Patents Assigned to Korea Information Security Agency
  • Patent number: 8023510
    Abstract: The present invention relates to a method of efficiently managing dynamic multicast groups. In the method of efficiently managing dynamic multicast groups a hierarchical structure is used as a network structure for a multicast service. Accordingly, there are advantages in that groups can be merged or divided efficiently and overload depending on group management can be reduced.
    Type: Grant
    Filed: May 12, 2009
    Date of Patent: September 20, 2011
    Assignee: Korea Information Security Agency
    Inventors: Mi Y. Yoon, Seung G. Ji, Hyun C. Jeong, Yoo J. Won
  • Patent number: 7864961
    Abstract: The present invention relates to a method of managing a mobile multicast key using a foreign key. More specifically, the present invention relates to a method of managing a mobile multicast key using a foreign key for secure communication between a mobile terminal and a secure relay server in the region where microwaves from plural access points overlap. A method of managing a mobile multicast key using a foreign key according to the present invention has an advantage that multicast secure relay servers perform delegated authentication in advance in a region where microwaves overlap, thus reducing a delay time for authentication in a mobile terminal and it has an advantage that it can minimize an effect from changes in group keys that user's movement make, by using a primary group key and a foreign key. This results in a reduction of an overhead from update of a group key while moving, and accordingly a reduction of a delay time.
    Type: Grant
    Filed: November 16, 2007
    Date of Patent: January 4, 2011
    Assignee: Korea Information Security Agency
    Inventors: Yoo Jae Won, Mi Youn Yoon, Seung Goo Ji, Kyu Cheol Oh
  • Publication number: 20100290462
    Abstract: The present invention relates to a method of efficiently managing dynamic multicast groups. In the method of efficiently managing dynamic multicast groups a hierarchical structure is used as a network structure for a multicast service. Accordingly, there are advantages in that groups can be merged or divided efficiently and overload depending on group management can be reduced.
    Type: Application
    Filed: May 12, 2009
    Publication date: November 18, 2010
    Applicant: Korea Information Security Agency
    Inventors: Mi Youn Yoon, Seung Goo Ji, Hyun Cheol Jeong, Yoo Jae Won
  • Publication number: 20100162350
    Abstract: The present invention relates to a security system of managing IRC and HTTP botnets and a method therefor. More specifically, the present invention relates to a system and a method that detects a botnet in an Internet service provider network to store information related to the detected botnet in a database and performs security management of IRC and HTTP botnets, including a botnet management security management (BMSM) system, configured to visualize the information related to the detected botnet and establish an against policy related to the detected botnet.
    Type: Application
    Filed: August 20, 2009
    Publication date: June 24, 2010
    Applicant: Korea Information Security Agency
    Inventors: Hyun Cheol JEONG, Chae Tae IM, Seung Goo JI, Sang Kyun NOH, Joo Hyung OH
  • Publication number: 20100154057
    Abstract: The present invention relates to a Session Initiation Protocol (SIP) intrusion detection and response architecture for protecting SIP-based services, and more specifically, to an SIP intrusion detection and response architecture for protecting SIP-based services, in which SIP-based attacks of a new type can be coped with by detecting the SIP-based attacks and SIP traffic anomalies and managing an SIP-aware security device without degrading quality of multimedia, and signal and media channels can be examined through an SIP-aware intrusion prevention system (IPS) for the purpose of preventing an attacker from hindering a call through manipulation of an SIP message and session-hijacking among legitimate users and attempting a toll fraud by detouring authentication.
    Type: Application
    Filed: January 14, 2009
    Publication date: June 17, 2010
    Applicant: Korea Information Security Agency
    Inventors: Kyoung Hee KO, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, HyunCheol Jeong
  • Publication number: 20080130547
    Abstract: The present invention relates to a delegated authentication method for secure mobile multicasting. More specifically, the present invention relates to a delegated authentication method for secure mobile multicasting in which, when a mobile terminal in a wireless area moves from one network to another, the mobile terminal receives beacon information from an access point (AP) and the multicast secure relay server of the mobile terminal requests the multicast secure relay server controlling the access point to delegated-authenticate the mobile terminal, and after the multicast secure relay server which has received the request makes delegated-authentication, the multicast secure relay server encrypts data using the group key which the mobile terminal used before moving.
    Type: Application
    Filed: December 4, 2007
    Publication date: June 5, 2008
    Applicant: KOREA INFORMATION SECURITY AGENCY
    Inventors: Yoo Jae Won, Mi Youn Yoon, Seung Goo Ji, Kyu Cheol Oh
  • Publication number: 20080123856
    Abstract: The present invention relates to a method of managing a mobile multicast key using a foreign key. More specifically, the present invention relates to a method of managing a mobile multicast key using a foreign key for secure communication between a mobile terminal and a secure relay server in the region where microwaves from plural access points overlap. A method of managing a mobile multicast key using a foreign key according to the present invention has an advantage that multicast secure relay servers perform delegated authentication in advance in a region where microwaves overlap, thus reducing a delay time for authentication in a mobile terminal. And it has an advantage that it can minimize an effect from changes in group keys that user's movement make, by using a primary group key and a foreign key. This results in a reduction of an overhead from update of a group key while moving, and accordingly a reduction of a delay time.
    Type: Application
    Filed: November 16, 2007
    Publication date: May 29, 2008
    Applicant: KOREA INFORMATION SECURITY AGENCY
    Inventors: Yoo Jae Won, Mi Youn Yoon, Seung Goo Ji, Kyu Cheol Oh
  • Publication number: 20080127338
    Abstract: The present invention relates to a system and a method for preventing an attack of a malicious program spread using a web technology comprising a malicious code distribution site detection server comprising a malicious code distribution site detector for detecting a malicious code distribution site, and a prevention message transmitter for transmitting a prevention message to a routing configuration server, wherein the prevention message includes an IP address of the malicious code distribution site detected by the malicious code distribution site detector; a plurality of routers including a virtual IP address; and the routing configuration server for advertising the IP address of the malicious code distribution site such that a routing path of a packet having the IP address of the malicious code distribution site as a target address or an starting address is guided to the virtual IP address according to an reception of the prevention message to block a connection to the malicious code distribution site.
    Type: Application
    Filed: October 25, 2006
    Publication date: May 29, 2008
    Applicant: KOREA INFORMATION SECURITY AGENCY
    Inventors: Bumrae CHO, Kwanhee HONG, Myeongseok CHA, Wontae SIM, Woohan KIM