Abstract:
A surveillance video transmission apparatus, includes a video input unit configured to collect physical videos and make the collected physical videos informative; a video analysis unit configured to analyze content of the collected video by recognizing the collected video and detecting an event; and an encryption selection unit configured to select one of a non-encryption mode, a regions-of-interest encryption mode and a full video encryption mode based on the analysis result of the collected video. Further, the surveillance video transmission apparatus includes a video process unit configured to perform one of a non-encryption, a regions-of-interest encryption and a full video encryption and encoding on the collected video according to the selected encryption mode; and a video transmission unit configured to transmit the encoded video and encryption-related information to a surveillance video receiving apparatus.
Abstract:
Provided is an apparatus and a method for partial monitoring of an optical fiber, wherein the optical fiber monitoring apparatus includes a monitoring light transmitter to continuously output a monitoring light to the optical fiber based on a number of measuring time sections generated by dividing an optical fiber monitoring time section, a monitoring light receiver to receive a monitoring light fed back from the optical fiber, measure a monitoring light received based on different measuring time sections for each monitoring light, and store a result of the measuring in a storage medium, and an optical fiber monitor to monitor a status of the optical fiber based on the result of the measuring stored in the storage medium.
Abstract:
A method for authenticating a mobile device, the method comprising: detecting an external input to the mobile device; when the external input is detected, displaying a screen lock pattern having at least two or more pattern points, each pattern point having an identifier; determining whether a touch input is conducted on the at least two or more pattern points in an UI (User Interface) locked state of the mobile device; and when the touch input conducted on the at least two or more pattern points is successively made in a preset sequenced combination of identifiers, unlocking the locked state of the mobile device.
Abstract:
A method and an apparatus for device security verification utilizing a virtual trusted computing base are provided. The validity of a key for decryption is verified by a secure memory loader running on a processor of a device after booting of the device which is a computing device, and if the key is valid, encrypted firmware stored in a memory of the device is decrypted using the key to verify the confidentiality of the firmware. Then, the security memory loader verifies the authentication and integrity of the firmware by comparing a signature value generated for the decrypted firmware with an existing signature value.
Abstract:
A system for performing an integrity verification based on a distributed delegator and verifying an integrity of a plurality of individual devices based on a network includes: a first individual device which is an integrity verification target of the plurality of individual devices; a second individual device configured to vicariously verify the verification target device of the plurality of individual devices; and a remote device management server configured to select the second individual device of the plurality of individual devices as a verification delegator, and to receive a result of integrity verification of the first individual device by the second individual device.