Patents by Inventor Do Won Hong

Do Won Hong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9134413
    Abstract: A tag decides a response based on a plurality of queries received from a reader, determines whether to transmit the response, transmits the response to the reader according to the results of the determination, and transmits a message authentication code including communication content to the reader. The reader calculates a consumed time period which is the time difference between a transmission time at which the queries are transmitted and a reception time at which the response is received, calculates an average consumed time period of the consumed time period, and measures a distance to the tag based on the average consumed time period. Accordingly, it is possible to check an attacker's intervention with a high probability, thereby improving distance measurement performance. Also, the tag may efficiently perform computing and communication.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: September 15, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Taek Young Youn, Do Won Hong
  • Patent number: 8873749
    Abstract: A multi-user searchable encryption system includes a key generation center to issue a private secret key to a user and trace information regarding a user who has generated an index, and a user terminal device to generate an index for searching for a database using the private secret key. The multi-user searchable encryption system includes a database (DB) server that verifies the index generated by the user terminal device and searches for corresponding data to the verified index.
    Type: Grant
    Filed: December 5, 2012
    Date of Patent: October 28, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Ku Young Chang, Do Won Hong
  • Patent number: 8856152
    Abstract: Proposed is a data visualizing apparatus for visualizing data as effectual information using a correlation between forensic data collected from various sources. The proposed data visualizing apparatus may visualize, as effectual information, single-source single-data, single-source multi-data, and multi-source multi-data.
    Type: Grant
    Filed: June 5, 2012
    Date of Patent: October 7, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Keon Woo Kim, Do Won Hong, Sung Kyong Un, Young Soo Kim, Woo Yong Choi, Sang Su Lee, Joo Young Lee, Su Hyung Jo, Youn Hee Gil
  • Patent number: 8817978
    Abstract: An order-preserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext, and setting a secret key for encryption and a pseudo-random number generator for generation of a pivot. Further, the order-preserving encryption apparatus includes a pivot generator for applying the secret key to the established pseudo-random number generator to generate a pivot for the plaintext to be encrypted. Further, the order-preserving encryption apparatus includes a ciphertext generator for generating information about size of a bit constituting the ciphertext by comparing the generated pivot and the plaintext; and a plaintext adjusting unit for adjusting a magnitude of the total plaintext space and a magnitude of the plaintext according to the ciphertext.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: August 26, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Do Won Hong
  • Patent number: 8812867
    Abstract: Disclosed is a method for searchable symmetric encryption. The method for performing searchable encryption and searching for encrypted data includes: setting all necessary variables and preparing a secret key necessary for encryption; encrypting a data using the secret key and a given data and generating an index to be used for later search, to store the encrypted data and the index; generating a trapdoor to be used to search the encrypted data by using the secret key and a keyword to be used for the searching; and searching a desired data using the generated trapdoor and the stored index.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: August 19, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Do-Won Hong, Hyun-Sook Cho
  • Patent number: 8799291
    Abstract: Provided is a forensic index method by distributed processing, including: generating data to be divided by dividing data to be indexed according to predetermined division setting for distributed processing; allocating the generated data to be divided to a plurality of data processing units according to the predetermined division setting, extracting an index by filtering the allocated data to be divided in the plurality of data processing units, and generating divided index data including the extracted index; and generating an index database by merging the generated divided index data.
    Type: Grant
    Filed: August 31, 2012
    Date of Patent: August 5, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Joo Young Lee, Youn Hee Gil, Do Won Hong, Keon Woo Kim, Young Soo Kim, Sung Kyong Un, Sang Su Lee, Su Hyung Jo, Woo Yong Choi, Hyun Sook Cho
  • Patent number: 8745696
    Abstract: There are provided an apparatus and a method for privacy protection in association rule mining among data mining technologies. An apparatus for privacy protection in association rule mining according to an embodiment of the present invention comprises: a fake transaction inserter that generates fake transactions of a predetermined number each having a predetermined length and inserts the fake transactions between a plurality of transactions comprised in an original data set to generate a first virtual data set; and a distortion transaction generator that generates a second virtual data set by converting data of the transaction of the first virtual data set with a predetermined probability.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: June 3, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Abedelaziz Mohaisen, Do-Won Hong
  • Patent number: 8639927
    Abstract: A method of user-authenticated quantum key distribution according to the present invention shares a position having the same basis without making public basis information using previously shared secret keys and authenticates a quantum channel by confirming whether there is the same measured outcome at that position, in order to secure unconditional security of BB84 quantum key distribution (QKD) protocols vulnerable to man-in-the-middle attack.
