Abstract:
PURPOSE: A contents management method in the bidirectional digital broadcasting system is provided, which stores the broadcasting contents of the IPTV safely, registers the broadcasting contents in server, and provides the reading service of the broadcasting contents to other users, therefore, the contents management method activates the contents service usage of the IP network like the IPTV service. CONSTITUTION: A client terminal 1 transmits the require-message for the individual safety information request through the IP net to the contents managing server(S200). The contents managing server analyzes the require-message(S202). If the client of the client terminal 1 is a proper client, and then the contents managing server transmits the individual security information to the client terminal 1(S204,S206), the client terminal 1 stores the individual security information(S208).
Abstract:
PURPOSE: An encrypting method and a decrypting method of data are provided to keep transmission bandwidth of video stream without padding by applying length of data same with length of the video stream to the system in which needs quick encoding. CONSTITUTION: Initial value for encryption and encryption key is instituted(S201). A plain text partitions code calculation size to a plurality of blocks(S202). It is allocated in the plaintext block in which the block number variable partitions. Block number variable is allocated on the separated plain text. The plain text block is successively selected based on the block number variable(S203). The block number variable of the selected plaintext block is checked(S204). If plain text block is a first plaintext block, initial value and encryption key are input on a encryption device(S205). A calculation result of exclusive logical sum is inputted to the encryption device(S208). An encrypted text block is obtained the same size of the final plain text block(S209).
Abstract:
본 발명은 데이터베이스(database)의 테이블의 컬럼(column)을 구성하는 숫자 데이터에 대하여, 버킷(bucket) ID 변환을 이용하여 안전하게 암호화하여 저장하고 효율적으로 검색함을 목적으로 한다. 본 발명에서 제안하는 기술은 데이터베이스에 숫자 데이터를 암호화(Encryption)하고 복호화(Decryption)함에 있어서, 안전성을 최대화하여 저장하고 성능저하를 최소화하여 검색할 수 있는 방법에 관한 것이다. 전처리, 암호화, 복호화, 후처리
Abstract:
본 발명은 라인달 알고리즘을 이용한 암호화 및 복호화 기술에 관한 것으로, 라인달 암호화 및 복호화를 수행하기 위해 입력된 비트를 1바이트씩 시프트로우 및 역시프트 로우 변환을 통하여 출력하는 시프트/역시프트 로우 모듈과, 시프트/역시프트 로우 모듈로부터 입력된 1바이트에 대한 암호화를 위해 하나의 S-box를 이용하여 바이트 치환 변환을 수행하는 바이트 치환 모듈과, 시프트/역시프트 로우 모듈로부터 입력된 1바이트에 대한 복호화를 위해 하나의 역 S-box를 이용하여 역바이트 치환 변환을 수행하는 역바이트 치환 모듈과, 바이트/역바이트 치환된 값을 입력받아 바이트 단위로 왼쪽 원순환 하면서 믹스/역믹스 칼럼 변환을 수행하여 1바이트 출력을 발생하는 믹스/역믹스 칼럼 변환 모듈과, 믹스/역믹스 칼럼 변환 모듈로부터 초기 입력 비트 값을 모두 수신한 경우, 시프트/역시프트 로우 모듈에 초기 입력 비트 값을 재입력하고, 기설정된 횟수로 초기 입력 비트 값의 입출력을 수행하는 입출력 레지스터와, 기설정된 횟수의 입출력을 하나의 라운드로 설정하여 기설정된 횟수만큼의 라운드를 수행하고, 하나의 라운트 키를 1바이트 단위로 나누어 출력하는 라운드 키 생성기를 포함하는 것을 특징으로 한다. 라인달(Rijndael) 알고리즘. 암호화, 복호화, 라운드 키 생성기
Abstract:
A unified security apparatus for supporting IP packets and a method thereof are provided to enable permission/filtering to be applied to an IPv4 packet and an IPv6 packet by physically using a single chipset when a dual stack scheme and a permission/filtering rule are applied. A unified security apparatus for supporting IP packets includes a packet classifier(210), a key generator(220), a lookup engine(230), and an intrusion response unit(240). The packet classifier classifies an IPv4 packet and an IPv6 packet based on version information in header information of an input IP packet. The key generator generates header information corresponding to the IPv4 packet or the IPv6 packet classified by the packet classifier and generates a discrimination key corresponding to the IPv4 packet or the IPv6 packet based on the generated header information. The lookup engine includes two banks(231,232). Different bits are assigned to the two banks. An IPv4 security policy and an IPv6 security policy are recorded in the lookup engine. In this way, both an IPv4 packet and an IPv6 packet can be searched in the current embodiment by physically using a single lookup engine. The intrusion response unit includes a packet filtering unit(241) and a bandwidth controller(242). The packet filtering unit decides a lookup key, which is a key value corresponding to the security policy established in the first bank or the second bank, and if the lookup key matches the discrimination key generated according to the IPv4 packet or the IPv6 packet by the key generator, the packet filtering unit discards or transmits the packet according to the security policy. The bandwidth controller decides a lookup key, which is a key value corresponding to the security policy established in the first bank or the second bank, and if the lookup key matches the discrimination key, the bandwidth controller controls a bandwidth according to the security policy.
