Patents by Inventor Dong Wan Kang
Dong Wan Kang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230114380Abstract: A cerium oxide nanocomplex, a method for preparing the cerium oxide nanocomplex, a composition containing the cerium oxide nanocomplex as an active ingredient, and a method for preventing or treating inflammatory or autoimmune diseases. The composition may be used as an efficient nanoparticle therapeutic composition by applying a biocompatible dispersion stabilizer composed of an optimal combination to significantly improve the biomedical stability, biocompatibility, and efficiency of the production process of nanoparticles while maintaining the intrinsic pharmacological effect of the nanoparticles.Type: ApplicationFiled: March 25, 2021Publication date: April 13, 2023Applicant: CENYX BIOTECH INC.Inventors: Seung-Hoon LEE, Bong Geun CHA, Dong-Wan KANG
-
Patent number: 11246944Abstract: Disclosed are a ceria nanocomposite for biomedical treatment, including a ceria nanoparticle; and a pharmaceutical composition. The disclosed ceria nanocomposite for biomedical treatment includes a ceria nanoparticle and a surface modification layer arranged on the surface of the ceria nanoparticle, wherein the surface modification layer includes a polyethylene glycol residue, and in the ceria nanoparticle, the content of Ce3+ is greater than the content of Ce4+.Type: GrantFiled: January 11, 2017Date of Patent: February 15, 2022Assignee: Cenyx Biotech Inc.Inventors: Seung-Hoon Lee, Han-Gil Jeong, Do Yeon Kim, Dong-Wan Kang, Jaeyun Kim, Bong Geun Cha
-
Patent number: 11123301Abstract: Provided are a ceria nanocomposite including a ceria nanoparticle for treating subarachnoid hemorrhage, a method of preparing the same, and a pharmaceutical composition including the ceria nanocomposite. The ceria nanocomposite for treating subarachnoid hemorrhage disclosed herein includes a ceria nanoparticle and a surface modified layer disposed on a surface of the ceria nanoparticle, wherein the surface modified layer includes a polyethylene glycol residue.Type: GrantFiled: October 21, 2016Date of Patent: September 21, 2021Assignee: Cenyx Biotech Inc.Inventors: Seung-Hoon Lee, Han-Gil Jeong, Do Yeon Kim, Dong-Wan Kang, Jaeyun Kim, Bong Geun Cha
-
Publication number: 20190381187Abstract: Disclosed are a ceria nanocomposite for biomedical treatment, including a ceria nanoparticle; and a pharmaceutical composition. The disclosed ceria nanocomposite for biomedical treatment includes a ceria nanoparticle and a surface modification layer arranged on the surface of the ceria nanoparticle, wherein the surface modification layer includes a polyethylene glycol residue, and in the ceria nanoparticle, the content of Ce3+ is greater than the content of Ce4+.Type: ApplicationFiled: January 11, 2017Publication date: December 19, 2019Applicant: Cenyx Biotech Inc.Inventors: Seung-Hoon Lee, Han-Gil Jeong, Do Yeon Kim, Dong-Wan Kang, Jaeyun Kim, Bong Geun Cha
-
Publication number: 20190240161Abstract: Provided are a ceria nanocomposite including a ceria nanoparticle for treating subarachnoid hemorrhage, a method of preparing the same, and a pharmaceutical composition including the ceria nanocomposite. The ceria nanocomposite for treating subarachnoid hemorrhage disclosed herein includes a ceria nanoparticle and a surface modified layer disposed on a surface of the ceria nanoparticle, wherein the surface modified layer includes a polyethylene glycol residue.Type: ApplicationFiled: October 21, 2016Publication date: August 8, 2019Applicants: Cenyx Biotech Inc., Seoul National University Hospital, Research & Business Foundation Sungkyunkwan UniversityInventors: Seung-Hoon Lee, Han-Gil Jeong, Do Yeon Kim, Dong-Wan Kang, Jaeyun Kim, Bong Geun Cha
-
Publication number: 20160253449Abstract: A three dimensional (3D) virtual shape modeling method for an object produced through a semiconductor process is provided, which can model a 3D shape of an object produced through processes such as deposition, etching, and so on that are used in a semiconductor or planar display panel manufacturing process. Specifically, convenient modeling can be performed when forming a layer produced through deposition and then etching on a non-flat, preceding layer, by using two dimensional projection method.Type: ApplicationFiled: February 24, 2016Publication date: September 1, 2016Applicant: Daouincube, Inc.Inventors: Tae Hwa LIM, Dong Wan KANG, Hyun Cheol KIM
-
Publication number: 20160197947Abstract: An abnormal behavior detection system includes a context information reception unit receiving a variety of types of context information from a context information collection system, a context information processing unit generating a corresponding detection request message when context information about “termination or access termination” is received and transfer the corresponding detection request message to an abnormal detection unit, the abnormal detection unit detecting an abnormal use behavior by analyze frequency of behaviors in an identical access situation which have occurred during an entire access period through an analysis of a use behavior pattern during the entire access period, a profile management unit profiling pieces of context information according to various use behaviors of the user and store and manage the pieces of profiled context information, and an information analysis unit analyzing web site or DB use information based on the pieces of received context information.Type: ApplicationFiled: January 16, 2015Publication date: July 7, 2016Inventors: Chae Tae IM, Dong Wan KANG, Tae Eun KIM, Chang Min JO
