Patent application number | Description | Published |
20090157223 | ROBOT CHATTING SYSTEM AND METHOD - A robot chatting system includes an interface for generating a chatting text including robot motion having a text part and a motion part; a robot chatting server for providing a robot chatting service between chatting persons, using the chatting text including robot motion; a first unit for generating motion control data corresponding to the motion part of the chatting text including robot motion; a second unit for converting the text part of the chatting text including robot motion into speech data; and a robot for outputting the speech data through a speaker and simultaneously motioning based on the motion control data. Therefore, when the user inputs text and its corresponding motions and sends the input text, the other user's robot reads the text and performs the relevant motions, thereby providing the robot chatting service of good quality. | 06-18-2009 |
20100074440 | HIGH-SPEED PIPELINED ARIA ENCRYPTION APPARATUS - There is provided a high-speed pipelined ARIA encryption apparatus. The high-speed pipelined ARIA encryption apparatus includes a round key generator for generating a plurality of round keys required for performing an encryption operation using a master key formed to have uniform bits, a plurality of round units whose number is in proportion to the number of times of round operations corresponding to the number of bit of an input value to receive the round keys and the input value and to perform the round operations, and a plurality of pipelined register provided between the round units to transmit the output value of a previous round unit as the input value of the next round unit. A plurality of round units are provided and pipelined registers are inserted between the round units so that it is possible to improve the performance of processing a large amount of data and to perform ARIA encryption at high speed. | 03-25-2010 |
20100077167 | DATA STORAGE DEVICE HAVING SMART CARD BASED COPY PROTECTION FUNCTION, AND METHOD FOR STORING AND TRANSMITTING DATA THEREOF - A data storage device having a smart card based copy protection function is provided. The data storage device encodes data using the temper resistant key of the smart card as the encoding seed, stores the encoded data, and transmits the encoded data to other device. Therefore, it is impossible to modulate or to make the illegal copy of stored or transmitted data, and the reliability of the storage device can be improved. | 03-25-2010 |
20100122080 | PSEUDONYM CERTIFICATE PROCESS SYSTEM BY SPLITTING AUTHORITY - The present invention can't independently know real name information of a user unless a server of an authority treating real name certificate and a server of an authority treating pseudonym certificate collaborate mutually, so that privacy of a user isn't infringed. The present invention can acquire real name information of a user with collaboration of real name certification sever and pseudonym certification sever only if you need real name information for a user. | 05-13-2010 |
20100146603 | ANONYMOUS AUTHENTICATION-BASED PRIVATE INFORMATION MANAGEMENT SYSTEM AND METHOD - An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information from an anonymous certification authority; generating an anonymous document including the anonymous certificate and some of the user information; and providing the anonymous document to a web service provider so as to be authenticated and thus provided with a web service by the web service provider. Thus, only a minimum of user information may be provided to the web service provider. In addition, it is possible to strengthen a user's right to self-determination and control over the exposure and use of his or her personal information by allowing a user to manage his or her own personal information or entrusting the PIM server to manage user information. Moreover, it is possible to protect the privacy of a user by preventing the exposure of user information. | 06-10-2010 |
20100161970 | USER TERMINAL AND METHOD OF MANAGING USER INFORMATION - A user terminal and a method of managing user information are provided. The method includes issuing a request for issuance of a certificate for a user to a certification authority; generating a document including at least part of user information using a certificate issued by the certification authority; and issuing a subscription request to a desired web service provider by providing the document including the at least part of the user information to the desired web service provider. Therefore, it is possible to strengthen the user's right to self-determination and control over the exposure and use of his or her personal information. In addition, it is possible to improve the reliability of user information provided to each website by the user. | 06-24-2010 |
20110004765 | LICENSE MANAGING METHOD AND DEVICE - A license managing device sets a security area for storing a license file, maintains the security area as an encoded file in an inactive state of the security area by encoding the security area, maintains the security area as a directory in an active state of the security area by decoding the security area, and encodes a license file by using a file encoding key according to the user's request and stores the same in a security area in an active state of the security area. | 01-06-2011 |
20110072159 | USER TERMINAL SYSTEM, DIGITAL RIGHTS MANAGEMENT SYSTEM INCLUDING THE USER TERMINAL SYSTEM, AND METHOD OF MANAGING DIGITAL RIGHTS - Provided is a digital rights management system, in which a process of combining digital content created by the original author with first metadata indicated with rights information of the original author and a process of combining revised digital content with second metadata indicated with rights information of a secondary author, are respectively and separately performed at the server and terminal sides. Thus, the digital rights management system can reduce the load generated at the server side compared to a system in which the server side performs both of the above processes. | 03-24-2011 |
