Patent application number | Description | Published |
20080313701 | SYSTEM AND METHOD FOR MANAGING NETWORK BY VALUE-BASED ESTIMATION - A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices. | 12-18-2008 |
20090094585 | METHOD AND APPARATUS FOR ANALYZING EXPLOIT CODE IN NONEXECUTABLE FILE USING VIRTUAL ENVIRONMENT - Provided is a method and apparatus for analyzing an exploit code included in a nonexecutable file using a target program with vulnerability in a virtual environment. The method includes the steps of: loading a nonexecutable file including the exploit code by a target program, the target program being executed in a virtual environment and includes vulnerability; analyzing a register value of the target program and determining if the register value of the target program indicates a normal code region; storing log information on operation of the target program when the register value indicates a region other than the normal code region; and extracting and analyzing the exploit code included in the nonexecutable file based on the stored log information. In this method, the exploit code is analyzed in the virtual environment, thereby preventing damage caused by execution of the exploit code. | 04-09-2009 |
20090259673 | METHOD AND APPARATUS FOR EXTRACTING TEXT FROM INTERNET MAIL ATTACHMENT FILE - Provided are a method and apparatus for extracting text from an Internet mail attachment file. The apparatus includes a mail display unit for displaying Internet mail and an attachment file received from outside, an attachment file storage for storing the attachment file, a text extraction engine for extracting a text code included in the attachment file, and an attachment file text extractor for extracting text included in the attachment file using the text extraction engine. | 10-15-2009 |
20090299935 | METHOD AND APPARATUS FOR DIGITAL FORENSICS - A method and apparatus for digital forensics are provided. The apparatus for digital forensics includes a page file extractor for extracting a page file stored in a target storage medium, a stored-page feature extractor for extracting features of pages stored in the extracted page file, a page classifier for comparing the extracted features of the pages with at least one predetermined classification criterion and classifying the pages according to the comparison results, and a digital forensics unit for performing digital forensics according to the classified pages. According to the method and apparatus, it is possible to perform digital forensics using only information of a page file. | 12-03-2009 |
20100024033 | APPARATUS AND METHOD FOR DETECTING OBFUSCATED MALICIOUS WEB PAGE - An apparatus and method for detecting an obfuscated malicious web page are provided to find a malicious web page by deobfuscating an obfuscated malicious code. The apparatus includes an obfuscated code detector that detects whether an obfuscated code is included in a source code of a web page, a deobfuscation function inserter that reconfigures the source code by inserting a function for deobfuscating the obfuscated code into the source code, a deobfuscator that is called by the function inserted into the reconfigured source code and deobfuscates the obfuscated code, and a malicious code detector that detects a malicious code using the deobfuscated code. | 01-28-2010 |
20110239294 | SYSTEM AND METHOD FOR DETECTING MALICIOUS SCRIPT - Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for statically analyzing the decomposed scripts in the form of a document file, a dynamic analysis module for dynamically executing and analyzing the decomposed scripts, and a comparison module for comparing an analysis result of the static analysis module and an analysis result of the dynamic analysis module to determine whether the decomposed scripts are malicious scripts. The system and method can recognize a hidden dangerous hypertext markup language (HTML) tag irrespective of an obfuscation technique for hiding a malicious script in a web page and thus can cope with an unknown obfuscation technique. | 09-29-2011 |
20130160122 | TWO-STAGE INTRUSION DETECTION SYSTEM FOR HIGH-SPEED PACKET PROCESSING USING NETWORK PROCESSOR AND METHOD THEREOF - A system and method for detecting network intrusion by using a network processor are provided. The intrusion detection system includes: a first intrusion detector, configured to use a first network processor to perform intrusion detection on layer 3 and layer 4 of a protocol field among information included in a packet header of a packet transmitted to the intrusion detection system, and when no intrusion is detected, classify the packets according to stream and transmit the classified packets to a second intrusion detector; and a second intrusion detector, configured to use a second network processor to perform intrusion detection through deep packet inspection (DPI) for the packet payload of the packets transmitted from the first intrusion detector. Thereby, intrusion detection for high-speed packets can be performed in a network environment. | 06-20-2013 |
20140109105 | INTRUSION DETECTION APPARATUS AND METHOD USING LOAD BALANCER RESPONSIVE TO TRAFFIC CONDITIONS BETWEEN CENTRAL PROCESSING UNIT AND GRAPHICS PROCESSING UNIT - An intrusion detection apparatus and method using a load balancer responsive to traffic conditions between a central processing unit (CPU) and a graphics processing unit (GPU) are provided. The intrusion detection apparatus includes a packet acquisition unit, a character string check task allocation unit, a CPU character string check unit, and a GPU character string check unit. The packet acquisition unit receives packets, and stores the packets in a single task queue. The character string check task allocation unit determines the number of packets in the packet acquisition unit, and allocates character string check tasks to the CPU or the GPU. The CPU character string check unit compares the character strings of the packets with a character string defined in at least one detection rule inside the CPU. The GPU character string check unit compares the character strings of the packets with the character string inside the GPU. | 04-17-2014 |
