Patent application number | Description | Published |
20080262798 | METHOD AND SYSTEM FOR PERFORMING DISTRIBUTED VERIFICATION WITH RESPECT TO MEASUREMENT DATA IN SENSOR NETWORK - A method and system for performing a distributed verification with respect to measurement data in a sensor network. The method of performing the distributed verification with respect to measurement data in a sensor network includes: verifying, by an aggregator, the measurement data received from each of a plurality of sensors; generating, by the aggregator, verification request data by using the verified measurement data; transmitting the verification request data to a verifier; and verifying, by the verifier, the aggregator via a predetermined number of sensors of the plurality of sensors and the verification request data. The method of performing a distributed verification with respect to measurement data in a sensor network further includes transmitting, by the aggregator, an aggregation result with respect to the measurement data to a base station when the aggregator is verified; and verifying, by the base station, the aggregation result. | 10-23-2008 |
20090146986 | Organic Light Emitting Display and Method of Driving the Same - An organic light emitting display with improved display quality. The organic light emitting display includes a display panel including red pixels having red organic light emitting diodes (OLED), green pixels having green OLEDs and blue pixels having blue OLEDs, a first divided power source connected to at least one of the red pixels, the green pixels and the blue pixels, a second divided power source connected to the pixels different from the pixels to which the first divided power source is connected, a power source generator for controlling the voltage value of the first divided power source, and a common power source commonly connected to the red pixels, the green pixels and the blue pixels. | 06-11-2009 |
20110179430 | Computer System and Method for Preventing Dynamic-Link Library Injection Attack - A computer system and method for preventing a Dynamic-Link Library (DLL) injection attack are provided. The computer system monitors an operation where a process attempts to dynamically link an executable code library to another process, and intercepts the dynamic link of the executable code library. | 07-21-2011 |
20110179490 | Apparatus and Method for Detecting a Code Injection Attack - A code injection attack detecting apparatus and method are provided. The code injection attack may be detected based on characteristics occurring when a malicious code injected by the code injection attack is executed. For example, the code injection attack detecting apparatus and method may detect that a code injection attack occurs when a buffer miss is detected, a page corresponding to an address is updated, a mode of the page corresponding to the address is in user mode, and/or the page corresponding to the page is inserted by an external input. | 07-21-2011 |
20110239211 | SYSTEM, APPARATUS, AND METHOD FOR DOWNLOADING FIRMWARE - Disclosed are an apparatus for downloading a firmware and an apparatus for installing the firmware. The apparatus for downloading the firmware may download an encrypted firmware in the apparatus for installing the firmware. The apparatus for installing apparatus may receive and install the encrypted firmware. | 09-29-2011 |
20120317613 | NETWORK APPARATUS BASED ON CONTENT NAME AND METHOD FOR PROTECTING CONTENT - A content protection method includes generating content protection information regarding a content to be protected by a content producer, and generating a content name indicating a location of the content in content name based networks based on the content protection information. The content protection information may include at least one of marking information indicating whether the content is protected and policy information indicating a disclosure range of the content. | 12-13-2012 |
20140215611 | APPARATUS AND METHOD FOR DETECTING ATTACK OF NETWORK SYSTEM - An attack detection apparatus includes a window size change unit configured to change a size of a window to be applied to traffic, and an abnormal state detection unit configured to detect an abnormal state of the traffic to which the changed window is applied. | 07-31-2014 |
20140258490 | COMMUNICATION METHOD OF ADMINISTRATION NODE, REQUESTING NODE, AND NORMAL NODE FOR DELETING INVALID CONTENT USING CONTENT REVOCATION LIST IN CONTENT CENTRIC NETWORK - Provided is a communication method for an administration node in a content centric network (CCN). The communication method includes receiving a packet requesting deletion of an invalid content from a requesting node that detects the invalid content, generating a content revocation list including a name of the invalid content and a period of time over which the deletion is to be performed, and flooding a data packet including the content revocation list to the requesting node and a normal node included in the CCN. Also provided are related communications methods for a receiving node and a normal node, as well as the nodes themselves. | 09-11-2014 |
20140310654 | METHOD AND SYSTEM FOR INTERWORKING PLURALITY OF APPLICATIONS - An application interoperation method including the steps of: maintaining a handler table including data type information, function information and calling information which are associated with each application installed in a portable device; receiving input information on a menu key of the portable device, from a user, while a first application is active; extracting, in response to the receipt of the input information, at least one function information associated with data type information of data, which is being processed or requested by the first application, from the handler table; dynamically generating a menu including the extracted at least one function information to provide the user with the generated menu; receiving selection information on particular function information among the provided menu, from the user; and identifying calling information associated with the selected particular function information by referring to the handler table and executing a second application on the basis of the identified calling information. | 10-16-2014 |