Abstract:
An Internet access time control method using an authentication assertion is provided. In the method, a user ID is registered in an asserting party site in a single sign-on (SSO) environment by using a user terminal. The asserting party site manages user IDs for providing an SSO service. Control setup values are set in the asserting party site by using the user terminal. Here, the control setup values include an Internet usage duration and an Internet access-restricted time band for the user. A service time of a relying party site accessed by the user terminal is controlled according to an authentication assertion containing the control setup values. Accordingly, the method makes it possible not only to control Internet usage time, but also to prevent the child from unreasonably using the Internet.
Abstract:
Disclosed herein is a real-time face detection apparatus. The real-time face detection apparatus includes a down-scaling unit and a face region comparison unit. The down-scaling unit down-scales an input image at at least one ratio. The face region comparison unit creates a plurality of windows for the image down-scaled at the at least one ratio, acquires face region confidence of each of window images within the created windows by comparing the window image with a classifier, and determines whether the window image corresponds to a face region.
Abstract:
Provided are a mobile terminal for sharing resources, a method of sharing resources within a mobile terminal and a method of sharing resources between a web server and a terminal The mobile terminal for sharing resources includes a web browser using a web standard protocol to display a first random value, an authentication number, and a Distinguished Name (DN) of web server transferred from the web server after it has been determined that there is no key information in a cookie; and a resource when the first random value and the DN are received from the web browser, being terminated after storing the first random value and the DN, and when the resource is re-executed and the authentication number is input by a user, verifying the first random value, generating a second random value and a shared key from the first random value and generating a symmetric key using a part of the shared key, wherein the shared key is generated from the second random value based on the symmetric key, and the symmetric key is identical to a symmetric key of the web server generated from a part of the symmetric key, and the web browser and the resources are operated by an execution unit.
Abstract:
An apparatus and method can effectively detect both hands and hand shape of a user from images input through cameras. A skin image detecting skin regions from one of the input images and a stereoscopic distance image are used. For hand detection, background and noise are eliminated from a combined image of the skin image and the distance image and regions corresponding to actual both hands are detected from effective images having a high probability of hands. For hand shape detection, a non-skin region is eliminated from the skin image based on the stereoscopic distance information, hand shape candidate regions are detected from the remaining region after elimination, and finally a hand shape is determined.
Abstract:
Disclosed are a system and a method extensible for performing, in real-time, stereo snatching for calculating depth images with a result of searching for points of similarity by using images taken with two cameras. The system includes a coordinate creating module, a census transform module, a delay XOR calculation module, a stereo matching module, and a control module. Accordingly, by using the system extensible for performing stereo matching, depth information of corrected images can be acquired in real-time without using computer systems or software programs for special purposes. Furthermore, since the system extensible for performing stereo matching can be simply realized by hardware, the system and the method of the present invention can be easily applied to actual intellectual-type robots, industrial settings, etc.
Abstract:
The prevent invention relates to a portable mobile apparatus for a user for providing a supplementary service and a method for providing a supplementary service by using the same, and more particularly, to an apparatus and a method for providing supplementary enhanced services by using an application run in a portable mobile terminal when the portable mobile terminal such as a cellular phone or a smart phone is used for a service through short-range RF communication. The present invention can provide a variety of supplementary services to the user by using an operation function included in the application in the mobile terminal when performing the services through the short-range RF communication. Specifically, it is possible to automate the supplementary function or provide convenience to the user and interact with the user.
Abstract:
Disclosed herein is a system and method for managing identity. The system includes a mobile terminal, a web server, and a service terminal. The mobile terminal includes a smart card on which a management server for managing user identity is mounted. The web server generates the user identity and provides the generated identity to the management server over a wired/wireless network. The service terminal receives a required identity from the mobile terminal using Near Field Communication (NFC).
Abstract:
Provided are a method and apparatus for transmitting a message in a heterogeneous federated environment, and a method and apparatus for providing a service according to the message. In the method of transmitting a message to an external domain in the heterogeneous federated environment, a service server of a domain creates a transmission message to be transmitted to the external domain and supplies it to a protocol interpretation unit of the domain. The protocol interpretation unit detects protocol information of the external domain, interprets the created transmission message based on the detected protocol information, and supplies the interpreted transmission message to the service server. The service server then supplies the interpreted transmission message to the external domain. Accordingly, two service servers in different domains with different protocol information can exchange messages with each other while guaranteeing security.
Abstract:
A method and apparatus for generating a certificate including a guardian's agreement for a ward are provided. The apparatus includes a verification unit verifying a certificate of the guardian, an agreement setting unit setting an agreement on conditions on which the ward is allowed to use an online environment, and a certificate issuing unit generating a certificate including the agreement for the ward when the verification of the guardian's certificate succeeds.
Abstract:
A portable USB storage device includes a case, a USB port, and a control device. The case contains therein a data storage. The USB port can be inputted into the case in a sliding motion. The control device selectively controls a location of the USB port to keep the USB port.