Patent application number | Description | Published |
20090094670 | SECURITY APPARATUS AND METHOD FOR ALL-IN-ONE MOBILE DEVICE USING SECURITY PROFILE - The present invention relates to a security apparatus and method for an all-in-one mobile device using a security profile. According to the security apparatus and method for an all-in-one mobile device using a security profile, a security profile of the mobile device is set in a manual mode or an automatic mode according to a user's knowledge level for security, and when environmental factors of the mobile device vary or the user requests to change a security level, the security profile is dynamically or statically reconstructed. This structure can rapidly solve a security problem and enables a user having a low knowledge level for security and a low degree of understanding of the functions of the mobile device to easily set a security function. | 04-09-2009 |
20100023523 | METHOD AND APPARATUS FOR MANAGING DATA HAVING ACCESS RESTRICTION INFORMATION - A method and an apparatus for managing data for providing a predetermined piece of information according to access restriction information established with regard to each piece of data are provided. The method includes: establishing the access restriction information with regard to the data when the data is stored; and determining whether an access to the data is permitted by detecting access valid time of the data from the access restriction information. The present invention establishes access valid time with regard to importance data accessed by a user and establishes a user's access denial to the importance data having access valid time exceeding the established access valid time so as to reinforce security, thereby preventing the important information from being externally leaked. Also, the present invention establishes a time limit and a cycle of each piece of important information, thereby facilitating the management of important information. | 01-28-2010 |
20100037239 | PORTABLE TERMINAL AND METHOD OF CONTROLLING EXTERNAL INTERFACE THEREOF - The present invention relates to a portable terminal and a method of controlling an external interface thereof. When a system call that requests to open a external interface is input from a user process in a portable terminal that is connected to a plurality of external interfaces, a driver of the external interface is opened or intercepted using an external interface policy where open or intercepted information for each of the plurality of external interfaces is recorded to correspond to the user process. According to the present invention, an external interface that is not used by the portable terminal can be prevented from operating if externally attacked regardless of the user's intention. | 02-11-2010 |
20100100929 | APPARATUS AND METHOD FOR SECURITY MANAGING OF INFORMATION TERMINAL - Provided is an apparatus and a method for security managing of an information terminal. The provided classifies a plurality of information providing means into a plurality of domains including at least one information providing means and when a user process accesses any one domain and then attempts to access another domain, controls the access to said another domain by verifying whether or not the access of the user process to said another domain is allowed. According to the provided, security threats are monitored for each domain which an execution process accesses by simply constructing domain classification information of an entire system without specifically establishing a security policy of an information providing device, such that it is possible to protect a terminal from a multi-domain access process having high security risk. Accordingly, it is advantageous to increase security for the terminal from various security threats. | 04-22-2010 |
Patent application number | Description | Published |
20090119745 | SYSTEM AND METHOD FOR PREVENTING PRIVATE INFORMATION FROM LEAKING OUT THROUGH ACCESS CONTEXT ANALYSIS IN PERSONAL MOBILE TERMINAL - A system for preventing private information from leaking out through access context analysis in a personal mobile terminal includes a private information manager that receives a private information leakage prevention policy, divides the policy into a plurality of private information leakage prevention rules, and transmits the plurality of rules to individual modules, respectively; a context analyzer that performs access context information analysis to obtain context information, when detecting a packet corresponding to a first rule, and transmits the context information; a packet analyzer that receives the context information, monitors packets transmitted to the outside through packet analysis, and transmits filtering information when detecting a packet corresponding to a second rule; and a private information leakage preventing unit that receives the filtering information and determines whether to allow or drop a packet corresponding to a third rule. | 05-07-2009 |
20090158033 | METHOD AND APPARATUS FOR PERFORMING SECURE COMMUNICATION USING ONE TIME PASSWORD - The invention relates to a communication method and system using a one time password (OTP). The communication system includes: a user computer that has an OTP generator for generating the OTP provided therein; a service server that performs user authentication using user information and an OTP value input from the user computer, and communicates with the user computer using the encoded data that is associated with the OTP value, when the user authentication succeeds; and an OTP integrated authentication server that verifies the OTP value between the user computer and the service server. | 06-18-2009 |
20090163174 | DEVICE AND METHOD FOR DETECTING AND PREVENTING SENSITIVE INFORMATION LEAKAGE FROM PORTABLE TERMINAL - A device and method for detecting and preventing sensitive information leakage from a portable terminal is provided. A device for detecting and preventing leakage of sensitive information from a portable terminal includes a data storage unit that stores data containing sensitive information, an external interface that interfaces the portable terminal with the external, a sensitive information manager that detects and prevents leakage of the sensitive information stored in the data storage unit through the external interface, and a sensitive information leakage detecting and preventing unit that is disposed between the data storage unit and the external interface to detect and prevent the leakage of the sensitive information. | 06-25-2009 |
20100043052 | APPARATUS AND METHOD FOR SECURITY MANAGEMENT OF USER TERMINAL - The present invention relates to an apparatus and method for security management of a user terminal. The present invention generates security policies for the user terminal through an external security management server based on context information for the user terminal. At this time, the present invention receives the generated security policy information and sets internal security policies for the user terminal. The present invention can overcome a limitation of the user terminal as the security policies for the user terminal, particularly, the complex terminal is set by using various interfaces and provide systematic and supplemental security services. | 02-18-2010 |
Patent application number | Description | Published |
20140270346 | TRACKING TEXTURE RICH OBJECTS USING RANK ORDER FILTERING - A method of real-time tracking of an object includes capturing a first and a second image of the object. The object is detected in the first image and movement of the object is tracked between the images. Tracking of the object includes obtaining an initial pose of the camera; projecting an image of a model object onto the second image; determining a gradient profile of the second image from an edge point of the model object along a first direction that is normal to the edge of the model object; computing a radius on the gradient profile; determining a rank order of the peaks of the gradient profile along the radius; comparing the rank order with a predetermined rank order to generate a feature candidate point; and reducing a distance along the first direction between the feature candidate point and the edge point on the edge of the model object. | 09-18-2014 |
20140270360 | EDGEL SAMPLING FOR EDGE-BASED TRACKING - Embodiments include selecting edgels for edge based tracking by dividing a reference image frame (RF) into N×M bins of pixels and projecting a subset of the edgels per bin into a current image frame (CF) using an estimated pose to identify valid bins of the RF as bins having their projected one edgel found within the borders of the CF. Then, K edgels of RF with different orientations from each valid bins may be selected. Then, the selected RF edgels of bins may be reduced by removing bins randomly, or first removing bins from the center of the RF of the image (then next removing the next further outward bins), until a desirable edgel number is obtained. Edge-based tracking can then be performed using the desirable edgel number, to track edges in current frame that are found in prior frame. | 09-18-2014 |
20140368645 | ROBUST TRACKING USING POINT AND LINE FEATURES - Disclosed embodiments pertain to apparatus, systems, and methods for robust feature based tracking. In some embodiments, a score may be computed for a camera captured current image comprising a target object. The score may be based on one or more metrics determined from a comparison of features in the current image and a prior image captured by the camera. The comparison may be based on an estimated camera pose for the current image. In some embodiments, one of a point based, an edge based, or a combined point and edge based feature correspondence method may be selected based on a comparison of the score with a point threshold and/or a line threshold, the point and line thresholds being obtained from a model of the target. The camera pose may be refined by establishing feature correspondences using the selected method between the current image and a model image. | 12-18-2014 |