Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hak-soo Ju is active.

Publication


Featured researches published by Hak-soo Ju.


The Kips Transactions:partc | 2008

CAS-based Security System for IPTV

Dae-youb Kim; Hak-soo Ju

ABSTRACT IPTV is well known services of TPS (Triple play service). Since TPS supplies the bundle service, service providers can supply low-priced services for their subscribers. To supply high quality contents stably, it is an essential requirement to make payment for the services. According to the type of services, either CAS or DRM is used to protect the pay-contents service. Also IPTV uses or will use these security systems to protect the service. In this paper, we will describe security problems when a IPTV service provider chooses either CAS or DRM, and then propose a new security system to solve the problems. Key Words: IPTV, CAS, DRM 1. 서 론 1) TPS (Triple Play Service)는 방송, 통신 그리고 데이터 서비스를 하나의 서비스로 구성하여 제공하는 융합 서비스로 IPTV는 TPS의 대표적인 예다. IPTV 서비스는 주문형 서비스(Video on Demand, VoD) 뿐만 아니라 방송 서비스를 인터넷 환경에서 제공할 수 있다는 장점 때문에 다양한 소비 계층의 욕구를 만족시킬 수 있을 것으로 기대되고 있다 [1] . 그러나 이와 같은 서비스의 발전은 콘텐츠의 불법 복사 및 배포라는 새로운 문제에 직면했다. 그러므로 서비스 제공자(Service Provider, SP)가 고품질의 콘텐츠를 안정적으로 공급하기 위해서는 콘텐츠 사용 제어 및 요금 징수를 위한 보안 시스템이 반드시 필요하다. 콘텐츠 보호 및 사용


international conference on consumer electronics | 2009

Clone resistant mutual authentication using two broadcast encryption

Sun-nam Lee; Hak-soo Ju; Bong-seon Kim

This paper provides a clone resistant mutual authentication between Secure Digital (SD) memory cards and host devices. The existing mutual authentication using one broadcast encryption can not resist cloning attacks. Therefore, a new clone resistant mutual authentication is proposed by using two broadcast encryption with the traitor tracing algorithm.


The Kips Transactions:partc | 2007

A Study On Forward Secure Mediated RSA Digital Signature

Dae-youb Kim; Hak-soo Ju

Many service systems use Public Key Infrastructure (PKI) to protect the service. But there arc problems with the use of PKI. One of the problems is that some services would require a function instantaneously to check public kel certificate, but PKI does not satisfy such request. To solve the problem, Bouch et al. first proposed the concept of mediated RSA (mRSA). Then Gene Tsudik proposed `weak` forward secure mRSA. In this paper, we analyze the weakness of these schemes and find the source of the vulnerabilitv. And we propose a new mRSA that is strong forward secure.


Archive | 2007

MUTUAL AUTHENTICATION METHOD BETWEEN DEVICES USING MEDIATION MODULE AND SYSTEM THEREFOR

Hak-soo Ju; Myung-sun Kim; Ji-Young Moon


Archive | 2010

Method and apparatus for updating data

Hak-soo Ju; Su-hyun Nam; Jeong-beom Kim; Eun-Hwa Hong


Archive | 2008

METHOD OF AUTHENTICATING AND REPRODUCING CONTENT USING PUBLIC BROADCAST ENCRYPTION AND APPARATUS THEREFOR

Hak-soo Ju; Myung-sun Kim; Ji-Young Moon


Archive | 2012

Method and mobile apparatus for displaying an augmented reality

Nam-wook Kang; Seung-Eok Choi; Hak-soo Ju; Jong-hyun Ryu; Sin-ae Kim


Archive | 2008

Method and devices for reproducing encrypted content and approving reproduction

Hak-soo Ju; Myung-sun Kim; Ji-Young Moon


Archive | 2007

Method and system for mutual authentication between mobile and host devices

Hak-soo Ju; Myung-sun Kim; Ji-Young Moon


Archive | 2007

Portable memory apparatus having a content protection function and method of manufacturing the same

Myung-sun Kim; Hak-soo Ju; Ji-Young Moon

Collaboration


Dive into the Hak-soo Ju's collaboration.

Researchain Logo
Decentralizing Knowledge