Patents by Inventor Dongho Won
Dongho Won has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10070311Abstract: Disclosed herein is a method for collecting, by a vehicle information collection apparatus, vehicle accident information. The method includes receiving vehicle accident information including impact detection time information and location information from a plurality of vehicle communication terminals, determining whether a vehicle accident has occurred based on the received vehicle accident information, requesting a vehicle communication terminal which belongs to the plurality of vehicle communication terminals and which is related to the vehicle accident to send accident information based on a result of the determination, receiving encrypted image data related to the vehicle accident from the vehicle communication terminal related to the vehicle accident in response to the request, and decoding the received image data and storing the decoded image data along with the vehicle accident information.Type: GrantFiled: March 29, 2016Date of Patent: September 4, 2018Assignee: Research & Business Foundation Sungkyunkwan UniversityInventors: Tae-Jin Lee, Yunmin Kim, Dongho Won, Mingyu Lee, Jaewook Jung
-
Publication number: 20160323741Abstract: Disclosed herein is a method for collecting, by a vehicle information collection apparatus, vehicle accident information. The method includes receiving vehicle accident information including impact detection time information and location information from a plurality of vehicle communication terminals, determining whether a vehicle accident has occurred based on the received vehicle accident information, requesting a vehicle communication terminal which belongs to the plurality of vehicle communication terminals and which is related to the vehicle accident to send accident information based on a result of the determination, receiving encrypted image data related to the vehicle accident from the vehicle communication terminal related to the vehicle accident in response to the request, and decoding the received image data and storing the decoded image data along with the vehicle accident information.Type: ApplicationFiled: March 29, 2016Publication date: November 3, 2016Applicant: RESEARCH & BUSINESS FOUNDATION SUNGKYUNKWAN UNIVERSITYInventors: Tae-Jin LEE, Yunmin KIM, Dongho WON, Mingyu LEE, Jaewook JUNG
-
Publication number: 20120144208Abstract: An indexed table based code encrypting device adapted to encrypt an executable file of a computer program includes: an index creator configured to classify codes of the executable file into code blocks using a call code and store the number of calls and start addresses of the code blocks; and a block encrypter configured to encrypt the code blocks with encryption keys. An encryption key of a code block (hereinafter, first type code block) called once is created by using a code block calling the first type code block and an encryption key of a code block (hereinafter, second type code block) called twice or more is created by using a random number. The encryption keys of the first and second type code blocks are stored in the executable file.Type: ApplicationFiled: January 31, 2011Publication date: June 7, 2012Applicant: The Industry & Academic Cooperation in Chungnam National UniversityInventors: Seungjoo KIM, Dongho WON, Sungkyu CHO, Donghwi SHIN, Hyesuk JO, Donghyun CHOI, Jae-Cheol RYOU
-
Publication number: 20110249816Abstract: Disclosed is a hybrid key management method for a supervisory control and data acquisition (SCADA) system in which a master terminal unit (MTU), a plurality of sub-master terminal units (sub-MTUs), and a plurality of remote terminal units (RTUs) are sequentially and hierarchically structured, the hybrid key management method comprising the steps of: (a) creating, by the MTU and the sub-MTUs, their own secret numbers and making and exchanging digital signatures; (b) creating, by the MTU, group keys; and (c) distributing, by the MTU, the group keys to the sub-MTUs and encrypting and decrypting the group keys using the secret numbers.Type: ApplicationFiled: September 2, 2010Publication date: October 13, 2011Applicant: The Industry & Academic Cooperation in Chungnam National University (IAC)Inventors: Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim, Jae-Cheol Ryou
-
Publication number: 20110238999Abstract: Disclosed is an Internet based e-will management method in which a will is managed by making digital signatures using a certificate issued by a certificate authority through a will management server connected to a testator/testatrix terminal and a will executor terminal via a network, the method comprising: (a) making digital signatures on an application form and a will using a certificate by a testator/testatrix through the testator/testatrix terminal and transmitting the digitally signed application form and will to the management server by the testator/testatrix terminal; (b) receiving the digitally signed application form and will and verifying and storing the digital signatures of the application form and will by the management server; (c) confirming the death of the testator/testatrix by the management server; and (d) transmitting, upon confirmation of the death of the testator/testatrix, the digitally signed will to the will executor terminal by the management server.Type: ApplicationFiled: May 6, 2010Publication date: September 29, 2011Applicant: The Industry & Academic Cooperation in Chungnam National University (IAC)Inventors: Kwangwoo Lee, Dongho Won, Seungjoo Kim
-
Patent number: 7992202Abstract: Provided are an apparatus and method for inputting a graphical password that use representative pictures and elemental pictures of a graphic to form a graphical password and that receive the graphic via a wheel interface and a select button for user authentication. The apparatus includes: an input unit having a wheel interface and a select button; a display for displaying a graphic consisting of representative pictures and elemental pictures, and displaying a changed graphic in response to an input from the wheel interface; a memory for storing a graphical password of a user; and a controller for recognizing, when the select button is pressed, the graphic displayed on the display as a user-input graphical password, and determining whether the input graphical password matches the stored graphical password for user authentication.Type: GrantFiled: January 17, 2008Date of Patent: August 2, 2011Assignee: SUNGKYUNKWAN University Foundation for Corporate CollaborationInventors: Dongho Won, Sangjoo Park, Seungjoo Kim
-
