Patent application number | Description | Published |
20090249078 | OPEN ID AUTHENTICATION METHOD USING IDENTITY SELECTOR - Provided is an Open ID authentication method using an identity selector, which can simplify the authentication of an open ID and reduce phishing and hacking risks by automatically performing an open ID-based login process without the need to manually input an open ID uniform resource locator (URL) to a login window. | 10-01-2009 |
20100310078 | SYSTEM FOR USER-CENTRIC IDENTITY MANAGEMENT AND METHOD THEREOF - A user terminal for a user-centric identity management system includes: a browser that requests a service to the service provider server and receives a service parameter in which a plurality of selectable protocol parameters corresponding to the service are recorded from the service provider server; an interaction unit that selects any one protocol parameter among the plurality of protocol parameters by receiving the service parameter through the browser; and a service processing unit that performs a service protocol with the service provider server on the basis of the protocol parameter selected through the interaction unit, and receives token information required to receive the service from the service provider server and transfers the token information to the browser. | 12-09-2010 |
20110126010 | SERVER, SYSTEM AND METHOD FOR MANAGING IDENTITY - Disclosed herein is a system and method for managing identity. The system includes a mobile terminal, a web server, and a service terminal. The mobile terminal includes a smart card on which a management server for managing user identity is mounted. The web server generates the user identity and provides the generated identity to the management server over a wired/wireless network. The service terminal receives a required identity from the mobile terminal using Near Field Communication (NFC). | 05-26-2011 |
20110129089 | METHOD AND APPARATUS FOR PARTIALLY ENCODING/DECODING DATA FOR COMMITMENT SERVICE AND METHOD OF USING ENCODED DATA - Disclosed herein is a method and apparatus for partially encoding/decoding data for a commitment service and a method of using encoded data. The apparatus includes an encoding/decoding module for encoding/decoding a database to be committed to a server using a private key of the user, obtained by accessing a key storage unit through a key management module which manages information about the private key of the user, stored in the key storage unit, and also encoding/decoding an SQL query required to use a DB committed to the server. The encoding/decoding module partially encodes/decodes one or more of table names, field names, and attribute values of the DB. In the present invention, the table names, field names, and field attribute values of the DB are partially encoded while the existing structure of the DB is maintained, and the partially encoded DB is committed to the server. | 06-02-2011 |
20110153800 | IDENTITY SHARING METHOD AND APPARATUS IN MOBILE COMPUTING ENVIRONMENT - An identity protocol gate way according to the exemplary embodiments of the present invention includes an artifact generating and inquiring module generating an artifact by receiving a sharing request message from a mobile identity wallet according to a request made by an application program of a mobile device, inquiring corresponding identity information according to a request of the identity information including the artifact from a web server and transferring the inquired identity information to the web server; and a protocol converting module converting the sharing request message into a protocol message of a wired environment by receiving the sharing request message from the mobile identity wallet, transferring the protocol message to the identity web server, transferring sharing response information and the artifact to the application program of the mobile device by using a mobile protocol in response to the sharing response information from the identity web server. | 06-23-2011 |
20130160122 | TWO-STAGE INTRUSION DETECTION SYSTEM FOR HIGH-SPEED PACKET PROCESSING USING NETWORK PROCESSOR AND METHOD THEREOF - A system and method for detecting network intrusion by using a network processor are provided. The intrusion detection system includes: a first intrusion detector, configured to use a first network processor to perform intrusion detection on layer 3 and layer 4 of a protocol field among information included in a packet header of a packet transmitted to the intrusion detection system, and when no intrusion is detected, classify the packets according to stream and transmit the classified packets to a second intrusion detector; and a second intrusion detector, configured to use a second network processor to perform intrusion detection through deep packet inspection (DPI) for the packet payload of the packets transmitted from the first intrusion detector. Thereby, intrusion detection for high-speed packets can be performed in a network environment. | 06-20-2013 |
20130347069 | REFERER VERIFICATION APPARATUS AND METHOD - A referer verification apparatus and method for controlling web traffic having malicious code are provided. In the referer verification method, whether a referer is present in a Hypertext Transfer Protocol (HTTP) packet is determined. If it is determined that the referer is present in the HTTP packet, Uniform Resource Locators (URLs) are extracted from a referer web page corresponding to the referer. The referer is verified based on a URL corresponding to a referer verification request received from a server and the extracted URLs. A Completely Automated Public Test to tell Computers and Humans Apart (CAPTCHA) verification procedure conducted by a user is performed based on results of the verification of the referer. | 12-26-2013 |
20140013389 | COMMUNICATION BLOCKING CONTROL APPARATUS AND METHOD THEREOF - A communication blocking control method includes receiving a communication blocking request from a terminal in an idle state in which it is difficult to find out whether information is leaked or not; registering a state of the terminal in a communication blocked list according to the communication blocking request; and blocking external communication of the terminal through a network. | 01-09-2014 |
20140020067 | APPARATUS AND METHOD FOR CONTROLLING TRAFFIC BASED ON CAPTCHA - An apparatus and method for controlling traffic based on a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) are provided. The traffic control apparatus includes a traffic monitoring unit, a CAPTCHA verification unit, a list management unit, and a traffic control unit. The traffic monitoring unit monitors a packet between an internal network and an external network. The CAPTCHA verification unit, if packet information is not present in an access control list, sends a CAPTCHA request message to a client computer, receives a CAPTCHA response message, and verifies the CAPTCHA response message. The list management unit, if the packet information is present in the access control list, detects an access control policy corresponding to the packet information in the access control list. The traffic control unit controls traffic based the verification of the CAPTCHA response message and the control policy. | 01-16-2014 |