Abstract:
PURPOSE: A smart phone application verification system and a method thereof are provided to verify an application before registering the application in an application market, thereby blocking the application with a vicious code in advance. CONSTITUTION: An automatic application verification device(100) makes a scenario by analyzing an installation file of an application installed in a smart phone(30). The automatic application verification device determines vicious action based on an execution result by executing the application in the smart phone corresponding to the scenario. An application self-verification device(200) monitors the installation file and determines the vicious action by analyzing an action log corresponding to a monitoring result. The automatic application verification device includes an application management unit and a vicious action detection unit. [Reference numerals] (100) Automatic application verification device; (200) Application self-verification device
Abstract:
PURPOSE: A security system with a certificate revocation function is provided to form a certificate revocation mechanism without an additional calculation process by using an elliptic curve cryptogram. CONSTITUTION: A secret key is calculated by selecting the first integer from a predetermined range and the secret key is set up as a user secret key(1,2). The second integer is obtained by using the secret key(3). The secret keys formed by the first and the second integers are transmitted to a security mediation portion and a user(4). The user discloses a public key(5). A cryptogram including the first and the second cryptograms is generated by using random numbers and the public key. The first cryptogram is transmitted to the security mediation portion to verify a user certificate. The security mediation portion verifies the first cryptogram. The first cryptogram is decoded if the security mediation portion verifies the first cryptogram.
Abstract:
PURPOSE: An access control system and method is provided to secure a secrecy irrespective of an openness of a system OS, and to maintain a security against a system hacking by using a daemon determining an access authority and a security kernel performing a communication with the daemon via a character process device. CONSTITUTION: The method comprises steps of generating a packet to be requested via a system call module within a security kernel(S411), inserting the packet into a request list(S412), waking up a process sleeping at a read queue of a character process queue(S413), making the process sleep at a write process queue(S414), enabling a daemon, having an access authority and sleeping at the write queue of the character process device, to receive a request from a corresponding character process device and bring a corresponding packet from the request list(S421), checking if the corresponding packet exists at the request list(S422), if the corresponding packet exists at the request list, copying the brought packet at a user mode space(S423), if it does not, sleeping at the read queue(S424), if the security kernel wakes up a process sleeping at the read queue, instantly processing the request transmitted to the packet(S425), copying a response packet from the user space to a kernel space(S426), waking up the process sleeping at the write queue, and then executing the security kernel for receiving the result(S427), and giving back an execution result to a kernel module requesting an access control approval(S415).
Abstract:
1. 청구 범위에 기재된 발명이 속한 기술분야 비선형 이진난수 발생기 2. 발명이 해결하려고 하는 기술적 과제 대수적 체계가 다르고 서로 상반된 특성을 가지고 있는 선형 쉬프트 레지스터(LFSR)와 캐리를 갖는 선형 쉬프트 레지스터(FCSR)을 결합하므로써 고속으로 난수를 발생하고, 비도와 난수 통계적 특성이 우수한 비선형 이진난수 발생기를 제공하고자 함. 3. 발명의 해결방법의 요지 본 발명은 선형 쉬프트 레지스터에서 원시 다항식에 근거하여 선형 난수열을 발생하고, 캐리를 갖는 선형 쉬프트 레지스터에서 특정의 대수 체계를 기반으로 비선형 난수열을 발생하여, 두 난수열을 배타적 논리합 게이트에서 배타적 논리합 연산을 수행하므로써 고속으로 난수를 발생하고 비도와 난수 통계적 특성이 우수하며 난수의 최대 주기를 보장할 수 있다. 4. 발명의 중요한 용도 범용 신호처리 또는 전자문서 거래시스템에서의 디지탈 서명, 무결성, 및 신분 확인 등을 비롯한 정보 보호 서비스 환경에 이용됨.