    Type: Grant
    Filed: November 23, 2010
    Date of Patent: January 28, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jeong-Woon Choi, Ku-Young Chang, Nam-Su Jho, Do-Won Hong
  • Patent number: 8639683
    Abstract: A system and method for data analysis and digital forensics is provided. The system for data analysis and digital forensics may include: an online data forensic server for collecting and analyzing usage history information from an object device, which is subject to data collection, downloading and collecting data on the Internet based on the usage history information, requesting issuance of a timestamp token for the collected data, and receiving the issued timestamp token; a timestamp token issuing server for issuing the timestamp token for the collected data in response to the request for issuance of the timestamp token and proving the issued timestamp token to the online data forensic server; and a storage device for storing the collected data.
    Type: Grant
    Filed: October 26, 2011
    Date of Patent: January 28, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Youn Hee Gil, Joo Young Lee, Su Hyung Jo, Young Soo Kim, Keon Woo Kim, Sang Su Lee, Woo Yong Choi, Sung Kyong Un, Do Won Hong, Hyun Sook Cho
  • Publication number: 20130159327
    Abstract: Proposed is a data visualizing apparatus for visualizing data as effectual information using a correlation between forensic data collected from various sources. The proposed data visualizing apparatus may visualize, as effectual information, single-source single-data, single-source multi-data, and multi-source multi-data.
    Type: Application
    Filed: June 5, 2012
    Publication date: June 20, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Keon Woo Kim, Do Won Hong, Sung Kyong Un, Young Soo Kim, Woo Yong Choi, Sang Su Lee, Joo Young Lee, Su Hyung Jo, Youn Hee Gil
  • Publication number: 20130117273
    Abstract: Provided is a forensic index method by distributed processing, including: generating data to be divided by dividing data to be indexed according to predetermined division setting for distributed processing; allocating the generated data to be divided to a plurality of data processing units according to the predetermined division setting, extracting an index by filtering the allocated data to be divided in the plurality of data processing units, and generating divided index data including the extracted index; and generating an index database by merging the generated divided index data.
    Type: Application
    Filed: August 31, 2012
    Publication date: May 9, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Joo Young LEE, Youn Hee Gil, Do Won Hong, Keon Woo Kim, Young Soo Kim, Sung Kyong Un, Sang Su Lee, Su Hyung Jo, Woo Yong Choi, Hyun Sook Cho
  • Publication number: 20130055393
    Abstract: A mobility technology for strengthening safety for an invasion of privacy caused by leakage of contact information is provided. A privacy protection system may include an acquisition attempt detecting unit to detect an external communication terminal that attempts to acquire contact information included in the profile, and an access controller to provide the detected external communication terminal with a right to use the contact information, and to determine whether the contact information is to be provided.
    Type: Application
    Filed: August 24, 2012
    Publication date: February 28, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Taek Young Youn, Do Won Hong, Ku Young Chang, Nam Su Jho, Jeong Woon Choi, Jung Yeon Hwang
  • Patent number: 8225107
    Abstract: Provided are methods of storing and searching for data in encrypted form. The method of storing data in encrypted form includes: encrypting desired data from among data stored in a database; dividing an entire region of the stored data into a plurality of bucket regions and allocating an index to each of the bucket regions; identifying order information in a bucket region to which the encrypted data belongs; and storing the encrypted data, index information of the bucket region to which the encrypted data belongs, and the identified order information in an external server. When a database containing important data of at least one user is stored in an external server using the above storing method, the security and efficiency of the database can be increased.
    Type: Grant
    Filed: October 16, 2009
    Date of Patent: July 17, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Ku-young Chang, Do-won Hong, Hyun-sook Cho
  • Publication number: 20120166456
    Abstract: An apparatus for creating a data table of a forensic data, includes a data parser configured to create primary data tables including unique attributes of the predetermined keywords by parsing the raw data having different formats for each forensics tool, each attribute having a unique standardized format. The apparatus further includes a data filter filtering specific fields or attributes from the primary data tables to newly create secondary data table. The apparatus further includes a data relation analyzer analyzing a relation between the data within the primary data tables to newly create secondary data tables.