20110142346 | APPARATUS AND METHOD FOR BLOCKING OBJECTIONABLE MULTIMEDIA BASED ON SKIN COLOR AND FACE INFORMATION - Provided are an apparatus and method for blocking objectionable multimedia based on skin color and face information. The apparatus for blocking objectionable multimedia can block objectionable multimedia by obtaining skin color and face information from multimedia learning data and analyzing it to generate features that may express the objectionability, for example, the presence of a person, a body shape, and the degree of nudity; generating objectionability classification model through statistical analysis and machine learning on the features; and determining the objectionability of newly input multimedia based on the objectionability classification model. | 06-16-2011 |
20110150328 | APPARATUS AND METHOD FOR BLOCKIING OBJECTIONABLE IMAGE ON BASIS OF MULTIMODAL AND MULTISCALE FEATURES - Provided are an apparatus and method for blocking an objectionable image on the basis of multimodal and multiscale features. The apparatus includes a multiscale feature analyzer for analyzing multimodal information extracted from image training data to generate multiscale objectionable and non-objectionable features, an objectionability classification model generator for compiling statistics on the generated objectionable and non-objectionable features and performing machine learning to generate multi-level objectionability classification models, an objectionability determiner for analyzing multimodal information extracted from image data input for objectionability determination to extract at least one of multiscale features of the input image, and comparing the extracted feature with at least one of the multi-level objectionability classification models to determine objectionability of the image, and an objectionable image blocker for blocking the input image when it is determined that the image is objectionable. | 06-23-2011 |
20110153328 | OBSCENE CONTENT ANALYSIS APPARATUS AND METHOD BASED ON AUDIO DATA ANALYSIS - Provided is an obscene content analysis apparatus and method. The obscene content analysis apparatus includes a content input unit that receives content, an input data buffering unit that buffers the received content, wherein buffering is performed on content corresponding to a length of a previously set analysis section or a length longer than the analysis section, an obscenity analysis determining unit that determines whether or not the analysis section of audio data extracted from the buffered content is obscene by using a previously generated audio-based obscenity determining model and marks the analysis section with an obscenity mark when the analysis section is determined as obscene, a reproduction data buffering unit that accumulates and stores content in which obscenity has been determined by the obscenity analysis determining unit, and a content reproducing unit that reproduces the content while blocking the analysis section marked with the obscenity mark. | 06-23-2011 |
20110154045 | ANONYMOUS AUTHENTICATION SERVICE METHOD FOR PROVIDING LOCAL LINKABILITY - There is provided an anonymous service method of providing local linkability. The anonymous service method providing local linkability according to exemplary embodiments of the invention, an anonymous authentication operation based on a short group signature is performed, for which the concept of a local linkability is introduced to secure linkability within the same service domain. Namely, in the interior of a service provider, a virtual index having a fixed value is calculated for each service user, and in this case, although a plurality of service providers collude with each other, they cannot calculate a virtual index having the same value, whereby the linkability can be secured within the same service domain but not within the interiors of different service domains. | 06-23-2011 |
20120084567 | GROUP SIGNATURE SYSTEM AND METHOD PROVIDING CONTROLLABLE LINKABILITY - A group signature system includes: a key issuer server for generating a first parameter of a group public key, generating a corresponding master issuing key, and issuing a signature key to a user when a user device joins; an opener server for generating a second parameter of the group public key, and a corresponding master opening key and master linking key; and a linker server for checking whether two valid signatures have been linked by using the master linking key when the two signatures corresponding to a group public key are given. The group signature system further includes: a signature verifying unit for confirming a validity of the given signatures and a signer information confirming unit for confirming a validity of singer confirming information generated by the opener server. | 04-05-2012 |
20120099726 | CONTENT PROTECTION APPARATUS AND METHOD USING BINDING OF ADDITIONAL INFORMATION TO ENCRYPTION KEY - The present invention relates to a content protection apparatus and method using binding of additional information to an encryption key. The content protection apparatus includes an encryption unit for creating an encryption key required to encrypt data requested by a user terminal and then generating encrypted data in which the data is encrypted. An additional information management unit manages additional information including authority information about the encrypted data. A White-Box Cryptography (WBC) processing unit generates a WBC table required to bind the encryption key corresponding to the encrypted data to the additional information. A bound data generation unit generates bound data in which the encrypted key is bound to the additional information, using a cipher included in the WBC table. | 04-26-2012 |
20120134578 | SYSTEM AND METHOD FOR DETECTING GLOBAL HARMFUL VIDEO - A system for detecting a global harmful video includes: a video determination policy generation unit for determining harmfulness of learning video segments from video learning information to analyze occurrence information of harmful learning video segments, and generating a global harmfulness determination policy based on the occurrence information; and a video determination policy execution unit for determining harmfulness of input video segments from information of an input video to analyze occurrence information of harmful input video segments, and determining whether the input video is harmful or not based on the occurrence information of the harmful input video segments and the global harmfulness determination policy. | 05-31-2012 |
