FASOO.COM CO., LTD Patent applications |
Patent application number | Title | Published |
20160127416 | APPARATUS AND METHOD FOR CONTROLLING ACCESS TO SECURITY CONTENT USING NEAR FIELD NETWORK COMMUNICATION OF MOBILE DEVICES - Disclosed is an apparatus for controlling access to a security content using near field network communication of mobile devices. A policy issuance provider registration unit requests a content security policy for a first content, a security content, to a service server, receives the content security policy for the first content, requests to the service server for a first mobile device to be registered as a content security policy issuance provider, and receives a result of registration and a provider policy from the service server. A policy issuance provider converting unit converts the first mobile device to the content security policy issuance provider when receiving a request for access for browsing the first content through near-field network communication from another mobile device in which a DRM client application is being executed. A temporary content security policy issuance unit issues a temporary content security policy for the first content through near-field network communication to the second mobile device so that the second mobile device can browse the first content. | 05-05-2016 |
20150109633 | APPARATUS AND METHOD FOR SECURING PRINTING - Disclosed are an apparatus and a method for securing printing. The present invention performs a print security action with respect to outputted data in accordance with a printing policy, when a security pattern is included in the outputted data of an outputted product. According to the present invention, by performing the print security action with respect to the outputted data in accordance with the printing policy, when the security pattern is included in the outputted data, printing of personal information and similar which is included in the outputted data can be prevented. | 04-23-2015 |
20140247961 | APPARATUS AND METHOD FOR DISPLAYING WATERMARK ON A SCREEN - There is provided a method and apparatus for displaying a watermark on a screen. According to the present invention, when an application is executed or a document is opened by a user's manipulation, it is determined whether a watermark is displayed based on a message generated from an operating system and screen watermark display policies, and when it is determined that the watermark is displayed, the watermark is displayed on a screen. According to the present invention, when the watermark is displayed on a screen, it is possible to provide a user with notification that corresponding content is important content or confidential content. Even when the screen is captured or is imaged using a camera, the watermark is displayed in the captured image or the imaged video. Therefore, it is possible to identify that the corresponding content is important content or confidential content. As a result, it is possible to increase user awareness of security. | 09-04-2014 |
20140150103 | APPLICATION MODULE INJECTION DEVICE, COMPUTING DEVICE INCLUDING APPLICATION MODULE INJECTION FUNCTION, AND RECORDING MEDIUM FOR RECORDING PROGRAM FOR EXECUTING APPLICATION MODULE INJECTION METHOD - Provided are an application module injection device, a computing device including an application module injection function, and a recording medium that records a program for executing an application module injection method. The application module injection device includes a function registration unit configured to register, in an operating system (OS), a first callback function for receiving a notice about whether a process corresponding to a program whose execution is instructed by a user is created from the OS and a second callback function for receiving a notice about whether an image corresponding to the program whose execution is instructed by the user is driven, a process information acquisition unit configured to receive the notice about whether the process corresponding to the program whose execution is instructed by the user is created from the OS through the first callback function, a process determination unit configured to select a process generated so as to correspond to the program whose execution is instructed by the user as an application module injection target process when the program whose execution is instructed by the user, which is determined through the second callback function, corresponds to a predetermined type of program, a context change unit configured to change a first entry point included in a context of a thread corresponding to the application module injection target process into a second entry point of an injected application module, and an application module injection unit configured to inject the application module into the application module injection target process. | 05-29-2014 |
20140047461 | COMPUTING DEVICE HAVING A DLL INJECTION FUNCTION, AND DLL INJECTION METHOD - Provided are a computing device provided with a DLL injection function and a DLL injection method. When receiving from an operating system notification of whether a target process corresponding to a program ordered by a user to be executed is created, a process creation module of an injection program executes a launcher process to create the target process as a child process of the launcher process and sets the target process to a suspend mode. A code insertion module receives allocation of a memory region where the target process is stacked, using a process handle of the target process, to insert a code for executing a DLL file to be injected into the target process. A restoration module cancels the suspend mode of the target process to allow the target process to be executed. According to the present invention, it is possible to stably perform DLL injection without confliction with another DLL injection technique by inserting a DLL executable code into the memory region of the target process which is created in the suspend mode. | 02-13-2014 |
