摘要:
A method of encrypting metadata that can be represented by a tree structure. The method involves generating an encryption key for a predetermined node of the metadata using a function that takes as input parameters an encryption key for an upper node of the predetermined node and information specifying the predetermined node, and encrypting data of the predetermined node using the generated encryption key.
摘要:
An apparatus and method to encrypt data having hierarchical information are provided. The apparatus includes an N-th layer key generator, which generates an N-th layer key, an (N+1)-th layer key generator, which generates an (N+1)-th layer key by applying the N-th layer key to a predetermined function, an N-th layer data encryptor, which encrypts N-th layer data using the N-th layer key, and an (N+1)-th layer data encryptor, which encrypts (N+1)-th layer data using the (N+1)-th layer key.
摘要:
A multimedia device having an encryption module, which prevents an encryption key from being exposed to the outside, is provided. The multimedia device includes: a key processing unit, which generates and manages an encryption key; and a data processing unit, which encrypts/decrypts content with the encryption key. Both the key processing unit and the data processing unit are located in the encryption module. The encryption module can generate an encryption key and encrypt content with the encryption key, independently of an external device, such as a CPU. In addition, the encryption module encrypts the encryption key before transmitting the encryption key to the CPU to record the encryption key on a storage medium. Therefore, it is possible to protect the content and the encryption key from hacking threats by preventing the encryption key from being exposed to the outside of the encryption module.
摘要:
Provided are an apparatus and method for storing data. The apparatus includes a directory key generator generating a directory key required for encrypting and decrypting the data by inputting a device-specific key to a key generating function, the device-specific key being unique information allocated to the device and stored in a secure region of the device. The data is stored in at least one directory, and the directory key is used in encrypting and decrypting the data in units of directories. Accordingly, it is possible to minimize consumption of resources required to encrypt and decrypt the data.
摘要:
A method and apparatus for changing codecs to reproduce video and/or audio data streams are provided. The method and apparatus are capable of seamlessly reproducing video and/or audio data streams encoded with two or more different codecs when a change of codecs occurs by determining in advance the start position of a program element at which a change of codecs occurs among video and/or data streams stored in buffers using information regarding a change of codecs included in a data packet and changing the codec used for decoding at the moment when the program element at which the change of codec occurs is first decoded.
摘要:
A system to output an icon in response to a hot-key input, including a microcomputer to sense an instruction input through a hot-key and to output a scan code corresponding to the instruction, a keyboard launcher to receive the scan code from the microcomputer, to analyze the scan code, and to generate a message that requests an output of a hot-key icon indicating the operation of the hot-key based on the analyzed scan code, a system basic input/output system (BIOS) to provide information required to output the hot-key icon, and a display manager to receive the message generated by the keyboard launcher and to output the hot-key icon based on the information received from the system BIOS.
摘要:
Provided is a method of booting an electronic device including a host central processing unit (CPU) and a security module. The method includes: the host CPU starting to boot a system by using boot information in response to a reset or power on event of the electronic device; and when an authentication start instruction is not received by the security module from the host CPU until a first predetermined period elapses after an occurrence of the reset or power on event of the electronic device, controlling an operation of the host CPU by the security module. According to the method, when the authentication start instruction is received before the first predetermined period elapses, the security module authenticates the boot information and controls the operation of the host CPU based on an authentication result. A method of authenticating a boot of the electronic device in the security module is also provided.
摘要:
A system to output an icon in response to a hot-key input, including a microcomputer to sense an instruction input through a hot-key and to output a scan code corresponding to the instruction, a keyboard launcher to receive the scan code from the microcomputer, to analyze the scan code, and to generate a message that requests an output of a hot-key icon indicating the operation of the hot-key based on the analyzed scan code, a system basic input/output system (BIOS) to provide information required to output the hot-key icon, and a display manager to receive the message generated by the keyboard launcher and to output the hot-key icon based on the information received from the system BIOS.
摘要:
A constant voltage generator of a semiconductor device includes an oscillator for generating an AC signal, a charge pump for pumping charge from a power voltage supply line by a predetermined pumping ratio in accordance with the AC signal of the oscillator, a charge storage capacitor for storing the pumped charge, and a voltage limiter for limiting the voltage across the charge storage capacitor at a predetermined voltage level, then outputting a constant voltage. According to the present invention, the charge of the storage capacitor is quickly stored, a constant voltage is obtained independent of a power source voltage, and the reference voltage output can be greater than the power source voltage.
摘要:
A security method and a security apparatus are disclosed which use a self-generated encryption key. The security method includes the steps of: generating an encryption key; decrypting pre-encrypted data using a pre-stored manufacturer key; and re-encrypting the decrypted data using the encryption key. The security method and apparatus minimize external leakage of data by self-generating the unique encryption key. Since the encryption keys are unique in each set, set binding is possible.