Patent application number | Description | Published |
20100138929 | CONDITIONALLY TRACEABLE ANONYMOUS SERVICE SYSTEM - Conditionally traceable anonymous service system is provided. The system respectively separates subject conforming real name, subject conforming anonymity, subject requesting verification for an anonymity certification means, so that privacy of a user is hardly violated, the present invention can acquire real name information for the user only when a trace for a user is surely requested. | 06-03-2010 |
20110004765 | LICENSE MANAGING METHOD AND DEVICE - A license managing device sets a security area for storing a license file, maintains the security area as an encoded file in an inactive state of the security area by encoding the security area, maintains the security area as a directory in an active state of the security area by decoding the security area, and encodes a license file by using a file encoding key according to the user's request and stores the same in a security area in an active state of the security area. | 01-06-2011 |
20110072159 | USER TERMINAL SYSTEM, DIGITAL RIGHTS MANAGEMENT SYSTEM INCLUDING THE USER TERMINAL SYSTEM, AND METHOD OF MANAGING DIGITAL RIGHTS - Provided is a digital rights management system, in which a process of combining digital content created by the original author with first metadata indicated with rights information of the original author and a process of combining revised digital content with second metadata indicated with rights information of a secondary author, are respectively and separately performed at the server and terminal sides. Thus, the digital rights management system can reduce the load generated at the server side compared to a system in which the server side performs both of the above processes. | 03-24-2011 |
20110154045 | ANONYMOUS AUTHENTICATION SERVICE METHOD FOR PROVIDING LOCAL LINKABILITY - There is provided an anonymous service method of providing local linkability. The anonymous service method providing local linkability according to exemplary embodiments of the invention, an anonymous authentication operation based on a short group signature is performed, for which the concept of a local linkability is introduced to secure linkability within the same service domain. Namely, in the interior of a service provider, a virtual index having a fixed value is calculated for each service user, and in this case, although a plurality of service providers collude with each other, they cannot calculate a virtual index having the same value, whereby the linkability can be secured within the same service domain but not within the interiors of different service domains. | 06-23-2011 |
20120084567 | GROUP SIGNATURE SYSTEM AND METHOD PROVIDING CONTROLLABLE LINKABILITY - A group signature system includes: a key issuer server for generating a first parameter of a group public key, generating a corresponding master issuing key, and issuing a signature key to a user when a user device joins; an opener server for generating a second parameter of the group public key, and a corresponding master opening key and master linking key; and a linker server for checking whether two valid signatures have been linked by using the master linking key when the two signatures corresponding to a group public key are given. The group signature system further includes: a signature verifying unit for confirming a validity of the given signatures and a signer information confirming unit for confirming a validity of singer confirming information generated by the opener server. | 04-05-2012 |
20120099726 | CONTENT PROTECTION APPARATUS AND METHOD USING BINDING OF ADDITIONAL INFORMATION TO ENCRYPTION KEY - The present invention relates to a content protection apparatus and method using binding of additional information to an encryption key. The content protection apparatus includes an encryption unit for creating an encryption key required to encrypt data requested by a user terminal and then generating encrypted data in which the data is encrypted. An additional information management unit manages additional information including authority information about the encrypted data. A White-Box Cryptography (WBC) processing unit generates a WBC table required to bind the encryption key corresponding to the encrypted data to the additional information. A bound data generation unit generates bound data in which the encrypted key is bound to the additional information, using a cipher included in the WBC table. | 04-26-2012 |
20120159166 | METHOD OF VERIFYING KEY VALIDITY AND SERVER FOR PERFORMING THE SAME - Disclosed herein is a method of verifying key validity and a server for performing the method. The method is configured such that a service provision server verifies key validity in an anonymous service for providing local linkability. The service provision server receives a revocation list. A local revocation list is generated using the received revocation list and a secret key. A virtual index of a service user required to verify key validity is calculated. Whether a key of the service user is valid is verified, based on whether the virtual index is included in the local revocation list. | 06-21-2012 |
20120163582 | DATA ENCODING AND DECODING APPARATUS AND METHOD THEREOF FOR VERIFYING DATA INTEGRITY - A data encoding apparatus for verifying data integrity by using a white box cipher includes: an encoding unit for encoding content by using a white box cipher table; and an arithmetic logic unit for performing an arithmetic logic operation on the white box cipher table and content information to output an encoded white box cipher table. The arithmetic logic operation is an exclusive OR operation. The content information is license information of the content or hash value of the license information of the content. | 06-28-2012 |
