Patent application number | Description | Published |
20090157223 | ROBOT CHATTING SYSTEM AND METHOD - A robot chatting system includes an interface for generating a chatting text including robot motion having a text part and a motion part; a robot chatting server for providing a robot chatting service between chatting persons, using the chatting text including robot motion; a first unit for generating motion control data corresponding to the motion part of the chatting text including robot motion; a second unit for converting the text part of the chatting text including robot motion into speech data; and a robot for outputting the speech data through a speaker and simultaneously motioning based on the motion control data. Therefore, when the user inputs text and its corresponding motions and sends the input text, the other user's robot reads the text and performs the relevant motions, thereby providing the robot chatting service of good quality. | 06-18-2009 |
20100030891 | WEB-BASED TRACEBACK SYSTEM AND METHOD USING REVERSE CACHING PROXY - Provided are a web-based traceback system and method using reverse caching proxy, which can effectively protect a web server against various attacks launched by illegitimate user by acquiring network information and location information of users who attempt to access the web server through an anonymous server, without a requirement of installing any agent program in the users' clients. The web-based traceback system may include a reverse caching proxy server receiving a hypertext transfer protocol (HTTP) packet transmitted to a web server by a client, analyzing the header of the HTTP packet and determining whether the client has attempted to access the web server through an anonymous server based on the results of the analysis; and a web tracking server generating a response page for the HTTP packet upon receiving the results of the determination performed by the reverse caching proxy server, inserting a tracking code in the response page, and providing the response page to the client through the reverse caching proxy server, wherein the tracking code is automatically executed in a web browser of the client and thus provides network information of the client to the web tracking server. | 02-04-2010 |
20100030892 | GIS BASED NETWORK INFORMATION MONITORING-SYSTEM - Disclosed is a GIS based network information monitoring system that intuitively combines GIS based geographic information with traffic information and a security event, expresses the combined geographic information on a display, and does not need position calibration of network information when the traffic information and the security event are expressed. The GIS based network information monitoring system includes: a geographic information processing module receiving network information from an external network device, containing GIS based geographic information, and creating geographic information corresponding to location information in response to the location information; and a network information processing module mapping the network information to geographic information corresponding to the location information to express the mapped network information, connecting an attack site of a packet causing a security problem, an intermediate site, and a target site using lines, and intuitively expressing the network information by varying the widths and colors of the lines according to the attack type and danger level of the packet. | 02-04-2010 |
20100146621 | METHOD OF EXTRACTING WINDOWS EXECUTABLE FILE USING HARDWARE BASED ON SESSION MATCHING AND PATTERN MATCHING AND APPRATUS USING THE SAME - A method and apparatus for extracting a windows executable file that can search for a pattern related to windows executable files among a large quantity of network packets using a hardware-based session tracking and pattern matching technology and that can extract all packets included in the corresponding session are provided. The method of extracting a windows executable file includes: collecting incoming packets having a payload according to a session of a reference packet having an MZ pattern; performing a portable executable (PE) pattern matching for the collected incoming packets; and forming a PE file based on at least one incoming packet satisfying the PE pattern matching. | 06-10-2010 |
20100162392 | APPARATUS AND METHOD FOR MONITORING SECURITY STATUS OF WIRELESS NETWORK - An apparatus for monitoring the security status of a wireless network is provided. The apparatus includes a radio frequency (RF) signal collection unit which collects at least one piece of RF signal information; a security event information collection unit which collects security event information including at least one of traffic information and alert information; a security event information mapping unit which maps the RF signal information and the security event information based on the correlation between the RF signal information and the security event information; and a security event information display unit which displays the result of the mapping performed by the security event information mapping unit. Therefore, it is possible to allow a network administrator to intuitively recognize the security status of a wireless network by collecting RF signal information and security event information from the wireless network, mapping the RF signal information and the security event information based on the correlation therebetween and displaying the result of the mapping. | 06-24-2010 |