20130298257 | DEVICE FOR RIGHT MANAGING WEB DATA, RECORDING MEDIUM FOR PERFORMING METHOD FOR RIGHT MANAGING WEB DATA ON COMPUTER, AND DEVICE AND METHOD FOR PROVIDING RIGHT MANAGEMENT INFORMATION - Disclosed are a device for right managing web data, a recording medium for performing a method for right managing web data on a computer, and a device and a method for providing right management information. In the device for right managing web data, a message processing unit adds agent information, which shows support for right management, to the header of a web data request message that is sent to a web server from a web browser, and sends same to the web server, parses and outputs the right information included in the header of a web data reply message that is sent to the web browser from the web server, and sends web data that is included in the web data reply message to the web browser. Also, a right managing unit controls the output of web data, which is included in the web data reply message, through a web browser based on the parsed right information which is input from the message processing unit. | 11-07-2013 |
20130226976 | FILE-PROCESSING DEVICE FOR EXECUTING A PRE-PROCESSED FILE, AND RECORDING MEDIUM FOR EXECUTING A RELATED FILE-PROCESSING METHOD IN A COMPUTER - Disclosed are a file-processing device for executing a pre-processed file, and a recording medium for executing a related file-processing method in a computer. Once a request for registry information corresponding to the extension of a file is inputted according to a request for the execution of the file selected by the user, a registry-converting unit outputs a preset substitute value instead of the registry default value for executing a connection program corresponding to the extension of the file as the result value for the registry information request. A control unit pre-processes the file through a control program set in correspondence to the substitute value. A file-executing unit executes the file by executing the connection program of the file corresponding to the registry default value after pre-processing. According to the present invention, the file for which an execution request is inputted is identified in advance; the pre-processing required for the corresponding file is performed through the control program, which is executed before the connection program of the corresponding file is executed; and the corresponding file is executed. Therefore, the above may be applied to an existing system without restriction, and user convenience may be improved. | 08-29-2013 |
20130219501 | MALICIOUS CODE REAL-TIME INSPECTING DEVICE IN A DRM ENVIRONMENT AND RECORDING MEDIUM FOR RECORDING A PROGRAM TO EXECUTE A METHOD THEREOF - Disclosed are a malicious code real-time inspecting device in a DRM environment and a recording medium for recording a program to execute a method thereof. A DRM module performs decryption and encryption during file reading/writing operations through a handle after confirming user rights relating to a file on the basis of a handle of a file having DRM applied when an execute command is inputted, outputs an inspection request message including a handle and a path of a file, and determines whether to perform an open operation of a file according to a malicious code inspection result on a file. A malicious code inspecting module inspects whether an original file, which is to be decrypted and read by the DRM module, is infected by malicious code or not on the basis of a handle and a path of a file in an inspection request message delivered from an interface module. According to the present invention, whether a document encrypted with DRM applied is infected by malicious code is inspected and treated in real-time. | 08-22-2013 |
20130160033 | HOOK RE-ENTRY PREVENTION DEVICE AND RECORDING MEDIUM, IN WHICH PROGRAM FOR EXECUTING METHOD THEREOF IN COMPUTER IS RECORDED THEREON - Disclosed are a hook re-entry prevention device and a recording medium, in which a program for executing the method thereof in a computer is recorded thereon. A state information management module sets or releases a state information flag which indicates whether a hook function is called. If the state information flag is set when the hook function is called, a re-entry prevention module determines that the calling of the hook function has been conducted from the inside of a hook layer and returns a value to a system layer. According to the present invention, an entry/breakaway layer which is independent from the hook layer functions in such a manner that the hook layer is safely isolated from the hook, thereby preventing hook re-entry caused by the callback of an original function of a lower function while a hook routine within the hook layer is performed during a dynamic API hooking. | 06-20-2013 |
20130151864 | CLIPBOARD PROTECTION SYSTEM IN DRM ENVIRONMENT AND RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING METHOD IN COMPUTER IS RECORDED - Disclosed are a clipboard protection system in a DRM environment and a recording medium in which a program for executing the method in a computer is recorded. An identification information management unit changes first identification information of data, which is to be stored in a clipboard, into second identification information when data stored in the clipboard is requested by a reliable object, and outputs the second identification information corresponding to identification information of the reading target data if the reliable object requests extraction of the data stored in the clipboard. A data protection unit encodes the data, which is to be stored in the clipboard, and decodes the encoded data which is read from the clipboard. If the extraction request for the data stored in the clipboard is inputted from the reliable object, a control unit delivers to a clipboard management system the second identification information corresponding to the identification information of the reading target data, and requests the encoded security data to be read and provided from the clipboard. According to the present invention, the access to the security data by a non-reliable object can be blocked. | 06-13-2013 |