摘要:
A method for electronic commerce using a security token and an apparatus thereof are provided. The electronic commerce method using a security token comprises a transaction approval institution generating a security token based on a security assertion markup language (SAML), using credit information of a purchaser who requests to issue a security token, and transmitting the security token to the purchaser; the purchaser writing an electronic signature on an order and transmitting the order together with the security token to a seller; the seller verifying the received order and security token, and then delivering goods according to the order to the purchaser; and the transaction approval institution performing payment for the seller and the purchaser. The method can solve the problems of personal information leakage and privacy infringement that may happen when a purchaser sends his personal information to a seller for electronic commerce. Since the token is one-time-use data, even if a security token sent is counterfeited or stolen, the loss can be minimized. In addition, by writing an extensible markup language (XML) electronic signature in the security token, authentication, integrity, and non-repudiation for a transmitted message can be guaranteed and through simple object access protocol (SOAP) security technology, confidentiality is maintained.
摘要:
Provided are a method and an apparatus for managing online and offline documents using RFID technology. The method includes: pre-registering online and offline documents using radio frequency identification tag information stored in at least one of the online and offline documents to be output; determining whether the pre-registered online and offline documents are authorized to be output; and if it is determined that the pre-registered online and offline documents are authorized to be output, generating documents of the online and offline documents to be output and storing new radio frequency identification tag information in radio frequency identification tags attached to the documents to be output.
摘要:
Provided are a method and an apparatus for managing online and offline documents using RFID technology. The method includes: pre-registering online and offline documents using radio frequency identification tag information stored in at least one of the online and offline documents to be output; determining whether the pre-registered online and offline documents are authorized to be output; and if it is determined that the pre-registered online and offline documents are authorized to be output, generating documents of the online and offline documents to be output and storing new radio frequency identification tag information in radio frequency identification tags attached to the documents to be output.
摘要:
Provided is a method of transmitting and receiving a message using an encryption/decryption key, by which each of a sender and a recipient can generate an encryption/decryption key and recover a key used for encryption/decryption while transmitting and receiving the message using an electronic device. The method includes: (a) a user generating his/her own private key and a public key, registering the public key with a key recovery agent (KRA), and setting shared secret information; and (b) a sender transmitting the recovery information necessary for decryption of the transmission message to a recipient, and the recipient generating a key necessary for the decryption from the recovery information and decrypting the transmission message. The method may further include the recipient requesting recovery of the session key to the KRA.
摘要:
Provided is a method and apparatus for authenticating a fingerprint by hiding minutiae, securely storing information on the fingerprint, and authenticating the information on the fingerprint in order to prevent the information on the fingerprint from being reused by an attacker who accesses the information on the fingerprint that is stored in a storage unit. The method for recognizing fingerprint by hiding minutiae of a fingerprint adds fake minutiae information to genuine minutiae information, hides fingerprint information using a polynomial, which is generated based on personal intrinsic information, and stores the fingerprint information, thereby securely protecting the fingerprint information from an external attacker, and preventing the fingerprint information accessed by the attacker from being reused since the attacker cannot know the genuine minutiae.
摘要:
A multiple biometric identification system and method are provided. In the multiple biometric identification system and method, a plurality of unified comparison values are generated for respective corresponding candidates who may have different combinations of biometric identification information so that the comparison value vectors of the candidates can be effectively compared with one another. Therefore, it is possible to enable multiple biometric identification even when the type and quantity of biometric information differs from one candidate to.
摘要:
Provided are a mobile extensible Markup Language (XML) signature service providing apparatus and method. The mobile XML signature service providing apparatus includes: an XML message analyzing unit authenticating a mobile client, according to an XML signature template generation request or an XML signature verification request received from the mobile client; an XML signature processor generating an XML signature template and a SignedInfo element in a canonicalized format if the authentication is successful, and verifying an XML signature; and an encoder providing key information and at least one setting value for the generation of the XML signature template and verification of the XML signature, to the XML signature processor. Therefore, the mobile XML signature service providing apparatus and method provide authentication, integrity, non-repudiation, etc. with respect to messages received/transmitted in a wireless environment, are applied to a wireless environment having limited resources, are compatible with an XML signature for an existing wired environment that is to be applied to wired-and-wireless integration electronic commerce, and minimizes a change in an existing wired environment when a mobile XML signature is applied.
摘要:
Provided are a method and apparatus for securely distributing digital content. According to the method and apparatus, content is securely transmitted to users who have a right of use content regardless of the reliability of a content distributor, thereby allowing the users to efficiently use content. For example, even if an unauthorized third party changes a list of content users by deleting a user who has a right to use content from the list or adding a user who has no right to use content to the list, such an unauthorized change can be easily detected in real time, thereby securely protecting the list. Accordingly, it is possible to securely distribute and use digital content regardless of a content distributor.
摘要:
The present invention relates to a system for managing user identity information via the Internet and a method of providing a service using the same. The identity information managing system including: an electronic identification certificate issuing device for issuing an electronic identification certificate to authenticate and secure a user identity on the Internet; a service providing device for preparing an electronic contract with a user on the basis of the electronic identification certificate of the user, and providing a service to the user; and a user-side server receiving the service from the service providing device with which the electronic contract with the user is prepared.
摘要:
Provided is a method for analyzing a network attack situation. The method categorizes network intrusion detection alerts into network attack situations, counts the frequency of same-featured intrusion alert occurrence for each network attack situation using a counting algorithm based on time slots, and analyzes the network attack situation based on the frequency of same-featured intrusion detection alert occurrence, the rate of same-featured intrusion detection alert occurrence, or an AND/OR combination of them. The network attack situation can be correctly detected in real time without relatively being influenced by the size of the network or amount of the occurrence of the intrusion detection alerts.