-
Publication number: 20160197948Abstract: An abnormal behavior detection system includes a context information reception unit receiving a variety of types of context information from a context information collection system, a context information processing unit generating a corresponding detection request message when context information about web service use is received and transfer the corresponding detection request message to an abnormal detection unit, an abnormal detection unit comparing sequence of a use page and use speed, performed right after user access, with a pattern in the past access through an analysis of an initial use behavior pattern when the detection request message is received and to detect an abnormal use behavior, a profile management unit profiling pieces of context information according to various use behaviors of the user and store and manage the pieces of profiled context information, and an information analysis unit analyzing web site or DB use information.Type: ApplicationFiled: January 16, 2015Publication date: July 7, 2016Inventors: Chae Tae IM, Dong Wan KANG, Tae Eun KIM, Chang Min JO
-
Publication number: 20150180893Abstract: Disclosed is a behavior detection system for detecting an abnormal behavior, can perform dynamic control based on situation information and a profile of each user to cope with an element threatening security of an internal infrastructure of an enterprise, such as information leakage, in BYOD and smart work environment. The system calculates probabilities of behaviors occurring for respective connection behavior elements, calculates standard deviations of the probabilities based on weighting factors and determines whether or not the calculated behavior occurrence probabilities and behavior standard deviation correspond to a normal behavior, existence of an abnormal connection behavior in a BYOD and smart work environment is detected and an abnormal user is detected by examining whether or not an average traffic volume, an average use time and traffic volume with respect to a use time exceeds respective standard values.Type: ApplicationFiled: March 27, 2014Publication date: June 25, 2015Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Chae Tae IM, Joo Hyung OH, Dong Wan KANG, Eun Byol KOH, Hyun Seung PARK, Tae Eun KIM, Chang Min JO
-
Patent number: 8986873Abstract: A battery pack includes at least two or more bare cells, a lead tab and an insulating member. Each of the bare cells has a first terminal portion. The lead tab is provided to the first terminal portion of the bare cell. The insulating member is interposed between the bare cell and the lead tab and is provided with an opening so that the bare cell and the lead tab are electrically connected to each other. In the battery pack, the insulating member includes two or more bare cell facing portions respectively corresponding to the bare cells, an extending portion that connects neighboring bare cell facing portions to each other, and guide portions respectively provided to the bare cell facing portions so as not to be arranged in one straight line.Type: GrantFiled: December 30, 2011Date of Patent: March 24, 2015Assignee: Samsung SDI Co., Ltd.Inventor: Dong-Wan Kang
-
Patent number: 8948019Abstract: Provided are a system and method for preventing the intrusion of an abnormal GPRS tunneling protocol (GTP) packet. The system includes: a system management unit including a monitoring unit which monitors a state of the system and a mode changing unit which changes an operation mode of the system based on the state of the system; a packet capture unit including a packet management unit which stores information about a GTP packet based on the operation mode of the system and a detection result checking unit which determines whether to drop the GTP packet; and a packet detection unit including a packet parsing unit which parses the information about the GTP packet and a packet analysis unit which analyzes the parsed information about the GTP packet, wherein the operation mode of the system is an intrusion prevention system (IPS) mode or a bypass mode.Type: GrantFiled: July 13, 2012Date of Patent: February 3, 2015Assignee: Korea Internet & Security AgencyInventors: Dong Wan Kang, Joo Hyung Oh, Se Kwon Kim, Jung Sik Cho, Chae Tae Im
-
Publication number: 20140075538Abstract: An IP spoofing detection apparatus is provided. The IP spoofing detection apparatus comprising, a tunnel information extracting unit which extracts a first TEID and a user equipment IP address from a payload of a first GTP packet, and an abnormal packet detecting unit which extracts a second TEID from a header of a second GTP packet, and extracts a source IP address from a payload of the second GTP packet, wherein the abnormal packet detecting unit detects the second GTP packet as an IP spoofing packet if the first TEID and the second TEID are equal to each other, and the user equipment IP address and the source IP address are different from each other.Type: ApplicationFiled: November 14, 2012Publication date: March 13, 2014Applicant: Korea Internet & Security AgencyInventors: Chae-Tae IM, Joo Hyung OH, Dong Wan KANG, Se Kwon KIM, Sung Ho KIM
-