20100169479 | Apparatus and method for extracting user information using client-based script - Provided are an apparatus and method for extracting user information using a client-based script in which user information including the internet protocol (IP) addresses of an attacking host and an anonymous proxy server used by the attacking host can be collected using a client-based script that can be automatically executed in the web browser of the attacking host. According to the apparatus and the method, it is possible to detect the location of an attacking host without alerting the attacking host by using a script that can be automatically executed in a web browser of the attacking host without any program installation. In addition, according to the apparatus and the method, it is possible to collect the IP addresses of an attacking host and an anonymous proxy server, if any, used by the attacking host by directly connecting the attacking host and a monitoring server. | 07-01-2010 |
20110016525 | APPARATUS AND METHOD FOR DETECTING NETWORK ATTACK BASED ON VISUAL DATA ANALYSIS - An apparatus for detecting a network attack includes a traffic image generator for generating a traffic image using traffic information and additional IP information extracted from the traffic information; a network attack detector for comparing similarities between the traffic image and a previously generated traffic image based on a predetermined similarity threshold to detect the presence of the network attack; and a network attack analyzer for analyzing the traffic image at a time when the network attack is detected to detect network attack information and pattern information of the network attack. A representation unit for visualizing the network attack information and the pattern information of the network attack. | 01-20-2011 |
20110047623 | APPARATUS AND METHOD FOR TRACING WEB USER USING SIGNED CODE - Provided are an apparatus and method for tracing web user using signed code. The apparatus for tracing web user includes at least one access terminal, a web server, and a monitoring server. The at least one access terminal requests a web page. The web server provides the web page including a signed code to the each access terminal according to the request. The monitoring server receives and analyzes access information which is extracted from the each access terminal according to execution of the signed code. | 02-24-2011 |
20110072159 | USER TERMINAL SYSTEM, DIGITAL RIGHTS MANAGEMENT SYSTEM INCLUDING THE USER TERMINAL SYSTEM, AND METHOD OF MANAGING DIGITAL RIGHTS - Provided is a digital rights management system, in which a process of combining digital content created by the original author with first metadata indicated with rights information of the original author and a process of combining revised digital content with second metadata indicated with rights information of a secondary author, are respectively and separately performed at the server and terminal sides. Thus, the digital rights management system can reduce the load generated at the server side compared to a system in which the server side performs both of the above processes. | 03-24-2011 |
20110085035 | APPARATUS AND METHOD FOR PROTECTING PRIVACY INFORMATION OF SURVEILLANCE IMAGE - An apparatus for protecting privacy information of a surveillance image includes a key management unit for generating and managing keys used to unmask a masked input image; an input image processing unit for unmasking the input image using the keys, decoding the unmasked input image to acquire an uncompressed image data, and then applying a second masking on an area containing privacy information of the image data. Further, the apparatus for protecting the privacy information of the surveillance image includes an image recording unit for encoding the image data to which the second masking has been applied to store the encoded image data. | 04-14-2011 |
20110093954 | APPARATUS AND METHOD FOR REMOTELY DIAGNOSING SECURITY VULNERABILITIES - An apparatus for remotely diagnosing security vulnerabilities, includes a vulnerability analysis unit for obtaining service information by searching a target device of a specific network and a port of the target device, searching a profile DB for principal characteristic information of the acquired service information, determining a query key type based on the retrieved principal characteristic information to acquire a vulnerability diagnosis list present in the principal characteristic information from a vulnerability list management DB; and an attack agent for diagnosing a vulnerability of the principal characteristic information on the vulnerability diagnosis list based on preset characteristic information. Further, the apparatus includes a result analysis unit for reporting a result of the diagnosis of the vulnerability of the principal characteristic information; and a GUI management unit for performing interfacing of the result of the diagnosis of the vulnerability of the principal characteristic information to a vulnerability diagnosis tool. | 04-21-2011 |