20120159166 | METHOD OF VERIFYING KEY VALIDITY AND SERVER FOR PERFORMING THE SAME - Disclosed herein is a method of verifying key validity and a server for performing the method. The method is configured such that a service provision server verifies key validity in an anonymous service for providing local linkability. The service provision server receives a revocation list. A local revocation list is generated using the received revocation list and a secret key. A virtual index of a service user required to verify key validity is calculated. Whether a key of the service user is valid is verified, based on whether the virtual index is included in the local revocation list. | 06-21-2012 |
20120163582 | DATA ENCODING AND DECODING APPARATUS AND METHOD THEREOF FOR VERIFYING DATA INTEGRITY - A data encoding apparatus for verifying data integrity by using a white box cipher includes: an encoding unit for encoding content by using a white box cipher table; and an arithmetic logic unit for performing an arithmetic logic operation on the white box cipher table and content information to output an encoded white box cipher table. The arithmetic logic operation is an exclusive OR operation. The content information is license information of the content or hash value of the license information of the content. | 06-28-2012 |
20120163654 | METHOD AND SYSTEM FOR TRACKING ILLEGAL DISTRIBUTOR AND PREVENTING ILLEGAL CONTENT DISTRIBUTION - A system for tracking an illegal distributor and preventing an illegal content distribution includes: a forensic mark generator for receiving content and a content identification code from a content providing apparatus to generate a forensic mark; a forensic mark database for storing the generated forensic mark; a forensic mark insertion unit for inserting the forensic mark into the content; and a content database for storing the content into which the forensic mark has been inserted. The system further includes a content transmitter for transmitting the content into which the forensic mark has been inserted to the content utilization apparatus. | 06-28-2012 |
20120166309 | AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD USING BARCODES - Disclosed is an authentication method using barcodes. the authentication method includes: converting into a first barcode and outputting, by a first user device, authentication related information provided from a service providing server; receiving, by a second user device, the first barcode; generating, by the second user device, signature information or authentication information on the authentication related information by using a signature key or a certificate; and providing, by the second user device, the signature information or the authentication information to the service providing server. | 06-28-2012 |
20120170740 | CONTENT PROTECTION APPARATUS AND CONTENT ENCRYPTION AND DECRYPTION APPARATUS USING WHITE-BOX ENCRYPTION TABLE - A content protection apparatus using a white-box encryption table includes: a random number generation unit for generating a random number; a white-box encryption table for encrypting the random number and user information provided from a user to generate an encrypted output value; and an operation unit for performing an operation between the encrypted output value and data inputted from an outside to encrypt or decrypt the data. | 07-05-2012 |
20140082728 | DONGLE DEVICE FOR WIRELESS INTRUSION PREVENTION - Disclosed is a dongle device for wireless intrusion prevention, which can provide a wireless intrusion prevention service to a wireless access point in a wireless local area communication network. A dongle device for wireless intrusion prevention including an interface unit connected to an access point and configured to receive a data frame from the access point, a control unit configured to determine a security threat on the basis of the received data frame and generate prevention information if there is the security threat according to the determination result, and a storage unit configured to store information for security threat determination can make an existing wireless access point a wireless access point that can provide wireless intrusion prevention. | 03-20-2014 |
20140130155 | METHOD FOR TRACKING OUT ATTACK DEVICE DRIVING SOFT ROGUE ACCESS POINT AND APPARATUS PERFORMING THE METHOD - A method including: detecting an unauthorized soft rogue AP; collecting information about the detected soft rogue AP, information about one or more access terminals connected to the detected soft rogue AP, and information about one or more candidate attack terminals that are not connected to the detected soft rogue AP, and storing the collected information; | 05-08-2014 |
20140150049 | METHOD AND APPARATUS FOR CONTROLLING MANAGEMENT OF MOBILE DEVICE USING SECURITY EVENT - A method controls the management of a mobile device using a security event. The method includes acquiring, by a wireless intrusion prevention server, security threat information by monitoring RF signals generated from an access point (AP) and the mobile device, transmitting the security threat information to a mobile device management server, and executing, by the mobile device management server, a device management policy for the mobile device based on the security threat information. | 05-29-2014 |
20140245441 | APPARATUS FOR ANALYZING VULNERABILITY OF WIRELESS LOCAL AREA NETWORK - Disclosed herein is an apparatus for analyzing the vulnerability of a wireless local area network (LAN). The apparatus includes a collection unit, an analysis unit, and an attack unit. The collection unit collects packets transmitted and received in a wireless LAN service. The analysis unit analyzes the state of a network using the collected packets. The attack unit makes a wireless attack against an attack target using the state of the network, and controls the mode switching of a device driver based on an operating mode. | 08-28-2014 |