Abstract:
PURPOSE: A method for diagnosing authority required by application and a device thereof are provided to grasp authority needed when executing the application by static analyzing a source code without actually executing the application. CONSTITUTION: An application acquisition part (410) acquires the source code of an application from the application. A control flow analysis part (420) generates a function list including a function included in the source code. An authority diagnosis part (430) determines authority required by the function list when the application is executed at the device. The application acquisition part acquires additional information including authority information requested in advance. The authority diagnosis part compares the authority information, which is requested in advance, with the determined authority for outputting a compared result. [Reference numerals] (410) Application acquisition part; (420) Control flow analysis part; (430) Authority diagnosis part; (AA) Diagnosis result; (BB) Analysis result (function list)
Abstract:
A method for restricting an operation of a device and an apparatus therefor are provided to update a waste list by using a waste list which is additional information of contents, thereby maintaining latest information of the waste list of the device without additional update. A method for limiting an operation of a device comprises the following steps. It is determined whether the device is a wasted device based on a waste list for wasted devices(220). It is determined whether a DRM(Digital Right Management) module of the device is operated based on the determination result(230). An operation of the device is selectively limited based on the determination result(240).
Abstract:
An authentication method and an authentication apparatus are provided to prevent a large number of devices from being registered by adjusting the number of registerable devices in an authentication list. A random number generator(470) generates a first random number. A transmitter(460) transmits a first random number, a public key of a first device, and expiry information of the first device. A receiver(410) receives a second random number and expiry information of a second device. The second random number is generated by the second device and encrypted by the public key of the first device, when the first device is not expired. A decoder(420) decodes the second random number using a secret key of the first device. A device expiry determining unit(430) determines whether the second device is expired according to the expiry information of the second device. A key generator(440) selectively generates a temporary key by using the first and second random numbers and a determined result from the device expiry determining unit. An encrypting unit(450) encrypts the public key for encrypting a contents key using the temporary key, when the temporary key is generated.
Abstract:
A method for generating a firmware update file, and an update method and a device using the same are provided to restrict updating firmware embedded in hardware by discriminating a model code representing a compatible hardware group of a firmware program code and the model code representing property for discriminating the hardware included in the group. A firmware generator(610) generates a data body including an updated firmware program code. A header generator(620) generates a data header including a first model code representing a compatible hardware group of the firmware program code and a second model code representing property for discriminating hardware included in the group. The first and second model codes are a model code of the hardware applying the generated data body. A combiner(630) generates a firmware update file by combining the data body and the data header. The combiner includes an electronic sign unit electronically singing the data body and the data header to prevent forgery/alteration and an encryptor encrypting the data body including the firmware program code.
Abstract:
A method and a device for controlling transmission of contents are provided to control the transmission by initializing a communication channel, transmitting the contents through the communication channel, verifying several times whether the contents are transmitted within transmission allowance, and determining the transmission depending on a verification result. A session setting unit(610) initializes a communication channel for transmitting contents, and a data transmitter(620) transmits the contents through the initialized communication channel. A verifier(630) verifies several times whether the contents are transmitted within transmission allowance. A data transmission controller(640) determines the transmission of the contents depending on a verification result. The data transmission controller determines the transmission of the contents depending on a ratio between the number of all verifications and the number of transmission performed within the transmission allowance. The data transmission controller stops transmitting the contents when the ratio is smaller than a threshold value.
Abstract:
A method and an apparatus for protecting digital contents in a UMS(USB Mass Storage device) are provided to prevent the contents stored in the UMS device from being distributed without limitation, by enabling a user to register the UMS device in a USB host connected through the UMS device and a USB port directly. According to a method for managing registered data of a UMS(USB Mass Storage) device, a random key is generated by the request of a user(220). The generated key is displayed through user interface(230). The registered data is encoded by the generated key(240). The registered data is kept by a USB host connected to the UMS device in order to use the encoded contents of the UMS device(250).
Abstract:
An authenticating method and an authenticating apparatus are provided to enable a user to authenticate devices wirelessly by authenticating an external device according to a received authentication execution command. An authenticating apparatus includes a receiver(210), an authentication history unit(240), an output unit(250), and an authenticating unit(260). The receiver receives an authentication request signal. The authentication history unit determines whether an external device transmitting the authentication request signal received by the receiver is previously authenticated. The output unit selectively outputs a token indicating that the external device is to be authenticated according to the determination of the authentication history unit. The authenticating unit authenticates the external device according to a received authentication execution command, when the authentication execution command is received.