Patents by Inventor Taeho Kgil
Taeho Kgil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11934503Abstract: An electronic apparatus is provided. The electronic apparatus includes a display; a sensor configured to detect a fingerprint of a user on the display; and a processor configured to: identify the fingerprint of the user based on information from the sensor; and control the display to display a path configured to guide a user touch on the display to move to a boundary of the display from a first region where the fingerprint has been detected.Type: GrantFiled: March 25, 2022Date of Patent: March 19, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Jiyoung Song, Taeho Kgil, Geunhwi Lim
-
Patent number: 11810116Abstract: Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.Type: GrantFiled: October 29, 2020Date of Patent: November 7, 2023Assignee: Visa International Service AssociationInventors: Gyan Prakash, Ajit Gaddam, Glenn Powell, Taeho Kgil, Christian Aabye
-
Patent number: 11750373Abstract: A technique, performed by an electronic device, of managing a security key is provided. The electronic device may receive security information from each of at least one other electronic device, determine a master electronic device based on a security level of the electronic device and a security level of a security level of the at least one other electronic device, the security level of the at least one other electronic device being included in the received security information, generate a security key as the electronic device is determined as the master electronic device, and determine a portion to be removed from the security key for each security level of a plurality of electronic devices including the electronic device and the at least one other electronic device, and provide each partial security key from which the determined portion is omitted, to the at least one other electronic device.Type: GrantFiled: January 11, 2022Date of Patent: September 5, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Sangwan Kwon, Taeho Kgil, Jinsu Kim
-
Publication number: 20230027977Abstract: An electronic device may: when a first piece of content is acquired, acquire a first score for the relationship between the first piece of content and the privacy of a user of the electronic device, on the basis of information about a person included in the first piece of content and information about an event included in the first piece of content; acquire a second score for the security of each of at least one application which can access the first piece of content; and, when a request for accessing the first piece of content via a first application from among the at least one application is received, determine whether or not to block access to the first piece of content via the first application, on the basis of the first score corresponding to the first piece of content and the second score corresponding to the first application.Type: ApplicationFiled: October 3, 2022Publication date: January 26, 2023Inventors: Gailjoon AHN, Junbum SHIN, Choonghoo LEE, Kyungsun CHO, Wonhyuk KANG, Soonhong KWON, Taeho KGIL, Eungjun KIM, Chungyong EOM, Dongik LEE, Youngman JUNG, Jongmin CHOI
-
Publication number: 20220215685Abstract: An electronic apparatus is provided. The electronic apparatus includes a display; a sensor configured to detect a fingerprint of a user on the display; and a processor configured to: identify the fingerprint of the user based on information from the sensor; and control the display to display a path configured to guide a user touch on the display to move to a boundary of the display from a first region where the fingerprint has been detected.Type: ApplicationFiled: March 25, 2022Publication date: July 7, 2022Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Jiyoung SONG, Taeho KGIL, Geunhwi LIM
-
Publication number: 20220182226Abstract: A technique, performed by an electronic device, of managing a security key is provided. The electronic device may receive security information from each of at least one other electronic device, determine a master electronic device based on a security level of the electronic device and a security level of a security level of the at least one other electronic device, the security level of the at least one other electronic device being included in the received security information, generate a security key as the electronic device is determined as the master electronic device, and determine a portion to be removed from the security key for each security level of a plurality of electronic devices including the electronic device and the at least one other electronic device, and provide each partial security key from which the determined portion is omitted, to the at least one other electronic device.Type: ApplicationFiled: January 11, 2022Publication date: June 9, 2022Inventors: Sangwan KWON, Taeho KGIL, Jinsu KIM
-
Publication number: 20210049607Abstract: Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.Type: ApplicationFiled: October 29, 2020Publication date: February 18, 2021Inventors: Gyan Prakash, Ajit Gaddam, Glenn Powell, Taeho Kgil, Christian Aabye
-
Patent number: 10861019Abstract: Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.Type: GrantFiled: March 18, 2016Date of Patent: December 8, 2020Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Gyan Prakash, Ajit Gaddam, Glenn Powell, Taeho Kgil, Christian Aabye
-
Patent number: 10796009Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: GrantFiled: February 7, 2019Date of Patent: October 6, 2020Assignee: Visa International Service AssociationInventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Patent number: 10581924Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.Type: GrantFiled: July 19, 2018Date of Patent: March 3, 2020Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
-
Publication number: 20190188394Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: ApplicationFiled: February 7, 2019Publication date: June 20, 2019Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Patent number: 10255444Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: GrantFiled: November 30, 2017Date of Patent: April 9, 2019Assignee: Visa International Service AssociationInventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Patent number: 10250593Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.Type: GrantFiled: August 15, 2017Date of Patent: April 2, 2019Assignee: Visa International Service AssociationInventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
-
Publication number: 20180352005Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted, if the data item has a high sensitivity, the system can request authentication before granting access to-the data item.Type: ApplicationFiled: July 19, 2018Publication date: December 6, 2018Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
-
Patent number: 10038726Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.Type: GrantFiled: June 12, 2014Date of Patent: July 31, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
-
Patent number: 10002174Abstract: Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state. The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message.Type: GrantFiled: March 9, 2017Date of Patent: June 19, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Selim Aissi, Taeho Kgil
-
Publication number: 20180107828Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: ApplicationFiled: November 30, 2017Publication date: April 19, 2018Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Patent number: 9911107Abstract: Generally, this disclosure describes a method and system for automated check-out and drop-off return of products using a mobile device. A method may include purchasing at least one product of a plurality of products wherein each product is located at a respective associated product location in a store that sells the plurality of products and a point of sale of each purchased product corresponds to the respective associated product location.Type: GrantFiled: February 27, 2012Date of Patent: March 6, 2018Assignee: INTEL CORPORATIONInventors: Hong Li, Eddie Balthasar, Taeho Kgil, Anand Rajan, Mark H. Price
-
Patent number: 9870477Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: GrantFiled: July 26, 2016Date of Patent: January 16, 2018Assignee: Visa International Service AssociationInventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Publication number: 20170346806Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.Type: ApplicationFiled: August 15, 2017Publication date: November 30, 2017Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam