Patent application number | Description | Published |
20080247540 | METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENTS STORED IN USB MASS STORAGE DEVICE - A method and apparatus for protecting digital content stored in a universal serial bus (USB) mass storage (UMS) device from unlimited distribution are provided. According to the method and apparatus, a UMS device generates a random key according to a request from a user and shows the generated random key to the user, and then, by using the random key, registration data is encrypted. Accordingly, only a USB host that registers the UMS device after the user connects the USB host directly to the UMS device, can freely use digital content of the UMS device, and even if encrypted registration data of the UMS is leaked out, unauthorized devices cannot register the UMS device. | 10-09-2008 |
20080247546 | METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENT STORED IN USB MASS STORAGE DEVICE USING TIME INFORMATION - Provided is a method of preventing digital content stored in a universal serial bus (USB) mass storage (UMS) device from being distributed without restriction. In the method, registration data is encrypted in order to allow a UMS device to decrypt and use digital content using time information only within a predetermined term of validity. Accordingly, even if encrypted registration data of a UMS device is disclosed, it is possible to make it difficult for unauthorized devices to store the registration data, thereby preventing content of the UMS device from being distributed without restriction. | 10-09-2008 |
20080250144 | METHOD AND APPARATUS FOR CONTROLLING TRANSMISSION OF CONTENT DATA - Provided are a method and apparatus for controlling transmission of content data. In the method, a communication channel is initially established to transmit the content data, the content data is transmitted through the established communication channel, verification is performed a plurality of times to determine whether the content data is transmitted within an acceptable transmission range, and whether to continue the transmission of the content data is determined according to the verification result. Accordingly, when a client moves to a location outside a predetermined acceptable transmission range in a wireless environment, a server stops transmission of the content data. In addition, content data can be continuously transmitted regardless of interference caused by a temporary obstacle between a server and a client. | 10-09-2008 |
20080250403 | METHOD AND APPARATUS FOR GENERATING FIRMWARE UPDATE FILE AND UPDATING FIRMWARE BY USING THE FIRMWARE UPDATE FILE - Provided is a method of limiting updating of firmware by distinguishing between model code that represents a group of hardware having firmware program codes are compatible with each other and model code that identifies each hardware belonging to the group. The method includes generating a data body having firmware program code that is to be updated; generating a data header having model code of hardware to which the data body is to be applied, wherein the hardware model code comprises first model code representing a group of hardware having firmware program codes are compatible with each other and second model code identifying each hardware belonging to the group; and generating a firmware update file by combining the data body and the data header. | 10-09-2008 |
20080256527 | METHOD OF GENERATING FIRMWARE UPDATE FILE, METHOD AND APPARATUS FOR UPDATING FIRMWARE BY USING THE FIRMWARE UPDATE FILE - Provided are a method of generating a firmware update file which restrictively allows a firmware update for a corresponding hardware model, and a method and apparatus for updating firmware using the firmware update file. By generating a data body including program codes of firmware to be updated, generating a data header including model codes of a hardware device to which the data body is applied, and generating the firmware update file by combining the data body and the data header, the firmware update may be restricted for a corresponding model of a hardware device by using the firmware update file so that firmware of other models of hardware devices may not be updated, an integrity check may be performed using a digital signature when the firmware is updated. | 10-16-2008 |
20080260147 | METHOD AND APPARATUS FOR ENCRYPTING MESSAGE FOR MAINTAINING MESSAGE INTEGRITY, AND METHOD AND APPARATUS FOR DECRYPTING MESSAGE FOR MAINTAINING MESSAGE INTEGRITY - A method of encrypting a message for message integrity is provided. In the method, a random number is generated, a first ciphertext is generated by encrypting the message by using the generated random number, a hash value of the first ciphertext is calculated, an encryption key is generated by using the hash value of the first ciphertext and a shared key, a second ciphertext is generated by encrypting the random number by using the encryption key, and the first and second ciphertexts are combined. | 10-23-2008 |
20080267396 | METHOD OF SHARING BUS KEY AND APPARATUS THEREFOR - A method and apparatus of sharing a bus key is provided, the method including receiving at a first device a device key, encrypted using an encryption key, from a storage device; decrypting the encrypted device key using a decryption key corresponding to the encryption key; creating a random number, and generating a bus key using the created random number and the decrypted device key, by which data to be transmitted through a bus can be encrypted using the bus key; and transmitting the generated bus key to a predetermined device connected to the first device via the bus. | 10-30-2008 |
20080279371 | METHODS OF ENCRYPTING AND DECRYPTING DATA AND BUS SYSTEM USING THE METHODS - Methods of encrypting and decrypting data, and a bus system using the methods are provided. The method of encrypting data includes: performing an operation on data that is to be transmitted through a bus with a key stream generated from a predetermined key so as to encrypt the data; transmitting the encrypted data to a predetermined module through the bus; and transmitting a synchronization signal that is logic high when the encrypted data is transmitted through the bus to the predetermined module. Therefore, an encryption speed is improved and encryption can be simply embodied so that security of data received from the bus can be improved. | 11-13-2008 |
20080279385 | METHOD AND HOST DEVICE FOR USING CONTENT USING MOBILE CARD, AND MOBILE CARD - Provided are a method and host device for using content using a mobile card, and a mobile card. The method includes storing an identifier (ID) of the mobile card, a global key, and a content key encrypted by a secret key of the mobile card, generating a combined key of the ID and the global key, generating a first cryptogram, in which the content key encrypted by the secret key is encrypted by the combined key, transmitting the first cryptogram to the mobile card, receiving from the mobile card a second cryptogram, in which the content key is encrypted by the combined key, and decrypting the second cryptogram. Accordingly, a user can use encrypted content from a remote place. | 11-13-2008 |
20080279464 | TRANSPORT STREAM STRUCTURE OF IMAGE DATA HAVING ADDITIONAL INFORMATION INSERTED, AND METHOD AND APPARATUS FOR TRANSMISSION AND RECEPTION THEREOF - Provided are a transport stream structure of image data, a transmitting and receiving apparatus and method thereof. A transport stream structure of image data includes a header compressed by a lossless compression algorithm; an additional information field for additional information of image data, the additional information field being generated based on compressing the header by using the lossless compression algorithm; and a payload including the image data. The transport stream structure of the image data, the transmitting and receiving apparatus and method thereof enables inserting the additional information without changing the size of the related art transport stream structure of the image data. | 11-13-2008 |
20080289038 | METHOD AND APPARATUS FOR CHECKING INTEGRITY OF FIRMWARE - Provided are a method and apparatus for checking the integrity of firmware. The method includes storing a first hash function value of unhacked firmware for determining whether actual firmware of an external processor has been hacked; reading the actual firmware via a bus; calculating a second hash function value of the actual firmware; comparing the first hash function value with the second hash function value; and sharing a bus key with the external processor, based on the comparison result. | 11-20-2008 |
20080301472 | METHOD OF ENCRYPTING AND STORING DIGITAL CONTENT USING FIRMWARE REGIONAL CODE AND APPARATUS THEREFOR - A method of processing digital content performed by an apparatus for storing digital content. In the method, a hardware regional code extracted from a memory of a content storage device is compared with a firmware regional code extracted from firmware, and the digital content is selectively encrypted and stored according to a corresponding regional code only when the hardware regional code matches the firmware regional code. | 12-04-2008 |
20080320301 | METHOD AND APPARATUS FOR RESTRICTING OPERATION OF DEVICE - A method of restricting operation of a device is provided. Based on a revocation list, which is a list regarding revoked devices, the method determines whether the device is the revoked device, based on the determination, decides whether to operate a Digital Rights Management (DRM) module of the device, and based on the decision, selectively restricts the operation of the device. | 12-25-2008 |
20090055645 | METHOD AND APPARATUS FOR CHECKING ROUND TRIP TIME BASED ON CHALLENGE RESPONSE, AND COMPUTER READABLE MEDIUM HAVING RECORDED THEREON PROGRAM FOR THE METHOD - An apparatus and method of checking adjacency between devices are provided. A challenge response based round trip time (RTT) checking method includes: generating a random number; encrypting the random number using a symmetrical key; transmitting a challenge request message including the encrypted random number to a device; receiving a challenge response message including the random number from the device which received the challenge request message and decrypted the encrypted random number using the symmetrical key, from the device; and determining an RTT based on a time when the challenge response message is received and a time when the challenge request message is transmitted. | 02-26-2009 |
20090199303 | CE DEVICE MANAGEMENT SERVER, METHOD OF ISSUING DRM KEY BY USING CE DEVICE MANAGEMENT SERVER, AND COMPUTER READABLE RECORDING MEDIUM - Provided are a method of issuing a DRM (digital rights management) key by using a CE (consumer electronics) device management server. The method includes: authenticating the CE device; if authentication of the CE device succeeds, transmitting a request for issuing the DRM key to a key server for storing and managing the DRM key; receiving the DRM key from the key server; and transmitting the DRM key to the CE device. Thus, the CE device can conveniently and safely receive the DRM key. | 08-06-2009 |
20090204818 | METHOD AND APPARATUS FOR GENERATING AND VERIFYING ELECTRONIC SIGNATURE OF SOFTWARE DATA, AND COMPUTER READABLE RECORDING MEDIUM THEREOF - Provided are methods of generating and verifying an electronic signature of software data, wherein software data is split into a plurality of blocks, electronic signatures corresponding to each of the blocks are generated, and some of the electronic signatures are randomly selected for verification. Accordingly, a time required for verifying an electronic signature can be reduced while maintaining the advantages of an electronic signature system. | 08-13-2009 |