    Type: Application
    Filed: December 27, 2011
    Publication date: June 28, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Keonwoo KIM, Do Won Hong, Sung Kyong Un, Youngsoo Kim, Sang Su Lee, Woo Yong Choi, Jooyoung Lee, Su Hyung Jo, Youn-Hee Gil, Hyun sook Cho
  • Publication number: 20120163586
    Abstract: An order-preserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext, and setting a secret key for encryption and a pseudo-random number generator for generation of a pivot. Further, the order-preserving encryption apparatus includes a pivot generator for applying the secret key to the established pseudo-random number generator to generate a pivot for the plaintext to be encrypted. Further, the order-preserving encryption apparatus includes a ciphertext generator for generating information about size of a bit constituting the ciphertext by comparing the generated pivot and the plaintext; and a plaintext adjusting unit for adjusting a magnitude of the total plaintext space and a magnitude of the plaintext according to the ciphertext.
    Type: Application
    Filed: December 21, 2011
    Publication date: June 28, 2012
    Applicant: Electonics and Telecommunications Research Institute
    Inventors: Nam-Su JHO, Do Won Hong
  • Publication number: 20120166808
    Abstract: A lattice-based ring signature method includes generating a dimension, a bound, a length of a hashed message, a Gaussian parameter and an open parameter, which are parameters necessary for a ring signature. Further, the lattice-based ring signature method includes generating a signature key and a verifying key for a user who construct a ring by using the parameter necessary for the ring signature. Furthermore, the lattice-based ring signature method generating a signature for a message and the ring by using the signature key and the verifying key.
    Type: Application
    Filed: December 22, 2011
    Publication date: June 28, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Do Won HONG, Ik Rae JEONG, Geontae NOH
  • Publication number: 20120158734
    Abstract: A data management apparatus includes an index generation unit configured to subdivide an entire interval of data into bucket intervals, allocate indices for the respective bucket intervals, transform the bucket intervals having the allocated indices into bucket intervals of specific lengths, and generate bucket-based indices for pieces of data included in the bucket intervals of the specific lengths. The data management apparatus further includes a data management unit configured to transmit the encrypted data and the bucket-based indices to a server-side data management apparatus in order to store the encrypted data, transmit a user query to the server-side data management apparatus in order to search for a desired encrypted data, and decrypt encrypted data corresponding to the user query from the server-side data management apparatus. The user query includes the index of first bucket interval and the index of second bucket interval neighboring to the first bucket interval.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 21, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Ku Young CHANG, Nam-Su JHO, Taek Young YOUN, Do Won HONG
  • Publication number: 20120150915
    Abstract: A digital forensic apparatus for analyzing user activities includes: a collection unit for collecting analysis information related to user activities from a device as an investigation target for analyzing the user activities; and an analysis unit for analyzing the analysis information collected by the collection unit to determine activity information of a user from each type of the analysis information, and for causing the activity information to be arranged and displayed in temporal order.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 14, 2012
    Applicants: Korea University Research And Business Foundation, Electronics and Telecommunications Research Institute
    Inventors: Woo Yong Choi, Sung Kyong Un, Do Won Hong, Sang Jin Lee, Je Wan Bang, Jung Heum Park, Nam Heun Son
  • Publication number: 20120109969
    Abstract: A system and method for data analysis and digital forensics is provided. The system for data analysis and digital forensics may include: an online data forensic server for collecting and analyzing usage history information from an object device, which is subject to data collection, downloading and collecting data on the Internet based on the usage history information, requesting issuance of a timestamp token for the collected data, and receiving the issued timestamp token; a timestamp token issuing server for issuing the timestamp token for the collected data in response to the request for issuance of the timestamp token and proving the issued timestamp token to the online data forensic server; and a storage device for storing the collected data.
    Type: Application
    Filed: October 26, 2011
    Publication date: May 3, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Youn Hee GIL, Joo Young LEE, Su Hyung JO, Young Soo KIM, Keon Woo KIM, Sang Su LEE, Woo Yong CHOI, Sung Kyong UN, Do Won HONG, Hyun Sook CHO
  • Patent number: 7975142
    Abstract: A ring authentication method for a concurrency environment, the method capable of providing unforgeability, sender anonymity, and deniability in the concurrency environment, in which, when a receiver receiving a message requests a sender of the message to certify the message, the sender requested to certify the message sends a message certification value certifying that the sender is one of a plurality of users {P1, . . . , Pn} and authenticates the message m to the receiver, and the receiver verifies the sent message certification value and authenticates that the message is sent from the one of the plurality of users {P1, . . . , Pn}.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: July 5, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Ik Re Jeong, Do Won Hong, Hyun Sook Cho