20110123023 | APPARATUS FOR VIDEO ENCRYPTION BY RANDOMIZED BLOCK SHUFFLING AND METHOD THEREOF - An apparatus for video encryption by randomized block shuffling according to an embodiment of the present invention includes: a random number and key manager that stores a key shared between a video encryption apparatus and a video decryption apparatus and generates a random number by using the key; and a block shuffling processor that analyzes encoded video data, classifies the encoded video data in accordance with a predetermined rule, generates a shuffling group in accordance with classification information, and changes positions of components in the shuffling group in accordance with the shuffling rule generated by using the random number generated by the random number and key manager. | 05-26-2011 |
20110125998 | NETWORK PHOTOGRAPHING APPARATUS HAVING A PARTIAL ENCRYPTION FUNCTION - Disclosed is a network photographing apparatus including a partial encryption function capable of encrypting only a portion of objects included in images. A network photographing apparatus including a partial encryption function, includes an object information extracting unit that receives digital image data from a photographing unit, analyzes a plurality of objects included in the digital image data, and generates object information data; an image compressing unit that processes the digital image data with compression data; and an encryption unit that searches encryption target object information data among the object information data received from the object information extracting unit and generates and sends out the encrypted compression data by encrypting only a part of the compression data, the part corresponding to the encryption target object information data. | 05-26-2011 |
20110145594 | METHOD FOR PERFORMING SEARCHABLE SYMMETRIC ENCRYPTION - Disclosed is a method for searchable symmetric encryption. The method for performing searchable encryption and searching for encrypted data includes: setting all necessary variables and preparing a secret key necessary for encryption; encrypting a data using the secret key and a given data and generating an index to be used for later search, to store the encrypted data and the index; generating a trapdoor to be used to search the encrypted data by using the secret key and a keyword to be used for the searching; and searching a desired data using the generated trapdoor and the stored index. | 06-16-2011 |
20110150327 | METHOD AND APPARATUS FOR MASKING PRIVACY AREA OF IMAGE - Disclosed are a method and apparatus for masking a privacy area of an image. The method for masking a privacy area of an image includes: detecting a privacy area required to be protected in an image; and performing masking on the image. An important area (a face area of a person, a number plate area of a vehicle, a window area of a house, etc.) detected from an image inputted through a CCTV camera can be effectively and easily encrypted, scrambled, decoded, and descrambled. Also, the position of the important area detected before or after the important area is scrambled can be maintained to be consistent without having to use a metadata file. In addition, a scrambling algorithm of the same key value can be applicable regardless of the size of the important area. As a result, the system efficiency can be enhanced by effectively protecting personal information compared with a CCTV-based video security system. | 06-23-2011 |
20110153748 | REMOTE FORENSICS SYSTEM BASED ON NETWORK - A remote forensics system based on a network is provided to allow for accessing a forensics analysis center from a remote area to perform forensic analysis. The network-based remote forensic system includes: one or more remote terminals performing forensic analysis on an evidence device in a remote area, through a virtual forensic tool when the evidence device is connected thereto; and an investigation center system connected to the remote terminals via a wide area network to provide the virtual forensic tool, processing a requirement of the remote terminals, and providing requirement processing results to the remote terminals. | 06-23-2011 |
20110154045 | ANONYMOUS AUTHENTICATION SERVICE METHOD FOR PROVIDING LOCAL LINKABILITY - There is provided an anonymous service method of providing local linkability. The anonymous service method providing local linkability according to exemplary embodiments of the invention, an anonymous authentication operation based on a short group signature is performed, for which the concept of a local linkability is introduced to secure linkability within the same service domain. Namely, in the interior of a service provider, a virtual index having a fixed value is calculated for each service user, and in this case, although a plurality of service providers collude with each other, they cannot calculate a virtual index having the same value, whereby the linkability can be secured within the same service domain but not within the interiors of different service domains. | 06-23-2011 |
