Patent application number | Description | Published |
20110088093 | USB CONNECTOR AND INTRUSION PREVENTION SYSTEM USING THE SAME - A security USB connector implements an intrusion prevention function preventing the propagation of malicious codes to a host terminal from a USB device while minimizing host terminal resource consumption, and an intrusion prevention system using the same are disclosed. A security USB connector is positioned between the host terminal supporting a USB host and a USB device, and a security inspection is performed on data transferred from the USB device to the host terminal through the security USB connector. Also, a host terminal without an intrusion prevention function can prevent an intrusion by using the portable security USB connector. | 04-14-2011 |
20110145560 | ADAPTIVE SECURITY POLICY BASED SCALABLE VIDEO SERVICE APPARATUS AND METHOD - An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The video streaming server receives a service demand via a network and generates an encrypted streaming data. The adaptive security policy server analyzes a media structure and the service demand, by using a service profile received from the video streaming server, so as to generate a security policy description. The terminal generates and transmits the service demand to the video streaming server or the adaptive security server, obtains the encrypted streaming data from the video streaming server and decrypts the encrypted streaming data for playback, storing and retransmission. | 06-16-2011 |
20120159161 | AUTHENTICATION APPARATUS AND METHOD FOR NON-REAL-TIME IPTV SYSTEM - An authentication apparatus for a non-real-time IPTV system decrypts a first encrypted value included in a contents request message received from a device using a preset session key, and then verifies the validity of the contents request message. If the verification results of the contents request message are valid, the authentication apparatus encrypts a variation between timestamps of the authentication apparatus and the device using the session key, and then generates a second encrypted value. After verification information by which the device is capable of verifying the authentication apparatus has been generated using the second encrypted value, the authentication apparatus sends verification information, together with contents corresponding to the contents request message, to the device. | 06-21-2012 |
20120163594 | SECURITY LABEL GENERATION METHOD AND APPARATUS FOR SCALABLE CONTENT DISTRIBUTION - A security label generation apparatus for scalable content distribution, includes a scalable content transmitter for receiving service level requirements of a user and network bandwidth information over a network and generating security labels and encrypted scalable units. Further, the security label generation apparatus includes a scalable content receiver for receiving the encrypted scalable units and the security labels from the scalable content transmitter and for decrypting, decoding, playing, modifying, storing or redistributing the encrypted scalable units based on the security labels. Furthermore, the security label generation apparatus includes scalable content storage for searching for scalable content and metadata corresponding to a request of the scalable content transmitter. | 06-28-2012 |
20120163595 | METHOD AND SYSTEM FOR PROVIDING LAYERED ACCESS CONTROL FOR SCALABLE MEDIA - An encryption method for providing layered access control for scalable media includes encrypting the scalable media using different encryption keys for respective layers of the scalable media to create a protected content; providing the protected content to a first user terminal; selectively inserting part or all of the encryption keys into a key area of a right object based on the grade of the first user terminal to generate a first right object; and providing the first right object to the first user terminal. | 06-28-2012 |
20120167163 | APPARATUS AND METHOD FOR QUANTITATIVELY EVALUATING SECURITY POLICY - An apparatus for quantitatively evaluating security policy includes: a security policy analyzing unit for analyzing a security policy of a network; an evaluation criterion defining unit for defining an evaluation criterion for categorizing security features and evaluating each of the security features; an evaluation result calculating unit for calculating an evaluation result of each of security components based on the evaluation criterion; an indicator calculating unit for grouping the security components according to a security function and calculating an indicator by considering a security function of each group; and a quantitative evaluating unit for evaluating a security policy of the each group by using the indicator. | 06-28-2012 |
20130139268 | AGENT APPARATUS AND METHOD FOR SHARING ANONYMOUS IDENTIFIER-BASED SECURITY INFORMATION AMONG SECURITY MANAGEMENT DOMAINS - The present invention relates to an agent apparatus and method for sharing anonymous identifier-based security information among security management domains. A plurality of security information sharing agent apparatuses respectively located in a plurality of security management domains and configured to collect security information and transmit collected security information to outside of the security management domains. Each security information sharing agent apparatus includes an identifier conversion unit for converting real name identifier-based security information into anonymous identifier-based security information by converting a real name identifier included in the security information into an anonymous identifier, and a security information communication unit for transmitting the anonymous identifier-based security information obtained by the identifier conversion unit to outside of a corresponding security management domain so that security information is shared among the plurality of security management domains. | 05-30-2013 |
20130152189 | AUTHENTICATION METHOD AND APPARATUS FOR DETECTING AND PREVENTING SOURCE ADDRESS SPOOFING PACKETS - An authentication apparatus for detecting and preventing a source address spoofing packet, includes a packet reception unit configured to receive a packet from a previous node or a user host; a self-assurance type ID generation unit configured to generate a self-assurance type ID of a source node of the received packet; and a self-assurance type ID verification unit configured to determine whether the source address of the received packet has been spoofed. Further, the authentication apparatus includes a white list storage unit configured to store a reliable source node; a black list storage unit configured to store an unreliable source node; and a packet transmission unit configured to transmit the packet whose source has been verified through the self-assurance type ID verification unit to a next network node. | 06-13-2013 |
20130167248 | METHOD FOR GENERATING SMART CONTENTS, METHOD FOR EXECUTING SMART CONTENTS AND METHOD FOR PROVIDING N-SCREEN SERVICE OF SMART CONTENTS - A method for generating smart contents includes contents protected by a digital right management (DRM) technology; and metadata including information necessary to use the contents. Further, the method includes a smart code for protecting copyright of the contents and position information which the smart code is downloaded. | 06-27-2013 |
20130232337 | USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT - Disclosed herein are a user terminal and method for playing DRM content. The user terminal includes a common security platform. The common security platform includes a DRM application management unit and a security management unit. The DRM application management unit stores and executes a DRM application that requests authentication from a license server and receives a license, including a decryption key for decrypting encrypted DRM content. The DRM application is an application in a downloadable form. The security management unit decrypts the encrypted DRM content, provided by a content providing server, using the decryption key included in the license issued via the DRM application. | 09-05-2013 |