|
2025
|
Invention
|
Electronic device for improving detection of malicious script by using artificial intelligence mo... |
|
|
Invention
|
Electronic apparatus for performing log lightweighting using extended bloom filter, and operation... |
|
|
Invention
|
Operation method of electronic apparatus for performing large language model based analysis infer... |
|
|
Invention
|
Method and apparatus for enhancing device-to-device communication security. The present invention... |
|
|
Invention
|
Code flow obfuscation method and device. The objective of the present invention is to present a c... |
|
2024
|
Invention
|
Information leakage control system and information leakage control method. The present invention ... |
|
2023
|
Invention
|
Remote control app detection method and device. A remote control app detection method performed b... |
|
|
Invention
|
Client asset management system and client asset management method. The present invention presents... |
|
|
Invention
|
Behavior scan service system, and method for providing behavior scan service. In the present inve... |
|
2022
|
Invention
|
View-based remote control detection method, view-based remote control detection device, and compu... |
|
2019
|
Invention
|
Apparatus and method for acquiring information of device. An apparatus for acquiring information ... |
|
2018
|
Invention
|
Communication management apparatus and method. A communication management apparatus according to ... |
|
|
Invention
|
Image classification device and method. An image classification device for personal information s... |
|
|
G/S
|
Computers installed with computer software that prevents,
monitors, detects, intercepts, diagnos... |
|
|
Invention
|
Malicious code diagnosis server, system, and method. A malicious code diagnosis server according ... |
|
2017
|
Invention
|
System for inspecting whether non-executable file is malicious and method for inspecting whether ... |
|
|
Invention
|
Security management device and security management method for managing security of client termina... |
|
|
Invention
|
System for detecting malicious code and method for detecting malicious code. The present inventio... |
|
2016
|
Invention
|
Terminal control apparatus and method using notification message. A terminal control apparatus us... |
|
|
Invention
|
Security management device and security management method in home network system. The present inv... |
|
2015
|
Invention
|
Apparatus and method for reconstructing execution file. According to the present invention, in ex... |
|
|
Invention
|
Method and apparatus for detecting repackaging. The present invention relates to a method and an ... |
|
2014
|
Invention
|
Method for verifying application on basis of object extraction, and device thereof. A device for ... |
|
|
Invention
|
Device and method for detecting url call. According to the present invention, by receiving a URL ... |
|
|
Invention
|
Client system and method of operating client system. The present invention relates to a client sy... |
|
|
Invention
|
Phishing site detecting method using image comparison and apparatus therefor. The present inventi... |
|
|
Invention
|
Method and apparatus for managing application data of portable terminal. A method for managing ap... |
|
|
Invention
|
Method and apparatus for inspecting malicous message. The present invention relates to a method a... |
|
|
Invention
|
Method and apparatus for inspecting risk of message. The present invention relates to a method an... |
|
|
Invention
|
Apparatus and method for diagnosing attack which bypasses memory protection mechanisms. Disclosed... |
|
|
Invention
|
Device, system and method for diagnosing malware on basis of cloud. The present invention relates... |
|
|
Invention
|
Method for strengthening service security function. Disclosed is a method for strengthening a ser... |
|
|
Invention
|
Malicious code infection system and malicious code infection method. Provided are a malicious cod... |
|
|
Invention
|
System and method for inspecting malicious code. Disclosed are a system and a method for inspecti... |
|
|
Invention
|
Apparatus for securing mobile data and method therefor. The present invention relates to an appar... |
|
|
Invention
|
Data management method and device for mobile apparatus. The data management device for a mobile a... |
|
|
Invention
|
System for preventing malware invasion, and method for operating said system for preventing malwa... |
|
2013
|
Invention
|
Method for managing data in mobile device and apparatus therefor. According to the present invent... |
|
|
Invention
|
P2p-based update device and method of operating p2p-based update device. The present invention di... |
|
|
Invention
|
Abnormal path call detecting apparatus and abnormal path call detecting method. Disclosed are an ... |
|
|
Invention
|
Apparatus and method for diagnosing malicious application. According to the present invention, in... |
|
|
Invention
|
Apparatus and method for detecting fraudulent/altered applications. The present invention relates... |
|
|
Invention
|
Method and device for managing and controlling applications of mobile terminal and recording medi... |
|
|
Invention
|
Computer system and method of using white list of said computer system. A computer system and a m... |
|
|
Invention
|
Apparatus and method for diagnosing malicious applications. An apparatus for diagnosing malicious... |
|
|
Invention
|
Apparatus and method for detecting malicious shellcode by using debug event. An apparatus for det... |
|
|
Invention
|
Computer system and signature verification server. Disclosed are a computer system, a signature v... |
|
2012
|
G/S
|
[ Computer network security devices, namely, computer network adapters, hubs, routers, and switch... |
|
|
Invention
|
Method and apparatus for preventing distributed denial of service attack.
An apparatus for preve... |
|
|
Invention
|
Method and apparatus for connecting to server using trusted ip address of domain. An apparatus fo... |
|
2007
|
G/S
|
Recorded computer software; recorded computer operating
programs; recorded computer programs; co... |
|
2000
|
G/S
|
Computer software for use in the field of computer security, specifically, working for the monito... |