Patents by Inventor In Tai Jin
In Tai Jin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9014899Abstract: A method and system for controlling a downshift for a hybrid vehicle includes: determining whether a running mode of the hybrid vehicle is an electric vehicle (EV) mode; determining whether a kick-down occurs when the hybrid vehicle is in the EV mode, wherein the kick-down requires a downshift; operating an engine and performing a shift-start (SS) when a downshift condition according to the kick-down is satisfied; determining whether a speed of the engine and a speed of a motor are synchronized before performing an actual shift-begin (SB); engaging an engine clutch when the speed of the engine and the speed of the motor are synchronized; and performing the actual SB when the engine clutch is engaged.Type: GrantFiled: December 19, 2013Date of Patent: April 21, 2015Assignee: Hyundai Motor CompanyInventors: Soo Bang Lee, Tai Jin Jung
-
Publication number: 20150088348Abstract: A method and system for controlling a downshift for a hybrid vehicle includes: determining whether a running mode of the hybrid vehicle is an electric vehicle (EV) mode; determining whether a kick-down occurs when the hybrid vehicle is in the EV mode, wherein the kick-down requires a downshift; operating an engine and performing a shift-start (SS) when a downshift condition according to the kick-down is satisfied; determining whether a speed of the engine and a speed of a motor are synchronized before performing an actual shift-begin (SB); engaging an engine clutch when the speed of the engine and the speed of the motor are synchronized; and performing the actual SB when the engine clutch is engaged.Type: ApplicationFiled: December 19, 2013Publication date: March 26, 2015Applicant: Hyundai Motor CompanyInventors: Soo Bang LEE, Tai Jin JUNG
-
Publication number: 20150060530Abstract: A shear bonding device and a shear bonding method of metal plates are disclosed.Type: ApplicationFiled: September 2, 2014Publication date: March 5, 2015Inventor: In Tai JIN
-
Patent number: 8756685Abstract: A detection system of a suspicious malicious website using the analysis of a JavaScript obfuscation strength, which includes: an entropy measuring processor of measuring an entropy of an obfuscated JavaScript present in the website, a special character entropy, and a variable/function name entropy; a frequency measuring processor of measuring a specific function frequency, an encoding mark frequency and a % symbol frequency of the JavaScript; a density measuring processor of measuring the maximum length of a single character string of the JavaScript; and a malicious website confirming processor of determining whether the relevant website is malicious by comparing an obfuscation strength value, measured by the entropy measuring processor, the frequency measuring processor and the density measuring processor, with a threshold value.Type: GrantFiled: October 27, 2011Date of Patent: June 17, 2014Assignee: Korea Internet & Security AgencyInventors: Hyun-Cheol Jeong, Seung-Goo Ji, Tai Jin Lee, Jong-Il Jeong, Hong-Koo Kang, Byung-Ik Kim
-
Publication number: 20140162840Abstract: A method and system for controlling anti-jerk of a hybrid vehicle reduce shift vibration and shock by reverse phase controlling a drive motor during gear-shifting of a hybrid vehicle without a torque converter. The method includes determining whether a gear-shifting command is outputted from a transmission control unit of the hybrid vehicle; when it is determined that the gear-shifting command is outputted, confirming a gear-shifting range divided into at least three phases in accordance with the gear-shifting command; determining whether the corresponding divided gear-shifting range is an anti-jerk allowed gear-shifting range; and when it is determined that the corresponding gear-shifting range is the anti-jerk allowed gear-shifting range, reverse phase controlling a drive motor of the hybrid vehicle by a predetermined value in order to reduce or attenuate vibration and shock generated in the corresponding gear-shifting range.Type: ApplicationFiled: October 29, 2013Publication date: June 12, 2014Applicants: Kia Motors Corporation, Hyundai Motor CompanyInventors: Joung Chul Kim, Tai Jin Jugn
-
