US20160205093A1 - Information security system in smart mobile environment - Google Patents

Information security system in smart mobile environment Download PDF

Info

Publication number
US20160205093A1
US20160205093A1 US15080111 US201615080111A US2016205093A1 US 20160205093 A1 US20160205093 A1 US 20160205093A1 US 15080111 US15080111 US 15080111 US 201615080111 A US201615080111 A US 201615080111A US 2016205093 A1 US2016205093 A1 US 2016205093A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
terminal device
authentication
authentication unit
communication
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15080111
Inventor
Dong Kyue Kim
Byong Deok Choi
Dong Hyun Kim
Sang Seon Park
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ICTK CO Ltd
Original Assignee
ICTK CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

Provided is a security communication method of a terminal device. A first authentication unit of the terminal device identifies a first subscriber to connect a first communication network. A second authentication unit of the terminal device exclusively operates with the first authentication unit, and identifies a second subscriber to connect a second communication network which is different from the first communication network. When the second subscriber is identified, at least one external communication module of the terminal device can be inactive.

Description

    TECHNICAL FIELD
  • The present invention relates to terminal device security, and more particularly, to information security in a field requiring a high level of security when a smart mobile device connects to a communication network, for example, in military communication.
  • BACKGROUND
  • In recent years, information terminals capable of communicating, for example, smartphones and tablet personal computers (PCs), have been rapidly propagated and such trend is expected to continue and thus, conventional feature phones and existing smartphones are expected to be replaced.
  • Based on statistical data, a number of smartphones released in 2011 was expected to increase by 60% compared to the number released in 2010, and the number to be released in 2015 is expected to surpass a majority, for example 54.4%, of mobile phones released.
  • Hence, the information terminals, for example, smartphones, may not be excluded from an environment, such as, a military communication environment, in which communication security and data leakage prevention are considered critical factors.
  • In a number of countries, including the United States, measures are being initiated for application to smartphones, for example, an iPhone, interworking with military equipment for military tactics and strategies.
  • However, such smart mobile devices may be exposed to a universal communication network, for example, wireless fidelity (WiFi) and Bluetooth, and thus, data may be leaked through an external memory device and a malignant code may be installed in a terminal to extract the data. Thus, reinforced information security for the devices is necessary.
  • DISCLOSURE OF INVENTION Technical Goals
  • An aspect of the present invention provides an apparatus and a method with an increased level of security by separating an access of a terminal device to a communication network and an authentication process when operating smart devices in a field requiring a high level of security, for example, communication security and data leakage prevention.
  • Another aspect of the present invention provides an apparatus and a method for intensifying secure authentication and preventing, in advance, data leakage from a terminal device, while simultaneously minimizing a new design applied to a structure of a conventional smartphone and thus, fully utilizing a conventional platform.
  • Technical Solutions
  • According to an aspect of the present invention, there is provided a terminal device including an application processor to perform information processing for a terminal device, a first authentication unit to identify a subscriber when the terminal device connects to a communication network, and a second authentication unit to identify a subscriber to the terminal device by exclusively operating with the first authentication unit. When the second authentication unit identifies the subscriber to the terminal device, the application processor may inactivate remaining modules among modules for communication or data storage which are included in the terminal device, from which a predetermined permanent operation group is excluded.
  • Here, the permanent operation group may include a baseband module providing a cellular communication connection. The remaining modules, excluding the permanent operation group, may include at least one of a wireless local area network (WLAN) module, a Bluetooth module, a near field communication (NFC) module, and data storage media.
  • The second authentication unit may include an authentication circuit to perform secure authentication and block an unauthorized external access and an authentication module to identify the subscriber to the terminal device with respect to an access authorized by the authentication circuit.
  • Here, the authentication module may be configured by a mobile trusted platform module (mTPM).
  • Also, the authentication module may include a protected storage. Here, the authentication circuit may include a physical unclonable function (PUF) and perform the secure authentication using at least one identification key provided by the PUF.
  • At least one of the first authentication unit and the second authentication unit may be provided in a form of a subscriber identity module (SIM) card. The second authentication unit may be provided in a form of a secure digital (SD) card.
  • According to another aspect of the present invention, there is provided a terminal device including a first authentication unit to identify a first subscriber to be connected to a first communication network and a second authentication unit to identify a second subscriber to be connected to a second communication network different from the first communication network. When the second subscriber is identified, the second communication network may be connected and at least one external communication module may be inactivated.
  • Here, the second communication network may be one of a dedicated military communication network, a dedicated administrative communication network, and a dedicated power management communication network.
  • Also, the second authentication unit may include an authentication module configured by an mTPM. The authentication module may include a protected storage.
