Patent application number | Description | Published |
20090172765 | METHOD AND SYSTEM FOR ELECTRONIC COMMERCE USING INTERNET PROTOCOL TELEVISION (IPTV) AND MOBILE TERMINAL - An electronic commerce method and system using an Internet Protocol Television (IPTV) and a mobile terminal are provided. In an electronic commerce method and system, an IPTV or mobile terminal transmits binding information to a server where a purchaser selects product information, the server determines a purchaser authority using the received binding information, and transmits sales information for the selected product information to the mobile terminal in response to the purchase authority being valid, and the mobile terminal makes an offer to purchase the product to the server using the received sales information. | 07-02-2009 |
20090278664 | RADIO FREQUENCY IDENTIFICATION (RFID) TAG ENCRYPTION METHOD AND SYSTEM USING BROADCAST ENCRYPTION (BE) SCHEME - A radio frequency identification (RFID) tag encryption method and system using a broadcast encryption (BE) scheme are provided by encrypting an ID of an RFID tag, storing the encrypted ID in a server and the RFID tag, and storing information relating to a reader authorized to read out the RFID tag in the server so that the reader can read out the RFID tag by decrypting the encrypted ID based on the encrypted ID information read from the RFID tag and the reader information. When readers read out ID data from the RFID tag, a privileged reader can read the data. Thus, it is possible to block unintended information leakage to the readers. In addition, user usability can be enhanced since an attacker cannot perform an access lock on the RFID tag. | 11-12-2009 |
20100162366 | APPARATUS AND METHOD OF PROTECTING PRIVATE INFORMATION IN DISTRIBUTED NETWORK - Disclosed are methods and apparatus to protect private information in a distributed network. In the distributed network, a service request terminal may receive, from a service providing terminal, trust information related to a level of trust of the service providing terminal with respect to a desired service. Also, the service request terminal may verify whether to be provided with the desired service from the service providing terminal based on the trust information, thereby preventing private information of the service request terminal from being leaked. In addition, the service request terminal may easily verify the identity of the service providing terminal when the service request terminal re-visits the service providing terminal. | 06-24-2010 |
20100169980 | PERSONAL INFORMATION PROVIDING APPARATUS AND METHOD - A personal information providing method and apparatus is provided. The personal information providing apparatus may extract personal information about at least one characteristic corresponding to a predetermined standard from a database storing personal information of a plurality of characteristics, embed the personal information about the at least one characteristic in a predetermined image, generate a personal information image, generate a watermark having trace information embedded, and embed the watermark in the personal information image. | 07-01-2010 |
20110093712 | COMMUNICATION DEVICE SUPPORTING PAIRING - Provided is a communication device. The communication device may transmit information to an external device using a terminal that makes a physical contact with the external device, and may sense the physical contact. In response to the sensed physical contact, the communication device may generate a link key. | 04-21-2011 |
20110179430 | Computer System and Method for Preventing Dynamic-Link Library Injection Attack - A computer system and method for preventing a Dynamic-Link Library (DLL) injection attack are provided. The computer system monitors an operation where a process attempts to dynamically link an executable code library to another process, and intercepts the dynamic link of the executable code library. | 07-21-2011 |
20110179490 | Apparatus and Method for Detecting a Code Injection Attack - A code injection attack detecting apparatus and method are provided. The code injection attack may be detected based on characteristics occurring when a malicious code injected by the code injection attack is executed. For example, the code injection attack detecting apparatus and method may detect that a code injection attack occurs when a buffer miss is detected, a page corresponding to an address is updated, a mode of the page corresponding to the address is in user mode, and/or the page corresponding to the page is inserted by an external input. | 07-21-2011 |
20110239211 | SYSTEM, APPARATUS, AND METHOD FOR DOWNLOADING FIRMWARE - Disclosed are an apparatus for downloading a firmware and an apparatus for installing the firmware. The apparatus for downloading the firmware may download an encrypted firmware in the apparatus for installing the firmware. The apparatus for installing apparatus may receive and install the encrypted firmware. | 09-29-2011 |
20110311098 | Method and apparatus for inserting video watermark in compression domain - An apparatus and method for video watermarking are provided. The apparatus and method include receiving a bit stream encoded by a video encoder by a spatial domain information analyzer and extracting information from a spatial domain of an image with respect to code words forming the bit stream, grouping the code words for each segmented domain by a domain classifier based on the information from the spatial domain, determining a sign of the each segmented domain by a domain sign determiner and inserting a watermark in the each segmented domain according to the sign determined by the domain sign determiner by a watermark bit inserter. | 12-22-2011 |
20120036353 | TAG GENERATION METHOD IN BROADCAST ENCRYPTION SYSTEM - A tag generation method for generating tags used in data packets in a broadcast encryption system is provided. The method includes detecting at least one revoked leaf node; setting a node identification (node ID) assigned to at least one node among nodes assigned node IDs at a layer 0 and to which the at least one revoked leaf node is subordinate, to a node path identification (NPID) of the at least one revoked leaf node at the layer 0; generating a tag list in the layer 0 by combining the NPID of each of the at least one revoked leaf nodes at the layer 0 in order of increment of node IDs of the corresponding at least one revoked leaf nodes; and generating a tag list in a lowest layer by repeatedly performing the setting and generation operation down to the lowest layer. | 02-09-2012 |
20120183136 | APPARATUS AND METHOD FOR GENERATING A KEY FOR BROADCAST ENCRYPTION - An apparatus and method for generating a key for a broadcast encryption. The apparatus includes a node secret generator for managing a user that receives broadcast data in a tree structure and for generating a unique node secret for each node in the tree structure. The apparatus also includes an instant key generator for temporarily generating an instant key used at all nodes in common in the tree structure, and a node key generator for generating a node key for each node by operating the node secret generated at the node secret generator and the instant key generated at the instant key generator. Thus, key update can be efficiently achieved. | 07-19-2012 |
20120213364 | COMBINATION-BASED BROADCAST ENCRYPTION METHOD - A combination-based broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using as a base the base group allocated to each user; producing and sending an inverse-base parameter value through calculations with integers used to produce the base group and key value information of one or more privileged users; and deriving a group key by using the key value information of the privileged users, encrypting a session key by using the derived group key, and sending the encrypted session key to each user. Accordingly, each user is assigned a different base through a combination, thereby having security against collusion attacks. | 08-23-2012 |
20120263300 | TAG GENERATION METHOD IN BROADCAST ENCRYPTION SYSTEM - A tag generation method for generating tags used in data packets in a broadcast encryption system is provided. The method includes detecting at least one revoked leaf node; setting a node identification (node ID) assigned to at least one node among nodes assigned node IDs at a layer 0 and to which the at least one revoked leaf node is subordinate, to a node path identification (NPID) of the at least one revoked leaf node at the layer 0; generating a tag list in the layer 0 by combining the NPID of each of the at least one revoked leaf nodes at the layer 0 in order of increment of node IDs of the corresponding at least one revoked leaf nodes; and generating a tag list in a lowest layer by repeatedly performing the setting and generation operation down to the lowest layer. | 10-18-2012 |