Patents Assigned to Foundation of Soongsil University-Industry Cooperation
-
Patent number: 11835118Abstract: The present invention relates to a harmonic gear device in which a first similarity curve obtained by similarly transforming a reference curve representing a moving locus of an external tooth with respect to an internal tooth in a non-deflected state and a second similarity curve generated by similarly transforming the first similarity curve are used as a criterion for generating a tooth profile, wherein the present invention may provide the harmonic gear device that enlarges a first curve represented by a moving locus of positive deflection located above the apex of the reference curve among the moving loci of positive deflection of the external teeth on the basis of the reference curve to approximate an approximate reference point arranged on the second similarity curve to create a second curve, and uses the second curve as the top of the tooth profile of the external tooth.Type: GrantFiled: August 24, 2020Date of Patent: December 5, 2023Assignee: Foundation of Soongsil University-Industry CooperationInventor: Hyeong Joon Ahn
-
Publication number: 20230377509Abstract: A driving circuit board includes a driving circuit board includes: a plurality of driving electrode regions on a surface of the driving circuit board; a plurality of driving electrodes symmetrically arranged on the plurality of driving electrode regions; and a driving circuit electrically connected to at least one of the plurality of driving electrodes, wherein the plurality of driving electrodes include at least one dummy electrode that is not connected to the driving circuit.Type: ApplicationFiled: December 20, 2022Publication date: November 23, 2023Applicants: SAMSUNG ELECTRONICS CO., LTD., FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Junsik HWANG, Geonwook YOO, Hojin LEE, Yongchan KIM, Kyungwook HWANG
-
Publication number: 20230362198Abstract: Provided is a dynamic security policy enforcement system for a container system. The dynamic security policy enforcement system comprises a policy management unit for generating and managing a security policy for a container based on a structured format including a set of rules of a predetermined condition; a policy enforcement unit for checking the set of rules when the container requests a system call, changing the security policy of the structured format into a code in a preset format, and transferring the policy changed into the code to a kernel space; and a policy operation decision unit for enforcing the policy received from the policy enforcement unit in the kernel space based on a policy enforcement program that hooks the system call and generating a return value for performing a predetermined operation.Type: ApplicationFiled: April 17, 2023Publication date: November 9, 2023Applicant: Foundation of Soongsil University-Industry CooperationInventors: Souhwan JUNG, Thien-phuc DOAN, Songi GWAK
-
Patent number: 11809557Abstract: A mobile malicious code classification method based on feature selection includes extracting Application Programming Interface (API) feature information including a package name, a class name, a method name and a description from a malicious application of a predefined category, vectorizing a training dataset generated using the package name, the class name and the method name in the API feature information for deep learning, learning the vectorized training dataset to generate a classifier, probabilistically classifying to fit a target malicious application into a category, and defining the category of the target malicious application using a result of the classification and outputting a classification important API. Accordingly, it is possible to deal with malicious behaviors of malicious applications quickly and prevent damage caused by the malicious behaviors.Type: GrantFiled: January 29, 2021Date of Patent: November 7, 2023Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Jeong Hyun Yi, Eun Byeol Ko
-
Publication number: 20230351198Abstract: The present disclosure provides a hierarchical network intrusion detection method including preprocessing normal data for training, outputting reconstruction data by inputting the preprocessed normal data for training into an autoencoder, calculating a reconstruction error by using the preprocessed normal data for training and the reconstruction data, training the autoencoder to minimize a reconstruction error, extracting hierarchical information of the autoencoder, setting a threshold value by using latent vector for the normal data for training, the reconstruction data, and an output value of each of L hidden layers included in an encoder, calculating anomaly scores of the latent vector for the network data, the reconstruction data, and an output value of each of the L hidden layers in a state in which a target network data is input to the autoencoder, and determining whether an intrusion into the network data is detected by using the threshold value and the anomaly scores.Type: ApplicationFiled: November 2, 2022Publication date: November 2, 2023Applicant: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Minhae KWON, Hyoseon KYE, Miru KIM
-
Patent number: 11791841Abstract: Provided are a bit flipping device and method and a computer readable program for the same. The bit flipping device for input data having a two-dimensional array pattern includes: a clustering unit configured to generate at least one input data sequence based on the two-dimensional array pattern of the input data and classify the input data sequence into at least one cluster according to a preset method; and a bit flipping unit configured to perform bit flipping on erroneous bits in the input data sequence based on the classified cluster. Therefore, it is possible to further reduce inefficiency while further reducing system complexity compared to the existing error correction code-based bit flipping method by coupling the bit flipping device to an output side of a partial response maximum likelihood (PRML) detector to classify an output value of the PRML detector into at least one cluster and perform bit flipping based on the classified result.Type: GrantFiled: July 11, 2022Date of Patent: October 17, 2023Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Jaejin Lee, Seongkwon Jeong
-
Publication number: 20230306112Abstract: Provided is an apparatus for detecting and classifying malicious code. The malicious code detection and classification apparatus comprise a graph-generating unit configured to generate graph information from source data including a plurality of nodes corresponding to APIs included in the source data and one or more edges connecting between the plurality of nodes; a matrix-generating unit configured to generate an adjacency matrix between the APIs included in the source data using the graph information; and a machine-learning unit configured to detect malicious code included in the source data using the adjacency matrix as an input value for a machine-learning-based analysis model.Type: ApplicationFiled: November 26, 2020Publication date: September 28, 2023Applicant: Foundation of Soongsil University-Industry CooperationInventors: Souhwan JUNG, VuLong NGUYEN, Hyunseok SHIM
-
Patent number: 11768938Abstract: A mobile application malicious behavior pattern detection method based on Application Programming Interface (API) call graph extraction includes extracting an API Call Graph (ACG) representing an API call flow from benign applications and applications which perform malicious behavior, generating and vectorizing a training dataset for deep learning using the extracted ACG, generating a deep learning algorithm prediction model by training with the vectorized training dataset, extracting ACG features used in the malicious behavior from the generated prediction model and extracting a malicious behavior pattern from an intersection of the malicious applications, and classifying an application which performs malicious behavior through similarity comparison between the extracted malicious behavior pattern and a pattern extracted from the target application. Accordingly, it is possible to detect the malicious behavior itself using the ACG representing an API call flow.Type: GrantFiled: November 26, 2020Date of Patent: September 26, 2023Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Jeong Hyun Yi, Jin Sung Kim
-
Publication number: 20230279360Abstract: The present invention relates to artificial skin having structure and properties by age, and more specifically to artificial skin having structure and properties, for which effective analysis and application are possible on the basis of age of the skin, as the human skin can be replicated according to age by simple control in the internal structure of properties such as height and width, and a method for manufacturing the same.Type: ApplicationFiled: January 19, 2021Publication date: September 7, 2023Applicant: Foundation of Soongsil University-Industry CooperationInventors: Jae Hyun JEONG, Yun Gon KIM, Jun Woo LIM, Sung Gyu SHIN, Sa Ra HAN, Sung Woo CHO
-
Publication number: 20230230269Abstract: Provided are a depth completion method and apparatus using spatial-temporal information. The depth completion apparatus according to the present invention comprises a processor; and a memory connected to the processor, wherein the memory stores program instructions executable by the processor for performing operations comprising receiving an RGB image and a sparse image through a camera and LiDAR, generating a dense first depth map by processing color information of the RGB image through a first branch based on an encoder-decoder, generating a dense second depth map by up-sampling the sparse image through a second branch based on an encoder-decoder, generating a third depth map by fusing the first depth map and the second depth map, and generating a final depth map including a trajectory of a moving object included in an RGB image continuously captured during movement by inputting the third depth map to a convolution long term short memory (LSTM).Type: ApplicationFiled: January 19, 2023Publication date: July 20, 2023Applicant: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Myung Sik YOO, Minh Tri NGUYEN
-
Publication number: 20230230265Abstract: Provided are a patch GAN-based depth completion method and apparatus in an autonomous vehicle.Type: ApplicationFiled: January 19, 2023Publication date: July 20, 2023Applicant: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Myung Sik YOO, Minh Tri NGUYEN
-
Patent number: 11696130Abstract: Provided is a mobile phone authentication method using implicit authentication, the method including the steps of: by a server, receiving behavior data and environment information data from a user terminal when a user checks an authentication number for authentication of a mobile phone user; by the server, detecting a start point of a behavior of the user for checking the authentication number by performing peak detection in the received behavior data, and storing behavior data from the detected start point; and by the server, extracting feature data from the received environment information data and learning the extracted feature data to build a learning model.Type: GrantFiled: December 31, 2018Date of Patent: July 4, 2023Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventor: Dae Seon Choi
-
Patent number: 11658499Abstract: A battery diagnosis apparatus determines whether a battery may be reused and includes a data obtaining device configured to output a perturbation signal, a signal regulating device configured to generate a current by applying the perturbation signal to a battery and performing feedback of a current signal output from the battery, and a noise canceling device configured to cancel noises of the current signal and a voltage signal received from the battery. The data obtaining device outputs the perturbation signal while changing a frequency, obtains an impedance spectrum based on the noise-canceled current signal and voltage signal for each frequency, and determines whether to reuse the battery based on the obtained impedance spectrum.Type: GrantFiled: November 24, 2021Date of Patent: May 23, 2023Assignees: HYUNDAI MOTOR COMPANY, KIA CORPORATION, FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Bohyun Lee, Won Jae Choi, Ju Seok Kim, Jaekyung Oh, Sangwon Lee, Hee Yeon Ryu, Chulkyu Lee, Woojin Choi, Seungjune Lee, Farhan Farooq