  • The second authentication unit may include an authentication circuit to perform secure authentication and block an unauthorized external access. The authentication circuit may include a PUF and perform the secure authentication using at least one identification key provided by the PUF.
  • According to still another aspect of the present invention, there is provided a security management method for a terminal device including terminating communication performed by identifying a subscriber to the terminal device by a first authentication unit when a second authentication unit identifies the subscriber to the terminal device during identification of the subscriber by the first authentication unit, and inactivating at least one communication module of the terminal device.
  • The security management method may further include blocking an access to the terminal device through an external input and output interface. Here, when the first authentication unit identifies the subscriber to the terminal device, communication may be performed using a cellular network provided by an external communication operator. When the second authentication unit identifies the subscriber to the terminal device, communication may be performed using a dedicated secure communication network different from the cellular network.
  • Effects of Invention
  • In a case of operating a smart device in a field requiring a high level of security, for example, communication security or data leakage prevention, unintentional data leakage or illegal poaching of information may be prevented in advance.
  • Also, an information security system described herein may be compatible with platforms of existing terminal devices, and secure communication authentication may be further intensified.
  • A smart device may be safely used in communication for defensive and military purposes and thus, both convenience and safety may be simultaneously satisfied. Also, the smart device may be used for defensive and military purposes and thus, competence in conducting a military operation may be improved.
  • Further, accuracy and effectiveness in weapon systems and manpower management may be increased. Also, an expeditious conduct of the military operation and an effective conduct of a joint operation may be enabled and thus, a military operation paradigm may be completely changed.
  • Furthermore, a separate military application store may be safely operated and thus, safety of application distribution may be improved.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram illustrating a terminal device based on an information security method according to an embodiment of the present invention.
  • FIG. 2 is a block diagram illustrating an operation in a first mode in which the terminal device of FIG. 1 identifies a subscriber in a network using a first authentication unit according to an embodiment of the present invention.
  • FIG. 3 is a block diagram illustrating an operation in a second mode in which the terminal device of FIG. 1 identifies a subscriber in a network using a second authentication unit according to an embodiment of the present invention.
  • FIG. 4 is a block diagram illustrating a configuration of a second authentication unit according to an embodiment of the present invention.
  • FIGS. 5 and 6 are conceptual diagrams of examples to which an information security terminal device is applied according to an embodiment of the present invention.
  • FIG. 7 illustrates an application store provided according to an embodiment of the present invention.
  • FIG. 8 is a conceptual diagram illustrating a change in a military operation environment according to an embodiment of the present invention.
  • BEST MODE OF CARRYING OUT THE INVENTION
  • Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. The embodiments are described below in order to explain the present invention by referring to the figures.
  • FIG. 1 is a block diagram illustrating a terminal device 100 based on information security method according to an embodiment of the present invention.
  • The terminal device 100 may be considered an information terminal, for example, a smartphone, capable of accessing a communication network, but is not limited to such devices.
  • According to an embodiment, when the terminal device 100 connects to a network provider through the communication network, the terminal device 100 may include a first authentication unit 101 and a second authentication unit 102 to identify a subscriber and perform secure authentication for communication or electronic commerce.
  • Each of the first authentication unit 101 and the second authentication unit 102 may be provided in a form of a subscriber identity module (SIM) card in which subscriber information is provided or a universal subscriber identity module (USIM) card for which the SIM card is combined with a universal integrated circuit card (UICC), but is not limited the examples provided herein.
  • For example, at least one of the first authentication unit 101 and the second authentication unit 102 may be configured by a memory card, for example, a secure digital (SD) card.
  • According to an embodiment, the first authentication unit 101 may identify a subscriber to the terminal device 100 in a communication network, which is performed exclusively with the second authentication unit 102. For example, only one of the first authentication unit 101 and the second authentication unit 102 may identify the subscriber to the terminal device 100 at one point in time. However, both the first authentication unit 101 and the second authentication unit 102 may not simultaneously identify the subscriber to the terminal device 100.
  • According to an embodiment, the first authentication unit 101 may identify the subscriber to the terminal device 100 in the communication network only in a general communication mode, not in a secure communication mode. Conversely, when the terminal device 100 is in the secure communication mode, for example, when the terminal device 100 connects to a dedicated military communication network, the second authentication unit 102 may identify the subscriber to the terminal device 100 in a corresponding communication network.
  • Hereinafter, an example in which the terminal device 100 performs the general communication and is not in the secure communication mode, for example, an access to the dedicated military communication network, will be referred to as the general communication mode or a first mode.
  • Also, an example in which the terminal device 100 is in the secure communication mode will be referred to as a second mode. While the terminal device 100 is in the second mode, an unauthorized access to the terminal device 100 through a network may be blocked and a security violation, for example, data leakage from the terminal device 100, may be prevented.
