Abstract:
Disclosed herein are a terminal apparatus, a server apparatus, and a method for FIDO universal authentication using a blockchain. The method includes sending, by the terminal apparatus, a FIDO service request for any one of FIDO registration, FIDO authentication, and FIDO deregistration for an application service provided by the server apparatus to the server apparatus; verifying, by the blockchain, a FIDO service response message, which is created as a result of local authentication of a user in the terminal apparatus in response to the FIDO service request; and processing, by the server apparatus, the FIDO service request based on whether the FIDO service response message is successfully verified by the blockchain.
Abstract:
Disclosed herein is an apparatus for enhancing network security, which includes an information collection unit for collecting information about states of hosts that form a network and information about connectivity in the network; an attack surface analysis unit for analyzing attack surfaces by creating an attack graph using the information about the states and the information about connectivity; a security-enhancing strategy establishment unit for establishing a security-enhancing strategy based on the attack graph; and a security-enhancing strategy implementation unit for delivering a measure based on the security-enhancing strategy to a corresponding host, thereby taking a security-enhancing measure.
Abstract:
Disclosed herein are an apparatus and method for dynamic binary analysis on a hardware board. The method for dynamic binary analysis on a hardware board is performed using an apparatus for dynamic binary analysis on the hardware board, and includes generating information required for dynamic binary analysis based on information collected while interfacing with an embedded device, disassembling, by a software processing unit, the information required for dynamic binary analysis by receiving the information from a hardware processing unit while interfacing with the hardware processing unit, selecting a core platform of the embedded device based on results of the disassembly, and analyzing security vulnerabilities in the embedded device by performing dynamic binary analysis of the core platform.
Abstract:
Disclosed herein are an apparatus and method for providing an anonymous delegated credential in a DID-based service. A method for issuing an anonymous delegated credential in a DID-based service includes receiving an anonymous delegated credential issuance request message from a digital wallet of a delegate, setting attribute values in the anonymous delegated credential, anonymizing delegator identification information and delegatee identification information among the attribute values, and issuing the generated anonymous delegated credential to the digital wallet of the delegatee.
Abstract:
Disclosed herein are an apparatus and method for managing a history of object owners. The method includes generating, by an object owner history management apparatus, a product registration Verifiable Credential (VC) in a form of a Merkle tree, and registering the product registration VC in a blockchain in order to manage a history of owners of an object, acquiring, by a first user terminal device, the product registration VC from the blockchain and registering a first owner VC, generated based on the product registration VC, in the blockchain to register an ownership of the object, and acquiring, by a second user terminal device, a product transfer Verifiable Presentation (VP) from the first user terminal device and registering a second owner VC, generated based on the product transfer VP, in the blockchain to receive transfer of the ownership of the object.
Abstract:
Disclosed herein is an apparatus for recommending privacy control, which includes a relevant information collection unit for collecting relevant information to be used to recommend privacy control in response to a request for personal information of a user from an application; a privacy control recommendation unit for selecting privacy control to be recommended, corresponding to the request for the personal information, from a privacy control pattern of the user using the relevant information; an interface unit for providing an interface that provides information about the request and the recommended privacy control to the user and receives a selection of privacy control from the user; and a privacy control processing unit for processing the personal information of the user depending on the selected privacy control and providing the processed personal information to the application.
Abstract:
Disclosed herein are an apparatus and method for generating and operating a dynamic Controller Area Network (CAN) Identifier (ID). The apparatus includes a priority ID generation unit for generating a priority ID that is a base ID, a dynamic ID generation unit for generating a dynamic ID that is dynamically changed, and a communication unit for transmitting/receiving a data frame in which a dynamic CAN ID including the priority ID and the dynamic ID is combined with data.
Abstract:
Disclosed herein are an apparatus and method for authenticated key exchange using a password and an identity-based signature, by which robustness is provided in order to prevent a server impersonation attack when a password is exposed, and by which a client may be provided with convenient authentication using an ID and a password.
Abstract:
Disclosed herein are an apparatus and method for protecting privacy in which, in consideration of an application usage pattern, personal information is selectively provided depending on the purpose of use of the service of an application and on the privacy level, whereby a user may make better use of the service and the user's privacy may be effectively protected.
Abstract:
An authentication method including: transmitting, by a first terminal, a security cookie to a server and making an authentication request; transmitting, by the server, session information and the security cookie to a second terminal in response to the authentication request; verifying, by the second terminal, whether the security cookie has been encoded by a session key pre-stored in the second terminal; and performing, by the second terminal and the server, mutual authentication in the case in which the security cookie is encoded by the session key pre-stored in the second terminal is disclosed.