Patent application number | Description | Published |
20090119763 | METHOD AND SYSTEM FOR PROVIDING SINGLE SIGN-ON SERVICE - Provided is a method and system for providing an SSO service enabling the use of Web services in different trusted domains through a one-time authentication process. In the method, mutual authentication information is issued from a trusted third party to each of ID-federation service providers managing each of trusted domains, and an ID federation established between the ID-federation service provider and a user in the trusted domain of the ID-federation service provider. The first ID-federation service provider managing the first trusted domain, to which the user belongs to, is confirmed when a Web service provider in the second trusted domain receives a login request from the user in the first trusted domain. User authentication and mutual authentication arc performed between the first ID-federation service provider and a second ID-federation service provider managing the second trusted domain. The Web service provider authenticates the user in the first trusted domain and provides a corresponding Web service. | 05-07-2009 |
20100036781 | APPARATUS AND METHOD PROVIDING RETRIEVAL OF ILLEGAL MOTION PICTURE DATA - Provided are an apparatus and method for detecting illegal motion picture data. The apparatus includes a key frame extractor for extracting a plurality of key frames from motion picture data, a characteristic value file generator for detecting characteristic values of the extracted key frames and generating a characteristic value file, and an illegality determiner for measuring degree of similarity between a previously stored learning model file and the characteristic value file and determining whether or not the motion picture data is legal according to the degree of similarity. | 02-11-2010 |
20100074440 | HIGH-SPEED PIPELINED ARIA ENCRYPTION APPARATUS - There is provided a high-speed pipelined ARIA encryption apparatus. The high-speed pipelined ARIA encryption apparatus includes a round key generator for generating a plurality of round keys required for performing an encryption operation using a master key formed to have uniform bits, a plurality of round units whose number is in proportion to the number of times of round operations corresponding to the number of bit of an input value to receive the round keys and the input value and to perform the round operations, and a plurality of pipelined register provided between the round units to transmit the output value of a previous round unit as the input value of the next round unit. A plurality of round units are provided and pipelined registers are inserted between the round units so that it is possible to improve the performance of processing a large amount of data and to perform ARIA encryption at high speed. | 03-25-2010 |
20100077167 | DATA STORAGE DEVICE HAVING SMART CARD BASED COPY PROTECTION FUNCTION, AND METHOD FOR STORING AND TRANSMITTING DATA THEREOF - A data storage device having a smart card based copy protection function is provided. The data storage device encodes data using the temper resistant key of the smart card as the encoding seed, stores the encoded data, and transmits the encoded data to other device. Therefore, it is impossible to modulate or to make the illegal copy of stored or transmitted data, and the reliability of the storage device can be improved. | 03-25-2010 |
20100077477 | AUTOMATIC MANAGING SYSTEM AND METHOD FOR INTEGRITY REFERENCE MANIFEST - The present invention relates to a system for automatically managing integrity reference information and a method of managing the same. The system includes one or more systems, a system management server, and an integrity management server. The systems are connected over a network and communication with each other. Each of the systems has an integrity measurement program to generate integrity information. The system management server has registration information about each of the systems connected over the network and registration information about a program distributed to each of the systems. Further, the system management server controls network access by each of the systems. If integrity reference information matching integrity information provided from a specific system does not exist in pieces of integrity reference information for verifying integrity of each of the systems, the integrity management server determines whether to register the integrity information as integrity reference information of the specific system depending on whether the specific system has been registered with the system management server. | 03-25-2010 |
20100122080 | PSEUDONYM CERTIFICATE PROCESS SYSTEM BY SPLITTING AUTHORITY - The present invention can't independently know real name information of a user unless a server of an authority treating real name certificate and a server of an authority treating pseudonym certificate collaborate mutually, so that privacy of a user isn't infringed. The present invention can acquire real name information of a user with collaboration of real name certification sever and pseudonym certification sever only if you need real name information for a user. | 05-13-2010 |
20100138929 | CONDITIONALLY TRACEABLE ANONYMOUS SERVICE SYSTEM - Conditionally traceable anonymous service system is provided. The system respectively separates subject conforming real name, subject conforming anonymity, subject requesting verification for an anonymity certification means, so that privacy of a user is hardly violated, the present invention can acquire real name information for the user only when a trace for a user is surely requested. | 06-03-2010 |