  • The terminal device 100 may include an application processor (AP) 103 performing operations such as running an application installed in the terminal device 100, various communication modules, for example, 111, 120, 130, and 140, a main memory 112, and a storage 150.
  • According to an embodiment, the foregoing components may be managed by being classified as components belonging to a permanent operation group 110 and components not belonging to the permanent operation group 110.
  • Here, the permanent operation group 110 may refer to a conceptual group of modules including at least one component that is managed to perform an individual function, irrespective of whether the terminal device 100 is in the first mode or the second mode.
  • The permanent operation group 110 may include a baseband module 111 performing an access to a cellular communication network and a data exchange and the main memory 112 assisting the application processor 103 in performing the operations.
  • Also, the permanent operation group 110 may include a power supply module (not shown), for example, a battery. A detailed description of the permanent operation group 110 will be provided with reference to FIG. 3.
  • Hereinafter, a more detailed description of each operation performed when the terminal device 100 is in the first mode and in the second mode will be provided with reference to FIGS. 2 and 3.
  • FIG. 2 is a block diagram illustrating an operation in a first mode in which the terminal device 100 of FIG. 1 identifies a subscriber in a network using the first authentication unit 101 of FIG. 1 according to an embodiment of the present invention.
  • For example, the first authentication unit 101 configured by a general USIM card may identify, between the terminal device 100 and a cellular communication provider, a subscriber to the terminal device 100. In the first mode, the terminal device 100 may operate as a general smartphone and thus, a special classification of a permanent operation group 110 may not be required.
  • An application processor 103 may perform various operations using a main memory 112. In the first mode, the terminal device 100 may access a wireless fidelity (WiFi) network using a wireless local area network (WLAN) module 120 or perform a short-range wireless communication using a Bluetooth module 130, and a near field communication (NFC) module 140.
  • In the first mode, a usual access to a storage 150, as a general storage medium not including data for security, may be allowed. In the first mode, the terminal device 100 may operate in a same manner as a general smartphone, and the communication and access to the storage 150 may be managed at a general security level.
  • Although more detailed descriptions will follow, data handled and managed in the second mode may not be stored in the storage 150. However, data on information required to be handled only in the second mode may be stored in a protected storage, in lieu of the storage 150. The protected storage will be described with reference to FIGS. 3 and 4.
  • FIG. 3 is a block diagram illustrating an operation in a second mode in which the terminal device 100 of FIG. 1 identifies a subscriber in a network using the second authentication unit 102 of FIG. 1 according to an embodiment of the present invention.
  • As described in the foregoing, the second mode may refer to a mode in which the terminal device 100 connects to a dedicated network separated from a general communication network for a purpose of security, and operates accordingly. Here, the dedicated network may be one of various networks, for example, a military communication network, an administrative communication network, a national agency network for electric power control, a national agency network for nuclear power systems, and a separate and dedication network for an intelligence agency.
  • Hereinafter, an example of the second mode used when the terminal device 100 connects to the military communication network for military purposes will be described. However, there may be various examples of the second mode and thus, the present invention should not be construed as being limited to such examples, although not stated otherwise.
  • In the second mode, the second authentication unit 102 may be used to identify a subscriber to the terminal device 100. For example, the second authentication unit 102 may be a USIM separately prepared and distributed for a military use.
  • In the second mode, authentication performed by a first authentication unit 101 that may be a USIM card for a general cellular communication may be completely excluded, and only the second authentication unit 102 may perform communication authentication, identification of the subscriber, and other operations.
  • According to an embodiment, a communication network accessible in the first mode and in the second mode may be different. More particularly, the first mode may relate to a connection to cellular communication provided by a general communication operator and the second mode may relate to a connection to the dedicated communication network.
  • However, the present invention may not be limited to the connection to the foregoing communication networks. The cellular communication provided by the communication operator may have a relatively high level of security, for example, a code division multiple access (CDMA) and a wideband code division multiple access (WCDMA). Also, the communication operator may autonomously secure a reliable level of security and thus, the second mode may relate to the connection to the cellular communication network, in lieu of the separate dedicated communication network, according to another embodiment.
  • In this case, the terminal device 100 may access, even in the second mode, the cellular communication network of the communication operator through a baseband module 111 in a same manner as in the first mode. Also, as in the first mode, an application processor 103 may perform various operations using a main memory 112.
  • However, a difference from being in the first mode may be that all other components, used for a general purpose, in which security is not established in the terminal device 100, for example, a WLAN module 120, a Bluetooth module 130, an NFC module 140, and a storage 150 may be completely inactivated. All accesses to the application processor 103 and the foregoing components may be blocked, along with an access to the terminal device 100 through the foregoing components.
  • Thus, in the second mode, communication through any channel, excluding an external connection through the cellular network based on identification of the subscriber performed by the second authentication unit 120, may be blocked. Also, wired communication through other input and output interfaces (not shown) may not be allowed.