20120163654 | METHOD AND SYSTEM FOR TRACKING ILLEGAL DISTRIBUTOR AND PREVENTING ILLEGAL CONTENT DISTRIBUTION - A system for tracking an illegal distributor and preventing an illegal content distribution includes: a forensic mark generator for receiving content and a content identification code from a content providing apparatus to generate a forensic mark; a forensic mark database for storing the generated forensic mark; a forensic mark insertion unit for inserting the forensic mark into the content; and a content database for storing the content into which the forensic mark has been inserted. The system further includes a content transmitter for transmitting the content into which the forensic mark has been inserted to the content utilization apparatus. | 06-28-2012 |
20120166309 | AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD USING BARCODES - Disclosed is an authentication method using barcodes. the authentication method includes: converting into a first barcode and outputting, by a first user device, authentication related information provided from a service providing server; receiving, by a second user device, the first barcode; generating, by the second user device, signature information or authentication information on the authentication related information by using a signature key or a certificate; and providing, by the second user device, the signature information or the authentication information to the service providing server. | 06-28-2012 |
20120170740 | CONTENT PROTECTION APPARATUS AND CONTENT ENCRYPTION AND DECRYPTION APPARATUS USING WHITE-BOX ENCRYPTION TABLE - A content protection apparatus using a white-box encryption table includes: a random number generation unit for generating a random number; a white-box encryption table for encrypting the random number and user information provided from a user to generate an encrypted output value; and an operation unit for performing an operation between the encrypted output value and data inputted from an outside to encrypt or decrypt the data. | 07-05-2012 |
20130117855 | APPARATUS FOR AUTOMATICALLY INSPECTING SECURITY OF APPLICATIONS AND METHOD THEREOF - An apparatus automatically inspects security of mobile applications. The apparatus includes a static analyzer to perform a static analysis by reversing an execution file of the mobile application, and an automatic execution processor to generate an automatic execution script used to automatically execute the execution file and execute the automatic execution script automatically to generate a log. The apparatus further includes a dynamic analyzer to analyze whether a pattern of malicious codes was executed in the execution file using the result of the static analysis and the log resulted from the automatic execution. | 05-09-2013 |
20140082728 | DONGLE DEVICE FOR WIRELESS INTRUSION PREVENTION - Disclosed is a dongle device for wireless intrusion prevention, which can provide a wireless intrusion prevention service to a wireless access point in a wireless local area communication network. A dongle device for wireless intrusion prevention including an interface unit connected to an access point and configured to receive a data frame from the access point, a control unit configured to determine a security threat on the basis of the received data frame and generate prevention information if there is the security threat according to the determination result, and a storage unit configured to store information for security threat determination can make an existing wireless access point a wireless access point that can provide wireless intrusion prevention. | 03-20-2014 |
20140130155 | METHOD FOR TRACKING OUT ATTACK DEVICE DRIVING SOFT ROGUE ACCESS POINT AND APPARATUS PERFORMING THE METHOD - A method including: detecting an unauthorized soft rogue AP; collecting information about the detected soft rogue AP, information about one or more access terminals connected to the detected soft rogue AP, and information about one or more candidate attack terminals that are not connected to the detected soft rogue AP, and storing the collected information; | 05-08-2014 |
20140150049 | METHOD AND APPARATUS FOR CONTROLLING MANAGEMENT OF MOBILE DEVICE USING SECURITY EVENT - A method controls the management of a mobile device using a security event. The method includes acquiring, by a wireless intrusion prevention server, security threat information by monitoring RF signals generated from an access point (AP) and the mobile device, transmitting the security threat information to a mobile device management server, and executing, by the mobile device management server, a device management policy for the mobile device based on the security threat information. | 05-29-2014 |
20140245441 | APPARATUS FOR ANALYZING VULNERABILITY OF WIRELESS LOCAL AREA NETWORK - Disclosed herein is an apparatus for analyzing the vulnerability of a wireless local area network (LAN). The apparatus includes a collection unit, an analysis unit, and an attack unit. The collection unit collects packets transmitted and received in a wireless LAN service. The analysis unit analyzes the state of a network using the collected packets. The attack unit makes a wireless attack against an attack target using the state of the network, and controls the mode switching of a device driver based on an operating mode. | 08-28-2014 |