Patent application number | Description | Published |
20090183231 | USER TERMINAL WITH SECURITY FUNCTION AND SECURITY-CONTROL METHOD - A user terminal apparatus with a security function and a security-control method are provided, which may prevent unauthorized use of the user terminal apparatus without requiring a user to lock up the user terminal apparatus. The user terminal apparatus includes an input sensing unit which senses a user's input to the user terminal apparatus, an information collecting unit which collects information regarding an input state, which is determined based on the user's input, and a transition of the determined state, and a security-control unit which determines whether the user is valid based on the collected information and controls a security function. | 07-16-2009 |
20090278664 | RADIO FREQUENCY IDENTIFICATION (RFID) TAG ENCRYPTION METHOD AND SYSTEM USING BROADCAST ENCRYPTION (BE) SCHEME - A radio frequency identification (RFID) tag encryption method and system using a broadcast encryption (BE) scheme are provided by encrypting an ID of an RFID tag, storing the encrypted ID in a server and the RFID tag, and storing information relating to a reader authorized to read out the RFID tag in the server so that the reader can read out the RFID tag by decrypting the encrypted ID based on the encrypted ID information read from the RFID tag and the reader information. When readers read out ID data from the RFID tag, a privileged reader can read the data. Thus, it is possible to block unintended information leakage to the readers. In addition, user usability can be enhanced since an attacker cannot perform an access lock on the RFID tag. | 11-12-2009 |
20100162366 | APPARATUS AND METHOD OF PROTECTING PRIVATE INFORMATION IN DISTRIBUTED NETWORK - Disclosed are methods and apparatus to protect private information in a distributed network. In the distributed network, a service request terminal may receive, from a service providing terminal, trust information related to a level of trust of the service providing terminal with respect to a desired service. Also, the service request terminal may verify whether to be provided with the desired service from the service providing terminal based on the trust information, thereby preventing private information of the service request terminal from being leaked. In addition, the service request terminal may easily verify the identity of the service providing terminal when the service request terminal re-visits the service providing terminal. | 06-24-2010 |
20100169980 | PERSONAL INFORMATION PROVIDING APPARATUS AND METHOD - A personal information providing method and apparatus is provided. The personal information providing apparatus may extract personal information about at least one characteristic corresponding to a predetermined standard from a database storing personal information of a plurality of characteristics, embed the personal information about the at least one characteristic in a predetermined image, generate a personal information image, generate a watermark having trace information embedded, and embed the watermark in the personal information image. | 07-01-2010 |
20110093712 | COMMUNICATION DEVICE SUPPORTING PAIRING - Provided is a communication device. The communication device may transmit information to an external device using a terminal that makes a physical contact with the external device, and may sense the physical contact. In response to the sensed physical contact, the communication device may generate a link key. | 04-21-2011 |
20110179430 | Computer System and Method for Preventing Dynamic-Link Library Injection Attack - A computer system and method for preventing a Dynamic-Link Library (DLL) injection attack are provided. The computer system monitors an operation where a process attempts to dynamically link an executable code library to another process, and intercepts the dynamic link of the executable code library. | 07-21-2011 |
20110179490 | Apparatus and Method for Detecting a Code Injection Attack - A code injection attack detecting apparatus and method are provided. The code injection attack may be detected based on characteristics occurring when a malicious code injected by the code injection attack is executed. For example, the code injection attack detecting apparatus and method may detect that a code injection attack occurs when a buffer miss is detected, a page corresponding to an address is updated, a mode of the page corresponding to the address is in user mode, and/or the page corresponding to the page is inserted by an external input. | 07-21-2011 |
20110239211 | SYSTEM, APPARATUS, AND METHOD FOR DOWNLOADING FIRMWARE - Disclosed are an apparatus for downloading a firmware and an apparatus for installing the firmware. The apparatus for downloading the firmware may download an encrypted firmware in the apparatus for installing the firmware. The apparatus for installing apparatus may receive and install the encrypted firmware. | 09-29-2011 |
20120036353 | TAG GENERATION METHOD IN BROADCAST ENCRYPTION SYSTEM - A tag generation method for generating tags used in data packets in a broadcast encryption system is provided. The method includes detecting at least one revoked leaf node; setting a node identification (node ID) assigned to at least one node among nodes assigned node IDs at a layer 0 and to which the at least one revoked leaf node is subordinate, to a node path identification (NPID) of the at least one revoked leaf node at the layer 0; generating a tag list in the layer 0 by combining the NPID of each of the at least one revoked leaf nodes at the layer 0 in order of increment of node IDs of the corresponding at least one revoked leaf nodes; and generating a tag list in a lowest layer by repeatedly performing the setting and generation operation down to the lowest layer. | 02-09-2012 |
20120093310 | APPARATUS AND METHOD THAT GENERATES ORIGINALITY VERIFICATION AND VERIFIES ORIGINALITY VERIFICATION - Provided is an apparatus and method that may generate and verify an originality verification (OV). An OV generating apparatus may generate primary information that is based on generator information and a pseudorandom number, may generate at least one secondary information based on the pseudorandom number, may obtain parameters used when the pseudorandom number is generated, may generate the OV including the primary information, the at least one secondary information, and the parameters, and may distribute the OV to an OV request device.
