Abstract:
본 발명은 P2P 네트워크에서 영수증 기반의 피어의 신뢰 정보 관리 시스템 및 방법에 관한 것이다. P2P 네트워크에서 영수증 기반의 피어의 신뢰 정보 관리 시스템은 다수의 피어로부터 영수증 발급 정보 또는 영수증 정보를 수신받아, 이 정보를 기초로 피어의 신뢰도 값을 계산하고 관리하며, 피어의 신뢰도 정보를 제공하는 피어 신뢰도 관리 서버; 특정 피어(Peer B)로 파일을 요청하여 파일을 수신한 후, 특정 피어로 비대칭키 알고리즘을 사용하여 피어 A의 개인키로 암호화하여 영수증을 발급하고, 피어 신뢰도 관리 서버로 피어 A의 개인키로 암호화하여 영수증 발급 정보를 전송하는 피어 A; 피어 A의 개인키로 암호화된 영수증을 수신하여, 피어 신뢰도 관리 서버로 피어 B의 개인키로 암호화하여 영수증 정보를 등록하는 피어 B; 및 상기 피어 신뢰도 관리 서버로 특정 피어의 신뢰도 정보를 요청하고, 피어 신뢰도 관리 서버의 개인키로 암호화된 특정 피어의 신뢰도 정보를 수신하는 피어 C를 포함한다. 따라서, 피어 신뢰도 관리 서버는 P2P 네트워크에서 피어들의 신뢰도를 관리할 수 있다. P2P, 피어 신뢰도 관리 서버, 피어(Peer), 영수증, 신뢰 정보
Abstract:
다중 관측윈도우 상에서의 네트워크 플로우 측정장치 및 그 방법에 관한 것이다. 본 발명은, 제한된 하드웨어 리소스 내에서 다중 관측 윈도우들에서 네트워크 트래픽 측정할 수 있는 방법을 제시한다. 따라서, 본 발명에 따르면, 다중 관측윈도우 상에서의 네트워크 플로우 측정 방법을 하드웨어로 구현할 수 있다. 네트워크 침입탐지, 관측 윈도우, 슬라이딩 윈도우, 네트워크 플로우
Abstract:
PURPOSE: A safe TCP connection management apparatus and method are provided to directly control a TCP connection in the middle of a user terminal network and a server. CONSTITUTION: A verification key generator(101) creates a verification key on the basis of an SYN(Sequence Number) packet. A connection verification unit(102) decides the validity of a TCP connection on the basis of the analysis result of the answer signal of a user terminal for the verification key, and the SYN packet. A TCP connection control unit(100) controls data packet transceiving to a communication server from the user terminal on the basis of the decision result of the TCP connection.Ais proceed the production A connection information management unit(103) manages connection information and creates and manages a hash key corresponding to the connect information.
Abstract:
PURPOSE: A session management method is provided to secure wire-speed in session tracking and managing even on a Giga network having higher complexity. CONSTITUTION: A management unit(500) constitutes the entry of a single packet and a plurality of fraction packets in a session table(300) and a fragment table(400). The session table comprises an entry composed for the status information of a packet for session connection and session close and a single packet which is not fragmented. The fragment table comprises entries composed for the status information of 1 to N fragment packets.
Abstract:
PURPOSE: A correlation analysis apparatus and method thereof based on malicious file informaiton on network are provided to recognize a malicious code path and scenario based on file informaiton that is collected on network. CONSTITUTION: A scenario definition table(104) is composed on the malicious code propagation path of one or more scenarios. A correlation definition table(106) is composed of a correlation condition based on traffic characteristic. A post decision process unit produces the malicious probability value about each concern file through comparison between the traffic information table and the scenario definition table.
Abstract:
An application service offering system using video data and a method thereof are provided to receive and store images, photographed by various video photographing devices such as CCTV, safely, and process and transmit the stored images according to the purpose and characteristic of an application service server to the application service server. A video data processing server(200) collects video data transmitted from various image photographing devices(100), and then stores the collected video data. The video data processing server makes the collected video data into data required for the application service so that an application service server(300) can use the data, and then compresses and transmits the processed result to application service servers. The application servers request and receive data required for providing the application service from the video data processing server, and then provide the application service requested by a user equipment.
Abstract:
본 발명은 불법 공유를 목적으로 변형가능한 범위의 모든 검색어를 차단할 수 있도록 하는 저작권이 있는 정보의 불법 공유를 차단하기 위한 사용자 검색어 필터링 방법 및 장치에 관한 것으로서, 저작권이 있는 정보에 해당하는 검색어들에 대한 각 필터링 패턴을 설정하고, 사용자 입력 검색어로부터 특수 문자들을 제거하여 연속된 한글 또는 영어의 글자로 변환한 후, 상기 특수문자가 제거된 검색어를 상기 설정된 필터링 패턴들과 비교하여, 검색 차단 여부를 결정한다. 검색어 필터링, 저작권, 불법 공유
Abstract:
An apparatus for a low power SHA-1 hash operation and an apparatus for low power HMAC(keyed Hash message Authentication Code) cryptographic using the same are provided to protect user privacy in wired/wireless data configuration such as a mobile trusted computing, an RFID(Radio Frequency IDentification), a wireless sensor network, a home network and so on. A key padding unit(230) performs the padding process of key data for HMAC calculation, and an XOR calculation unit(233) performs an XOR operation of padded key data and padding consonants. A data conjunction unit(240) conjuncts texts to be encrypted to an XOR-calculated data, and a data padding unit(250) performs the padding process of the conjunct data. An SHA-1 Hash calculation unit(270) supports the SHA-1 Hash calculation of the padded data. The data selection unit selects the results of the SHA-1 Hash calculation or the texts to be encrypted and transfers the results or the texts to the data conjunction unit. A controller(260) reads out the data necessary for performing the encrypted operation and controls the operation of the data conjunction unit and the data padding unit.
Abstract:
An apparatus and a method for displaying a network state are provided to determine an abnormal state which deteriorates the performance of a network by using information about distinct dispersion, entropy, and clustering as a result of a combination of important properties in a traffic event, and detect a harmful traffic or an abnormal traffic. A method for displaying a network state comprises the following steps of: grouping traffics according to a protocol(S100); selecting and combining three of a resource address, a resource port, a destination address, and a destination port, and calculating distinct dispersion and entropy for a remaining element(S200); displaying the calculated distinct dispersion and entropy on a security radar that an angle of a circle is divided into N and a radius of the circle is divided into M(S300); and detecting the abnormality of a network by referring to a displayed radar state and detecting and reporting a harmful traffic or an abnormal traffic which causes an abnormal state(S400).
Abstract:
A current source mode double integration type conversion apparatus is provided to be applied to various sensors by simply amending an interface circuit according to a capacitance and a resistance type of the sensors. A current source mode double integration type conversion apparatus includes a current mode double integration unit(100), a comparison unit(200), a gate logic unit(300), and a digital control unit(400). The current mode double integration unit integrates an input current for a predetermined time and outputs an integrated voltage. The comparison unit compares a predetermined reference voltage with the integrated voltage outputted from the current mode double integration unit, and outputs a compared output pulse signal. The gate logic unit outputs the output pulse signal which is logically calculated using a predetermined internal signal and the output pulse signal of the comparison unit. The digital control unit generates a corresponding request signal based on the pulse signal outputted from the gate logic unit.