20110210865 | TRAFFIC CONTROL APPARATUS AND METHOD USING NAVIGATION ROUTE INFORMATION OF VEHICLE FOR EACH NAVIGATIONAL SITUATION - Disclosed herein is a traffic control apparatus and method. The traffic control apparatus includes a navigation route database (DB) for storing navigation routes of a vehicle for respective navigational situations. A vehicle situation information collection unit collects current navigational situation information of the vehicle. A preferred route extraction unit extracts a preferred navigation route of the vehicle corresponding to the collected current navigational situation information from the navigation route DB. A predicted route estimation unit estimates a predicted navigation route of the vehicle based on the extracted preferred navigation route with to reference to a traveling state of the vehicle. | 09-01-2011 |
20120099726 | CONTENT PROTECTION APPARATUS AND METHOD USING BINDING OF ADDITIONAL INFORMATION TO ENCRYPTION KEY - The present invention relates to a content protection apparatus and method using binding of additional information to an encryption key. The content protection apparatus includes an encryption unit for creating an encryption key required to encrypt data requested by a user terminal and then generating encrypted data in which the data is encrypted. An additional information management unit manages additional information including authority information about the encrypted data. A White-Box Cryptography (WBC) processing unit generates a WBC table required to bind the encryption key corresponding to the encrypted data to the additional information. A bound data generation unit generates bound data in which the encrypted key is bound to the additional information, using a cipher included in the WBC table. | 04-26-2012 |
20120109969 | METHOD FOR DATA ANALYSIS AND DIGITAL FORENSICS AND SYSTEM USING THE SAME - A system and method for data analysis and digital forensics is provided. The system for data analysis and digital forensics may include: an online data forensic server for collecting and analyzing usage history information from an object device, which is subject to data collection, downloading and collecting data on the Internet based on the usage history information, requesting issuance of a timestamp token for the collected data, and receiving the issued timestamp token; a timestamp token issuing server for issuing the timestamp token for the collected data in response to the request for issuance of the timestamp token and proving the issued timestamp token to the online data forensic server; and a storage device for storing the collected data. | 05-03-2012 |
20120117090 | SYSTEM AND METHOD FOR MANAGING DIGITAL CONTENTS - Disclosed are a system and method for managing digital contents. An exemplary embodiment according to the present invention provides to a system for managing digital contents, including a learning module extracting feature vectors of input digital contents and performing column subspace mapping on the feature vectors to calculate a column subspace projection matrix; an index module using the matrix to perform an index work on the digital contents and then, storing the matrix and the digital contents; and a search module performing the column subspace mapping on the feature vectors of query data when the query data for searching the digital contents are input and searching the digital contents indexed by the matrix having high similarity to the mapped feature vectors of the query data. | 05-10-2012 |
20120134578 | SYSTEM AND METHOD FOR DETECTING GLOBAL HARMFUL VIDEO - A system for detecting a global harmful video includes: a video determination policy generation unit for determining harmfulness of learning video segments from video learning information to analyze occurrence information of harmful learning video segments, and generating a global harmfulness determination policy based on the occurrence information; and a video determination policy execution unit for determining harmfulness of input video segments from information of an input video to analyze occurrence information of harmful input video segments, and determining whether the input video is harmful or not based on the occurrence information of the harmful input video segments and the global harmfulness determination policy. | 05-31-2012 |
20120150741 | MOBILE DEVICE FOR PROVIDING SMART WALLET SERVICE AND LAYER STRUCTURE FOR OPERATING SMART WALLET SERVICE - A smart wallet service module includes: a management unit for installing, activating, and terminating a smart wallet service or receiving and managing a user's setting; a security unit for providing an authentication service through an authenticated certificate or electronic signature; a storage unit for storing data in a database of a mobile device and managing the stored data; and a functional unit connected to a storage medium inside the mobile device and providing a service related to electronic commerce or credit card issuing. | 06-14-2012 |