-
Patent number: 11651140Abstract: Provided is a font generating method including generating an intermediate code by adding attributes for METAFONT to code of an outline font, generating a font in the METAFONT by parsing the intermediate code, hierarchizing the font into a whole set representing a whole of a character and a partial set representing a part of the character, and changing a style of the font according to a relational equation representing a relationship between the whole set and the partial set.Type: GrantFiled: November 25, 2020Date of Patent: May 16, 2023Assignee: FOUNDATION OF SOONGSIL UNIVERSITY INDUSTRY COOPERATIONInventors: Jaeyoung Choi, Geunho Jeong
-
Patent number: 11641918Abstract: Provided is a cordless hair dryer. The cordless hair dryer includes a housing including a body part gripped by a user and a head part having a blower tube therein, a battery disposed inside the body part, a blower fan disposed in one end of the head part, a support which is inserted into the other end of the head part and fixed to an inner side of the blower tube, and a planar heating element which is formed as a carbon nanotube sheet and disposed on the support to receive power from the battery.Type: GrantFiled: November 7, 2019Date of Patent: May 9, 2023Assignee: Foundation of Soongsil University-industry CooperationInventors: Young Jin Jeong, Jae Woo Chung, Hyeon Jun Song
-
Publication number: 20230117114Abstract: The present subject matter relates to a method and apparatus for managing a YAML file for Kubernetis. According to the present subject matter, the apparatus comprises a front-end component for providing a visual interface to a client, creating a YAML file in accordance with user input through the visual interface, and transforming the generated YAML file into a JavaScript Object Notation (JSON) form; and a back-end component for storing the YAML file transformed into the JSON form in a database, checking, applying and removing the YAML file, and applying the YAML file to a plurality of Kubernetes clusters such that the YAML file is executed.Type: ApplicationFiled: July 18, 2022Publication date: April 20, 2023Applicant: FOUNDATION OF SOONGSIL UNIVERSITY INDUSTRY COOPERATIONInventors: Myung Sik YOO, Le Van CUONG
-
Publication number: 20230107625Abstract: Disclosed is an integrated clustering system including a master node that sets environment setting for clustering and generate an access token by installing a management program, a plurality of worker nodes that set environment setting based on an environment variable including an IP address of the master node and the access token and perform clustering with the master node by installing the management program, and a system control unit that extracts runtimes of clustering groups including the master node and the plurality of worker nodes which are clustered, and compares the runtime of one of the clustering groups with the runtimes of other clustering group than the one clustering group.Type: ApplicationFiled: July 19, 2022Publication date: April 6, 2023Applicant: Foundation of Soongsil University-Industry CooperationInventor: Myungsik Yoo
-
Publication number: 20230109333Abstract: A method of building an ad-hoc network of a wireless relay node and an ad-hoc network system are disclosed. The method includes verifying state information representing a relative distance and angle to a neighboring node capable of receiving data when each of relay nodes transmits the data, determining an action representing a change over time of each relay node, determining, based on an amount of change in a network throughput determined according to the state information and an amount of energy consumption according to the action, a reward corresponding to the action, and building a network including a source node, a destination node, and a plurality of relay nodes by generating, based on a reward of each of the relay nodes, a policy that allows a cumulative reward to be maximized.Type: ApplicationFiled: May 9, 2022Publication date: April 6, 2023Applicants: Ewha University - Industry Collaboration Foundation, Foundation of Soongsil University-Industry CooperationInventors: Hyunggon PARK, Nayoung KIM, Minhae KWON
-
Patent number: 11562177Abstract: A triple verification method is provided.Type: GrantFiled: November 27, 2019Date of Patent: January 24, 2023Assignee: Foundation of Soongsil University-Industry CooperationInventors: Young Tack Park, Jagvaral Batselem, Wan Gon Lee
-
Patent number: 11520206Abstract: An active metamaterial array of the present disclosure includes: a substrate; a plurality of metamaterial structures disposed on the substrate and spaced apart from each other; a conductivity variable material layer formed between each of the plurality of the metamaterial structures so as to selectively connect the metamaterial structures; an electrolyte material layer formed on the metamaterial structures and the conductivity variable material layer; and a gate electrode disposed at one end of the substrate so as to be in contact with one region of the electrolyte material layer, and when an external voltage is applied to the gate electrode, the gate electrode changes the conductivity of the conductivity variable material layer by controlling the migration of ions contained in the electrolyte material layer.Type: GrantFiled: February 22, 2017Date of Patent: December 6, 2022Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATIONInventors: Ho Jin Lee, Moon Sung Kang, Hyun Seung Jung, Eun Ah Heo, Bo Eun Cho, Jae Mok Koo