摘要:
A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role groups and data; performing encryption and decryption of data keys and role keys; and generating a key table, in which the data keys required to decrypt encrypted data and the role keys required to decrypt encrypted data keys are stored, with reference to the key tree. Further, the key tree construction and key distribution method for hierarchical role-based access control includes performing management such that a specific role group can obtain a data key by performing decryption based on its own role key by using both the key tree and the key table.
摘要:
A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role groups and data; performing encryption and decryption of data keys and role keys; and generating a key table, in which the data keys required to decrypt encrypted data and the role keys required to decrypt encrypted data keys are stored, with reference to the key tree. Further, the key tree construction and key distribution method for hierarchical role-based access control includes performing management such that a specific role group can obtain a data key by performing decryption based on its own role key by using both the key tree and the key table.
摘要:
An identity protocol gate way according to the exemplary embodiments of the present invention includes an artifact generating and inquiring module generating an artifact by receiving a sharing request message from a mobile identity wallet according to a request made by an application program of a mobile device, inquiring corresponding identity information according to a request of the identity information including the artifact from a web server and transferring the inquired identity information to the web server; and a protocol converting module converting the sharing request message into a protocol message of a wired environment by receiving the sharing request message from the mobile identity wallet, transferring the protocol message to the identity web server, transferring sharing response information and the artifact to the application program of the mobile device by using a mobile protocol in response to the sharing response information from the identity web server.
摘要:
An apparatus for inputting a user password, includes an interface receiving a command. Further, the apparatus for inputting the user password includes a control unit setting a target based on the command from the interface, receiving and storing a password character, and determining that authentication is successes only when the set target and the password character are positioned at a same coordinate on a skin image. Furthermore, the apparatus for inputting the user password includes a display unit connected to the interface to display the skin image of the interface that is transmitted from the control unit.
摘要:
A method and system for transmitting and receiving user's personal information using an agent are provided. An information management server managing user's personal information provides an agent including user's personal information in response to a user's personal information request message from a client. A client receives the agent and requests user's personal information from the agent. Then, the agent determines whether the client is authorized and provides the user's personal information to the client when it is determined that the client is authorized. Accordingly, the user's personal information is safely managed and transmitted.
摘要:
Provided are a system and method for updating a user identifier (ID). The user ID updating method includes: (a) collecting unauthorized access attempt information for a user ID; (b) creating a user ID update policy for an encoded user ID obtained by encoding the user ID, according to the unauthorized access attempt information collected in operation (a); (c) storing the user ID update policy created in operation (b); (d) loading the user ID update policy stored in operation (c) and determining whether or not to update the user ID; and (e) creating a new user ID if it is determined in operation (d) that the user ID should be updated, and changing the user ID to the new user ID. Therefore, it is possible to ensure security for user IDs, by dynamically creating and updating user IDs according to security environments.
摘要:
Provided is a certificate transmission server transmitting a certificate stored in a fixed terminal to a mobile terminal, a system including the same, and a method using the same. The method includes forming a security channel to the mobile terminal and performing authentication of the mobile terminal, forming a security channel to the fixed terminal and performing authentication of the fixed terminal, and if the authentication of the mobile terminal and the fixed terminal is successful, receiving the certificate from the fixed terminal and transmitting the certificate to the mobile terminal. Accordingly, authentication of a mobile terminal and a fixed terminal can be performed by a certificate transmission server, and the certificate can be transmitted by establishing a safe communication channel.
摘要:
Provided is an apparatus and method for issuing a certificate by receiving in real-time a user's consent in an online or offline environment. The apparatus includes: a database unit storing and managing a list of certificates requiring a user's consent and personal information containing the identity and a contact point of the user of the certificates; a determiner, when issuance of a certificate is requested, receiving identity information of an applicant and determining whether the certificate requested by the applicant is listed in the certificate list stored in the database unit; and a consent inquiry unit, when the requested certificate is listed in the certificate list, transmitting the identity information of the applicant and the name of the certificate to a contact point of the user of the certificate, which is stored in the database unit, and inquiring whether the user consents to the certificate issuance.
摘要:
Provided are a system and method for updating a user identifier (ID). The user ID updating method includes: (a) collecting unauthorized access attempt information for a user ID; (b) creating a user ID update policy for an encoded user ID obtained by encoding the user ID, according to the unauthorized access attempt information collected in operation (a); (c) storing the user ID update policy created in operation (b); (d) loading the user ID update policy stored in operation (c) and determining whether or not to update the user ID; and (e) creating a new user ID if it is determined in operation (d) that the user ID should be updated, and changing the user ID to the new user ID. Therefore, it is possible to ensure security for user IDs, by dynamically creating and updating user IDs according to security environments.
摘要:
Provided are a method and system for managing reliability of an identification (ID) management apparatus for user centric ID management.Provided are a method and system for managing reliability of an ID management apparatus, whereby an application service providing apparatus can determine whether to trust a corresponding ID management apparatus without having a pre-agreement with an ID management apparatus regardless of which ID management apparatus is selected by a user in user centric ID management circumstances.Therefore, reliability is determined according to types of information provided by the ID management apparatus, and reliability of the ID management apparatus can be determined according to a result of evaluation made by the application service providing apparatus instead of a particular single subject.