  • Based on whether the terminal device 100 performs a general communication in the first mode or a secure communication in the second mode, an operating platform in the terminal device 100 may be completely separated and thus, a user may use the terminal device 100 as an information communication terminal for a general purpose or as a terminal for a purpose of special secure communication, for example, a military purpose. Accordingly, convenience and security may be simultaneously satisfied.
  • According to an embodiment, the platform may operate in a dual mode and an accessible communication network may be completely separated based on a mode and thus, an unauthorized reception and transmission of military information that may occur in various communication environments may be prevented in advance. Also, information leakage caused by, for example, an external hacking, may be prevented and thus, security may be established.
  • Data requiring a high level of security management, which is handled or managed in the second mode, may be stored in a separately protected storage. According to an embodiment, the protected storage may be provided in the second authentication unit 102.
  • Thus, the storage 150 which is a data storage space for a general purpose and the protected storage which is a data storage space for a military purpose may be physically and completely separated. An application to be installed in the terminal device 100 may be stored selectively in one of the storage 150 and the protected storage based on a purpose.
  • Accordingly, although the terminal device 100 may be lost, an unauthorized access to the protected storage may be blocked unless an unspecified user penetrates a security/code system and thus, a leakage of data including military information or a military application may be prevented.
  • More detailed descriptions of a structure of the second authentication unit 102 and implementation of the protected storage will be provided with reference to FIG. 4.
  • FIG. 4 is a block diagram illustrating a configuration of a second authentication unit 102 according to an embodiment of the present invention.
  • As described in the foregoing, the second authentication unit 102 may be a USIM card separately prepared and distributed for a military purpose or an SD card.
  • An interface 410 may be a terminal at which the second authentication unit 102 exchanges a signal with an external source by being in contact with the external source. The interface 410 may not be construed to be one of a contact type and a non-contact type in a limited manner. However, the interface 410 may be an input and output interface of any other type so long as the interface 410 includes an operation of the second authentication unit 102.
  • An authentication circuit 420 may function as a gate to determine whether to allow or block an access through the interface 410.
  • According to an embodiment, the authentication circuit 420 may be implemented by a PUF.
  • The PUF may be a circuit in which different function values occur, although an identical design drawing is prepared using a characteristic deviation generated by process variation, or a circuit provided for an electrical connection to stochastically succeed by intentionally violating a design rule in a semiconductor manufacturing process.
  • For example, in the semiconductor process, a thickness of vias connecting metal layers in a portion may be determined to be thinner than a thickness specified in the design rule and whether an electrical conduction occurs among the metal layers through the vias may be stochastically determined and thus, a digital value which is an unpredictable and unique identification key may be generated.
  • The identification key generated by the PUF may be generated unpredictably and randomly and become a value that may not be changed over time. Also, a physical cloning or a power analysis attack on the PUF may be difficult to achieve. Thus, the authentication circuit 420 may allow only an access passed through security verification using the identification key provided by the PUF.
  • Also, according to another embodiment, using both the PUF and a general encoder may enable dual authentication and thus, security may be improved.
  • According to an embodiment, the second authentication unit 102 may include a mobile trusted platform module (mTPM) 430 for secure communication. The mTPM 430 may be a trusted security module for a mobile platform and ensure platform integrity and data confidentiality.
  • The mTPM used for platform authentication may be a trusted security module for a mobile platform for which standardization is in progress in a trusted computing group (TCG), and Electronics and Telecommunications Research Institute (ETRI) developed an mTPM chip in 2009.
  • Thus, the second authentication unit 102 may be independent from an operating system (OS) and a processor, and a modification to an existing platform may be minimized. Also, a size of a chip may be reduced to extremely small and a manufacturing cost may be lowered.
  • According to an embodiment, the mTPM 430 may provide a protected storage 431. Data stored in the protected storage 431 may be managed by being encoded or decoded using a separate and unique key. Thus, the data, for example, a certificate, may be safely protected from an external attack.
  • Also, the platform integrity of a terminal device 100 of FIG. 1 may be verified by the mTPM 430, and, upon booting, a chain of trust may be verified in sequence from, for example, a basic input/output system (BIOS) to a ready-only memory (ROM) and an OS. Subsequent to the booting, a malignant code and the like may be detected and blocked in advance based on a result of real-time verification of the platform integrity.
  • The mTPM 430 may ensure a safe communication environment and thus, a wireless network environment with reinforced safety and reliability may be constructed.
  • For example, the mTPM 430 may ensure safety among platforms and the safe communication environment, and be used to verify, to another platform, to a fact that a platform is in a reliable state because an ensuring process is performed based on remote verification.
  • Also, it may be possible to check whether the mTPM 430 is provided and verify safety of a platform for which the verification is requested.
