Abstract:
Disclosed herein are a system and a method for inspecting harmful information of a mobile device capable of temporarily stopping an automatic access to a web site using access information for accessing a web site when the access information is obtained from various paths through a mobile device, requesting an inspecting server to inspect whether or not the corresponding web site includes harmful information, and receiving and displaying an inspection result in response to the request.
Abstract:
Disclosed herein are an apparatus and method for providing an anonymous delegated credential in a DID-based service. A method for issuing an anonymous delegated credential in a DID-based service includes receiving an anonymous delegated credential issuance request message from a digital wallet of a delegate, setting attribute values in the anonymous delegated credential, anonymizing delegator identification information and delegatee identification information among the attribute values, and issuing the generated anonymous delegated credential to the digital wallet of the delegatee.
Abstract:
Disclosed herein are an apparatus and method for managing a history of object owners. The method includes generating, by an object owner history management apparatus, a product registration Verifiable Credential (VC) in a form of a Merkle tree, and registering the product registration VC in a blockchain in order to manage a history of owners of an object, acquiring, by a first user terminal device, the product registration VC from the blockchain and registering a first owner VC, generated based on the product registration VC, in the blockchain to register an ownership of the object, and acquiring, by a second user terminal device, a product transfer Verifiable Presentation (VP) from the first user terminal device and registering a second owner VC, generated based on the product transfer VP, in the blockchain to receive transfer of the ownership of the object.
Abstract:
An anonymous credential authentication system receives an anonymous credential signature value indicating that setting proposition information using a credential is satisfied from a user device that has been issued the credential combined with multiple pieces of attribute information constituting personal information, generates signer authentication information that confirms a signer of the anonymous credential signature value using an opening key, and outputs the signer authentication information.
Abstract:
A method and an apparatus for fingerprint recognition are disclosed. The apparatus for the fingerprint recognition may extract a plurality of fingerprint feature points from a fingerprint image and may configure a group among the plurality of fingerprint feature points. The apparatus for the fingerprint recognition may also calculate a distance value between first fingerprint feature points included in the group and may use the distance value to generate a distance value sequence.
Abstract:
Disclosed herein is an apparatus for recommending privacy control, which includes a relevant information collection unit for collecting relevant information to be used to recommend privacy control in response to a request for personal information of a user from an application; a privacy control recommendation unit for selecting privacy control to be recommended, corresponding to the request for the personal information, from a privacy control pattern of the user using the relevant information; an interface unit for providing an interface that provides information about the request and the recommended privacy control to the user and receives a selection of privacy control from the user; and a privacy control processing unit for processing the personal information of the user depending on the selected privacy control and providing the processed personal information to the application.
Abstract:
Disclosed herein are an apparatus and method for authenticated key exchange using a password and an identity-based signature, by which robustness is provided in order to prevent a server impersonation attack when a password is exposed, and by which a client may be provided with convenient authentication using an ID and a password.
Abstract:
Disclosed herein are an apparatus and method for protecting privacy in which, in consideration of an application usage pattern, personal information is selectively provided depending on the purpose of use of the service of an application and on the privacy level, whereby a user may make better use of the service and the user's privacy may be effectively protected.
Abstract:
An authentication method including: transmitting, by a first terminal, a security cookie to a server and making an authentication request; transmitting, by the server, session information and the security cookie to a second terminal in response to the authentication request; verifying, by the second terminal, whether the security cookie has been encoded by a session key pre-stored in the second terminal; and performing, by the second terminal and the server, mutual authentication in the case in which the security cookie is encoded by the session key pre-stored in the second terminal is disclosed.
Abstract:
Disclosed herein are a method and apparatus for converting a credential data schema. The method for converting a credential data schema includes checking credential data in response to a credential data schema conversion request statement received from a requester terminal, and checking a decentralized identifier of a credential issuer based on the credential data, retrieve a decentralized identifier document through a decentralized identifier resolver, verifying a credential to be converted based on the decentralized identifier document, when verification of the credential is completed, generating a credential data schema identifier for the credential, retrieving a credential data conversion schema corresponding to the credential data schema conversion request statement based on the credential data schema identifier, converting the credential data schema based on the credential data conversion schema and generating a credential data schema conversion result, and checking identity information of the credential issuer through an issuer identity information registry.