Patents by Inventor Doo Ho Choi

Doo Ho Choi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100277287
    Abstract: A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value.
    Type: Application
    Filed: June 17, 2008
    Publication date: November 4, 2010
    Applicant: lectronics and Telecommunications Research Institu
    Inventors: Doo Ho Choi, Yong-Je Choi, Ho Won Kim, Kyo Il Chung
  • Publication number: 20100150340
    Abstract: An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point doubling. An elliptic curve encryption method includes a first operation step of performing point addition for two points when two points on an elliptic curve are different from each other, and a second operation step of performing point doubling for any one point when two points on the elliptic curve are the same, wherein inverse multiplication processes and multiplication processes of the first operation step and the second operation step have the same path delay.
    Type: Application
    Filed: September 25, 2009
    Publication date: June 17, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yong-Je CHOI, Doo Ho CHOI
  • Publication number: 20100142708
    Abstract: An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving the unique item identifier of the article encrypted by using the secret key from the RFID tag. By this configuration, it is possible to protect user's personal privacy of the mobile RFID terminal in a state where user's intervention is minimized.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: You Sung KANG, Doo Ho CHOI, Hyunsook CHO
  • Publication number: 20100146273
    Abstract: Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode.
    Type: Application
    Filed: September 25, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: You Sung KANG, Doo Ho CHOI, Yong-Je CHOI, Kyo Il CHUNG, Hyunsook CHO, Heyung Sub LEE, Sang Yeoun LEE, Kang Bok LEE, Dong-Beom SHIN, Jae-young JUNG, Cheol Sig PYO
  • Publication number: 20100140361
    Abstract: Provided is an RFID tag. When no external pressure is applied to a packaging structure, a wire for transmitting power and data from an antenna is separated from an RFID chip by an air layer. When external pressure is applied to the packaging structure, the wire is connected to the RFID chip to transmit the power and data between the antenna and the RFID chip.
    Type: Application
    Filed: August 7, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Hae Dong Lee, Doo Ho Choi, Kyo Il Chung, Hyunsook Cho
  • Publication number: 20100085154
    Abstract: Provided is a radio frequency identification (RFID) tag generating method and device, and a contents receiving method using the same. The contents receiving method using the RFID tag generating device includes: a terminal detecting a virtual tag corresponding to contents; receiving a password to be used once, corresponding to the virtual tag; authenticating a user by determining whether the password to be used once corresponds to a password input by the user; receiving an identification code of the virtual tag when the password to be used once corresponds to a password input by the user; and receiving the contents matching the identification code of the virtual tag, and providing the same to the user.
    Type: Application
    Filed: September 24, 2009
    Publication date: April 8, 2010
    Applicant: Electronics and Telecommunication Research Institute
    Inventors: Nam Je PARK, Doo Ho CHOI
  • Publication number: 20100067690
    Abstract: Provided is a scalar multiplication method unified with a simple power analysis (SPA) resistant left-to-right recording in a crypto system based on an elliptic curve and a pairing. The scalar multiplication method includes: recording an L-digit secret key k? from a radix-r n-digit secret key k by comparing two successive elements with each other from the most significant digit with duplication allowed in order to generate the L-digit secret key k?; and performing scalar multiplication between the secret key k and a point P on an elliptic curve to output a scalar multiplication value Q=kP using the secret key k?.
    Type: Application
    Filed: June 22, 2007
    Publication date: March 18, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Dong-Guk Han, Doo-Ho Choi, Ho-Won Kim, Kyo-II Chung, Sung-Kyoung Kim, Jongin Lim
  • Publication number: 20100017617
    Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
    Type: Application
    Filed: July 20, 2009
    Publication date: January 21, 2010
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang Yeoun LEE, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung
  • Publication number: 20100001840
    Abstract: Provided are a method and a system for authenticating a radio frequency identification (RFID) tag, by which an RFID reader and an authentication server authenticate the RFID tag by using a cryptographic operation and a protocol.
    Type: Application
    Filed: July 6, 2009
    Publication date: January 7, 2010
    Inventors: You Sung KANG, Yong Je CHOI, Doo Ho CHOI, Kyo Il CHUNG, Hyun Sook CHO
  • Publication number: 20080242047
    Abstract: The present invention relates to a method of forming isolation layers of a semiconductor memory device. According to a method of forming isolation layers of a semiconductor memory device in accordance with an aspect of the present invention, a tunnel dielectric layer, a conductive layer for a floating gate, a buffer oxide layer, and a pad nitride layer are sequentially formed over a semiconductor substrate. A trench is formed by selectively etching the pad nitride layer, the buffer oxide layer, the conductive layer for the floating gate, the tunnel dielectric layer, and the semiconductor substrate. The trench is gap-filled by forming a dielectric layer over the entire structure including the trench. A curing process is performed using a pre-heated curing gas. A height of the isolation layers is controlled by performing a cleaning process.
    Type: Application
    Filed: March 21, 2008
    Publication date: October 2, 2008
    Applicant: Hynix Semiconductor Inc.
    Inventors: Wan Sup Shin, Doo Ho Choi, Kwang Hyun Yun
  • Publication number: 20080129447
    Abstract: An electronic tag for protecting privacy in RFID and a method of protecting privacy using the same are provided. Specifically, an RFID electronic tag capable of protecting privacy by authenticating an RFID reader and controlling access of the RFID reader to the RFID tag and a method of protecting privacy using the same are provided. The RFID electronic tag is applicable to a passive type RFID tag. The RFID electronic tag is also applicable to an ISO/IEC 18000-6 Type C tag that is a typical passive type RFID tag. It is possible to protect privacy of a user by controlling access of the RFID reader to the RFID tag and authenticating the RFID reader by modifying a tag inventory protocol and a memory map of the tag.
    Type: Application
    Filed: August 16, 2007
    Publication date: June 5, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho Choi, Ju Han Kim, Ho Won Kim, Kyo Il Chung