会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明授权
    • Log-based traceback system and method using centroid decomposition technique
    • 基于Log的追溯系统和使用重心分解技术的方法
    • US08307441B2
    • 2012-11-06
    • US12669633
    • 2007-11-21
    • Jong Hyun KimGeon Lyang KimSeon Gyoung SohnBeom Hwan ChangChi Yoon JeongJong Ho RyuJung Chan NaJong Soo JangSung Won Sohn
    • Jong Hyun KimGeon Lyang KimSeon Gyoung SohnBeom Hwan ChangChi Yoon JeongJong Ho RyuJung Chan NaJong Soo JangSung Won Sohn
    • G06F11/34
    • H04L45/00H04L45/12H04L63/1416H04L63/1425H04L63/1441H04L2463/146
    • There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.
    • 提供了一种通过使用质心分解技术跟踪攻击者的系统和方法,该系统包括:日志数据输入模块,从入侵检测系统收集入侵警报的日志数据; 质心节点检测模块,通过对网络管理服务器收集的网络路由器连接信息应用最短路径算法,生成最短路径树,通过应用质心分解技术检测质心节点,去除叶节点到最短路径树,并生成 每个级别的节点是检测到的质心节点的质心树; 以及回溯处理模块,请求与质心树的每个级别的节点匹配的路由器的日志数据,并且通过比较来跟踪与收集的入侵警报器的日志数据相同的路由器作为连接到攻击者的源的路由器 路由器的日志数据与收集的入侵报警的日志数据。 根据系统和方法,可以快速地检测到导致安全入侵事件的攻击者,系统上的负载减少,并且易于识别暴露于危险或具有弱点的通道主机,从而容易地应对攻击。
    • 52. 发明授权
    • Network status display device and method using traffic pattern map
    • 网络状态显示设备和使用流量模式图的方法
    • US07849187B2
    • 2010-12-07
    • US11527850
    • 2006-09-26
    • Beom Hwan ChangJung Chan NaGeon Lyang KimDong Young KimJin Oh KimHyun Joo KimHyo Chan BangSoo Hyung LeeSeon Gyoung ShonJong Soo JangSung Won Sohn
    • Beom Hwan ChangJung Chan NaGeon Lyang KimDong Young KimJin Oh KimHyun Joo KimHyo Chan BangSoo Hyung LeeSeon Gyoung ShonJong Soo JangSung Won Sohn
    • G06F15/16
    • H04L43/028H04L43/062H04L43/16H04L63/1408
    • A network status display device using a traffic pattern map is provided. The device includes: a traffic feature extractor extracting a port number of a port having the maximum occupancy of micro-flows and macro-flows for each network address section and host address section with reference to traffic information collected by an external traffic information collector, calculating and storing an occupancy rate of the port; a traffic status display unit making a network traffic pattern map expressed by destination-source network addresses and a host traffic pattern map expressed by destination-source host addresses and displaying the port information stored in the traffic feature extractor on the network traffic pattern map and the host traffic pattern map; and a traffic anomaly determination unit determining whether a network status is abnormal with reference to the network traffic pattern map and the host traffic pattern map and detecting and reporting a harmful or abnormal traffic which causes the abnormal network status. The device can determine whether the anomaly deteriorating the network performance exists and can easily and quickly detect the harmful or abnormal traffic which causes the anomaly by the use of the port information of the port having the maximum occupancy of the micro-flows and the macro-flows for each network address section and each host address section.
