place, thereby restricting management by managers and general users through user authentication. CONSTITUTION: When a management request is inputted from a web browser, a request processor(111) analyzes the management request and transmits the request to a managing block. A response processor(112) inputs a managed result for the management request, and transmits the result to the web browser. A network map editor(114) stores network information in a network DB(113), and enables a user to easily manage a configured state of a network. An IPsec packet monitor(115) monitors an IPsec packet in real time, and makes statistical information to analyze IPsec capacity. When a problem occurs while supplying an IPsec service, an audit event processor(116) informs a manager of the problem. An SNMP stack(117) manages an SNMP session between a managing block and an agent, and performs a function related to generate/transmit/respond to an SNMP PDU.
Abstract:
The present specification discloses a method for analyzing user′s behavior and an apparatus using the same and, more specifically, to a method for analyzing user′s behavior in a smartphone and an apparatus using the same. The apparatus for analyzing user′s behavior in a smartphone disclosed in the present specification includes: an input unit which receives the download number information of a smartphone application; a dictionary generation unit which classifies a folder name generated when a smartphone application is installed in a smartphone with respect to the smartphone application with download frequency information more than a preset value, according to preset classification standards to create an application dictionary; an extraction unit which extracts the folder name of the smartphone application from a storage unit of the smartphone in which the smartphone application is stored; and an analysis unit which matches the extracted folder name to the application dictionary according to the classification standards to analyze the use pattern of a smartphone user.
Abstract:
본 발명은 증거 데이터 수집 장치 및 그 방법에 관한 것으로, 저장매체를 확보하기 어려운 인터넷 상의 웹데이터나 기업 데이터베이스에서 쿼리를 통해 얻은 온라인 데이터 혹은 정보통신공간 상에서 수집된 각종 온라인 데이터 등과 같이 대용량의 공유 디스크에서 수집된 각종 온라인 데이터에 대하여 타임스탬프의 기능과 스크린캡쳐 기능을 선택 혹은 혼합적으로 수행하여 온라인 데이터의 증거 능력을 확보함으로써, 특정한 시점에 특정 데이터가 존재했음을 확인하여 하드디스크 드라이브를 압수하지 않고도 증거의 원본성 및 유효성을 확보할 수 있으며, 온라인데이터에 대한 증거능력을 향상시킬 수 있다. 온라인 데이터, 타임스탬프, 스크린캡쳐, 포렌식 이미지, HDD
Abstract:
PURPOSE: A speeding up method of a password checking process of the encrypted Microsoft Office 2007 file is provided to eliminate the item with the constant value within the arrangement and is provided to heighten the processing function. CONSTITUTION: A password which is inputted from a user is converted into the Unicode format of the double length (S10). In a process of generating an arrangement, which is configured with 4 byte variables from the 64 byte data segment for the SHA-1 hash value calculation, the item in which the arrangement value is the constant value is detected among the arranged items (S20). The item in which the arrangement value is the constant value is eliminated from the arrangement (S30). [Reference numerals] (AA) Start; (BB) End; (S10) Password which is inputted from a user is converted into the Unicode format of the double length; (S20) Process of generating an arrangement, which is configured with 4 byte variables from the 64 byte data segment for the SHA-1 hash value calculation, the item in which the arrangement value is the constant value is detected among the arranged items; (S30) Item in which the arrangement value is the constant value is eliminated from the arrangement; (S40) Calculate SHA-1 value and store HashRsul value; (S50) Calculate SHA-1 value and store HashRsul value on 64 bite to obtain 20 bite; (S60) Decode AES-128 bite on 16 bite ENCRYPTEDVERIFIER and 32 bite EncryptedVerifierHash; (S70) Check ecact password letter order
Abstract:
PURPOSE: A data visualization device and a method thereof are provided to visualize combination data as meaningful information by using a correlation included in the combination data even though data of different sources and different users is combined. CONSTITUTION: A single data collecting unit(110) collects single data having different formats. A first multi data generating unit(120) generates first multi data with first single data having the same format. A second multi data generating unit(130) generates second multi data with the first single data, second single data having a different format from the first single data's, and the first multi data. A data visualizing unit(140) visualizes the single data, the first and the second multi data. [Reference numerals] (110) Single data collecting unit; (120) First multi data generating unit; (130) Second multi data generating unit; (140) Data visualizing unit; (150) Power supply unit; (160) Main control unit
Abstract:
PURPOSE: A digital forensic device of cloud computing is provided to collect a digital forensic evidence when the leakage of a restricted document or the infringement of copyright occurs by using a messenger in a social network based on cloud computing. CONSTITUTION: A messenger information collecting unit(110) collects investigation-related information, output images and voices of a computer including a messenger, and files and messages of the messenger. A cloud storage investigation unit(120) collects and analyzes use information of a cloud storage service to generate a report. An evidence storage unit(130) stores a digital forensic evidence collected by the cloud storage investigation unit and the messenger information collecting unit. [Reference numerals] (100) Digital forensic device; (110) Messenger information collecting unit; (120) Cloud storage investigation unit; (130) Evidence storage unit