Publication number: 20110158405Abstract: Disclosed is a shared key management method for SCADA system in which a master terminal unit (MTU), a plurality of sub-master terminal units (sub-MTUs), and a plurality of remote terminal units (RTUs) are sequentially and hierarchically structured, comprising the steps of: generating shared keys of a group key in a tree structure by the MTU, the tree structure including a binary tree ranging from a root node corresponding to the MTU to intermediate nodes corresponding to the sub-MTUs; storing shared keys of descendant nodes and ancestor nodes of an intermediate node of a sub-MTU by the sub-MTU; and updating, upon updating of a shared key of an intermediate node, all shared keys of on-path nodes from the updated intermediate node to the root node, the shared keys of the on-path nodes being updated using their own shared keys and shared keys of off-path child nodes.Type: ApplicationFiled: February 26, 2010Publication date: June 30, 2011Applicant: The Industry & Academy Cooperation in Chungnam National University (IAC)Inventors: Donghyun CHOI, Dongho Won, Seungjoo Kim, Jae-Cheol Ryou
-
Patent number: 7882038Abstract: A verification method for encrypter operation and an electronic voting verification system using the same, which can verify the operation of the encrypter without having to execute corresponding decryption. In the verification method, the encrypter creates a plurality of ciphertexts corresponding to the plain text and presenting the ciphertexts to a user. The user selects one of the ciphertexts, the encrypter dispenses a certificate where information used by the encrypter during encryption is recorded, in response to the ciphertexts which are not selected by the user; and the user creates a ciphertext in person and verifies whether or not the user-created ciphertext is identical with the user-selected ciphertext. Then, the user can verify the encryption results inside and outside a polling booth.Type: GrantFiled: February 20, 2007Date of Patent: February 1, 2011Assignee: Sungkyunkwan University Foundation for Corporate CollaborationInventors: Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
-
Patent number: 7721102Abstract: A system and method for detecting exposure of an OCSP responder's session private key in a D-OCSP-KIS to verify the status of a user's certificate online are provided. The system includes: a client for requesting certificate status information from the OCSP responder; the OCSP responder for receiving the certificate status information request from the client, sending a response, producing a hash value, and delivering the hash value to a certificate authority (CA) to get a certificate issued; and the CA for receiving the hash value from the OCSP responder and issuing the certificate to the OCSP responder in response to a certificate issue request; wherein the client verifies a digital signature using a hash value contained in the OCSP responder's certificate and the hash value contained in the response, and each client stores a counter value for a hash operation in each verification and recognizes the response as valid when a current counter value is greater than a previous counter value.Type: GrantFiled: May 11, 2006Date of Patent: May 18, 2010Assignee: Sungkyunkwan University Foundation for Corporate CollaborationInventors: Dongho Won, Seungjoo Kim, Younggyo Lee
-
Publication number: 20090172810Abstract: Provided are an apparatus and method for inputting a graphical password that use representative pictures and elemental pictures of a graphic to form a graphical password and that receive the graphic via a wheel interface and a select button for user authentication. The apparatus includes: an input unit having a wheel interface and a select button; a display for displaying a graphic consisting of representative pictures and elemental pictures, and displaying a changed graphic in response to an input from the wheel interface; a memory for storing a graphical password of a user; and a controller for recognizing, when the select button is pressed, the graphic displayed on the display as a user-input graphical password, and determining whether the input graphical password matches the stored graphical password for user authentication.Type: ApplicationFiled: January 17, 2008Publication date: July 2, 2009Applicant: SUNGKYUNKWAN UNIVERSITY Foundation for Corporate CollaborationInventors: Dongho Won, Sangjoo Park, Seungjoo Kim
-
Publication number: 20080059791Abstract: A verification method for encrypter operation and an electronic voting verification system using the same, which can verify the operation of the encrypter without having to execute corresponding decryption. In the verification method, the encrypter creates a plurality of ciphertexts corresponding to the plain text and presenting the ciphertexts to a user. The user selects one of the ciphertexts, the encrypter dispenses a certificate where information used by the encrypter during encryption is recorded, in response to the ciphertexts which are not selected by the user; and the user creates a ciphertext in person and verifies whether or not the user-created ciphertext is identical with the user-selected ciphertext. Then, the user can verify the encryption results inside and outside a polling booth.Type: ApplicationFiled: February 20, 2007Publication date: March 6, 2008Applicant: Sungkyunkwan University Foundation for Corporate CollaborationInventors: Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
-
Publication number: 20060288224Abstract: A system and method for detecting exposure of an OCSP responder's session private key in a D-OCSP-KIS to verify the status of a user's certificate online are provided. The system includes: a client for requesting certificate status information from the OCSP responder; the OCSP responder for receiving the certificate status information request from the client, sending a response, producing a hash value, and delivering the hash value to a certificate authority (CA) to get a certificate issued; and the CA for receiving the hash value from the OCSP responder and issuing the certificate to the OCSP responder in response to a certificate issue request; wherein the client verifies a digital signature using a hash value contained in the OCSP responder's certificate and the hash value contained in the response, and each client stores a counter value for a hash operation in each verification and recognizes the response as valid when a current counter value is greater than a previous counter value.Type: ApplicationFiled: May 11, 2006Publication date: December 21, 2006Inventors: Dongho Won, Seungjoo Kim, Younggyo Lee