Patents by Inventor Eungki Park

Eungki Park has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9778367
    Abstract: An anti-jamming apparatus and method for a compact array antenna are provided. The anti-jamming apparatus for a compact array antenna includes a Global Navigation Satellite System (GNSS) array antenna unit including a plurality of GNSS antennas for receiving GNSS signals transmitted from a satellite. A first beam-forming unit includes a plurality of combination units for receiving respective signals received by the plurality of GNSS antennas as a first reference signal and first auxiliary signals and combining the first reference signal with the first auxiliary signals, thus forming different beams. A second beam-forming unit receives signals of the different beams, and combining the signals of the different beams, thus forming an anti-jamming beam in which an invisible area is minimized.
    Type: Grant
    Filed: May 22, 2014
    Date of Patent: October 3, 2017
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jinchun Wang, Dae Heon Lee, Dong Hoon Shin, Woong Hee Kim, Hae Yong Yang, Eungki Park
  • Patent number: 9742699
    Abstract: The present invention presents a network apparatus and a selective information monitoring method using the network apparatus, which allow a user to monitor only required information (the field information of packets) from all received packets. The network apparatus one or more physical interfaces connected to a monitoring target host and configured to receive network packets from the monitoring target host, and a switch fabric module including a configurable monitoring module configured to perform filtering so that selective information is extracted from the network packets collected through the one or more physical interfaces.
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: August 22, 2017
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Heemin Kim, Jeong-Han Yun, Kyoung-Ho Kim, Woonyon Kim, Jungtaek Seo, Eungki Park
  • Publication number: 20150109936
    Abstract: The present invention presents a network apparatus and a selective information monitoring method using the network apparatus, which allow a user to monitor only required information (the field information of packets) from all received packets. The network apparatus one or more physical interfaces connected to a monitoring target host and configured to receive network packets from the monitoring target host, and a switch fabric module including a configurable monitoring module configured to perform filtering so that selective information is extracted from the network packets collected through the one or more physical interfaces.
    Type: Application
    Filed: May 29, 2014
    Publication date: April 23, 2015
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Heemin KIM, Jeong-Han YUN, Kyoung-Ho KIM, Woonyon KIM, Jungtaek SEO, Eungki PARK
  • Publication number: 20140375500
    Abstract: An anti-jamming apparatus and method for a compact array antenna are provided. The anti-jamming apparatus for a compact array antenna includes a Global Navigation Satellite System (GNSS) array antenna unit including a plurality of GNSS antennas for receiving GNSS signals transmitted from a satellite. A first beam-forming unit includes a plurality of combination units for receiving respective signals received by the plurality of GNSS antennas as a first reference signal and first auxiliary signals and combining the first reference signal with the first auxiliary signals, thus forming different beams. A second beam-forming unit receives signals of the different beams, and combining the signals of the different beams, thus forming an anti-jamming beam in which an invisible area is minimized.
    Type: Application
    Filed: May 22, 2014
    Publication date: December 25, 2014
    Inventors: Jinchun WANG, Dae Heon LEE, Dong Hoon SHIN, Woong Hee KIM, Hae Yong YANG, Eungki PARK
  • Patent number: 8171521
    Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: May 1, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Young Han Choi, Hyoung Chun Kim, Tae Ghyoon Kim, Do Hoon Lee, Eungki Park
  • Patent number: 7779467
    Abstract: Provided are N grouping of traffic and pattern-free Internet worm response system and method. According to the method, traffic factors generated by respective worms are grouped into N groups so that a great quantity of Information may be effectively understood and a worm generated afterward is involved with characteristics of a relevant group. Damages of a network or a system predictable through already classified N traffic characteristics are defined so that corresponding step-by-step measures are taken. Characteristics of the grouped worms are quantitatively analyzed so that a danger degree of a new worm is predicted when the new worm appears afterward and forecasting and alarming through the prediction are performed. Easiness with which a controlling operator instantly understands an accident using a visualization method having an approximate real-time characteristic is increased, so that detection efficiency for most worms not detected using a conventional rule is increased.
    Type: Grant
    Filed: October 2, 2006
    Date of Patent: August 17, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Daesik Choi, Woonyon Kim, Dongsu Kim, Cheolwon Lee, Eungki Park
  • Publication number: 20080313701
    Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    Type: Application
    Filed: February 29, 2008
    Publication date: December 18, 2008
    Inventors: Young Han CHOI, Hyoung Chun KIM, Tae Ghyoon KIM, Do Hoon LEE, Eungki PARK
  • Publication number: 20080127324
    Abstract: Provided is a method for responding a distributed denial of service (DDoS) attack using deterministic pushback scheme. In the method, all of packets outbound from an edge router of a predetermined network system to the other network system are marked with own IP address in order to enable a victim system to confirm an IP address of an attack source edge router for DDoS attack packets. Then, IP address information of an attack source edge router is obtained by reassembling an IP address of detected DDoS attack packets at a victim system that detects DDoS attack. A deterministic pushback message is received at an attack source edge router if a victim system transmits a deterministic pushback message to the attack source edge router, information of the attack source edge router is confirmed, and corresponding attack packets are filtered.
