Patent application number | Description | Published |
20090249078 | OPEN ID AUTHENTICATION METHOD USING IDENTITY SELECTOR - Provided is an Open ID authentication method using an identity selector, which can simplify the authentication of an open ID and reduce phishing and hacking risks by automatically performing an open ID-based login process without the need to manually input an open ID uniform resource locator (URL) to a login window. | 10-01-2009 |
20100310078 | SYSTEM FOR USER-CENTRIC IDENTITY MANAGEMENT AND METHOD THEREOF - A user terminal for a user-centric identity management system includes: a browser that requests a service to the service provider server and receives a service parameter in which a plurality of selectable protocol parameters corresponding to the service are recorded from the service provider server; an interaction unit that selects any one protocol parameter among the plurality of protocol parameters by receiving the service parameter through the browser; and a service processing unit that performs a service protocol with the service provider server on the basis of the protocol parameter selected through the interaction unit, and receives token information required to receive the service from the service provider server and transfers the token information to the browser. | 12-09-2010 |
20110119744 | PSEUDONYMOUS IDENTIFICATION MANAGEMENT APPARATUS, PSEUDONYMOUS IDENTIFICATION MANAGEMENT METHOD, PSEUDONYMOUS IDENTIFICATION MANAGEMENT SYSTEM AND SERVICE ADMISSION METHOD USING SAME SYSTEM - A pseudonymous ID (identification) management apparatus includes a token processing unit for validating an authentication token; a pseudonymous ID generation unit for issuing a pseudonymous ID corresponding to the authentication token; a temporary ID generation unit for issuing a temporary ID for use in an offline subscription; and an ID validation unit for validating a pseudonymous ID received from a web service apparatus along with a pseudonymous ID validation request and transmitting pseudonymous ID validation result to the web service apparatus, and validating a temporary ID received from the web service apparatus along with a pseudonymous ID exchange request and transmitting a pseudonymous ID corresponding to the temporary ID to the web service apparatus. The web service apparatus provides a service to which a user desires to subscribe. | 05-19-2011 |
20110126010 | SERVER, SYSTEM AND METHOD FOR MANAGING IDENTITY - Disclosed herein is a system and method for managing identity. The system includes a mobile terminal, a web server, and a service terminal. The mobile terminal includes a smart card on which a management server for managing user identity is mounted. The web server generates the user identity and provides the generated identity to the management server over a wired/wireless network. The service terminal receives a required identity from the mobile terminal using Near Field Communication (NFC). | 05-26-2011 |
20110129089 | METHOD AND APPARATUS FOR PARTIALLY ENCODING/DECODING DATA FOR COMMITMENT SERVICE AND METHOD OF USING ENCODED DATA - Disclosed herein is a method and apparatus for partially encoding/decoding data for a commitment service and a method of using encoded data. The apparatus includes an encoding/decoding module for encoding/decoding a database to be committed to a server using a private key of the user, obtained by accessing a key storage unit through a key management module which manages information about the private key of the user, stored in the key storage unit, and also encoding/decoding an SQL query required to use a DB committed to the server. The encoding/decoding module partially encodes/decodes one or more of table names, field names, and attribute values of the DB. In the present invention, the table names, field names, and field attribute values of the DB are partially encoded while the existing structure of the DB is maintained, and the partially encoded DB is committed to the server. | 06-02-2011 |
20110150224 | KEY TREE CONSTRUCTION AND KEY DISTRIBUTION METHOD FOR HIERARCHICAL ROLE-BASED ACCESS CONTROL - A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role groups and data; performing encryption and decryption of data keys and role keys; and generating a key table, in which the data keys required to decrypt encrypted data and the role keys required to decrypt encrypted data keys are stored, with reference to the key tree. Further, the key tree construction and key distribution method for hierarchical role-based access control includes performing management such that a specific role group can obtain a data key by performing decryption based on its own role key by using both the key tree and the key table. | 06-23-2011 |
20110153800 | IDENTITY SHARING METHOD AND APPARATUS IN MOBILE COMPUTING ENVIRONMENT - An identity protocol gate way according to the exemplary embodiments of the present invention includes an artifact generating and inquiring module generating an artifact by receiving a sharing request message from a mobile identity wallet according to a request made by an application program of a mobile device, inquiring corresponding identity information according to a request of the identity information including the artifact from a web server and transferring the inquired identity information to the web server; and a protocol converting module converting the sharing request message into a protocol message of a wired environment by receiving the sharing request message from the mobile identity wallet, transferring the protocol message to the identity web server, transferring sharing response information and the artifact to the application program of the mobile device by using a mobile protocol in response to the sharing response information from the identity web server. | 06-23-2011 |
20130144721 | INDIVIDUALIZATION SERVICE PROVIDING SYSTEM, SERVER, TERMINAL USING USER'S FEED BACK AND PRIVACY BASED ON USER AND METHOD THEREOF - An individualization service providing system based on a user includes an individualization service client configured to be mounted in a user terminal to collect user's individualization information, generate a user profile by anonymizing the individual information according to a privacy policy, and transmit the generated user profile through a communication network, along with an individualization service request message. Further, the individualization service providing system includes an individualization service server configured to recommend individualization services corresponding to the user profile and provide the recommended individualization services to the individualization service client, at the time of receiving the individualization service request services. | 06-06-2013 |