  • Although described hereinafter, in the second mode, the terminal device 100 may access a military application store additionally provided aside from a general application store or market. Here, only a signatory authentication technology of the mTPM 430 based on verification by the mTPM 430 may be used to allow an access to the military application store, and an unauthorized modification of an executable code may be prevented by integrity verification performed on an application.
  • According to an embodiment, a dual platform-based military smart mobile control may be enabled. Also, a network may be separated based on a purpose of use and thus, data leakage through a network other than a cellular network, for example, a secure communication route such as 3G, may be prevented. Further, a storage space may be divided based on a purpose of use and thus, a safe data management may be enabled.
  • Furthermore, using the mTPM 430 may ensure the platform integrity, the data confidentiality, and the safe communication environment, and a PUF based authentication circuit 420 may ensure unclonability and intensified authentication.
  • Thus, in a military application, a smart digital operation may be conducted and, swiftness, accuracy, and effectiveness of the operation may be increased. Also, a joint operation may be maximized by focusing combat power quantitatively and qualitatively during a certain period. Further, a commercial information technology that has been continuously developed may be safely used and thus, significant changes may be made to a military operation paradigm.
  • Hereinafter, illustrative applications will be described with reference to FIGS. 5 through 8 to introduce a change in the military operation paradigm.
  • FIGS. 5 and 6 are conceptual diagrams of examples to which an information security terminal device is applied according to an embodiment of the present invention.
  • FIG. 5 is a conceptual diagram illustrating an example in which security is improved in a military application of a smartphone to which a system according to an embodiment of the present invention is applied.
  • As shown in the example, a provided application 500 may comprehensively analyze and transmit real-time data on locations and states of soldiers in action and display, on a map, moving routes, locations, and states of enemy and friendly forces.
  • When a user selects an associate icon 510, a real-time video 520 of a corresponding associate in action may be transmitted through a camera disposed on a helmet of the corresponding associate.
  • When such an application operates using an existing smart mobile device, a security issue may arise because the smart mobile device may be exposed to a universal communication environment, for example, WiFi and Bluetooth communications that have a frequency band in which an encoding level is not high. However, according to an embodiment, the application may be safely used and distributed absent security issues.
  • FIG. 6 is an example in which a ballistic computation application 620 for a sniper is executed in a terminal device 100 and the terminal device 100 is directly attached to an individual weapon 610.
  • Using the application 620, ballistic computation may be performed based on a range, climatic conditions including temperature, atmospheric pressure, humidity, wind speed, and wind direction, and a profile of a weapon.
  • According to an embodiment, the application 620 may safely operate, although a security issue may arise when the application 620 is executed in an existing smart mobile device.
  • According to an embodiment, in a case of the weapon 610 and the terminal device 100 both being lost, confidential subjects may be completely protected and information leakage may be prevented.
  • FIG. 7 illustrates an application store provided according to an embodiment of the present invention.
  • According to an embodiment, distribution and management of a military application may be performed by a dedicated military application store in a controlled environment, not by a commercial open market or store.
  • The application store may be accessible, through secure authentication, only when a terminal device 100 is in a second mode, and may distribute and update a military application.
  • For an operation of the application store, various administrative factors may be added. A developer verification procedure may be ensured by an authentication certificate based on a code signing of a developer, and a verification center may verify whether the military application is safe based on security verification and thus, safety of the military application may be ensured.
  • FIG. 8 is a conceptual diagram 800 illustrating a change in a military operation environment according to an embodiment of the present invention.
  • According to an embodiment, a level of information security may be improved and thus, a joint operation between different forces, for example, an air force and an infantry, may be performed through smart operations.
  • Through secure communication between an unmanned aircraft 810 operated by the air force and a terminal device 820 of the infantry, information, for example, a vehicle number 813 observed and provided by the unmanned aircraft 810, may be forwarded. Also, a current state of a friendly force, for example, a naval force 811, and a weapon 812 may be verified, and a military action, for example, a strategy, may be exchanged.
  • The above-described exemplary embodiments of the present invention may be recorded in non-transitory computer-readable media including program instructions to implement various operations embodied by a computer. The media may also include, alone or in combination with the program instructions, data files, data structures, and the like. Examples of non-transitory computer-readable media include magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD ROM discs and DVDs; magneto-optical media such as floptical discs; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory (ROM), random access memory (RAM), flash memory, and the like. Examples of program instructions include both machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter. The described hardware devices may be configured to act as one or more software modules in order to perform the operations of the above-described exemplary embodiments of the present invention, or vice versa.
  • Although a few embodiments of the present invention have been shown and described, the present invention is not limited to the described embodiments. Instead, it would be appreciated by those skilled in the art that changes may be made to these embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
  • 101: First authentication unit
  • 102: Second authentication unit
  • 103: Application processor
  • 111: Baseband module
  • 112: Main memory
  • 120: WLAN module
  • 130: Bluetooth module
  • 140: NFC module
  • 150: Storage