20140123288 | NETWORK INTRUSION DETECTION APPARATUS AND METHOD USING PERL COMPATIBLE REGULAR EXPRESSIONS-BASED PATTERN MATCHING TECHNIQUE - A network intrusion detection apparatus and method that perform Perl Compatible Regular Expressions (PCRE)-based pattern matching on the payloads of packets using a network processor equipped with a Deterministic Finite Automata (DFA) engine. The network intrusion detection apparatus includes a network processor core for receiving packets from a network, and transmitting payloads of the received packets to a Deterministic Finite Automata (DFA) engine. A detection rule converter converts a PCRE-based detection rule, preset to detect an attack packet, into a detection rule including a pattern to which only PCRE grammar corresponding to the DFA engine is applied. The DFA engine performs PCRE pattern matching on the payloads of the packets based on the detection rule converted by the detection rule converter. | 05-01-2014 |
20150089655 | SYSTEM AND METHOD FOR DETECTING MALWARE BASED ON VIRTUAL HOST - A system and method for detecting malware based on a virtual host are provided. The system for detecting malware based on a virtual host includes a terminal network behavior analysis server and a virtual host. The terminal network behavior analysis server extracts network behavior information by monitoring the network behavior of an actual host, and outputs the extracted the network behavior information. The virtual host detects malware corresponding to abnormal behavior in the actual host, by receiving the network behavior information and then performing corresponding behavior. | 03-26-2015 |
Patent application number | Description | Published |
20090092084 | Channel management method and channel selection method for wireless node in wireless ad-hoc network - Provided are a channel management method and a channel selection method for a wireless node in a wireless ad-hoc network. The channel management method includes the steps of: (a) when a current mode is a first mode, performing channel selection using a method for evenly distributing a channel within an interference range; and (b) when the current mode is a second mode, performing channel selection based on a channel switching probability. According to the method, by preventing a channel change from being continuously repeated in a wireless ad-hoc network using multi-channel multi-interface, it is possible to prevent data transmission delay and network performance deterioration. | 04-09-2009 |
20110032874 | APPARATUS AND METHOD FOR NETWORK MOBILITY MANAGEMENT IN PROXY MOBILE IPv6 NETWORK - Provided is a network mobility management apparatus for providing mobility in a proxy mobile Internet Protocol (IP) network of mobile nodes which configure a mobile network. The network mobility management apparatus includes an address generation unit and a communication unit. The address generation unit transmits a router request message to a mobile access gateway of a proxy mobile IP network to be accessed by the mobile nodes, and receives a router advertisement message containing a home network prefix to generate an address. The communication unit transmits a proxy binding update message containing the home network prefix and an identification code of the mobile node to the mobile access gateway when the router request message is received from the mobile node, and includes the mobile home network prefix, which is contained in a proxy binding response message received from the mobile access gateway and is for the mobile node, in the router advertisement message to transfer the mobile home network prefix to the mobile node. | 02-10-2011 |
20110182379 | NETWORK CODING METHOD AND SYSTEM THROUGH CONSIDERATION OF CHANNEL STATE DIFFERENCE OF RECEIVERS - Disclosed is a network coding method and system for receivers having a different channel state that may demodulate and extract a single coded packet using a different demodulation scheme according to a channel state of each receiver. The disclosed network coding method may use a different demodulation scheme to be suitable for a channel state of each receiver by applying a packet encoding scheme combined with a modulation scheme. When two receivers receive a network coded packet, a receiver having a poor channel state may receive a relatively small amount of information from the single packet compared to the other receiver having a relatively excellent channel state, but may enhance the reliability of packet reception. The other receiver having the relatively excellent channel state may decrease the reliability of packet reception, but may receive a relatively large amount of information. | 07-28-2011 |
20120099539 | LOCAL MOBILITY ANCHOR, PROXY ROUTER, AND MANAGEMENT METHOD FOR SUPPORTING NETWORK MOBILITY IN PROXY MOBILE IPv6 NETWORK - Provided are an LMA, a proxy router, and a management method for supporting NEMO in a PMIPv6 network. To support mobility in the PMIPv6 network for mobile nodes forming one node group within a mobile network, the proxy router for delivering signal and data between the mobile nodes and the PMIPv6 network delivers mobile home network prefixes allocated by the LMA of the PMIPv6 network to the mobile nodes. The LMA generates a group ID corresponding to the node group. Packet delivery costs due to an unnecessary tunnel may be reduced by grouping a plurality of mobile nodes constituting a mobile network, and using and managing flags and the same group ID. | 04-26-2012 |
20120114121 | METHOD OF TRANSMITTING AND RECEIVING CONTENT - Provided is a method of transmitting and receiving content. The method includes (a) transferring, at a content server, a service key to a mobile terminal, (b) transferring, at the content server, a number to the mobile terminal, (c) scrambling, at the content server, content and transferring the scrambled content to the mobile terminal, (d) updating, at the mobile terminal, the service key on the basis of the number, and (e) descrambling, at the mobile terminal, the scrambled content using the updated service key. | 05-10-2012 |
20120122444 | FEMTO BS FOR REDUCING INTER-CELL INTERFERENCE AND METHOD FOR TRANSMITTING SIGNAL USING THE SAME - A signal transmission method includes determining whether there is a User Equipment (UE) within an area of the femto BS, determining whether the UE is in an active mode, operating in a first mode of alternating a first Available Interval (AI) with a first UnAvailable Interval (UAI) in time, if no UE exists within the area of the femto BS, operating in a second mode of alternating a second AI with a second UAI shorter than the first UAI in time, if a UE exists within the area of the femto BS and operates in an inactive mode and operating in a third mode of continuously transmitting a signal, if a UE exists within the area of the femto BS and operates in the active mode. | 05-17-2012 |
20120191778 | CONTENT DISTRIBUTION NETWORK FOR SUPPORTING PEER-TO-PEER LIVE STREAMING - Disclosed herein is a method and system for providing a Peer-to-Peer (P2P) live streaming service over a Content Distribution Network (CDN). The method includes the steps of (A) a peer present on a network searching for an adjacent surrogate, that is, a superpeer in a bin where peers are grouped, (B) the peer sending a content request message to the surrogate, (C) the surrogate finding a corresponding peer list and then sending the peer list to the peer in response to the content request message, or, if the surrogate cannot find a peer list corresponding to the content request message and makes a request to a surrogate overlay, the surrogate overlay sending information about a surrogate having corresponding content to the peer, and (D) the peer requesting content from the surrogate having sent the peer list or from a surrogate included in the information about a surrogate, and receiving the corresponding content. | 07-26-2012 |
20130086616 | MOBILE-CONTROLLED LIVE STREAMING SERVICE TRANSFER METHOD ON HOME NETWORK - This invention relates to a mobile-controlled live streaming service transfer on home network enables a user to receive live streaming services using a desired home terminal without delay time for live streaming by relaying live streaming services toward a mobile terminal, without agreement between network providers and request for signaling processing with service sources, when a mobile terminal with multiple interfaces moves to home network that belongs to domains owned by a different network provider while using live streaming services through domains owned by a single network provider and when move the currently provided live streaming services to a different home terminal. | 04-04-2013 |
20130089018 | MOBILITY MANAGEMENT SYSTEM AND METHOD FOR DISTRIBUTED MOBILITY MANAGEMENT NETWORK - The present invention relates to a mobility management system and method for distributed mobility management network providing initial connection and handoff processes of mobile nodes to support IP multicast, and a method of selecting agents and networks to receive multicast data by anchor agents in the distributed mobility management network, comprising: a mobile node receiving network access services by conducting wireless communications in the distributed mobility management network through the wireless transmitter-receiver as a device consists of a wireless transmitter-receiver, an antenna and a control unit; a mobility management anchor agent supporting the mobility of the above mobile node, and taking the role of anchor each time the mobile node moves; a mobility management information server receiving information on agent or network transmitting multicast channel and data currently received from the above mobility management anchor agent, and then registering and updating the information. | 04-11-2013 |
20130278206 | METHOD AND SYSTEM FOR MULTI WIRELESS CHARGING - A wireless multi charging method and system are disclosed. The wireless charging method selects a portion of mobile devices located in a charging region as a group, and provides energy for wireless charging to the selected group of mobile devices. Accordingly, group charging is possible, and thus it is also possible to selectively charge mobile devices which allow charging. | 10-24-2013 |
20130337797 | TRACKING AREA MANAGEMENT - The disclosure is related tracking area management in a femtocell network. A mobility management entity may receive, from a femtocell base station, macrocell tracking area information associated with the femtocell base station. The mobility management entity may combine the received macrocell tracking area information with femtocell tracking area information associated with the femtocell base station and storing the combined tracking area information as integrated tracking area information. | 12-19-2013 |
20140118061 | DEMODULATION APPARATUS AND METHOD FOR OPERATING THE SAME - A demodulation apparatus comprises: an envelope detecting unit configured to receive a signal from the outside and detect an envelope signal from the received signal; a reference voltage generating unit configured to generate a reference voltage on the basis of the detected envelope signal; a comparator configured to output a pulse signal on the basis of the envelope signal detected by the envelope detecting unit and the reference voltage generated by the reference voltage generating unit; and an input signal adjusting unit connected with an envelope signal input terminal of the comparator to selectively adjust a magnitude of the envelope signal input to the comparator. | 05-01-2014 |
20140122600 | CONFERENCE SERVER IN A SYSTEM FOR PROVIDING A CONFERENCE SERVICE IN RTCWEB - Disclosed is a conference server included in a system for providing a conference service in RTCWeb, where the system includes a first terminal that operates as a moderator of the conference service and a second terminal that operates as a participant of the conference service. The conference server includes a focus that performs communication between the first terminal and the second terminal; the first terminal includes a conference control server/client that controls a generating of the conference, an adding/removing of the second terminal to/from the conference service, and a changing of a moderator, and manages information of the second terminal; and the second terminal includes a conference control client that acquires information of the conference service and controls a participation/departure in/from the conference service. The focus of the conference server communicates with the conference control server/client of the first terminal to resolve a request of the second terminal. | 05-01-2014 |
20140153386 | NODE AND METHOD FOR TRANSMITTING PACKETS THEREFROM - Disclosed are a node and a method of transmitting packets from the node. The disclosed node may use a directional antenna for transmitting a packet. The node includes a determining unit and a forwarding unit. The determining unit may determine whether or not there is an actor node present in a region traversed by a packet forwarding direction, where the packet forwarding direction is determined from relative-location information of a destination node with respect to a source node, the region is one of a plurality of regions divided by particular angles, and the plurality of regions have multiple beam patterns of the node formed therein. The forwarding unit may transmit the packet to an actor node present in the region traversed by the packet forwarding direction or transmit the packet to a neighbor node present in the region traversed by the packet forwarding direction. | 06-05-2014 |
20140179377 | MOBILE ELECTRONIC DEVICE HAVING PROGRAM NOTIFICATION FUNCTION AND PROGRAM NOTIFICATION METHOD THEREOF - A mobile terminal to provide an interface for user notification includes a memory to store an application, the application providing a notification request in response to an event, a controller to receive the notification request and, in response to the notification request, to process notification information based on a user-configured notification policy, and an output device to output the processed notification information associated with the application. | 06-26-2014 |
20140378133 | METHOD AND SYSTEM FOR PROVIDING FLOW MOBILITY IN A DISTRIBUTED MOBILITY MANAGEMENT NETWORK - A method and system for providing flow mobility in a distributed mobility management network are disclosed. The method of controlling data flow mobility can include: (a) receiving session information in correspondence to a connection to each mobile access router from said mobile access router and storing the session information, which may include terminal information, an allotted address, and data flow information; (b) determining a target data flow to be moved by analyzing the session information according to a flow movement policy; and (c) transmitting a flow movement request, which includes the allotted address corresponding to the determined target data flow, to a new mobile access router. | 12-25-2014 |
20140379877 | CIRCLE-MESH OVERLAY NETWORK CONSTRUCTION AND MAINTAIN METHOD - A method of constructing and maintaining a circle-mesh overlay network is disclosed. The method of constructing a circle-mesh overlay network includes: (a) determining a reference member number of a circle overlay by using a total number of participating peers; (b) creating a new circle overlay and adding member peers from among the participating peers to the new circle overlay in consideration of the reference member number; and (c) forming a circle-mesh overlay network by way of interconnection between the new circle overlay and a different circle overlay. | 12-25-2014 |
20150288388 | METHOD AND SYSTEM FOR SUPPORTING MOBILITY OF A MOBILE TERMINAL IN A SOFTWARE-DEFINED NETWORK - A method and system for supporting the mobility of a mobile terminal in a software-defined network are disclosed. A method for supporting the mobility of a mobile terminal in a software-defined network according to an embodiment of the invention can include: routing a data packet of the mobile terminal to an authority switch serving as an anchor within a first partition, said routing performed by a switch by referencing a flow table; and setting a data path to an authority switch of a second partition, which is the partition containing the destination of the data packet, based on a rule provided by a controller and transmitting the data packet to a destination, said setting and transmitting performed by the authority switch of the first partition. | 10-08-2015 |
20160100340 | METHOD AND DEVICE FOR SUPPORTING MOBILITY OF MOBILE TERMINAL IN DISTRIBUTED MOBILE NETWORK BASED ON A SOFTWARE-DEFINED NETWORK - A method and a system for supporting mobility of a mobile terminal in a distributed mobile network based on a SDN are disclosed. A method of supporting a fast handover of a mobile terminal in a node-B (eNB) includes the steps of: receiving a handover initiation message from the mobile terminal, the handover initiation message including identification information and signal strength of a target eNB; determining whether or not for a fast handover trigger using the signal strength of the target eNB and movement history of the mobile terminal previously stored; and when it is determined as the fast handover trigger, transmitting a handover request message and a rule for the handover to the target eNB by using the identification information of the target eNB. | 04-07-2016 |