Publication number: 20140143872Abstract: Disclosed is a method of determining whether or not a website is malicious at a high speed, which determines unknown attacks, detection avoidance attacks and the like at a high speed when the website is inspected by visiting. The method of determining whether or not a website is malicious at a high speed includes the steps of: simultaneously visiting, if a list of inspection target websites is received, a plurality of inspection target websites using multiple browsers; and grasping whether or not malicious code infection is attempted through a correlation analysis of behavior information created when the plurality of inspection target websites is visited through the multiple browsers.Type: ApplicationFiled: October 29, 2013Publication date: May 22, 2014Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Tai Jin LEE, Byung Ik KIM, Hong Koo KANG, Chang Yong LEE, Ji Sang KIM, Hyun Cheol JEONG
-
Publication number: 20140143871Abstract: Disclosed is a method of inspecting mass websites by visiting, which inspects the mass websites by visiting at a high speed using multiple browsers and multiple frames. The method of inspecting mass websites includes the steps of: simultaneously visiting, if a list of inspection target websites is received, a plurality of inspection target websites using multiple browsers; inspecting whether or not a malicious code infection attack is generated at the plurality of inspection target websites visited through the multiple browsers; and tracing, if the malicious code infection attack is detected among the plurality of inspection target websites, a malicious website through revisit inspection using a tree search algorithm.Type: ApplicationFiled: October 29, 2013Publication date: May 22, 2014Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Tai Jin LEE, Byung Ik KIM, Hong Koo KANG, Chang Yong LEE, Ji Sang KIM, Hyun Cheol JEONG
-
Publication number: 20140143866Abstract: Disclosed is a method of inspecting mass websites at a high speed, which visits and inspects the mass websites at a high speed and, at the same time, correctly detects unknown attacks, detection avoidance attacks and the like and extracts URLs related to vulnerability attacks. The method of inspecting mass websites at a high speed includes the steps of: simultaneously visiting, if a list of inspection target websites is received, a plurality of inspection target websites using multiple browsers; inspecting whether or not malicious code infection is attempted at the plurality of inspection target websites visited through the multiple browsers; extracting a malicious website where the attempt of malicious code infection is generated among the plurality of inspection target websites; and visiting the malicious website and tracing a malicious URL distributing a malicious code.Type: ApplicationFiled: October 29, 2013Publication date: May 22, 2014Applicant: Korea Internet & Security AgencyInventors: Tai Jin LEE, Byung Ik KIM, Hong Koo KANG, Chang Yong LEE, Ji Sang KIM, Hyun Cheol JEONG
-
Publication number: 20140137251Abstract: Disclosed is a system for identifying malicious codes of high risk. The system includes a statistical data creation module for creating statistical data by collecting and processing malicious codes by channel, ranking, period, type, re-infection and vaccine diagnosis; a trend data creation module for creating trend data by processing the collected malicious codes by channel, field and type; a malicious code filtering module for extracting the malicious code of high risk from the collected malicious codes based on priority information including a URL type, the number of distribution sites, the number of landing sites, a vaccine diagnosis rate and the number of reports; and a database for processing and storing the statistical data, the trend data and the malicious codes of high risk in a form of a graph, a pie chart and a table.Type: ApplicationFiled: October 29, 2013Publication date: May 15, 2014Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Tai Jin LEE, Byung Ik KIM, Hong Koo KANG, Chang Yong LEE, Ji Sang KIM, Hyun Cheol JEONG
-
Publication number: 20140137250Abstract: A system and method for detecting final distribution and landing sites of a malicious code. The method extracts and collecting new article URLs and advertisement banner URLs by inspecting a main page of a press company; filters malicious-suspected URLs suspicious of hiding the malicious code from the new article URLs and the advertisement banner URLs; collects files created when the malicious-suspected URLs are visited, through visit inspection; self-inspects the created files collected through the created file collection using a commercial vaccine; and traces, if the malicious code is detected in the created file, the final distribution and landing sites distributing the detected malicious code.Type: ApplicationFiled: October 24, 2013Publication date: May 15, 2014Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Tai Jin LEE, Byung Ik KIM, Hong Koo KANG, Chang Yong LEE, Ji Sang KIM, Hyun Cheol JEONG
-
