Patents by Inventor Deok In LIM

Deok In LIM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150293790
    Abstract: Provided herein a method for driving a virtual machine, the method including providing a plurality of virtual machines and a virtual machine monitor configured to manage the plurality of virtual machines; generating, by the plurality of virtual machines, memory management information, that is information on memory being used by the plurality of virtual machines; and determining, by the virtual machine monitor, whether or not a virtual machine is a victim virtual machine from which memory needs to be retrieved or whether or not the virtual machine is a beneficiary virtual machine where memory needs to be allocated, based on the memory management information.
    Type: Application
    Filed: March 31, 2015
    Publication date: October 15, 2015
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Soo Young KIM, Tae Ho KIM, Chae Deok LIM
  • Publication number: 20150271679
    Abstract: A system and method of verifying integrity of software for verifying the integrity of software installed on a mobile terminal is provided. The system includes the mobile terminal configured to transmit mobile terminal information including a first software hash value and a software identification (ID) with respect to the software, and an office trust software monitor server configured to transmit the software ID transmitted from the mobile terminal to a software publishing server, receive a second software hash value with respect to the software corresponding to the software ID from the software publishing server, compare the first software hash value and the second software hash value, and verify the integrity of the software.
    Type: Application
    Filed: March 19, 2015
    Publication date: September 24, 2015
    Inventors: Su Wan PARK, Geon Lyang KIM, Kyung Soo LIM, Jae Deok LIM, Jeong Nyeo KIM
  • Publication number: 20150256321
    Abstract: Disclosed are an airplane system including duplex modules, and a control method thereof The control method of the airplane system includes: receiving, by each of a plurality of duplex modules, a corresponding event command from a client; performing, by a first module, a first event specified by the event command in response to the event command; performing, by a second module different from the first module, a second event specified by the event command after the first event is completed; and returning a first response signal indicating a result of the performance of the first event and a second response signal indicating a result of the performance of the second event to the client, in which the client compares the first response signal and the second response signal, and determines whether the plurality of duplex modules is synchronized or has an error.
    Type: Application
    Filed: February 2, 2015
    Publication date: September 10, 2015
    Inventors: Chang Min SHIN, Tae Ho KIM, Chae Deok LIM
  • Publication number: 20150117640
    Abstract: Provided are an apparatus and method for guaranteeing the safety of a computing device by separating a closed domain from an open domain in the computing device and allowing the closed domain to perform key derivation that is required for encryption/decryption of data. The computing device includes a hypervisor, the open domain and the closed domain isolated from the open domain without being open to a user, the open domain and the closed domain managed by the hypervisor, and a key derivation executable code configured to generate an encryption key needed to perform encryption in the open domain, from a seed value, the key derivation executable code being executed in the closed domain, wherein the encryption key generated by the key derivation executable code is transferred to the open domain, and is automatically discarded after being used for encryption of data in the open domain.
    Type: Application
    Filed: April 2, 2014
    Publication date: April 30, 2015
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jong-Yeon PARK, Young-Ho Kim, Yun-Kyung Lee, Jae-Deok Lim, Jeong-Nyeo Kim
  • Publication number: 20150106871
    Abstract: Provided is a system for controlling access to a security engine of a mobile terminal including a basic operating system and a security engine in which an app ID and user authentication information are transmitted to the security engine in order to execute a reliable app installed in the basic operating system and use a security function of the security engine, and the security engine performs authentication of whether an app is the reliable app or whether a user executing the reliable app is an owner of the mobile terminal based on the app ID transmitted from the basic operating system and the user authentication information and then permits access to the security engine.
    Type: Application
    Filed: July 15, 2014
    Publication date: April 16, 2015
    Applicant: Electronics and Telecommunications Research Institute
    Inventor: Jae Deok LIM
  • Publication number: 20150100964
    Abstract: Provided are an apparatus and method for managing migration of tasks between cores based on a scheduling policy, which can provide optimal environments utilizing multiple cores to the tasks with various characteristics. It is possible to schedule tasks in consideration of different characteristics. In particular, it is possible to continuously secure the performance of the multi-core system in an environment for operating a plurality of application programs. It is also possible to optimally utilize all cores of the multi-core system, thereby flexibly handling dynamic variation in characteristics of tasks.
