Patents by Inventor Deok-Jin Kim

Deok-Jin Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150022042
    Abstract: A motor having an improved structure to enhance durability. The motor includes a stator including stator cores and coils wound on the stator cores, a rotor disposed at the inside of the stator and rotated by electromagnetic interaction with the stator, and a motor shaft combined with the rotor so as to be rotated together with the rotor. The rotor includes a plurality of rotor cores arranged to be separated from each other in the circumferential direction of the rotor, a plurality of rotor slots formed between the plurality of rotor cores, a plurality of permanent magnets inserted into the plurality of rotor slots, molding members filling the plurality of rotor slots so as to cover the outer ends of the plurality of permanent magnets, and a plurality of reception holes provided on the plurality of rotor cores so as to be filled with the molding members.
    Type: Application
    Filed: July 15, 2014
    Publication date: January 22, 2015
    Inventors: Jin Woo HAN, Deok Jin KIM, Young Kwan KIM, Byung Ryel IN
  • Publication number: 20140359969
    Abstract: A motor apparatus having a high efficiency and reducing manufacturing cost by using a cost effective ferrite permanent magnet includes a rotatable shaft, a fan connected to one side of the shaft to generate a flow of air, a stator including stator cores arranged in a circumferential direction, and a coil wound around the stator core, and a rotor disposed at an inside of the stator and provided in a form of a cylinder having a passage allowing the shaft to pass through the rotor includes a rotor core provided with a protrusion structure and one or more ferrite magnets coupled to the rotor core to provide a magnetic force. By using a ferrite magnet, when compared to a conventional universal motor, a superior efficiency is obtained, and when compared to a BLDC motor using a Nd magnet, a low cost BLDC motor is implemented.
    Type: Application
    Filed: May 19, 2014
    Publication date: December 11, 2014
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Kwang Soo KIM, Deok Jin Kim, Myung Bae Bang, Sung Gu Lee, Byung Ryel In, Young Kwan Kim
  • Patent number: 8893233
    Abstract: A referer verification apparatus and method for controlling web traffic having malicious code are provided. In the referer verification method, whether a referer is present in a Hypertext Transfer Protocol (HTTP) packet is determined. If it is determined that the referer is present in the HTTP packet, Uniform Resource Locators (URLs) are extracted from a referer web page corresponding to the referer. The referer is verified based on a URL corresponding to a referer verification request received from a server and the extracted URLs. A Completely Automated Public Test to tell Computers and Humans Apart (CAPTCHA) verification procedure conducted by a user is performed based on results of the verification of the referer.
    Type: Grant
    Filed: September 10, 2012
    Date of Patent: November 18, 2014
    Assignee: Electronics and Telecommunications Research
    Inventors: Chul-Woo Lee, Deok-Jin Kim, Byoung-Jin Han, Byung-Chul Bae, Sang-Woo Park, Man-Hee Lee, E-Joong Yoon
  • Patent number: 8732833
    Abstract: A system and method for detecting network intrusion by using a network processor are provided. The intrusion detection system includes: a first intrusion detector, configured to use a first network processor to perform intrusion detection on layer 3 and layer 4 of a protocol field among information included in a packet header of a packet transmitted to the intrusion detection system, and when no intrusion is detected, classify the packets according to stream and transmit the classified packets to a second intrusion detector; and a second intrusion detector, configured to use a second network processor to perform intrusion detection through deep packet inspection (DPI) for the packet payload of the packets transmitted from the first intrusion detector. Thereby, intrusion detection for high-speed packets can be performed in a network environment.
    Type: Grant
    Filed: April 22, 2012
    Date of Patent: May 20, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Young-Han Choi, Deok-Jin Kim, Sung-Ryoul Lee, Man-Hee Lee, Byung-Chul Bae, Sang-Woo Park, E-Joong Yoon
  • Publication number: 20140020067
    Abstract: An apparatus and method for controlling traffic based on a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) are provided. The traffic control apparatus includes a traffic monitoring unit, a CAPTCHA verification unit, a list management unit, and a traffic control unit. The traffic monitoring unit monitors a packet between an internal network and an external network. The CAPTCHA verification unit, if packet information is not present in an access control list, sends a CAPTCHA request message to a client computer, receives a CAPTCHA response message, and verifies the CAPTCHA response message. The list management unit, if the packet information is present in the access control list, detects an access control policy corresponding to the packet information in the access control list. The traffic control unit controls traffic based the verification of the CAPTCHA response message and the control policy.
