Patents by Inventor Taeho Kgil

Taeho Kgil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11934503
    Abstract: An electronic apparatus is provided. The electronic apparatus includes a display; a sensor configured to detect a fingerprint of a user on the display; and a processor configured to: identify the fingerprint of the user based on information from the sensor; and control the display to display a path configured to guide a user touch on the display to move to a boundary of the display from a first region where the fingerprint has been detected.
    Type: Grant
    Filed: March 25, 2022
    Date of Patent: March 19, 2024
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jiyoung Song, Taeho Kgil, Geunhwi Lim
  • Patent number: 11810116
    Abstract: Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: November 7, 2023
    Assignee: Visa International Service Association
    Inventors: Gyan Prakash, Ajit Gaddam, Glenn Powell, Taeho Kgil, Christian Aabye
  • Patent number: 11750373
    Abstract: A technique, performed by an electronic device, of managing a security key is provided. The electronic device may receive security information from each of at least one other electronic device, determine a master electronic device based on a security level of the electronic device and a security level of a security level of the at least one other electronic device, the security level of the at least one other electronic device being included in the received security information, generate a security key as the electronic device is determined as the master electronic device, and determine a portion to be removed from the security key for each security level of a plurality of electronic devices including the electronic device and the at least one other electronic device, and provide each partial security key from which the determined portion is omitted, to the at least one other electronic device.
    Type: Grant
    Filed: January 11, 2022
    Date of Patent: September 5, 2023
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Sangwan Kwon, Taeho Kgil, Jinsu Kim
  • Publication number: 20230027977
    Abstract: An electronic device may: when a first piece of content is acquired, acquire a first score for the relationship between the first piece of content and the privacy of a user of the electronic device, on the basis of information about a person included in the first piece of content and information about an event included in the first piece of content; acquire a second score for the security of each of at least one application which can access the first piece of content; and, when a request for accessing the first piece of content via a first application from among the at least one application is received, determine whether or not to block access to the first piece of content via the first application, on the basis of the first score corresponding to the first piece of content and the second score corresponding to the first application.
    Type: Application
    Filed: October 3, 2022
    Publication date: January 26, 2023
    Inventors: Gailjoon AHN, Junbum SHIN, Choonghoo LEE, Kyungsun CHO, Wonhyuk KANG, Soonhong KWON, Taeho KGIL, Eungjun KIM, Chungyong EOM, Dongik LEE, Youngman JUNG, Jongmin CHOI
  • Publication number: 20220215685
    Abstract: An electronic apparatus is provided. The electronic apparatus includes a display; a sensor configured to detect a fingerprint of a user on the display; and a processor configured to: identify the fingerprint of the user based on information from the sensor; and control the display to display a path configured to guide a user touch on the display to move to a boundary of the display from a first region where the fingerprint has been detected.
    Type: Application
    Filed: March 25, 2022
    Publication date: July 7, 2022
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jiyoung SONG, Taeho KGIL, Geunhwi LIM
  • Publication number: 20220182226
    Abstract: A technique, performed by an electronic device, of managing a security key is provided. The electronic device may receive security information from each of at least one other electronic device, determine a master electronic device based on a security level of the electronic device and a security level of a security level of the at least one other electronic device, the security level of the at least one other electronic device being included in the received security information, generate a security key as the electronic device is determined as the master electronic device, and determine a portion to be removed from the security key for each security level of a plurality of electronic devices including the electronic device and the at least one other electronic device, and provide each partial security key from which the determined portion is omitted, to the at least one other electronic device.
    Type: Application
    Filed: January 11, 2022
    Publication date: June 9, 2022
    Inventors: Sangwan KWON, Taeho KGIL, Jinsu KIM
  • Publication number: 20210049607
    Abstract: Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.
    Type: Application
    Filed: October 29, 2020
    Publication date: February 18, 2021
    Inventors: Gyan Prakash, Ajit Gaddam, Glenn Powell, Taeho Kgil, Christian Aabye
  • Patent number: 10861019
    Abstract: Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.
    Type: Grant
    Filed: March 18, 2016
    Date of Patent: December 8, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Gyan Prakash, Ajit Gaddam, Glenn Powell, Taeho Kgil, Christian Aabye
  • Patent number: 10796009
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: October 6, 2020
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 10581924
    Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: March 3, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
  • Publication number: 20190188394
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Application
    Filed: February 7, 2019
    Publication date: June 20, 2019
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 10255444
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: April 9, 2019
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 10250593
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: April 2, 2019
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Publication number: 20180352005
    Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted, if the data item has a high sensitivity, the system can request authentication before granting access to-the data item.
    Type: Application
    Filed: July 19, 2018
    Publication date: December 6, 2018
    Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
  • Patent number: 10038726
    Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: July 31, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
  • Patent number: 10002174
    Abstract: Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state. The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message.
    Type: Grant
    Filed: March 9, 2017
    Date of Patent: June 19, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Selim Aissi, Taeho Kgil
  • Publication number: 20180107828
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Application
    Filed: November 30, 2017
    Publication date: April 19, 2018
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 9911107
    Abstract: Generally, this disclosure describes a method and system for automated check-out and drop-off return of products using a mobile device. A method may include purchasing at least one product of a plurality of products wherein each product is located at a respective associated product location in a store that sells the plurality of products and a point of sale of each purchased product corresponds to the respective associated product location.
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: March 6, 2018
    Assignee: INTEL CORPORATION
    Inventors: Hong Li, Eddie Balthasar, Taeho Kgil, Anand Rajan, Mark H. Price
  • Patent number: 9870477
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: January 16, 2018
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Publication number: 20170346806
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Application
    Filed: August 15, 2017
    Publication date: November 30, 2017
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam