Abstract:
An electronic apparatus is provided. The electronic apparatus which executes at least one application to perform a function using personal information includes a storage configured to store the personal information, where information related to protection of the personal information is set for each application and a processor configured to, in response to receiving a request for the personal information from the application, determine whether to protect the personal information based on the set information, to encrypt the personal information and to provide the encrypted personal information to the application based on the determination result, and in response to receiving an execution request with respect to a function related to encrypted personal information from the application, the processor is further configured to decrypt the encrypted personal information and to execute the function. Accordingly, a user may use a service normally even after setting protection of personal information and prevent the personal information from being leaked.
Abstract:
An encryption apparatus includes a setting generator configured to generate an increasing function parameter regarding a predetermined one-way increasing function and a secret key necessary for encryption, and an encryptor configured to generate a first order-preserving encryption area regarding a plaintext using the one-way increasing function where the increasing function parameter is applied, generate a second encryption area regarding the plain text using the secret key, and generate a ciphertext by concatenating the generated first encryption area and the generated second encryption area.
Abstract:
A method and apparatus for authorizing a host to access a portable storage device and a method and apparatus of providing information for authorizing a host to access a portable storage device. The method includes: verifying integrity of host software requesting to transmit data; determining whether the host is authorized to access the portable storage device; and determining whether the host software is authorized to access the portable storage device. Accordingly, user information may be stored on the portable storage device and moved with security.