摘要:
Provided are a method and apparatus for encrypting data, and a method and apparatus for decrypting data. The method of encrypting data includes generating an encryption key by using current time information indicating a current time, encrypting data by using the generated encryption key, and transmitting the encrypted data.
摘要:
Provided are a method and apparatus for checking the integrity of firmware. The method includes storing a first hash function value of unhacked firmware for determining whether actual firmware of an external processor has been hacked; reading the actual firmware via a bus; calculating a second hash function value of the actual firmware; comparing the first hash function value with the second hash function value; and sharing a bus key with the external processor, based on the comparison result.
摘要:
A method and apparatus for reproducing a video using a watermark inserting function. The method of inserting a watermark into a video being reproduced, using an on-screen-display (OSD) data mixer included in a video reproduction apparatus, includes determining a watermark pattern indicating information on reproduction of the original video. The watermark pattern is converted into watermark data capable of being recognized by an OSD data mixer and synthesized with the video being reproduced, using the OSD data mixer.
摘要:
Provided is a method of transmitting content keys to nodes arranged in a hierarchical structure which includes a plurality of node groups each including a predetermined number of the nodes. In this method, revoke information that includes identifiers of revoked node groups in the hierarchical structure, the total number of independent revoked nodes, and identifiers of the independent revoked nodes is generated. The revoked node groups are node groups consisting of only revoked nodes, and the independent revoked nodes are revoked nodes not belonging to any of the revoked node groups. Then, encrypted content keys are obtained by encrypting content keys using broadcast encryption, by using an encryption key set that has a form that cannot be generated using a decryption key set that the revoked nodes possess, and a set of encrypted content keys is generated. Thereafter, the revoke information and the set of the encrypted content keys are transmitted to all of the nodes arranged in the hierarchical structure.
摘要:
A method and apparatus for managing content among user devices is provided. The method includes requesting, from a first server, a list of Digital Rights Management (DRM) supported by at least one user device upon receiving a request to download content; using the list of DRM received from the first server to assign at least one second server supported by the at least one user device; and communicating with the assigned at least one second server to download, to the end user device, the content with at least one DRM license supported by the at least one user device.
摘要:
A method and apparatus for managing user devices and contents with quick response (QR) codes. An image of a QR code displayed on a user terminal is captured; the captured image of the QR code is analyzed, and a domain registration request message is generated based on the QR code; and the domain registration request message is transmitted to a domain server, and a domain registration response message is received from the domain server.
摘要:
Provided are a method of tracing a device key in a user key management system using a hierarchical hash chain broadcast encryption scheme (HBES) algorithm, a user key management system for executing the method of tracing a device key, and a computer program for executing the method of tracing a device key. The method of tracing a device key of an illegal decoder in a user key management system for broadcast encryption includes: tracing a device key using a binary search; and revoking the traced device key. The technology according to the present invention can be applied to prevent exposure of the device keys to hacking. The present invention provides a method of tracing which can be applied to an HBES algorithm structure.
摘要:
An encryption-based security protection method and apparatus are provided. The method includes generating a random key pattern table in order to allocate a plurality of random key patterns of original data to be transmitted; generating an address pattern table in order to allocate a plurality of address patterns of addresses in which the original data is stored; and generating a mapping table in order to map the plurality of random key patterns and the plurality of address patterns. The apparatus includes an address pattern table generation unit; a random key pattern table generation unit; a mapping table generation unit; and an internal memory unit which stores the address pattern table, the random key pattern table, and the mapping table.