Patent application number | Description | Published |
20110023099 | USER TERMINAL WITH IDENTITY SELECTOR AND METHOD FOR IDENTITY AUTHENTICATION USING IDENTITY SELECTOR OF THE SAME - The present invention relates to a user terminal ( | 01-27-2011 |
20110119744 | PSEUDONYMOUS IDENTIFICATION MANAGEMENT APPARATUS, PSEUDONYMOUS IDENTIFICATION MANAGEMENT METHOD, PSEUDONYMOUS IDENTIFICATION MANAGEMENT SYSTEM AND SERVICE ADMISSION METHOD USING SAME SYSTEM - A pseudonymous ID (identification) management apparatus includes a token processing unit for validating an authentication token; a pseudonymous ID generation unit for issuing a pseudonymous ID corresponding to the authentication token; a temporary ID generation unit for issuing a temporary ID for use in an offline subscription; and an ID validation unit for validating a pseudonymous ID received from a web service apparatus along with a pseudonymous ID validation request and transmitting pseudonymous ID validation result to the web service apparatus, and validating a temporary ID received from the web service apparatus along with a pseudonymous ID exchange request and transmitting a pseudonymous ID corresponding to the temporary ID to the web service apparatus. The web service apparatus provides a service to which a user desires to subscribe. | 05-19-2011 |
20110150224 | KEY TREE CONSTRUCTION AND KEY DISTRIBUTION METHOD FOR HIERARCHICAL ROLE-BASED ACCESS CONTROL - A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role groups and data; performing encryption and decryption of data keys and role keys; and generating a key table, in which the data keys required to decrypt encrypted data and the role keys required to decrypt encrypted data keys are stored, with reference to the key tree. Further, the key tree construction and key distribution method for hierarchical role-based access control includes performing management such that a specific role group can obtain a data key by performing decryption based on its own role key by using both the key tree and the key table. | 06-23-2011 |
20110202768 | APPARATUS FOR MANAGING IDENTITY DATA AND METHOD THEREOF - An apparatus and a method for managing identity data are disclosed, which can recover lost or deleted ID data stored in a user terminal and prevent a malicious user to plagiarize a user's ID. The apparatus includes a user ID management device ( | 08-18-2011 |
20140109105 | INTRUSION DETECTION APPARATUS AND METHOD USING LOAD BALANCER RESPONSIVE TO TRAFFIC CONDITIONS BETWEEN CENTRAL PROCESSING UNIT AND GRAPHICS PROCESSING UNIT - An intrusion detection apparatus and method using a load balancer responsive to traffic conditions between a central processing unit (CPU) and a graphics processing unit (GPU) are provided. The intrusion detection apparatus includes a packet acquisition unit, a character string check task allocation unit, a CPU character string check unit, and a GPU character string check unit. The packet acquisition unit receives packets, and stores the packets in a single task queue. The character string check task allocation unit determines the number of packets in the packet acquisition unit, and allocates character string check tasks to the CPU or the GPU. The CPU character string check unit compares the character strings of the packets with a character string defined in at least one detection rule inside the CPU. The GPU character string check unit compares the character strings of the packets with the character string inside the GPU. | 04-17-2014 |
20150089655 | SYSTEM AND METHOD FOR DETECTING MALWARE BASED ON VIRTUAL HOST - A system and method for detecting malware based on a virtual host are provided. The system for detecting malware based on a virtual host includes a terminal network behavior analysis server and a virtual host. The terminal network behavior analysis server extracts network behavior information by monitoring the network behavior of an actual host, and outputs the extracted the network behavior information. The virtual host detects malware corresponding to abnormal behavior in the actual host, by receiving the network behavior information and then performing corresponding behavior. | 03-26-2015 |