Abstract:
A method and device for securing data of a message is provided. A method for encrypting a message of a user terminal device includes: receiving a message via a message input window; displaying the received message; encrypting the message by using a key index and an encryption key corresponding to a chatting window for the message based on an instruction for transmitting the message to another chatting party being received; and transmitting the encrypted message to the other chatting party.
Abstract:
Disclosed is a server for performing authentication or identification using biometric information including basic information and detailed information includes a storage for storing basic information and detailed information that are separately encrypted for each of a plurality of users, a communicator for communicating with an external device, and a processor configured to, based on separately encrypted basic information and detailed information being received from an external terminal device through the communicator, performing user authentication or user identification for the received basic information and detailed information by decrypting and comparing the stored encrypted basic information and the received encrypted basic information, and comparing the received detailed information with at least one piece of stored detailed information corresponding to a piece of basic information having a degree of similarity that is higher than or equal to a predetermined value and with the received basic information among the stored basic information.
Abstract:
A user terminal device is provided. The user terminal device includes: a communicator; a display; and a processor configured to receive a message from another electronic device through the communicator, control the display to display the received message, and based on the received message being a multimedia message including at least one of an image, a sound, and a video by analyzing the received message, control the display to display a recommended response list based on at least one of an age or a gender of the user of the terminal corresponding to a type of content included in a multimedia message. Therefore, convenience of a user using the user terminal device is improved.
Abstract:
A method and apparatus for detecting a leak of an information resource of a device. Source code is obtained from an application and is analyzed to determine whether at least one information resource from among information resources of a device is transmittable to outside the device by tracking a task performed on the at least one information resource, thereby detecting whether the application is externally leaking an information resource from the device.
Abstract:
An electronic device is disclosed. The electronic device which is included in a home network, the device includes a sensor, a communicator comprising communication circuitry configured to communicate with an external device which is included in the home network, and a processor configured to control the communication circuitry, to encrypt first data which is initially acquired from the sensor with a first encryption algorithm and transmit the encrypted standard data to the external device, determine third data based on the first data and a second data in response to the second data being acquired from the sensor after the first data is acquired, to encrypt the third data with a second encryption algorithm and to transmit the encrypted third data to the external device.
Abstract:
Provided are a method and apparatus for effectively fixing scrambled content. The method includes checking fixing information for a program map table (PMT) packet of packets constituting the content, the fixing information being used to fix a transformed part of the content; extracting location information of a next PMT packet containing fixing data for fixing the transformed part of the content from the fixing information of the PMT packet; and fixing the transformed part of the content by using the fixing data in the next PMT packet indicated by the extracted location information. Accordingly, it is possible to easily detect a location of the content, which stores the fixing information, thereby expediting fixing of the transformed content.
Abstract:
A method and apparatus for detecting a leak of an information resource of a device. Source code is obtained from an application and is analyzed to determine whether at least one information resource from among information resources of a device is transmittable to outside the device by tracking a task performed on the at least one information resource, thereby detecting whether the application is externally leaking an information resource from the device.
Abstract:
A method of controlling transmission of content data includes establishing a communication channel with an external device; transmitting the content data through the communication channel to the external device; verifying a plurality of times whether the content data is transmitted to the external device within an acceptable transmission range to generate a verification result; and determining whether to continue transmitting the content data according to the verification result. The verification is periodically performed according to an amount of the content data to be transmitted.