Abstract:
PURPOSE: A system and a method for managing client information and a client terminal and an apparatus for managing the client information are provided to manage corresponding information by using an authentication element and an encryption key. CONSTITUTION: A system for managing client information comprises a client terminal group(100), a network(200), a client information management apparatus(300). The client terminal group requests subscription and authentication by using an authentication element and an encryption key. The network connects the client terminal group with the client information management apparatus. The network includes a broadband communication network and a local area network, etc. The client information management apparatus manages client information in an encrypted type.
Abstract:
PURPOSE: A content management method, system, and rights object management apparatus are provided to prohibit illegal usage for content by enabling a user who has rights for releasing rights object to use content through a mobile storage apparatus. CONSTITUTION: A content playback apparatus receives content from a content service providing apparatus(S504). A rights object management apparatus receives binding rights objects from a content service providing apparatus(S506). When the content playback apparatus requests the rights objects of the content to the rights object management apparatus, the right object management apparatus release the binding of the binding rights objects. The released binding rights objects are loaded on the content playback apparatus(S514).
Abstract:
PURPOSE: A method for analyzing and validating data which are collected through the internet and a system thereof are provided to generate an index database for a webpage that a user visits and web mail content and search online data in real time. CONSTITUTION: An online data forensic server(210) collects and analyzes usage history information from a target device for data collection. The online data forensic server downloads and collects data in the Internet based on the usage history information and requests and receives a timing check token for the collected data. A timing check token issuing server(220) issues a timing check token for the collected data and provides the timing check token to the online data forensic server.
Abstract:
PURPOSE: A content protection device and a method thereof through combination between additional information and encoding key are provided to prevent decoding of additional information by changing an encoded key when changing additional information. CONSTITUTION: An encoding unit(150) generates an encoding key for encoding requested data and generates encoded data. An additional information managing unit(170) manages additional information including right information about the encoded data. A white box password processing unit(160) generates a white box password table for combining the encoded key and the additional information. A combined data generating unit(180) generates combined data for combining additional information through encoding of the white box encoding table.
Abstract:
본 발명은 어플리케이션 프로토콜인식을 이용한 네트워크 침입탐지 방법 및 장치에 관한 것으로, 네트워크 상에서 보호 대상 서비스에 대하여 어플리케이션 프로토콜의 모델을 자동으로 생성하고 이를 적용하여 서비스와 시스템을 보호함으로써, 대상 서비스에 대한 사전 지식 없이도 프로토콜 모델을 생성할 수 있어, 대상에 대한 사전 조사에 소요되는 자원 및 시간의 낭비를 방지하고, 지나치게 복잡하지 않으면서 단순하지 않은 모델을 생성하므로 오탐 및 미탐의 확률을 크게 감소시켜 정확성이 향상되고, 복수의 서버에 대한 보안 서비스의 동시 제공이 가능하므로 확장성이 크게 향상되는 효과가 있다. 침입탐지, 키워드, 키워드리스트, 프로토콜모델, PTA, DFA
Abstract:
PURPOSE: A privacy masking method and apparatus of an image are provided to improve the efficiency of a system with the protection of personal information. CONSTITUTION: A masking processing unit detects a privacy area, in which the privacy protection is required, from an image(110). The masking processing unit performs the masking of the image(120). An unmasking processing unit detects a masked privacy area from the masked image(130). The unmasking processing unit performs the unmasking of the masked image(140).
Abstract:
PURPOSE: Personalized service providing system and method are provided to maintain anonymity and to offer personalized service by adding an approval function for supporting personalized service to an authentication function using signature. CONSTITUTION: A service providing server(30) requests an attribute certificate according to service request, confirming the validity of the attribute certificate, and determines the offer of the service. An anonymous authentication server(11) provides the anonymous information of a user in response to request. An attribute issuance server(20) transmits the request for issuing attribute certificate of a user terminal(40) to an anonymous certificate server.
Abstract:
PURPOSE: An anonymity authentication and qualification verification method is provided to accomplish authentication on the basis of a short group signature scheme offering anonymity. CONSTITUTION: A user terminal(120) selects a random number as a personal key. In case the personal key ownership verification information of the user terminal is effective, a group management server(110) issues a signature key for the user terminal through a master secret key. The group management server issues a qualification certificate for the user terminal through the issued signature key. A service providing server(130) performs authentication and qualification verification for the user terminal.
Abstract:
PURPOSE: By fasting and easily extracting the IP address and system information of connector the web user tracing device and the method using the signature code grasp the network information and location of connector. CONSTITUTION: One or more access terminal(110) requests the web page. According to the web server(120) is request, the web page including the signature code is offered to each access terminal. According to the monitoring server(130) is the execution of the signing code, the connection information extracted from each access terminal is a message received.