    • 提供了使用业务模式图的网络状态显示设备。 该设备包括:流量特征提取器,参考由外部交通信息收集器收集的交通信息,提取每个网络地址部分和主机地址部分具有最大占用微流量和宏流量的端口的端口号,计算 并存储所述端口的占用率; 形成由目的地源网络地址表示的网络流量模式图的流量状态显示单元和由目的地 - 源主机地址表示的主机流量模式图,并且在网络流量模式图上显示存储在流量特征提取器中的端口信息,并且 主机流量模式图; 以及流量异常判定单元,基于网络流量模式图和主机流量模式图来判断网络状态是否异常,并检测并报告导致异常网络状态的有害或异常流量。 该设备可以确定异常是否存在网络性能恶化,并可以通过使用具有微流量最大占用端口的端口信息和宏观流量来轻松快速地检测导致异常的有害或异常流量, 每个网络地址部分和每个主机地址部分的流程。
    • 53. 发明授权
    • Network system and communication methods for securely bootstraping mobile IPv6 mobile node using pre-shared key
    • 使用预共享密钥安全地引导移动IPv6移动节点的网络系统和通信方法
    • US07840811B2
    • 2010-11-23
    • US11635181
    • 2006-12-07
    • Jae Hoon NahHyeok Chan KwonJong Soo Jang
    • Jae Hoon NahHyeok Chan KwonJong Soo Jang
    • H04L9/00H04L9/32G06F11/00
    • H04L9/0844H04L9/321H04L61/203H04L61/6059H04L63/0272H04L63/062H04L63/08H04L63/0892H04L63/164H04L2209/80H04L2463/061H04W12/04H04W12/06H04W80/04
    • Provided is a network system using diameter authentication, authorization and accounting (AAA) infrastructure to support the bootstrapping of a Mobile Internet Protocol version 6 (IPv6) mobile node. The network system includes a mobile node equipped with Mobile IPv6, an attendant which is accessed by the mobile node when the mobile node moves toward a new network, an AAA local server which supports AAA processes for the mobile node in a local network, an AAA home server which supports AAA processes for the mobile node in a home network, and supports initial settings during the bootstrapping of the mobile node, and a home agent which handles binding update (BU) and binding acknowledgement (BA) regarding the mobile node. The AAA home server can configure initial settings for the mobile node that is authenticated by the AAA local server so that the mobile node can be effectively bootstrapped. Then, the AAA home server can distribute an IPsec SA to the mobile node and a home agent, and perform BU and BA based on the initial settings.
    • 提供了一种使用直径认证,授权和计费(AAA)基础设施来支持移动互联网协议版本6(IPv6)移动节点的引导的网络系统。 该网络系统包括移动节点,该移动节点配备有移动IPv6,当移动节点向新网络移动时被移动节点接入的话务员,支持本地网络中的移动节点的AAA进程的AAA本地服务器,AAA 家庭服务器,其支持归属网络中的移动节点的AAA进程,并且在移动节点的引导期间支持初始设置,以及处理关于移动节点的绑定更新(BU)和绑定确认(BA)的归属代理。 AAA家庭服务器可以配置由AAA本地服务器认证的移动节点的初始设置,从而可以有效地引导移动节点。 然后,AAA家庭服务器可以将IPsec SA分发到移动节点和归属代理,并且基于初始设置来执行BU和BA。
    • 55. 发明申请
    • LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE
    • 基于LOG的跟踪系统和使用中心分解技术的方法
    • US20100212013A1
    • 2010-08-19
    • US12669633
    • 2007-11-21
    • Jong Hyun KimGeon Lyang KimSeon Gyoung SohnBeom Hwan ChangChi Yoon JeongJong Ho RyuJung Chan NaJong Soo JangSung Won Sohn
    • Jong Hyun KimGeon Lyang KimSeon Gyoung SohnBeom Hwan ChangChi Yoon JeongJong Ho RyuJung Chan NaJong Soo JangSung Won Sohn
    • G06F11/34
    • H04L45/00H04L45/12H04L63/1416H04L63/1425H04L63/1441H04L2463/146
    • There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.
    • 提供了一种通过使用质心分解技术跟踪攻击者的系统和方法,该系统包括:日志数据输入模块,从入侵检测系统收集入侵警报的日志数据; 质心节点检测模块,通过对网络管理服务器收集的网络路由器连接信息应用最短路径算法,生成最短路径树,通过应用质心分解技术检测质心节点,去除叶节点到最短路径树,并生成 每个级别的节点是检测到的质心节点的质心树; 以及回溯处理模块,请求与质心树的每个级别的节点匹配的路由器的日志数据,并且通过比较来跟踪与收集的入侵警报器的日志数据相同的路由器作为连接到攻击者的源的路由器 路由器的日志数据与收集的入侵报警的日志数据。 根据系统和方法,可以快速地检测到导致安全入侵事件的攻击者,系统上的负载减少,并且易于识别暴露于危险或具有弱点的通道主机,从而容易地应对攻击。
    • 57. 发明授权
    • Method and apparatus for distinguishing obscene video using visual feature
    • 使用视觉特征区分淫秽视频的方法和装置
    • US07773809B2
    • 2010-08-10
    • US11442565
    • 2006-05-26
    • Seung Min LeeTaek Yong NamJong Soo JangHo Gyun Lee
    • Seung Min LeeTaek Yong NamJong Soo JangHo Gyun Lee
    • G06K9/00G06K9/46G06K9/62G10L15/06G04H60/32
    • G06K9/00711G06K9/4652
    • A method and apparatus for generating discriminant functions for distinguishing obscene videos by using visual features of video data, and a method and apparatus for determining whether videos are obscene by using the generated discriminant functions, are provided. The method of generating discriminant functions includes: creating a first frame set by extracting a predetermined number of frames for each video data unit from a group of video data classified as obscene or non-obscene, and creating a second frame set by selecting the frames; generating a frame based discriminant function by extracting visual features of frames of the second frame set, and then generating a first discriminant value by determining whether each frame of the first frame set contains obscene video data; generating a group frame based discriminant function by extracting visual features of a group of frames of the first frame set, and then generating a second discriminant value by determining whether the frames of the group contain obscene video data; and generating a synthetic discriminant function by using the first and second discriminant values as a representative value of the video data. Accordingly, obscene video data stored in a computer system can be automatically and accurately distinguished.
