Abstract:
Disclosed herein are a system and a method for inspecting harmful information of a mobile device capable of temporarily stopping an automatic access to a web site using access information for accessing a web site when the access information is obtained from various paths through a mobile device, requesting an inspecting server to inspect whether or not the corresponding web site includes harmful information, and receiving and displaying an inspection result in response to the request.
Abstract:
Disclosed herein are a method and apparatus for converting a credential data schema. The method for converting a credential data schema includes checking credential data in response to a credential data schema conversion request statement received from a requester terminal, and checking a decentralized identifier of a credential issuer based on the credential data, retrieve a decentralized identifier document through a decentralized identifier resolver, verifying a credential to be converted based on the decentralized identifier document, when verification of the credential is completed, generating a credential data schema identifier for the credential, retrieving a credential data conversion schema corresponding to the credential data schema conversion request statement based on the credential data schema identifier, converting the credential data schema based on the credential data conversion schema and generating a credential data schema conversion result, and checking identity information of the credential issuer through an issuer identity information registry.
Abstract:
Disclosed herein are an apparatus and method for issuing delegated credentials between digital wallets possessed by multiple users connected to a Decentralized Identifier (DID) registry through wired/wireless communication. The method includes receiving, by a digital wallet of a first user, a delegated credential issuance request message including a newly created DID document from a digital wallet of a second user, generating, by the digital wallet of the first user, a delegated credential using both the delegated credential issuance request message, received from the digital wallet of the second user, and an original credential, previously issued by the digital wallet of the first user, and transmitting, by the digital wallet of the first user, the generated delegated credential and the original credential, together with a delegated credential registration request message, to the digital wallet of the second user.
Abstract:
Disclosed herein are an apparatus and method for recommending privacy control. A privacy control server includes multiple common privacy control recommendation models learned based on personal information provision histories of multiple users, a user preference determination unit for generating at least one question item based on the multiple common privacy control recommendation models and determining a privacy control preference of a user based on a result of a user answer to the at least one question item, and a common privacy control recommendation model provision unit for providing a common privacy control recommendation model selected to match the privacy control preference of the user to the user.
Abstract:
A transaction information managing system including a plurality of servers and at least one third-party server, wherein the plurality of servers are configured to create, when transactions using the budget of the public organization occurs, a block based on transaction information of the transactions, add the block to the block chain, and share the block chain and the at least one third-party server is configured to perform a mathematical operation to enhance the reliability of the block chain, and a method for managing the transaction information are provided.
Abstract:
A method and an apparatus for fingerprint recognition are disclosed. The apparatus for the fingerprint recognition may extract a plurality of fingerprint feature points from a fingerprint image and may predetermine a group among the plurality of fingerprint feature points. The apparatus for the fingerprint recognition may also calculate a ridge number between the first fingerprint feature points included in the group and may use the ridge number to generate a ridge count sequence.
Abstract:
A face recognition based key generation apparatus controls a key generation model that is formed of a CNN and an RNN to be learned to generate a desired key having a consistent value by using sample facial images of a key owner and a PIN of the key owner as inputs, and the key generation model receives a facial image of the key owner and the PIN of the key owner, as inputs at a desired key generation time, and generates a key.
Abstract:
Provided are management and use of an authentication medium, and specifically, to an apparatus and method for registering and using an IC card as an authentication medium in a user terminal. An apparatus for using the IC card as the authentication medium includes an ID extracting module configured to extract identification information from the IC card that performs near field communication with a user terminal; an ID checking module configured to determine whether the extracted identification information matches identification information of the IC card that is previously registered as an authentication medium; and a security service module configured to provide a security service interface for a security service provided by the determined IC card.
Abstract:
Disclosed herein are an apparatus and method for providing an anonymous delegated credential in a DID-based service. A method for issuing an anonymous delegated credential in a DID-based service includes receiving an anonymous delegated credential issuance request message from a digital wallet of a delegate, setting attribute values in the anonymous delegated credential, anonymizing delegator identification information and delegatee identification information among the attribute values, and issuing the generated anonymous delegated credential to the digital wallet of the delegatee.
Abstract:
Disclosed herein are an apparatus and method for managing a history of object owners. The method includes generating, by an object owner history management apparatus, a product registration Verifiable Credential (VC) in a form of a Merkle tree, and registering the product registration VC in a blockchain in order to manage a history of owners of an object, acquiring, by a first user terminal device, the product registration VC from the blockchain and registering a first owner VC, generated based on the product registration VC, in the blockchain to register an ownership of the object, and acquiring, by a second user terminal device, a product transfer Verifiable Presentation (VP) from the first user terminal device and registering a second owner VC, generated based on the product transfer VP, in the blockchain to receive transfer of the ownership of the object.