Abstract:
PURPOSE: A wireless Internet system using an application layer script and a point to point security session information managing method are provided to manage security information on entire sessions in a web server out of one transaction range, thereby supplying a security service in an application layer among all messages transceived between a browser and the web server. CONSTITUTION: A web server(130) comprises as follows. A script interpreter(132) interprets web daemon receiving a service request of a browser(110) and a script at the request of the web daemon, and performs an interpretation. A script security API(133) supplies a security service of a script, performs security negotiation with the browser(110), and manages session information. A session information object(134) stores the session information. The script security API(133) comprises as follows. A security negotiation API supplies a security negotiation function with the browser(110). A security service API supplies a security service function. A session control block stores and manages security session information negotiated with the browser(110).
Abstract:
PURPOSE: A method for designing a password based authentication and key exchange protocol by using zero-knowledge interactive proof is provided to be strong to the offline dictionary attack. CONSTITUTION: A method for designing a password based authentication and key exchange protocol by using zero-knowledge interactive proof includes the steps of: setting various system parameters required to the authentication, sending the message made of a first inquire number generation value(X) to the server(60) by arbitrary selecting the random number(r,x) by the user based on the set parameter, sending the message made of a second inquire number generation value(Y) known to only the server(60) and the user(50), transmitting the number of witness(B) to the server(60) to authenticate the user after the result(c) value of secret flip of coin and the session key(SK) are calculated, authenticating the B by the server(60) stored therein the password identifier to each of the users by using the A, V and c and exchanging the session key by calculating the SK.
Abstract:
PURPOSE: A method for setting a communication environment of a smart card and a mobile terminal which use a protocol stack of a hierarchical structure is provided to construct the optimized communication environment with respect to each application rapidly and stably in a multi-application smart card system. CONSTITUTION: If a smart card(100) is inserted into a mobile terminal(200), the mobile terminal(200) applies power to the smart card(100, S100). If a power is applied from the mobile terminal(200), the smart card(100) executes a reset operation in accordance with the applied power and transmits information with respect to a supportable communication environment to the mobile terminal(200) as a response signal thereto(S202). After analyzing a communication environment of the smart card(100), the mobile terminal(200) transmits a logic channel opening request message for opening a logic channel with the smart card(100) to the smart card(100, S203). The smart card(100) opens a logic channel with the mobile terminal(200) in accordance with the logic channel opening request message received from the mobile terminal(200) and transmits a response message with respect to the logic channel opening request to the mobile terminal(200, S204).
Abstract:
Disclosed is a dongle device for preventing wireless intrusion, capable of providing a wireless intrusion preventing service to a wireless access point in an NFC network. The dongle device for preventing wireless intrusion includes an interface unit which is connected to an access point and receives a data frame from the access point, a control unit which determines a security risk based on the received data frame and generates corresponding information if there is a security risk according to the determination result, and a storage unit which stores information for determining the security risk. The wireless access point for preventing the wireless intrusion is made by using an existing wireless access point. [Reference numerals] (410) Interface module; (420) Security risk detection module; (422) Monitor a wireless service channel; (424) Detect the wireless security risk; (430) Security risk corresponding module; (AA) Wireless access point; (BB) User data bridge service module(AP SW module); (CC) Dongle device for preventing wireless intrusion