Abstract:
본 발명은 보안 프로파일을 이용한 복합 단말의 보안 장치 및 그 방법에 관한 것으로, 단말 사용자의 보안 지식 수준에 따라 수동 모드 또는 자동 모드로 단말의 보안 프로파일을 설정하고 단말이 처한 환경 요소가 변화하거나 사용자의 보안 수준 변경 요청이 있는 경우, 동적 또는 정적으로 보안 프로파일을 재구성함으로써, 보안 상황이 위급한 경우에 빠른 대처가 가능뿐 아니라 보안 지식이 낮고 단말의 기능에 대한 이해도가 낮은 사용자도 쉽게 보안 기능을 설정할 수 있는 이점을 가진다.
Abstract:
A device and a method for detecting the sensitive information of a portable terminal are provided to detect and block the leakage of sensitive information, which is stored in a portable terminal, to the outside completely. A portable terminal(10) comprises a data storage unit(11), a sensitive information management unit(12), a sensitive information detecting and blocking unit(13), a portable storage medium interface(14) and a network interface(15). The data storage unit stores user data including basic data and sensitive information(11), and the sensitive information management unit(12) manages the detection and blocking for the leakage of the sensitive information to the outside. The sensitive information detecting and blocking unit detects and blocks the leakage of the sensitive information to the outside by being installed the portable storage medium interface and the network interface.
Abstract:
A communications system and a method thereof for providing the enciphered communications of the light weight are provided to simplify a key generation management part by using an OTP generating unit. An OTP generator(120) produces OTP(One Time Password). A first encryption communication module(110) transmits user information and OTP value to a service server. The first encryption communications module transmits the OTP value and user information of the OTP generator for the user authentication to a service server. The first enciphered communications module performs the enciphered communications with the service server through data which are encrypted by using the OTP value. A first timer measures the use time of the session opened for the enciphered communication.
Abstract:
개인 휴대 단말기에서 접근 상황분석을 통한 중요정보 외부유출 차단 시스템 및 방법이 개시되어 있다. 중요정보 외부유출 차단 시스템은 개인정보 유출방지 정책 정보를 입력받아 복수의 개인 정보 유출 방지 규칙들로 분해하여 각 모듈로 전송하는 개인 정보 관리기; 규칙 1에 해당하는 패킷을 감지하면, 접근 상황정보분석을 통해 상황 정보를 전송하는 상황 분석기; 상황 정보를 수신받아, 패킷 분석을 통해 외부로 전송되는 패킷을 감시하여, 규칙 2에 해당하는 패킷을 감지하면, 필터링 정보를 전송하는 패킷 분석기; 및 필터링 정보를 수신받아 규칙3에 해당하는 패킷에 대한 통과/차단을 결정하는 개인 정보 유출 방지기를 포함한다. 따라서, 단말기는 개인 정보 유출 방지 규칙들에 따라 접근 상황정보분석 및 패킷 분석 기능을 통해 파일과 프로세스의 중요정보의 외부유출을 차단할 수 있다. 상황분석, 동적패킷분석, 개인정보유출방지, 접근제어, 네트워크 보안
Abstract:
A security enhancing method for a personal portable embedded terminal and a system therefor are provided to permit network access for an authenticated personal portable embedded terminal only, and to enable the permitted terminal to connect a network through security gateways which check security of the terminal, thereby maximizing the security enhancement of the terminal and the network. Plural security gateways(300) check integrity of packets transceived to terminals(100) through packet transceiving paths of the terminals connected to a network, and check/cure security of the terminals. A terminal authentication system(400) generates authentication codes for authenticating network connection of the previously registered terminals, and searches optimal security gateways when network connection is requested through the authentication codes by the terminals, then allocates the searched gateways to the terminals.
