Abstract:
An apparatus for assuring integrity of a mobile application or application software (app) includes a developer registration management unit configured to authenticate a mobile app developer based on an authentication means in response to a subscription and registration request of the mobile app developer, and an integrity verification unit configured to verify whether the mobile app has the integrity by unpackaging the mobile app uploaded to an app store server in a packaged state and determine whether to write a code signature of the app store server to the mobile app based on an integrity verification result. Thus, a secure mobile ecosystem can be constructed.
Abstract:
The present invention relates to a vessel traffic service system and a method for extracting accident data, and more particularly, to a technique that search and extracts possible event traffic data automatically from data of a concerned area without knowing exact time when a marine accident occurs. The vessel traffic service system includes: an input unit receiving conditional information for extracting accident occurrence data from a user; a storage unit storing at least one of an automatic identification system (AIS) signal, a radar signal, and a camera image signal; and a control unit extracting an event occurrence part from at least one of the AIS signal, the radar signal, and the camera image signal of a point and a time at which an accident occurs in accordance with the conditional information to generate an accident candidate list.
Abstract:
According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site through a web browser module, execute a security module through a browser plugin of the web site, update a database for a browser cache of the web site from the web server by the security module, cache a web content of the web site from the web server, match cache data of the web content with the database, and warn about the web content if data matched with the cache data of the web content does not exist in the database.
Abstract:
An apparatus for analyzing a permission of an application for a mobile device, the apparatus comprising: an executable file acquisition unit; a file extraction module; and an execution permission analyzing module configured to detect a security risk which can be caused by the permission on the basis of the permission described in the extracted file, wherein the information related to the permission of the application comprises: information on permission that is declared in the application, permission that the application uses and a function that uses the permission of the application.
Abstract:
Disclosed are an apparatus and a method for verifying a web site by using a mobile terminal. A method, performed in a server verifying a web site, comprises receiving a message requesting verification on truth or falsehood of a web site which an access terminal accesses from the access terminal; processing the web site based on an Uniform Resource Location (URL) of the web site according to the message; generating verification information for verifying truth of falsehood of the web site based on the URL of the web site, and transmitting the verification information to a mobile terminal; and receiving verification result information on the web site which is generated in the mobile terminal based on an image of the web site and the verification information, and transmitting the verification result information to the access terminal.
Abstract:
A similarity calculating method and apparatus are disclosed. A similarity calculating method according to an exemplary embodiment of the present invention includes extracting similarity calculating data, which is determined in advance, by receiving a communication activity record for every user; modeling a communication activity pattern for every user and common information between the users based on the extracted similarity calculating data; and calculating a similarity between users using the modeled communication activity pattern for every user and common information. The modeling includes: modeling the communication activity pattern by calculating a value of a static feature from the similarity calculating data, and modeling the common information by calculating a value of a dynamic feature from the similarity calculating data.
Abstract:
Provided are an operation method and a secure terminal for performing the method. The operation method may include receiving, from a user terminal, a plain text on which an external encoding operation is to be performed, performing the external encoding operation on the plain text, and transmitting the external encoding operated plain text to the user terminal, and the operation method may include receiving, from a user terminal, a cryptogram in which a white-box cryptography operation is performed on an external encoding operated plain text; performing an external decoding operation on the cryptogram; and transmitting the external decoding operated cryptogram to the user terminal.
Abstract:
The traffic control method according to the present invention includes obtaining radar information on a target from at least one radar; obtaining AIS information of the target from an AIS (automatic identification system) of the target; detecting GPS jamming; and fusing the radar information and the AIS information. The fusing selectively fuses the AIS information depending on whether the GPS jamming occurs in the position of the target as a result of the detection.