Patents by Inventor Jong Wook Han

Jong Wook Han has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110093954
    Abstract: An apparatus for remotely diagnosing security vulnerabilities, includes a vulnerability analysis unit for obtaining service information by searching a target device of a specific network and a port of the target device, searching a profile DB for principal characteristic information of the acquired service information, determining a query key type based on the retrieved principal characteristic information to acquire a vulnerability diagnosis list present in the principal characteristic information from a vulnerability list management DB; and an attack agent for diagnosing a vulnerability of the principal characteristic information on the vulnerability diagnosis list based on preset characteristic information.
    Type: Application
    Filed: December 15, 2009
    Publication date: April 21, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Hyung Kyu LEE, Jong-Wook HAN, Hyun sook CHO
  • Publication number: 20110085035
    Abstract: An apparatus for protecting privacy information of a surveillance image includes a key management unit for generating and managing keys used to unmask a masked input image; an input image processing unit for unmasking the input image using the keys, decoding the unmasked input image to acquire an uncompressed image data, and then applying a second masking on an area containing privacy information of the image data. Further, the apparatus for protecting the privacy information of the surveillance image includes an image recording unit for encoding the image data to which the second masking has been applied to store the encoded image data.
    Type: Application
    Filed: November 20, 2009
    Publication date: April 14, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: SuGil CHOI, Geonwoo KIM, Jong-Wook HAN, Hyun sook CHO, Jin Hee HAN, Hong Il JU, Moo Seop KIM, Young Sae KIM, Yong-Sung JEON
  • Publication number: 20100277600
    Abstract: A system and method for image information processing are disclosed. The system for image information processing includes: at least one image pickup terminal for providing image data picked up through a camera; an image information processing server for processing data collected from at least one image pickup terminal into data of a new format; and an application server for receiving the processed data from the image information processing server and providing the same to at least one user terminal. The amount of transmission data can be reduced and the reliability of information security can be increased since it is possible to allocate unique IDS to a plurality of image pickup terminals and application servers and identify the image pickup terminals and application servers only by their unique IDs without containing any particular information upon data transmission.
    Type: Application
    Filed: October 10, 2008
    Publication date: November 4, 2010
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yun Kyung Lee, Jong Wook Han, Geon Woo Kim, Deok Gyu Lee, Kyo Il Chung, Jong Soo Jang
  • Publication number: 20100259644
    Abstract: An apparatus and a method for processing image information are provided. The apparatus for processing image information includes an image capturing device and an image information server for receiving and storing an image captured by the image capturing device and adds information on the image capturing device and signature information to image data obtained by the image capturing device. Accordingly, the device information and the signature information can be added to the image data obtained by the image capturing device to maintain security of the image data and use the image data as digital proof when a specific event is generated.
    Type: Application
    Filed: September 11, 2008
    Publication date: October 14, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Deok Gyu Lee, Yun Kyung Lee, Geon Woo Kim, Jong Wook Han, Kyo Il Chung, Jong Soo Jang
  • Publication number: 20100241626
    Abstract: A CyberTAG for linking information to a digital object in an image contents, and an image contents display device, a method and a system using the same are provided. The CyberTAG includes: a tag ID field which serves to identify the digital object in the image contents and to link the digital object to additional information of the digital object; an object generation location field which serves to identify a location at which the digital object is generated while the image contents is displayed; a time field which serves to identify a time when the digital object appears while the image contents is displayed; and a modification value field which serves to trace the location of the digital object from when the digital object is generated to when the digital object disappears.
    Type: Application
    Filed: September 21, 2007
    Publication date: September 23, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Hyung-Kyu Lee, Jong-Wook Han, Kyo-Il Chung
  • Publication number: 20100228985
    Abstract: A content management method in an intelligent robot service system includes: generating a key to distribute the key to a content generation node and a content execution node; generating a signature for a content using the distributed key in the content generation node; providing the content and the signature to the content execution node; and verifying a validity of the content in the content execution node to execute the verified content.
    Type: Application
    Filed: October 30, 2009
    Publication date: September 9, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Geonwoo KIM, Seung-Hee OH, Hyung Kyu LEE, Chol Soon JANG, Jong-Wook HAN
  • Publication number: 20100228976
    Abstract: At least one client robot in a domain are connected to a domain security management unit and a root security management unit is connected to at least one external server outside the domain and the domain security management unit via a network. A method for providing secured network robot services includes generating, at the domain security management unit, a shared key between the client robot and the external server when the client robot requests key distribution; generating, at the domain security management unit, a key distribution request message containing the shared key; and transmitting, at the domain security management unit, the key distribution request message to the external server.
    Type: Application
    Filed: November 16, 2009
    Publication date: September 9, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Hyung Kyu LEE, Geon Woo KIM, Seung-Hee OH, Chol Soon JANG, Jong-Wook HAN
  • Publication number: 20100223464
    Abstract: Provided is a public key based device authentication server including a server authenticator identifying a device in which a service list is registered and acquiring a certificate of the device issued by a certificate authority (CA); and an encryption key generator generating a public key and a private key for the device and transmitting to the device the public key, the private key and the certificate of the device.
    Type: Application
    Filed: June 22, 2007
    Publication date: September 2, 2010
    Applicant: Electronics & Telecommunications Research Institute
    Inventors: Yun-Kyung Lee, Jong-Wook Han, Kyo-Il Chung
  • Publication number: 20100208083
    Abstract: There is provided a system and method for providing an application service using image data. One image data processing server collects images (for example, still images and moving images) captured by various kinds of image capturing apparatuses, such as CCTV systems and processes the collected images into data required to provide application services. A plurality of application service servers only provide processed data of the image data processing server without requiring an additional process to a display device of a user. Accordingly, the configuration of each of the application service servers is simplified to thereby reduce manufacturing costs.
    Type: Application
    Filed: May 14, 2008
    Publication date: August 19, 2010
    Inventors: Yun Kyung Lee, Jong Wook Han, Geon Woo Kim, Deok Gyu Lee, Kyo Il Chung, Jong Soo Jang
  • Publication number: 20100033363
    Abstract: A ship traffic control apparatus includes a location recognizer for measuring a location coordinate of a ship by using a satellite location-based service; a ship identifier/location coordinate manager for storing the location coordinate as coordinate information corresponding to a ship identifier; an accident processing unit for providing an accident information when an accident occurs; and an operation controller for forming location information by mapping between the coordinate information and navigation information, transmitting the location information to other ships or a control system in a prescribed cycle through a radio communication unit, and transmitting accident occurrence information including the accident information and the location information to other ships or the control system.
    Type: Application
    Filed: June 2, 2009
    Publication date: February 11, 2010
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Hyung Kyu Lee, Seoung Hyeon Lee, Do-Woo Kim, Jong-Wook Han, Kyo Il Chung
  • Publication number: 20100037295
    Abstract: In a method for exchanging security situation information between mobile terminals, each of which is connected to a wired/wireless network, security profiles are exchanged between two mobile terminals between which a connection is to be established. The security profiles include security situation information of the mobile terminals, and, each mobile terminal performs a validity check on the received security profile to determine whether security situation of the opponent mobile terminal is trustworthy or not. The connection is established only when the security situations of both mobile terminals are trustworthy.
    Type: Application
    Filed: April 8, 2009
    Publication date: February 11, 2010
    Inventors: Seung-Hee OH, Geon Woo KIM, Hyung Kyu LEE, Jong-Wook HAN
  • Publication number: 20100026826
    Abstract: An image protection apparatus includes an information collecting unit for collecting personally identifiable information to be embedded in images captured by an image capturing instrument; and an information processing unit for extracting personal information from the collected personally identifiable information. Further, the image protection apparatus includes an information embedding unit for embedding the extracted personal information into a captured image; and an image signaturing unit for writing a signature on the captured image by using the extracted personal information.
    Type: Application
    Filed: March 20, 2009
    Publication date: February 4, 2010
    Inventors: Deok Gyu LEE, Yun-Kyung LEE, Geon Woo KIM, Jong-Wook HAN, Kyo Il CHUNG, Jong Soo JANG
  • Publication number: 20100021006
    Abstract: An object tracking method uses a system having an object identifying device and at least one video tracking device, wherein the object identifying device monitors an area to identify an object entering the area and the video tracking device wired/wirelessly connected to the object identifying device monitors the area monitored by the object identifying device. The method includes: extracting, at the object identifying device, object identification information of the object; providing, at the object identifying device, the object identification information to the video tracking device; tracking, at the video tracking device, the object to extract physical information of the object; mapping, at the video tracking device, the physical information to the object identification information to generate object information of the object; and storing, at the video tracking device, the object information in a memory of the video tracking device.