20090293058 | VIRTUAL SYSTEM AND METHOD OF RESTRICTING USE OF CONTENTS IN THE VIRTUAL SYSTEM - Provided is a method of restricting use of contents in a virtual system comprising at least one virtual machine implemented by applying virtualization technology to a predetermined device. The method includes: reading a first device identifier from the device in order to identify the device; reading a second device identifier, which is a device identifier allocated to the at least one virtual machine, from the at least one virtual machine; determining whether the first device identifier is identical to the second device identifier; and selectively restricting use of contents in the at least one virtual machine based on a result of the determining. | 11-26-2009 |
20100064378 | METHOD AND APPARATUS FOR MANAGING DIGITAL RIGHTS MANAGEMENT MODULE - Provided are a method and apparatus for managing a digital rights management (DRM) module. A DRM module for removing a DRM scheme applied to a content selected from among contents, and the content being protected with the DRM scheme, are received. The content is used by using the DRM module, and then the DRM module is partially or completely removed. | 03-11-2010 |
20100098249 | METHOD AND APPARATUS FOR ENCRYPTING DATA AND METHOD AND APPARATUS FOR DECRYPTING DATA - Provided are a method and apparatus for encrypting data, and a method and apparatus for decrypting data. The method of encrypting data includes generating an encryption key by using current time information indicating a current time, encrypting data by using the generated encryption key, and transmitting the encrypted data. | 04-22-2010 |
20100106771 | METHOD AND APPARATUS FOR COMMUNICATION BASED ON CERTIFICATION USING STATIC AND DYNAMIC IDENTIFIER - Provided are a method and an apparatus for communication based on certification using a static identifier and an updatable dynamic identifier allowing a verified client to access a server. | 04-29-2010 |
20100195827 | METHOD AND APPARATUS FOR ENCRYPTING TRANSPORT STREAM OF MULTIMEDIA CONTENT, AND METHOD AND APPARATUS FOR DECRYPTING TRANSPORT STREAM OF MULTIMEDIA CONTENT - A method of transporting an encrypted stream of multimedia content is provided. In the method, when a packet contains data of a predetermined length including selected data from pieces of data corresponding to the multimedia content and a header, key information, and first time information from among pieces of information included in a selected packet from among at least one packet are received, and encryption information is determined from the key information and the first time information, according to a key derivation function. The first time information is variable with time. The at least one packet including data corresponding to the multimedia content is encrypted using the encryption information. The at least one encrypted packet and the key information are transported. | 08-05-2010 |
20120272327 | WATERMARKING METHOD AND APPARATUS FOR TRACKING HACKED CONTENT AND METHOD AND APPARATUS FOR BLOCKING HACKING OF CONTENT USING THE SAME - Watermarking method and apparatus for tracking hacking and method and apparatus for blocking hacking of content are provided. The watermarking method includes: obtaining device information from a reception device, with which content is shared, through a determined network channel; generating watermark data based on the obtained device information; and generating watermarked multimedia content by inserting the generated watermark data into content. The method of blocking hacking of content includes: if hacked content is found, detecting watermark data from the hacked content; detecting transmission and reception device information from the detected watermark data; and extracting a progress route of the content based on the detected transmission and reception device information and performing revocation on a hacked device. | 10-25-2012 |
20130054978 | COMPUTING SYSTEM AND METHOD OF OPERATING COMPUTING SYSTEM - A computing system including a memory that is shared by a plurality of components of the computing system in order to exchange data between the plurality of components; and a controller configured to control the plurality of components to encrypt the data and to record the encrypted data in the memory. | 02-28-2013 |
20130219509 | METHOD AND APPARATUS FOR EFFICIENTLY FIXING TRANSFORMED PART OF CONTENT - Provided are a method and apparatus for effectively fixing scrambled content. The method includes checking fixing information for a program map table (PMT) packet of packets constituting the content, the fixing information being used to fix a transformed part of the content; extracting location information of a next PMT packet containing fixing data for fixing the transformed part of the content from the fixing information of the PMT packet; and fixing the transformed part of the content by using the fixing data in the next PMT packet indicated by the extracted location information. Accordingly, it is possible to easily detect a location of the content, which stores the fixing information, thereby expediting fixing of the transformed content. | 08-22-2013 |
20150023547 | INFORMATION PROVIDING SYSTEM HAVING CONTENT PROVIDING APPARATUS AND TERMINAL APPARATUS, AND CONTROL METHOD THEREOF - An information providing system including a content providing apparatus, a display apparatus, and a terminal apparatus is provided. The information providing system includes: a content providing apparatus to generate a watermark, insert the watermark into a predetermined location of a content on a real time basis, and transmit the content; a display apparatus to receive the content into which the watermark is inserted and output the content; and a terminal apparatus to receive input of at least one of an image and sound of the content comprising the watermark from the display apparatus, detect the watermark, extract identification information from the watermark, and output corresponding additional information. Accordingly, information is provided to a user by inserting and extracting the watermark in various methods. | 01-22-2015 |