摘要:
A security management server includes an input unit for receiving image data from at least one network camera; a control unit for assigning an access authority level to each image data received via the input unit; and a storage unit for storing therein the image data along with the access authority levels assigned by the control unit. When receiving a request for a specific image data among the image data stored in the storage unit from a user having a user access authority level, the control unit compares the user access authority level and the access authority level assigned to the specific image data, and based on comparison result thereof, selectively provides the specific image data to the user.
摘要:
An image photographing device of an object tracking system includes: an image recognizing module for collecting image information within a field of view (FOV) region in real time, recognizing occurrence of an event from the collected image information to extract an object contributing to the occurrence of the event, and sensing whether the extracted object is out of the FOV region or not. The device further includes an object tracking module for extracting property of the object from the extracted object to generate metadata, storing the metadata in a database, and providing the metadata stored in the database to ambient image photographing devices based on the sensing result of the image recognizing module.
摘要:
The present invention relates to a secure hash algorithm (SHA)-based message schedule operation method, a message compression operation method, and a cryptographic device performing the same. The present invention sequentially performs the message schedule operation by using an adder. Also, a memory for storing operation data input for the message schedule operation is used from a 17th round to store intermediate data generated by the message schedule operation. Further, the message compression operation is sequentially performed by using one adder.
摘要:
A random number signal generator using pulse oscillators, the generator including: a first pulse oscillator oscillating a first pulse at high speed; a second pulse oscillator oscillating a second pulse; a sampler receiving an output pulse of the first oscillator as data, receiving an output pulse of the second pulse oscillator as a clock signal, and outputting a plurality of output signals; and a digital processor generating a random number signal with a desired size by using the output signals of the sampler.
摘要:
A wireless communication medium includes an antenna, an analog signal processor, a digital signal processor, and a central processing unit & logic module. The antenna transmits and receives a signal to and from an external apparatus. The analog signal processor converts an analog signal to a digital signal, and converts a digital signal to an analog signal. The digital signal processor demodulates the digital signal, detects the start and end of data, and generates a first control signal for determining whether data is transmitted to the external apparatus and a second control signal for perceiving the end of data, blocking the reception of data, modulating data, and determining whether modulated data is transmitted to the external apparatus. The central processing unit & logic module processes data received from and transmitted to the external apparatus. Accordingly, an efficiency of processing a RF signal can be improved.
摘要:
An apparatus for providing security functions in a computing system includes: at least one normal service domain executing service; a secure service domain performing integrity verification on a service execution environment of at least one normal service domain, and performing the security service function for the service in accordance with the result of the integrity verification; and a virtual machine monitor separating service execution environments of at least one normal service domain and the secure service domain, respectively, based on the same hardware device. According to the present invention, it is possible to enhance the security for execution environments of the computing system and the data stored in the system, by allowing the corresponding services, which need security service functions in the normal service domain, to be executed necessarily only when integrity verification of the execution environment succeeds by linking the secure service domain.
摘要:
A video surveillance system provides interface compatibility. The system includes a plurality of security devices connected to a network and configured to collect video data, a security server configured to make a connection request to a target security device to monitor the video data collected by the target security device, and an interface conversion server configured to convert the connection request in conformity to an interface of the target security device. The interface conversion server is further configured to convert the video data collected by the target security device having a non-standard interface in conformity to a standard interface in order for the security server to monitor the collected video data.
摘要:
A method for sharing and updating a key using a watermark is disclosed. The method includes receiving an image to be encoded from an image input device encoding the image, and inserting a master key value as a watermark into the encoded image, for use as an input of a key derivation function.
摘要:
An apparatus for providing a secure environment of software execution in a terminal device includes a normal service domain and a secure service domain into which a domain of the software is divided based on virtualization. The normal service domain executes a normal service on elements of the software, and the secure service domain executes a security service on elements of the software in response to a request for a security service of the software elements from the normal service domain.
摘要:
An apparatus for hash cryptography has a hardware structure that is capable of providing both secure hash algorithm (SHA)-1 hash calculation and SHA-256 hash calculation. The apparatus for hash cryptography generates a plurality of first message data corresponding to a plurality of first rounds when the SHA-1 hash calculation is performed and generates a plurality of second message data corresponding to a plurality of second rounds when the SHA-256 hash calculation is performed by using one memory, one first register, one XOR calculator, and one OR calculator, calculates a message digest by the SHA-1 hash calculation by using the plurality of first message data when the SHA-1 hash calculation is performed, and calculates a message digest by the SHA-256 by using the plurality of second message data when the SHA-256 hash calculation is performed.