Claims (18)

  1. 1. A terminal device, comprising:
    an application processor configured to perform information processing for the terminal device;
    a first authentication unit configured to identify a subscriber when the terminal device connects to a communication network; and
    a second authentication unit configured to identify a subscriber to the terminal device by exclusively operating with the first authentication unit, and
    wherein, when the second authentication unit identifies the subscriber to the terminal device, the application processor inactivates remaining modules among modules in the terminal device for communication or data storage, from which a predetermined permanent operation group is excluded.
  2. 2. The terminal device of claim 1, wherein the permanent operation group comprises a baseband module configured to provide a cellular communication connection.
  3. 3. The terminal device of claim 1, wherein the remaining modules, excluding the permanent operation group, comprise at least one of a wireless local area network (WLAN) module, a Bluetooth module, a near field communication (NFC) module, and data storage media.
  4. 4. The terminal device of claim 1, wherein the second authentication unit comprises an authentication circuit to block an unauthorized external access by performing secure authentication and an authentication module configured to identify the subscriber to the terminal device with respect to an access authorized by the authentication circuit.
  5. 5. The terminal device of claim 4, wherein the authentication module is configured by a mobile trusted platform module (mTPM).
  6. 6. The terminal device of claim 4, wherein the authentication module comprises a protected storage.
  7. 7. The terminal device of claim 4, wherein the authentication circuit comprises a physical unclonable function (PUF), and
    wherein the authentication circuit is configured to perform the secure authentication using at least one identification key provided by the PUF.
  8. 8. The terminal device of claim 1, wherein at least one of the first authentication unit and the second authentication unit is provided in a form of a subscriber identity module (SIM) card.
  9. 9. The terminal device of claim 1, wherein the second authentication unit is provided in a form of a secure digital (SD) card.
  10. 10. A terminal device, comprising:
    a first authentication unit comprising one or more processors and configured to identify a first subscriber to be connected to a first communication network; and
    a second authentication unit configured to identify a second subscriber to be connected to a second communication network different from the first communication network, and
    wherein, when the second subscriber is identified, the second communication network is connected and at least one of external communication module is inactivated.
  11. 11. The terminal device of claim 10, wherein the second communication network is one of a dedicated military communication network, a dedicated administrative communication network, and a dedicated power management communication network.
  12. 12. The terminal device of claim 10, wherein the second authentication unit comprises an authentication module configured by a mobile trusted platform module (mTPM).
  13. 13. The terminal device of claim 12, wherein the authentication module comprises a protected storage.
  14. 14. The terminal device of claim 10, wherein the second authentication unit comprises an authentication circuit configured to perform secure authentication and block an unauthorized external access.
  15. 15. The terminal device of claim 14, wherein the authentication circuit comprises a physical unclonable function (PUF), and
    wherein the authentication circuit configured to performs the secure authentication using at least one identification key provided by the PUF.
  16. 16. A security management method for a terminal device, the method comprising:
    determining second authentication unit performs identifying of a subscriber associated to the terminal device instead of a first authentication unit; and
    inactivating at least one communication module of the terminal device.
  17. 17. The method of claim 16, further comprising:
    blocking an access to the terminal device through an external input and output interface.
  18. 18. The method of claim 16, wherein, when the first authentication unit identifies the subscriber to the terminal device, communication is performed using a cellular network provided by an external communication operator; and when the second authentication unit identifies the subscriber to the terminal device, communication is performed using a secure communication network different from the cellular network.
US15080111 2011-10-13 2016-03-24 Information security system in smart mobile environment Abandoned US20160205093A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
KR20110104426 2011-10-13
KR10-2011-0104426 2011-10-13
KR20120057132A KR101425711B1 (en) 2011-10-13 2012-05-30 Information security systems for smart mobile environment
KR10-2012-0057132 2012-05-30
PCT/KR2012/008023 WO2013055059A1 (en) 2011-10-13 2012-10-04 Information security system in smart mobile environment
US201414351860 true 2014-04-14 2014-04-14
US15080111 US20160205093A1 (en) 2011-10-13 2016-03-24 Information security system in smart mobile environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15080111 US20160205093A1 (en) 2011-10-13 2016-03-24 Information security system in smart mobile environment

