Abstract:
An integrated remote control system includes a remote control device for selecting and controlling a plurality of digital devices, each including a bit pattern tag having location information and device information. The remote control device includes a display, a light emitting module for emitting light toward the digital devices, a sensor for recognizing the tags of the digital devices, and a controller for analyzing the tags recognized by the sensor to provide the display information of the digital devices on the display and then controlling a digital device selected from the displayed digital devices.
Abstract:
An external authentication method authenticates access a home network from outside the home network using temporal credential information. The method of authentication for the home network includes requesting a transmission of temporal credential information from the home server for authenticating a user, and receiving the temporal credential information from the home server. The temporal credential information is information including, for example, a temporal authentication key. Accordingly, the home user can access the home network by performing a facilitated and safer authentication using the temporal authentication key from outside the home network.
Abstract:
Provided are a method and an apparatus for generating and validating a digital signature. The apparatus for generating the digital signature includes: a converter converting a message to be transmitted into a codeword having a set length using a Griesmer code; and a digital signature generator allowing each of bits constituting the codeword to correspond to one of a plurality of secret keys constituting a table and combining the corresponding secret keys to generate the digital signature. The apparatus for validating the digital signature includes: a converter converting a received message into a codeword having a set length using a Griesmer code; and a digital signature validator allowing each of bits constituting the codeword to correspond to one of a plurality of public keys constituting a table and validating whether a value obtained by combining the corresponding public keys is equal to a value obtained by hashing the digital signature.
Abstract:
Provided are a DMB system for reducing a working load of a DMB receiving terminal, a method of transmitting PSI/SI version information, and a method of parsing PSI/SI. When PSI/SI is generated, a DMB station receives version information of the PSI/SI from each of PSI/SI generators, generates PSI/SI version information, and transmits the generated PSI/SI version information through a specific channel. Then, the DMB receiving terminal receives the PSI/SI version information, compares the received PSI/SI version information to stored PSI/SI version information, and parses received PSI/SI according to the comparison result. Accordingly, by controlling the DMB receiving terminal to parse PSI/SI only if the PSI/SI has been modified, an unnecessary working load due to the parsing can be reduced.
Abstract:
A virtual mouse driving apparatus and method for processing a variety of gesture commands as equivalent mouse commands based on two-handed gesture information obtained by a video camera are provided. The virtual mouse driving method includes: keeping track of an input gesture input with the video camera; removing a background portion of the input gesture image and extracting a left-hand region and a right-hand region from the input gesture image whose background portion has been removed; recognizing a left-hand gesture and a right-hand gesture from the extracted left-hand region and the extracted right-hand region, respectively, and recognizing gesture commands corresponding to the recognition results; and executing the recognized gesture commands.
Abstract:
A packet security method and apparatus adjusts a security level of the packet according to a feature of the packet. The packet security method includes detecting a feature of a packet to be transmitted, determining a security level of the packet according to the detected feature, and generating a security packet according to the determined security level. The feature of the packet is at least one of a destination address of the packet, a transfer protocol of the packet, a packet size, an application for the packet, and a designated security level for the packet. According to the method, the security function is adoptively applied according to the feature of the packet being transmitted, and thus flexibility can be provided in the application of the security function to achieve an efficient use of resources.
Abstract:
A verification apparatus for a mobile platform for remotely verifying the integrity of a device that is connected to a network and has a shared private key includes a verifying unit that determines whether the device shares a private key with the verification apparatus by checking whether the authentication code generated by the verification apparatus matches the authentication code generated by the device; a calculating unit that generates a local check code that verifies the integrity of the memory; an interface unit that transmits, to the device, the information that the verification apparatus uses to generate an authentication code and the integrity check parameter used to generate a remote check code, and receives the authentication code and the remote check code from the device; and a determining unit that verifies the integrity of the memory if the local check code matches the remote check code.
Abstract:
A system and a method for creating an access authority and a remote controller using the system and the method. The system includes: at least one lower remote controller which requests a creation of an access authority; a higher remote controller which receives the request for the creation of the access authority from the at least one lower remote controller, creates an access authority to be granted to the lower remote controller, and requests a registration of the created access authority. Also included is a device which receives the request for the registration of the created access authority from the higher remote controller and registers the access authority of the lower remote controller created by the higher remote controller.
Abstract:
An apparatus, medium, and method controlling an audio output and/or a video output. The apparatus includes an input device interface module for receiving content including video information and audio information corresponding to the video information, a user interface module for providing a user interface to enable a user to select an output device for receipt of the audio information and an output device for receipt of the video information, a control module for receiving the content from the input device interface module and outputting to an output device interface module a command to transmit one of the audio information and/or the video information, and the output device interface module for receiving the command from the control module and transmitting one of the audio information and/or the video information to each selected output devices.
Abstract:
A method and apparatus for multiplication in a Galois field. The method of multiplication in a Galois field (GF) for preventing an information leakage attack by performing a transformation of masked data and masks in GF(2n) includes: receiving a plurality of first and second masked input data, a plurality of first and second input masks and an output mask; calculating a plurality of intermediate values by performing a multiplication of the plurality of masked input data and the plurality of input masks in GF(2n); and calculating a final masked output value by performing an XOR operation of the intermediate values and the output masks.