Abstract:
There is no way for service suppliers and Internet site operators to find if an invasion of privacy for each individual occurs when dealing with rapidly increasing image data, and a server system for storing image data is also hard to privacy protecting functions for all the images because it requires too much computing power and resources. According to an embodiment of the present invention, data packets transmitted from a relay device, such as a router, switch and hub, between networks, especially between a distributed network and a transmission network are divided in parallel and analyzed, so that privacy information such as a face image and other important information can be blocked in the image data. Therefore, the present invention which is a network data service technology can effectively transmit image data while protecting privacy information in multiple channel image data.
Abstract:
본 발명은 보안 관제 센터에서 감시 카메라로부터 전송되는 영상을 모니터링하는 경우 사람의 얼굴 등과 같이 프라이버시와 관련된 정보가 그대로 노출됨에 따른 프라이버시 침해 문제를 해결할 수 있도록 하는 감시영상의 프라이버시 정보 보호 장치 및 방법에 관한 것이다. 즉, 본 발명은 감시 카메라 등으로부터 수집된 영상을 사용자에게 제공하기 전에 사람의 얼굴 등과 같은 프라이버시 정보를 포함한 영상에 대해서는 해당 영역을 임의의 색으로 변경하여 마스킹을 수행함으로써, 감시 영상에 대해 모니터링을 수행하면서도 프라이버시 정보를 효율적으로 보호할 수 있도록 한다. 또한 프라이버시 정보를 마스킹한 영상을 다시 인코딩 시 원본 감시 영상에서 사용된 인코딩 방법을 적용함으로써 인코딩 속도를 향상시킬 수 있도록 한다. 영상, 프라이버시, 얼굴, 마스킹, 감시, 인코딩
Abstract:
PURPOSE: An apparatus for recording an image for a vehicle is provided to obtain present or past position information and to recognize a situation at CCTV-free zones. CONSTITUTION: An apparatus for recording an image for a vehicle comprises: a image photographing module(110) for photographing road and surrounding conditions and vehicle inside; an image storage and management module(112) for storing a storage medium; and a communication module(114) for receiving an image transfer request from the outside.
Abstract:
PURPOSE: An intersection entrance and standby time providing apparatus, a method thereof, and a recording medium which stores a program for executing the method are provided to control traffic at an intersection by providing signal standby time and remaining time of a driving signal. CONSTITUTION: A data receiving part(220) receives a control signal from an intersection traffic controller. A vehicle driving information measurement unit(230) measures driving speed and a driving direction of a vehicle. A data analysis part(240) analyzes the control signal, the driving direction, and location information of the vehicle. The data analysis part calculates approach time and distance to an intersection. The data analysis part calculates waiting time of the vehicle. The data analysis part analyzes intersection access possibilities. A data output unit(250) provides the intersection access possibilities and the waiting time of the vehicle.
Abstract:
플랫폼 장착용 모듈은 입출력 인터페이스부를 통해 외부 장치와 통신할 수 있고, 내장된 펌웨어 및 입출력 인터페이스부로 수신된 명령을 실행하여 데이터 처리 내부 제어 신호 발생 등의 제어를 수행하는 실행 엔진부, 해시 연산을 통해 인증 절차를 수행하여 무결성을 검사하는 무결성 검사부, 대칭키 쌍 및 RSA 암호키 쌍을 생성하는 키 생성부, RSA 암호 연산을 이용하여 데이터를 암호화하여 암호화된 데이터를 생성하는 RSA 엔진부, RSA 암호키 쌍 및 암호화된 데이터를 저장하고, 플랫폼 장착용 모듈과 연관된 식별자 및 상태를 저장하는 비휘발성 메모리부, 동적 데이터를 저장하는 휘발성 메모리부, 난수를 생성하는 실난수 생성부 및 입출력 인터페이스부를 통한 외부의 오류 주입 공격에 대비하여 동작 규격 이외의 전압, 온도 및 동작 주파수의 값에 대한 검출과 플랫폼 장착용 모듈의 실행을 차단하는 제어 신호를 생성하는 VTF 검출부를 포함한다. 이를 통해 모바일 디바이스의 키의 생성과 무결성을 보장하고, 미리 설정된 플랫폼 장착용 모듈의 기능을 변경할 수 있다. 신뢰 플랫폼 모듈, 무결성, 암호 코프로세서, 난수
Abstract:
PURPOSE: A hash encryption device and a method thereof are provided to minimize the power consumption required for hardware resource by applying a clock signal only when data saved in a register is changed. CONSTITUTION: A message scheduler(300) generates a plurality of first message data during a first hash calculation process. The message scheduler generates a plurality of second message data during a second hash calculation process. A message compression part(400) computes a first message digest by using the second message data during the first hash calculation process. The message compression part generates a second message digest by using the second message data during the second hash calculation process. A controller(200) decides the hash operation which is used for the calculation data among the first and the second hash calculation from an external control command. The controller decides the times of the hash calculation. The controller controls the message scheduler and the message compression part according to the determined hash calculation and the times.
Abstract:
A module mounted platform and a method for changing function for a module mounted platform are provided to ensure the integrity of a mobile device by protecting the stored data. An integrity inspection unit(230) ensures the integrity by performing an authentication process through a hash operation, and a key generating unit(250) generates a pair of symmetrical keys and a pair of cryptographic keys corresponding to an RSA(Rivest Shamir Adleman) cryptographic method. An RSA(Rivest Shamir Adleman) engine unit(260) generates encoded data by encoding the data through the pair of cryptographic keys. A non-volatile memory unit(280) stores a first code, and provides the other codes except the first code to an execution engine unit based on a mode selection signal.
Abstract:
An apparatus for a low power SHA-1 hash operation and an apparatus for low power HMAC(keyed Hash message Authentication Code) cryptographic using the same are provided to protect user privacy in wired/wireless data configuration such as a mobile trusted computing, an RFID(Radio Frequency IDentification), a wireless sensor network, a home network and so on. A key padding unit(230) performs the padding process of key data for HMAC calculation, and an XOR calculation unit(233) performs an XOR operation of padded key data and padding consonants. A data conjunction unit(240) conjuncts texts to be encrypted to an XOR-calculated data, and a data padding unit(250) performs the padding process of the conjunct data. An SHA-1 Hash calculation unit(270) supports the SHA-1 Hash calculation of the padded data. The data selection unit selects the results of the SHA-1 Hash calculation or the texts to be encrypted and transfers the results or the texts to the data conjunction unit. A controller(260) reads out the data necessary for performing the encrypted operation and controls the operation of the data conjunction unit and the data padding unit.