Abstract:
PURPOSE: A watermarking inserting/detecting apparatus and a method thereof are provided to perform geometrical deformation, filtering deformation, and compression format change of a video. CONSTITUTION: A message encoding unit(110) encodes a watermark message. A watermark pattern generating unit(130) analyzes a video original copy. The watermark pattern generating unit generates a watermark pattern. A modulating unit(150) inserts the watermark message into a chrominance component frame of the video original copy.
Abstract:
본 발명은 전파식별 태그에 관한 것이다. 본 발명에 따르면, 패키징 구조물에 외부압력이 가해지지 않은 상태에서는 안테나로부터 전력 및 데이터를 전달하는 도선이 공기층에 의해 전파식별 칩과 이격된다. 반면에, 패키징 구조물에 외부압력이 가해지면 도선이 전파식별 칩에 연결되어 안테나와 전파식별 칩 사이의 전력 및 데이터를 전달한다. RFID, 프라이버시, 해킹
Abstract:
PURPOSE: An integration protective device and an integration security method are provided to simultaneously perform a device authentication and a stream encryption by changing an action mode in a process using communally a device overlapped with of a PUF(Physical Unclonable Function) circuit and a FSR(Feedback Shift Register) circuit. CONSTITUTION: An action mode control part(110) decides an authentication mode performing a device authentication and an encryption mode performing a stream encryption. An authentication part performs the device authentication using a difference of data route divided by an input data in the authentication mode. An encryption part stream-encrypts an input value through a calculation in the encryption mode. The authentication part include a plurality of operators performing a bit calculation and unit route sets including a second multiplexor with selecting one of an output of the buffers and a plurality of buffers having different route delay properties.
Abstract:
PURPOSE: A privacy enhanced auction service supplying method and apparatus thereof are provided to enhance the privacy of a bidding participant through a ring signature technique. CONSTITUTION: A key generator(210) generates a signature private key and a public verification key. A service participation register(220) registers ring signature information to a service provider server for providing a bidding service. A convertible ring signature value generator(230) generates ring signature about bidding price.
Abstract:
다중 관측윈도우 상에서의 네트워크 플로우 측정장치 및 그 방법에 관한 것이다. 본 발명은, 제한된 하드웨어 리소스 내에서 다중 관측 윈도우들에서 네트워크 트래픽 측정할 수 있는 방법을 제시한다. 따라서, 본 발명에 따르면, 다중 관측윈도우 상에서의 네트워크 플로우 측정 방법을 하드웨어로 구현할 수 있다. 네트워크 침입탐지, 관측 윈도우, 슬라이딩 윈도우, 네트워크 플로우
Abstract:
PURPOSE: A privacy protection method using a real name traceable anonymous certificate is provided to enable a user to use online service freely without exposing personal privacy, by using the anonymous certificate. CONSTITUTION: A certificate domain(CD)(10) manages an anonymous certificate capable of tracing a real name. The certificate domain includes an identity verifying issuer(IV)(20) and a content validating issuer(CV)(30). The content validating issuer copes with a certificate authority(CA). The identity verifying issuer copes with a registration authority(RA). The certificate domain includes a plurality of identify verifying issuers.
Abstract:
PURPOSE: An anonymous authentication service method providing partial connectivity is provided to perform anonymous authentication operation based on Short Group Signature, by introducing the concept of sublink connectivity. CONSTITUTION: An admission process(S210) includes a service user subscription step(S211) and a service provider subscription step(S212). A group signature generation process(S220) generates a group signature through mutual cooperation. A group signature verification process(S230) is performed by a service providing server(120) or an arbitrary participant. A signer verification process(S240) is performed by an arbitrary ID verification server(130) and an anonymous authentication server(110). A sublink process(S250) is provided by the service providing server.
Abstract:
PURPOSE: A session management method is provided to secure wire-speed in session tracking and managing even on a Giga network having higher complexity. CONSTITUTION: A management unit(500) constitutes the entry of a single packet and a plurality of fraction packets in a session table(300) and a fragment table(400). The session table comprises an entry composed for the status information of a packet for session connection and session close and a single packet which is not fragmented. The fragment table comprises entries composed for the status information of 1 to N fragment packets.
Abstract:
PURPOSE: A correlation analysis apparatus and method thereof based on malicious file informaiton on network are provided to recognize a malicious code path and scenario based on file informaiton that is collected on network. CONSTITUTION: A scenario definition table(104) is composed on the malicious code propagation path of one or more scenarios. A correlation definition table(106) is composed of a correlation condition based on traffic characteristic. A post decision process unit produces the malicious probability value about each concern file through comparison between the traffic information table and the scenario definition table.
Abstract:
PURPOSE: A user terminal system, and a DRM(Digital Rights Management) system comprising the user terminal system, and a method for managing digital rights are provided to protect an original author, and a producer of a content by indicating the share of the digital rights to the meta data of the digital content. CONSTITUTION: A metadata analyzer(210) divides the first meta data combined in the first digital content, and interprets identification information, inheritance authority, and allowance condition on the first meta data. A content processor(220) processes the first digital content according to the allowance condition. A metadata generator(230) receives the share rate information which indicating the share rate between the original author and the producer. The metadata generator unites the identification information and the share rate information of the producer, and creates a second metadata.