Publication number: 20130148510Abstract: Provided are a system and method for preventing the intrusion of an abnormal GPRS tunneling protocol (GTP) packet. The system includes: a system management unit including a monitoring unit which monitors a state of the system and a mode changing unit which changes an operation mode of the system based on the state of the system; a packet capture unit including a packet management unit which stores information about a GTP packet based on the operation mode of the system and a detection result checking unit which determines whether to drop the GTP packet; and a packet detection unit including a packet parsing unit which parses the information about the GTP packet and a packet analysis unit which analyzes the parsed information about the GTP packet, wherein the operation mode of the system is an intrusion prevention system (IPS) mode or a bypass mode.Type: ApplicationFiled: July 13, 2012Publication date: June 13, 2013Applicant: KOREA INTERNET & SECURITY AGENCYInventors: Dong Wan KANG, Joo Hyung OH, Se Kwon KIM, Jung Sik CHO, Chae Tae IM
-
Publication number: 20120251870Abstract: A battery pack includes at least two or more bare cells, a lead tab and an insulating member. Each of the bare cells has a first terminal portion. The lead tab is provided to the first terminal portion of the bare cell. The insulating member is interposed between the bare cell and the lead tab and is provided with an opening so that the bare cell and the lead tab are electrically connected to each other. In the battery pack, the insulating member includes two or more bare cell facing portions respectively corresponding to the bare cells, an extending portion that connects neighboring bare cell facing portions to each other, and guide portions respectively provided to the bare cell facing portions so as not to be arranged in one straight line.Type: ApplicationFiled: December 30, 2011Publication date: October 4, 2012Applicant: SAMSUNG SDI CO., LTD.Inventor: Dong-Wan Kang
-
Publication number: 20110154492Abstract: The present invention relates to a malicious traffic isolation system and method using botnet information, and more particularly, to a malicious traffic isolation system and method using botnet information, in which traffics for a set of clients having the same destination are routed to the isolation system based on a destination IP/Port, and botnet traffics are isolated using botnet information based on similarity among groups of the routed and flowed in traffics. The present invention may provide a malicious traffic isolation method using botnet information, which can accommodate traffics received from a PC or a C&C server infected with a bot into a quarantine area, isolate traffics generated by normal users from traffics transmitted from malicious bots, and block the malicious traffics. In addition, the present invention may provide a malicious traffic isolation method using botnet information, which can provide a function of mitigating DDoS attacks of a botnet.Type: ApplicationFiled: June 23, 2010Publication date: June 23, 2011Inventors: Hyun Cheol Jeong, Chae Tae Im, Seung Goo Ji, Joo Hyung Oh, Dong Wan Kang, Tae Jin Lee, Yong Geun Won
-
Publication number: 20110153811Abstract: The invention relates to a system and method that can detect botnets by classifying the communication activities for each client according to destination or based on similarity between the groups of collected traffic. According to certain aspects of the invention, the communication activities for each client can be classified to model network activity by differentiating the protocols of the collected network traffic based on destination and patterning the subgroups for the respective protocols. Those servers that are estimated to be C&C servers can be classified into download and upload, spam servers and command control servers, within a botnet group detected by modeling network activity, i.e. analyzing network-based activity patterns. Also, botnet groups can be detected by way of a group information management function, for generating an activity pattern-based group matrix based on group data, and a mutual similarity analysis, performed on groups suspected to be botnets from the group information.Type: ApplicationFiled: June 23, 2010Publication date: June 23, 2011Inventors: Hyun Cheol Jeong, Chae Tae IM, Seung Gao Ji, Joo Hyung Oh, Dong Wan Kang, Tae Jin Lee, Yong Geun Won
-
Publication number: 20110154489Abstract: A system for analyzing malicious botnet activity in real time is disclosed. This system may include: a control server configured to generate botnet activity information relating to a type of malicious botnet activity, and transmit the botnet activity information to the outside, after receiving bot occurrence information from the outside; and a bot executing server configured to execute a malicious bot corresponding to the bot occurrence information received from the outside in a virtual environment operating system and transmit a real-time botnet detection result to the control server for generating the botnet activity information, according to a control of the control server, wherein the real-time botnet detection result includes information on whether or not the malicious bot performs malicious activity based on a command from a remote command/control server existing independently outside.Type: ApplicationFiled: June 23, 2010Publication date: June 23, 2011Inventors: Hyun Cheol Jeong, Chae Tae Im, Seung Goo Ji, Joo Hyung Oh, Dong Wan Kang