摘要:
An Internet access time control method using an authentication assertion is provided. In the method, a user ID is registered in an asserting party site in a single sign-on (SSO) environment by using a user terminal. The asserting party site manages user IDs for providing an SSO service. Control setup values are set in the asserting party site by using the user terminal. Here, the control setup values include an Internet usage duration and an Internet access-restricted time band for the user. A service time of a relying party site accessed by the user terminal is controlled according to an authentication assertion containing the control setup values. Accordingly, the method makes it possible not only to control Internet usage time, but also to prevent the child from unreasonably using the Internet.
摘要:
A system for managing and protecting personal information on the Internet and a method thereof are disclosed. The management and the access control of the personal information stored in a plurality of ID management servers that store and provide the personal information of users are performed using an Identity search server and a personal information protection server, and thus the convenience in use can be provided to the users who manage the personal information with the protection of the personal information through the access control of the personal information.
摘要:
A method and system for transmitting and receiving user's personal information using an agent are provided. An information management server managing user's personal information provides an agent including user's personal information in response to a user's personal information request message from a client. A client receives the agent and requests user's personal information from the agent. Then, the agent determines whether the client is authorized and provides the user's personal information to the client when it is determined that the client is authorized. Accordingly, the user's personal information is safely managed and transmitted.
摘要:
Provided are a method and apparatus for transmitting a message in a heterogeneous federated environment, and a method and apparatus for providing a service according to the message. In the method of transmitting a message to an external domain in the heterogeneous federated environment, a service server of a domain creates a transmission message to be transmitted to the external domain and supplies it to a protocol interpretation unit of the domain. The protocol interpretation unit detects protocol information of the external domain, interprets the created transmission message based on the detected protocol information, and supplies the interpreted transmission message to the service server. The service server then supplies the interpreted transmission message to the external domain. Accordingly, two service servers in different domains with different protocol information can exchange messages with each other while guaranteeing security.
摘要:
Provided are a method and system for managing reliability of an identification (ID) management apparatus for user centric ID management.Provided are a method and system for managing reliability of an ID management apparatus, whereby an application service providing apparatus can determine whether to trust a corresponding ID management apparatus without having a pre-agreement with an ID management apparatus regardless of which ID management apparatus is selected by a user in user centric ID management circumstances.Therefore, reliability is determined according to types of information provided by the ID management apparatus, and reliability of the ID management apparatus can be determined according to a result of evaluation made by the application service providing apparatus instead of a particular single subject.
摘要:
An apparatus and method for providing a service that securely and easily shares personal information using a signed callback uniform resource locator (URL) message in a mobile terminal environment are provided. The mobile terminal providing a personal information sharing service using a signed URL message includes; a personal information sharing service module which receives a message that includes a first callback URL and a personal information sharing request and is signed using a private key of a server, and creates a second callback URL by adding a user response result in response to the personal information sharing request to the first callback URL; and an authentication module which verifies a signature of the message using a public key of the server, and signs the second callback URL using a user private key.
摘要:
A method and system for transmitting and receiving user's personal information using an agent are provided. An information management server managing user's personal information provides an agent including user's personal information in response to a user's personal information request message from a client. A client receives the agent and requests user's personal information from the agent. Then, the agent determines whether the client is authorized and provides the user's personal information to the client when it is determined that the client is authorized. Accordingly, the user's personal information is safely managed and transmitted.
摘要:
A method of providing customized service with privacy security includes: requesting service information provided from a smart environment to a smart environment control system; once the service information is transmitted from the smart environment control system, generating schedule information by using the service information, user personal information, and schedule generation information; and transmitting a service command to the smart environment control system according to the schedule information.
摘要:
A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role groups and data; performing encryption and decryption of data keys and role keys; and generating a key table, in which the data keys required to decrypt encrypted data and the role keys required to decrypt encrypted data keys are stored, with reference to the key tree. Further, the key tree construction and key distribution method for hierarchical role-based access control includes performing management such that a specific role group can obtain a data key by performing decryption based on its own role key by using both the key tree and the key table.
摘要:
The prevent invention relates to a portable mobile apparatus for a user for providing a supplementary service and a method for providing a supplementary service by using the same, and more particularly, to an apparatus and a method for providing supplementary enhanced services by using an application run in a portable mobile terminal when the portable mobile terminal such as a cellular phone or a smart phone is used for a service through short-range RF communication. The present invention can provide a variety of supplementary services to the user by using an operation function included in the application in the mobile terminal when performing the services through the short-range RF communication. Specifically, it is possible to automate the supplementary function or provide convenience to the user and interact with the user.