    • 提供一种用于通过使用视频数据的视觉特征来产生用于区分淫秽视频的判别函数的方法和装置,以及用于通过使用所生成的判别函数来确定视频是淫秽的方法和装置。 产生判别函数的方法包括:通过从分类为淫秽或非淫秽的一组视频数据中提取每个视频数据单元的预定数量的帧来创建第一帧集合,并通过选择帧来创建第二帧集合; 通过提取第二帧集合的帧的视觉特征,生成基于帧的判别函数,然后通过确定第一帧集合的每个帧是否包含淫秽视频数据来生成第一判别值; 通过提取第一帧集合的帧组的视觉特征,生成基于组帧的判别函数,然后通过确定该组的帧是否包含淫秽视频数据来生成第二判别式值; 以及通过使用第一和第二判别值作为视频数据的代表值来产生合成判别函数。 因此,可以自动且准确地区分存储在计算机系统中的淫秽视频数据。
    • 60. 发明申请
    • ARIA encryption/decryption apparatus and method, and method of generating initialization key for the same
    • ARIA加密/解密装置和方法,以及为其生成初始化密钥的方法
    • US20070177728A1
    • 2007-08-02
    • US11634480
    • 2006-12-06
    • Sang Woo LeeYong Sung JeonKi Young KimJong Soo Jang
    • Sang Woo LeeYong Sung JeonKi Young KimJong Soo Jang
    • H04K1/06
    • H04L9/0631H04L2209/122
    • Disclosed is an Academy, Research Institute, and Agency (ARIA) encryption/decryption apparatus for encrypting and decrypting input data by repeating a plurality of rounds. The ARIA encryption/decryption apparatus includes a first register storing input data or an intermediate calculation value according to a first control signal; a second register storing a input round key for every round; an exclusive OR operation unit performing an exclusive OR operation on values stored in the first and second registers; a substitution unit substituting a result of the exclusive OR operation on a basis of an ARIA substitution algorithm; a diffusion unit diffusing a result of the substitution in the substitution unit on a basis of an ARIA diffusion algorithm if a current round is not a final round; and a control unit outputting the first control signal so that an output of the diffusion unit is used as the intermediate calculation value if the current round is the final round or an output of the substitution unit is used as the intermediate calculation value if the current round is the final round, and outputting an output of the exclusive OR operation unit as a result of the ARIA encryption/decryption.
    • 公开了一种用于通过重复多次轮加密和解密输入数据的Academy,Research Institute和Agency(ARIA)加密/解密装置。 ARIA加密/解密装置包括根据第一控制信号存储输入数据或中间计算值的第一寄存器; 存储每轮的输入循环密钥的第二寄存器; 异或运算单元对存储在第一和第二寄存器中的值执行异或运算; 替代单元基于ARIA替换算法代替异或运算的结果; 如果当前轮次不是最后一轮,则扩散单元基于ARIA扩散算法在取代单元中扩散取代的结果; 以及控制单元,如果当前轮次是最后一轮,则使用扩散单元的输出作为中间计算值,或者如果当前轮次使用替代单位的输出作为中间计算值,则输出第一控制信号 是最后一轮,并且作为ARIA加密/解密的结果输出异或运算单元的输出。