Abstract:
The present invention relates to a method of logistics which can be used to protect personal information used in the logistics process. The method of logistics according to an embodiment of the present invention includes the steps of transmitting cargo information from a sender terminal to a central authentication server; verifying the integrity of the cargo information received to the central authentication server; generating a sender bar code and a recipient bar code corresponding to the cargo information and transmitting the bar codes from the central authentication server to a distributor terminal; decoding the recipient bar code received to the distributor terminal with a unique secret key, and transmitting the decoded information to the central authentication server; transmitting a recipient authentication number to the recipient terminal from the central authentication server when a distributor repudiation prevention token received to the central authentication server and another distributor repudiation prevention token generated in central authentication server matches; decoding the sender bar code in the recipient terminal and transmitting the decoded sender bar code to the central authentication server; and transmitting a delivery completion message to the sender terminal after the central authentication server verifies the tracking number and the recipient authentication number received to the central authentication server.
Abstract:
무인증서 기반 서명을 이용한 디바이스의 펌웨어 관리 장치 및 방법이 개시된다. 본 발명의 일례에 따라 디바이스의 펌웨어를 관리하는 방법은, 펌웨어 서버가 키 생성 서버로부터 펌웨어 서버 자신의 식별자에 대응하는 부분 비밀키를 수신하고, 부분 비밀키에 기초하여 공개키 및 비밀키를 생성하고, 비밀키를 이용하여 펌웨어의 해쉬값에 대한 서명값을 생성하며, 펌웨어와 서명값을 결합하여 배포용 펌웨어 이미지를 생성한다.
Abstract:
Disclosed is an apparatus and a method for managing device firmware using a non-certificate-based signature. The method for managing device firmware according to an example of the present invention includes the steps of: a firmware server receiving a partial secret key corresponding to an identifier of the firmware server itself from a key creating server; creating a public key and a secret key based on the partial secret key; creating a signature value for a hash value of the firmware using the secret key; and combining the firmware and the signature value to create a firmware image for release. [Reference numerals] (310) Receiving a partial secret key corresponding to an identifier of the firmware server itself from a key creating server; (320) Creating a public key and a secret key based on the partial secret key; (330) Creating a signature value for a hash value of the firmware using the secret key; (340) Combining the firmware and the signature value to create a firmware image for release; (AA) Start; (BB) End
Abstract:
본 발명은 스마트 그리드 환경에서, 스마트 미터와 데이터 수집 장치와 AMI 서버 간에 암호화 통신을 위한 보안 키를 효율적으로 설정할 수 있는 공개키 기반의 키 공유 메커니즘을 이용한 보안 키 설정 방법에 관한 것으로서, 암호화 통신을 하고자 하는 두 장치가 각각 두 개의 랜덤값을 생성하고, 공개키 기반 암호화 방식을 통해서 상호 생성한 두 랜덤값을 교환하고, 교환한 상대방의 랜덤값 중 하나의 랜덤값을 다시 상대방에 전달함으로써 상호 키 동의를 수행하고, 키 동의가 이루어지면 두 장치가 각각 생성한 랜덤값 중에서 나머지 랜덤값을 이용하여 보안 키를 설정하는 것이다.
Abstract:
본 발명은 차량용 데이터의 인증 및 획득 방법에 관한 것으로, 보다 구체적으로는 차량 내 구비되는 적어도 하나의 제어부 및 다른 네트워크와의 연동을 위한 게이트웨이제어부가 상기 차량의 내부 네트워크를 통해 차량용 데이터를 송수신하는 차량용 데이터의 인증 및 획득 방법은 상기 게이트웨이제어부가 인증키 및 암호화키를 생성하여 상기 제어부로 전송하는 키교환단계; 상기 제어부가 메시지 전송완료를 나타내는 사이클카운터값을 이용하여 전송하고자 하는 메시지에 대한 가공메시지를 생성하고, 상기 가공메시지를 포함하는 네트워크 패킷에 대한 메시지인증코드를 생성한 후 전송하고자 하는 패킷 내 상기 메시지인증코드를 포함시켜 전송하는 패킷전송단계; 및 상기 패킷을 수신한 제어부가 상기 패킷에 포함된 메시지인증코드를 확인하고, 상기 패킷 내 포함된 메시지를 복호화하여 획득하는 메시지획득단계;를 포함하는 것을 특징으로 한다. 이러한 구성에 의해, 본 발명의 차량용 데이터의 인증 및 획득 방법은 차량에 대한 관련정보를 나타내는 메시지를 암호화한 후, 차량 내 구비되는 제어부로 전송되기 때문에 상기 메시지가 위변조되는 것을 방지할 수 있는 효과가 있다.