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/KR2012/008023 Continuation WO2013055059A1 (en) 2011-10-13 2012-10-04 Information security system in smart mobile environment
US201414351860 Continuation 2014-04-14 2014-04-14

Publications (1)

Publication Number Publication Date
US20160205093A1 true true US20160205093A1 (en) 2016-07-14

Family

ID=48440087

Family Applications (2)

Application Number Title Priority Date Filing Date
US14351860 Active US9300650B2 (en) 2011-10-13 2012-10-04 Information security system in smart mobile environment
US15080111 Abandoned US20160205093A1 (en) 2011-10-13 2016-03-24 Information security system in smart mobile environment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14351860 Active US9300650B2 (en) 2011-10-13 2012-10-04 Information security system in smart mobile environment

Country Status (3)

Country Link
US (2) US9300650B2 (en)
KR (2) KR101425711B1 (en)
CN (2) CN107567020A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015156622A3 (en) * 2014-04-09 2017-01-12 (주) 아이씨티케이 Authentication apparatus and method
KR20170002969A (en) * 2015-06-30 2017-01-09 삼성전자주식회사 Electronic apparatus and methof for performing authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117623A1 (en) * 2002-08-30 2004-06-17 Kabushiki Kaisha Toshiba Methods and apparatus for secure data communication links
US20080046581A1 (en) * 2006-08-18 2008-02-21 Fujitsu Limited Method and System for Implementing a Mobile Trusted Platform Module
US20120157166A1 (en) * 2010-12-21 2012-06-21 Dongwoo Kim Mobile terminal and method of managing information therein