    Type: Application
    Filed: September 25, 2007
    Publication date: May 29, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jung-Taek Seo, Kiwook Sohn, Eungki Park
  • Publication number: 20070300061
    Abstract: A system and method for detecting a hidden process using system event information are provided. The system includes: a kernel layer monitoring module for extracting system event information by monitoring a kernel layer system; a kernel layer process list detecting module for detecting processes related to an event from the extracted system event information; an application layer process list detecting module for detecting a process list provided to a user from an application layer; and a hidden process detecting module for detecting a process that is present only in the kernel layer as a hidden process by comparing the processes detected from the kernel layer process list detecting module and the processes detected from the application layer process list detecting module.
    Type: Application
    Filed: September 26, 2006
    Publication date: December 27, 2007
    Inventors: Eun Young Kim, Youngtae Yun, Eungki Park
  • Publication number: 20070234425
    Abstract: A multistep integrated security management system and method using an intrusion detection log collection engine and a traffic statistic generation engine is disclosed. An intrusion detection log collection engine capable of collecting logs generated from diverse intrusion detection engines and a traffic statistic generation engine collect and transmit analyzed data to a control intermediate management server. The control intermediate management server performs more accurate intrusion detection by relationally analyzing the intrusion detection log information and the traffic statistic information. A control uppermost management server performs an integrated security management on a large-scale group subject to control by performing an integrated analysis on a large-scale group subject to control, and thus can support the large-scale integrated security management efficiently.
    Type: Application
    Filed: June 15, 2006
    Publication date: October 4, 2007
    Inventors: Woonyon Kim, Eun Young Lee, Sang Hoon Lee, Dong Su Nam, Joo Beom Yun, Jong Moon Lee, Miri Joo, Dohoon Lee, Eungki Park
  • Publication number: 20070226803
    Abstract: A system and method for detecting Internet worm traffics through classification of traffic characteristics by types is disclosed. The system and method defines Internet worm as a characteristic profile classified into diverse traffic characteristics, detects Internet worm traffics by comparing the similarity of a collected traffic with that of a defined traffic, classifies the type of the Internet worm, and performs severity judgment and alarming. The detection efficiency of most worms, which cannot be detected based on the existing rule, can be increased. Also, the risk grade of the corresponding worm traffic can be quantitatively provided by judging the severity according to the similarity scores and the predefined severity grade. Accordingly, the survival of the entire communication network can be heightened through the countermeasure and the forecast/alarm in steps, and mass information can be effectively seized.
    Type: Application
    Filed: June 15, 2006
    Publication date: September 27, 2007
    Inventors: Woonyon Kim, Dongsoo Kim, Daesik Choi, Eungki Park
  • Publication number: 20070214224
    Abstract: A system and method for transmitting cyber threat information in real time, which is designed to minimize overload of a server in order to support large-scale clients, is disclosed. Important related information such as countermeasures against cyber threats or cyber attacks is transmitted in real time to a user through diverse methods including an SMS message, an email message, and a popup message, and thus the user can cope with such cyber threats effectively, actively, and promptly, so that the damage due to the cyber threats against important systems and services can be minimized.
    Type: Application
    Filed: July 17, 2006
    Publication date: September 13, 2007
    Inventors: Dong Su Nam, Dohoon Lee, Eungki Park
  • Publication number: 20070150958
    Abstract: Provided are N grouping of traffic and pattern-free Internet worm response system and method. According to the method, traffic factors generated by respective worms are grouped into N groups so that a great quantity of information may be effectively understood and a worn generated afterward is involved with characteristics of a relevant group. Damages of a network or a system predictable through already classified N traffic characteristics are defined so that corresponding step-by-step measures are taken. Characteristics of the grouped worms are quantitatively analyzed so that a danger degree of a new worm is predicted when the new worm appears afterward and a forecast and alarming through the prediction are performed. Easiness with which a controlling operator instantly understands an accident using a visualization method having an approximate real-time characteristic is increased, so that detection efficiency for most of worms not detected using a conventional rule is increased.
    Type: Application
    Filed: October 2, 2006
    Publication date: June 28, 2007
    Inventors: Daesik Choi, Woonyon Kim, Dongsu Kim, Cheolwon Lee, Eungki Park