Publication number: 20140130167Abstract: A system and method for periodically inspecting malicious code distribution and landing sites, which receives a malicious-suspected URL from a management server; collects a file which is created when the malicious-suspected URL is connected and self-inspecting existence of the malicious code in the collected file using a commercial vaccine; traces, if a malicious code is detected in the collected file, a final distribution site distributing the detected malicious code; confirms information on a landing site connected to the final distribution site and registering the final distribution site and the landing site in a landing/distribution site database; confirms whether or not the final distribution site and the landing site registered in the landing/distribution site database are connectible; and updates the landing/distribution site database according to whether or not the final distribution site and the landing site are connectible.Type: ApplicationFiled: October 24, 2013Publication date: May 8, 2014Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Tai Jin LEE, Byung Ik KIM, Hong Koo KANG, Chang Yong LEE, Ji Sang KIM, Hyun Cheol JEONG
-
Publication number: 20130185793Abstract: An apparatus and method for effectively tracking a network path by using packet information generated when visiting a Web page are provided. According to embodiments of the invention, referrer information, seed information, and arrival information are extracted by using HTTP packet information generated while a particular Web page is being executed, whereby an infection path of malicious codes generated in several Web pages can be checked, thus preventing infection of a malicious code generated in Web pages.Type: ApplicationFiled: November 14, 2012Publication date: July 18, 2013Inventors: Hyun Cheol Jeong, Seung Goo Ji, Tai Jin Lee, Jong II Jeong, Hong Koo Kang, Byung Ik Kim
-
Publication number: 20130179421Abstract: A system and method for collecting a URL using a retrieval service of an SNS capable of accurately and effectively extracting and collecting information including a malicious code among information exchanged in an SNS are provided. URL information included in post (a bulletin script, a message, a note, or the like) exchanged in an SNS based on real-time search word information is extracted and collected to be utilized for collecting a malicious code in the SNS, whereby generation of a malicious code in the SNS can be prevented in advance, and thus, damage to users due to infection of a malicious code can be significantly reduced. In addition, the URL information can be effectively collected through crawling.Type: ApplicationFiled: November 14, 2012Publication date: July 11, 2013Inventors: Hyun Cheol Jeong, Seung Goo Ji, Tai Jin Lee, Jong Il Jeong, Hong Koo Kang, Byung Ik Kim
-
Publication number: 20130160127Abstract: Disclosed herein is a PDF document type malicious code detection system for efficiently detecting a malicious code embedded in a document type and a method thereof. The present invention may perform a dynamic and static analysis on JavaScript within a PDF document, and execute the PDF document to perform a PDF dynamic analysis, thereby achieving an effect of efficiently extracting a malicious code embedded in the PDF document.Type: ApplicationFiled: October 22, 2012Publication date: June 20, 2013Applicant: Korea Internet & Security AgencyInventors: Hyun Cheol Jeong, Seung Goo Ji, Tai Jin Lee, Jong Il Jeong, Hong Koo Kang, Byung Ik Kim
-
Publication number: 20130112665Abstract: A device and a method of vibro-spot welding which weld overlapped metal plates by heating welding portions of the overlapped metal plates and applying linear and repetitive load to the welding portions are disclosed. The device of vibro-spot welding may include a pair of vibration welders facing each other with respect to overlapped metal plates, wherein at least one of the pair of vibration welders heats welding portions of the metal plates, generates plastic flow at the welding portions by moving the welding portions reciprocally between the pair of vibration welders, and joining the welding portions by applying pressure to the welding portions at which the plastic flow occurs.Type: ApplicationFiled: July 21, 2011Publication date: May 9, 2013Applicants: Pukyong National University Business Incubator Cen, Sungwoo Hitech Co., Ltd.Inventor: In Tai Jin
-