    Type: Application
    Filed: June 5, 2014
    Publication date: April 9, 2015
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Gap Joo NA, Yung Joon JUNG, Chae Deok LIM
  • Publication number: 20150082306
    Abstract: A cyber-physical system and a method of monitoring a virtual machine thereof are provided. The cyber-physical system includes a plurality of target controllers that includes middleware operating based on different operating systems and that control different targets, and a system monitor that includes integrated middleware of analyzing and synthesizing information collected from the middleware. First virtual machines corresponding to virtualization of the target controllers and a second virtual machine corresponding to virtualization of the system monitor are independently formed through a virtual machine monitor.
    Type: Application
    Filed: July 10, 2014
    Publication date: March 19, 2015
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jin Ah SHIN, Taeho KIM, Chae Deok LIM
  • Publication number: 20150027810
    Abstract: A combined stepladder and work platform assembly is provided. The assembly comprises a top frame having two side rails and footplate, a back frame pivotally attached to the back side of the top frame and having two side rails, and a front frame pivotally attached to the front side of the top frame and having two side rails. Link bars are provided so that they maintain steps horizontal together with the side rails of the front frame. Four braces secure the back frame and front frame with the top frame at a certain angle when the assembly is used as a work platform. The front frame, the top frame and the back frame form a triangular shape while the back frame is parallel to the floor when the assembly is used as a stepladder.
    Type: Application
    Filed: July 24, 2014
    Publication date: January 29, 2015
    Inventors: Thomas YOO, Jong Deok LIM
  • Publication number: 20140317485
    Abstract: An apparatus for displaying hyperlinks using keywords and a method thereof are disclosed. The apparatus for display the hyperlinks using the keywords includes: a hyperlink list generating unit configured to collect hyperlinks included in a web document, select a target hyperlink among the hyperlinks, and generate a hyperlink list including the selected target hyperlink; a keyword list generating unit configured to select keywords corresponding the respective hyperlinks included in the hyperlink list and generate a keyword list including the keywords; and a control widget displaying unit configured to display the keywords following the hyperlink according to an input of a user in a control widget.
    Type: Application
    Filed: April 22, 2014
    Publication date: October 23, 2014
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Hadipurnawan SATRIA, Kyung-Hee LEE, Chae-Deok LIM
  • Patent number: 8850291
    Abstract: A data input method of a NAND flash memory includes: determining whether a size of a writing-requested data is less than a reference value; calculating an error correction code (ECC) for the data using a software ECC method when the data size is less than the reference value; and writing the data and the ECC to a data region of the NAND flash memory. A data output method of the NAND flash memory includes: determining whether a size of a reading-requested data is less than a reference value; reading the data and an error correction code (ECC) from the NAND flash memory; calculating an ECC for the read data using a software ECC method when the data size is less than the reference value; and performing an error detection and correction by comparing the calculated ECC and the read ECC.
    Type: Grant
    Filed: January 5, 2011
    Date of Patent: September 30, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Dong Wook Kang, Chae Deok Lim
  • Publication number: 20140227971
    Abstract: Disclosed herein are a user terminal for performing mutual awareness with an awareness target terminal located within a preset distance and a method for performing mutual awareness between a user terminal and an awareness target terminal located within a preset distance. The user terminal includes a signal generation unit and a magnetic field formation unit. The signal generation unit generates pulse signals. The magnetic field formation unit generates magnetic fields that correspond to the pulse signals and that generate induced currents in the awareness target terminal.
    Type: Application
    Filed: September 9, 2013
    Publication date: August 14, 2014
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Ho-Joon PARK, Kyung-Hee Lee, Chae-Deok Lim
  • Patent number: 8761499
    Abstract: A system for detecting a global harmful video includes: a video determination policy generation unit for determining harmfulness of learning video segments from video learning information to analyze occurrence information of harmful learning video segments, and generating a global harmfulness determination policy based on the occurrence information; and a video determination policy execution unit for determining harmfulness of input video segments from information of an input video to analyze occurrence information of harmful input video segments, and determining whether the input video is harmful or not based on the occurrence information of the harmful input video segments and the global harmfulness determination policy.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: June 24, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Seung Wan Han, Jae Deok Lim, Byeong Cheol Choi, Byung Ho Chung, Hyun Sook Cho
  • Publication number: 20140150084
    Abstract: A user authentication apparatus safely uses resources by forming a communication channel between a plurality of execution environments through user authentication in a portable terminal providing the plurality of execution environments based on a virtualization solution, and prevents private information from being illegally leaked by hacking by not directly exposing a PIN number or a password a user inputs using a virtual keyboard and a keyboard coordinate when authenticating the user.