Abstract:
본 발명에 의한 라우터 하드웨어 플랫폼에서의 침입차단 정책 적용 장치 및 그 방법은 적어도 하나 이상의 침입차단 정책을 관련 정보와 함께 저장하는 정책데이터베이스; 상기 정책데이터베이스에 침입차단 정책을 추가하거나 삭제하는 정책서버; 상기 관련 정보를 참조하여 우선순위에 따라 침입 차단 정책을 적용할 것을 결정하는 시간제어부; 및 상기 시간제어부의 결정에 의한 침입 차단 정책을 라우터하드웨어 플랫폼이 처리하는 데이터에 적용하여 침입을 차단하는 침입차단부;를 포함하는 것을 특징으로 하며, 하드웨어 플랫폼은 네트워크 프로세서가 장착되어 있으며, 정책을 우선순위에 따라 적용하여 네트워크 프로세서내의 마이크로 엔진에서 별도로 우선순서 처리를 할 필요가 없고, 우선순위의 순서에 따라 시간 정보를 메모리 리스트에 저장해 두어 정책을 적용할 시간을 검사하기 위해 데이터베이스의 많은 데이터를 검색하지 않고, 메모리 리스트의 요약 정보만을 검색하여 빠른 우선순위 처리와 정책 적용이 가능하다. 침입차단, 정책 적용
Abstract:
An intrusion detection supporting device for tunneled packets under IPv4(Internet Protocol version 4)/IPv6 mixed environment and a method therefor are provided to perform intrusion detection for tunneled packets under tunneling environment to an IPv4 network from an IPv6 network and IPv6 tunneling in the IPv4 network, thus intrusion detection for the tunneled packets is available. A decider(110) decides whether received packets are tunneled. If so, a packet converter(120) converts the packets into packet types before being tunneled, and outputs the converted packets to an intrusion detection system, depending on in which part of IPv4 and IPv6 networks the converted packets are included. An alarm collector(140) collects intrusion alarms for the converted packets. A packet manager(130) generates alarm/correspondent information of the received packets based on the intrusion alarms and conversion information on the received packets.
Abstract:
An apparatus and a method for inspecting the extension header of an IPv6(Internet Protocol version6) packet are provided to enable a user to perform inspection for a packet as the user wants by enabling rule technique for inspecting the extension header of the IPv6 packet and apply the rule technique to invasion detection, invasion interception, and a fire wall. An apparatus for inspecting the extension header of an IPv6(Internet Protocol version6) packet(110) comprises the followings: a rule representing unit(10) which represents an inspection rule including at least one inspection condition for the extension header; and an inspection unit(12) which inspects the extension header of the IPv6(Internet Protocol version6) packet according to the inspection rule. The inspection rule is represented by a tag including an extension header type identifier, a comparing item identifier of the extension header, and a comparing expression for inspecting the comparing item.
Abstract:
A method and an apparatus for detecting an abnormal packet are provided to minimize damage of a network caused by a buffer overflow attack by quickly detecting a worm in a wide area network. A session management unit(120) determines whether a packet is the first packet after a session is established between a transmission server and a reception server. In case the packet is the first packet, an abnormal packet detecting unit(130) detects whether the packet satisfies a security policy. When the packet is determined not to satisfy the security policy, a notifying unit(160) notifies that the packet is an abnormal packet.
Abstract:
An apparatus and a method for intercepting packets are provided to carry out packet processing, such as packet interception, under an IPv6 network environment just as a network manager intended, even though the address of a node within an internal network, a state of the node or an address prefix is changed. An apparatus for intercepting packets comprises a network address management part(210), a host address management part(220), a receiving part(230), an updating part(240), and a packet processing part(250). The network address management part(210) intercepts and manages the packets supplied to an internal network from an external network. The host address management part(220) intercepts or manages packets in transmitting packets to a host from an external network. The receiving part(230), in case a network address is changed into the IP address of a host in an internal network or a network prefix is changed, receives an IP address change notification or a network prefix change notification. The updating part(240) updates the network address management part(210) and the host address management part(220) when the receiving part(230) receives the IP address change notification or the network prefix change notification. In transmitting packets to an internal network from an external network, the packet processing part(250) intercepts packets if the validity of the network prefix expired. However, in case the network prefix is valid, the packet processing part(250) transmits packets on the basis of the updated network address management part(210).