20100146603 | ANONYMOUS AUTHENTICATION-BASED PRIVATE INFORMATION MANAGEMENT SYSTEM AND METHOD - An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information from an anonymous certification authority; generating an anonymous document including the anonymous certificate and some of the user information; and providing the anonymous document to a web service provider so as to be authenticated and thus provided with a web service by the web service provider. Thus, only a minimum of user information may be provided to the web service provider. In addition, it is possible to strengthen a user's right to self-determination and control over the exposure and use of his or her personal information by allowing a user to manage his or her own personal information or entrusting the PIM server to manage user information. Moreover, it is possible to protect the privacy of a user by preventing the exposure of user information. | 06-10-2010 |
20100161970 | USER TERMINAL AND METHOD OF MANAGING USER INFORMATION - A user terminal and a method of managing user information are provided. The method includes issuing a request for issuance of a certificate for a user to a certification authority; generating a document including at least part of user information using a certificate issued by the certification authority; and issuing a subscription request to a desired web service provider by providing the document including the at least part of the user information to the desired web service provider. Therefore, it is possible to strengthen the user's right to self-determination and control over the exposure and use of his or her personal information. In addition, it is possible to improve the reliability of user information provided to each website by the user. | 06-24-2010 |
20110055556 | METHOD FOR PROVIDING ANONYMOUS PUBLIC KEY INFRASTRUCTURE AND METHOD FOR PROVIDING SERVICE USING THE SAME - Provided is a method for providing an anonymous public key infrastructure (PKI) in a user terminal. The method includes receiving a real-name certificate from a real-name PKI service domain, requesting an anonymous certificate to an anonymous PKI service domain, and receiving the anonymous certificate from the anonymous PKI service domain. Accordingly, the method can ensure anonymity when a user uses a service by providing the anonymous certificate in association with the PKI-based real-name certificate. | 03-03-2011 |
20110302130 | INTELLIGENT VIDEO INFORMATION RETRIEVAL APPARATUS AND METHOD CAPABLE OF MULTI-DIMENSIONAL VIDEO INDEXING AND RETRIEVAL - Provided is an intelligent video information retrieval apparatus capable of multi-dimensional video indexing and retrieval. The intelligent video information retrieval apparatus includes an event detector configured to detect pieces of event information from footage collected by a plurality of video capture devices, a data mart builder configured to generate a data cube using the detected pieces of event information, and capture time and capture location information related to the pieces of event information, and store and manage the generated data cube, and a video retriever configured to receive an event retrieval condition from a user to retrieve event information corresponding to the received event retrieval condition using the data cube, and output the retrieval result to the user. | 12-08-2011 |
20120032781 | REMOTE PERSONAL AUTHENTICATION SYSTEM AND METHOD USING BIOMETRICS - Disclosed herein is a remote personal authentication system and method using biometrics. The remote personal authentication method using biometrics includes receiving a biometric information of a user remotely detected by a biometric information collection device; decrypting, in a hardware security module (HSM) of the user, the received biometric information and biometric information stored in the HSM; and performing personal authentication for the user by comparing the decrypted biometric information with each other in the HSM. | 02-09-2012 |
20120117090 | SYSTEM AND METHOD FOR MANAGING DIGITAL CONTENTS - Disclosed are a system and method for managing digital contents. An exemplary embodiment according to the present invention provides to a system for managing digital contents, including a learning module extracting feature vectors of input digital contents and performing column subspace mapping on the feature vectors to calculate a column subspace projection matrix; an index module using the matrix to perform an index work on the digital contents and then, storing the matrix and the digital contents; and a search module performing the column subspace mapping on the feature vectors of query data when the query data for searching the digital contents are input and searching the digital contents indexed by the matrix having high similarity to the mapped feature vectors of the query data. | 05-10-2012 |
20120163585 | MASKING ADDITION OPERATION DEVICE FOR PREVENTION OF SIDE CHANNEL ATTACK - A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values. | 06-28-2012 |
20130054974 | PACKET SOURCE AUTHENTICATION METHOD USING SINGLE-BUFFERED HASH IN MULTICAST ENVIRONMENT AND APPARATUS FOR THE SAME - A source authentication method and apparatus according to the present invention are disclosed. The source authentication method is performed with respect to a transmission packet on a message transmission side, and includes generating a first hash value to which a first hash function is applied using a message to be included in a next packet and a key value, and generating the transmission packet including the first hash value, wherein the key value is one of at least one key value generated in advance by applying a second hash function. Meanwhile, according to the present invention, effective low-cost multicast authentication may be performed by reducing a variety of loads such as buffer management, key calculation costs, and the like. | 02-28-2013 |