20120159166 | METHOD OF VERIFYING KEY VALIDITY AND SERVER FOR PERFORMING THE SAME - Disclosed herein is a method of verifying key validity and a server for performing the method. The method is configured such that a service provision server verifies key validity in an anonymous service for providing local linkability. The service provision server receives a revocation list. A local revocation list is generated using the received revocation list and a secret key. A virtual index of a service user required to verify key validity is calculated. Whether a key of the service user is valid is verified, based on whether the virtual index is included in the local revocation list. | 06-21-2012 |
20120163582 | DATA ENCODING AND DECODING APPARATUS AND METHOD THEREOF FOR VERIFYING DATA INTEGRITY - A data encoding apparatus for verifying data integrity by using a white box cipher includes: an encoding unit for encoding content by using a white box cipher table; and an arithmetic logic unit for performing an arithmetic logic operation on the white box cipher table and content information to output an encoded white box cipher table. The arithmetic logic operation is an exclusive OR operation. The content information is license information of the content or hash value of the license information of the content. | 06-28-2012 |
20120163585 | MASKING ADDITION OPERATION DEVICE FOR PREVENTION OF SIDE CHANNEL ATTACK - A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values. | 06-28-2012 |
20120163654 | METHOD AND SYSTEM FOR TRACKING ILLEGAL DISTRIBUTOR AND PREVENTING ILLEGAL CONTENT DISTRIBUTION - A system for tracking an illegal distributor and preventing an illegal content distribution includes: a forensic mark generator for receiving content and a content identification code from a content providing apparatus to generate a forensic mark; a forensic mark database for storing the generated forensic mark; a forensic mark insertion unit for inserting the forensic mark into the content; and a content database for storing the content into which the forensic mark has been inserted. The system further includes a content transmitter for transmitting the content into which the forensic mark has been inserted to the content utilization apparatus. | 06-28-2012 |
20120166309 | AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD USING BARCODES - Disclosed is an authentication method using barcodes. the authentication method includes: converting into a first barcode and outputting, by a first user device, authentication related information provided from a service providing server; receiving, by a second user device, the first barcode; generating, by the second user device, signature information or authentication information on the authentication related information by using a signature key or a certificate; and providing, by the second user device, the signature information or the authentication information to the service providing server. | 06-28-2012 |
20120166456 | METHOD AND APPARATUS FOR CREATING DATA TABLE OF FORENSICS DATA - An apparatus for creating a data table of a forensic data, includes a data parser configured to create primary data tables including unique attributes of the predetermined keywords by parsing the raw data having different formats for each forensics tool, each attribute having a unique standardized format. The apparatus further includes a data filter filtering specific fields or attributes from the primary data tables to newly create secondary data table. The apparatus further includes a data relation analyzer analyzing a relation between the data within the primary data tables to newly create secondary data tables. | 06-28-2012 |
20120170740 | CONTENT PROTECTION APPARATUS AND CONTENT ENCRYPTION AND DECRYPTION APPARATUS USING WHITE-BOX ENCRYPTION TABLE - A content protection apparatus using a white-box encryption table includes: a random number generation unit for generating a random number; a white-box encryption table for encrypting the random number and user information provided from a user to generate an encrypted output value; and an operation unit for performing an operation between the encrypted output value and data inputted from an outside to encrypt or decrypt the data. | 07-05-2012 |
20120271538 | APPARATUS AND METHOD FOR CHOOSING PRIORITY CONTROL OBJECT, AND APPARATUS FOR CONTROLLING OBJECT - Provided are an apparatus and a method that chooses an object to be preferentially controlled based on an accident risk degree and hazard and controls the chosen object. In the present invention, it is possible to choose and control a ship having high hazard calculated with trajectory prediction, current operation state information, and past history information under a traffic situation in which the ships are concentrated, by priority. The ship having high hazard is chosen by calculating and applying various history information including an accident record, an entry history of an operator, an aging degree history of the ship, and a steering feature history by using a collision risk on a real-time trajectory collision risk and past history information and different warnings are given during a control for each level. | 10-25-2012 |
20130003968 | METHOD AND APPARATUS FOR GENERATING SESSION KEY AND CLUSTER KEY - Disclosed herein are a method and apparatus for generating a session key and a cluster key using a network coding scheme. The apparatus includes a random number generation unit, a combination generation unit, a combination transmission unit, a coding result reception unit, and a restoration unit. The random number generation unit generates the random number of a node. The combination generation unit generates a combination based on a master key of the node and the random number. The combination transmission unit transfers the combination to a key distribution server. The coding result reception unit receives a result of a network coding, corresponding to an ID of the node, from the key distribution server. The restoration unit for generating a session key by restoring a random number, corresponding to a counterpart node of the node, using the result of the network coding and the random number. | 01-03-2013 |
20130091085 | INSIDER THREAT DETECTION DEVICE AND METHOD - The present invention relates to an insider threat detection device and method which collects and analyzes a variety of information generated by insiders working for an organization, such as behaviors, events, and states of the insider, and detects an abnormal insider who may become a potential threat. According to the present invention, the insider threat detection method and apparatus analyzes information related to insiders using the correlation analysis method, and previously detects an abnormal sign of an insider who may become a potential threat to an organization, which makes it possible to protect the organization from attacks on systems inside the organization or seizure of important information inside the organization. | 04-11-2013 |
20130117273 | FORENSIC INDEX METHOD AND APPARATUS BY DISTRIBUTED PROCESSING - Provided is a forensic index method by distributed processing, including: generating data to be divided by dividing data to be indexed according to predetermined division setting for distributed processing; allocating the generated data to be divided to a plurality of data processing units according to the predetermined division setting, extracting an index by filtering the allocated data to be divided in the plurality of data processing units, and generating divided index data including the extracted index; and generating an index database by merging the generated divided index data. | 05-09-2013 |
20130208886 | METHOD OF PREVENTING FAULT-INJECTION ATTACKS ON CHINESE REMAINDER THEOREM-RIVEST SHAMIR ADLEMAN CRYPTOGRAPHIC OPERATIONS AND RECORDING MEDIUM FOR STORING PROGRAM IMPLEMENTING THE SAME - Disclosed herein are a method of preventing fault-injection attacks on Chinese Remainder Theorem (CRT)-Rivest Shamir Adleman (RSA) cryptographic operations, and a recording medium for storing a program implementing the same. First, the method receives first and second primes, that is, different primes, and a randomly selected prime, that is, a random prime, which are used for CRT-RSA cryptographic operations. Thereafter, a cumulative value is calculated by performing an XOR (Exclusive OR) operation on the first prime, the second prime, and the random prime using a push function. Thereafter, the first prime, the second prime, and the random prime are loaded by performing an XOR operation on the cumulative value using a pop function corresponding to the push function. Finally, CRT-RSA operations are executed by computing modulo operations based on the first prime and the second prime. | 08-15-2013 |
20140024412 | UNIVERSAL SUBSCRIBER IDENTIFICATION MODULE CARD, INCLUDING SECURITY CHIP, FOR MOBILE TERMINAL AND COMMUNICATION METHOD USING THE SAME - Disclosed herein are a universal subscriber identification module card and a communication method using the same. The universal subscriber identification module card includes a Universal Subscriber Identification Module (USIM) chip, a pad, and a security chip. The USIM chip performs the user authentication of a mobile terminal. The pad electrically connects the USIM chip to the mobile terminal when the USIM chip is inserted into the mobile terminal. The security chip performs a security function for the mobile terminal independently of the USIM chip and shares the two power terminals of the pad with the USIM chip. | 01-23-2014 |
20140098951 | METHOD FOR ELLIPTIC CURVE CRYPTOGRAPHY WITH COUNTERMEASURES AGAINST SIMPLE POWER ANALYSIS AND FAULT INJECTION ANALYSIS AND SYSTEM THEREOF - There are provided a method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis, and a system thereof. According to an aspect, there is provided a method for elliptic curve cryptography, in which an elliptic curve point operation is performed to generate an elliptic curve code, including: receiving a first point and a second point on the elliptic curve, wherein the first point is P | 04-10-2014 |