    Type: Application
    Filed: September 9, 2012
    Publication date: January 16, 2014
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Deok-Jin KIM, Byoung-Jin HAN, Chul-Woo LEE, Man-Hee LEE, Byung-Chul BAE, Hyung-Geun OH, Ki-Wook SOHN
  • Publication number: 20140013389
    Abstract: A communication blocking control method includes receiving a communication blocking request from a terminal in an idle state in which it is difficult to find out whether information is leaked or not; registering a state of the terminal in a communication blocked list according to the communication blocking request; and blocking external communication of the terminal through a network.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 9, 2014
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Byoung-Jin HAN, Deok-Jin KIM, Chul-Woo LEE, Man-Hee LEE, Byung-Chul BAE, Hyung-Geun OH, Ki-Wook SOHN
  • Publication number: 20130347069
    Abstract: A referer verification apparatus and method for controlling web traffic having malicious code are provided. In the referer verification method, whether a referer is present in a Hypertext Transfer Protocol (HTTP) packet is determined. If it is determined that the referer is present in the HTTP packet, Uniform Resource Locators (URLs) are extracted from a referer web page corresponding to the referer. The referer is verified based on a URL corresponding to a referer verification request received from a server and the extracted URLs. A Completely Automated Public Test to tell Computers and Humans Apart (CAPTCHA) verification procedure conducted by a user is performed based on results of the verification of the referer.
    Type: Application
    Filed: September 10, 2012
    Publication date: December 26, 2013
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Chul-Woo LEE, Deok-Jin KIM, Byoung-Jin HAN, Byung-Chul BAE, Sang-Woo PARK, Man-Hee LEE, E-Joong YOON
  • Patent number: 8539594
    Abstract: Provided are an apparatus and method for managing identity information. The apparatus includes a contract detail manager managing details of an identity information sharing contract made between a user and an identity provider (IdP) wanting to provide identity information about the user, and details of an identity information sharing contract made between the user and an identity consumer (IdC) wanting to be provided with the identity information about the user, an IdP selector selecting an IdP capable of providing the identity information about the user based on the details of the sharing contract when a request for the identity information about the user is input from the IdC, and an information provider obtaining information according to the identity information request from the selected IdP, and providing the obtained information to the IdC. The apparatus and method can solve a problem that all of a user's identity information is provided to an IdC according to the user's comprehensive agreement.
    Type: Grant
    Filed: November 4, 2009
    Date of Patent: September 17, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Young-seob Cho, Jin-man Cho, Sang-rae Cho, Dae-seon Choi, Jong-hyouk Noh, Soo-Hyung Kim, Seung-hyun Kim, Kwan-soo Jung, Deok-jin Kim, Seung-hun Jin
  • Publication number: 20130233026
    Abstract: Disclosed herein is a washing machine having an improved structure that maintains efficiency over a certain level both in washing and dehydration. The washing machine includes a body, a tub disposed within the body, a drum rotatably disposed within the tub, and a motor coupled to a rear surface of the tub to drive the drum. The motor includes a stator including a plurality of stator cores and a plurality of magnets arranged between the stator cores, and a rotor rotatably disposed at an inner side or outer side of the stator.
    Type: Application
    Filed: March 7, 2013
    Publication date: September 12, 2013
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Keun Young YOON, Young Kwan Kim, Deok Jin Kim, Su Kwon Jeong
  • Publication number: 20130160122
    Abstract: A system and method for detecting network intrusion by using a network processor are provided. The intrusion detection system includes: a first intrusion detector, configured to use a first network processor to perform intrusion detection on layer 3 and layer 4 of a protocol field among information included in a packet header of a packet transmitted to the intrusion detection system, and when no intrusion is detected, classify the packets according to stream and transmit the classified packets to a second intrusion detector; and a second intrusion detector, configured to use a second network processor to perform intrusion detection through deep packet inspection (DPI) for the packet payload of the packets transmitted from the first intrusion detector. Thereby, intrusion detection for high-speed packets can be performed in a network environment.