Abstract:
An encryption apparatus of high capacity and speed utilizing a memory unit having an encryption function, and an implementation method thereof are provided to prevent a bottleneck state of a bus by performing the encryption within the memory unit directly. A general memory(110) stores data required to be encrypted according to a requirement of a user application program. An encryption processing memory(120) is inserted into a slot having the same I/O standards to the general memory, performs encryption operations and encryption key control operations independently by an embedded encryption function unit(125) by copying the data as general speed between memory units, and copies the data into the general memory. The encryption function unit is realized in the encryption processing memory unit as a separated chip, and performs encryption operations for the data based on an encryption key assigned according to the encryption key management policy.
Abstract:
A method and an apparatus for preventing confidential documents from leaking are provided to make it possible to construct a selective monitoring system which allows a user to check content of data, and to perform a monitoring or a real time intercepting for unregistered confidential documents which were not monitored in the conventional. An apparatus for preventing confidential documents from leaking comprises a document collector(115), a controller(113), a monitoring & intercepting unit(112), a storage unit(114) and an input/output unit(I/O)(111). The document collector collects documents from all the supporting monitoring ends. The controller learns knowledge on confidential documents for recognizing whether a document is confidential with respect to all the collected documents, and determines whether the document is confidential on the basis of a secret detection algorithm in accordance with the learned knowledge on the confidential documents. The monitoring & intercepting unit monitors whether documents leak at all the monitoring ends and intercepts the confidential documents determined by the controller. The storage unit stores information on a model generated according as the knowledge on the collected secret documents is learned. The input/output unit transmits and receives all kinds of information related to the prevention of reveal of confidential documents.
Abstract:
An apparatus for analyzing and coping with an intrusion situation and a method for expressing attack detection alarms as an N-dimensional correlation graph are provided to enable a manager to intuitively recognize and cope with an intrusion situation by expressing an attack situation, its stages, and correlated attacks as a two or three-dimensional graph. An apparatus for analyzing and coping with an intrusion situation comprises the first analysis part(107) and the second analysis part(109). The first analysis part collects attack detection alarms from network alarm devices, classifies them, and expresses results as a three-dimensional graph. The second analysis part receives the results, executes vector conversion to project the three-dimensional graph onto a two-dimensional graph, and analyzes the correlations of attacks. The first analysis part comprises an attack detection alarm collection part, a classification part, and an N-dimensional express analysis part. The attack detection alarm collection part collects attack detection alarms. The classification part classifies the collected attack detection alarms according to attack stages and attack situations. The N-dimensional express analysis part outputs each classified attack stage as a three-dimensional graph.
Abstract:
A sensor node, an apparatus and a method for an early warning red tide are provided to make a rapid and accurate alarm by detecting the movement of the red time in real time and obtain information such as seawater temperature and salinity in real time when the red tide generates, thereby reducing damage caused by diffusion of the early red tide and finding out an accurate cause of the red tide. A sensor node of a sensor network for an early warning red tide comprises: a red tide detecting sensor(210) which detects generation of the red tide by collecting toxicity information when the red tide is generated; a sensor for base materials(220) which collects causes of the red tide generation such as seawater temperature and salinity and expected materials; and a red tide determining and controlling portion(230) which receives the red tide generation signal and collected information and materials from the red tide detecting sensor and the sensor for base materials to determine the existence of the red tide and send the determining result and the received information through a node communication portion(240). An apparatus for an early warning red tide comprises: a sensor network for an early warning red tide having a plurality of the sensor nodes; and a control station(300) which determines whether a red tide alarming is required by receiving the information collected by the sensor nodes, manages the sensor nodes and requires additional information to the sensor nodes. A method for early warning of red tide comprises the steps of: (a) detecting in real time red tide and base materials using the red tide detecting sensor and the base material sensor of each of the sensor nodes; (b) transmitting the information of the red tide detecting sensor to the red tide determining and controlling portion; (c) determining the existence of the red tide using the information of the red tide detecting sensor and base material sensor, and other sensor nodes information obtained by using the sensor communication receiving information; (d) delivering the red tide information to other sensor nodes and delivering the information of the red tide detecting sensor and the base material detecting sensor to the control station; and (e) making a red tide alarm using the information of the sensor nodes delivered to the control station and manages the sensor network by central control to obtain further information from the control station.
Abstract:
본 발명은 모바일 RFID 환경에서의 성인 인증 시스템 및 그 방법에 관한 것으로, 보다 상세하게는 개인정보보호 기능이 강화된 성인 인증 시스템 및 그 방법에 관한 것이다. 본 명세서에서 개시하는 모바일 RFID 환경에서의 성인 인증 시스템은 RFID 태그, 사용자 단말, 성인 인증 요청 처리기, 그리고 CP(Contents Provider)로 구성되며, 성인 컨텐츠의 RFID 태그에 기록된 성인인증 등급 정보를 독출하는 등급 정보 독출부; 상기 독출된 등급 정보의 최종 등급을 결정하는 성인인증 등급 결정부; 및 상기 결정된 최종 등급과 상기 단말 사용자의 연령을 근거로 상기 최종 등급에 해당하는 성인 컨텐츠를 상기 단말의 사용자에게 제공해도 되는지의 여부를 판단하는 서비스 등급 인증 유효성 검사부를 포함하여 본 발명의 기술적 사상을 구체화하고 본 발명의 목적 및 기술적 과제를 달성한다.