Abstract: The present disclosure relates to a firmware updating method using a low-power wireless network, and more specifically, to a firmware updating method using a low-power wireless network, which is designed to upgrade a firmware installed on a terminal installed in a vehicle, such as a navigation system, by using a low-power wireless network.
Abstract: An integrated one-chip security module for a smart energy security threat response included in an intelligent smart meter constituting a smart energy system includes: a first core unit collecting measured data generated in an operation process of the smart energy system and stores the measured data in a security memory; and a second core unit encrypting the measured data stored in the security memory and transmitting the encrypted data to an external device.
Abstract: An integrated one-chip security module for a smart energy security threat response included in an intelligent smart meter constituting a smart energy system includes: a first core unit collecting measured data generated in an operation process of the smart energy system and stores the measured data in a security memory; and a second core unit encrypting the measured data stored in the security memory and transmitting the encrypted data to an external device.
Abstract: Provided are a system and method for authenticating a device through an Internet of Things (IoT) cloud by using a hardware security module. The system includes an IoT device connectable to a cloud which provides an IoT service and a security module connected to the IoT device and configured to generate a pair of public and private keys for authenticating the IoT device. The IoT device transmits a certificate generation request including the public key and a device identifier to an authentication server through the cloud in order to generate a device certificate.
Abstract: Provided are a system and method for providing an Internet of Things (IoT) security service using a hardware security module. The system includes a host device configured to transmit a security service request by calling a security service application programming interface (API) and a security module configured to convert the security service request into a security execution request and execute the security execution request by calling a security API. According to the call of the security API, the security module converts the security execution request into a request to execute a security algorithm executable by at least one of a security element and a security storage.
Abstract: The present disclosure relates to a firmware updating method using a low-power wireless network, and more specifically, to a firmware updating method using a low-power wireless network, which is designed to upgrade a firmware installed on a tennillal installed in a vehicle, such as a llavigation system, by using a low-power wireless network.
Abstract: Provided are a system and method for providing an Internet of Things (IoT) security service using a hardware security module. The system includes a host device configured to transmit a security service request by calling a security service application programming interface (API) and a security module configured to convert the security service request into a security execution request and execute the security execution request by calling a security API. According to the call of the security API, the security module converts the security execution request into a request to execute a security algorithm executable by at least one of a security element and a security storage.
Abstract: Provided are a system and method for authenticating a device through an Internet of Things (IoT) cloud by using a hardware security module. The system includes an IoT device connectable to a cloud which provides an IoT service and a security module connected to the IoT device and configured to generate a pair of public and private keys for authenticating the IoT device. The IoT device transmits a certificate generation request including the public key and a device identifier to an authentication server through the cloud in order to generate a device certificate.