-
公开(公告)号:US11038901B2
公开(公告)日:2021-06-15
申请号:US16212083
申请日:2018-12-06
Applicant: Samsung Electronics Co., Ltd.
Inventor: Jungil Cho , Iljoo Kim , Hyunwoo Kim , Daesung Choi
Abstract: A server is provided. The server includes a communication interface configured to communicate with an electronic apparatus connected to an Internet of things (IoT) device, a storage configured to store a scenario about an attack received by the IoT device from an external apparatus by stages and information relating to a malicious code corresponding to the scenario, and a processor configured to, based on the IoT device being attacked by the external apparatus over at least one step through the electronic apparatus, receive, from the electronic apparatus, an alert for an attack received by stages, and to identify information relating to a malicious code corresponding to at least one alert received from the electronic apparatus based on the pre-stored scenario.
-
公开(公告)号:US11457362B2
公开(公告)日:2022-09-27
申请号:US17057848
申请日:2019-05-28
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Jungil Cho , Soonhong Kwon , Hyunwoo Kim , Minkyu Song , Jongsung Lee , Joonghwan Lee , Yongsu Chung , Daesung Choi
IPC: G06F21/00 , H04W12/122 , H04W12/73 , H04W12/61 , H04W12/02
Abstract: A method of identifying a malicious access point (AP) by a terminal apparatus includes obtaining first performance information related to hardware of a first AP based on a first beacon signal received from the first AP, comparing the first performance information with previously stored second performance information of a second AP, and determining whether the first AP is a malicious AP, based on a result of the comparing.
-
公开(公告)号:US11425568B2
公开(公告)日:2022-08-23
申请号:US16712502
申请日:2019-12-12
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Hosun Lee , Junbum Shin , Jungil Cho
IPC: G06F21/00 , H04W12/122 , H04L9/40 , H04L67/02 , H04W88/08 , H04W12/082 , H04W12/108
Abstract: Disclosed are an electronic device capable of verifying security of a Wi-Fi network and a controlling method thereof. To be specific, the electronic device, in response to the received user command, obtains, through a first channel, first information related to an address of the website, and obtains, from a server providing the website through a second channel, second information related to the address of the website, based on the first information and the second information being identical, maintains communication with the server through the first channel, and based on the first information and the second information being different, terminates the communication with the server through the first channel or communicate with the server through the first channel according to the second information.
-
公开(公告)号:US12133080B2
公开(公告)日:2024-10-29
申请号:US17949711
申请日:2022-09-21
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Jungil Cho , Soonhong Kwon , Hyunwoo Kim , Minkyu Song , Jongsung Lee , Joonghwan Lee , Yongsu Chung , Daesung Choi
IPC: G06F21/00 , H04W12/02 , H04W12/122 , H04W12/61 , H04W12/73
CPC classification number: H04W12/122 , H04W12/02 , H04W12/61 , H04W12/73
Abstract: A method of identifying a malicious access point (AP) by a terminal apparatus includes obtaining first performance information related to hardware of a first AP based on a first beacon signal received from the first AP, comparing the first performance information with previously stored second performance information of a second AP, and determining whether the first AP is a malicious AP, based on a result of the comparing.
-
公开(公告)号:US20190182271A1
公开(公告)日:2019-06-13
申请号:US16212083
申请日:2018-12-06
Applicant: Samsung Electronics Co., Ltd.
Inventor: Jungil Cho , Iljoo Kim , Hyunwoo Kim , Daesung Choi
Abstract: A server is provided. The server includes a communication interface configured to communicate with an electronic apparatus connected to an Internet of things (IoT) device, a storage configured to store a scenario about an attack received by the IoT device from an external apparatus by stages and information relating to a malicious code corresponding to the scenario, and a processor configured to, based on the IoT device being attacked by the external apparatus over at least one step through the electronic apparatus, receive, from the electronic apparatus, an alert for an attack received by stages, and to identify information relating to a malicious code corresponding to at least one alert received from the electronic apparatus based on the pre-stored scenario.
-
-
-
-