Abstract:
무선 액세스 포인트와 통신을 수행하는 단말장치 및 이의 통신 제어 방법이 개시된다. 개시된 단말장치는 MAC 주소 인증방식을 이용하여 인증을 수행하는 무선 액세스 포인트(AP)와 통신을 수행하는 통신부; 상기 통신부의 MAC 주소와는 다른 임의의 MAC 주소를 생성하는 MAC 주소 생성부; 및 상기 통신부 및 상기 MAC 주소 생성부의 동작을 제어하는 제어부를 포함하되, 상기 무선 AP로부터 전송된 신호가 상기 통신부를 통해 최초로 수신된 경우, 상기 제어부는 상기 MAC 주소 생성부가 상기 임의의 MAC 주소를 생성하도록 제어하고, 상기 통신부가 상기 임의의 MAC 주소를 상기 무선 AP로 전송하도록 제어한다.
Abstract:
Disclosed is an apparatus for authenticating secure sockets layer/transport layer security (SSL/TLS). A private key generator generates a plurality of private keys associated with each other using SSL/TLS private keys to separately store the private keys in a first cloud and a second cloud. A protocol unit receives an SSL/TLS generation request message from a web browser to start an SSL/TLS handshake protocol. A private key operating unit enables the first cloud to transmit a private key operation request message to the second cloud, and the second cloud receives the private key operation request message to transmit a private key operation result message to the first cloud. An SSL/TLS channel forming unit shares a private key with the web browser based on the private key operation result message received by the first cloud to form an SSL/TLS channel. The present invention may stably protect the private key from malicious access of a public cloud in a cloud environment and form a stable SSL/TLS channel to stably protect a web user and a web server.
Abstract:
A terminal device communicating with a wireless access point and a method for controlling the same are disclosed. The terminal device comprises a communication unit which communicates with a wireless access point (AP) performing authentication by using MAC address-based authentication; an MAC address generation unit which generates a random MAC address different from the MAC address of the communication unit; and a control unit which controls operations of the communication unit and the MAC address generation unit, wherein, if a signal transmitted from the wireless AP is received via the communication unit for the first time, the control unit controls the MAC address generation unit to generate the random MAC address and the communication unit to transmit the random MAC address to the wireless AP. [Reference numerals] (AA) Start; (BB) End; (S310) Receive a signal transmitted from a wireless AP for the first time; (S320) Generate a random MAC address; (S330) Transmit the random MAC address to the wireless AP; (S340) The received signal includes an authentication request message or the webpage blocked through a network is a webpage for authentication?; (S350) Transmit an original MAC address to the wireless AP; (S360) Communicate with the wireless AP using the original MAC address; (S370) Block communications with the wireless AP
Abstract:
PURPOSE: A wireless network access control method and a device thereof are provided to selectively connect users to a network by authenticating the users again. CONSTITUTION: A policy setting unit(220) confirms the number of specific terminal devices which are connected in a current state according to a confirmation result. The policy setting unit sets an access selection policy based on the number of the confirmed specific terminal devices. An access control unit(230) releases the connection for the terminal devices. The access control unit identifies whether the terminal device is the determined specific terminal device. The access control unit allows the identified terminal device to access a network according to the access selection policy set based on the identification result. [Reference numerals] (210) State determination unit; (220) Policy setting unit; (230) Access control unit
Abstract:
PURPOSE: A group key management device, a method, and a program recording medium thereof are provided to effectively handle breakaway members by including a random number distribution technology in a ubiquitous state based on community. CONSTITUTION: A transmission unit(330) transmits a first group key to a first user. The transmission unit transmits a first random number value to an existing user except for the first user in order to generate the first group key by combining the existing group keys. The transmission unit transmits a second random number value to the other user except for a second user in order to generate a second group key by combining the existing group keys. [Reference numerals] (310) Joining and breakaway management unit; (320) Group key generation unit; (330) Transmission unit
Abstract:
PURPOSE: A method for transmitting and receiving contents is provided to supply an IPTV(Internet Protocol Television) service in a safe method by reducing communication overheads caused by applying a security system based on an existing CAS(Conditional Access System) in a mobile IPTV environment. CONSTITUTION: A security system for a mobile terminal comprises a mobile terminal(110), a set top box(120), a content server(130), and an authentication server(140). The mobile terminal performs network access authentication for the authentication server in an initial stage. The mobile terminal registers an ID(Identification Number) and a profile of the mobile terminal in the set top box. The mobile terminal receives an IPTV(Internet Protocol Television) service from the content server. The mobile terminal comprises a Smart phone, a tablet PC, and a PDA(Personal Digital Assistants), etc. The mobile terminal performs network access authentication through EAP(Extensible Authentication Protocol)-AKA(Authentication and Key Agreement).
