Abstract:
Disclosed are a system and a method for providing personal information using a cloud ID card. A system for providing personal information in accordance with the present invention includes: a cloud ID server configured to store user's personal information and cloud ID information for using the user's personal information; a cloud ID card configured to store the cloud ID information provided from the cloud ID server; and a service terminal configured to obtain the cloud ID information from the cloud ID card and to be provided with the user's personal information from the cloud ID server by use of the obtained cloud ID information. When the cloud ID information is provided from the service terminal, the cloud ID server confirms consent to use of the personal information from a user terminal corresponding to the provided cloud ID information and provides the confirmed personal information to the service terminal.
Abstract:
Disclosed herein are a method and apparatus for converting a credential data schema. The method for converting a credential data schema includes checking credential data in response to a credential data schema conversion request statement received from a requester terminal, and checking a decentralized identifier of a credential issuer based on the credential data, retrieve a decentralized identifier document through a decentralized identifier resolver, verifying a credential to be converted based on the decentralized identifier document, when verification of the credential is completed, generating a credential data schema identifier for the credential, retrieving a credential data conversion schema corresponding to the credential data schema conversion request statement based on the credential data schema identifier, converting the credential data schema based on the credential data conversion schema and generating a credential data schema conversion result, and checking identity information of the credential issuer through an issuer identity information registry.
Abstract:
Disclosed herein are an apparatus and method for issuing delegated credentials between digital wallets possessed by multiple users connected to a Decentralized Identifier (DID) registry through wired/wireless communication. The method includes receiving, by a digital wallet of a first user, a delegated credential issuance request message including a newly created DID document from a digital wallet of a second user, generating, by the digital wallet of the first user, a delegated credential using both the delegated credential issuance request message, received from the digital wallet of the second user, and an original credential, previously issued by the digital wallet of the first user, and transmitting, by the digital wallet of the first user, the generated delegated credential and the original credential, together with a delegated credential registration request message, to the digital wallet of the second user.
Abstract:
Provided are management and use of an authentication medium, and specifically, to an apparatus and method for registering and using an IC card as an authentication medium in a user terminal. An apparatus for using the IC card as the authentication medium includes an ID extracting module configured to extract identification information from the IC card that performs near field communication with a user terminal; an ID checking module configured to determine whether the extracted identification information matches identification information of the IC card that is previously registered as an authentication medium; and a security service module configured to provide a security service interface for a security service provided by the determined IC card.
Abstract:
Disclosed herein are an apparatus and method for managing personal information. The method includes a step in which a user terminal device registers the decentralized identification information of a user in a blockchain, receives the personal information of the user, stores the same in an endpoint for managing the personal information, and registers a personal information access policy for the personal information in a first server; a step in which the apparatus receives the decentralized identifier of the user, retrieves the decentralized identification information of the user, corresponding to the decentralized identifier, from the blockchain, and requests a personal information access token for accessing the personal information from the first server using the decentralized identification information; and a step in which the apparatus identifies the endpoint from the personal information access token, which is generated based on the personal information access policy, and retrieves the personal information from the endpoint.
Abstract:
Disclosed herein is a method of operating a data management apparatus. The method may include segmenting, by a client device, data into multiple data blocks, generating, by the client device, tags corresponding to the multiple data blocks, generating, by the client device, a representative value by accumulating the tags, generating, by the client device, a client signature value by signing the representative value and a counter value corresponding to the last updated data block, among the multiple data blocks, and transmitting, by the client device, the data and the client signature value to a server.
Abstract:
Disclosed are an apparatus and method for providing a digital signature. The apparatus includes a certificate unit, an input unit receives a selection input for a certificate related to signature content received from a signature-requesting terminal, and a control unit for determining whether the certificate unit is capable of performing a digital signature function corresponding to a selected certificate. If the certificate unit is capable of performing the digital signature function, the certificate unit creates a digital signature based on a private key corresponding to the selected certificate when the control unit commands the certificate unit to create a digital signature. Further, if the certificate unit is not capable of performing the digital signature function, the control unit creates a digital signature based on a private key corresponding to a certificate selected from the certificate unit. The control unit transmits the digital signature to the signature-requesting terminal.
Abstract:
Disclosed herein are a system and a method for inspecting harmful information of a mobile device capable of temporarily stopping an automatic access to a web site using access information for accessing a web site when the access information is obtained from various paths through a mobile device, requesting an inspecting server to inspect whether or not the corresponding web site includes harmful information, and receiving and displaying an inspection result in response to the request.
Abstract:
Disclosed herein is a method for user-centered visitor access management, which may include issuing, by a management office server, a digital certificate to a householder terminal; registering, by a wall-pad, a householder in response to a request to register the householder based on the digital certificate; requesting, by the householder terminal, the management office server to register a visitor based on a visit request from a visitor terminal and delegating the digital certificate to the visitor terminal; making an entry request to a management terminal based on the digital certificate; verifying, by the wall-pad, the digital certificate based on a request for verification for entry from a wall-pad management terminal and providing a verification result to the wall-pad management terminal when the management terminal is the wall-pad management terminal; and managing and controlling, by the wall-pad, permission to use home devices based on delegated permission information of the digital certificate.
Abstract:
A method for secure distributed data management for dynamic data includes segmenting original data into multiple pieces, generating state information pertaining to row-based data configured with data blocks, and generating additional information for recovering the state information and the row-based data. The data blocks, corresponding to the segmented data, are stored in data servers, and each of the data servers stores data blocks selected at an interval corresponding to the number of data servers in order to store the segmented data.