摘要:
A mobile apparatus and method for displaying an Augmented Reality (AR) in the mobile apparatus. The mobile apparatus captures an image of a current environment of the mobile apparatus, displays the image, detects mapping information corresponding to the current environment from among mapping information stored in the mobile apparatus, maps a three-dimensional (3D) Graphical User Interface (GUI) of detected mapping information onto the displayed image, based on a relative location relationship between the detected mapping information, and adjusts a display status of the 3D GUI, while maintaining the relative location relationship between the detected mapping information.
摘要:
A mutual authentication method using a mediation module and a system therefor are provided. The method includes: storing a first partial private key obtained by dividing a first private key of a device; storing a second partial private key obtained by dividing a second private key of a host device; receiving unique identifiers (IDs) and random numbers for the device and the host device from the device and determining whether the unique IDs are valid; and generating a first signature value by using the first partial private key and a second signature value by using the second partial private key if the unique IDs are valid, and transmitting the generated first and second signature values to the device
摘要:
Provided are an apparatus and method for determining the integrity of content in at least one packet of a plurality of packets. A content using apparatus includes a receiver which receives a transport packet including content in at least one packet and a secret set, which includes an integrity check key generated for determining the integrity of the content, and extracts the secret set by processing the transport packet, a storage unit which stores the secret set, a controller which uses the secret set to determine whether each packet having the content maintains integrity, and a data processing unit which processes the at least one packet if the at least one packet is determined to be maintaining integrity. Accordingly, when content is transmitted, the integrity of the content can be checked using only a small amount of transmission data and a small amount of computation.
摘要:
Provided are a method of tracing a device key in a user key management system using a hierarchical hash chain broadcast encryption scheme (HBES) algorithm, a user key management system for executing the method of tracing a device key, and a computer program for executing the method of tracing a device key. The method of tracing a device key of an illegal decoder in a user key management system for broadcast encryption includes: tracing a device key using a binary search; and revoking the traced device key. The technology according to the present invention can be applied to prevent exposure of the device keys to hacking. The present invention provides a method of tracing which can be applied to an HBES algorithm structure.
摘要:
A method and apparatus for protecting digital content in a digital rights management (DRM) system are provided. The method of importing a first content file into a second content file includes determining a usage rule of content included in the first content file based on information used to control remote access of the content included in the first content file; and generating the second content file that follows the determined usage rule.
摘要:
Provided is a method of transmitting content keys to nodes arranged in a hierarchical structure which includes a plurality of node groups each including a predetermined number of the nodes. In this method, revoke information that includes identifiers of revoked node groups in the hierarchical structure, the total number of independent revoked nodes, and identifiers of the independent revoked nodes is generated. The revoked node groups are node groups consisting of only revoked nodes, and the independent revoked nodes are revoked nodes not belonging to any of the revoked node groups. Then, encrypted content keys are obtained by encrypting content keys using broadcast encryption, by using an encryption key set that has a form that cannot be generated using a decryption key set that the revoked nodes possess, and a set of encrypted content keys is generated. Thereafter, the revoke information and the set of the encrypted content keys are transmitted to all of the nodes arranged in the hierarchical structure.
摘要:
Provided are a method and apparatus for generating separate rule data using a database management system (DBMS) based language in order to efficiently manage usage rules of content. The method of providing usage rule data of content included in a mobile storage medium connected to a content reproduction device, the method includes: generating first rule data that is a set of rules used to manage the usage rule data based on a data structure of a database management system (DBMS); and generating second rule data that is a set of rules used to access the usage rule data using the first rule data.
摘要:
Provided is a method of conditionally decrypting content. In the method, whether a content key for encrypting and/or decrypting content is revoked is determined, and encrypted content is selectively decrypted using the content key.
摘要:
Provided are a method and a system for mutual authentication between mobile and host devices. The mobile device stores a first secret key and is connected to the host device. The method includes generating a second secret key using the first secret key and first data that is received from the host device and is encrypted using a predetermined method. The method further includes transmitting second data that is encrypted using a predetermined method, to the host device to induce generation of a media key; performing an operation on the second secret key and transmitting a generated operation value to the host device; and performing mutual authentication between the mobile device and the host device.
摘要:
Provided is a contents decoding method using a digital rights management (DRM) card. The method of decoding contents received from a host device connected with a DRM card storing DRM software includes: receiving encrypted contents information from the host device and granting a contents decoding request; executing the DRM software corresponding to the contents information and decoding the received contents; and transmitting the decrypted contents to the host device, thereby using various pieces of contents regardless of a DRM system set in contents and easily upgrading DRM software to defend against hacking. Further, a host device does not require DRM software, which enables mass production and reduces manufacturing costs.