20140111368 | METHOD AND SYSTEM FOR MANAGING TRAFFIC CONSIDERING GPS JAMMING - The traffic control method according to the present invention includes obtaining radar information on a target from at least one radar; obtaining AIS information of the target from an AIS (automatic identification system) of the target; detecting GPS jamming; and fusing the radar information and the AIS information. The fusing selectively fuses the AIS information depending on whether the GPS jamming occurs in the position of the target as a result of the detection. | 04-24-2014 |
20140136534 | SIMILARITY CALCULATING METHOD AND APPARATUS - A similarity calculating method and apparatus are disclosed. A similarity calculating method according to an exemplary embodiment of the present invention includes extracting similarity calculating data, which is determined in advance, by receiving a communication activity record for every user; modeling a communication activity pattern for every user and common information between the users based on the extracted similarity calculating data; and calculating a similarity between users using the modeled communication activity pattern for every user and common information. The modeling includes: modeling the communication activity pattern by calculating a value of a static feature from the similarity calculating data, and modeling the common information by calculating a value of a dynamic feature from the similarity calculating data. | 05-15-2014 |
20140150096 | METHOD FOR ASSURING INTEGRITY OF MOBILE APPLICATIONS AND APPARATUS USING THE METHOD - An apparatus for assuring integrity of a mobile application or application software (app) includes a developer registration management unit configured to authenticate a mobile app developer based on an authentication means in response to a subscription and registration request of the mobile app developer, and an integrity verification unit configured to verify whether the mobile app has the integrity by unpackaging the mobile app uploaded to an app store server in a packaged state and determine whether to write a code signature of the app store server to the mobile app based on an integrity verification result. Thus, a secure mobile ecosystem can be constructed. | 05-29-2014 |
20140245019 | APPARATUS FOR GENERATING PRIVACY-PROTECTING DOCUMENT AUTHENTICATION INFORMATION AND METHOD OF PERFORMING PRIVACY-PROTECTING DOCUMENT AUTHENTICATION USING THE SAME - Disclosed herein are an apparatus for generating the privacy-protecting document authentication information and a method of performing privacy-protecting document authentication. The apparatus for generating the privacy-protecting document authentication information includes an electronic signature information generation unit, a multi-dimensional code generation unit, and a multi-dimensional code output unit. The electronic signature information generation unit generates electronic signature information for the content of an input document. The multi-dimensional code generation unit generates a multi-dimensional code corresponding to the generated electronic signature information. The multi-dimensional code output unit outputs the generated multi-dimensional code onto the document. | 08-28-2014 |
20140245448 | APPARATUS AND METHOD FOR ANALYZING PERMISSION OF APPLICATION FOR MOBILE DEVICES AND DETECTING RISK - An apparatus for analyzing a permission of an application for a mobile device, the apparatus comprising: an executable file acquisition unit; a file extraction module; and an execution permission analyzing module configured to detect a security risk which can be caused by the permission on the basis of the permission described in the extracted file, wherein the information related to the permission of the application comprises: information on permission that is declared in the application, permission that the application uses and a function that uses the permission of the application. | 08-28-2014 |
20140351902 | APPARATUS FOR VERIFYING WEB SITE AND METHOD THEREFOR - Disclosed are an apparatus and a method for verifying a web site by using a mobile terminal. A method, performed in a server verifying a web site, comprises receiving a message requesting verification on truth or falsehood of a web site which an access terminal accesses from the access terminal; processing the web site based on an Uniform Resource Location (URL) of the web site according to the message; generating verification information for verifying truth of falsehood of the web site based on the URL of the web site, and transmitting the verification information to a mobile terminal; and receiving verification result information on the web site which is generated in the mobile terminal based on an image of the web site and the verification information, and transmitting the verification result information to the access terminal. | 11-27-2014 |