Patent application number | Description | Published |
20100138399 | METHOD FOR DATA ENCRYPTION AND METHOD FOR DATA SEARCH USING CONJUNCTIVE KEYWORD - The present invention relates to a method for data encryption and a method for data search using a conjunctive keyword and more particularly to, a method for searching data stored in a server by using a conjunctive keyword after storing an index table for the conjunctive keyword and encrypted data in the server. According to an embodiment of the present invention, since keywords and relevant data do not need to be searched one by one by performing a conjunctive keyword search by using a linked tree structure modifying a linked list, it is possible to perform a rapid and efficient conjunctive keyword search. | 06-03-2010 |
20100140361 | RFID TAG - Provided is an RFID tag. When no external pressure is applied to a packaging structure, a wire for transmitting power and data from an antenna is separated from an RFID chip by an air layer. When external pressure is applied to the packaging structure, the wire is connected to the RFID chip to transmit the power and data between the antenna and the RFID chip. | 06-10-2010 |
20100142708 | APPARATUS AND METHOD FOR GENERATING SECRET KEY - An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving the unique item identifier of the article encrypted by using the secret key from the RFID tag. By this configuration, it is possible to protect user's personal privacy of the mobile RFID terminal in a state where user's intervention is minimized. | 06-10-2010 |
20100146273 | METHOD FOR PASSIVE RFID SECURITY ACCORDING TO SECURITY MODE - Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode. | 06-10-2010 |
20110004765 | LICENSE MANAGING METHOD AND DEVICE - A license managing device sets a security area for storing a license file, maintains the security area as an encoded file in an inactive state of the security area by encoding the security area, maintains the security area as a directory in an active state of the security area by decoding the security area, and encodes a license file by using a file encoding key according to the user's request and stores the same in a security area in an active state of the security area. | 01-06-2011 |
20130117855 | APPARATUS FOR AUTOMATICALLY INSPECTING SECURITY OF APPLICATIONS AND METHOD THEREOF - An apparatus automatically inspects security of mobile applications. The apparatus includes a static analyzer to perform a static analysis by reversing an execution file of the mobile application, and an automatic execution processor to generate an automatic execution script used to automatically execute the execution file and execute the automatic execution script automatically to generate a log. The apparatus further includes a dynamic analyzer to analyze whether a pattern of malicious codes was executed in the execution file using the result of the static analysis and the log resulted from the automatic execution. | 05-09-2013 |
20130124535 | APPARATUS AND METHOD FOR CALCULATING INTIMACY - An apparatus calculates an intimacy. The apparatus includes an information extraction unit to extract one of more communication logs to communicate with contact numbers in contact number information in a mobile terminal and a weight setting unit to set a weight on each communication log and each contact number. The apparatus further includes a time importance setting unit to set time importance in each communication log on the basis of service execution time of each communication log and an intimacy calculating unit to calculate an intimacy in each communication log on the basis of the time importance and the contact number with the weight, and calculate an intimacy between a user of the mobile terminal and each dialogist corresponding to the contact number using the intimacy in each communication log. | 05-16-2013 |
Patent application number | Description | Published |
20090113213 | SYSTEM AND METHOD FOR SEARCHING ENCRYPTED NUMERICAL DATA - A system for searching encrypted numerical data according to an embodiment of the present invention includes: a key generator that generates a key for encryption; an index generator that generates an index for documents from a plurality of documents including numerical data and the generated key, on the basis of individual digits of the numerical data and the positions of the digits; a trapdoor generator that generates a trapdoor including search information on the individual digits of the numerical data and the positions of the digits, using the generated key; and a document searching unit that receives numerical data for search, searches the index using the trapdoor, and outputs document information including the numerical data for search. | 04-30-2009 |
20090138698 | METHOD OF SEARCHING ENCRYPTED DATA USING INNER PRODUCT OPERATION AND TERMINAL AND SERVER THEREFOR - The present invention relates to a method of searching data for a plurality of keywords when a user encrypts the data and stores the encrypted data in an unsecured server. The user transmits the inner product value of a search keyword set to a sever, and the server compares the received inner product value to an inner product value of a stored index set. When a document for which the two inner product values are matched with each other, the server returns the document. | 05-28-2009 |
20100153403 | METHOD FOR DATA ENCRYPTION AND METHOD FOR CONJUNCTIVE KEYWORD SEARCH OF ENCRYPTED DATA - A server provides the user's desired data without the server knowing the contents or keywords of data by using a method of searching the desired data without decrypting the encrypted data, such that the privacy for the important data of the user can be secured. Also, the present invention shortens the operation time when searching the encrypted data, such that it can prevent the degradation in efficiency due to excess operation involved in the previous existing methods based on the pairing operation. | 06-17-2010 |