Abstract:
PURPOSE: A data authentication and acquisition method for a vehicle is provided to prevent messages from being forged. CONSTITUTION: A gateway control unit and a control unit store a public key certificate (S110). The gateway control unit generates an authorization key and a code key and transmits the authorization key and the code key to the control unit (S120). The control unit generates processing messages desired to be transmitted by using a cycle counter value expressing the completion of message transmission and generates a message authorization code on a network packet including the processing messages so that the processing messages with the message authorization code in the packet are transmitted (S130). The control unit confirms the message authorization code included in the packet and acquires the messaged included in the packet by decoding the messages (S140). [Reference numerals] (AA) Start; (BB) End; (S110) Gateway control part stores public key certificate; (S120) Gateway control part produces an authentication key and encryption key and transmit them to a control part; (S130) Control part produces a fake message and transmits packet to another control part; (S140) Control part which received the packet confirms MAC
Abstract:
PURPOSE: A content sharing method of a DRM system is provided to easily share content between user terminals by re-encoding a right certificate key encoded through a public key of a user terminal. CONSTITUTION: A right issue server encodes a right certificate encoding key for using content by using a public key stored in a first user terminal and transmits the right certificate including an encoding key about the content and the right certificate encoding key to a first user terminal(S230). The first user terminal transmits packaged content and the right certificate to a second user terminal(S240). The first user terminal generates a re-encoding key for re-encoding the right certificate encoding key by using the public key of the second terminal and a private key stored in a first user terminal and transmits the right certificate encoding key to the right issue server(S270). [Reference numerals] (120) Content issue server; (140) Right issue server; (160) First user terminal; (180) Second user terminal; (AA,S310) Transmit contents in packaging state; (S210,S250) Transmit a public key; (S220) Encode a right certificate encoding key using the public key; (S230) Transmit the encoded right certificate encoding key and a right certificate; (S240) Transmit the contents in packaging state and the right certificate; (S260) Generate a reencoding key using a private key and the public key; (S270) Transmit the reencoding key and an encoded right certificate encoding key; (S280) Reencode the encoded right certificate encoding key using the reencoding key; (S290) Transmit the reencoded right certificate encoding key; (S300) Obtain the right certificate encoding key after decoding the reencoded right certificate encoding key using the private key
Abstract:
PURPOSE: Proxy re-encryption method and proxy re-encrypted message decryption method are provided to be safe from collusion attack of a proxy and not to be exposed of encryption key of a mandator. CONSTITUTION: Two secret keys are generated by using a public parameter a master secret key and mandator personal identification information(310). A message is encrypted by using the public parameter and the mandator personal identification information(320). A re-encryption key is generated by using the two secret keys, the mandator personal identification information and a proxy identification information(330). The encrypted message is re-encrypted by using the re-encryption key(340). [Reference numerals] (310) Generating two secret keys by using a public parameter, a master secret key, and mandator personal identification information; (320) Encrypting a message by using the public parameter and the mandator personal identification information; (330) Generating a re-encryption key by using the public parameter, the two secret keys, the mandator personal identification information, and proxy identification information; (340) Re-encrypting the encrypted message by using the re-encryption key; (AA) Start; (BB) End
Abstract:
PURPOSE: A group calculation system and method thereof are provided to protect the participant of privacy by calculating t-repetition value in encrypted environment. CONSTITUTION: Tupels of all cryptographs are acquired by using PPSU(Privacy Preserving Set Union) protocol. Participants create the tuples. The tuples are distributed to other participants. All participants acquire t-repetition numbers from the tuples. All participants acquire the t-repetition value by decoding a group.
Abstract:
PURPOSE: A method for setting up a key based on an elliptic curve cryptograph in a wireless sensor network, a wireless sensor network system and a recording medium thereof are provided to guarantee the PFS(Perfect Forward Secrecy) without influencing session keys used in prior sessions. CONSTITUTION: A method for setting up a key based on an elliptic curve cryptograph in a wireless sensor network comprises the following steps. A security administrator generates the first random number-hidden information by using a public key and then transmits it to a sensor node(S200). The sensor node generates the second random number-hidden information by using the public key. The first session key is generated by using the first random number-hidden information. Authentication information including the first session key and a secret key of the sensor node is generated. The second random number-hidden information and authentication information are transmitted to the security administrator(S210).