    Type: Application
    Filed: November 13, 2013
    Publication date: May 29, 2014
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yun-Kyung LEE, Jae Deok LIM, Young Ho KIM, Jeong Nyeo KIM
  • Publication number: 20140122937
    Abstract: Disclosed herein is a monitoring method and apparatus for an ARINC 653-based operating system. In the monitoring method for an ARINC 653-based operating system according to the present invention, a client system transfers information about a breakpoint to a target system. The breakpoint information is set in the target system. A Micro Controller Unit (MCU) reads a Program Counter (PC). If the breakpoint information matches the PC, an interrupt is caused. A function contained in the breakpoint information matching the PC is executed.
    Type: Application
    Filed: July 16, 2013
    Publication date: May 1, 2014
    Inventors: Chang-Min SHIN, Tae-Ho KIM, Chae-Deok LIM
  • Publication number: 20140058993
    Abstract: A high-speed decision apparatus and method for harmful contents, capable of determining whether contents are harmful by performing a harmfulness determination operation on only some sections, rather than all sections, of the content, based on the content playback characteristic that when content having a harmful part is played, the harmful part continues to be played for a certain period of time.
    Type: Application
    Filed: July 1, 2013
    Publication date: February 27, 2014
    Inventor: Jae-Deok LIM
  • Publication number: 20140033266
    Abstract: A method and apparatus provides a concealed software execution environment based on virtualization. The method and apparatus constructs a concealed domain that is exclusively executed without being exposed to the outside using a virtualization-based domain separating technology and executes security information such as key information provided by a secure element within the concealed domain.
    Type: Application
    Filed: July 22, 2013
    Publication date: January 30, 2014
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Young Ho KIM, Jeong Nyeo KIM, Jae Deok LIM, Yun-Kyung LEE
  • Patent number: 8639642
    Abstract: A method for determining harmful multimedia content by using multimedia content playback characteristics includes: determining a local harmfulness of each basic unit section of multimedia content to generate a local determination result; and generating global determination results to complement an error of the local determination result based on the multimedia content playback characteristics. The global determination results are generated by using a continuous determination value which has a meaning of harmful or harmless and is updated depending on each local determination result and the number of continuous determination results is counted or initialized depending on continuity of the local determination results.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: January 28, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventor: Jae Deok Lim
  • Publication number: 20130277263
    Abstract: The reusable packaging box includes a bottom unit that has a receiving space in which a product may be received, a lower body and an upper body that are provided to each have a box shape with open top and bottom to be coupled to a top of the bottom unit, and a lid that has a receiving space in which the product may be received and is coupled to the top of the upper body. Each of the bottom unit, the upper body and the lower body, and the lid is formed of a material that may absorb an impact and thus may perform both a function of absorbing an impact and a function of packaging an outside of the product.
    Type: Application
    Filed: April 23, 2013
    Publication date: October 24, 2013
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Byung Min JUNG, Hyeung Wook PARK, Jong Deok LIM, Yong Seok CHOI
  • Patent number: 8473662
    Abstract: Provided is a method capable of providing an improved response property appropriate for the characteristics of a system by automatically choosing an interrupt handling mode used for each device. The method is a method in which the embedded operating system kernel determines a handling mode for all individual interrupts, the method includes: dividing interrupt handling modes into a first interrupt handling mode and a second interrupt handling mode which has a different process speed from the first interrupt handling mode, and variably determining a distribution ratio in which each of the interrupts are distributed to the first interrupt handling mode or to the second interrupt handling mode according to a predetermined process condition during boot-up.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: June 25, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Dong-Hyouk Lim, Yung-Joon Jung, Yong-Bon Koo, Chae-Deok Lim, Dong-Sun Lim
  • Publication number: 20130159689
    Abstract: The present invention relates generally to a method and apparatus for initializing an embedded device. When a boot loader is executed and a kernel is loaded, an initialization program is executed, and a booting sequence including information about an operating sequence of a boot process is loaded. Thereafter, initialization functions which are included in a script replacement function module of the embedded device are executed, and then a state of the embedded device is set to a usable state. Accordingly, the method and apparatus can efficiently perform the operations of an initialization program that is used to solve the complexity of the initialization of an OS inevitably appearing on mobile devices and high-performance embedded devices, and an initialization script that is operated to flexibly execute the initialization program on various devices having different characteristics.
    Type: Application
    Filed: July 10, 2012
    Publication date: June 20, 2013
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Ho-Joon Park, Chae-Deok Lim, Dong-Wook Kang, Han-Sung Chun