Abstract:
PURPOSE: A method for transmitting an access policy between routers by using identity is provided to correlate identity information as a public key with a personal key corresponding to the information by introducing a public key concept, thereby remarkably reducing calculations and transmissions without session keys. CONSTITUTION: An extension initializer(10) transmits a message to a policy manager(12)(S51). The policy manager(12) transmits a response message to the extension initializer(10)(S52). The extension initializer(10) transmits an encoded message, which is identity of a target router(11), to the target router(11)(S53). The target router(11) decodes the received message with a personal key, confirms an extension code and a policy, and transmits an encoded confirm message to the extension initializer(10) in order to inform the extension initializer(10) whether an extension is successfully installed(S54).
Abstract:
PURPOSE: A system and a method for encoding/decoding images are provided to block a cryptographic attack carried out through analysis of encrypted information. CONSTITUTION: An image encoding system includes an image splitter(110), a random image generator(120), an encoder(130), and a phase card generator(140). The image splitter splits an input binary image into split images. The random image generator generates random images as many as the number of the split images. The encoder exclusive-ORs the split images and the random images one to one to generate encoded images as many as the number of the split images. The phase card generator gives phase values of pi and zero to pixel values of black and white constructing the encoded images to generate respective phase cards for the encoded images.
Abstract:
PURPOSE: A device and a method for discriminated a security service on a wide range network are provided to detect a large-scale attack through the network and confront the attack depending on a security level by discriminating/setting a security path to a security service request as classifying a security service into each security level and assigning the security level to respective devices. CONSTITUTION: A network security service framework comprises a security policy server(1) and a security policy executing system(2) performing a network security service on the wide range network(10). A security policy transferring/managing communication protocol stack(20) transmits the security policy information between the security policy server and the security policy executing system. A security management domain has a discriminated security requirement and confronting function.
Abstract:
PURPOSE: A method for preventing the stack overflow of a kernel level on a computer OS(Operating System) is provided to prevent the system admin authority acquisition using the stack overflow by copying/executing a signal code to an executable segment in the OS kernel and interrupting the code execution in a stack area. CONSTITUTION: A stack execution is prevented by initializing an executing code segment and a data segment in the kernel, and setting a limit of the executing code segment and the data segment(210,220). A signal return processing code for the stack execution is copied to the executable segment. A general protection fault trap generated when the stack overflow is executed in the stack area, is processed.
Abstract:
PURPOSE: A method for interworking an accounting server separated from a diameter-based AAA authentication server is provided to separate a server for authentication and authority apply from an accounting server, thereby reliably connecting the authentication server with the accounting server as synchronizing the servers. CONSTITUTION: An authentication server(41) authenticates a user, generates data related to an authentication success reason or an authentication failure reason, and completes an authentication/authority verification process(S1). The authentication server(41) transmits basic information including session information and session activation information including supplementary information to an accounting server(42)(S2). An AAA client(43) generates new accounting data to generate an ACR(Account Request) message, and transmits the ACR message to the authentication server(41)(S4). The authentication server(41) transmits the ACR message to the accounting server(42)(S5). The accounting server(42) stores the ACR message, and transmits an ACA(Account Answer) message to the authentication server(41)(S6), then transmits the ACA message to the AAA client(43)(S7). The authentication server(41) transmits a session complete message to the accounting server(42)(S8). The accounting server(42) transmits a response message(S9).
Abstract:
PURPOSE: An apparatus and a method for encrypting user authentication information and data using MAC(Mandatory Access Control) and RBAC(Role Based Access Control) are provided to perform an encrypting process corresponding to a grade of the user information by encrypting selectively a transmitting file according to an important grade of the transmitting file. CONSTITUTION: An apparatus for encrypting user authentication information and data using MAC and RBAC includes an FTP client program(10), a kernel layer(20), an FTP demon program(15), and a security database(30). The FTP client program(10) provides a user authentication information request and a server connection request. The kernel layer(20) is used for requesting the user authentication according to the server connection request of the FTP client program. In addition, the kernel layer is used for performing an encrypting/decrypting processing data of the FTP client program when being connected by a grade of MAC corresponding to the user authentication request. The FTP demon program(15) is used for analyzing the encrypted user authentication information and performing a user authentication process according to the grade of MAC. The security database(30) is used for storing the grade of MAC for the client and the grade of MAC for the data.
Abstract:
PURPOSE: An apparatus and a method for providing a reliable channel in a security OS(Operating System) to which MAC(Mandatory Access Control) is applied is provided to offer a new header for independently encoding a packet used in communication by a security level of the MAC and minimize network performance degradation using the security level of the MAC. CONSTITUTION: If data according to a communication request provided from a transmission-side user(S1) are for a packet transmission request, a reliable channel subsystem(12) judges whether a reliable channel is applied. If the reliable channel is applied, the reliable channel subsystem(12) composes a reliable channel header, encodes a specific portion of a packet, stores authentication information in the reliable channel header, and transmits the packet through a network(A). A MAC module(20) provides MAC information for indicating whether the reliable channel is applied. A kernel memory(30) provides an encryption key and an authentication key necessary for encoding a reliable channel application host address and the packet and generating authentication data. A reliable channel subsystem(12-1) retrieves the authentication data of the reliable channel header before decoding the packet received through the network(A). If the authentication data are valid, the reliable channel subsystem(12-1) decodes the encoded packet. If process for the reliable channel is ended, the reliable channel subsystem(12-1) transmits the packet to an upper level to transmit the packet to a reception-side user(S2). A kernel memory provides an authentication key and an encryption key necessary for checking authentication with respect to the packet encoded by the reliable channel subsystem(12) and decoding the packet.
Abstract:
PURPOSE: A method for transmitting a safe and an active packet between the active nodes in an active network is provided to transmit and process the packet in the network at the end terminal nodes as well as at the middle nodes. CONSTITUTION: A method for transmitting a safe and active packet between the active nodes in an active network includes the steps of: broadcasting(403) with creating the information to be transmitted by a first active node as the active packet by utilizing a symmetric key encryption method; requesting(407) a key for the decryption of the symmetric key encryption method with the first active node by the second active node to receive the active packet broadcasted; transmitting the key for the decryption of the symmetric key encryption method by the first active node in response to the key request received from the second node; and implementing the information including the active packet by decrypting the broadcasted active packet by the second active node receiving the key for the decryption of the symmetric key encryption method.
Abstract:
PURPOSE: A method for transmitting an access policy between routers by using identity is provided to correlate identity information as a public key with a personal key corresponding to the information by introducing a public key concept, thereby remarkably reducing calculations and transmissions without session keys. CONSTITUTION: An extension initializer(10) transmits a message to a policy manager(12)(S51). The policy manager(12) transmits a response message to the extension initializer(10)(S52). The extension initializer(10) transmits an encoded message, which is identity of a target router(11), to the target router(11)(S53). The target router(11) decodes the received message with a personal key, confirms an extension code and a policy, and transmits an encoded confirm message to the extension initializer(10) in order to inform the extension initializer(10) whether an extension is successfully installed(S54).
Abstract:
PURPOSE: A network for active packet transmission and a method for operating the same are provided to distribute active network topology information by creating opaque LSAs having active network topology information, flooding them to nodes in an OSPF domain, and configuring a routing table for active packet transmission using the flooded opaque LSAs. CONSTITUTION: A network for active packet transmission is composed of a plurality of active nodes(100-103) and generic nodes(110/1-110/7) using an OSPF routing protocol. Each active node is allocated an opaque type for an active network, creates opaque LSAs having active network topology information, and distributes the created opaque LSAs to the other active nodes that exist in an OSPF domain.