会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Web-based traceback system and method using reverse caching proxy
    • 基于Web的追溯系统和使用反向缓存代理的方法
    • US08341721B2
    • 2012-12-25
    • US12467462
    • 2009-05-18
    • Jong Hyun KimGeon Lyang KimJong Ho RyuChi Yoon JeongSeon Gyoung SohnBeom Hwan ChangJung-Chan NaHyun Sook Cho
    • Jong Hyun KimGeon Lyang KimJong Ho RyuChi Yoon JeongSeon Gyoung SohnBeom Hwan ChangJung-Chan NaHyun Sook Cho
    • G06F15/16G06F15/173
    • H04L67/22H04L63/0281H04L63/1441H04L67/2857
    • Provided are a web-based traceback system and method using reverse caching proxy, which can effectively protect a web server against various attacks launched by illegitimate user by acquiring network information and location information of users who attempt to access the web server through an anonymous server, without a requirement of installing any agent program in the users' clients. The web-based traceback system may include a reverse caching proxy server receiving a hypertext transfer protocol (HTTP) packet transmitted to a web server by a client, analyzing the header of the HTTP packet and determining whether the client has attempted to access the web server through an anonymous server based on the results of the analysis; and a web tracking server generating a response page for the HTTP packet upon receiving the results of the determination performed by the reverse caching proxy server, inserting a tracking code in the response page, and providing the response page to the client through the reverse caching proxy server, wherein the tracking code is automatically executed in a web browser of the client and thus provides network information of the client to the web tracking server.
    • 提供了一种使用反向缓存代理的基于web的追溯系统和方法,可以通过获取尝试通过匿名服务器访问Web服务器的用户的网络信息和位置信息,有效地保护Web服务器免受非法用户发起的各种攻击, 而不需要在用户的客户端中安装任何代理程序。 基于web的追溯系统可以包括反向高速缓存代理服务器,其接收由客户端发送到web服务器的超文本传输​​协议(HTTP)分组,分析HTTP分组的报头并确定客户端是否尝试访问web服务器 通过匿名服务器根据分析结果; 以及网页跟踪服务器,在接收到反向高速缓存代理服务器执行的确定结果时,为HTTP分组生成响应页面,在响应页面中插入跟踪代码,并通过反向缓存代理向客户端提供响应页面 服务器,其中跟踪代码在客户端的web浏览器中自动执行,从而将该客户端的网络信息提供给web跟踪服务器。
    • 3. 发明申请
    • GIS BASED NETWORK INFORMATION MONITORING-SYSTEM
    • 基于GIS的网络信息监控系统
    • US20100030892A1
    • 2010-02-04
    • US12471005
    • 2009-05-22
    • Chi Yoon JeongBeom Hwan ChangSeon Gyoung SohnGeon Lyang KimJong Hyun KimJong Ho RyuJung Chan NaHyun Sook Cho
    • Chi Yoon JeongBeom Hwan ChangSeon Gyoung SohnGeon Lyang KimJong Hyun KimJong Ho RyuJung Chan NaHyun Sook Cho
    • G06F15/173
    • H04L63/1416H04L63/1441
    • Disclosed is a GIS based network information monitoring system that intuitively combines GIS based geographic information with traffic information and a security event, expresses the combined geographic information on a display, and does not need position calibration of network information when the traffic information and the security event are expressed. The GIS based network information monitoring system includes: a geographic information processing module receiving network information from an external network device, containing GIS based geographic information, and creating geographic information corresponding to location information in response to the location information; and a network information processing module mapping the network information to geographic information corresponding to the location information to express the mapped network information, connecting an attack site of a packet causing a security problem, an intermediate site, and a target site using lines, and intuitively expressing the network information by varying the widths and colors of the lines according to the attack type and danger level of the packet.