    Type: Application
    Filed: April 22, 2012
    Publication date: June 20, 2013
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Young-Han CHOI, Deok-Jin KIM, Sung-Ryoul LEE, Man-Hee LEE, Byung-Chul BAE, Sang-Woo PARK, E-Joong YOON
  • Publication number: 20130057103
    Abstract: A motor includes a stator having stator cores, a coil wound around the stator cores, and a rotor disposed at an inner side of the plurality of stator cores. The rotor includes a sleeve, a plurality of rotor cores arranged in a circumferential direction of the rotor, a plurality of bridges arranged to connect the sleeve to each of the plurality of rotor cores, a plurality of permanent magnets provided between the rotor cores to form an interior space with respect to the sleeve while being spaced apart from the sleeve, and a plurality of support protrusions protruding from the sleeve in an outward radial direction of the sleeve to support the plurality of permanent magnets while corresponding to the plurality of permanent magnets, respectively, the plurality of support protrusions being arranged between the bridges while being spaced apart from the bridges in the circumferential direction of the rotor.
    Type: Application
    Filed: September 6, 2012
    Publication date: March 7, 2013
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Jin Woo HAN, Young Kwan Kim, Deok Jin Kim, Byung Ryel IN
  • Publication number: 20110153800
    Abstract: An identity protocol gate way according to the exemplary embodiments of the present invention includes an artifact generating and inquiring module generating an artifact by receiving a sharing request message from a mobile identity wallet according to a request made by an application program of a mobile device, inquiring corresponding identity information according to a request of the identity information including the artifact from a web server and transferring the inquired identity information to the web server; and a protocol converting module converting the sharing request message into a protocol message of a wired environment by receiving the sharing request message from the mobile identity wallet, transferring the protocol message to the identity web server, transferring sharing response information and the artifact to the application program of the mobile device by using a mobile protocol in response to the sharing response information from the identity web server.
    Type: Application
    Filed: December 20, 2010
    Publication date: June 23, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Young-Seob CHO, Jin-Man Cho, Sang-Rae Cho, Dae-Seon Choi, Jong-Hyouk Noh, Soo-Hyung Kim, Seung-Hyun Kim, Kwan-Soo Jung, Deok-Jin Kim, Seung-Hun Jin
  • Publication number: 20110129089
    Abstract: Disclosed herein is a method and apparatus for partially encoding/decoding data for a commitment service and a method of using encoded data. The apparatus includes an encoding/decoding module for encoding/decoding a database to be committed to a server using a private key of the user, obtained by accessing a key storage unit through a key management module which manages information about the private key of the user, stored in the key storage unit, and also encoding/decoding an SQL query required to use a DB committed to the server. The encoding/decoding module partially encodes/decodes one or more of table names, field names, and attribute values of the DB. In the present invention, the table names, field names, and field attribute values of the DB are partially encoded while the existing structure of the DB is maintained, and the partially encoded DB is committed to the server.
    Type: Application
    Filed: November 4, 2010
    Publication date: June 2, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seung-Hyun KIM, Jong-Hyouk NOH, Deok-Jin KIM, Soo-Hyung KIM, Sang-Rae CHO, Young-Seob CHO, Jin-Man CHO, Dae-Seon CHOI, Seung-Hun JIN
  • Publication number: 20110126010
    Abstract: Disclosed herein is a system and method for managing identity. The system includes a mobile terminal, a web server, and a service terminal. The mobile terminal includes a smart card on which a management server for managing user identity is mounted. The web server generates the user identity and provides the generated identity to the management server over a wired/wireless network. The service terminal receives a required identity from the mobile terminal using Near Field Communication (NFC).
    Type: Application
    Filed: June 7, 2010
    Publication date: May 26, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Soo Hyung KIM, Young Seob CHO, Jin Man CHO, Sang Rae CHO, Dae Seon CHOI, Jong Hyouk NOH, Seung Hyun KIM, Kwan Soo JUNG, Deok Jin KIM, Seung Hun JIN
  • Publication number: 20100310078
    Abstract: A user terminal for a user-centric identity management system includes: a browser that requests a service to the service provider server and receives a service parameter in which a plurality of selectable protocol parameters corresponding to the service are recorded from the service provider server; an interaction unit that selects any one protocol parameter among the plurality of protocol parameters by receiving the service parameter through the browser; and a service processing unit that performs a service protocol with the service provider server on the basis of the protocol parameter selected through the interaction unit, and receives token information required to receive the service from the service provider server and transfers the token information to the browser.