    Type: Application
    Filed: April 30, 2009
    Publication date: January 28, 2010
    Inventors: Geon Woo Kim, Jong-Wook Han
  • Publication number: 20090240941
    Abstract: A device authentication method and device authentication apparatus in a multi domain home network environment are provided. The method includes registering a new device in each local domain and issuing a local domain certificate; making an agreement between local domains in order to authenticate a device registered to another local domain; when the device registered to the home local domain or another local domain requests a service, authenticating the device via communication inside the local domains, thereby minimizing a user's intervention, making it easier to use the apparatus, reducing a device operation with regard to a device having limited performance, and making it easier to extend the apparatus.
    Type: Application
    Filed: June 28, 2007
    Publication date: September 24, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yun-Kyung Lee, Jin-Bum Hwang, Hyung-Kyu Lee, Geon-Woo Kim, Do-Woo Kim, Jong-Wook Han, Kyo-Il Chung
  • Patent number: 7583952
    Abstract: An access pointer for interconnecting a power line communication (PLC) network of a home network and a wireless network and a method therefor are provided. When data is received from the PLC network through media access control of a data link layer, data on upper layers above a network layer in the received data is converted into a format suitable to a wireless network layer. The converted data is transmitted to the wireless network through the media access control of the data link layer. Accordingly, the PLC network and the wireless network are easily interconnected.
    Type: Grant
    Filed: November 23, 2005
    Date of Patent: September 1, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Hyung Kyu Lee, Jong Wook Han, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20090150973
    Abstract: An access control method and system for multiple accessing entities are provided. The access control method includes generating a plurality of integrated identifiers (IDs) respectively corresponding a plurality of individual ID groups, each having the individual IDs of a number of entities; if multiple accessing entities issue a request for access to a service, extracting an integrated ID corresponding to a list of the individual IDs of the multiple accessing entities; and searching for an access control policy corresponding to the extracted integrated ID and the ID of the service and performing access control on the multiple accessing entities according to the identified access control policy. Therefore, it is possible to efficiently control the access of multiple accessing entities to a service.
    Type: Application
    Filed: September 12, 2008
    Publication date: June 11, 2009
    Inventors: Geon Woo KIM, Jong Wook HAN, Kyo Il CHUNG
  • Publication number: 20080082818
    Abstract: An authentication method capable of securing reliability and scalability by authenticating an authentication entity using a certificate signed by a symmetric key, when a user or device accesses a domain in which an authentication process is required are provided. The method includes: (a) allowing a home domain authentication server to generate a certificate and a symmetric key and to distribute the certificate and the symmetric key to an authentication entity; (b) allowing the authentication entity to submit the certificate to the home domain authentication server or an external domain authentication server; and (c) allowing the home domain authentication server or external domain authentication server to verify the validity of the submitted certificate by using the symmetric key. Accordingly, an effective authentication method can be provided in a public key-based authentication method in consideration of data processing capability or computing power.
    Type: Application
    Filed: September 18, 2007
    Publication date: April 3, 2008
    Inventors: Geon Woo KIM, Jong-Wook HAN, Kyo-Il CHUNG
  • Publication number: 20040170275
    Abstract: Provided are an apparatus and method for cryptographing and/or deciphering an image. The apparatus includes an image segmenting unit, a random image generating unit, a cryptographing unit, and a phase card generating unit. The image segmenting unit segments an input binary image into images. The random image generating unit generates as many random images as the segmented images. The cryptographing unit performs XOR operations on the segmented images and the random images on a one-to-one basis to produce as many cryptographed images as the segmented images. The phase card generating unit assigns phase values of &pgr; and 0 to black and white pixels of the cryptographed images to generate phase cards corresponding to the cryptographed images.
    Type: Application
    Filed: August 21, 2003
    Publication date: September 2, 2004
    Inventors: Sang Su Lee, Jong Wook Han, Sung Won Sohn, Chee Hang Park, Jong Yun Kim