20130159179 | MOBILE DEVICE FOR PROCESSING APPLICATION OF CLIENT DEVICE AND METHOD FOR PROCESSING APPLICATION OF CLIENT DEVICE USING THE SAME - A mobile device for processing an application of a client device includes an application information acquisition unit configured to, when a client device receives an image signal or an audio signal converted from an application information including one or more of electronic signature requirement, payment requirement, or user authentication requirement from a web service device and plays the received image signal or the audio signal, acquire the played image signal or the audio signal. Further, the mobile device includes an e-wallet application unit configured to convert the acquired image signal or the audio signal into the application information, execute and process one or more application of electronic signature, payment, or user authentication according to the application information, and then provide the result of processing the application to the web service device. | 06-20-2013 |
20130254051 | APPARATUS FOR ISSUING RECEIPTS AND USER TERMINAL USING THE RECEIPTS - There are disclosed a receipt issuing apparatus, a user terminal, a receipt issue system, and a method using smart receipts. The receipt issuing apparatus can include an issue unit configured to receive settlement information, configure a smart receipt based on the settlement information, and issue the configured smart receipt and a receipt transmission unit configured to send the issued smart receipt to a user terminal using short range wireless communication, wherein the smart receipt comprises at least one of information on a place of business, the settlement information, information on a transaction article, discount information, and an image of user signing. | 09-26-2013 |
20140025946 | AUDIO-SECURITY STORAGE APPARATUS AND METHOD FOR MANAGING CERTIFICATE USING THE SAME - An audio-security storage apparatus includes an audio connector for connecting with to an audio jack equipped in an external apparatus, and a audio-security storage module for transmitting information on certificates to the external apparatus or receiving information on certificates from the external apparatus for the storage thereof. | 01-23-2014 |
20140130162 | PHISHING PREVENTING SYSTEM AND OPERATING METHOD THEREOF - A phishing preventing system includes: a user computer outputting, at the time of accessing a predetermined website, a request signal for verifying whether the website is authenticated; a web server generating link information on the website at the time of inputting user information on the user computer and the request signal at the time of accessing the website and outputting the link information to the user computer; and a user terminal verifying whether the website is authenticated by comparing the link information with set normal authentication information by receiving the user information corresponding to the link information from the web server at the time of inputting terminal link information corresponding to the link information from the user computer. | 05-08-2014 |
20140213243 | SERVICE EQUIPMENT CONTROL METHOD AND USER EQUIPMENT FOR PERFORMING THE SAME - Disclosed is a service equipment control method for easily controlling a plurality of pieces of service equipment with one application. The service equipment control method includes requesting control interface information, used for controlling control target service equipment, from the control target service equipment, receiving the control interface information from the control target service equipment in response to the request, and outputting the received control interface information to a user. Accordingly, it is not necessary to install a home gateway, and a plurality of pieces of control target service equipment can be controlled using one application without needing to install an application for individual service equipment for controlling the service equipment. | 07-31-2014 |
20140344339 | SYSTEM FOR PROVIDING PERSONAL INFORMATION USING CLOUD ID CARD AND METHOD THEREOF - Disclosed are a system and a method for providing personal information using a cloud ID card. A system for providing personal information in accordance with the present invention includes: a cloud ID server configured to store user's personal information and cloud ID information for using the user's personal information; a cloud ID card configured to store the cloud ID information provided from the cloud ID server; and a service terminal configured to obtain the cloud ID information from the cloud ID card and to be provided with the user's personal information from the cloud ID server by use of the obtained cloud ID information. When the cloud ID information is provided from the service terminal, the cloud ID server confirms consent to use of the personal information from a user terminal corresponding to the provided cloud ID information and provides the confirmed personal information to the service terminal. | 11-20-2014 |
20140351902 | APPARATUS FOR VERIFYING WEB SITE AND METHOD THEREFOR - Disclosed are an apparatus and a method for verifying a web site by using a mobile terminal. A method, performed in a server verifying a web site, comprises receiving a message requesting verification on truth or falsehood of a web site which an access terminal accesses from the access terminal; processing the web site based on an Uniform Resource Location (URL) of the web site according to the message; generating verification information for verifying truth of falsehood of the web site based on the URL of the web site, and transmitting the verification information to a mobile terminal; and receiving verification result information on the web site which is generated in the mobile terminal based on an image of the web site and the verification information, and transmitting the verification result information to the access terminal. | 11-27-2014 |
20140351933 | SYSTEM AND METHOD FOR INSPECTING HARMFUL INFORMATION OF MOBILE DEVICE - Disclosed herein are a system and a method for inspecting harmful information of a mobile device capable of temporarily stopping an automatic access to a web site using access information for accessing a web site when the access information is obtained from various paths through a mobile device, requesting an inspecting server to inspect whether or not the corresponding web site includes harmful information, and receiving and displaying an inspection result in response to the request. | 11-27-2014 |