Patent number: 8438639Abstract: Disclosed is a DDoS attack detection and response apparatus. The DDoS attack detection and response apparatus comprises: a receiver unit receiving HTTP requests from a client terminal which is characterized as an IP address; a data measuring unit computing the number of HTTP requests by IP and the number of URIs per HTTP over a certain time period; a DDoS discrimination unit comparing the number of HTTPs per URI with a threshold value and defining an access of the client terminal having the IP address as a DDoS attack when the number of HTTPs per URI is larger than the threshold value; and a blocking unit blocking packets from the IP address when the DDoS discrimination unit detects a DDoS attack.Type: GrantFiled: October 20, 2010Date of Patent: May 7, 2013Assignee: Korea Internet & Security AgencyInventors: Tai Jin Lee, YongGeun Won, ChaeTae Im, HyunChul Jeong
-
Publication number: 20120311709Abstract: An automatic management system includes a malicious code group-mutant storage module that receives a malicious codes analysis result from a malicious code collection-analysis system and extracts group information and mutant information of the malicious codes based on the malicious code analysis result, a malicious code group-mutant DB that stores the extracted group information and mutant information, a malicious code group-mutant management module that provides interface to allow a user to detect the group information and mutant information stored in the malicious code group-mutant DB, and a visualizing module that outputs the detection result to the user, wherein the malicious code group-mutant management module that groups malicious codes having action associations using the group information and mutant information stored in the malicious code group-mutant DB, outputs the group information through the visualizing module and outputs the mutant information based on CFG similarity and string similarity througType: ApplicationFiled: November 28, 2011Publication date: December 6, 2012Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Hong-Koo Kang, Chae-Tae Im, Joo-Hyung Oh, Jong-Il Jeong, Jin-Kyung Lee, Byoung-Ik Kim, Hyun-Cheol Jeong, Seung-Goo Ji, Tai-Jin Lee
-
Patent number: 8283601Abstract: A bonding apparatus of metal plates includes an upper mold having a first guide pathway formed vertically inside thereof; a middle mold having a second guide pathway formed vertically inside thereof, where the middle mold is disposed under the upper mold; a lower mold having a metal removing pathway formed vertically inside thereof, where the lower mold is disposed under the middle mold; a heating unit for heating the metal plates and a metal tape; a punch for applying a bonding load to the metal plates; a clamping unit that applies a clamping load for clamping the metal plates to the upper mold; and a bonding unit that applies the bonding load to the punch for bonding the metal plates.Type: GrantFiled: July 14, 2006Date of Patent: October 9, 2012Assignees: Sungwoo Hitech Co., Ltd., Pukyong National University Business Incubator CenterInventor: In Tai Jin
-
Publication number: 20120167220Abstract: Provided is seed information collecting device for detecting malicious code landing/hopping/distribution sites. The device comprises: a seed information collecting module collecting social issue keywords from a seed information collecting channel and collecting address information of potential malicious code landing/hopping/distribution sites using the collected social issue keywords; a web source code collecting module collecting web source code of the potential malicious code landing/hopping/distribution sites using the address information of the potential malicious code landing/hopping/distribution sites collected by the seed information collecting module; and a policy management module managing collection policies of the seed information collecting module and the web source code collecting module.Type: ApplicationFiled: November 28, 2011Publication date: June 28, 2012Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Jong-Il Jeong, Chae-Tae Im, Joo-Hyung Oh, Hong-Koo Kang, Jin-Kyung Lee, Byoung-Ik Kim, Seung-Goo Ji, Tai-Jin Lee, Hyun-Cheol Jeong
-
Publication number: 20120159625Abstract: The present invention provides a malicious code detection and classification system using a string comparison technique, including a string extracting unit configured to extract all expressed strings existing in a binary file from the malicious code binary file; a string refining unit configured to refine elements obstructing malicious code detection and classification in the strings extracted from the string extracting unit; and a string comparison unit configured to determine how similar one binary is to another binary by comparing strings refined from the string refining unit.Type: ApplicationFiled: October 27, 2011Publication date: June 21, 2012Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Hyun-Cheol JEONG, Seung-Goo JI, Tai Jin LEE, Jong-Il JEONG, Hong-Koo KANG, Byung-Ik KIM