    • 公开了一种基于GIS的网络信息监控系统,其将基于GIS的地理信息与交通信息和安全事件直观结合,在显示器上表示组合的地理信息,并且当交通信息和安全事件不需要网络信息的位置校准 被表达。 基于GIS的网络信息监控系统包括:地理信息处理模块,从外部网络设备接收包含GIS的地理信息的网络信息,并响应于位置信息创建与位置信息对应的地理信息; 以及网络信息处理模块,将网络信息映射到与位置信息对应的地理信息,以表示映射的网络信息,使用线连接引起安全问题的分组的攻击位置,中间站点和目标站点,并且直观地 通过根据分组的攻击类型和危险等级改变线路的宽度和颜色来表达网络信息。
    • 6. 发明授权
    • Method and apparatus for masking privacy area of image
    • 屏蔽图像隐私区域的方法和装置
    • US08666110B2
    • 2014-03-04
    • US12907562
    • 2010-10-19
    • Jang Hee YooGeon Woo KimJong Wook HanHyun Sook Cho
    • Jang Hee YooGeon Woo KimJong Wook HanHyun Sook Cho
    • G06K9/00
    • H04N7/18G06T1/00
    • Disclosed are a method and apparatus for masking a privacy area of an image. The method for masking a privacy area of an image includes: detecting a privacy area required to be protected in an image; and performing masking on the image. An important area (a face area of a person, a number plate area of a vehicle, a window area of a house, etc.) detected from an image inputted through a CCTV camera can be effectively and easily encrypted, scrambled, decoded, and descrambled. Also, the position of the important area detected before or after the important area is scrambled can be maintained to be consistent without having to use a metadata file. In addition, a scrambling algorithm of the same key value can be applicable regardless of the size of the important area. As a result, the system efficiency can be enhanced by effectively protecting personal information compared with a CCTV-based video security system.
    • 公开了一种用于屏蔽图像的隐私区域的方法和装置。 用于屏蔽图像的隐私区域的方法包括:检测图像中需要保护的隐私区域; 并对图像执行遮蔽。 从通过CCTV摄像机输入的图像检测到的重要区域(人的面部区域,车辆的车牌区域,房屋的窗户区域等)可以被有效且容易地加密,加扰,解码和 解扰了 此外,在重要区域之前或之后检测到的重要区域的位置被加扰可以保持一致,而不必使用元数据文件。 此外,无论重要区域的大小如何,都可以应用相同键值的加扰算法。 因此,与基于CCTV的视频安全系统相比,通过有效保护个人信息可以提高系统效率。
    • 7. 发明授权
    • Key establishment method and system using commutative linear function
    • 关键建立方法和系统使用交换线性函数
    • US07715556B2
    • 2010-05-11
    • US11449405
    • 2006-06-08
    • Ku Young ChangDo Won HongHyun Sook ChoKyo Il Chung
    • Ku Young ChangDo Won HongHyun Sook ChoKyo Il Chung
    • G06F21/20
    • H04L9/0841
    • Provided are a key establishment method and system using commutative linear functions. In the method, a server defines a set of linear functions that use elements of a first finite field as coefficients and satisfy a commutative rule, selects a first linear function from the set, and selects a predetermined element from a second finite field. Next, the server selects a second linear function corresponding to each of nodes from the set, generates a predetermined combination function based on the first and second linear functions, generates a value of the second linear function using the selected element as a factor, and transmits the combination function and the value of the second linear function to a corresponding node. Each node receives the value of the second linear function from a server, exchanges the received values with the other nodes, computes a value using the exchanged value as a factor of the combination function, and establishes the computed value as a shared key between the nodes. Therefore, each node can perform key establishment with a small amount of computation and low memory consumption, while guaranteeing end-to-end security.
    • 提供了一种使用交换线性函数的关键建立方法和系统。 在该方法中,服务器定义一组线性函数,其使用第一有限域的元素作为系数并满足可交换规则,从集合中选择第一线性函数,并从第二有限域中选择预定元素。 接下来,服务器从集合中选择对应于每个节点的第二线性函数,基于第一和第二线性函数生成预定的组合函数,使用所选择的元素作为因子生成第二线性函数的值,并且发送 组合函数和第二个线性函数的值对应一个节点。 每个节点从服务器接收第二线性函数的值,与其他节点交换接收的值,使用交换的值作为组合函数的因子计算值,并将计算值建立为节点之间的共享密钥 。 因此,每个节点可以执行少量计算和低内存消耗的密钥建立,同时保证端到端的安全性。