Abstract:
A terminal device and a method of operating the terminal in a wireless communication system are provided. The terminal device includes a controller configured to search for an accessible network and acquire information for providing identification information of an embedded Universal Integrated Circuit Card (eUICC) to a network provider of a network selected by a user; and a communication unit configured to transmit the acquired information to the network provider. The method includes searching for an accessible network and acquiring information for providing identification information of an embedded Universal Integrated Circuit Card (eUICC) to a network provider of a network selected by a user; and transmitting the acquired information to the network provider.
Abstract:
Methods and apparatuses for protecting content in a storage device are described. In one method, a host device obtains from the storage device first information on a controller of the storage device and second information on a memory of the storage device. The host device also obtains third information calculated based on the first information and the second information, and permits access to encrypted content stored in the storage device based on the third information. The host device is configured to receive the encrypted content from the storage device.
Abstract:
The present invention relates to a method for transmitting an encrypted message between terminals, comprising the steps of: if a message application is executed on a screen of a terminal, running a keyboard that provides a security mode selection button in the message application execution window; if a user input with respect to the selecting button is sensed, receiving and temporarily storing the message that the user is inputting after switching to the security mode; and if an instruction indicating that writing has been completed is sensed through the keyboard, encrypting the message.
Abstract:
An authentication method between a server and a client is provided. The authentication method includes transmitting, to the client, an inquiry message including a first modified secret key generated based on a first secret key and a first blinding value, receiving, from the client, a response message including a response value generated based on the first blinding value, a second secret key, and an error value, calculating the error value from the response value, and determining whether authentication of the client has succeeded based on the error value.
Abstract:
A method for protecting content of a storage device including a memory for storing data and a controller for managing data input and output of the memory is provided, in which a Data Encryption Key (DEK) for encrypting the data stored in the memory is generated, an IDentifier (ID) of the memory is acquired, the DEK is encrypted using user secret information and the ID of the memory, and the encrypted DEK is stored in the memory.
Abstract:
A system and method for authenticating a resource-constrained client are provided. The method includes transmitting, by the server, a query message including a first modified secret key to the client, wherein the first modified secret key is generated using a first secret key and a first blinding value; receiving, from the client, a response message including a response value, wherein the response value is generated using the first blinding value, a second secret key, and an error value; calculating the error value from the response value; and determining, based on the error value, whether authentication of the client is successful.
Abstract:
The present invention proposes a method for obtaining a digital right management (DRM) function for playing DRM contents on a user device according to need. To this end, the present invention comprises the steps of, when a user device requests a specific DRM contents or accesses a service system, a user device obtaining a rights object corresponding to a request; determining information on a current DRM function using the rights object; and when a new DRM function is required, installing a new DRM function or upgrading the standard DRM function.
Abstract:
A DRM/CAS service device is provided. The device includes a registration service server that authenticates a device and an STP of the device and generates a device-based context according to a registration request and a DRM/CAS service request from the device; a DRM/CAS service server that receives the device-based context and generates DRM/CAS security contexts; and a DRM/CAS SW service server that receives the DRM/CAS security contexts, generates the DRM/CAS software package including the DRM/CAS security contexts and DRM/CAS software, and enables the DRM/CAS software package to be provided for the device. The DRM/CAS service device reduces the amount of processing and simplifies the process by installing and using content and service protection software, that is, DRM/CAS software by using a security context.