Abstract:
PURPOSE: A method of generating a usable id in a security system is provided to supply an IPTV(Internet Protocol Television) service in anytime a user wants in a safe method by using a mobile terminal in a mobile IPTV service environment. CONSTITUTION: A security system for a mobile terminal comprises a mobile terminal(110), a set top box(120), a content server(130), and an authentication server(140). The mobile terminal performs network access authentication for the authentication server in an initial stage. The mobile terminal receives an IPTV(Internet Protocol Television) service from the content server by registering an ID(Identification Number) and a profile of the mobile terminal in the set top box. The mobile terminal performs network access authentication through EAP(Extensible Authentication Protocol)-AKA (Authentication and Key Agreement).
Abstract:
PURPOSE: Public key based authentication apparatus and method are provided to improve the safety with respect to man-in-the-middle attach by authenticating public values which are used in a password algorithm. CONSTITUTION: An authentication value generating part(110) calculates an initial hash key and the first initial result value of a hash function. The authentication value generating part calculates a first authentication value based on the first initial result value. A transmission parameter calculating part(120) generates a first hash public value and a hash function input message. The transmission parameter calculating part calculates a first collision value. A communicating part(130) the first hash public value, the first collision value, first current time information, the first authentication value, and a first public key to a second communication node. A receiving parameter calculation part(140) calculates the hash function result value of the second communication node. A security key generating part(150) generates a security key for transmitting and receiving data with respect to the second communication node.
Abstract:
본 발명은 자동차 블랙박스 영상물 수집 방법에 관한 것으로, 사건사고와 관련된 영상물을 중앙 서버에서 요청할 경우, 각 개인 차량 블랙박스에 저장된 영상물들 중에서 사건사고와 관련 있는 영상물 일부만을 선택해서 중앙서버에 제공하는 자동차 블랙박스 영상물 수집 방법에 관한 것이다. 중앙서버에서 시간과 GPS 위치 정보에 대한 사건사고 리스트를 알려주면, 각 차량은 과거 전송한 사건사고 리스트를 선별 후 전송된 기록이 없는 사건사고 리스트에 대해서 블랙박스 영상물을 검색하여, 상기 사건사고 리스트에 해당되는 영상물이 존재할 경우 운전자의 동의를 얻은 다음 중앙서버로 전송하게 된다. 따라서, 본 발명은 운전자가 사건사고 현장을 지나갈때의 영상물만을 제공함으로써, 운전자의 프라이버시 침해 소지를 최소화하며, 유무선통신망을 통한 데이터 전송량을 최소화할 수 있어 현실적으로 적용이 가능하고, 특정 지역의 도로 상태 및 주변 상황 정보를 파악하는데 활용할 수 있는 효과가 있다. 자동차, 블랙박스, 중앙서버, 사건사고 리스트, 영상물
Abstract:
PURPOSE: A pre-authentication method for media independent handover is provided to reduce message overhead due to addition of a message. CONSTITUTION: An MIHIS(Media Independent Handover Information Server)(203) successfully performs an initial authentication process. The MIHIS is used as a proxy signature generating device which generates a signature instead of an authentication server(101). A signature right is entrusted by a safe security channel between the authentication server and the MIHIS. The information of a candidate target network is requested to the MIHIS by a MIH GET Information Sig Request message. The MIHIS generates candidate target network information and a proxy signature. The MIHIS transfers the candidate target network information and the proxy signature using an MIH_GET_Information_Sig Response message.