| 04-19-2012 |
20120183136 | APPARATUS AND METHOD FOR GENERATING A KEY FOR BROADCAST ENCRYPTION - An apparatus and method for generating a key for a broadcast encryption. The apparatus includes a node secret generator for managing a user that receives broadcast data in a tree structure and for generating a unique node secret for each node in the tree structure. The apparatus also includes an instant key generator for temporarily generating an instant key used at all nodes in common in the tree structure, and a node key generator for generating a node key for each node by operating the node secret generated at the node secret generator and the instant key generated at the instant key generator. Thus, key update can be efficiently achieved. | 07-19-2012 |
20120213364 | COMBINATION-BASED BROADCAST ENCRYPTION METHOD - A combination-based broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using as a base the base group allocated to each user; producing and sending an inverse-base parameter value through calculations with integers used to produce the base group and key value information of one or more privileged users; and deriving a group key by using the key value information of the privileged users, encrypting a session key by using the derived group key, and sending the encrypted session key to each user. Accordingly, each user is assigned a different base through a combination, thereby having security against collusion attacks. | 08-23-2012 |
20120263300 | TAG GENERATION METHOD IN BROADCAST ENCRYPTION SYSTEM - A tag generation method for generating tags used in data packets in a broadcast encryption system is provided. The method includes detecting at least one revoked leaf node; setting a node identification (node ID) assigned to at least one node among nodes assigned node IDs at a layer 0 and to which the at least one revoked leaf node is subordinate, to a node path identification (NPID) of the at least one revoked leaf node at the layer 0; generating a tag list in the layer 0 by combining the NPID of each of the at least one revoked leaf nodes at the layer 0 in order of increment of node IDs of the corresponding at least one revoked leaf nodes; and generating a tag list in a lowest layer by repeatedly performing the setting and generation operation down to the lowest layer. | 10-18-2012 |
20130074152 | METHOD AND DEVICES FOR SECURITY ASSOCIATION (SA) BETWEEN DEVICES - In one aspect, there is provided a method and apparatus for security association (SA) upon communication between devices. When a mobile device is connected to another mobile device without subscribing to a specific service or a private network, SA may be established. For example, the SA may be used for resource saving and secure connections of resource poor devices (for example, a medical patch) having a relatively poor resource, such as insufficient battery power or computing power. | 03-21-2013 |
20130097105 | CONTEXT AWARE APPARATUS AND METHOD - A context aware apparatus is provided. The context aware apparatus includes an extracting unit configured to extract a terminological-box (T-box) from a semantic model, a first generating unit configured to generate a reasoning rule based on the extracted T-box, a second generating unit configured to generate a first assertion-box (A-box) based on sensing information, and a reasoning unit configured to infer a user context based on the reasoning rule and the first A-box. | 04-18-2013 |
20130138600 | APPARATUS AND METHOD FOR MANAGAING AXIOM, AND REASONING APPARATUS INCLUDING THE SAME - A method of managing an axiom includes determining if an H in an A→H axiom in existing axioms is a predetermined expression; and if the H is the predetermined expression, collecting, from the existing axioms, a B→I axiom in which the B includes the H, deleting the A→H axiom from the existing axioms, and generating a new B→I axiom from the collected B→I axiom by replacing the H in the B with the A. | 05-30-2013 |
20130138701 | ASSERTION MANAGEMENT METHOD AND APPARATUS, AND REASONING APPARATUS INCLUDING THE ASSERTION MANAGEMENT APPARATUS - An assertion management method includes collecting a SameAs assertion from a plurality of assertions; searching the plurality of assertions for any assertion having a first individual of the SameAs assertion as an instance; and creating a new assertion having a second individual of the SameAs assertion as an instance from each found assertion. | 05-30-2013 |