Abstract:
본 발명은 네트워크 프로세서를 이용하여, 네트워크 침입을 탐지하는 장치 및 침입탐지 방법에 대한 발명이다. 더욱 상세하게는, 제1 네트워크 프로세서를 이용하여, 침입탐지장치에 전송된 패킷의 패킷 헤더(packet header)에 포함된 정보 중, 레이어3(layer3)과 레이어4(layer4)의 프로토콜 필드에 대하여 침입탐지를 수행하고, 상기 침입이 탐지되지 않는 경우, 상기 패킷을 플로우(flow)에 따라 분류하여 제2 침입탐지기에 전송하는 제1 침입탐지기, 및 제2 네트워크 프로세서를 이용하여 상기 제1 침입탐지기에서 전송된 패킷의 패킷 페이로드(packet payload)에 대하여 심층 패킷 조사(Deep Packet Inspection: DPI)를 통한 침입탐지를 수행하는 제2 침입탐지기를 포함하는 침입탐지장치를 통하여, 네트워크 환경에서 고속 패킷에 대한 침입탐지를 처리할 수 있게 된다.
Abstract:
PURPOSE: A blind signature method using elliptical curve is provided to proceed blind signature using the prime factorization based elliptical curve on Zn so as not to trace the relationship between a message and a person who received the signature. CONSTITUTION: A super singular elliptical curve is selected(201), a prime number p is selected(202), and a prime number q is selected(202). n = pq is calculated(204). Nn = lcm(#Ep(0, b), #Eq(0, b)) = lcm(p + 1, q + 1) is calculated(205), where lcm means lowest common multiple. The public key(e) of (Nn, e) = 1 is generated, and the secret key(d) satisfying ed = 1(mod Nn) is generated(206). The public keys(e, n) are opened as the key of the signer, and the secret key(d) is distributed to the signer secretly(207).
Abstract:
inspecting monitor security lable after inputted pathword and user discriminator and using demand securuty lable; and determining whether system using permits or not after compared monitor security lable and using demand security lable.
Abstract:
The present invention relates to a referrer verifying apparatus and a method thereof to control a web traffic of malicious codes. The referrer verifying method comprises the steps of: checking whether a referrer exists in an HTTP packet; extracting URL from a referral web page corresponding to the referrer when the referrer exists in the HTTP packet; verifying the referrer based on a URL matched with a referrer verification request from a server, and the extracted URL; and performing a capture verification procedure by a user on the basis of the referrer verification result. [Reference numerals] (100) Server; (200) Referrer verifying device
Abstract:
본 발명은 비트스트림 보호를 위한 FPGA 장치 및 그 방법에 관한 것으로, FPGA 장치는 내부에서만 접근 가능하며, 내부에서 난수 발생기에 의해 발생된 암복호용 키 및 초기값이 저장되는 키 저장부, 내부 비휘발성 메모리로서 인증 및 암복호화 설정을 위한 비트스트림이 저장되는 설정용 비트스트림 저장부, 및 키 저장부에 저장된 암복호용 키 및 초기값을 호출하여 설정용 비트스트림 저장부에 저장된 비트스트림에 대한 암호화 수행 결과로서 생성된 암호화된 비트스트림 및 인증코드를 외부 비휘발성 메모리에 저장하고, 암호화된 비트스트림을 이용하여 디자인 설계 시에 외부 비휘발성 메모리에 저장된 암호화된 비트스트림에 대한 무결성을 검증하는 인증 및 암복호화 설정부를 포함한다.
Abstract:
PURPOSE: A masking method for protecting power analysis attacks is provided to reduce operation quantity needed for masking operation. CONSTITUTION: An inverse table is generated(S510). A first and a second conversion tables for an additional conversion according to the use of the inverse table is generated. 6 one-bite mask values and 2 four-bits mask values required for the masking are generated(S530). The inverse table is masked with the new mask value. The masking inverse table is generated(S550). A masking S box is composed using the masking inverse table, and the first and the second conversion table(S570).