20130166677 | ROLE-BASED ACCESS CONTROL METHOD AND APPARATUS IN DISTRIBUTION SYSTEM - A role-based access control apparatus for use in a distribution system including a plurality of nodes, includes a role manager configured to assign the role of a publisher, which processes a request for a data transfer, to a node, and the role of subscribers, which request the data transfer, to remaining nodes, the role relationship between the plurality of nodes being transmitted to the remaining nodes playing the roles of subscribers and the requested data from the remaining nodes being transmitted to the remaining nodes based on the role relationship; and a role monitor configured to manage the role relationship assigned to the plurality of nodes. | 06-27-2013 |
20130210348 | APPARATUS AND METHOD FOR PROVIDING NEAR FIELD COMMUNICATION FOR MOBILE DEVICE - An apparatus for providing near field communication (NFC) for a mobile device, includes a USB (universal serial bus) signal processing unit configured to convert a signal of the mobile device, which is received through a USB interface into a value to be processed in a central processing unit, and convert a value received from the central processing unit into a signal to be transmitted to the USB interface. Further, the apparatus includes an analog signal processing unit configured to convert an analog signal received from an outside device into a digital signal, and convert a digital signal of the central processing unit into an analog signal to transmit the converted analog signal to the antenna. | 08-15-2013 |
20140024412 | UNIVERSAL SUBSCRIBER IDENTIFICATION MODULE CARD, INCLUDING SECURITY CHIP, FOR MOBILE TERMINAL AND COMMUNICATION METHOD USING THE SAME - Disclosed herein are a universal subscriber identification module card and a communication method using the same. The universal subscriber identification module card includes a Universal Subscriber Identification Module (USIM) chip, a pad, and a security chip. The USIM chip performs the user authentication of a mobile terminal. The pad electrically connects the USIM chip to the mobile terminal when the USIM chip is inserted into the mobile terminal. The security chip performs a security function for the mobile terminal independently of the USIM chip and shares the two power terminals of the pad with the USIM chip. | 01-23-2014 |
20140026210 | METHOD FOR AUTHENTICATING MOBILE DEVICES - A method for authenticating a mobile device, the method comprising: detecting an external input to the mobile device; when the external input is detected, displaying a screen lock pattern having at least two or more pattern points, each pattern point having an identifier; determining whether a touch input is conducted on the at least two or more pattern points in an UI (User Interface) locked state of the mobile device; and when the touch input conducted on the at least two or more pattern points is successively made in a preset sequenced combination of identifiers, unlocking the locked state of the mobile device. | 01-23-2014 |
20140033266 | METHOD AND APPARATUS FOR PROVIDING CONCEALED SOFTWARE EXECUTION ENVIRONMENT BASED ON VIRTUALIZATION - A method and apparatus provides a concealed software execution environment based on virtualization. The method and apparatus constructs a concealed domain that is exclusively executed without being exposed to the outside using a virtualization-based domain separating technology and executes security information such as key information provided by a secure element within the concealed domain. | 01-30-2014 |
20140033318 | APPARATUS AND METHOD FOR MANAGING USIM DATA USING MOBILE TRUSTED MODULE - An apparatus manages universal subscriber identity module (USIM) data in a terminal using a mobile trusted module (MTM). The apparatus includes a mobile information storage unit configured to store at least one key and the USIM data in a protection region, an information security unit configured to protect information stored in a USIM and the terminal using at least one of the USIM data and the key stored in the mobile information storage unit, and a USIM data manager configured to restore at least one of the USIM data and the key stored in the mobile information storage unit to the USIM, and store at least one of USIM data and the key provided from the USIM in the mobile information storage unit. | 01-30-2014 |
20140082690 | MOBILE COMPUTING SYSTEM FOR PROVIDING HIGH-SECURITY EXECUTION ENVIRONMENT - A mobile computing system for providing a high-security execution environment is provided. The mobile computing system separates execution environments in the same mobile device on the basis of virtualization technology and manages user-specific execution environments using the same hardware security module, thereby facilitating protection of personal privacy. | 03-20-2014 |
20140115400 | DEVICE AND METHOD FOR FAULT MANAGEMENT OF SMART DEVICE - There is provided a method of fault management of a smart device including comparing a value of a fault detection indicator (hereinafter referred to as ‘FDI’) in a normal state, which detects faults generated in the smart device, with respect to at least one performance indicator, with an FDI value observed in real time and detecting the faults by calculating a relative variation level of the observed values, and creating a diagnosis object (hereinafter referred to as ‘DO’) including a cause and a countermeasure of the detected fault and analyzing the fault. | 04-24-2014 |
20140150084 | USER AUTHENTICATION APPARATUS OF PORTABLE TERMINAL - A user authentication apparatus safely uses resources by forming a communication channel between a plurality of execution environments through user authentication in a portable terminal providing the plurality of execution environments based on a virtualization solution, and prevents private information from being illegally leaked by hacking by not directly exposing a PIN number or a password a user inputs using a virtual keyboard and a keyboard coordinate when authenticating the user. | 05-29-2014 |