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050058774A (en) 2003-12-12 2005-06-17 주식회사 케이티 System and method for controlling bluetooth module within one-phone terminal using identifier of cellular basestation
KR100872175B1 (en) 2006-12-01 2008-12-09 한국전자통신연구원 Secure booting apparatus and method of mobile platform using TPM
US8290150B2 (en) 2007-05-11 2012-10-16 Validity Sensors, Inc. Method and system for electronically securing an electronic device using physically unclonable functions
KR20100137145A (en) * 2009-06-22 2010-12-30 유비벨록스(주) Method, system and computer-readable recording medium for controlling function of mobile communication terminal device using contactless communication technology
US8862178B2 (en) 2010-02-24 2014-10-14 Qualcomm Incorporated Methods and systems for managing participation in multiple wireless networks
US20110217969A1 (en) * 2010-03-05 2011-09-08 Qualcomm, Incorporated Devices with multiple subscriptions that utilize a single baseband-radio frequency resource chain
KR20110102165A (en) * 2010-03-08 2011-09-16 한국전자통신연구원 Radio security leader controlling operation mode, and radio security tag supporting security mode and normal mode
US8725145B2 (en) * 2011-01-25 2014-05-13 Qualcomm Incorporated Mobile device requests of non-communication time periods to a wireless communication network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117623A1 (en) * 2002-08-30 2004-06-17 Kabushiki Kaisha Toshiba Methods and apparatus for secure data communication links
US20080046581A1 (en) * 2006-08-18 2008-02-21 Fujitsu Limited Method and System for Implementing a Mobile Trusted Platform Module
US20120157166A1 (en) * 2010-12-21 2012-06-21 Dongwoo Kim Mobile terminal and method of managing information therein

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Suh et al. (Physical Unclonable Functions for Device Authentication and Secret Key Generation, DAC 2007, pages 9-14) *

Also Published As

Publication number Publication date Type
KR101425711B1 (en) 2014-08-04 grant
KR20130040118A (en) 2013-04-23 application
CN103930895A (en) 2014-07-16 application
US9300650B2 (en) 2016-03-29 grant
US20140298431A1 (en) 2014-10-02 application
CN103930895B (en) 2017-05-17 grant
KR20130040119A (en) 2013-04-23 application
CN107567020A (en) 2018-01-09 application

Similar Documents

Publication Publication Date Title
Shabtai et al. Google android: A comprehensive security assessment
Yi et al. Security and privacy issues of fog computing: A survey
Francis et al. Practical NFC peer-to-peer relay attack using mobile phones
US20120252405A1 (en) Connecting mobile devices, internet-connected hosts, and cloud services
US20080291013A1 (en) Wireless device monitoring systems and monitoring devices, and associated methods
US20130254831A1 (en) Method and apparatus for context aware mobile security
Ronen et al. IoT goes nuclear: Creating a ZigBee chain reaction
US20120254960A1 (en) Connecting mobile devices, internet-connected vehicles, and cloud services
US20140096182A1 (en) Systems and methods for distributed trust computing and key management
Delac et al. Emerging security threats for mobile platforms
Gao et al. Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
US8438631B1 (en) Security enclave device to extend a virtual secure processing environment to a client device
Jain et al. Addressing Security and Privacy Risks in Mobile Applications.
Li et al. The Internet of Things: a security point of view
Mosenia et al. A comprehensive study of security of internet-of-things
US20130104232A1 (en) Appliqué providing a secure deployment environment (sde) for a wireless communications device
US20140310515A1 (en) Apparatus and method for authentication between devices based on puf over machine-to-machine communications
US20130281058A1 (en) Secure Environment for Subscriber Device
Alizadeh et al. Authentication in mobile cloud computing: A survey
US20150244711A1 (en) Method and apparatus for authenticating client credentials
US20120054498A1 (en) System and method for managing secure information within a hybrid portable computing device
US20160085960A1 (en) Securely Pairing Computing Devices
US20140164768A1 (en) Detecting matched cloud infrastructure connections for secure off-channel secret generation
Cassola et al. A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
Khan et al. Vulnerabilities of UMTS access domain security architecture

Legal Events

Date Code Title Description
AS Assignment

Owner name: ICTK CO. LTD., KOREA, REPUBLIC OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KIM, DONG KYUE;CHOI, BYONG DEOK;KIM, DONG HYUN;AND OTHERS;REEL/FRAME:038110/0169

Effective date: 20140409