    Type: Application
    Filed: June 1, 2010
    Publication date: December 9, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seung-Hyun KIM, Deok-Jin KIM, Soo-Hyung KIM, Kwan-Soo JUNG, Sang-Rae CHO, Jin-Man CHO, Dae-Seon CHOI, Young-Seob CHO, Jong-Hyouk NOH, Seung-Hun JIN
  • Publication number: 20100146586
    Abstract: Provided are an apparatus and method for managing identity information. The apparatus includes a contract detail manager managing details of an identity information sharing contract made between a user and an identity provider (IdP) wanting to provide identity information about the user, and details of an identity information sharing contract made between the user and an identity consumer (IdC) wanting to be provided with the identity information about the user, an IdP selector selecting an IdP capable of providing the identity information about the user based on the details of the sharing contract when a request for the identity information about the user is input from the IdC, and an information provider obtaining information according to the identity information request from the selected IdP, and providing the obtained information to the IdC. The apparatus and method can solve a problem that all of a user's identity information is provided to an IdC according to the user's comprehensive agreement.
    Type: Application
    Filed: November 4, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Young-seob CHO, Jin-man CHO, Sang-rae CHO, Dae-seon CHOI, Jong-hyouk NOH, Soo-Hyung KIM, Seung-hyun KIM, Kwan-soo JUNG, Deok-jin KIM, Seung-hun JIN
  • Publication number: 20090249078
    Abstract: Provided is an Open ID authentication method using an identity selector, which can simplify the authentication of an open ID and reduce phishing and hacking risks by automatically performing an open ID-based login process without the need to manually input an open ID uniform resource locator (URL) to a login window.
    Type: Application
    Filed: March 27, 2009
    Publication date: October 1, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seung Hyun Kim, Dae Seon Choi, Deok Jin Kim, Soo Hyung Kim, Jong Hyouk Noh, Kwan Soo Jung, Sang Rea Cho, Young Seob Cho, Jin Man Cho, Seung Hun Jin
  • Publication number: 20090109930
    Abstract: A method is related to support a QoS service at a handed over network in heterogeneous networks. A serving network requests the mobile terminal to offer demand QoS information, when there is a need of handover. The mobile terminal sends a response message containing the demand QoS information to the serving network, and each candidate network maps the demand QoS information to its network resources to judge whether or not to support the QoS service. And the serving network determines one of the candidate networks that can support the QoS service depending on the judgment of the candidate networks, and provides information on the determined candidate network to the mobile terminal such that the mobile terminal is handed over to the determined candidate network.
    Type: Application
    Filed: October 29, 2008
    Publication date: April 30, 2009
    Applicant: POSTECH ACADEMY-INDUSTRY FOUNDATION
    Inventors: Young Joo Suh, Deok Jin Kim, Wan Seon Lim, Joo Young Baek
  • Publication number: 20090109927
    Abstract: An apparatus for updating network information in wireless networks includes a control module for, when a media independent handover (MIH) mobile terminal connects to an access network in the wireless networks, judging whether the access network is managed by a media independent handover information service (MIIS) server. The apparatus further includes a collection module for collecting network information on the access network if the access network is not managed by the MIIS server, and a communication module for sending the collected network information to the MIIS server to update network information being managed by the MIIS server.
    Type: Application
    Filed: October 29, 2008
    Publication date: April 30, 2009
    Applicant: POSTECH ACADEMY-INDUSTRY FOUNDATION
    Inventors: Young Joo Suh, Deok Jin Kim, Wan Seon Lim, Dong Wook Kim
  • Patent number: 7362024
    Abstract: Disclosed is a rotor of a BLDC motor including a frame rotatably disposed on an inner circumference of a stator, rotor teeth connected to the outer circumference of the frame in the radial direction at regular intervals, and magnets fixed between the rotor teeth, and arranged in the radial direction so that the facing sides can have the same polarity. The rotor of the BLDC motor improves a torque of the motor by minimizing flux leakage of the magnets.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: April 22, 2008
    Assignee: LG Electronics Inc
    Inventors: Young-Kwan Kim, Deok-Jin Kim, Sung-Ho Lee, Jin-Soo Park