Abstract:
Provided are a communication method of an administration node in a content centric network flooding a data packet which generates a content revocation list which specifies a period of deleting the name of an invalid content by receiving a packet which requires the deletion of the invalid content from a request node which finds the invalid content; and includes a content revocation list in the request node and the normal node included in a content centric network.
Abstract:
Disclosed are information relay device and information relay method using transmission history information in an encoding information relay device passing through a plurality of nodes. The information relay device includes: an information extraction unit for extracting seconding encoding message information decoding first encoding message information received from the first node and encoding, and an identification information of an interest message; an information judgment unit for judging whether the identification information is included in a transmission history of the second encoding message information or not; and a transmission path decision unit for deciding a transmission path of data according whether the identification information is included in a database or not. [Reference numerals] (100) Information relay device;(110) Terminal device;(120) Search node;(130) Information providing server
Abstract:
PURPOSE: A semiconductor device including an active region and a contact with an enlarged contact area and a manufacturing method thereof prevent defects caused by pattern misalignment due to high integration. CONSTITUTION: A substrate (101) includes an element isolation film (105) defining a first junction region (11) and a second junction (12). A word line is buried in the substrate. A bit line (141) intersects with the word line on the word line. A first contact (135) is disposed between the substrate and the bit line and is electrically connected to the first junction region. A storage node contact hole is filled with a conductor and a second contact (157) is in contact with the second region.
Abstract:
PURPOSE: A content name based network apparatus and content protection method are provided to enable a content creator to protect content from a network apparatus or a user who does not want to share content. CONSTITUTION: A content protection information creation unit(501) creates content protection information including policy information and marking information. The marking information exhibits the protection of content. The policy information exhibits an opening scope of the content. A content location information creation unit(502) creates content location information which exhibits a location of the content in a content name based network based on the content protection information. [Reference numerals] (501) Content protection information creation unit; (502) Content location information creation unit; (503) Message reception unit; (504) Determination unit; (505) Confirmation unit; (506) Transmission determination unit; (507) Content store
Abstract:
PURPOSE: An apparatus for detecting a code injection attack and a method thereof are provided to prevent a new code injection attack before the code is executed. CONSTITUTION: An apparatus for detecting a code injection attack comprises an update checking unit(102) which check the updated stated of a page according to a program counter, an external input/output checking unit(104) which checks whether the address by the program counter is used for an input/output function, and a code injection sensing unit(107) which senses the code injection attack by the existence of the address in the input/output target table.
Abstract:
PURPOSE: A mobile communication device supporting pairing is provided to obtain a sufficient length of secret information, thereby reducing a hacking risk. CONSTITUTION: Each communication device(300,400) comprises contact modules(320,420) and network modules(340,440). The communication device comprises terminals(3210,4210), key generators(3220,4220), data transmission controllers(3230,4230), and secret generators(3240,4240). A network module communicates with a communication device. The network module receives first and second keys, which are generated from each communication device, from the secret generators. Contact detectors(3223,4223) detects the physical contact of a counterpart communication device. A seed generator generates a seed key.
Abstract:
A key predistribution method in a sensor network and a system thereof are provided to maintain high security by distributing keys through "BAffine" having a linear proportional relation only for the number of damaged nodes by the probability of damage to a link between two nodes. A key predistribution method in a sensor network includes the steps of: generating and maintaining a first KPS(Key Predistribution Scheme) having the type of an incidence matrix by using an affine plane(S510); generating a second KPS by using a Blom Scheme in each sub-network of the sensor network classified according to a key corresponding to the first KPS(S520); and distributing the keys to nodes of the sensor network by using the first KPS and the second KPS.
Abstract:
A method for executing distributed verification for measured data in a sensor network and a system for executing the method are provided to divide nodes on a sensor network into plural logical clusters, receive and verify the measured data of sensor nodes included into the same cluster in an aggregator, which exists in each cluster, and transmit the verified measured data to a BS, thereby performing the verification of the distributed measured data to operate the sensor network efficiently. A method for executing distributed verification for measured data in a sensor network comprises the following steps of: verifying measured data received from plural sensor nodes in an aggregator(S301); generating verification request data by using the measured data and transmitting the generated verification request data to a verification node in the aggregator(S302); verifying the aggregator through the verification request data and a predetermined number of sensor nodes in the verification node; transmitting an aggregation result for the measured data from the aggregator to a BS(Base Station) when the aggregator is verified(S304); and verifying the aggregation result in the BS(S305).
Abstract:
본 발명은 반도체장치의 제조공정에서 흔히 사용되는 질화규소막을 저온에서 빠르게 식각해낼 수 있는 반도체장치 제조용 질화규소막의 식각조성물과 이를 이용한 식각방법 및 그에 의하여 제조되는 반도체장치에 관한 것이다. 본 발명은, 불산과 인산염수용액을 혼합하여 이루어진 식각조성물을 담고 있는 식각챔버내에 질화규소막이 형성된 반도체장치 제조용 웨이퍼를 투입하고, 상기 식각조성물을 가열, 기화시켜 기화된 식각조성물에 웨이퍼가 노출되도록 함으로써 질화규소막을 식각하는 것을 포함한다. 따라서, 웨이퍼 상의 질화규소막을 빠른 식각속도로 식각토록 함으로써 질화규소막을 빠른 속도로 제거토록 하는 효과가 있으며, 그에 의하여 질화규소막을 사용하는 반도체장치의 생산성을 증대시키는 효과가 있다.